mgmt.c 98.4 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36
bool enable_hs;

37
#define MGMT_VERSION	1
38
#define MGMT_REVISION	3
39

40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
78
	MGMT_OP_SET_DEVICE_ID,
79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
102
	MGMT_EV_PASSKEY_NOTIFY,
103 104
};

105 106 107 108 109 110
/*
 * These LE scan and inquiry parameters were chosen according to LE General
 * Discovery Procedure specification.
 */
#define LE_SCAN_WIN			0x12
#define LE_SCAN_INT			0x12
111 112
#define LE_SCAN_TIMEOUT_LE_ONLY		msecs_to_jiffies(10240)
#define LE_SCAN_TIMEOUT_BREDR_LE	msecs_to_jiffies(5120)
113

A
Andre Guedes 已提交
114
#define INQUIRY_LEN_BREDR		0x08	/* TGAP(100) */
115
#define INQUIRY_LEN_BREDR_LE		0x04	/* TGAP(100)/2 */
A
Andre Guedes 已提交
116

117
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
118

119 120 121
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

122 123
struct pending_cmd {
	struct list_head list;
124
	u16 opcode;
125
	int index;
126
	void *param;
127
	struct sock *sk;
128
	void *user_data;
129 130
};

131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

196 197 198 199 200
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

201 202 203 204 205 206 207 208
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

209
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
210 211 212 213
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
214
	int err;
215

216
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
217

218
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
219 220 221 222 223
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

224
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
225
	hdr->index = cpu_to_le16(index);
226 227 228 229
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
230
	ev->opcode = cpu_to_le16(cmd);
231

232 233
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
234 235
		kfree_skb(skb);

236
	return err;
237 238
}

239
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
240
			void *rp, size_t rp_len)
241 242 243 244
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
245
	int err;
246 247 248

	BT_DBG("sock %p", sk);

249
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
250 251 252 253 254
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

255
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
256
	hdr->index = cpu_to_le16(index);
257
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
258

259
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
260
	ev->opcode = cpu_to_le16(cmd);
261
	ev->status = status;
262 263 264

	if (rp)
		memcpy(ev->data, rp, rp_len);
265

266 267
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
268 269
		kfree_skb(skb);

270
	return err;
271 272
}

273 274
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
275 276 277 278 279 280
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
281
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
282

283
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
284
			    sizeof(rp));
285 286
}

287 288
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
289 290
{
	struct mgmt_rp_read_commands *rp;
291 292
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
293
	__le16 *opcode;
294 295 296 297 298 299 300 301 302 303 304
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

305 306
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
307 308 309 310 311 312 313

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

314
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
315
			   rp_size);
316 317 318 319 320
	kfree(rp);

	return err;
}

321 322
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
323 324
{
	struct mgmt_rp_read_index_list *rp;
325
	struct hci_dev *d;
326
	size_t rp_len;
327
	u16 count;
328
	int err;
329 330 331 332 333 334

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
335 336 337 338
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

339 340 341
		count++;
	}

342 343 344
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
345
		read_unlock(&hci_dev_list_lock);
346
		return -ENOMEM;
347
	}
348

349
	count = 0;
350
	list_for_each_entry(d, &hci_dev_list, list) {
351
		if (test_bit(HCI_SETUP, &d->dev_flags))
352 353
			continue;

354 355 356
		if (!mgmt_valid_hdev(d))
			continue;

357
		rp->index[count++] = cpu_to_le16(d->id);
358 359 360
		BT_DBG("Added hci%u", d->id);
	}

361 362 363
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

364 365
	read_unlock(&hci_dev_list_lock);

366
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
367
			   rp_len);
368

369 370 371
	kfree(rp);

	return err;
372 373
}

374 375 376 377 378 379 380
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

381
	if (lmp_ssp_capable(hdev))
382 383
		settings |= MGMT_SETTING_SSP;

384
	if (lmp_bredr_capable(hdev)) {
385
		settings |= MGMT_SETTING_CONNECTABLE;
386 387
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
388
		settings |= MGMT_SETTING_DISCOVERABLE;
389 390 391 392
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

393 394 395
	if (enable_hs)
		settings |= MGMT_SETTING_HS;

396
	if (lmp_le_capable(hdev))
397
		settings |= MGMT_SETTING_LE;
398 399 400 401 402 403 404 405

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

406
	if (hdev_is_powered(hdev))
407 408
		settings |= MGMT_SETTING_POWERED;

409
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
410 411
		settings |= MGMT_SETTING_CONNECTABLE;

412 413 414
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

415
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
416 417
		settings |= MGMT_SETTING_DISCOVERABLE;

418
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
419 420
		settings |= MGMT_SETTING_PAIRABLE;

421
	if (lmp_bredr_capable(hdev))
422 423
		settings |= MGMT_SETTING_BREDR;

424
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
425 426
		settings |= MGMT_SETTING_LE;

427
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
428 429
		settings |= MGMT_SETTING_LINK_SECURITY;

430
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
431 432
		settings |= MGMT_SETTING_SSP;

433 434 435
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

436 437 438
	return settings;
}

439 440
#define PNP_INFO_SVCLASS_ID		0x1200

441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

572
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
573 574 575 576 577 578 579
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

580 581 582 583 584 585 586 587 588 589 590 591
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

592
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
593
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
594
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
595 596
}

597
static void update_eir(struct hci_request *req)
598
{
599
	struct hci_dev *hdev = req->hdev;
600 601
	struct hci_cp_write_eir cp;

602
	if (!hdev_is_powered(hdev))
603
		return;
604

605
	if (!lmp_ext_inq_capable(hdev))
606
		return;
607

608
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
609
		return;
610

611
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
612
		return;
613 614 615 616 617 618

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
619
		return;
620 621 622

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

623
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
624 625 626 627 628 629 630 631 632 633 634 635 636
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

637
static void update_class(struct hci_request *req)
638
{
639
	struct hci_dev *hdev = req->hdev;
640 641 642 643
	u8 cod[3];

	BT_DBG("%s", hdev->name);

644
	if (!hdev_is_powered(hdev))
645
		return;
646

647
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
648
		return;
649 650 651 652 653 654

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
655
		return;
656

657
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
658 659
}

660 661 662
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
663
					    service_cache.work);
664
	struct hci_request req;
665

666
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
667 668
		return;

669 670
	hci_req_init(&req, hdev);

671 672
	hci_dev_lock(hdev);

673 674
	update_eir(&req);
	update_class(&req);
675 676

	hci_dev_unlock(hdev);
677 678

	hci_req_run(&req, NULL);
679 680
}

681
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
682
{
683
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
684 685
		return;

686
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
687

688 689 690 691 692 693
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
694 695
}

696
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
697
				void *data, u16 data_len)
698
{
699
	struct mgmt_rp_read_info rp;
700

701
	BT_DBG("sock %p %s", sk, hdev->name);
702

703
	hci_dev_lock(hdev);
704

705 706
	memset(&rp, 0, sizeof(rp));

707
	bacpy(&rp.bdaddr, &hdev->bdaddr);
708

709
	rp.version = hdev->hci_ver;
710
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
711 712 713

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
714

715
	memcpy(rp.dev_class, hdev->dev_class, 3);
716

717
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
718
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
719

720
	hci_dev_unlock(hdev);
721

722
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
723
			    sizeof(rp));
724 725
}

726 727 728
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
729
	kfree(cmd->param);
730 731 732
	kfree(cmd);
}

733
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
734 735
					    struct hci_dev *hdev, void *data,
					    u16 len)
736 737 738
{
	struct pending_cmd *cmd;

739
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
740
	if (!cmd)
741
		return NULL;
742 743

	cmd->opcode = opcode;
744
	cmd->index = hdev->id;
745

746
	cmd->param = kmalloc(len, GFP_KERNEL);
747
	if (!cmd->param) {
748
		kfree(cmd);
749
		return NULL;
750 751
	}

752 753
	if (data)
		memcpy(cmd->param, data, len);
754 755 756 757

	cmd->sk = sk;
	sock_hold(sk);

758
	list_add(&cmd->list, &hdev->mgmt_pending);
759

760
	return cmd;
761 762
}

763
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
764 765
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
766
				 void *data)
767
{
768
	struct pending_cmd *cmd, *tmp;
769

770
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
771
		if (opcode > 0 && cmd->opcode != opcode)
772 773 774 775 776 777
			continue;

		cb(cmd, data);
	}
}

778
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
779
{
780
	struct pending_cmd *cmd;
781

782
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
783 784
		if (cmd->opcode == opcode)
			return cmd;
785 786 787 788 789
	}

	return NULL;
}

790
static void mgmt_pending_remove(struct pending_cmd *cmd)
791 792 793 794 795
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

796
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
797
{
798
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
799

800
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
801
			    sizeof(settings));
802 803
}

804
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
805
		       u16 len)
806
{
807
	struct mgmt_mode *cp = data;
808
	struct pending_cmd *cmd;
809
	int err;
810

811
	BT_DBG("request for %s", hdev->name);
812

813 814 815 816
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

817
	hci_dev_lock(hdev);
818

819 820 821 822
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
823 824 825
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
826 827 828 829
			goto failed;
		}
	}

830
	if (!!cp->val == hdev_is_powered(hdev)) {
831
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
832 833 834
		goto failed;
	}

835
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
836
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
837
				 MGMT_STATUS_BUSY);
838 839 840
		goto failed;
	}

841
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
842 843
	if (!cmd) {
		err = -ENOMEM;
844
		goto failed;
845
	}
846

847
	if (cp->val)
848
		queue_work(hdev->req_workqueue, &hdev->power_on);
849
	else
850
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
851

852
	err = 0;
853 854

failed:
855
	hci_dev_unlock(hdev);
856
	return err;
857 858
}

859 860
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
861 862 863 864
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

865
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
866 867 868 869 870 871 872 873
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
874
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
875 876 877 878 879
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

880 881 882
	/* Time stamp */
	__net_timestamp(skb);

883 884 885 886 887 888 889 890 891 892 893 894 895 896 897
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

898
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
899
			    u16 len)
900
{
901
	struct mgmt_cp_set_discoverable *cp = data;
902
	struct pending_cmd *cmd;
903
	u16 timeout;
904 905 906
	u8 scan;
	int err;

907
	BT_DBG("request for %s", hdev->name);
908

909 910 911 912
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				 MGMT_STATUS_NOT_SUPPORTED);

913 914 915 916
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

917
	timeout = __le16_to_cpu(cp->timeout);
918
	if (!cp->val && timeout > 0)
919
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
920
				  MGMT_STATUS_INVALID_PARAMS);
921

922
	hci_dev_lock(hdev);
923

924
	if (!hdev_is_powered(hdev) && timeout > 0) {
925
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
926
				 MGMT_STATUS_NOT_POWERED);
927 928 929
		goto failed;
	}

930
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
931
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
932
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
933
				 MGMT_STATUS_BUSY);
934 935 936
		goto failed;
	}

937
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
938
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
939
				 MGMT_STATUS_REJECTED);
940 941 942 943
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
944 945 946 947 948 949 950
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

951
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
952 953 954 955 956 957
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

958 959 960 961
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
962 963 964 965 966 967 968 969 970 971 972
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

973
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
974 975 976
		goto failed;
	}

977
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
978 979
	if (!cmd) {
		err = -ENOMEM;
980
		goto failed;
981
	}
982 983 984

	scan = SCAN_PAGE;

985
	if (cp->val)
986
		scan |= SCAN_INQUIRY;
987
	else
988
		cancel_delayed_work(&hdev->discov_off);
989 990 991

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
992
		mgmt_pending_remove(cmd);
993

994
	if (cp->val)
995
		hdev->discov_timeout = timeout;
996

997
failed:
998
	hci_dev_unlock(hdev);
999 1000 1001
	return err;
}

1002 1003
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1004
	struct hci_dev *hdev = req->hdev;
1005 1006 1007
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1008 1009 1010
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1025 1026 1027 1028 1029 1030 1031
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1032 1033
}

1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1054
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1055
			   u16 len)
1056
{
1057
	struct mgmt_mode *cp = data;
1058
	struct pending_cmd *cmd;
1059
	struct hci_request req;
1060 1061 1062
	u8 scan;
	int err;

1063
	BT_DBG("request for %s", hdev->name);
1064

1065 1066 1067 1068
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

1069 1070 1071 1072
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1073
	hci_dev_lock(hdev);
1074

1075
	if (!hdev_is_powered(hdev)) {
1076 1077 1078 1079 1080
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

1081
		if (cp->val) {
1082
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1083
		} else {
1084 1085 1086
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
1087

1088
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1089 1090 1091 1092 1093 1094
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1095 1096 1097
		goto failed;
	}

1098
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1099
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1100
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1101
				 MGMT_STATUS_BUSY);
1102 1103 1104
		goto failed;
	}

1105
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1106
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1107 1108 1109
		goto failed;
	}

1110
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1111 1112
	if (!cmd) {
		err = -ENOMEM;
1113
		goto failed;
1114
	}
1115

1116
	if (cp->val) {
1117
		scan = SCAN_PAGE;
1118
	} else {
1119 1120
		scan = 0;

1121
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1122
		    hdev->discov_timeout > 0)
1123 1124 1125
			cancel_delayed_work(&hdev->discov_off);
	}

1126 1127 1128 1129
	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);

1130 1131 1132 1133 1134 1135 1136
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1137 1138
		write_fast_connectable(&req, false);

1139
	err = hci_req_run(&req, set_connectable_complete);
1140
	if (err < 0)
1141
		mgmt_pending_remove(cmd);
1142 1143

failed:
1144
	hci_dev_unlock(hdev);
1145 1146 1147
	return err;
}

1148
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1149
			u16 len)
1150
{
1151
	struct mgmt_mode *cp = data;
1152 1153
	int err;

1154
	BT_DBG("request for %s", hdev->name);
1155

1156 1157 1158 1159
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1160
	hci_dev_lock(hdev);
1161 1162

	if (cp->val)
1163
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1164
	else
1165
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1166

1167
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1168 1169 1170
	if (err < 0)
		goto failed;

1171
	err = new_settings(hdev, sk);
1172 1173

failed:
1174
	hci_dev_unlock(hdev);
1175 1176 1177
	return err;
}

1178 1179
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1180 1181 1182
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1183
	u8 val;
1184 1185
	int err;

1186
	BT_DBG("request for %s", hdev->name);
1187

1188 1189 1190 1191
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_NOT_SUPPORTED);

1192 1193 1194 1195
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1196 1197
	hci_dev_lock(hdev);

1198
	if (!hdev_is_powered(hdev)) {
1199 1200 1201
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1202
					  &hdev->dev_flags)) {
1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1214 1215 1216 1217
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1218
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1219
				 MGMT_STATUS_BUSY);
1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1247
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1248 1249 1250
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1251
	u8 val;
1252 1253
	int err;

1254
	BT_DBG("request for %s", hdev->name);
1255

1256 1257 1258
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1259

1260 1261 1262 1263
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1264
	hci_dev_lock(hdev);
1265

1266 1267
	val = !!cp->val;

1268
	if (!hdev_is_powered(hdev)) {
1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1283 1284 1285 1286
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1287 1288
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1314
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1315 1316 1317
{
	struct mgmt_mode *cp = data;

1318
	BT_DBG("request for %s", hdev->name);
1319

1320 1321
	if (!enable_hs)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1322
				  MGMT_STATUS_NOT_SUPPORTED);
1323

1324 1325 1326 1327
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1328 1329 1330 1331 1332
	if (cp->val)
		set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
	else
		clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);

1333
	return send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1334 1335
}

1336
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1337 1338 1339 1340 1341
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
	int err;
1342
	u8 val, enabled;
1343

1344
	BT_DBG("request for %s", hdev->name);
1345

1346 1347 1348
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1349

1350 1351 1352 1353
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1354 1355 1356 1357 1358
	/* LE-only devices do not allow toggling LE on/off */
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1359
	hci_dev_lock(hdev);
1360 1361

	val = !!cp->val;
1362
	enabled = lmp_host_le_capable(hdev);
1363

1364
	if (!hdev_is_powered(hdev) || val == enabled) {
1365 1366 1367 1368 1369 1370 1371 1372 1373
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1374
			goto unlock;
1375 1376 1377 1378

		if (changed)
			err = new_settings(hdev, sk);

1379
		goto unlock;
1380 1381 1382
	}

	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
1383
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1384
				 MGMT_STATUS_BUSY);
1385
		goto unlock;
1386 1387 1388 1389 1390
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1391
		goto unlock;
1392 1393 1394 1395 1396 1397
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1398
		hci_cp.simul = lmp_le_br_capable(hdev);
1399 1400
	}

1401 1402
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
			   &hci_cp);
1403
	if (err < 0)
1404 1405
		mgmt_pending_remove(cmd);

1406 1407
unlock:
	hci_dev_unlock(hdev);
1408 1409 1410
	return err;
}

1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1479
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1480
{
1481
	struct mgmt_cp_add_uuid *cp = data;
1482
	struct pending_cmd *cmd;
1483
	struct hci_request req;
1484 1485 1486
	struct bt_uuid *uuid;
	int err;

1487
	BT_DBG("request for %s", hdev->name);
1488

1489
	hci_dev_lock(hdev);
1490

1491
	if (pending_eir_or_class(hdev)) {
1492
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1493
				 MGMT_STATUS_BUSY);
1494 1495 1496
		goto failed;
	}

1497
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1498 1499 1500 1501 1502 1503
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1504
	uuid->svc_hint = cp->svc_hint;
1505
	uuid->size = get_uuid_size(cp->uuid);
1506

1507
	list_add_tail(&uuid->list, &hdev->uuids);
1508

1509
	hci_req_init(&req, hdev);
1510

1511 1512 1513
	update_class(&req);
	update_eir(&req);

1514 1515 1516 1517
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1518

1519
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1520
				   hdev->dev_class, 3);
1521 1522 1523 1524
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1525
	if (!cmd) {
1526
		err = -ENOMEM;
1527 1528 1529 1530
		goto failed;
	}

	err = 0;
1531 1532

failed:
1533
	hci_dev_unlock(hdev);
1534 1535 1536
	return err;
}

1537 1538 1539 1540 1541 1542
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1543 1544
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1545 1546 1547 1548 1549 1550
		return true;
	}

	return false;
}

1551 1552 1553 1554 1555 1556 1557
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1558
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1559
		       u16 len)
1560
{
1561
	struct mgmt_cp_remove_uuid *cp = data;
1562
	struct pending_cmd *cmd;
1563
	struct bt_uuid *match, *tmp;
1564
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1565
	struct hci_request req;
1566 1567
	int err, found;

1568
	BT_DBG("request for %s", hdev->name);
1569

1570
	hci_dev_lock(hdev);
1571

1572
	if (pending_eir_or_class(hdev)) {
1573
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1574
				 MGMT_STATUS_BUSY);
1575 1576 1577
		goto unlock;
	}

1578 1579
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1580

1581
		if (enable_service_cache(hdev)) {
1582
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1583
					   0, hdev->dev_class, 3);
1584 1585
			goto unlock;
		}
1586

1587
		goto update_class;
1588 1589 1590 1591
	}

	found = 0;

1592
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1593 1594 1595 1596
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1597
		kfree(match);
1598 1599 1600 1601
		found++;
	}

	if (found == 0) {
1602
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1603
				 MGMT_STATUS_INVALID_PARAMS);
1604 1605 1606
		goto unlock;
	}

1607
update_class:
1608
	hci_req_init(&req, hdev);
1609

1610 1611 1612
	update_class(&req);
	update_eir(&req);

1613 1614 1615 1616
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1617

1618
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1619
				   hdev->dev_class, 3);
1620 1621 1622 1623
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1624
	if (!cmd) {
1625
		err = -ENOMEM;
1626 1627 1628 1629
		goto unlock;
	}

	err = 0;
1630 1631

unlock:
1632
	hci_dev_unlock(hdev);
1633 1634 1635
	return err;
}

1636 1637 1638 1639 1640 1641 1642
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1643
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1644
			 u16 len)
1645
{
1646
	struct mgmt_cp_set_dev_class *cp = data;
1647
	struct pending_cmd *cmd;
1648
	struct hci_request req;
1649 1650
	int err;

1651
	BT_DBG("request for %s", hdev->name);
1652

1653 1654 1655
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1656

1657
	hci_dev_lock(hdev);
1658

1659 1660 1661 1662 1663
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
1664

1665 1666 1667 1668 1669
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
1670

1671 1672 1673
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1674
	if (!hdev_is_powered(hdev)) {
1675
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1676
				   hdev->dev_class, 3);
1677 1678 1679
		goto unlock;
	}

1680 1681
	hci_req_init(&req, hdev);

1682
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1683 1684 1685
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1686
		update_eir(&req);
1687
	}
1688

1689 1690
	update_class(&req);

1691 1692 1693 1694
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1695

1696
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1697
				   hdev->dev_class, 3);
1698 1699 1700 1701
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1702
	if (!cmd) {
1703
		err = -ENOMEM;
1704 1705 1706 1707
		goto unlock;
	}

	err = 0;
1708

1709
unlock:
1710
	hci_dev_unlock(hdev);
1711 1712 1713
	return err;
}

1714
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1715
			  u16 len)
1716
{
1717
	struct mgmt_cp_load_link_keys *cp = data;
1718
	u16 key_count, expected_len;
1719
	int i;
1720

1721
	key_count = __le16_to_cpu(cp->key_count);
1722

1723 1724
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1725
	if (expected_len != len) {
1726
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1727
		       len, expected_len);
1728
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1729
				  MGMT_STATUS_INVALID_PARAMS);
1730 1731
	}

1732 1733 1734 1735
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1736
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1737
	       key_count);
1738

1739 1740 1741 1742 1743 1744 1745 1746
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1747
	hci_dev_lock(hdev);
1748 1749 1750

	hci_link_keys_clear(hdev);

1751
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1752 1753

	if (cp->debug_keys)
1754
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1755
	else
1756
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1757

1758
	for (i = 0; i < key_count; i++) {
1759
		struct mgmt_link_key_info *key = &cp->keys[i];
1760

1761
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1762
				 key->type, key->pin_len);
1763 1764
	}

1765
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1766

1767
	hci_dev_unlock(hdev);
1768

1769
	return 0;
1770 1771
}

1772
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1773
			   u8 addr_type, struct sock *skip_sk)
1774 1775 1776 1777 1778 1779 1780
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1781
			  skip_sk);
1782 1783
}

1784
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1785
			 u16 len)
1786
{
1787 1788
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1789 1790
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1791 1792 1793
	struct hci_conn *conn;
	int err;

1794
	memset(&rp, 0, sizeof(rp));
1795 1796
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1797

1798 1799 1800 1801 1802
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1803 1804 1805 1806 1807
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1808 1809
	hci_dev_lock(hdev);

1810
	if (!hdev_is_powered(hdev)) {
1811
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1812
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1813 1814 1815
		goto unlock;
	}

1816
	if (cp->addr.type == BDADDR_BREDR)
1817 1818 1819
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1820

1821
	if (err < 0) {
1822
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1823
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1824 1825 1826
		goto unlock;
	}

1827
	if (cp->disconnect) {
1828
		if (cp->addr.type == BDADDR_BREDR)
1829
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1830
						       &cp->addr.bdaddr);
1831 1832
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1833
						       &cp->addr.bdaddr);
1834 1835 1836
	} else {
		conn = NULL;
	}
1837

1838
	if (!conn) {
1839
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1840
				   &rp, sizeof(rp));
1841
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1842 1843
		goto unlock;
	}
1844

1845
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1846
			       sizeof(*cp));
1847 1848 1849
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1850 1851
	}

1852
	dc.handle = cpu_to_le16(conn->handle);
1853 1854 1855 1856 1857
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1858
unlock:
1859
	hci_dev_unlock(hdev);
1860 1861 1862
	return err;
}

1863
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1864
		      u16 len)
1865
{
1866
	struct mgmt_cp_disconnect *cp = data;
1867
	struct mgmt_rp_disconnect rp;
1868
	struct hci_cp_disconnect dc;
1869
	struct pending_cmd *cmd;
1870 1871 1872 1873 1874
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1875 1876 1877 1878
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1879
	if (!bdaddr_type_is_valid(cp->addr.type))
1880 1881 1882
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1883

1884
	hci_dev_lock(hdev);
1885 1886

	if (!test_bit(HCI_UP, &hdev->flags)) {
1887 1888
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1889 1890 1891
		goto failed;
	}

1892
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1893 1894
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
1895 1896 1897
		goto failed;
	}

1898
	if (cp->addr.type == BDADDR_BREDR)
1899 1900
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
1901 1902
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1903

1904
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
1905 1906
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
1907 1908 1909
		goto failed;
	}

1910
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1911 1912
	if (!cmd) {
		err = -ENOMEM;
1913
		goto failed;
1914
	}
1915

1916
	dc.handle = cpu_to_le16(conn->handle);
1917
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
1918 1919 1920

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1921
		mgmt_pending_remove(cmd);
1922 1923

failed:
1924
	hci_dev_unlock(hdev);
1925 1926 1927
	return err;
}

1928
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
1929 1930 1931
{
	switch (link_type) {
	case LE_LINK:
1932 1933
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
1934
			return BDADDR_LE_PUBLIC;
1935

1936
		default:
1937
			/* Fallback to LE Random address type */
1938
			return BDADDR_LE_RANDOM;
1939
		}
1940

1941
	default:
1942
		/* Fallback to BR/EDR type */
1943
		return BDADDR_BREDR;
1944 1945 1946
	}
}

1947 1948
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
1949 1950
{
	struct mgmt_rp_get_connections *rp;
1951
	struct hci_conn *c;
1952
	size_t rp_len;
1953 1954
	int err;
	u16 i;
1955 1956 1957

	BT_DBG("");

1958
	hci_dev_lock(hdev);
1959

1960
	if (!hdev_is_powered(hdev)) {
1961
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
1962
				 MGMT_STATUS_NOT_POWERED);
1963 1964 1965
		goto unlock;
	}

1966
	i = 0;
1967 1968
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
1969
			i++;
1970 1971
	}

1972
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1973
	rp = kmalloc(rp_len, GFP_KERNEL);
1974
	if (!rp) {
1975 1976 1977 1978 1979
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
1980
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1981 1982
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1983
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1984
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
1985
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
1986 1987 1988 1989
			continue;
		i++;
	}

1990
	rp->conn_count = cpu_to_le16(i);
1991

1992 1993
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1994

1995
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
1996
			   rp_len);
1997

1998
	kfree(rp);
1999 2000

unlock:
2001
	hci_dev_unlock(hdev);
2002 2003 2004
	return err;
}

2005
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2006
				   struct mgmt_cp_pin_code_neg_reply *cp)
2007 2008 2009 2010
{
	struct pending_cmd *cmd;
	int err;

2011
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2012
			       sizeof(*cp));
2013 2014 2015
	if (!cmd)
		return -ENOMEM;

2016
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2017
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2018 2019 2020 2021 2022 2023
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2024
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2025
			  u16 len)
2026
{
2027
	struct hci_conn *conn;
2028
	struct mgmt_cp_pin_code_reply *cp = data;
2029
	struct hci_cp_pin_code_reply reply;
2030
	struct pending_cmd *cmd;
2031 2032 2033 2034
	int err;

	BT_DBG("");

2035
	hci_dev_lock(hdev);
2036

2037
	if (!hdev_is_powered(hdev)) {
2038
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2039
				 MGMT_STATUS_NOT_POWERED);
2040 2041 2042
		goto failed;
	}

2043
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2044
	if (!conn) {
2045
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2046
				 MGMT_STATUS_NOT_CONNECTED);
2047 2048 2049 2050
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2051 2052 2053
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2054 2055 2056

		BT_ERR("PIN code is not 16 bytes long");

2057
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2058
		if (err >= 0)
2059
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2060
					 MGMT_STATUS_INVALID_PARAMS);
2061 2062 2063 2064

		goto failed;
	}

2065
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2066 2067
	if (!cmd) {
		err = -ENOMEM;
2068
		goto failed;
2069
	}
2070

2071
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2072
	reply.pin_len = cp->pin_len;
2073
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2074 2075 2076

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2077
		mgmt_pending_remove(cmd);
2078 2079

failed:
2080
	hci_dev_unlock(hdev);
2081 2082 2083
	return err;
}

2084 2085
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2086
{
2087
	struct mgmt_cp_set_io_capability *cp = data;
2088 2089 2090

	BT_DBG("");

2091
	hci_dev_lock(hdev);
2092 2093 2094 2095

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2096
	       hdev->io_capability);
2097

2098
	hci_dev_unlock(hdev);
2099

2100 2101
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2102 2103
}

2104
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2105 2106
{
	struct hci_dev *hdev = conn->hdev;
2107
	struct pending_cmd *cmd;
2108

2109
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2127
	bacpy(&rp.addr.bdaddr, &conn->dst);
2128
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2129

2130
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2131
		     &rp, sizeof(rp));
2132 2133 2134 2135 2136 2137

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2138
	hci_conn_drop(conn);
2139

2140
	mgmt_pending_remove(cmd);
2141 2142 2143 2144 2145 2146 2147 2148 2149
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2150
	if (!cmd)
2151
		BT_DBG("Unable to find a pending command");
2152
	else
2153
		pairing_complete(cmd, mgmt_status(status));
2154 2155
}

2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2172
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2173
		       u16 len)
2174
{
2175
	struct mgmt_cp_pair_device *cp = data;
2176
	struct mgmt_rp_pair_device rp;
2177 2178 2179 2180 2181 2182 2183
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2184 2185 2186 2187
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2188 2189 2190 2191 2192
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2193
	hci_dev_lock(hdev);
2194

2195
	if (!hdev_is_powered(hdev)) {
2196 2197
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2198 2199 2200
		goto unlock;
	}

2201 2202
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2203
		auth_type = HCI_AT_DEDICATED_BONDING;
2204
	else
2205 2206
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2207
	if (cp->addr.type == BDADDR_BREDR)
2208 2209
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2210
	else
2211 2212
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2213

2214
	if (IS_ERR(conn)) {
2215 2216 2217 2218 2219 2220 2221
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2222
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2223
				   status, &rp,
2224
				   sizeof(rp));
2225 2226 2227 2228
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2229
		hci_conn_drop(conn);
2230
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2231
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2232 2233 2234
		goto unlock;
	}

2235
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2236 2237
	if (!cmd) {
		err = -ENOMEM;
2238
		hci_conn_drop(conn);
2239 2240 2241
		goto unlock;
	}

2242
	/* For LE, just connecting isn't a proof that the pairing finished */
2243
	if (cp->addr.type == BDADDR_BREDR)
2244
		conn->connect_cfm_cb = pairing_complete_cb;
2245 2246
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2247

2248 2249 2250 2251 2252 2253
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2254
	    hci_conn_security(conn, sec_level, auth_type))
2255 2256 2257 2258 2259
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2260
	hci_dev_unlock(hdev);
2261 2262 2263
	return err;
}

2264 2265
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2266
{
2267
	struct mgmt_addr_info *addr = data;
2268 2269 2270 2271 2272 2273 2274 2275
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2276
	if (!hdev_is_powered(hdev)) {
2277
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2278
				 MGMT_STATUS_NOT_POWERED);
2279 2280 2281
		goto unlock;
	}

2282 2283
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2284
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2285
				 MGMT_STATUS_INVALID_PARAMS);
2286 2287 2288 2289 2290 2291
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2292
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2293
				 MGMT_STATUS_INVALID_PARAMS);
2294 2295 2296 2297 2298
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2299
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2300
			   addr, sizeof(*addr));
2301 2302 2303 2304 2305
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2306
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2307
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2308
			     u16 hci_op, __le32 passkey)
2309 2310
{
	struct pending_cmd *cmd;
2311
	struct hci_conn *conn;
2312 2313
	int err;

2314
	hci_dev_lock(hdev);
2315

2316
	if (!hdev_is_powered(hdev)) {
2317 2318 2319
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2320
		goto done;
2321 2322
	}

2323 2324
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2325
	else
2326
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2327 2328

	if (!conn) {
2329 2330 2331
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2332 2333
		goto done;
	}
2334

2335
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2336
		/* Continue with pairing via SMP */
2337 2338 2339
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2340 2341 2342
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2343
		else
2344 2345 2346
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2347 2348 2349 2350

		goto done;
	}

2351
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2352 2353
	if (!cmd) {
		err = -ENOMEM;
2354
		goto done;
2355 2356
	}

2357
	/* Continue with pairing via HCI */
2358 2359 2360
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2361
		bacpy(&cp.bdaddr, &addr->bdaddr);
2362 2363 2364
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2365 2366
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2367

2368 2369
	if (err < 0)
		mgmt_pending_remove(cmd);
2370

2371
done:
2372
	hci_dev_unlock(hdev);
2373 2374 2375
	return err;
}

2376 2377 2378 2379 2380 2381 2382
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2383
	return user_pairing_resp(sk, hdev, &cp->addr,
2384 2385 2386 2387
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2388 2389
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2390
{
2391
	struct mgmt_cp_user_confirm_reply *cp = data;
2392 2393 2394 2395

	BT_DBG("");

	if (len != sizeof(*cp))
2396
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2397
				  MGMT_STATUS_INVALID_PARAMS);
2398

2399
	return user_pairing_resp(sk, hdev, &cp->addr,
2400 2401
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2402 2403
}

2404
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2405
				  void *data, u16 len)
2406
{
2407
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2408 2409 2410

	BT_DBG("");

2411
	return user_pairing_resp(sk, hdev, &cp->addr,
2412 2413
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2414 2415
}

2416 2417
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2418
{
2419
	struct mgmt_cp_user_passkey_reply *cp = data;
2420 2421 2422

	BT_DBG("");

2423
	return user_pairing_resp(sk, hdev, &cp->addr,
2424 2425
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2426 2427
}

2428
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2429
				  void *data, u16 len)
2430
{
2431
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2432 2433 2434

	BT_DBG("");

2435
	return user_pairing_resp(sk, hdev, &cp->addr,
2436 2437
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2438 2439
}

2440
static void update_name(struct hci_request *req)
2441
{
2442
	struct hci_dev *hdev = req->hdev;
2443 2444
	struct hci_cp_write_local_name cp;

2445
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2446

2447
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2448 2449
}

2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2478
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2479
			  u16 len)
2480
{
2481
	struct mgmt_cp_set_local_name *cp = data;
2482
	struct pending_cmd *cmd;
2483
	struct hci_request req;
2484 2485 2486 2487
	int err;

	BT_DBG("");

2488
	hci_dev_lock(hdev);
2489

2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

2501
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2502

2503
	if (!hdev_is_powered(hdev)) {
2504
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2505 2506

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2507
				   data, len);
2508 2509 2510 2511
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2512
				 sk);
2513

2514 2515 2516
		goto failed;
	}

2517
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2518 2519 2520 2521 2522
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2523 2524
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

2525
	hci_req_init(&req, hdev);
2526 2527 2528 2529 2530 2531 2532 2533 2534

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

	if (lmp_le_capable(hdev))
		hci_update_ad(&req);

2535
	err = hci_req_run(&req, set_name_complete);
2536 2537 2538 2539
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2540
	hci_dev_unlock(hdev);
2541 2542 2543
	return err;
}

2544
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2545
			       void *data, u16 data_len)
2546 2547 2548 2549
{
	struct pending_cmd *cmd;
	int err;

2550
	BT_DBG("%s", hdev->name);
2551

2552
	hci_dev_lock(hdev);
2553

2554
	if (!hdev_is_powered(hdev)) {
2555
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2556
				 MGMT_STATUS_NOT_POWERED);
2557 2558 2559
		goto unlock;
	}

2560
	if (!lmp_ssp_capable(hdev)) {
2561
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2562
				 MGMT_STATUS_NOT_SUPPORTED);
2563 2564 2565
		goto unlock;
	}

2566
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2567
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2568
				 MGMT_STATUS_BUSY);
2569 2570 2571
		goto unlock;
	}

2572
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2573 2574 2575 2576 2577 2578 2579 2580 2581 2582
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2583
	hci_dev_unlock(hdev);
2584 2585 2586
	return err;
}

2587
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2588
			       void *data, u16 len)
2589
{
2590
	struct mgmt_cp_add_remote_oob_data *cp = data;
2591
	u8 status;
2592 2593
	int err;

2594
	BT_DBG("%s ", hdev->name);
2595

2596
	hci_dev_lock(hdev);
2597

2598
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2599
				      cp->randomizer);
2600
	if (err < 0)
2601
		status = MGMT_STATUS_FAILED;
2602
	else
2603
		status = MGMT_STATUS_SUCCESS;
2604

2605
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2606
			   &cp->addr, sizeof(cp->addr));
2607

2608
	hci_dev_unlock(hdev);
2609 2610 2611
	return err;
}

2612
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2613
				  void *data, u16 len)
2614
{
2615
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2616
	u8 status;
2617 2618
	int err;

2619
	BT_DBG("%s", hdev->name);
2620

2621
	hci_dev_lock(hdev);
2622

2623
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2624
	if (err < 0)
2625
		status = MGMT_STATUS_INVALID_PARAMS;
2626
	else
2627
		status = MGMT_STATUS_SUCCESS;
2628

2629
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2630
			   status, &cp->addr, sizeof(cp->addr));
2631

2632
	hci_dev_unlock(hdev);
2633 2634 2635
	return err;
}

2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652
int mgmt_interleaved_discovery(struct hci_dev *hdev)
{
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR_LE);
	if (err < 0)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	hci_dev_unlock(hdev);

	return err;
}

2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
				   LE_SCAN_TIMEOUT_LE_ONLY);
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
				   LE_SCAN_TIMEOUT_BREDR_LE);
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

2708
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2709
			   void *data, u16 len)
2710
{
2711
	struct mgmt_cp_start_discovery *cp = data;
2712
	struct pending_cmd *cmd;
2713 2714 2715 2716 2717 2718
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
2719 2720
	int err;

2721
	BT_DBG("%s", hdev->name);
2722

2723
	hci_dev_lock(hdev);
2724

2725
	if (!hdev_is_powered(hdev)) {
2726
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2727
				 MGMT_STATUS_NOT_POWERED);
2728 2729 2730
		goto failed;
	}

2731 2732 2733 2734 2735 2736
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2737
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2738
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2739
				 MGMT_STATUS_BUSY);
2740 2741 2742
		goto failed;
	}

2743
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2744 2745 2746 2747 2748
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2749 2750
	hdev->discovery.type = cp->type;

2751 2752
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
2753
	switch (hdev->discovery.type) {
2754
	case DISCOV_TYPE_BREDR:
2755 2756 2757 2758 2759 2760 2761
		if (!lmp_bredr_capable(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
		inq_cp.length = INQUIRY_LEN_BREDR;
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
2775 2776 2777
		break;

	case DISCOV_TYPE_LE:
2778
	case DISCOV_TYPE_INTERLEAVED:
2779
		if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
2780 2781 2782 2783 2784 2785
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2786 2787
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
		    !lmp_bredr_capable(hdev)) {
2788 2789 2790 2791 2792 2793
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819
		if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
		param_cp.interval = cpu_to_le16(LE_SCAN_INT);
		param_cp.window = cpu_to_le16(LE_SCAN_WIN);
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
2820 2821
		break;

2822
	default:
2823 2824 2825 2826
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2827
	}
2828

2829
	err = hci_req_run(&req, start_discovery_complete);
2830 2831
	if (err < 0)
		mgmt_pending_remove(cmd);
2832 2833
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2834 2835

failed:
2836
	hci_dev_unlock(hdev);
2837 2838 2839
	return err;
}

2840
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2841
			  u16 len)
2842
{
2843
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2844
	struct pending_cmd *cmd;
2845 2846
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2847 2848
	int err;

2849
	BT_DBG("%s", hdev->name);
2850

2851
	hci_dev_lock(hdev);
2852

2853
	if (!hci_discovery_active(hdev)) {
2854
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2855 2856
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2857 2858 2859 2860
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2861
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2862 2863
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2864
		goto unlock;
2865 2866
	}

2867
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2868 2869
	if (!cmd) {
		err = -ENOMEM;
2870 2871 2872
		goto unlock;
	}

2873 2874
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
2875 2876 2877 2878 2879
		if (test_bit(HCI_INQUIRY, &hdev->flags))
			err = hci_cancel_inquiry(hdev);
		else
			err = hci_cancel_le_scan(hdev);

2880 2881 2882 2883
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
2884
						     NAME_PENDING);
2885
		if (!e) {
2886
			mgmt_pending_remove(cmd);
2887 2888 2889 2890 2891 2892 2893
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
2894

2895 2896 2897 2898 2899 2900 2901 2902 2903
		bacpy(&cp.bdaddr, &e->data.bdaddr);
		err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
				   sizeof(cp), &cp);

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
		err = -EFAULT;
2904 2905 2906 2907
	}

	if (err < 0)
		mgmt_pending_remove(cmd);
2908 2909
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2910

2911
unlock:
2912
	hci_dev_unlock(hdev);
2913 2914 2915
	return err;
}

2916
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
2917
			u16 len)
2918
{
2919
	struct mgmt_cp_confirm_name *cp = data;
2920 2921 2922
	struct inquiry_entry *e;
	int err;

2923
	BT_DBG("%s", hdev->name);
2924 2925 2926

	hci_dev_lock(hdev);

2927
	if (!hci_discovery_active(hdev)) {
2928
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2929
				 MGMT_STATUS_FAILED);
2930 2931 2932
		goto failed;
	}

2933
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
2934
	if (!e) {
2935
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2936
				 MGMT_STATUS_INVALID_PARAMS);
2937 2938 2939 2940 2941 2942 2943 2944
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2945
		hci_inquiry_cache_update_resolve(hdev, e);
2946 2947
	}

2948 2949
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
2950 2951 2952 2953 2954 2955

failed:
	hci_dev_unlock(hdev);
	return err;
}

2956
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
2957
			u16 len)
2958
{
2959
	struct mgmt_cp_block_device *cp = data;
2960
	u8 status;
2961 2962
	int err;

2963
	BT_DBG("%s", hdev->name);
2964

2965
	if (!bdaddr_type_is_valid(cp->addr.type))
2966 2967 2968
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
2969

2970
	hci_dev_lock(hdev);
2971

2972
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2973
	if (err < 0)
2974
		status = MGMT_STATUS_FAILED;
2975
	else
2976
		status = MGMT_STATUS_SUCCESS;
2977

2978
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
2979
			   &cp->addr, sizeof(cp->addr));
2980

2981
	hci_dev_unlock(hdev);
2982 2983 2984 2985

	return err;
}

2986
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
2987
			  u16 len)
2988
{
2989
	struct mgmt_cp_unblock_device *cp = data;
2990
	u8 status;
2991 2992
	int err;

2993
	BT_DBG("%s", hdev->name);
2994

2995
	if (!bdaddr_type_is_valid(cp->addr.type))
2996 2997 2998
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
2999

3000
	hci_dev_lock(hdev);
3001

3002
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3003
	if (err < 0)
3004
		status = MGMT_STATUS_INVALID_PARAMS;
3005
	else
3006
		status = MGMT_STATUS_SUCCESS;
3007

3008
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3009
			   &cp->addr, sizeof(cp->addr));
3010

3011
	hci_dev_unlock(hdev);
3012 3013 3014 3015

	return err;
}

3016 3017 3018 3019
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3020
	struct hci_request req;
3021
	int err;
3022
	__u16 source;
3023 3024 3025

	BT_DBG("%s", hdev->name);

3026 3027 3028 3029 3030 3031
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3032 3033
	hci_dev_lock(hdev);

3034
	hdev->devid_source = source;
3035 3036 3037 3038 3039 3040
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3041 3042 3043
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3044 3045 3046 3047 3048 3049

	hci_dev_unlock(hdev);

	return err;
}

3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3066 3067 3068 3069 3070 3071 3072
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3073 3074 3075 3076 3077 3078 3079 3080 3081 3082
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3083
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3084
				void *data, u16 len)
3085
{
3086
	struct mgmt_mode *cp = data;
3087 3088
	struct pending_cmd *cmd;
	struct hci_request req;
3089 3090
	int err;

3091
	BT_DBG("%s", hdev->name);
3092

3093
	if (!lmp_bredr_capable(hdev) || hdev->hci_ver < BLUETOOTH_VER_1_2)
3094 3095 3096
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3097 3098 3099 3100
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3101
	if (!hdev_is_powered(hdev))
3102
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3103
				  MGMT_STATUS_NOT_POWERED);
3104 3105

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3106
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3107
				  MGMT_STATUS_REJECTED);
3108 3109 3110

	hci_dev_lock(hdev);

3111 3112 3113 3114 3115 3116
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3117 3118 3119 3120 3121 3122
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3123 3124 3125 3126 3127
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3128 3129
	}

3130 3131
	hci_req_init(&req, hdev);

3132
	write_fast_connectable(&req, cp->val);
3133 3134

	err = hci_req_run(&req, fast_connectable_complete);
3135
	if (err < 0) {
3136
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3137
				 MGMT_STATUS_FAILED);
3138
		mgmt_pending_remove(cmd);
3139 3140
	}

3141
unlock:
3142
	hci_dev_unlock(hdev);
3143

3144 3145 3146
	return err;
}

3147 3148
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
3149 3150
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
3151 3152
	if (key->master != 0x00 && key->master != 0x01)
		return false;
3153 3154
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
3155 3156 3157
	return true;
}

3158
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
3159
			       void *cp_data, u16 len)
3160 3161 3162
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
3163
	int i, err;
3164

3165
	key_count = __le16_to_cpu(cp->key_count);
3166 3167 3168 3169 3170

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
3171
		       len, expected_len);
3172
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
3173
				  MGMT_STATUS_INVALID_PARAMS);
3174 3175
	}

3176
	BT_DBG("%s key_count %u", hdev->name, key_count);
3177

3178 3179 3180
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

3181
		if (!ltk_is_valid(key))
3182 3183 3184 3185 3186
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

3200
		hci_add_ltk(hdev, &key->addr.bdaddr,
3201
			    bdaddr_to_le(key->addr.type),
3202 3203
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
3204 3205
	}

3206 3207 3208
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

3209 3210
	hci_dev_unlock(hdev);

3211
	return err;
3212 3213
}

3214
static const struct mgmt_handler {
3215 3216
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
3217 3218
	bool var_len;
	size_t data_len;
3219 3220
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
3260
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
3261 3262 3263
};


3264 3265
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
3266 3267
	void *buf;
	u8 *cp;
3268
	struct mgmt_hdr *hdr;
3269
	u16 opcode, index, len;
3270
	struct hci_dev *hdev = NULL;
3271
	const struct mgmt_handler *handler;
3272 3273 3274 3275 3276 3277 3278
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

3279
	buf = kmalloc(msglen, GFP_KERNEL);
3280 3281 3282 3283 3284 3285 3286 3287
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

3288
	hdr = buf;
3289 3290 3291
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
3292 3293 3294 3295 3296 3297

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

3298
	if (index != MGMT_INDEX_NONE) {
3299 3300 3301
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
3302
					 MGMT_STATUS_INVALID_INDEX);
3303 3304 3305 3306
			goto done;
		}
	}

3307
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
3308
	    mgmt_handlers[opcode].func == NULL) {
3309
		BT_DBG("Unknown op %u", opcode);
3310
		err = cmd_status(sk, index, opcode,
3311
				 MGMT_STATUS_UNKNOWN_COMMAND);
3312 3313 3314 3315
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
3316
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
3317
		err = cmd_status(sk, index, opcode,
3318
				 MGMT_STATUS_INVALID_INDEX);
3319
		goto done;
3320 3321
	}

3322 3323 3324
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
3325
	    (!handler->var_len && len != handler->data_len)) {
3326
		err = cmd_status(sk, index, opcode,
3327
				 MGMT_STATUS_INVALID_PARAMS);
3328 3329 3330
		goto done;
	}

3331 3332 3333 3334 3335
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

3336
	err = handler->func(sk, hdev, cp, len);
3337 3338 3339
	if (err < 0)
		goto done;

3340 3341 3342
	err = msglen;

done:
3343 3344 3345
	if (hdev)
		hci_dev_put(hdev);

3346 3347 3348
	kfree(buf);
	return err;
}
3349

3350 3351 3352 3353 3354 3355 3356 3357
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

3358
int mgmt_index_added(struct hci_dev *hdev)
3359
{
3360 3361 3362
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3363
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
3364 3365
}

3366
int mgmt_index_removed(struct hci_dev *hdev)
3367
{
3368
	u8 status = MGMT_STATUS_INVALID_INDEX;
3369

3370 3371 3372
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3373
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3374

3375
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
3376 3377
}

3378
struct cmd_lookup {
3379
	struct sock *sk;
3380
	struct hci_dev *hdev;
3381
	u8 mgmt_status;
3382 3383
};

3384
static void settings_rsp(struct pending_cmd *cmd, void *data)
3385
{
3386
	struct cmd_lookup *match = data;
3387

3388
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
3389 3390 3391 3392 3393 3394 3395 3396 3397

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
3398
}
3399

3400
static void set_bredr_scan(struct hci_request *req)
3401
{
3402
	struct hci_dev *hdev = req->hdev;
3403 3404
	u8 scan = 0;

3405 3406 3407 3408 3409 3410
	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

3411 3412 3413 3414 3415
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

3416 3417
	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3418 3419
}

3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

3438
static int powered_update_hci(struct hci_dev *hdev)
3439
{
3440
	struct hci_request req;
3441
	u8 link_sec;
3442

3443 3444
	hci_req_init(&req, hdev);

3445 3446 3447
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
3448

3449
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
3450
	}
3451

3452 3453
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
3454
		struct hci_cp_write_le_host_supported cp;
3455

3456 3457
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
3458

3459 3460 3461 3462 3463
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
3464 3465
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
3466
	}
3467

3468 3469
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
3470 3471
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
3472

3473
	if (lmp_bredr_capable(hdev)) {
3474 3475
		set_bredr_scan(&req);
		update_class(&req);
3476
		update_name(&req);
3477
		update_eir(&req);
3478
	}
3479

3480
	return hci_req_run(&req, powered_complete);
3481
}
3482

3483 3484 3485
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
3486 3487
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
3488
	int err;
3489

3490 3491 3492 3493
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
3494 3495
		if (powered_update_hci(hdev) == 0)
			return 0;
3496

3497 3498 3499
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
3500 3501
	}

3502 3503 3504 3505 3506 3507 3508 3509
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
3510
	err = new_settings(hdev, match.sk);
3511 3512 3513 3514

	if (match.sk)
		sock_put(match.sk);

3515
	return err;
3516
}
3517

3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538
int mgmt_set_powered_failed(struct hci_dev *hdev, int err)
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
		return -ENOENT;

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

	err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);

	mgmt_pending_remove(cmd);

	return err;
}

3539
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3540
{
3541
	struct cmd_lookup match = { NULL, hdev };
3542 3543
	bool changed = false;
	int err = 0;
3544

3545 3546 3547 3548 3549 3550 3551
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3552

3553
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3554
			     &match);
3555

3556 3557
	if (changed)
		err = new_settings(hdev, match.sk);
3558

3559 3560 3561
	if (match.sk)
		sock_put(match.sk);

3562
	return err;
3563
}
3564

3565
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3566
{
3567
	struct pending_cmd *cmd;
3568 3569
	bool changed = false;
	int err = 0;
3570

3571 3572 3573 3574 3575 3576 3577
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3578

3579
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
3580

3581
	if (changed)
3582
		err = new_settings(hdev, cmd ? cmd->sk : NULL);
3583

3584
	return err;
3585
}
3586

3587
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3588
{
3589 3590
	u8 mgmt_err = mgmt_status(status);

3591
	if (scan & SCAN_PAGE)
3592
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3593
				     cmd_status_rsp, &mgmt_err);
3594 3595

	if (scan & SCAN_INQUIRY)
3596
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3597
				     cmd_status_rsp, &mgmt_err);
3598 3599 3600 3601

	return 0;
}

3602 3603
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3604
{
3605
	struct mgmt_ev_new_link_key ev;
3606

3607
	memset(&ev, 0, sizeof(ev));
3608

3609
	ev.store_hint = persistent;
3610
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3611
	ev.key.addr.type = BDADDR_BREDR;
3612
	ev.key.type = key->type;
3613
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3614
	ev.key.pin_len = key->pin_len;
3615

3616
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3617
}
3618

3619 3620 3621 3622 3623 3624 3625 3626
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3627
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
3628 3629 3630 3631 3632 3633 3634 3635 3636 3637
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

3638 3639
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
3640 3641
}

3642
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3643 3644
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
3645
{
3646 3647 3648
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
3649

3650
	bacpy(&ev->addr.bdaddr, bdaddr);
3651
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3652

3653
	ev->flags = __cpu_to_le32(flags);
3654

3655 3656
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
3657
					  name, name_len);
3658 3659

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
3660
		eir_len = eir_append_data(ev->eir, eir_len,
3661
					  EIR_CLASS_OF_DEV, dev_class, 3);
3662

3663
	ev->eir_len = cpu_to_le16(eir_len);
3664 3665

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
3666
			  sizeof(*ev) + eir_len, NULL);
3667 3668
}

3669 3670
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
3671
	struct mgmt_cp_disconnect *cp = cmd->param;
3672
	struct sock **sk = data;
3673
	struct mgmt_rp_disconnect rp;
3674

3675 3676
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3677

3678
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
3679
		     sizeof(rp));
3680 3681 3682 3683

	*sk = cmd->sk;
	sock_hold(*sk);

3684
	mgmt_pending_remove(cmd);
3685 3686
}

3687
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
3688
{
3689
	struct hci_dev *hdev = data;
3690 3691
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
3692 3693

	memset(&rp, 0, sizeof(rp));
3694 3695
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3696

3697 3698
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

3699
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
3700 3701 3702 3703

	mgmt_pending_remove(cmd);
}

3704
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
3705
			     u8 link_type, u8 addr_type, u8 reason)
3706
{
3707
	struct mgmt_ev_device_disconnected ev;
3708 3709 3710
	struct sock *sk = NULL;
	int err;

3711
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
3712

3713 3714 3715
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
3716

3717
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
3718
			 sk);
3719 3720

	if (sk)
3721
		sock_put(sk);
3722

3723
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
3724
			     hdev);
3725

3726 3727 3728
	return err;
}

3729
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
3730
			   u8 link_type, u8 addr_type, u8 status)
3731
{
3732
	struct mgmt_rp_disconnect rp;
3733 3734 3735
	struct pending_cmd *cmd;
	int err;

3736 3737 3738
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

3739
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
3740 3741 3742
	if (!cmd)
		return -ENOENT;

3743
	bacpy(&rp.addr.bdaddr, bdaddr);
3744
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3745

3746
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
3747
			   mgmt_status(status), &rp, sizeof(rp));
3748

3749
	mgmt_pending_remove(cmd);
3750 3751

	return err;
3752
}
3753

3754
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3755
			u8 addr_type, u8 status)
3756 3757 3758
{
	struct mgmt_ev_connect_failed ev;

3759
	bacpy(&ev.addr.bdaddr, bdaddr);
3760
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3761
	ev.status = mgmt_status(status);
3762

3763
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
3764
}
3765

3766
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
3767 3768 3769
{
	struct mgmt_ev_pin_code_request ev;

3770
	bacpy(&ev.addr.bdaddr, bdaddr);
3771
	ev.addr.type = BDADDR_BREDR;
3772
	ev.secure = secure;
3773

3774
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
3775
			  NULL);
3776 3777
}

3778
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3779
				 u8 status)
3780 3781
{
	struct pending_cmd *cmd;
3782
	struct mgmt_rp_pin_code_reply rp;
3783 3784
	int err;

3785
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
3786 3787 3788
	if (!cmd)
		return -ENOENT;

3789
	bacpy(&rp.addr.bdaddr, bdaddr);
3790
	rp.addr.type = BDADDR_BREDR;
3791

3792
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
3793
			   mgmt_status(status), &rp, sizeof(rp));
3794

3795
	mgmt_pending_remove(cmd);
3796 3797 3798 3799

	return err;
}

3800
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3801
				     u8 status)
3802 3803
{
	struct pending_cmd *cmd;
3804
	struct mgmt_rp_pin_code_reply rp;
3805 3806
	int err;

3807
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
3808 3809 3810
	if (!cmd)
		return -ENOENT;

3811
	bacpy(&rp.addr.bdaddr, bdaddr);
3812
	rp.addr.type = BDADDR_BREDR;
3813

3814
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
3815
			   mgmt_status(status), &rp, sizeof(rp));
3816

3817
	mgmt_pending_remove(cmd);
3818 3819 3820

	return err;
}
3821

3822
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3823 3824
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
3825 3826 3827
{
	struct mgmt_ev_user_confirm_request ev;

3828
	BT_DBG("%s", hdev->name);
3829

3830
	bacpy(&ev.addr.bdaddr, bdaddr);
3831
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3832
	ev.confirm_hint = confirm_hint;
3833
	ev.value = value;
3834

3835
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3836
			  NULL);
3837 3838
}

3839
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3840
			      u8 link_type, u8 addr_type)
3841 3842 3843 3844 3845
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3846
	bacpy(&ev.addr.bdaddr, bdaddr);
3847
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3848 3849

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
3850
			  NULL);
3851 3852
}

3853
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3854 3855
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
3856 3857 3858 3859 3860
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3861
	cmd = mgmt_pending_find(opcode, hdev);
3862 3863 3864
	if (!cmd)
		return -ENOENT;

3865
	bacpy(&rp.addr.bdaddr, bdaddr);
3866
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3867
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
3868
			   &rp, sizeof(rp));
3869

3870
	mgmt_pending_remove(cmd);
3871 3872 3873 3874

	return err;
}

3875
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3876
				     u8 link_type, u8 addr_type, u8 status)
3877
{
3878
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3879
					  status, MGMT_OP_USER_CONFIRM_REPLY);
3880 3881
}

3882
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3883
					 u8 link_type, u8 addr_type, u8 status)
3884
{
3885
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3886 3887
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
3888
}
3889

3890
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3891
				     u8 link_type, u8 addr_type, u8 status)
3892
{
3893
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3894
					  status, MGMT_OP_USER_PASSKEY_REPLY);
3895 3896
}

3897
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3898
					 u8 link_type, u8 addr_type, u8 status)
3899
{
3900
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3901 3902
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
3903 3904
}

3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

3921
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3922
		     u8 addr_type, u8 status)
3923 3924 3925
{
	struct mgmt_ev_auth_failed ev;

3926
	bacpy(&ev.addr.bdaddr, bdaddr);
3927
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3928
	ev.status = mgmt_status(status);
3929

3930
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3931
}
3932

3933 3934 3935
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
3936 3937
	bool changed = false;
	int err = 0;
3938 3939 3940 3941

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
3942
				     cmd_status_rsp, &mgmt_err);
3943 3944 3945
		return 0;
	}

3946 3947 3948 3949 3950 3951 3952 3953
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

3954
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
3955
			     &match);
3956

3957 3958
	if (changed)
		err = new_settings(hdev, match.sk);
3959 3960 3961 3962 3963 3964 3965

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3966
static void clear_eir(struct hci_request *req)
3967
{
3968
	struct hci_dev *hdev = req->hdev;
3969 3970
	struct hci_cp_write_eir cp;

3971
	if (!lmp_ext_inq_capable(hdev))
3972
		return;
3973

3974 3975
	memset(hdev->eir, 0, sizeof(hdev->eir));

3976 3977
	memset(&cp, 0, sizeof(cp));

3978
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
3979 3980
}

3981
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
3982 3983
{
	struct cmd_lookup match = { NULL, hdev };
3984
	struct hci_request req;
3985 3986
	bool changed = false;
	int err = 0;
3987 3988 3989

	if (status) {
		u8 mgmt_err = mgmt_status(status);
3990 3991

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
3992
						 &hdev->dev_flags))
3993 3994
			err = new_settings(hdev, NULL);

3995 3996
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
3997 3998 3999 4000 4001 4002 4003 4004 4005 4006

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
4007 4008 4009 4010
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

4011 4012
	if (changed)
		err = new_settings(hdev, match.sk);
4013

4014
	if (match.sk)
4015 4016
		sock_put(match.sk);

4017 4018
	hci_req_init(&req, hdev);

4019
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
4020
		update_eir(&req);
4021
	else
4022 4023 4024
		clear_eir(&req);

	hci_req_run(&req, NULL);
4025

4026 4027 4028
	return err;
}

4029
static void sk_lookup(struct pending_cmd *cmd, void *data)
4030 4031 4032 4033 4034 4035 4036 4037 4038
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

4039
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
4040
				   u8 status)
4041
{
4042 4043
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
4044

4045 4046 4047
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
4048 4049

	if (!status)
4050 4051
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
4052 4053 4054

	if (match.sk)
		sock_put(match.sk);
4055 4056 4057 4058

	return err;
}

4059
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
4060 4061
{
	struct mgmt_cp_set_local_name ev;
4062
	struct pending_cmd *cmd;
4063

4064 4065
	if (status)
		return 0;
4066 4067 4068

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
4069
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
4070

4071
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
4072 4073
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
4074

4075 4076 4077 4078 4079
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
			return 0;
4080
	}
4081

4082 4083
	return mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			  cmd ? cmd->sk : NULL);
4084
}
4085

4086
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
4087
					    u8 *randomizer, u8 status)
4088 4089 4090 4091
{
	struct pending_cmd *cmd;
	int err;

4092
	BT_DBG("%s status %u", hdev->name, status);
4093

4094
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
4095 4096 4097 4098
	if (!cmd)
		return -ENOENT;

	if (status) {
4099 4100
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
4101 4102 4103 4104 4105 4106
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

4107
		err = cmd_complete(cmd->sk, hdev->id,
4108 4109
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
4110 4111 4112 4113 4114 4115
	}

	mgmt_pending_remove(cmd);

	return err;
}
4116

4117 4118 4119 4120 4121 4122 4123 4124 4125 4126
int mgmt_le_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;
	int err = 0;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		if (enable && test_and_clear_bit(HCI_LE_ENABLED,
4127
						 &hdev->dev_flags))
4128
			err = new_settings(hdev, NULL);
4129

4130 4131
		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	if (changed)
		err = new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

4155
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4156 4157
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
4158
{
4159 4160
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
4161
	size_t ev_size;
4162

4163 4164
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
4165 4166
		return -EINVAL;

4167 4168
	memset(buf, 0, sizeof(buf));

4169
	bacpy(&ev->addr.bdaddr, bdaddr);
4170
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4171
	ev->rssi = rssi;
4172
	if (cfm_name)
4173
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
4174
	if (!ssp)
4175
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
4176

4177
	if (eir_len > 0)
4178
		memcpy(ev->eir, eir, eir_len);
4179

4180 4181
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
4182
					  dev_class, 3);
4183

4184
	ev->eir_len = cpu_to_le16(eir_len);
4185
	ev_size = sizeof(*ev) + eir_len;
4186

4187
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
4188
}
4189

4190
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4191
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
4192
{
4193 4194 4195
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
4196

4197
	ev = (struct mgmt_ev_device_found *) buf;
4198

4199 4200 4201
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
4202
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4203 4204 4205
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
4206
				  name_len);
4207

4208
	ev->eir_len = cpu_to_le16(eir_len);
4209

4210
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
4211
			  sizeof(*ev) + eir_len, NULL);
4212
}
4213

4214 4215 4216 4217 4218 4219 4220 4221 4222
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

4223
	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
4224
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
4225 4226 4227 4228 4229
	mgmt_pending_remove(cmd);

	return err;
}

4230
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
4231
{
4232
	struct mgmt_ev_discovering ev;
4233 4234
	struct pending_cmd *cmd;

4235 4236
	BT_DBG("%s discovering %u", hdev->name, discovering);

4237
	if (discovering)
4238
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
4239
	else
4240
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
4241 4242

	if (cmd != NULL) {
4243 4244
		u8 type = hdev->discovery.type;

4245 4246
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
4247 4248 4249
		mgmt_pending_remove(cmd);
	}

4250 4251 4252 4253 4254
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
4255
}
4256

4257
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4258 4259 4260 4261
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

4262
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
4263

4264 4265
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4266

4267
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
4268
			  cmd ? cmd->sk : NULL);
4269 4270
}

4271
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4272 4273 4274 4275
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

4276
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
4277

4278 4279
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4280

4281
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
4282
			  cmd ? cmd->sk : NULL);
4283
}
4284 4285 4286

module_param(enable_hs, bool, 0644);
MODULE_PARM_DESC(enable_hs, "Enable High Speed support");