mgmt.c 65.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2010  Nokia Corporation

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

25
#include <linux/kernel.h>
26
#include <linux/uaccess.h>
27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36 37
#define MGMT_VERSION	0
#define MGMT_REVISION	1

A
Andre Guedes 已提交
38 39
#define INQUIRY_LEN_BREDR 0x08 /* TGAP(100) */

40 41
#define SERVICE_CACHE_TIMEOUT (5 * 1000)

42 43
struct pending_cmd {
	struct list_head list;
44
	u16 opcode;
45
	int index;
46
	void *param;
47
	struct sock *sk;
48
	void *user_data;
49 50
};

51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

124
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
125 126 127 128
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
129
	int err;
130

131
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
132 133 134 135 136 137 138 139

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
140
	hdr->index = cpu_to_le16(index);
141 142 143 144 145 146
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

147 148
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
149 150
		kfree_skb(skb);

151
	return err;
152 153
}

154 155
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, void *rp,
								size_t rp_len)
156 157 158 159
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
160
	int err;
161 162 163

	BT_DBG("sock %p", sk);

164
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
165 166 167 168 169
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

170
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
171
	hdr->index = cpu_to_le16(index);
172
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
173

174 175
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
176 177 178

	if (rp)
		memcpy(ev->data, rp, rp_len);
179

180 181
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
182 183
		kfree_skb(skb);

184
	return err;;
185 186
}

187 188 189 190 191 192 193 194 195
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

196 197
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, &rp,
								sizeof(rp));
198 199
}

200 201 202 203
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
204
	struct hci_dev *d;
205
	size_t rp_len;
206
	u16 count;
207
	int i, err;
208 209 210 211 212 213 214 215 216 217

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

218 219 220
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
221
		read_unlock(&hci_dev_list_lock);
222
		return -ENOMEM;
223
	}
224 225 226 227

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
228
	list_for_each_entry(d, &hci_dev_list, list) {
229
		if (test_and_clear_bit(HCI_AUTO_OFF, &d->dev_flags))
230
			cancel_delayed_work(&d->power_off);
231

232
		if (test_bit(HCI_SETUP, &d->dev_flags))
233 234
			continue;

235 236 237 238 239 240
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

241 242
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, rp,
									rp_len);
243

244 245 246
	kfree(rp);

	return err;
247 248
}

249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_FAST_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
	settings |= MGMT_SETTING_PAIRABLE;

	if (hdev->features[6] & LMP_SIMPLE_PAIR)
		settings |= MGMT_SETTING_SSP;

	if (!(hdev->features[4] & LMP_NO_BREDR)) {
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

	if (hdev->features[4] & LMP_LE)
		settings |= MGMT_SETTING_LE;

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	if (test_bit(HCI_UP, &hdev->flags))
		settings |= MGMT_SETTING_POWERED;
	else
		return settings;

	if (test_bit(HCI_PSCAN, &hdev->flags))
		settings |= MGMT_SETTING_CONNECTABLE;

	if (test_bit(HCI_ISCAN, &hdev->flags))
		settings |= MGMT_SETTING_DISCOVERABLE;

288
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
289 290 291 292 293
		settings |= MGMT_SETTING_PAIRABLE;

	if (!(hdev->features[4] & LMP_NO_BREDR))
		settings |= MGMT_SETTING_BREDR;

A
Andre Guedes 已提交
294
	if (hdev->host_features[0] & LMP_HOST_LE)
295 296 297 298 299 300 301 302 303 304 305
		settings |= MGMT_SETTING_LE;

	if (test_bit(HCI_AUTH, &hdev->flags))
		settings |= MGMT_SETTING_LINK_SECURITY;

	if (hdev->ssp_mode > 0)
		settings |= MGMT_SETTING_SSP;

	return settings;
}

306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421
#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

	if (hdev->ssp_mode == 0)
		return 0;

422
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];

	BT_DBG("%s", hdev->name);

454
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
455 456 457 458 459 460 461 462 463 464 465 466
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
}

467 468 469 470 471
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
							service_cache.work);

472
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
473 474 475 476 477 478 479 480 481 482 483 484
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

static void mgmt_init_hdev(struct hci_dev *hdev)
{
485
	if (!test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
486 487
		INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);

488
	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
489 490 491 492
		schedule_delayed_work(&hdev->service_cache,
				msecs_to_jiffies(SERVICE_CACHE_TIMEOUT));
}

493
static int read_controller_info(struct sock *sk, u16 index)
494
{
495
	struct mgmt_rp_read_info rp;
496
	struct hci_dev *hdev;
497

498
	BT_DBG("sock %p hci%u", sk, index);
499

500
	hdev = hci_dev_get(index);
501
	if (!hdev)
502 503
		return cmd_status(sk, index, MGMT_OP_READ_INFO,
						MGMT_STATUS_INVALID_PARAMS);
504

505
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags))
506
		cancel_delayed_work_sync(&hdev->power_off);
507

508
	hci_dev_lock(hdev);
509

510 511
	if (test_and_clear_bit(HCI_PI_MGMT_INIT, &hci_pi(sk)->flags))
		mgmt_init_hdev(hdev);
512

513 514
	memset(&rp, 0, sizeof(rp));

515
	bacpy(&rp.bdaddr, &hdev->bdaddr);
516

517
	rp.version = hdev->hci_ver;
518

519 520 521 522
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
523

524
	memcpy(rp.dev_class, hdev->dev_class, 3);
525

526 527
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));

528
	hci_dev_unlock(hdev);
529
	hci_dev_put(hdev);
530

531
	return cmd_complete(sk, index, MGMT_OP_READ_INFO, &rp, sizeof(rp));
532 533
}

534 535 536
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
537
	kfree(cmd->param);
538 539 540
	kfree(cmd);
}

541
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
542 543
							struct hci_dev *hdev,
							void *data, u16 len)
544 545 546 547 548
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
549
		return NULL;
550 551

	cmd->opcode = opcode;
552
	cmd->index = hdev->id;
553

554 555
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
556
		kfree(cmd);
557
		return NULL;
558 559
	}

560 561
	if (data)
		memcpy(cmd->param, data, len);
562 563 564 565

	cmd->sk = sk;
	sock_hold(sk);

566
	list_add(&cmd->list, &hdev->mgmt_pending);
567

568
	return cmd;
569 570
}

571
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
572 573 574 575 576
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

577
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
578 579 580 581
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

582
		if (opcode > 0 && cmd->opcode != opcode)
583 584 585 586 587 588
			continue;

		cb(cmd, data);
	}
}

589
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
590
{
591
	struct pending_cmd *cmd;
592

593
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
594 595
		if (cmd->opcode == opcode)
			return cmd;
596 597 598 599 600
	}

	return NULL;
}

601
static void mgmt_pending_remove(struct pending_cmd *cmd)
602 603 604 605 606
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

607
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
608
{
609
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
610

611
	return cmd_complete(sk, hdev->id, opcode, &settings, sizeof(settings));
612 613
}

614
static int set_powered(struct sock *sk, u16 index, unsigned char *data, u16 len)
615
{
616
	struct mgmt_mode *cp;
617
	struct hci_dev *hdev;
618 619
	struct pending_cmd *cmd;
	int err, up;
620 621 622

	cp = (void *) data;

623
	BT_DBG("request for hci%u", index);
624

625
	if (len != sizeof(*cp))
626 627
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
628

629
	hdev = hci_dev_get(index);
630
	if (!hdev)
631 632
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
633

634
	hci_dev_lock(hdev);
635 636

	up = test_bit(HCI_UP, &hdev->flags);
637
	if ((cp->val && up) || (!cp->val && !up)) {
638
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
639 640 641
		goto failed;
	}

642
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
643 644
		err = cmd_status(sk, index, MGMT_OP_SET_POWERED,
							MGMT_STATUS_BUSY);
645 646 647
		goto failed;
	}

648
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
649 650
	if (!cmd) {
		err = -ENOMEM;
651
		goto failed;
652
	}
653

654
	if (cp->val)
655
		schedule_work(&hdev->power_on);
656
	else
657
		schedule_work(&hdev->power_off.work);
658

659
	err = 0;
660 661

failed:
662
	hci_dev_unlock(hdev);
663
	hci_dev_put(hdev);
664
	return err;
665 666
}

667 668
static int set_discoverable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
669
{
670
	struct mgmt_cp_set_discoverable *cp;
671
	struct hci_dev *hdev;
672
	struct pending_cmd *cmd;
673 674 675 676 677
	u8 scan;
	int err;

	cp = (void *) data;

678
	BT_DBG("request for hci%u", index);
679

680
	if (len != sizeof(*cp))
681 682
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
683

684
	hdev = hci_dev_get(index);
685
	if (!hdev)
686 687
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
688

689
	hci_dev_lock(hdev);
690 691

	if (!test_bit(HCI_UP, &hdev->flags)) {
692 693
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_NOT_POWERED);
694 695 696
		goto failed;
	}

697 698
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
699 700
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
							MGMT_STATUS_BUSY);
701 702 703
		goto failed;
	}

704
	if (cp->val == test_bit(HCI_ISCAN, &hdev->flags) &&
705
					test_bit(HCI_PSCAN, &hdev->flags)) {
706
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
707 708 709
		goto failed;
	}

710
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
711 712
	if (!cmd) {
		err = -ENOMEM;
713
		goto failed;
714
	}
715 716 717

	scan = SCAN_PAGE;

718
	if (cp->val)
719
		scan |= SCAN_INQUIRY;
720
	else
721
		cancel_delayed_work(&hdev->discov_off);
722 723 724

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
725
		mgmt_pending_remove(cmd);
726

727 728 729
	if (cp->val)
		hdev->discov_timeout = get_unaligned_le16(&cp->timeout);

730
failed:
731
	hci_dev_unlock(hdev);
732 733 734 735 736
	hci_dev_put(hdev);

	return err;
}

737 738
static int set_connectable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
739
{
740
	struct mgmt_mode *cp;
741
	struct hci_dev *hdev;
742
	struct pending_cmd *cmd;
743 744 745 746 747
	u8 scan;
	int err;

	cp = (void *) data;

748
	BT_DBG("request for hci%u", index);
749

750
	if (len != sizeof(*cp))
751 752
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
753

754
	hdev = hci_dev_get(index);
755
	if (!hdev)
756 757
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
758

759
	hci_dev_lock(hdev);
760 761

	if (!test_bit(HCI_UP, &hdev->flags)) {
762 763
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_NOT_POWERED);
764 765 766
		goto failed;
	}

767 768
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
769 770
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
							MGMT_STATUS_BUSY);
771 772 773
		goto failed;
	}

774
	if (cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
775
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
776 777 778
		goto failed;
	}

779
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
780 781
	if (!cmd) {
		err = -ENOMEM;
782
		goto failed;
783
	}
784

785
	if (cp->val)
786 787 788 789 790 791
		scan = SCAN_PAGE;
	else
		scan = 0;

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
792
		mgmt_pending_remove(cmd);
793 794

failed:
795
	hci_dev_unlock(hdev);
796 797 798 799 800
	hci_dev_put(hdev);

	return err;
}

801 802
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
803 804 805 806 807 808 809 810 811 812 813 814
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	bt_cb(skb)->channel = HCI_CHANNEL_CONTROL;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
815 816 817 818
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
819 820
	hdr->len = cpu_to_le16(data_len);

821 822
	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);
823 824 825 826 827 828 829

	hci_send_to_sock(NULL, skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

830 831
static int set_pairable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
832
{
833
	struct mgmt_mode *cp;
834
	struct hci_dev *hdev;
835
	__le32 ev;
836 837 838 839
	int err;

	cp = (void *) data;

840
	BT_DBG("request for hci%u", index);
841

842
	if (len != sizeof(*cp))
843 844
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
845

846
	hdev = hci_dev_get(index);
847
	if (!hdev)
848 849
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
850

851
	hci_dev_lock(hdev);
852 853

	if (cp->val)
854
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
855
	else
856
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
857

858
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
859 860 861
	if (err < 0)
		goto failed;

862
	ev = cpu_to_le32(get_current_settings(hdev));
863

864
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), sk);
865 866

failed:
867
	hci_dev_unlock(hdev);
868 869 870 871 872
	hci_dev_put(hdev);

	return err;
}

873
static int add_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
874 875 876 877 878 879 880 881
{
	struct mgmt_cp_add_uuid *cp;
	struct hci_dev *hdev;
	struct bt_uuid *uuid;
	int err;

	cp = (void *) data;

882
	BT_DBG("request for hci%u", index);
883

884
	if (len != sizeof(*cp))
885 886
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
887

888
	hdev = hci_dev_get(index);
889
	if (!hdev)
890 891
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
892

893
	hci_dev_lock(hdev);
894 895 896 897 898 899 900 901

	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
902
	uuid->svc_hint = cp->svc_hint;
903 904 905

	list_add(&uuid->list, &hdev->uuids);

906 907 908 909
	err = update_class(hdev);
	if (err < 0)
		goto failed;

910 911 912 913
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

914
	err = cmd_complete(sk, index, MGMT_OP_ADD_UUID, NULL, 0);
915 916

failed:
917
	hci_dev_unlock(hdev);
918 919 920 921 922
	hci_dev_put(hdev);

	return err;
}

923
static int remove_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
924 925
{
	struct list_head *p, *n;
926
	struct mgmt_cp_remove_uuid *cp;
927 928 929 930 931 932
	struct hci_dev *hdev;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

	cp = (void *) data;

933
	BT_DBG("request for hci%u", index);
934

935
	if (len != sizeof(*cp))
936 937
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
938

939
	hdev = hci_dev_get(index);
940
	if (!hdev)
941 942
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
943

944
	hci_dev_lock(hdev);
945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963

	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
		goto unlock;
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
964 965
		err = cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
966 967 968
		goto unlock;
	}

969 970 971 972
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

973 974 975 976
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

977
	err = cmd_complete(sk, index, MGMT_OP_REMOVE_UUID, NULL, 0);
978 979

unlock:
980
	hci_dev_unlock(hdev);
981 982 983 984 985
	hci_dev_put(hdev);

	return err;
}

986 987
static int set_dev_class(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
988 989 990 991 992 993 994
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_dev_class *cp;
	int err;

	cp = (void *) data;

995
	BT_DBG("request for hci%u", index);
996

997
	if (len != sizeof(*cp))
998 999
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1000

1001
	hdev = hci_dev_get(index);
1002
	if (!hdev)
1003 1004
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1005

1006
	hci_dev_lock(hdev);
1007 1008 1009 1010

	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1011
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1012 1013 1014
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1015
		update_eir(hdev);
1016
	}
1017

1018 1019 1020
	err = update_class(hdev);

	if (err == 0)
1021
		err = cmd_complete(sk, index, MGMT_OP_SET_DEV_CLASS, NULL, 0);
1022

1023
	hci_dev_unlock(hdev);
1024 1025 1026 1027 1028
	hci_dev_put(hdev);

	return err;
}

1029 1030
static int load_link_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1031 1032
{
	struct hci_dev *hdev;
1033
	struct mgmt_cp_load_link_keys *cp;
1034
	u16 key_count, expected_len;
1035
	int i;
1036 1037

	cp = (void *) data;
1038 1039

	if (len < sizeof(*cp))
1040 1041
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1042

1043 1044
	key_count = get_unaligned_le16(&cp->key_count);

1045 1046
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1047
	if (expected_len != len) {
1048
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1049
							len, expected_len);
1050 1051
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1052 1053
	}

1054
	hdev = hci_dev_get(index);
1055
	if (!hdev)
1056 1057
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1058

1059
	BT_DBG("hci%u debug_keys %u key_count %u", index, cp->debug_keys,
1060 1061
								key_count);

1062
	hci_dev_lock(hdev);
1063 1064 1065

	hci_link_keys_clear(hdev);

1066
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1067 1068

	if (cp->debug_keys)
1069
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1070
	else
1071
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1072

1073
	for (i = 0; i < key_count; i++) {
1074
		struct mgmt_link_key_info *key = &cp->keys[i];
1075

1076
		hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type,
1077 1078 1079
								key->pin_len);
	}

1080 1081
	cmd_complete(sk, index, MGMT_OP_LOAD_LINK_KEYS, NULL, 0);

1082
	hci_dev_unlock(hdev);
1083 1084
	hci_dev_put(hdev);

1085
	return 0;
1086 1087
}

1088 1089
static int remove_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1090 1091
{
	struct hci_dev *hdev;
1092
	struct mgmt_cp_remove_keys *cp;
1093 1094 1095
	struct mgmt_rp_remove_keys rp;
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1096 1097 1098 1099 1100
	struct hci_conn *conn;
	int err;

	cp = (void *) data;

1101
	if (len != sizeof(*cp))
1102 1103
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1104

1105
	hdev = hci_dev_get(index);
1106
	if (!hdev)
1107 1108
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1109

1110
	hci_dev_lock(hdev);
1111

1112 1113
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
1114
	rp.status = MGMT_STATUS_FAILED;
1115

1116 1117
	err = hci_remove_link_key(hdev, &cp->bdaddr);
	if (err < 0) {
1118
		rp.status = MGMT_STATUS_NOT_PAIRED;
1119 1120 1121
		goto unlock;
	}

1122 1123 1124
	if (!test_bit(HCI_UP, &hdev->flags) || !cp->disconnect) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1125
		goto unlock;
1126
	}
1127 1128

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1129 1130 1131 1132 1133
	if (!conn) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
		goto unlock;
	}
1134

1135 1136 1137 1138
	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_KEYS, hdev, cp, sizeof(*cp));
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1139 1140
	}

1141 1142 1143 1144 1145 1146
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1147
unlock:
1148
	if (err < 0)
1149 1150
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1151
	hci_dev_unlock(hdev);
1152 1153 1154 1155 1156
	hci_dev_put(hdev);

	return err;
}

1157
static int disconnect(struct sock *sk, u16 index, unsigned char *data, u16 len)
1158 1159 1160 1161
{
	struct hci_dev *hdev;
	struct mgmt_cp_disconnect *cp;
	struct hci_cp_disconnect dc;
1162
	struct pending_cmd *cmd;
1163 1164 1165 1166 1167 1168 1169
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1170
	if (len != sizeof(*cp))
1171 1172
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1173

1174
	hdev = hci_dev_get(index);
1175
	if (!hdev)
1176 1177
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1178

1179
	hci_dev_lock(hdev);
1180 1181

	if (!test_bit(HCI_UP, &hdev->flags)) {
1182 1183
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_POWERED);
1184 1185 1186
		goto failed;
	}

1187
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1188 1189
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
							MGMT_STATUS_BUSY);
1190 1191 1192 1193
		goto failed;
	}

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1194 1195 1196
	if (!conn)
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->bdaddr);

1197
	if (!conn) {
1198 1199
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_CONNECTED);
1200 1201 1202
		goto failed;
	}

1203
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1204 1205
	if (!cmd) {
		err = -ENOMEM;
1206
		goto failed;
1207
	}
1208 1209 1210 1211 1212 1213

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1214
		mgmt_pending_remove(cmd);
1215 1216

failed:
1217
	hci_dev_unlock(hdev);
1218 1219 1220 1221 1222
	hci_dev_put(hdev);

	return err;
}

1223
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1224 1225 1226
{
	switch (link_type) {
	case LE_LINK:
1227 1228 1229 1230 1231 1232 1233 1234
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1235 1236 1237 1238 1239 1240 1241
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1242
static int get_connections(struct sock *sk, u16 index)
1243 1244 1245
{
	struct mgmt_rp_get_connections *rp;
	struct hci_dev *hdev;
1246
	struct hci_conn *c;
1247
	size_t rp_len;
1248
	u16 count;
1249 1250 1251 1252
	int i, err;

	BT_DBG("");

1253
	hdev = hci_dev_get(index);
1254
	if (!hdev)
1255 1256
		return cmd_status(sk, index, MGMT_OP_GET_CONNECTIONS,
						MGMT_STATUS_INVALID_PARAMS);
1257

1258
	hci_dev_lock(hdev);
1259 1260

	count = 0;
1261 1262 1263
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			count++;
1264 1265
	}

1266
	rp_len = sizeof(*rp) + (count * sizeof(struct mgmt_addr_info));
1267 1268
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1269 1270 1271 1272 1273 1274 1275
		err = -ENOMEM;
		goto unlock;
	}

	put_unaligned_le16(count, &rp->conn_count);

	i = 0;
1276
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1277 1278
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1279
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1280
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1281 1282 1283 1284 1285 1286 1287
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1288

1289
	err = cmd_complete(sk, index, MGMT_OP_GET_CONNECTIONS, rp, rp_len);
1290 1291

unlock:
1292
	kfree(rp);
1293
	hci_dev_unlock(hdev);
1294 1295 1296 1297
	hci_dev_put(hdev);
	return err;
}

1298 1299 1300 1301 1302 1303
static int send_pin_code_neg_reply(struct sock *sk, u16 index,
		struct hci_dev *hdev, struct mgmt_cp_pin_code_neg_reply *cp)
{
	struct pending_cmd *cmd;
	int err;

1304
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, sizeof(cp->bdaddr),
								&cp->bdaddr);
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1317 1318
static int pin_code_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1319 1320
{
	struct hci_dev *hdev;
1321
	struct hci_conn *conn;
1322
	struct mgmt_cp_pin_code_reply *cp;
1323
	struct mgmt_cp_pin_code_neg_reply ncp;
1324
	struct hci_cp_pin_code_reply reply;
1325
	struct pending_cmd *cmd;
1326 1327 1328 1329 1330 1331
	int err;

	BT_DBG("");

	cp = (void *) data;

1332
	if (len != sizeof(*cp))
1333 1334
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1335

1336
	hdev = hci_dev_get(index);
1337
	if (!hdev)
1338 1339
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1340

1341
	hci_dev_lock(hdev);
1342 1343

	if (!test_bit(HCI_UP, &hdev->flags)) {
1344 1345
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_POWERED);
1346 1347 1348
		goto failed;
	}

1349 1350
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
	if (!conn) {
1351 1352
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_CONNECTED);
1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
		bacpy(&ncp.bdaddr, &cp->bdaddr);

		BT_ERR("PIN code is not 16 bytes long");

		err = send_pin_code_neg_reply(sk, index, hdev, &ncp);
		if (err >= 0)
			err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
1364
						MGMT_STATUS_INVALID_PARAMS);
1365 1366 1367 1368

		goto failed;
	}

1369
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1370 1371
	if (!cmd) {
		err = -ENOMEM;
1372
		goto failed;
1373
	}
1374 1375 1376

	bacpy(&reply.bdaddr, &cp->bdaddr);
	reply.pin_len = cp->pin_len;
1377
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1378 1379 1380

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1381
		mgmt_pending_remove(cmd);
1382 1383

failed:
1384
	hci_dev_unlock(hdev);
1385 1386 1387 1388 1389
	hci_dev_put(hdev);

	return err;
}

1390 1391
static int pin_code_neg_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1392 1393 1394 1395 1396 1397 1398 1399 1400
{
	struct hci_dev *hdev;
	struct mgmt_cp_pin_code_neg_reply *cp;
	int err;

	BT_DBG("");

	cp = (void *) data;

1401 1402
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1403
						MGMT_STATUS_INVALID_PARAMS);
1404

1405
	hdev = hci_dev_get(index);
1406
	if (!hdev)
1407
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1408
						MGMT_STATUS_INVALID_PARAMS);
1409

1410
	hci_dev_lock(hdev);
1411 1412

	if (!test_bit(HCI_UP, &hdev->flags)) {
1413
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1414
						MGMT_STATUS_NOT_POWERED);
1415 1416 1417
		goto failed;
	}

1418
	err = send_pin_code_neg_reply(sk, index, hdev, cp);
1419 1420

failed:
1421
	hci_dev_unlock(hdev);
1422 1423 1424 1425 1426
	hci_dev_put(hdev);

	return err;
}

1427 1428
static int set_io_capability(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1429 1430 1431 1432 1433 1434 1435 1436
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_io_capability *cp;

	BT_DBG("");

	cp = (void *) data;

1437
	if (len != sizeof(*cp))
1438 1439
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1440

1441
	hdev = hci_dev_get(index);
1442
	if (!hdev)
1443 1444
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1445

1446
	hci_dev_lock(hdev);
1447 1448 1449 1450

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1451
							hdev->io_capability);
1452

1453
	hci_dev_unlock(hdev);
1454 1455
	hci_dev_put(hdev);

1456
	return cmd_complete(sk, index, MGMT_OP_SET_IO_CAPABILITY, NULL, 0);
1457 1458
}

1459 1460 1461
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1462
	struct pending_cmd *cmd;
1463

1464
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1482 1483
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1484 1485
	rp.status = status;

1486
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, &rp, sizeof(rp));
1487 1488 1489 1490 1491 1492 1493 1494

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1495
	mgmt_pending_remove(cmd);
1496 1497 1498 1499 1500 1501 1502 1503 1504
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1505
	if (!cmd)
1506
		BT_DBG("Unable to find a pending command");
1507 1508
	else
		pairing_complete(cmd, status);
1509 1510
}

1511
static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len)
1512 1513 1514
{
	struct hci_dev *hdev;
	struct mgmt_cp_pair_device *cp;
1515
	struct mgmt_rp_pair_device rp;
1516 1517 1518 1519 1520 1521 1522 1523 1524
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1525
	if (len != sizeof(*cp))
1526 1527
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1528

1529
	hdev = hci_dev_get(index);
1530
	if (!hdev)
1531 1532
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1533

1534
	hci_dev_lock(hdev);
1535

1536 1537
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1538
		auth_type = HCI_AT_DEDICATED_BONDING;
1539
	else
1540 1541
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1542 1543
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1544 1545
								auth_type);
	else
1546
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1547 1548
								auth_type);

1549 1550 1551 1552
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1553
	if (IS_ERR(conn)) {
1554 1555 1556
		rp.status = -PTR_ERR(conn);
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1557 1558 1559 1560 1561
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1562 1563 1564
		rp.status = EBUSY;
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1565 1566 1567
		goto unlock;
	}

1568
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1569 1570 1571 1572 1573 1574
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1575
	/* For LE, just connecting isn't a proof that the pairing finished */
1576
	if (cp->addr.type == MGMT_ADDR_BREDR)
1577 1578
		conn->connect_cfm_cb = pairing_complete_cb;

1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1591
	hci_dev_unlock(hdev);
1592 1593 1594 1595 1596
	hci_dev_put(hdev);

	return err;
}

1597 1598
static int user_pairing_resp(struct sock *sk, u16 index, bdaddr_t *bdaddr,
					u16 mgmt_op, u16 hci_op, __le32 passkey)
1599 1600 1601
{
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
1602
	struct hci_conn *conn;
1603 1604
	int err;

1605
	hdev = hci_dev_get(index);
1606
	if (!hdev)
1607 1608
		return cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_INVALID_PARAMS);
1609

1610
	hci_dev_lock(hdev);
1611

1612
	if (!test_bit(HCI_UP, &hdev->flags)) {
1613 1614
		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_NOT_POWERED);
		goto done;
1615 1616
	}

1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635
	/*
	 * Check for an existing ACL link, if present pair via
	 * HCI commands.
	 *
	 * If no ACL link is present, check for an LE link and if
	 * present, pair via the SMP engine.
	 *
	 * If neither ACL nor LE links are present, fail with error.
	 */
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	if (!conn) {
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
		if (!conn) {
			err = cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_NOT_CONNECTED);
			goto done;
		}

		/* Continue with pairing via SMP */
1636 1637 1638 1639 1640 1641 1642 1643
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_SUCCESS);
		else
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_FAILED);
1644 1645 1646 1647

		goto done;
	}

1648
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
1649 1650
	if (!cmd) {
		err = -ENOMEM;
1651
		goto done;
1652 1653
	}

1654
	/* Continue with pairing via HCI */
1655 1656 1657 1658 1659 1660 1661 1662 1663
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

1664 1665
	if (err < 0)
		mgmt_pending_remove(cmd);
1666

1667
done:
1668
	hci_dev_unlock(hdev);
1669 1670 1671 1672 1673
	hci_dev_put(hdev);

	return err;
}

1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691
static int user_confirm_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_confirm_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_REPLY,
			HCI_OP_USER_CONFIRM_REPLY, 0);
}

static int user_confirm_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
1692
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_NEG_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_NEG_REPLY,
			HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
}

1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735
static int user_passkey_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_passkey_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_REPLY,
			HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
}

static int user_passkey_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
	struct mgmt_cp_user_passkey_neg_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_NEG_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_NEG_REPLY,
			HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
}

1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747
static int set_local_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_set_local_name *mgmt_cp = (void *) data;
	struct hci_cp_write_local_name hci_cp;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
1748 1749
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1750 1751 1752

	hdev = hci_dev_get(index);
	if (!hdev)
1753 1754
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1755

1756
	hci_dev_lock(hdev);
1757

1758
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1771
	hci_dev_unlock(hdev);
1772 1773 1774 1775 1776
	hci_dev_put(hdev);

	return err;
}

1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787
static int read_local_oob_data(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1788
						MGMT_STATUS_INVALID_PARAMS);
1789

1790
	hci_dev_lock(hdev);
1791 1792 1793

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1794
						MGMT_STATUS_NOT_POWERED);
1795 1796 1797 1798 1799
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1800
						MGMT_STATUS_NOT_SUPPORTED);
1801 1802 1803
		goto unlock;
	}

1804
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
1805 1806
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
							MGMT_STATUS_BUSY);
1807 1808 1809
		goto unlock;
	}

1810
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
1811 1812 1813 1814 1815 1816 1817 1818 1819 1820
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
1821
	hci_dev_unlock(hdev);
1822 1823 1824 1825 1826
	hci_dev_put(hdev);

	return err;
}

1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837
static int add_remote_oob_data(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_add_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1838
						MGMT_STATUS_INVALID_PARAMS);
1839 1840 1841 1842

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1843
						MGMT_STATUS_INVALID_PARAMS);
1844

1845
	hci_dev_lock(hdev);
1846 1847 1848 1849

	err = hci_add_remote_oob_data(hdev, &cp->bdaddr, cp->hash,
								cp->randomizer);
	if (err < 0)
1850 1851
		err = cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_FAILED);
1852 1853 1854 1855
	else
		err = cmd_complete(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA, NULL,
									0);

1856
	hci_dev_unlock(hdev);
1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872
	hci_dev_put(hdev);

	return err;
}

static int remove_remote_oob_data(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_remove_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1873
						MGMT_STATUS_INVALID_PARAMS);
1874 1875 1876 1877

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1878
						MGMT_STATUS_INVALID_PARAMS);
1879

1880
	hci_dev_lock(hdev);
1881 1882 1883 1884

	err = hci_remove_remote_oob_data(hdev, &cp->bdaddr);
	if (err < 0)
		err = cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1885
						MGMT_STATUS_INVALID_PARAMS);
1886 1887 1888 1889
	else
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
								NULL, 0);

1890
	hci_dev_unlock(hdev);
1891 1892 1893 1894 1895
	hci_dev_put(hdev);

	return err;
}

1896 1897
static int start_discovery(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
1898
{
1899
	struct mgmt_cp_start_discovery *cp = (void *) data;
1900 1901 1902 1903 1904 1905
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

1906 1907 1908 1909
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);

1910 1911
	hdev = hci_dev_get(index);
	if (!hdev)
1912 1913
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1914

1915
	hci_dev_lock(hdev);
1916

1917
	if (!test_bit(HCI_UP, &hdev->flags)) {
1918 1919
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_NOT_POWERED);
1920 1921 1922
		goto failed;
	}

1923 1924 1925 1926 1927 1928
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_BUSY);
		goto failed;
	}

1929
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
1930 1931 1932 1933 1934
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
1935
	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
1936 1937
	if (err < 0)
		mgmt_pending_remove(cmd);
1938 1939
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
1940 1941

failed:
1942
	hci_dev_unlock(hdev);
1943 1944 1945 1946 1947 1948 1949 1950 1951
	hci_dev_put(hdev);

	return err;
}

static int stop_discovery(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
1952 1953
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
1954 1955 1956 1957 1958 1959
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
1960 1961
		return cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1962

1963
	hci_dev_lock(hdev);
1964

1965
	if (!hci_discovery_active(hdev)) {
1966 1967
		err = cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_REJECTED);
1968
		goto unlock;
1969 1970
	}

1971
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
1972 1973
	if (!cmd) {
		err = -ENOMEM;
1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991
		goto unlock;
	}

	if (hdev->discovery.state == DISCOVERY_INQUIRY) {
		err = hci_cancel_inquiry(hdev);
		if (err < 0)
			mgmt_pending_remove(cmd);
		else
			hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
		goto unlock;
	}

	e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_PENDING);
	if (!e) {
		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, index, MGMT_OP_STOP_DISCOVERY, NULL, 0);
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
		goto unlock;
1992 1993
	}

1994 1995 1996
	bacpy(&cp.bdaddr, &e->data.bdaddr);
	err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
							sizeof(cp), &cp);
1997 1998
	if (err < 0)
		mgmt_pending_remove(cmd);
1999 2000
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2001

2002
unlock:
2003
	hci_dev_unlock(hdev);
2004 2005 2006 2007 2008
	hci_dev_put(hdev);

	return err;
}

2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029
static int confirm_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_confirm_name *cp = (void *) data;
	struct inquiry_entry *e;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

2030 2031 2032 2033 2034 2035
	if (!hci_discovery_active(hdev)) {
		err = cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
							MGMT_STATUS_FAILED);
		goto failed;
	}

2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->bdaddr);
	if (!e) {
		err = cmd_status (sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2048
		hci_inquiry_cache_update_resolve(hdev, e);
2049 2050 2051 2052 2053 2054 2055 2056 2057 2058
	}

	err = 0;

failed:
	hci_dev_unlock(hdev);

	return err;
}

2059 2060 2061 2062
static int block_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
2063
	struct mgmt_cp_block_device *cp = (void *) data;
2064 2065 2066 2067 2068 2069
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2070
						MGMT_STATUS_INVALID_PARAMS);
2071 2072 2073 2074

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2075
						MGMT_STATUS_INVALID_PARAMS);
2076

2077
	hci_dev_lock(hdev);
2078

2079 2080
	err = hci_blacklist_add(hdev, &cp->bdaddr);
	if (err < 0)
2081 2082
		err = cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
							MGMT_STATUS_FAILED);
2083 2084 2085
	else
		err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE,
							NULL, 0);
2086

2087
	hci_dev_unlock(hdev);
2088 2089 2090 2091 2092 2093 2094 2095 2096
	hci_dev_put(hdev);

	return err;
}

static int unblock_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
2097
	struct mgmt_cp_unblock_device *cp = (void *) data;
2098 2099 2100 2101 2102 2103
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2104
						MGMT_STATUS_INVALID_PARAMS);
2105 2106 2107 2108

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2109
						MGMT_STATUS_INVALID_PARAMS);
2110

2111
	hci_dev_lock(hdev);
2112

2113 2114 2115
	err = hci_blacklist_del(hdev, &cp->bdaddr);

	if (err < 0)
2116 2117
		err = cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
2118 2119 2120
	else
		err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE,
								NULL, 0);
2121

2122
	hci_dev_unlock(hdev);
2123 2124 2125 2126 2127
	hci_dev_put(hdev);

	return err;
}

2128 2129 2130 2131
static int set_fast_connectable(struct sock *sk, u16 index,
					unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
2132
	struct mgmt_mode *cp = (void *) data;
2133 2134 2135 2136 2137 2138 2139 2140
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2141
						MGMT_STATUS_INVALID_PARAMS);
2142 2143 2144 2145

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2146
						MGMT_STATUS_INVALID_PARAMS);
2147 2148 2149

	hci_dev_lock(hdev);

2150
	if (cp->val) {
2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2164
							MGMT_STATUS_FAILED);
2165 2166 2167 2168 2169 2170
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2171
							MGMT_STATUS_FAILED);
2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183
		goto done;
	}

	err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
							NULL, 0);
done:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

2184 2185 2186 2187
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
	unsigned char *buf;
	struct mgmt_hdr *hdr;
2188
	u16 opcode, index, len;
2189 2190 2191 2192 2193 2194 2195
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2196
	buf = kmalloc(msglen, GFP_KERNEL);
2197 2198 2199 2200 2201 2202 2203 2204 2205 2206
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

	hdr = (struct mgmt_hdr *) buf;
	opcode = get_unaligned_le16(&hdr->opcode);
2207
	index = get_unaligned_le16(&hdr->index);
2208 2209 2210 2211 2212 2213 2214 2215
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

	switch (opcode) {
2216 2217 2218
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2219 2220 2221
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2222
	case MGMT_OP_READ_INFO:
2223
		err = read_controller_info(sk, index);
2224
		break;
2225
	case MGMT_OP_SET_POWERED:
2226
		err = set_powered(sk, index, buf + sizeof(*hdr), len);
2227
		break;
2228
	case MGMT_OP_SET_DISCOVERABLE:
2229
		err = set_discoverable(sk, index, buf + sizeof(*hdr), len);
2230
		break;
2231
	case MGMT_OP_SET_CONNECTABLE:
2232
		err = set_connectable(sk, index, buf + sizeof(*hdr), len);
2233
		break;
2234 2235 2236 2237
	case MGMT_OP_SET_FAST_CONNECTABLE:
		err = set_fast_connectable(sk, index, buf + sizeof(*hdr),
								len);
		break;
2238
	case MGMT_OP_SET_PAIRABLE:
2239
		err = set_pairable(sk, index, buf + sizeof(*hdr), len);
2240
		break;
2241
	case MGMT_OP_ADD_UUID:
2242
		err = add_uuid(sk, index, buf + sizeof(*hdr), len);
2243 2244
		break;
	case MGMT_OP_REMOVE_UUID:
2245
		err = remove_uuid(sk, index, buf + sizeof(*hdr), len);
2246
		break;
2247
	case MGMT_OP_SET_DEV_CLASS:
2248
		err = set_dev_class(sk, index, buf + sizeof(*hdr), len);
2249
		break;
2250 2251
	case MGMT_OP_LOAD_LINK_KEYS:
		err = load_link_keys(sk, index, buf + sizeof(*hdr), len);
2252
		break;
2253 2254
	case MGMT_OP_REMOVE_KEYS:
		err = remove_keys(sk, index, buf + sizeof(*hdr), len);
2255
		break;
2256
	case MGMT_OP_DISCONNECT:
2257
		err = disconnect(sk, index, buf + sizeof(*hdr), len);
2258
		break;
2259
	case MGMT_OP_GET_CONNECTIONS:
2260
		err = get_connections(sk, index);
2261
		break;
2262
	case MGMT_OP_PIN_CODE_REPLY:
2263
		err = pin_code_reply(sk, index, buf + sizeof(*hdr), len);
2264 2265
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2266
		err = pin_code_neg_reply(sk, index, buf + sizeof(*hdr), len);
2267
		break;
2268
	case MGMT_OP_SET_IO_CAPABILITY:
2269
		err = set_io_capability(sk, index, buf + sizeof(*hdr), len);
2270
		break;
2271
	case MGMT_OP_PAIR_DEVICE:
2272
		err = pair_device(sk, index, buf + sizeof(*hdr), len);
2273
		break;
2274
	case MGMT_OP_USER_CONFIRM_REPLY:
2275
		err = user_confirm_reply(sk, index, buf + sizeof(*hdr), len);
2276 2277
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2278 2279
		err = user_confirm_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2280
		break;
2281 2282 2283 2284 2285 2286
	case MGMT_OP_USER_PASSKEY_REPLY:
		err = user_passkey_reply(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
		err = user_passkey_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2287
		break;
2288 2289 2290
	case MGMT_OP_SET_LOCAL_NAME:
		err = set_local_name(sk, index, buf + sizeof(*hdr), len);
		break;
2291 2292 2293
	case MGMT_OP_READ_LOCAL_OOB_DATA:
		err = read_local_oob_data(sk, index);
		break;
2294 2295 2296 2297 2298 2299 2300
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
		err = add_remote_oob_data(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
		err = remove_remote_oob_data(sk, index, buf + sizeof(*hdr),
									len);
		break;
2301
	case MGMT_OP_START_DISCOVERY:
2302
		err = start_discovery(sk, index, buf + sizeof(*hdr), len);
2303 2304 2305 2306
		break;
	case MGMT_OP_STOP_DISCOVERY:
		err = stop_discovery(sk, index);
		break;
2307 2308 2309
	case MGMT_OP_CONFIRM_NAME:
		err = confirm_name(sk, index, buf + sizeof(*hdr), len);
		break;
2310 2311 2312 2313 2314 2315
	case MGMT_OP_BLOCK_DEVICE:
		err = block_device(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
		err = unblock_device(sk, index, buf + sizeof(*hdr), len);
		break;
2316 2317
	default:
		BT_DBG("Unknown op %u", opcode);
2318 2319
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2320 2321 2322
		break;
	}

2323 2324 2325
	if (err < 0)
		goto done;

2326 2327 2328 2329 2330 2331
	err = msglen;

done:
	kfree(buf);
	return err;
}
2332

2333 2334 2335 2336 2337 2338 2339 2340
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2341
int mgmt_index_added(struct hci_dev *hdev)
2342
{
2343
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2344 2345
}

2346
int mgmt_index_removed(struct hci_dev *hdev)
2347
{
2348 2349
	u8 status = ENODEV;

2350
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2351

2352
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2353 2354
}

2355
struct cmd_lookup {
2356
	u8 val;
2357
	struct sock *sk;
2358
	struct hci_dev *hdev;
2359 2360
};

2361
static void settings_rsp(struct pending_cmd *cmd, void *data)
2362
{
2363
	struct cmd_lookup *match = data;
2364

2365
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2366 2367 2368 2369 2370 2371 2372 2373 2374

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2375
}
2376

2377
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2378
{
2379 2380
	struct cmd_lookup match = { powered, NULL, hdev };
	__le32 ev;
2381
	int ret;
2382

2383
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2384

2385 2386
	if (!powered) {
		u8 status = ENETDOWN;
2387
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2388 2389
	}

2390
	ev = cpu_to_le32(get_current_settings(hdev));
2391

2392 2393
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
								match.sk);
2394 2395 2396 2397 2398

	if (match.sk)
		sock_put(match.sk);

	return ret;
2399
}
2400

2401
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2402
{
2403 2404
	struct cmd_lookup match = { discoverable, NULL, hdev };
	__le32 ev;
2405 2406
	int ret;

2407
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp, &match);
2408

2409
	ev = cpu_to_le32(get_current_settings(hdev));
2410

2411
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
2412
								match.sk);
2413 2414 2415 2416 2417
	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2418

2419
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2420
{
2421 2422
	__le32 ev;
	struct cmd_lookup match = { connectable, NULL, hdev };
2423 2424
	int ret;

2425 2426
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
								&match);
2427

2428
	ev = cpu_to_le32(get_current_settings(hdev));
2429

2430
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);
2431 2432 2433 2434 2435 2436

	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2437

2438
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2439
{
2440 2441
	u8 mgmt_err = mgmt_status(status);

2442
	if (scan & SCAN_PAGE)
2443
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
2444
						cmd_status_rsp, &mgmt_err);
2445 2446

	if (scan & SCAN_INQUIRY)
2447
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
2448
						cmd_status_rsp, &mgmt_err);
2449 2450 2451 2452

	return 0;
}

2453 2454
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
2455
{
2456
	struct mgmt_ev_new_link_key ev;
2457

2458
	memset(&ev, 0, sizeof(ev));
2459

2460 2461 2462 2463 2464
	ev.store_hint = persistent;
	bacpy(&ev.key.bdaddr, &key->bdaddr);
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
2465

2466
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
2467
}
2468

2469
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
2470 2471
					u8 addr_type, u8 *name, u8 name_len,
					u8 *dev_class)
2472
{
2473 2474 2475
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
2476

2477 2478
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
2479

2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
								name, name_len);

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
		eir_len = eir_append_data(&ev->eir[eir_len], eir_len,
					EIR_CLASS_OF_DEV, dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
						sizeof(*ev) + eir_len, NULL);
2492 2493
}

2494 2495
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
2496
	struct mgmt_cp_disconnect *cp = cmd->param;
2497
	struct sock **sk = data;
2498
	struct mgmt_rp_disconnect rp;
2499

2500
	bacpy(&rp.bdaddr, &cp->bdaddr);
2501
	rp.status = 0;
2502

2503
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, &rp, sizeof(rp));
2504 2505 2506 2507

	*sk = cmd->sk;
	sock_hold(*sk);

2508
	mgmt_pending_remove(cmd);
2509 2510
}

2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527
static void remove_keys_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;
	struct mgmt_cp_remove_keys *cp = cmd->param;
	struct mgmt_rp_remove_keys rp;

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
	if (status != NULL)
		rp.status = *status;

	cmd_complete(cmd->sk, cmd->index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));

	mgmt_pending_remove(cmd);
}

2528 2529
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
2530
{
2531
	struct mgmt_addr_info ev;
2532 2533 2534
	struct sock *sk = NULL;
	int err;

2535
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
2536 2537

	bacpy(&ev.bdaddr, bdaddr);
2538
	ev.type = link_to_mgmt(link_type, addr_type);
2539

2540 2541
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
									sk);
2542 2543 2544 2545

	if (sk)
		sock_put(sk);

2546 2547
	mgmt_pending_foreach(MGMT_OP_REMOVE_KEYS, hdev, remove_keys_rsp, NULL);

2548 2549 2550
	return err;
}

2551
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2552 2553
{
	struct pending_cmd *cmd;
2554
	u8 mgmt_err = mgmt_status(status);
2555 2556
	int err;

2557
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
2558 2559 2560
	if (!cmd)
		return -ENOENT;

2561 2562 2563 2564 2565 2566 2567 2568 2569 2570
	if (bdaddr) {
		struct mgmt_rp_disconnect rp;

		bacpy(&rp.bdaddr, bdaddr);
		rp.status = status;

		err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
							&rp, sizeof(rp));
	} else
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_DISCONNECT,
2571
								mgmt_err);
2572

2573
	mgmt_pending_remove(cmd);
2574 2575

	return err;
2576
}
2577

2578 2579
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
2580 2581 2582
{
	struct mgmt_ev_connect_failed ev;

2583
	bacpy(&ev.addr.bdaddr, bdaddr);
2584
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2585
	ev.status = mgmt_status(status);
2586

2587
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
2588
}
2589

2590
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
2591 2592 2593 2594
{
	struct mgmt_ev_pin_code_request ev;

	bacpy(&ev.bdaddr, bdaddr);
2595
	ev.secure = secure;
2596

2597
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
2598
									NULL);
2599 2600
}

2601 2602
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2603 2604
{
	struct pending_cmd *cmd;
2605
	struct mgmt_rp_pin_code_reply rp;
2606 2607
	int err;

2608
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
2609 2610 2611
	if (!cmd)
		return -ENOENT;

2612
	bacpy(&rp.bdaddr, bdaddr);
2613
	rp.status = mgmt_status(status);
2614

2615
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, &rp,
2616
								sizeof(rp));
2617

2618
	mgmt_pending_remove(cmd);
2619 2620 2621 2622

	return err;
}

2623 2624
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2625 2626
{
	struct pending_cmd *cmd;
2627
	struct mgmt_rp_pin_code_reply rp;
2628 2629
	int err;

2630
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
2631 2632 2633
	if (!cmd)
		return -ENOENT;

2634
	bacpy(&rp.bdaddr, bdaddr);
2635
	rp.status = mgmt_status(status);
2636

2637
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY, &rp,
2638
								sizeof(rp));
2639

2640
	mgmt_pending_remove(cmd);
2641 2642 2643

	return err;
}
2644

2645 2646
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						__le32 value, u8 confirm_hint)
2647 2648 2649
{
	struct mgmt_ev_user_confirm_request ev;

2650
	BT_DBG("%s", hdev->name);
2651 2652

	bacpy(&ev.bdaddr, bdaddr);
2653
	ev.confirm_hint = confirm_hint;
2654 2655
	put_unaligned_le32(value, &ev.value);

2656
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
2657
									NULL);
2658 2659
}

2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr)
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.bdaddr, bdaddr);

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

2672
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
2673
							u8 status, u8 opcode)
2674 2675 2676 2677 2678
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

2679
	cmd = mgmt_pending_find(opcode, hdev);
2680 2681 2682 2683
	if (!cmd)
		return -ENOENT;

	bacpy(&rp.bdaddr, bdaddr);
2684
	rp.status = mgmt_status(status);
2685
	err = cmd_complete(cmd->sk, hdev->id, opcode, &rp, sizeof(rp));
2686

2687
	mgmt_pending_remove(cmd);
2688 2689 2690 2691

	return err;
}

2692 2693
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2694
{
2695
	return user_pairing_resp_complete(hdev, bdaddr, status,
2696 2697 2698
						MGMT_OP_USER_CONFIRM_REPLY);
}

2699 2700
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
2701
{
2702
	return user_pairing_resp_complete(hdev, bdaddr, status,
2703 2704
					MGMT_OP_USER_CONFIRM_NEG_REPLY);
}
2705

2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
						MGMT_OP_USER_PASSKEY_REPLY);
}

int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
					MGMT_OP_USER_PASSKEY_NEG_REPLY);
}

2720
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2721 2722 2723 2724
{
	struct mgmt_ev_auth_failed ev;

	bacpy(&ev.bdaddr, bdaddr);
2725
	ev.status = mgmt_status(status);
2726

2727
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
2728
}
2729

2730
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
2731 2732 2733 2734 2735 2736 2737 2738
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
	int err;

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2739
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2740 2741 2742 2743
	if (!cmd)
		goto send_event;

	if (status) {
2744
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2745
							mgmt_status(status));
2746 2747 2748
		goto failed;
	}

2749
	update_eir(hdev);
2750

2751
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, &ev,
2752 2753 2754 2755 2756
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
2757
	err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
2758 2759 2760 2761 2762 2763 2764
							cmd ? cmd->sk : NULL);

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
2765

2766 2767
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
2768 2769 2770 2771
{
	struct pending_cmd *cmd;
	int err;

2772
	BT_DBG("%s status %u", hdev->name, status);
2773

2774
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
2775 2776 2777 2778
	if (!cmd)
		return -ENOENT;

	if (status) {
2779
		err = cmd_status(cmd->sk, hdev->id,
2780 2781
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
2782 2783 2784 2785 2786 2787
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

2788 2789 2790
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
						&rp, sizeof(rp));
2791 2792 2793 2794 2795 2796
	}

	mgmt_pending_remove(cmd);

	return err;
}
2797

2798
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
2799
				u8 addr_type, u8 *dev_class, s8 rssi,
2800
				u8 cfm_name, u8 *eir, u16 eir_len)
2801
{
2802 2803
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
2804
	size_t ev_size;
2805

2806 2807
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
2808 2809
		return -EINVAL;

2810 2811
	memset(buf, 0, sizeof(buf));

2812 2813 2814 2815
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;
	ev->confirm_name = cfm_name;
2816

2817
	if (eir_len > 0)
2818
		memcpy(ev->eir, eir, eir_len);
2819

2820 2821 2822 2823 2824 2825 2826
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
								dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	ev_size = sizeof(*ev) + eir_len;
2827

2828
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
2829
}
2830

2831 2832
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
				u8 addr_type, s8 rssi, u8 *name, u8 name_len)
2833
{
2834 2835 2836
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
2837

2838
	ev = (struct mgmt_ev_device_found *) buf;
2839

2840 2841 2842 2843 2844 2845 2846 2847 2848 2849
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
								name_len);

	put_unaligned_le16(eir_len, &ev->eir_len);
2850

2851
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, &ev, sizeof(ev), NULL);
2852
}
2853

2854
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
2855 2856 2857 2858
{
	struct pending_cmd *cmd;
	int err;

2859
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2860 2861 2862
	if (!cmd)
		return -ENOENT;

2863
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2864 2865 2866 2867 2868
	mgmt_pending_remove(cmd);

	return err;
}

2869 2870 2871 2872 2873 2874 2875 2876 2877
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

2878
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2879 2880 2881 2882 2883
	mgmt_pending_remove(cmd);

	return err;
}

2884
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
2885
{
2886 2887 2888
	struct pending_cmd *cmd;

	if (discovering)
2889
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2890
	else
2891
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
2892 2893

	if (cmd != NULL) {
2894
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, NULL, 0);
2895 2896 2897
		mgmt_pending_remove(cmd);
	}

2898
	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &discovering,
2899 2900
						sizeof(discovering), NULL);
}
2901

2902
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2903 2904 2905 2906
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

2907
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
2908 2909 2910

	bacpy(&ev.bdaddr, bdaddr);

2911 2912
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2913 2914
}

2915
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2916 2917 2918 2919
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

2920
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
2921 2922 2923

	bacpy(&ev.bdaddr, bdaddr);

2924 2925
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2926
}