mgmt.c 76.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2010  Nokia Corporation

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

25
#include <linux/kernel.h>
26
#include <linux/uaccess.h>
27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36 37
#define MGMT_VERSION	0
#define MGMT_REVISION	1

38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
};

101 102 103 104 105 106 107 108 109
/*
 * These LE scan and inquiry parameters were chosen according to LE General
 * Discovery Procedure specification.
 */
#define LE_SCAN_TYPE			0x01
#define LE_SCAN_WIN			0x12
#define LE_SCAN_INT			0x12
#define LE_SCAN_TIMEOUT_LE_ONLY		10240	/* TGAP(gen_disc_scan_min) */

A
Andre Guedes 已提交
110
#define INQUIRY_LEN_BREDR		0x08	/* TGAP(100) */
A
Andre Guedes 已提交
111

112 113
#define SERVICE_CACHE_TIMEOUT (5 * 1000)

114 115
struct pending_cmd {
	struct list_head list;
116
	u16 opcode;
117
	int index;
118
	void *param;
119
	struct sock *sk;
120
	void *user_data;
121 122
};

123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

196
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
197 198 199 200
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
201
	int err;
202

203
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
204 205 206 207 208 209 210 211

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
212
	hdr->index = cpu_to_le16(index);
213 214 215 216 217 218
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

219 220
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
221 222
		kfree_skb(skb);

223
	return err;
224 225
}

226 227
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, void *rp,
								size_t rp_len)
228 229 230 231
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
232
	int err;
233 234 235

	BT_DBG("sock %p", sk);

236
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
237 238 239 240 241
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

242
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
243
	hdr->index = cpu_to_le16(index);
244
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
245

246 247
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
248 249 250

	if (rp)
		memcpy(ev->data, rp, rp_len);
251

252 253
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
254 255
		kfree_skb(skb);

256
	return err;;
257 258
}

259 260 261 262 263 264 265 266 267
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

268 269
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, &rp,
								sizeof(rp));
270 271
}

272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304
static int read_commands(struct sock *sk)
{
	struct mgmt_rp_read_commands *rp;
	u16 num_commands = ARRAY_SIZE(mgmt_commands);
	u16 num_events = ARRAY_SIZE(mgmt_events);
	u16 *opcode;
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

	put_unaligned_le16(num_commands, &rp->num_commands);
	put_unaligned_le16(num_events, &rp->num_events);

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, rp,
								rp_size);
	kfree(rp);

	return err;
}

305 306 307 308
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
309
	struct hci_dev *d;
310
	size_t rp_len;
311
	u16 count;
312
	int i, err;
313 314 315 316 317 318 319 320 321 322

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

323 324 325
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
326
		read_unlock(&hci_dev_list_lock);
327
		return -ENOMEM;
328
	}
329 330 331 332

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
333
	list_for_each_entry(d, &hci_dev_list, list) {
334
		if (test_and_clear_bit(HCI_AUTO_OFF, &d->dev_flags))
335
			cancel_delayed_work(&d->power_off);
336

337
		if (test_bit(HCI_SETUP, &d->dev_flags))
338 339
			continue;

340 341 342 343 344 345
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

346 347
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, rp,
									rp_len);
348

349 350 351
	kfree(rp);

	return err;
352 353
}

354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_FAST_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
	settings |= MGMT_SETTING_PAIRABLE;

	if (hdev->features[6] & LMP_SIMPLE_PAIR)
		settings |= MGMT_SETTING_SSP;

	if (!(hdev->features[4] & LMP_NO_BREDR)) {
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

	if (hdev->features[4] & LMP_LE)
		settings |= MGMT_SETTING_LE;

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	if (test_bit(HCI_UP, &hdev->flags))
		settings |= MGMT_SETTING_POWERED;
	else
		return settings;

	if (test_bit(HCI_PSCAN, &hdev->flags))
		settings |= MGMT_SETTING_CONNECTABLE;

	if (test_bit(HCI_ISCAN, &hdev->flags))
		settings |= MGMT_SETTING_DISCOVERABLE;

393
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
394 395 396 397 398
		settings |= MGMT_SETTING_PAIRABLE;

	if (!(hdev->features[4] & LMP_NO_BREDR))
		settings |= MGMT_SETTING_BREDR;

A
Andre Guedes 已提交
399
	if (hdev->host_features[0] & LMP_HOST_LE)
400 401 402 403 404
		settings |= MGMT_SETTING_LE;

	if (test_bit(HCI_AUTH, &hdev->flags))
		settings |= MGMT_SETTING_LINK_SECURITY;

405
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
406 407 408 409 410
		settings |= MGMT_SETTING_SSP;

	return settings;
}

411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523
#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

524
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
525 526
		return 0;

527
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];

	BT_DBG("%s", hdev->name);

559
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
560 561 562 563 564 565 566 567 568 569 570 571
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
}

572 573 574 575 576
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
							service_cache.work);

577
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
578 579 580 581 582 583 584 585 586 587 588 589
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

static void mgmt_init_hdev(struct hci_dev *hdev)
{
590
	if (!test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
591 592
		INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);

593
	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
594 595 596 597
		schedule_delayed_work(&hdev->service_cache,
				msecs_to_jiffies(SERVICE_CACHE_TIMEOUT));
}

598
static int read_controller_info(struct sock *sk, u16 index)
599
{
600
	struct mgmt_rp_read_info rp;
601
	struct hci_dev *hdev;
602

603
	BT_DBG("sock %p hci%u", sk, index);
604

605
	hdev = hci_dev_get(index);
606
	if (!hdev)
607 608
		return cmd_status(sk, index, MGMT_OP_READ_INFO,
						MGMT_STATUS_INVALID_PARAMS);
609

610
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags))
611
		cancel_delayed_work_sync(&hdev->power_off);
612

613
	hci_dev_lock(hdev);
614

615 616
	if (test_and_clear_bit(HCI_PI_MGMT_INIT, &hci_pi(sk)->flags))
		mgmt_init_hdev(hdev);
617

618 619
	memset(&rp, 0, sizeof(rp));

620
	bacpy(&rp.bdaddr, &hdev->bdaddr);
621

622
	rp.version = hdev->hci_ver;
623

624 625 626 627
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
628

629
	memcpy(rp.dev_class, hdev->dev_class, 3);
630

631 632
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));

633
	hci_dev_unlock(hdev);
634
	hci_dev_put(hdev);
635

636
	return cmd_complete(sk, index, MGMT_OP_READ_INFO, &rp, sizeof(rp));
637 638
}

639 640 641
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
642
	kfree(cmd->param);
643 644 645
	kfree(cmd);
}

646
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
647 648
							struct hci_dev *hdev,
							void *data, u16 len)
649 650 651 652 653
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
654
		return NULL;
655 656

	cmd->opcode = opcode;
657
	cmd->index = hdev->id;
658

659 660
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
661
		kfree(cmd);
662
		return NULL;
663 664
	}

665 666
	if (data)
		memcpy(cmd->param, data, len);
667 668 669 670

	cmd->sk = sk;
	sock_hold(sk);

671
	list_add(&cmd->list, &hdev->mgmt_pending);
672

673
	return cmd;
674 675
}

676
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
677 678 679 680 681
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

682
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
683 684 685 686
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

687
		if (opcode > 0 && cmd->opcode != opcode)
688 689 690 691 692 693
			continue;

		cb(cmd, data);
	}
}

694
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
695
{
696
	struct pending_cmd *cmd;
697

698
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
699 700
		if (cmd->opcode == opcode)
			return cmd;
701 702 703 704 705
	}

	return NULL;
}

706
static void mgmt_pending_remove(struct pending_cmd *cmd)
707 708 709 710 711
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

712
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
713
{
714
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
715

716
	return cmd_complete(sk, hdev->id, opcode, &settings, sizeof(settings));
717 718
}

719
static int set_powered(struct sock *sk, u16 index, void *data, u16 len)
720
{
721
	struct mgmt_mode *cp = data;
722
	struct hci_dev *hdev;
723 724
	struct pending_cmd *cmd;
	int err, up;
725

726
	BT_DBG("request for hci%u", index);
727

728
	if (len != sizeof(*cp))
729 730
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
731

732
	hdev = hci_dev_get(index);
733
	if (!hdev)
734 735
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
736

737
	hci_dev_lock(hdev);
738 739

	up = test_bit(HCI_UP, &hdev->flags);
740
	if ((cp->val && up) || (!cp->val && !up)) {
741
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
742 743 744
		goto failed;
	}

745
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
746 747
		err = cmd_status(sk, index, MGMT_OP_SET_POWERED,
							MGMT_STATUS_BUSY);
748 749 750
		goto failed;
	}

751
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
752 753
	if (!cmd) {
		err = -ENOMEM;
754
		goto failed;
755
	}
756

757
	if (cp->val)
758
		schedule_work(&hdev->power_on);
759
	else
760
		schedule_work(&hdev->power_off.work);
761

762
	err = 0;
763 764

failed:
765
	hci_dev_unlock(hdev);
766
	hci_dev_put(hdev);
767
	return err;
768 769
}

770
static int set_discoverable(struct sock *sk, u16 index, void *data, u16 len)
771
{
772
	struct mgmt_cp_set_discoverable *cp = data;
773
	struct hci_dev *hdev;
774
	struct pending_cmd *cmd;
775 776 777
	u8 scan;
	int err;

778
	BT_DBG("request for hci%u", index);
779

780
	if (len != sizeof(*cp))
781 782
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
783

784
	hdev = hci_dev_get(index);
785
	if (!hdev)
786 787
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
788

789
	hci_dev_lock(hdev);
790 791

	if (!test_bit(HCI_UP, &hdev->flags)) {
792 793
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_NOT_POWERED);
794 795 796
		goto failed;
	}

797 798
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
799 800
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
							MGMT_STATUS_BUSY);
801 802 803
		goto failed;
	}

804
	if (cp->val == test_bit(HCI_ISCAN, &hdev->flags) &&
805
					test_bit(HCI_PSCAN, &hdev->flags)) {
806
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
807 808 809
		goto failed;
	}

810
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
811 812
	if (!cmd) {
		err = -ENOMEM;
813
		goto failed;
814
	}
815 816 817

	scan = SCAN_PAGE;

818
	if (cp->val)
819
		scan |= SCAN_INQUIRY;
820
	else
821
		cancel_delayed_work(&hdev->discov_off);
822 823 824

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
825
		mgmt_pending_remove(cmd);
826

827 828 829
	if (cp->val)
		hdev->discov_timeout = get_unaligned_le16(&cp->timeout);

830
failed:
831
	hci_dev_unlock(hdev);
832 833 834 835 836
	hci_dev_put(hdev);

	return err;
}

837
static int set_connectable(struct sock *sk, u16 index, void *data, u16 len)
838
{
839
	struct mgmt_mode *cp = data;
840
	struct hci_dev *hdev;
841
	struct pending_cmd *cmd;
842 843 844
	u8 scan;
	int err;

845
	BT_DBG("request for hci%u", index);
846

847
	if (len != sizeof(*cp))
848 849
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
850

851
	hdev = hci_dev_get(index);
852
	if (!hdev)
853 854
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
855

856
	hci_dev_lock(hdev);
857 858

	if (!test_bit(HCI_UP, &hdev->flags)) {
859 860
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_NOT_POWERED);
861 862 863
		goto failed;
	}

864 865
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
866 867
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
							MGMT_STATUS_BUSY);
868 869 870
		goto failed;
	}

871
	if (cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
872
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
873 874 875
		goto failed;
	}

876
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
877 878
	if (!cmd) {
		err = -ENOMEM;
879
		goto failed;
880
	}
881

882
	if (cp->val)
883 884 885 886 887 888
		scan = SCAN_PAGE;
	else
		scan = 0;

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
889
		mgmt_pending_remove(cmd);
890 891

failed:
892
	hci_dev_unlock(hdev);
893 894 895 896 897
	hci_dev_put(hdev);

	return err;
}

898 899
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
900 901 902 903 904 905 906 907 908 909 910 911
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	bt_cb(skb)->channel = HCI_CHANNEL_CONTROL;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
912 913 914 915
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
916 917
	hdr->len = cpu_to_le16(data_len);

918 919
	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);
920 921 922 923 924 925 926

	hci_send_to_sock(NULL, skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

927
static int set_pairable(struct sock *sk, u16 index, void *data, u16 len)
928
{
929
	struct mgmt_mode *cp = data;
930
	struct hci_dev *hdev;
931
	__le32 ev;
932 933
	int err;

934
	BT_DBG("request for hci%u", index);
935

936
	if (len != sizeof(*cp))
937 938
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
939

940
	hdev = hci_dev_get(index);
941
	if (!hdev)
942 943
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
944

945
	hci_dev_lock(hdev);
946 947

	if (cp->val)
948
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
949
	else
950
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
951

952
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
953 954 955
	if (err < 0)
		goto failed;

956
	ev = cpu_to_le32(get_current_settings(hdev));
957

958
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), sk);
959 960

failed:
961
	hci_dev_unlock(hdev);
962 963 964 965 966
	hci_dev_put(hdev);

	return err;
}

967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025
static int set_link_security(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	uint8_t val;
	int err;

	BT_DBG("request for hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_LINK_SECURITY,
						MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_LINK_SECURITY,
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_SET_LINK_SECURITY,
						MGMT_STATUS_NOT_POWERED);
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
		err = cmd_status(sk, index, MGMT_OP_SET_LINK_SECURITY,
							MGMT_STATUS_BUSY);
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083
static int set_ssp(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	uint8_t val;
	int err;

	BT_DBG("request for hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_SSP,
						MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_SSP,
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_SET_SSP,
						MGMT_STATUS_NOT_POWERED);
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
		err = cmd_status(sk, index, MGMT_OP_SET_SSP, MGMT_STATUS_BUSY);
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

1084
static int add_uuid(struct sock *sk, u16 index, void *data, u16 len)
1085
{
1086
	struct mgmt_cp_add_uuid *cp = data;
1087 1088 1089 1090
	struct hci_dev *hdev;
	struct bt_uuid *uuid;
	int err;

1091
	BT_DBG("request for hci%u", index);
1092

1093
	if (len != sizeof(*cp))
1094 1095
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
1096

1097
	hdev = hci_dev_get(index);
1098
	if (!hdev)
1099 1100
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
1101

1102
	hci_dev_lock(hdev);
1103 1104 1105 1106 1107 1108 1109 1110

	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1111
	uuid->svc_hint = cp->svc_hint;
1112 1113 1114

	list_add(&uuid->list, &hdev->uuids);

1115 1116 1117 1118
	err = update_class(hdev);
	if (err < 0)
		goto failed;

1119 1120 1121 1122
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

1123
	err = cmd_complete(sk, index, MGMT_OP_ADD_UUID, NULL, 0);
1124 1125

failed:
1126
	hci_dev_unlock(hdev);
1127 1128 1129 1130 1131
	hci_dev_put(hdev);

	return err;
}

1132
static int remove_uuid(struct sock *sk, u16 index, void *data, u16 len)
1133
{
1134
	struct mgmt_cp_remove_uuid *cp = data;
1135 1136 1137 1138 1139
	struct list_head *p, *n;
	struct hci_dev *hdev;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

1140
	BT_DBG("request for hci%u", index);
1141

1142
	if (len != sizeof(*cp))
1143 1144
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
1145

1146
	hdev = hci_dev_get(index);
1147
	if (!hdev)
1148 1149
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
1150

1151
	hci_dev_lock(hdev);
1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170

	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
		goto unlock;
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
1171 1172
		err = cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
1173 1174 1175
		goto unlock;
	}

1176 1177 1178 1179
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

1180 1181 1182 1183
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

1184
	err = cmd_complete(sk, index, MGMT_OP_REMOVE_UUID, NULL, 0);
1185 1186

unlock:
1187
	hci_dev_unlock(hdev);
1188 1189 1190 1191 1192
	hci_dev_put(hdev);

	return err;
}

1193
static int set_dev_class(struct sock *sk, u16 index, void *data, u16 len)
1194 1195
{
	struct hci_dev *hdev;
1196
	struct mgmt_cp_set_dev_class *cp = data;
1197 1198
	int err;

1199
	BT_DBG("request for hci%u", index);
1200

1201
	if (len != sizeof(*cp))
1202 1203
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1204

1205
	hdev = hci_dev_get(index);
1206
	if (!hdev)
1207 1208
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1209

1210
	hci_dev_lock(hdev);
1211 1212 1213 1214

	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1215
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1216 1217 1218
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1219
		update_eir(hdev);
1220
	}
1221

1222 1223 1224
	err = update_class(hdev);

	if (err == 0)
1225
		err = cmd_complete(sk, index, MGMT_OP_SET_DEV_CLASS, NULL, 0);
1226

1227
	hci_dev_unlock(hdev);
1228 1229 1230 1231 1232
	hci_dev_put(hdev);

	return err;
}

1233
static int load_link_keys(struct sock *sk, u16 index, void *data, u16 len)
1234 1235
{
	struct hci_dev *hdev;
1236
	struct mgmt_cp_load_link_keys *cp = data;
1237
	u16 key_count, expected_len;
1238
	int i;
1239

1240
	if (len < sizeof(*cp))
1241 1242
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1243

1244 1245
	key_count = get_unaligned_le16(&cp->key_count);

1246 1247
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1248
	if (expected_len != len) {
1249
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1250
							len, expected_len);
1251 1252
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1253 1254
	}

1255
	hdev = hci_dev_get(index);
1256
	if (!hdev)
1257 1258
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1259

1260
	BT_DBG("hci%u debug_keys %u key_count %u", index, cp->debug_keys,
1261 1262
								key_count);

1263
	hci_dev_lock(hdev);
1264 1265 1266

	hci_link_keys_clear(hdev);

1267
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1268 1269

	if (cp->debug_keys)
1270
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1271
	else
1272
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1273

1274
	for (i = 0; i < key_count; i++) {
1275
		struct mgmt_link_key_info *key = &cp->keys[i];
1276

1277
		hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type,
1278 1279 1280
								key->pin_len);
	}

1281 1282
	cmd_complete(sk, index, MGMT_OP_LOAD_LINK_KEYS, NULL, 0);

1283
	hci_dev_unlock(hdev);
1284 1285
	hci_dev_put(hdev);

1286
	return 0;
1287 1288
}

1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 addr_type, struct sock *skip_sk)
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
								skip_sk);
}

1301
static int unpair_device(struct sock *sk, u16 index, void *data, u16 len)
1302 1303
{
	struct hci_dev *hdev;
1304 1305
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1306 1307
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1308 1309 1310
	struct hci_conn *conn;
	int err;

1311
	if (len != sizeof(*cp))
1312
		return cmd_status(sk, index, MGMT_OP_UNPAIR_DEVICE,
1313
						MGMT_STATUS_INVALID_PARAMS);
1314

1315
	hdev = hci_dev_get(index);
1316
	if (!hdev)
1317
		return cmd_status(sk, index, MGMT_OP_UNPAIR_DEVICE,
1318
						MGMT_STATUS_INVALID_PARAMS);
1319

1320
	hci_dev_lock(hdev);
1321

1322
	memset(&rp, 0, sizeof(rp));
1323 1324
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1325

1326 1327 1328 1329
	if (cp->addr.type == MGMT_ADDR_BREDR)
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1330

1331
	if (err < 0) {
1332
		rp.status = MGMT_STATUS_NOT_PAIRED;
1333 1334 1335
		goto unlock;
	}

1336
	if (!test_bit(HCI_UP, &hdev->flags) || !cp->disconnect) {
1337
		err = cmd_complete(sk, index, MGMT_OP_UNPAIR_DEVICE, &rp,
1338
								sizeof(rp));
1339
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1340
		goto unlock;
1341
	}
1342

1343 1344 1345 1346 1347 1348 1349
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
							&cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
							&cp->addr.bdaddr);

1350
	if (!conn) {
1351
		err = cmd_complete(sk, index, MGMT_OP_UNPAIR_DEVICE, &rp,
1352
								sizeof(rp));
1353
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1354 1355
		goto unlock;
	}
1356

1357 1358
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
								sizeof(*cp));
1359 1360 1361
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1362 1363
	}

1364 1365 1366 1367 1368 1369
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1370
unlock:
1371
	if (err < 0)
1372
		err = cmd_complete(sk, index, MGMT_OP_UNPAIR_DEVICE, &rp,
1373
								sizeof(rp));
1374
	hci_dev_unlock(hdev);
1375 1376 1377 1378 1379
	hci_dev_put(hdev);

	return err;
}

1380
static int disconnect(struct sock *sk, u16 index, void *data, u16 len)
1381 1382
{
	struct hci_dev *hdev;
1383
	struct mgmt_cp_disconnect *cp = data;
1384
	struct hci_cp_disconnect dc;
1385
	struct pending_cmd *cmd;
1386 1387 1388 1389 1390
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1391
	if (len != sizeof(*cp))
1392 1393
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1394

1395
	hdev = hci_dev_get(index);
1396
	if (!hdev)
1397 1398
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1399

1400
	hci_dev_lock(hdev);
1401 1402

	if (!test_bit(HCI_UP, &hdev->flags)) {
1403 1404
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_POWERED);
1405 1406 1407
		goto failed;
	}

1408
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1409 1410
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
							MGMT_STATUS_BUSY);
1411 1412 1413
		goto failed;
	}

1414 1415 1416 1417
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1418

1419
	if (!conn) {
1420 1421
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_CONNECTED);
1422 1423 1424
		goto failed;
	}

1425
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1426 1427
	if (!cmd) {
		err = -ENOMEM;
1428
		goto failed;
1429
	}
1430 1431 1432 1433 1434 1435

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1436
		mgmt_pending_remove(cmd);
1437 1438

failed:
1439
	hci_dev_unlock(hdev);
1440 1441 1442 1443 1444
	hci_dev_put(hdev);

	return err;
}

1445
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1446 1447 1448
{
	switch (link_type) {
	case LE_LINK:
1449 1450 1451 1452 1453 1454 1455 1456
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1457 1458 1459 1460 1461 1462 1463
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1464
static int get_connections(struct sock *sk, u16 index)
1465 1466 1467
{
	struct mgmt_rp_get_connections *rp;
	struct hci_dev *hdev;
1468
	struct hci_conn *c;
1469
	size_t rp_len;
1470
	u16 count;
1471 1472 1473 1474
	int i, err;

	BT_DBG("");

1475
	hdev = hci_dev_get(index);
1476
	if (!hdev)
1477 1478
		return cmd_status(sk, index, MGMT_OP_GET_CONNECTIONS,
						MGMT_STATUS_INVALID_PARAMS);
1479

1480
	hci_dev_lock(hdev);
1481 1482

	count = 0;
1483 1484 1485
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			count++;
1486 1487
	}

1488
	rp_len = sizeof(*rp) + (count * sizeof(struct mgmt_addr_info));
1489 1490
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1491 1492 1493 1494 1495 1496 1497
		err = -ENOMEM;
		goto unlock;
	}

	put_unaligned_le16(count, &rp->conn_count);

	i = 0;
1498
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1499 1500
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1501
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1502
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1503 1504 1505 1506 1507 1508 1509
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1510

1511
	err = cmd_complete(sk, index, MGMT_OP_GET_CONNECTIONS, rp, rp_len);
1512 1513

unlock:
1514
	kfree(rp);
1515
	hci_dev_unlock(hdev);
1516 1517 1518 1519
	hci_dev_put(hdev);
	return err;
}

1520 1521 1522 1523 1524 1525
static int send_pin_code_neg_reply(struct sock *sk, u16 index,
		struct hci_dev *hdev, struct mgmt_cp_pin_code_neg_reply *cp)
{
	struct pending_cmd *cmd;
	int err;

1526
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, sizeof(cp->bdaddr),
								&cp->bdaddr);
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1539
static int pin_code_reply(struct sock *sk, u16 index, void *data, u16 len)
1540 1541
{
	struct hci_dev *hdev;
1542
	struct hci_conn *conn;
1543
	struct mgmt_cp_pin_code_reply *cp = data;
1544
	struct mgmt_cp_pin_code_neg_reply ncp;
1545
	struct hci_cp_pin_code_reply reply;
1546
	struct pending_cmd *cmd;
1547 1548 1549 1550
	int err;

	BT_DBG("");

1551
	if (len != sizeof(*cp))
1552 1553
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1554

1555
	hdev = hci_dev_get(index);
1556
	if (!hdev)
1557 1558
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1559

1560
	hci_dev_lock(hdev);
1561 1562

	if (!test_bit(HCI_UP, &hdev->flags)) {
1563 1564
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_POWERED);
1565 1566 1567
		goto failed;
	}

1568 1569
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
	if (!conn) {
1570 1571
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_CONNECTED);
1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
		bacpy(&ncp.bdaddr, &cp->bdaddr);

		BT_ERR("PIN code is not 16 bytes long");

		err = send_pin_code_neg_reply(sk, index, hdev, &ncp);
		if (err >= 0)
			err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
1583
						MGMT_STATUS_INVALID_PARAMS);
1584 1585 1586 1587

		goto failed;
	}

1588 1589
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data,
									len);
1590 1591
	if (!cmd) {
		err = -ENOMEM;
1592
		goto failed;
1593
	}
1594 1595 1596

	bacpy(&reply.bdaddr, &cp->bdaddr);
	reply.pin_len = cp->pin_len;
1597
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1598 1599 1600

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1601
		mgmt_pending_remove(cmd);
1602 1603

failed:
1604
	hci_dev_unlock(hdev);
1605 1606 1607 1608 1609
	hci_dev_put(hdev);

	return err;
}

1610
static int pin_code_neg_reply(struct sock *sk, u16 index, void *data, u16 len)
1611 1612
{
	struct hci_dev *hdev;
1613
	struct mgmt_cp_pin_code_neg_reply *cp = data;
1614 1615 1616 1617
	int err;

	BT_DBG("");

1618 1619
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1620
						MGMT_STATUS_INVALID_PARAMS);
1621

1622
	hdev = hci_dev_get(index);
1623
	if (!hdev)
1624
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1625
						MGMT_STATUS_INVALID_PARAMS);
1626

1627
	hci_dev_lock(hdev);
1628 1629

	if (!test_bit(HCI_UP, &hdev->flags)) {
1630
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1631
						MGMT_STATUS_NOT_POWERED);
1632 1633 1634
		goto failed;
	}

1635
	err = send_pin_code_neg_reply(sk, index, hdev, cp);
1636 1637

failed:
1638
	hci_dev_unlock(hdev);
1639 1640 1641 1642 1643
	hci_dev_put(hdev);

	return err;
}

1644
static int set_io_capability(struct sock *sk, u16 index, void *data, u16 len)
1645 1646
{
	struct hci_dev *hdev;
1647
	struct mgmt_cp_set_io_capability *cp = data;
1648 1649 1650

	BT_DBG("");

1651
	if (len != sizeof(*cp))
1652 1653
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1654

1655
	hdev = hci_dev_get(index);
1656
	if (!hdev)
1657 1658
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1659

1660
	hci_dev_lock(hdev);
1661 1662 1663 1664

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1665
							hdev->io_capability);
1666

1667
	hci_dev_unlock(hdev);
1668 1669
	hci_dev_put(hdev);

1670
	return cmd_complete(sk, index, MGMT_OP_SET_IO_CAPABILITY, NULL, 0);
1671 1672
}

1673 1674 1675
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1676
	struct pending_cmd *cmd;
1677

1678
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1696 1697
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1698 1699
	rp.status = status;

1700
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, &rp, sizeof(rp));
1701 1702 1703 1704 1705 1706 1707 1708

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1709
	mgmt_pending_remove(cmd);
1710 1711 1712 1713 1714 1715 1716 1717 1718
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1719
	if (!cmd)
1720
		BT_DBG("Unable to find a pending command");
1721 1722
	else
		pairing_complete(cmd, status);
1723 1724
}

1725
static int pair_device(struct sock *sk, u16 index, void *data, u16 len)
1726 1727
{
	struct hci_dev *hdev;
1728
	struct mgmt_cp_pair_device *cp = data;
1729
	struct mgmt_rp_pair_device rp;
1730 1731 1732 1733 1734 1735 1736
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1737
	if (len != sizeof(*cp))
1738 1739
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1740

1741
	hdev = hci_dev_get(index);
1742
	if (!hdev)
1743 1744
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1745

1746
	hci_dev_lock(hdev);
1747

1748 1749
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1750
		auth_type = HCI_AT_DEDICATED_BONDING;
1751
	else
1752 1753
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1754 1755
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1756 1757
								auth_type);
	else
1758
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1759 1760
								auth_type);

1761 1762 1763 1764
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1765
	if (IS_ERR(conn)) {
1766 1767 1768
		rp.status = -PTR_ERR(conn);
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1769 1770 1771 1772 1773
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1774 1775 1776
		rp.status = EBUSY;
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1777 1778 1779
		goto unlock;
	}

1780
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1781 1782 1783 1784 1785 1786
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1787
	/* For LE, just connecting isn't a proof that the pairing finished */
1788
	if (cp->addr.type == MGMT_ADDR_BREDR)
1789 1790
		conn->connect_cfm_cb = pairing_complete_cb;

1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1803
	hci_dev_unlock(hdev);
1804 1805 1806 1807 1808
	hci_dev_put(hdev);

	return err;
}

1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856
static int cancel_pair_device(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
{
	struct mgmt_addr_info *addr = (void *) data;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	if (len != sizeof(*addr))
		return cmd_status(sk, index, MGMT_OP_CANCEL_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_CANCEL_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
		err = cmd_status(sk, index, MGMT_OP_CANCEL_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
		err = cmd_status(sk, index, MGMT_OP_CANCEL_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

	err = cmd_complete(sk, index, MGMT_OP_CANCEL_PAIR_DEVICE, addr,
								sizeof(*addr));
unlock:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

1857
static int user_pairing_resp(struct sock *sk, u16 index, bdaddr_t *bdaddr,
1858 1859
					u8 type, u16 mgmt_op, u16 hci_op,
					__le32 passkey)
1860 1861 1862
{
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
1863
	struct hci_conn *conn;
1864 1865
	int err;

1866
	hdev = hci_dev_get(index);
1867
	if (!hdev)
1868 1869
		return cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_INVALID_PARAMS);
1870

1871
	hci_dev_lock(hdev);
1872

1873
	if (!test_bit(HCI_UP, &hdev->flags)) {
1874 1875
		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_NOT_POWERED);
		goto done;
1876 1877
	}

1878 1879 1880
	if (type == MGMT_ADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	else
1881
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
1882 1883 1884

	if (!conn) {
		err = cmd_status(sk, index, mgmt_op,
1885
						MGMT_STATUS_NOT_CONNECTED);
1886 1887
		goto done;
	}
1888

1889
	if (type == MGMT_ADDR_LE_PUBLIC || type == MGMT_ADDR_LE_RANDOM) {
1890
		/* Continue with pairing via SMP */
1891 1892 1893 1894 1895 1896 1897 1898
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_SUCCESS);
		else
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_FAILED);
1899 1900 1901 1902

		goto done;
	}

1903
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
1904 1905
	if (!cmd) {
		err = -ENOMEM;
1906
		goto done;
1907 1908
	}

1909
	/* Continue with pairing via HCI */
1910 1911 1912 1913 1914 1915 1916 1917 1918
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

1919 1920
	if (err < 0)
		mgmt_pending_remove(cmd);
1921

1922
done:
1923
	hci_dev_unlock(hdev);
1924 1925 1926 1927 1928
	hci_dev_put(hdev);

	return err;
}

1929 1930
static int user_confirm_reply(struct sock *sk, u16 index, void *data, u16 len)
{
1931
	struct mgmt_cp_user_confirm_reply *cp = data;
1932 1933 1934 1935 1936 1937 1938

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

1939 1940 1941
	return user_pairing_resp(sk, index, &cp->addr.bdaddr, cp->addr.type,
						MGMT_OP_USER_CONFIRM_REPLY,
						HCI_OP_USER_CONFIRM_REPLY, 0);
1942 1943 1944 1945 1946
}

static int user_confirm_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
1947
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
1948 1949 1950 1951 1952 1953 1954

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_NEG_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

1955 1956 1957
	return user_pairing_resp(sk, index, &cp->addr.bdaddr, cp->addr.type,
					MGMT_OP_USER_CONFIRM_NEG_REPLY,
					HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
1958 1959
}

1960 1961
static int user_passkey_reply(struct sock *sk, u16 index, void *data, u16 len)
{
1962
	struct mgmt_cp_user_passkey_reply *cp = data;
1963 1964 1965 1966 1967 1968 1969

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_REPLY,
									EINVAL);

1970 1971 1972 1973
	return user_pairing_resp(sk, index, &cp->addr.bdaddr, cp->addr.type,
						MGMT_OP_USER_PASSKEY_REPLY,
						HCI_OP_USER_PASSKEY_REPLY,
						cp->passkey);
1974 1975 1976 1977 1978
}

static int user_passkey_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
1979
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
1980 1981 1982 1983 1984 1985 1986

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_NEG_REPLY,
									EINVAL);

1987 1988 1989
	return user_pairing_resp(sk, index, &cp->addr.bdaddr, cp->addr.type,
					MGMT_OP_USER_PASSKEY_NEG_REPLY,
					HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
1990 1991
}

1992
static int set_local_name(struct sock *sk, u16 index, void *data,
1993 1994
								u16 len)
{
1995
	struct mgmt_cp_set_local_name *mgmt_cp = data;
1996 1997 1998 1999 2000 2001 2002 2003
	struct hci_cp_write_local_name hci_cp;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
2004 2005
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
2006 2007 2008

	hdev = hci_dev_get(index);
	if (!hdev)
2009 2010
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
2011

2012
	hci_dev_lock(hdev);
2013

2014 2015
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data,
									len);
2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2028
	hci_dev_unlock(hdev);
2029 2030 2031 2032 2033
	hci_dev_put(hdev);

	return err;
}

2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044
static int read_local_oob_data(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
2045
						MGMT_STATUS_INVALID_PARAMS);
2046

2047
	hci_dev_lock(hdev);
2048 2049 2050

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
2051
						MGMT_STATUS_NOT_POWERED);
2052 2053 2054 2055 2056
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
2057
						MGMT_STATUS_NOT_SUPPORTED);
2058 2059 2060
		goto unlock;
	}

2061
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2062 2063
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
							MGMT_STATUS_BUSY);
2064 2065 2066
		goto unlock;
	}

2067
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2068 2069 2070 2071 2072 2073 2074 2075 2076 2077
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2078
	hci_dev_unlock(hdev);
2079 2080 2081 2082 2083
	hci_dev_put(hdev);

	return err;
}

2084 2085
static int add_remote_oob_data(struct sock *sk, u16 index, void *data,
								u16 len)
2086 2087
{
	struct hci_dev *hdev;
2088
	struct mgmt_cp_add_remote_oob_data *cp = data;
2089 2090 2091 2092 2093 2094
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
2095
						MGMT_STATUS_INVALID_PARAMS);
2096 2097 2098 2099

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
2100
						MGMT_STATUS_INVALID_PARAMS);
2101

2102
	hci_dev_lock(hdev);
2103

2104
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2105 2106
								cp->randomizer);
	if (err < 0)
2107 2108
		err = cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_FAILED);
2109 2110 2111 2112
	else
		err = cmd_complete(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA, NULL,
									0);

2113
	hci_dev_unlock(hdev);
2114 2115 2116 2117 2118 2119
	hci_dev_put(hdev);

	return err;
}

static int remove_remote_oob_data(struct sock *sk, u16 index,
2120
						void *data, u16 len)
2121 2122
{
	struct hci_dev *hdev;
2123
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2124 2125 2126 2127 2128 2129
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2130
						MGMT_STATUS_INVALID_PARAMS);
2131 2132 2133 2134

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2135
						MGMT_STATUS_INVALID_PARAMS);
2136

2137
	hci_dev_lock(hdev);
2138

2139
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2140 2141
	if (err < 0)
		err = cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2142
						MGMT_STATUS_INVALID_PARAMS);
2143 2144 2145 2146
	else
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
								NULL, 0);

2147
	hci_dev_unlock(hdev);
2148 2149 2150 2151 2152
	hci_dev_put(hdev);

	return err;
}

2153
static int start_discovery(struct sock *sk, u16 index,
2154
						void *data, u16 len)
2155
{
2156
	struct mgmt_cp_start_discovery *cp = data;
2157
	unsigned long discov_type = cp->type;
2158 2159 2160 2161 2162 2163
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

2164 2165 2166 2167
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);

2168 2169
	hdev = hci_dev_get(index);
	if (!hdev)
2170 2171
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
2172

2173
	hci_dev_lock(hdev);
2174

2175
	if (!test_bit(HCI_UP, &hdev->flags)) {
2176 2177
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_NOT_POWERED);
2178 2179 2180
		goto failed;
	}

2181 2182 2183 2184 2185 2186
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_BUSY);
		goto failed;
	}

2187
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2188 2189 2190 2191 2192
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2193 2194 2195 2196 2197 2198 2199 2200 2201
	if (test_bit(MGMT_ADDR_BREDR, &discov_type))
		err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
	else if (test_bit(MGMT_ADDR_LE_PUBLIC, &discov_type) &&
				test_bit(MGMT_ADDR_LE_RANDOM, &discov_type))
		err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
					LE_SCAN_WIN, LE_SCAN_TIMEOUT_LE_ONLY);
	else
		err = -EINVAL;

2202 2203
	if (err < 0)
		mgmt_pending_remove(cmd);
2204 2205
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2206 2207

failed:
2208
	hci_dev_unlock(hdev);
2209 2210 2211 2212 2213 2214 2215 2216 2217
	hci_dev_put(hdev);

	return err;
}

static int stop_discovery(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
2218 2219
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2220 2221 2222 2223 2224 2225
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
2226 2227
		return cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
2228

2229
	hci_dev_lock(hdev);
2230

2231
	if (!hci_discovery_active(hdev)) {
2232 2233
		err = cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_REJECTED);
2234
		goto unlock;
2235 2236
	}

2237
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2238 2239
	if (!cmd) {
		err = -ENOMEM;
2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257
		goto unlock;
	}

	if (hdev->discovery.state == DISCOVERY_INQUIRY) {
		err = hci_cancel_inquiry(hdev);
		if (err < 0)
			mgmt_pending_remove(cmd);
		else
			hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
		goto unlock;
	}

	e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_PENDING);
	if (!e) {
		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, index, MGMT_OP_STOP_DISCOVERY, NULL, 0);
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
		goto unlock;
2258 2259
	}

2260 2261 2262
	bacpy(&cp.bdaddr, &e->data.bdaddr);
	err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
							sizeof(cp), &cp);
2263 2264
	if (err < 0)
		mgmt_pending_remove(cmd);
2265 2266
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2267

2268
unlock:
2269
	hci_dev_unlock(hdev);
2270 2271 2272 2273 2274
	hci_dev_put(hdev);

	return err;
}

2275
static int confirm_name(struct sock *sk, u16 index, void *data, u16 len)
2276
{
2277
	struct mgmt_cp_confirm_name *cp = data;
2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294
	struct inquiry_entry *e;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

2295 2296 2297 2298 2299 2300
	if (!hci_discovery_active(hdev)) {
		err = cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
							MGMT_STATUS_FAILED);
		goto failed;
	}

2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->bdaddr);
	if (!e) {
		err = cmd_status (sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2313
		hci_inquiry_cache_update_resolve(hdev, e);
2314 2315 2316 2317 2318 2319 2320 2321 2322 2323
	}

	err = 0;

failed:
	hci_dev_unlock(hdev);

	return err;
}

2324
static int block_device(struct sock *sk, u16 index, void *data, u16 len)
2325 2326
{
	struct hci_dev *hdev;
2327
	struct mgmt_cp_block_device *cp = data;
2328 2329 2330 2331 2332 2333
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2334
						MGMT_STATUS_INVALID_PARAMS);
2335 2336 2337 2338

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2339
						MGMT_STATUS_INVALID_PARAMS);
2340

2341
	hci_dev_lock(hdev);
2342

2343
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2344
	if (err < 0)
2345 2346
		err = cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
							MGMT_STATUS_FAILED);
2347 2348 2349
	else
		err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE,
							NULL, 0);
2350

2351
	hci_dev_unlock(hdev);
2352 2353 2354 2355 2356
	hci_dev_put(hdev);

	return err;
}

2357
static int unblock_device(struct sock *sk, u16 index, void *data, u16 len)
2358 2359
{
	struct hci_dev *hdev;
2360
	struct mgmt_cp_unblock_device *cp = data;
2361 2362 2363 2364 2365 2366
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2367
						MGMT_STATUS_INVALID_PARAMS);
2368 2369 2370 2371

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2372
						MGMT_STATUS_INVALID_PARAMS);
2373

2374
	hci_dev_lock(hdev);
2375

2376
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
2377 2378

	if (err < 0)
2379 2380
		err = cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
2381 2382 2383
	else
		err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE,
								NULL, 0);
2384

2385
	hci_dev_unlock(hdev);
2386 2387 2388 2389 2390
	hci_dev_put(hdev);

	return err;
}

2391
static int set_fast_connectable(struct sock *sk, u16 index,
2392
					void *data, u16 len)
2393 2394
{
	struct hci_dev *hdev;
2395
	struct mgmt_mode *cp = data;
2396 2397 2398 2399 2400 2401 2402 2403
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2404
						MGMT_STATUS_INVALID_PARAMS);
2405 2406 2407 2408

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2409
						MGMT_STATUS_INVALID_PARAMS);
2410 2411 2412

	hci_dev_lock(hdev);

2413
	if (cp->val) {
2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2427
							MGMT_STATUS_FAILED);
2428 2429 2430 2431 2432 2433
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2434
							MGMT_STATUS_FAILED);
2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446
		goto done;
	}

	err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
							NULL, 0);
done:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500
static int load_long_term_keys(struct sock *sk, u16 index,
					void *cp_data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
	int i;

	if (len < sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_LOAD_LONG_TERM_KEYS,
								EINVAL);

	key_count = get_unaligned_le16(&cp->key_count);

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
							len, expected_len);
		return cmd_status(sk, index, MGMT_OP_LOAD_LONG_TERM_KEYS,
								EINVAL);
	}

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_LOAD_LONG_TERM_KEYS,
								ENODEV);

	BT_DBG("hci%u key_count %u", index, key_count);

	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

		hci_add_ltk(hdev, &key->addr.bdaddr, key->addr.type,
					type, 0, key->authenticated, key->val,
					key->enc_size, key->ediv, key->rand);
	}

	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return 0;
}

2501 2502
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
2503 2504
	void *buf;
	u8 *cp;
2505
	struct mgmt_hdr *hdr;
2506
	u16 opcode, index, len;
2507 2508 2509 2510 2511 2512 2513
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2514
	buf = kmalloc(msglen, GFP_KERNEL);
2515 2516 2517 2518 2519 2520 2521 2522
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

2523
	hdr = buf;
2524
	opcode = get_unaligned_le16(&hdr->opcode);
2525
	index = get_unaligned_le16(&hdr->index);
2526 2527 2528 2529 2530 2531 2532
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

2533 2534
	cp = buf + sizeof(*hdr);

2535
	switch (opcode) {
2536 2537 2538
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2539 2540 2541
	case MGMT_OP_READ_COMMANDS:
		err = read_commands(sk);
		break;
2542 2543 2544
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2545
	case MGMT_OP_READ_INFO:
2546
		err = read_controller_info(sk, index);
2547
		break;
2548
	case MGMT_OP_SET_POWERED:
2549
		err = set_powered(sk, index, cp, len);
2550
		break;
2551
	case MGMT_OP_SET_DISCOVERABLE:
2552
		err = set_discoverable(sk, index, cp, len);
2553
		break;
2554
	case MGMT_OP_SET_CONNECTABLE:
2555
		err = set_connectable(sk, index, cp, len);
2556
		break;
2557
	case MGMT_OP_SET_FAST_CONNECTABLE:
2558
		err = set_fast_connectable(sk, index, cp, len);
2559
		break;
2560
	case MGMT_OP_SET_PAIRABLE:
2561
		err = set_pairable(sk, index, cp, len);
2562
		break;
2563 2564 2565
	case MGMT_OP_SET_LINK_SECURITY:
		err = set_link_security(sk, index, cp, len);
		break;
2566 2567 2568
	case MGMT_OP_SET_SSP:
		err = set_ssp(sk, index, cp, len);
		break;
2569
	case MGMT_OP_ADD_UUID:
2570
		err = add_uuid(sk, index, cp, len);
2571 2572
		break;
	case MGMT_OP_REMOVE_UUID:
2573
		err = remove_uuid(sk, index, cp, len);
2574
		break;
2575
	case MGMT_OP_SET_DEV_CLASS:
2576
		err = set_dev_class(sk, index, cp, len);
2577
		break;
2578
	case MGMT_OP_LOAD_LINK_KEYS:
2579
		err = load_link_keys(sk, index, cp, len);
2580
		break;
2581
	case MGMT_OP_DISCONNECT:
2582
		err = disconnect(sk, index, cp, len);
2583
		break;
2584
	case MGMT_OP_GET_CONNECTIONS:
2585
		err = get_connections(sk, index);
2586
		break;
2587
	case MGMT_OP_PIN_CODE_REPLY:
2588
		err = pin_code_reply(sk, index, cp, len);
2589 2590
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2591
		err = pin_code_neg_reply(sk, index, cp, len);
2592
		break;
2593
	case MGMT_OP_SET_IO_CAPABILITY:
2594
		err = set_io_capability(sk, index, cp, len);
2595
		break;
2596
	case MGMT_OP_PAIR_DEVICE:
2597
		err = pair_device(sk, index, cp, len);
2598
		break;
2599 2600 2601
	case MGMT_OP_CANCEL_PAIR_DEVICE:
		err = cancel_pair_device(sk, index, buf + sizeof(*hdr), len);
		break;
2602 2603 2604
	case MGMT_OP_UNPAIR_DEVICE:
		err = unpair_device(sk, index, cp, len);
		break;
2605
	case MGMT_OP_USER_CONFIRM_REPLY:
2606
		err = user_confirm_reply(sk, index, cp, len);
2607 2608
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2609
		err = user_confirm_neg_reply(sk, index, cp, len);
2610
		break;
2611
	case MGMT_OP_USER_PASSKEY_REPLY:
2612
		err = user_passkey_reply(sk, index, cp, len);
2613 2614
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
2615
		err = user_passkey_neg_reply(sk, index, cp, len);
2616
		break;
2617
	case MGMT_OP_SET_LOCAL_NAME:
2618
		err = set_local_name(sk, index, cp, len);
2619
		break;
2620 2621 2622
	case MGMT_OP_READ_LOCAL_OOB_DATA:
		err = read_local_oob_data(sk, index);
		break;
2623
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
2624
		err = add_remote_oob_data(sk, index, cp, len);
2625 2626
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
2627
		err = remove_remote_oob_data(sk, index, cp, len);
2628
		break;
2629
	case MGMT_OP_START_DISCOVERY:
2630
		err = start_discovery(sk, index, cp, len);
2631 2632 2633 2634
		break;
	case MGMT_OP_STOP_DISCOVERY:
		err = stop_discovery(sk, index);
		break;
2635
	case MGMT_OP_CONFIRM_NAME:
2636
		err = confirm_name(sk, index, cp, len);
2637
		break;
2638
	case MGMT_OP_BLOCK_DEVICE:
2639
		err = block_device(sk, index, cp, len);
2640 2641
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
2642
		err = unblock_device(sk, index, cp, len);
2643
		break;
2644 2645 2646
	case MGMT_OP_LOAD_LONG_TERM_KEYS:
		err = load_long_term_keys(sk, index, cp, len);
		break;
2647 2648
	default:
		BT_DBG("Unknown op %u", opcode);
2649 2650
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2651 2652 2653
		break;
	}

2654 2655 2656
	if (err < 0)
		goto done;

2657 2658 2659 2660 2661 2662
	err = msglen;

done:
	kfree(buf);
	return err;
}
2663

2664 2665 2666 2667 2668 2669 2670 2671
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2672
int mgmt_index_added(struct hci_dev *hdev)
2673
{
2674
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2675 2676
}

2677
int mgmt_index_removed(struct hci_dev *hdev)
2678
{
2679 2680
	u8 status = ENODEV;

2681
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2682

2683
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2684 2685
}

2686
struct cmd_lookup {
2687
	struct sock *sk;
2688
	struct hci_dev *hdev;
2689 2690
};

2691
static void settings_rsp(struct pending_cmd *cmd, void *data)
2692
{
2693
	struct cmd_lookup *match = data;
2694

2695
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2696 2697 2698 2699 2700 2701 2702 2703 2704

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2705
}
2706

2707
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2708
{
2709
	struct cmd_lookup match = { NULL, hdev };
2710
	__le32 ev;
2711
	int err;
2712

2713
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2714

2715 2716
	if (!powered) {
		u8 status = ENETDOWN;
2717
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2718 2719
	}

2720
	ev = cpu_to_le32(get_current_settings(hdev));
2721

2722
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
2723
								match.sk);
2724 2725 2726 2727

	if (match.sk)
		sock_put(match.sk);

2728
	return err;
2729
}
2730

2731
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2732
{
2733
	struct cmd_lookup match = { NULL, hdev };
2734
	__le32 ev;
2735
	int err;
2736

2737
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp, &match);
2738

2739
	ev = cpu_to_le32(get_current_settings(hdev));
2740

2741
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
2742
								match.sk);
2743 2744 2745
	if (match.sk)
		sock_put(match.sk);

2746
	return err;
2747
}
2748

2749
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2750
{
2751
	__le32 ev;
2752
	struct cmd_lookup match = { NULL, hdev };
2753
	int err;
2754

2755 2756
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
								&match);
2757

2758
	ev = cpu_to_le32(get_current_settings(hdev));
2759

2760
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);
2761 2762 2763 2764

	if (match.sk)
		sock_put(match.sk);

2765
	return err;
2766
}
2767

2768
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2769
{
2770 2771
	u8 mgmt_err = mgmt_status(status);

2772
	if (scan & SCAN_PAGE)
2773
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
2774
						cmd_status_rsp, &mgmt_err);
2775 2776

	if (scan & SCAN_INQUIRY)
2777
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
2778
						cmd_status_rsp, &mgmt_err);
2779 2780 2781 2782

	return 0;
}

2783 2784
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
2785
{
2786
	struct mgmt_ev_new_link_key ev;
2787

2788
	memset(&ev, 0, sizeof(ev));
2789

2790 2791 2792 2793 2794
	ev.store_hint = persistent;
	bacpy(&ev.key.bdaddr, &key->bdaddr);
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
2795

2796
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
2797
}
2798

2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
	ev.key.addr.type = key->bdaddr_type;
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev,
						&ev, sizeof(ev), NULL);
}

2822
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
2823 2824
					u8 addr_type, u8 *name, u8 name_len,
					u8 *dev_class)
2825
{
2826 2827 2828
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
2829

2830 2831
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
2832

2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
								name, name_len);

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
		eir_len = eir_append_data(&ev->eir[eir_len], eir_len,
					EIR_CLASS_OF_DEV, dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
						sizeof(*ev) + eir_len, NULL);
2845 2846
}

2847 2848
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
2849
	struct mgmt_cp_disconnect *cp = cmd->param;
2850
	struct sock **sk = data;
2851
	struct mgmt_rp_disconnect rp;
2852

2853 2854
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2855
	rp.status = 0;
2856

2857
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, &rp, sizeof(rp));
2858 2859 2860 2861

	*sk = cmd->sk;
	sock_hold(*sk);

2862
	mgmt_pending_remove(cmd);
2863 2864
}

2865
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
2866
{
2867
	struct hci_dev *hdev = data;
2868 2869
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
2870 2871

	memset(&rp, 0, sizeof(rp));
2872 2873
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2874

2875 2876 2877
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, &rp, sizeof(rp));
2878 2879 2880 2881

	mgmt_pending_remove(cmd);
}

2882 2883
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
2884
{
2885
	struct mgmt_addr_info ev;
2886 2887 2888
	struct sock *sk = NULL;
	int err;

2889
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
2890 2891

	bacpy(&ev.bdaddr, bdaddr);
2892
	ev.type = link_to_mgmt(link_type, addr_type);
2893

2894 2895
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
									sk);
2896 2897 2898 2899

	if (sk)
		sock_put(sk);

2900
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
2901
									hdev);
2902

2903 2904 2905
	return err;
}

2906 2907
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
2908
{
2909
	struct mgmt_rp_disconnect rp;
2910 2911 2912
	struct pending_cmd *cmd;
	int err;

2913
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
2914 2915 2916
	if (!cmd)
		return -ENOENT;

2917 2918 2919
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = link_to_mgmt(link_type, addr_type);
	rp.status = mgmt_status(status);
2920

2921
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
2922
							&rp, sizeof(rp));
2923

2924
	mgmt_pending_remove(cmd);
2925

2926 2927
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
									hdev);
2928
	return err;
2929
}
2930

2931 2932
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
2933 2934 2935
{
	struct mgmt_ev_connect_failed ev;

2936
	bacpy(&ev.addr.bdaddr, bdaddr);
2937
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2938
	ev.status = mgmt_status(status);
2939

2940
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
2941
}
2942

2943
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
2944 2945 2946 2947
{
	struct mgmt_ev_pin_code_request ev;

	bacpy(&ev.bdaddr, bdaddr);
2948
	ev.secure = secure;
2949

2950
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
2951
									NULL);
2952 2953
}

2954 2955
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2956 2957
{
	struct pending_cmd *cmd;
2958
	struct mgmt_rp_pin_code_reply rp;
2959 2960
	int err;

2961
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
2962 2963 2964
	if (!cmd)
		return -ENOENT;

2965
	bacpy(&rp.bdaddr, bdaddr);
2966
	rp.status = mgmt_status(status);
2967

2968
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, &rp,
2969
								sizeof(rp));
2970

2971
	mgmt_pending_remove(cmd);
2972 2973 2974 2975

	return err;
}

2976 2977
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2978 2979
{
	struct pending_cmd *cmd;
2980
	struct mgmt_rp_pin_code_reply rp;
2981 2982
	int err;

2983
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
2984 2985 2986
	if (!cmd)
		return -ENOENT;

2987
	bacpy(&rp.bdaddr, bdaddr);
2988
	rp.status = mgmt_status(status);
2989

2990
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY, &rp,
2991
								sizeof(rp));
2992

2993
	mgmt_pending_remove(cmd);
2994 2995 2996

	return err;
}
2997

2998
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
2999 3000
				u8 link_type, u8 addr_type, __le32 value,
				u8 confirm_hint)
3001 3002 3003
{
	struct mgmt_ev_user_confirm_request ev;

3004
	BT_DBG("%s", hdev->name);
3005

3006 3007
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3008
	ev.confirm_hint = confirm_hint;
3009 3010
	put_unaligned_le32(value, &ev.value);

3011
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3012
									NULL);
3013 3014
}

3015 3016
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
3017 3018 3019 3020 3021
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3022 3023
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3024 3025 3026 3027 3028

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

3029
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3030 3031
					u8 link_type, u8 addr_type, u8 status,
					u8 opcode)
3032 3033 3034 3035 3036
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3037
	cmd = mgmt_pending_find(opcode, hdev);
3038 3039 3040
	if (!cmd)
		return -ENOENT;

3041 3042
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = link_to_mgmt(link_type, addr_type);
3043
	rp.status = mgmt_status(status);
3044
	err = cmd_complete(cmd->sk, hdev->id, opcode, &rp, sizeof(rp));
3045

3046
	mgmt_pending_remove(cmd);
3047 3048 3049 3050

	return err;
}

3051
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3052
					u8 link_type, u8 addr_type, u8 status)
3053
{
3054 3055
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_CONFIRM_REPLY);
3056 3057
}

3058 3059
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
3060
{
3061 3062
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_CONFIRM_NEG_REPLY);
3063
}
3064

3065
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3066
					u8 link_type, u8 addr_type, u8 status)
3067
{
3068 3069
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_PASSKEY_REPLY);
3070 3071
}

3072 3073
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
3074
{
3075 3076
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_PASSKEY_NEG_REPLY);
3077 3078
}

3079 3080
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
3081 3082 3083
{
	struct mgmt_ev_auth_failed ev;

3084 3085
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3086
	ev.status = mgmt_status(status);
3087

3088
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3089
}
3090

3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	__le32 ev;
	int err;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
						cmd_status_rsp, &mgmt_err);
		return 0;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
								&match);

	ev = cpu_to_le32(get_current_settings(hdev));
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	__le32 ev;
	int err;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev,
						cmd_status_rsp, &mgmt_err);
		return 0;
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

	ev = cpu_to_le32(get_current_settings(hdev));
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3140
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
3141 3142 3143 3144 3145 3146 3147 3148
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
	int err;

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

3149
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
3150 3151 3152 3153
	if (!cmd)
		goto send_event;

	if (status) {
3154
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
3155
							mgmt_status(status));
3156 3157 3158
		goto failed;
	}

3159
	update_eir(hdev);
3160

3161
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, &ev,
3162 3163 3164 3165 3166
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
3167
	err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
3168 3169 3170 3171 3172 3173 3174
							cmd ? cmd->sk : NULL);

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
3175

3176 3177
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
3178 3179 3180 3181
{
	struct pending_cmd *cmd;
	int err;

3182
	BT_DBG("%s status %u", hdev->name, status);
3183

3184
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
3185 3186 3187 3188
	if (!cmd)
		return -ENOENT;

	if (status) {
3189
		err = cmd_status(cmd->sk, hdev->id,
3190 3191
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
3192 3193 3194 3195 3196 3197
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

3198 3199 3200
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
						&rp, sizeof(rp));
3201 3202 3203 3204 3205 3206
	}

	mgmt_pending_remove(cmd);

	return err;
}
3207

3208
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3209
				u8 addr_type, u8 *dev_class, s8 rssi,
3210
				u8 cfm_name, u8 *eir, u16 eir_len)
3211
{
3212 3213
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
3214
	size_t ev_size;
3215

3216 3217
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
3218 3219
		return -EINVAL;

3220 3221
	memset(buf, 0, sizeof(buf));

3222 3223 3224 3225
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;
	ev->confirm_name = cfm_name;
3226

3227
	if (eir_len > 0)
3228
		memcpy(ev->eir, eir, eir_len);
3229

3230 3231 3232 3233 3234 3235 3236
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
								dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	ev_size = sizeof(*ev) + eir_len;
3237

3238
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
3239
}
3240

3241 3242
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
				u8 addr_type, s8 rssi, u8 *name, u8 name_len)
3243
{
3244 3245 3246
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
3247

3248
	ev = (struct mgmt_ev_device_found *) buf;
3249

3250 3251 3252 3253 3254 3255 3256 3257 3258 3259
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
								name_len);

	put_unaligned_le16(eir_len, &ev->eir_len);
3260

3261 3262
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
						sizeof(*ev) + eir_len, NULL);
3263
}
3264

3265
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
3266 3267 3268 3269
{
	struct pending_cmd *cmd;
	int err;

3270 3271
	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

3272
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3273 3274 3275
	if (!cmd)
		return -ENOENT;

3276
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
3277 3278 3279 3280 3281
	mgmt_pending_remove(cmd);

	return err;
}

3282 3283 3284 3285 3286 3287 3288 3289 3290
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

3291
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
3292 3293 3294 3295 3296
	mgmt_pending_remove(cmd);

	return err;
}

3297
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
3298
{
3299 3300
	struct pending_cmd *cmd;

3301 3302
	BT_DBG("%s discovering %u", hdev->name, discovering);

3303
	if (discovering)
3304
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3305
	else
3306
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3307 3308

	if (cmd != NULL) {
3309
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, NULL, 0);
3310 3311 3312
		mgmt_pending_remove(cmd);
	}

3313
	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &discovering,
3314 3315
						sizeof(discovering), NULL);
}
3316

3317
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3318 3319 3320 3321
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

3322
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
3323

3324 3325
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3326

3327 3328
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
3329 3330
}

3331
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3332 3333 3334 3335
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

3336
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
3337

3338 3339
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3340

3341 3342
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
3343
}