mgmt.c 61.9 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2010  Nokia Corporation

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

25
#include <linux/kernel.h>
26
#include <linux/uaccess.h>
27 28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>

33 34 35
#define MGMT_VERSION	0
#define MGMT_REVISION	1

A
Andre Guedes 已提交
36 37
#define INQUIRY_LEN_BREDR 0x08 /* TGAP(100) */

38 39
struct pending_cmd {
	struct list_head list;
40
	u16 opcode;
41
	int index;
42
	void *param;
43
	struct sock *sk;
44
	void *user_data;
45 46
};

47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

120
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
121 122 123 124
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
125
	int err;
126

127
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
128 129 130 131 132 133 134 135

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
136
	hdr->index = cpu_to_le16(index);
137 138 139 140 141 142
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

143 144
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
145 146
		kfree_skb(skb);

147
	return err;
148 149
}

150 151
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, void *rp,
								size_t rp_len)
152 153 154 155
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
156
	int err;
157 158 159

	BT_DBG("sock %p", sk);

160
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
161 162 163 164 165
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

166
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
167
	hdr->index = cpu_to_le16(index);
168
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
169

170 171
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
172 173 174

	if (rp)
		memcpy(ev->data, rp, rp_len);
175

176 177
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
178 179
		kfree_skb(skb);

180
	return err;;
181 182
}

183 184 185 186 187 188 189 190 191
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

192 193
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, &rp,
								sizeof(rp));
194 195
}

196 197 198 199
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
200
	struct hci_dev *d;
201
	size_t rp_len;
202
	u16 count;
203
	int i, err;
204 205 206 207 208 209 210 211 212 213

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

214 215 216
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
217
		read_unlock(&hci_dev_list_lock);
218
		return -ENOMEM;
219
	}
220 221 222 223

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
224
	list_for_each_entry(d, &hci_dev_list, list) {
225
		if (test_and_clear_bit(HCI_AUTO_OFF, &d->flags))
226
			cancel_delayed_work(&d->power_off);
227 228 229 230

		if (test_bit(HCI_SETUP, &d->flags))
			continue;

231 232 233 234 235 236
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

237 238
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, rp,
									rp_len);
239

240 241 242
	kfree(rp);

	return err;
243 244
}

245
static int read_controller_info(struct sock *sk, u16 index)
246
{
247
	struct mgmt_rp_read_info rp;
248
	struct hci_dev *hdev;
249

250
	BT_DBG("sock %p hci%u", sk, index);
251

252
	hdev = hci_dev_get(index);
253
	if (!hdev)
254 255
		return cmd_status(sk, index, MGMT_OP_READ_INFO,
						MGMT_STATUS_INVALID_PARAMS);
256

257 258
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->flags))
		cancel_delayed_work_sync(&hdev->power_off);
259

260
	hci_dev_lock(hdev);
261

262 263
	set_bit(HCI_MGMT, &hdev->flags);

264 265
	memset(&rp, 0, sizeof(rp));

266
	rp.type = hdev->dev_type;
267

268 269 270 271
	rp.powered = test_bit(HCI_UP, &hdev->flags);
	rp.connectable = test_bit(HCI_PSCAN, &hdev->flags);
	rp.discoverable = test_bit(HCI_ISCAN, &hdev->flags);
	rp.pairable = test_bit(HCI_PSCAN, &hdev->flags);
272 273

	if (test_bit(HCI_AUTH, &hdev->flags))
274
		rp.sec_mode = 3;
275
	else if (hdev->ssp_mode > 0)
276
		rp.sec_mode = 4;
277
	else
278
		rp.sec_mode = 2;
279

280 281 282 283 284 285
	bacpy(&rp.bdaddr, &hdev->bdaddr);
	memcpy(rp.features, hdev->features, 8);
	memcpy(rp.dev_class, hdev->dev_class, 3);
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);
	rp.hci_ver = hdev->hci_ver;
	put_unaligned_le16(hdev->hci_rev, &rp.hci_rev);
286

287 288
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));

289
	hci_dev_unlock(hdev);
290
	hci_dev_put(hdev);
291

292
	return cmd_complete(sk, index, MGMT_OP_READ_INFO, &rp, sizeof(rp));
293 294
}

295 296 297
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
298
	kfree(cmd->param);
299 300 301
	kfree(cmd);
}

302
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
303 304
							struct hci_dev *hdev,
							void *data, u16 len)
305 306 307 308 309
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
310
		return NULL;
311 312

	cmd->opcode = opcode;
313
	cmd->index = hdev->id;
314

315 316
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
317
		kfree(cmd);
318
		return NULL;
319 320
	}

321 322
	if (data)
		memcpy(cmd->param, data, len);
323 324 325 326

	cmd->sk = sk;
	sock_hold(sk);

327
	list_add(&cmd->list, &hdev->mgmt_pending);
328

329
	return cmd;
330 331
}

332
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
333 334 335 336 337
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

338
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
339 340 341 342
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

343
		if (opcode > 0 && cmd->opcode != opcode)
344 345 346 347 348 349
			continue;

		cb(cmd, data);
	}
}

350
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
351
{
352
	struct pending_cmd *cmd;
353

354
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
355 356
		if (cmd->opcode == opcode)
			return cmd;
357 358 359 360 361
	}

	return NULL;
}

362
static void mgmt_pending_remove(struct pending_cmd *cmd)
363 364 365 366 367
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

368 369 370 371 372 373 374 375 376
static int send_mode_rsp(struct sock *sk, u16 opcode, u16 index, u8 val)
{
	struct mgmt_mode rp;

	rp.val = val;

	return cmd_complete(sk, index, opcode, &rp, sizeof(rp));
}

377
static int set_powered(struct sock *sk, u16 index, unsigned char *data, u16 len)
378
{
379
	struct mgmt_mode *cp;
380
	struct hci_dev *hdev;
381 382
	struct pending_cmd *cmd;
	int err, up;
383 384 385

	cp = (void *) data;

386
	BT_DBG("request for hci%u", index);
387

388
	if (len != sizeof(*cp))
389 390
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
391

392
	hdev = hci_dev_get(index);
393
	if (!hdev)
394 395
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
396

397
	hci_dev_lock(hdev);
398 399

	up = test_bit(HCI_UP, &hdev->flags);
400
	if ((cp->val && up) || (!cp->val && !up)) {
401
		err = send_mode_rsp(sk, index, MGMT_OP_SET_POWERED, cp->val);
402 403 404
		goto failed;
	}

405
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
406 407
		err = cmd_status(sk, index, MGMT_OP_SET_POWERED,
							MGMT_STATUS_BUSY);
408 409 410
		goto failed;
	}

411
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
412 413
	if (!cmd) {
		err = -ENOMEM;
414
		goto failed;
415
	}
416

417
	if (cp->val)
418
		schedule_work(&hdev->power_on);
419
	else
420
		schedule_work(&hdev->power_off.work);
421

422
	err = 0;
423 424

failed:
425
	hci_dev_unlock(hdev);
426
	hci_dev_put(hdev);
427
	return err;
428 429
}

430 431
static int set_discoverable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
432
{
433
	struct mgmt_cp_set_discoverable *cp;
434
	struct hci_dev *hdev;
435
	struct pending_cmd *cmd;
436 437 438 439 440
	u8 scan;
	int err;

	cp = (void *) data;

441
	BT_DBG("request for hci%u", index);
442

443
	if (len != sizeof(*cp))
444 445
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
446

447
	hdev = hci_dev_get(index);
448
	if (!hdev)
449 450
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
451

452
	hci_dev_lock(hdev);
453 454

	if (!test_bit(HCI_UP, &hdev->flags)) {
455 456
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_NOT_POWERED);
457 458 459
		goto failed;
	}

460 461
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
462 463
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
							MGMT_STATUS_BUSY);
464 465 466
		goto failed;
	}

467
	if (cp->val == test_bit(HCI_ISCAN, &hdev->flags) &&
468
					test_bit(HCI_PSCAN, &hdev->flags)) {
469 470
		err = send_mode_rsp(sk, index, MGMT_OP_SET_DISCOVERABLE,
								cp->val);
471 472 473
		goto failed;
	}

474
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
475 476
	if (!cmd) {
		err = -ENOMEM;
477
		goto failed;
478
	}
479 480 481

	scan = SCAN_PAGE;

482
	if (cp->val)
483
		scan |= SCAN_INQUIRY;
484
	else
485
		cancel_delayed_work(&hdev->discov_off);
486 487 488

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
489
		mgmt_pending_remove(cmd);
490

491 492 493
	if (cp->val)
		hdev->discov_timeout = get_unaligned_le16(&cp->timeout);

494
failed:
495
	hci_dev_unlock(hdev);
496 497 498 499 500
	hci_dev_put(hdev);

	return err;
}

501 502
static int set_connectable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
503
{
504
	struct mgmt_mode *cp;
505
	struct hci_dev *hdev;
506
	struct pending_cmd *cmd;
507 508 509 510 511
	u8 scan;
	int err;

	cp = (void *) data;

512
	BT_DBG("request for hci%u", index);
513

514
	if (len != sizeof(*cp))
515 516
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
517

518
	hdev = hci_dev_get(index);
519
	if (!hdev)
520 521
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
522

523
	hci_dev_lock(hdev);
524 525

	if (!test_bit(HCI_UP, &hdev->flags)) {
526 527
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_NOT_POWERED);
528 529 530
		goto failed;
	}

531 532
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
533 534
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
							MGMT_STATUS_BUSY);
535 536 537
		goto failed;
	}

538
	if (cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
539 540
		err = send_mode_rsp(sk, index, MGMT_OP_SET_CONNECTABLE,
								cp->val);
541 542 543
		goto failed;
	}

544
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
545 546
	if (!cmd) {
		err = -ENOMEM;
547
		goto failed;
548
	}
549

550
	if (cp->val)
551 552 553 554 555 556
		scan = SCAN_PAGE;
	else
		scan = 0;

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
557
		mgmt_pending_remove(cmd);
558 559

failed:
560
	hci_dev_unlock(hdev);
561 562 563 564 565
	hci_dev_put(hdev);

	return err;
}

566 567
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
568 569 570 571 572 573 574 575 576 577 578 579
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	bt_cb(skb)->channel = HCI_CHANNEL_CONTROL;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
580 581 582 583
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
584 585
	hdr->len = cpu_to_le16(data_len);

586 587
	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);
588 589 590 591 592 593 594

	hci_send_to_sock(NULL, skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

595 596
static int set_pairable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
597 598 599 600 601 602 603
{
	struct mgmt_mode *cp, ev;
	struct hci_dev *hdev;
	int err;

	cp = (void *) data;

604
	BT_DBG("request for hci%u", index);
605

606
	if (len != sizeof(*cp))
607 608
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
609

610
	hdev = hci_dev_get(index);
611
	if (!hdev)
612 613
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
614

615
	hci_dev_lock(hdev);
616 617 618 619 620 621

	if (cp->val)
		set_bit(HCI_PAIRABLE, &hdev->flags);
	else
		clear_bit(HCI_PAIRABLE, &hdev->flags);

622
	err = send_mode_rsp(sk, MGMT_OP_SET_PAIRABLE, index, cp->val);
623 624 625 626 627
	if (err < 0)
		goto failed;

	ev.val = cp->val;

628
	err = mgmt_event(MGMT_EV_PAIRABLE, hdev, &ev, sizeof(ev), sk);
629 630

failed:
631
	hci_dev_unlock(hdev);
632 633 634 635 636
	hci_dev_put(hdev);

	return err;
}

637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680
#define EIR_FLAGS		0x01 /* flags */
#define EIR_UUID16_SOME		0x02 /* 16-bit UUID, more available */
#define EIR_UUID16_ALL		0x03 /* 16-bit UUID, all listed */
#define EIR_UUID32_SOME		0x04 /* 32-bit UUID, more available */
#define EIR_UUID32_ALL		0x05 /* 32-bit UUID, all listed */
#define EIR_UUID128_SOME	0x06 /* 128-bit UUID, more available */
#define EIR_UUID128_ALL		0x07 /* 128-bit UUID, all listed */
#define EIR_NAME_SHORT		0x08 /* shortened local name */
#define EIR_NAME_COMPLETE	0x09 /* complete local name */
#define EIR_TX_POWER		0x0A /* transmit power level */
#define EIR_DEVICE_ID		0x10 /* device ID */

#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
681
	struct bt_uuid *uuid;
682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
706
	list_for_each_entry(uuid, &hdev->uuids, list) {
707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

	if (hdev->ssp_mode == 0)
		return 0;

	if (test_bit(HCI_SERVICE_CACHE, &hdev->flags))
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

780 781
static u8 get_service_classes(struct hci_dev *hdev)
{
782
	struct bt_uuid *uuid;
783 784
	u8 val = 0;

785
	list_for_each_entry(uuid, &hdev->uuids, list)
786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];

	BT_DBG("%s", hdev->name);

	if (test_bit(HCI_SERVICE_CACHE, &hdev->flags))
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
}

810
static int add_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
811 812 813 814 815 816 817 818
{
	struct mgmt_cp_add_uuid *cp;
	struct hci_dev *hdev;
	struct bt_uuid *uuid;
	int err;

	cp = (void *) data;

819
	BT_DBG("request for hci%u", index);
820

821
	if (len != sizeof(*cp))
822 823
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
824

825
	hdev = hci_dev_get(index);
826
	if (!hdev)
827 828
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
829

830
	hci_dev_lock(hdev);
831 832 833 834 835 836 837 838

	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
839
	uuid->svc_hint = cp->svc_hint;
840 841 842

	list_add(&uuid->list, &hdev->uuids);

843 844 845 846
	err = update_class(hdev);
	if (err < 0)
		goto failed;

847 848 849 850
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

851
	err = cmd_complete(sk, index, MGMT_OP_ADD_UUID, NULL, 0);
852 853

failed:
854
	hci_dev_unlock(hdev);
855 856 857 858 859
	hci_dev_put(hdev);

	return err;
}

860
static int remove_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
861 862
{
	struct list_head *p, *n;
863
	struct mgmt_cp_remove_uuid *cp;
864 865 866 867 868 869
	struct hci_dev *hdev;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

	cp = (void *) data;

870
	BT_DBG("request for hci%u", index);
871

872
	if (len != sizeof(*cp))
873 874
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
875

876
	hdev = hci_dev_get(index);
877
	if (!hdev)
878 879
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
880

881
	hci_dev_lock(hdev);
882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900

	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
		goto unlock;
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
901 902
		err = cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
903 904 905
		goto unlock;
	}

906 907 908 909
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

910 911 912 913
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

914
	err = cmd_complete(sk, index, MGMT_OP_REMOVE_UUID, NULL, 0);
915 916

unlock:
917
	hci_dev_unlock(hdev);
918 919 920 921 922
	hci_dev_put(hdev);

	return err;
}

923 924
static int set_dev_class(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
925 926 927 928 929 930 931
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_dev_class *cp;
	int err;

	cp = (void *) data;

932
	BT_DBG("request for hci%u", index);
933

934
	if (len != sizeof(*cp))
935 936
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
937

938
	hdev = hci_dev_get(index);
939
	if (!hdev)
940 941
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
942

943
	hci_dev_lock(hdev);
944 945 946 947 948 949 950

	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

	err = update_class(hdev);

	if (err == 0)
951
		err = cmd_complete(sk, index, MGMT_OP_SET_DEV_CLASS, NULL, 0);
952

953
	hci_dev_unlock(hdev);
954 955 956 957 958
	hci_dev_put(hdev);

	return err;
}

959 960
static int set_service_cache(struct sock *sk, u16 index,  unsigned char *data,
									u16 len)
961 962 963 964 965 966 967
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_service_cache *cp;
	int err;

	cp = (void *) data;

968
	if (len != sizeof(*cp))
969 970
		return cmd_status(sk, index, MGMT_OP_SET_SERVICE_CACHE,
						MGMT_STATUS_INVALID_PARAMS);
971

972
	hdev = hci_dev_get(index);
973
	if (!hdev)
974 975
		return cmd_status(sk, index, MGMT_OP_SET_SERVICE_CACHE,
						MGMT_STATUS_INVALID_PARAMS);
976

977
	hci_dev_lock(hdev);
978

979
	BT_DBG("hci%u enable %d", index, cp->enable);
980 981 982 983 984 985 986

	if (cp->enable) {
		set_bit(HCI_SERVICE_CACHE, &hdev->flags);
		err = 0;
	} else {
		clear_bit(HCI_SERVICE_CACHE, &hdev->flags);
		err = update_class(hdev);
987 988
		if (err == 0)
			err = update_eir(hdev);
989 990 991
	}

	if (err == 0)
992 993
		err = cmd_complete(sk, index, MGMT_OP_SET_SERVICE_CACHE, NULL,
									0);
994 995 996
	else
		cmd_status(sk, index, MGMT_OP_SET_SERVICE_CACHE, -err);

997

998
	hci_dev_unlock(hdev);
999 1000 1001 1002 1003
	hci_dev_put(hdev);

	return err;
}

1004 1005
static int load_link_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1006 1007
{
	struct hci_dev *hdev;
1008
	struct mgmt_cp_load_link_keys *cp;
1009
	u16 key_count, expected_len;
1010
	int i;
1011 1012

	cp = (void *) data;
1013 1014

	if (len < sizeof(*cp))
1015 1016
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1017

1018 1019
	key_count = get_unaligned_le16(&cp->key_count);

1020 1021
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1022
	if (expected_len != len) {
1023
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1024
							len, expected_len);
1025 1026
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1027 1028
	}

1029
	hdev = hci_dev_get(index);
1030
	if (!hdev)
1031 1032
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1033

1034
	BT_DBG("hci%u debug_keys %u key_count %u", index, cp->debug_keys,
1035 1036
								key_count);

1037
	hci_dev_lock(hdev);
1038 1039 1040 1041 1042 1043 1044 1045 1046 1047

	hci_link_keys_clear(hdev);

	set_bit(HCI_LINK_KEYS, &hdev->flags);

	if (cp->debug_keys)
		set_bit(HCI_DEBUG_KEYS, &hdev->flags);
	else
		clear_bit(HCI_DEBUG_KEYS, &hdev->flags);

1048
	for (i = 0; i < key_count; i++) {
1049
		struct mgmt_link_key_info *key = &cp->keys[i];
1050

1051
		hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type,
1052 1053 1054
								key->pin_len);
	}

1055 1056
	cmd_complete(sk, index, MGMT_OP_LOAD_LINK_KEYS, NULL, 0);

1057
	hci_dev_unlock(hdev);
1058 1059
	hci_dev_put(hdev);

1060
	return 0;
1061 1062
}

1063 1064
static int remove_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1065 1066
{
	struct hci_dev *hdev;
1067
	struct mgmt_cp_remove_keys *cp;
1068 1069 1070
	struct mgmt_rp_remove_keys rp;
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1071 1072 1073 1074 1075
	struct hci_conn *conn;
	int err;

	cp = (void *) data;

1076
	if (len != sizeof(*cp))
1077 1078
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1079

1080
	hdev = hci_dev_get(index);
1081
	if (!hdev)
1082 1083
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1084

1085
	hci_dev_lock(hdev);
1086

1087 1088
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
1089
	rp.status = MGMT_STATUS_FAILED;
1090

1091
	err = hci_remove_link_key(hdev, &cp->bdaddr);
1092 1093
	if (err < 0) {
		rp.status = MGMT_STATUS_NOT_PAIRED;
1094
		goto unlock;
1095
	}
1096

1097 1098 1099
	if (!test_bit(HCI_UP, &hdev->flags) || !cp->disconnect) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1100
		goto unlock;
1101
	}
1102 1103

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1104 1105 1106 1107 1108
	if (!conn) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
		goto unlock;
	}
1109

1110 1111 1112 1113
	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_KEYS, hdev, cp, sizeof(*cp));
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1114 1115
	}

1116 1117 1118 1119 1120 1121
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1122
unlock:
1123
	if (err < 0)
1124 1125
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1126
	hci_dev_unlock(hdev);
1127 1128 1129 1130 1131
	hci_dev_put(hdev);

	return err;
}

1132
static int disconnect(struct sock *sk, u16 index, unsigned char *data, u16 len)
1133 1134 1135 1136
{
	struct hci_dev *hdev;
	struct mgmt_cp_disconnect *cp;
	struct hci_cp_disconnect dc;
1137
	struct pending_cmd *cmd;
1138 1139 1140 1141 1142 1143 1144
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1145
	if (len != sizeof(*cp))
1146 1147
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1148

1149
	hdev = hci_dev_get(index);
1150
	if (!hdev)
1151 1152
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1153

1154
	hci_dev_lock(hdev);
1155 1156

	if (!test_bit(HCI_UP, &hdev->flags)) {
1157 1158
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_POWERED);
1159 1160 1161
		goto failed;
	}

1162
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1163 1164
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
							MGMT_STATUS_BUSY);
1165 1166 1167 1168
		goto failed;
	}

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1169 1170 1171
	if (!conn)
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->bdaddr);

1172
	if (!conn) {
1173 1174
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_CONNECTED);
1175 1176 1177
		goto failed;
	}

1178
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1179 1180
	if (!cmd) {
		err = -ENOMEM;
1181
		goto failed;
1182
	}
1183 1184 1185 1186 1187 1188

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1189
		mgmt_pending_remove(cmd);
1190 1191

failed:
1192
	hci_dev_unlock(hdev);
1193 1194 1195 1196 1197
	hci_dev_put(hdev);

	return err;
}

1198
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1199 1200 1201
{
	switch (link_type) {
	case LE_LINK:
1202 1203 1204 1205 1206 1207 1208 1209
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1210 1211 1212 1213 1214 1215 1216
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1217
static int get_connections(struct sock *sk, u16 index)
1218 1219 1220
{
	struct mgmt_rp_get_connections *rp;
	struct hci_dev *hdev;
1221
	struct hci_conn *c;
1222
	struct list_head *p;
1223
	size_t rp_len;
1224
	u16 count;
1225 1226 1227 1228
	int i, err;

	BT_DBG("");

1229
	hdev = hci_dev_get(index);
1230
	if (!hdev)
1231 1232
		return cmd_status(sk, index, MGMT_OP_GET_CONNECTIONS,
						MGMT_STATUS_INVALID_PARAMS);
1233

1234
	hci_dev_lock(hdev);
1235 1236 1237 1238 1239 1240

	count = 0;
	list_for_each(p, &hdev->conn_hash.list) {
		count++;
	}

1241
	rp_len = sizeof(*rp) + (count * sizeof(struct mgmt_addr_info));
1242 1243
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1244 1245 1246 1247 1248 1249 1250
		err = -ENOMEM;
		goto unlock;
	}

	put_unaligned_le16(count, &rp->conn_count);

	i = 0;
1251 1252
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1253
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1254 1255 1256 1257 1258 1259 1260
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1261

1262
	err = cmd_complete(sk, index, MGMT_OP_GET_CONNECTIONS, rp, rp_len);
1263 1264

unlock:
1265
	kfree(rp);
1266
	hci_dev_unlock(hdev);
1267 1268 1269 1270
	hci_dev_put(hdev);
	return err;
}

1271 1272 1273 1274 1275 1276
static int send_pin_code_neg_reply(struct sock *sk, u16 index,
		struct hci_dev *hdev, struct mgmt_cp_pin_code_neg_reply *cp)
{
	struct pending_cmd *cmd;
	int err;

1277
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, sizeof(cp->bdaddr),
								&cp->bdaddr);
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1290 1291
static int pin_code_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1292 1293
{
	struct hci_dev *hdev;
1294
	struct hci_conn *conn;
1295
	struct mgmt_cp_pin_code_reply *cp;
1296
	struct mgmt_cp_pin_code_neg_reply ncp;
1297
	struct hci_cp_pin_code_reply reply;
1298
	struct pending_cmd *cmd;
1299 1300 1301 1302 1303 1304
	int err;

	BT_DBG("");

	cp = (void *) data;

1305
	if (len != sizeof(*cp))
1306 1307
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1308

1309
	hdev = hci_dev_get(index);
1310
	if (!hdev)
1311 1312
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1313

1314
	hci_dev_lock(hdev);
1315 1316

	if (!test_bit(HCI_UP, &hdev->flags)) {
1317 1318
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_POWERED);
1319 1320 1321
		goto failed;
	}

1322 1323
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
	if (!conn) {
1324 1325
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_CONNECTED);
1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
		bacpy(&ncp.bdaddr, &cp->bdaddr);

		BT_ERR("PIN code is not 16 bytes long");

		err = send_pin_code_neg_reply(sk, index, hdev, &ncp);
		if (err >= 0)
			err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
1337
						MGMT_STATUS_INVALID_PARAMS);
1338 1339 1340 1341

		goto failed;
	}

1342
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1343 1344
	if (!cmd) {
		err = -ENOMEM;
1345
		goto failed;
1346
	}
1347 1348 1349

	bacpy(&reply.bdaddr, &cp->bdaddr);
	reply.pin_len = cp->pin_len;
1350
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1351 1352 1353

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1354
		mgmt_pending_remove(cmd);
1355 1356

failed:
1357
	hci_dev_unlock(hdev);
1358 1359 1360 1361 1362
	hci_dev_put(hdev);

	return err;
}

1363 1364
static int pin_code_neg_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1365 1366 1367 1368 1369 1370 1371 1372 1373
{
	struct hci_dev *hdev;
	struct mgmt_cp_pin_code_neg_reply *cp;
	int err;

	BT_DBG("");

	cp = (void *) data;

1374 1375
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1376
						MGMT_STATUS_INVALID_PARAMS);
1377

1378
	hdev = hci_dev_get(index);
1379
	if (!hdev)
1380
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1381
						MGMT_STATUS_INVALID_PARAMS);
1382

1383
	hci_dev_lock(hdev);
1384 1385

	if (!test_bit(HCI_UP, &hdev->flags)) {
1386
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1387
						MGMT_STATUS_NOT_POWERED);
1388 1389 1390
		goto failed;
	}

1391
	err = send_pin_code_neg_reply(sk, index, hdev, cp);
1392 1393

failed:
1394
	hci_dev_unlock(hdev);
1395 1396 1397 1398 1399
	hci_dev_put(hdev);

	return err;
}

1400 1401
static int set_io_capability(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1402 1403 1404 1405 1406 1407 1408 1409
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_io_capability *cp;

	BT_DBG("");

	cp = (void *) data;

1410
	if (len != sizeof(*cp))
1411 1412
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1413

1414
	hdev = hci_dev_get(index);
1415
	if (!hdev)
1416 1417
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1418

1419
	hci_dev_lock(hdev);
1420 1421 1422 1423

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1424
							hdev->io_capability);
1425

1426
	hci_dev_unlock(hdev);
1427 1428
	hci_dev_put(hdev);

1429
	return cmd_complete(sk, index, MGMT_OP_SET_IO_CAPABILITY, NULL, 0);
1430 1431
}

1432 1433 1434
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1435
	struct pending_cmd *cmd;
1436

1437
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1455 1456
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1457 1458
	rp.status = status;

1459
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, &rp, sizeof(rp));
1460 1461 1462 1463 1464 1465 1466 1467

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1468
	mgmt_pending_remove(cmd);
1469 1470 1471 1472 1473 1474 1475 1476 1477
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1478
	if (!cmd)
1479
		BT_DBG("Unable to find a pending command");
1480 1481
	else
		pairing_complete(cmd, status);
1482 1483
}

1484
static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len)
1485 1486 1487
{
	struct hci_dev *hdev;
	struct mgmt_cp_pair_device *cp;
1488
	struct mgmt_rp_pair_device rp;
1489 1490 1491 1492 1493 1494 1495 1496 1497
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1498
	if (len != sizeof(*cp))
1499 1500
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1501

1502
	hdev = hci_dev_get(index);
1503
	if (!hdev)
1504 1505
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1506

1507
	hci_dev_lock(hdev);
1508

1509 1510
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1511
		auth_type = HCI_AT_DEDICATED_BONDING;
1512
	else
1513 1514
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1515 1516
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1517 1518
								auth_type);
	else
1519
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1520 1521
								auth_type);

1522 1523 1524 1525
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1526
	if (IS_ERR(conn)) {
1527 1528 1529
		rp.status = -PTR_ERR(conn);
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1530 1531 1532 1533 1534
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1535 1536 1537
		rp.status = EBUSY;
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1538 1539 1540
		goto unlock;
	}

1541
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1542 1543 1544 1545 1546 1547
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1548
	/* For LE, just connecting isn't a proof that the pairing finished */
1549
	if (cp->addr.type == MGMT_ADDR_BREDR)
1550 1551
		conn->connect_cfm_cb = pairing_complete_cb;

1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1564
	hci_dev_unlock(hdev);
1565 1566 1567 1568 1569
	hci_dev_put(hdev);

	return err;
}

1570 1571
static int user_pairing_resp(struct sock *sk, u16 index, bdaddr_t *bdaddr,
					u16 mgmt_op, u16 hci_op, __le32 passkey)
1572 1573 1574
{
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
1575
	struct hci_conn *conn;
1576 1577
	int err;

1578
	hdev = hci_dev_get(index);
1579
	if (!hdev)
1580 1581
		return cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_INVALID_PARAMS);
1582

1583
	hci_dev_lock(hdev);
1584

1585
	if (!test_bit(HCI_UP, &hdev->flags)) {
1586 1587
		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_NOT_POWERED);
		goto done;
1588 1589
	}

1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613
	/*
	 * Check for an existing ACL link, if present pair via
	 * HCI commands.
	 *
	 * If no ACL link is present, check for an LE link and if
	 * present, pair via the SMP engine.
	 *
	 * If neither ACL nor LE links are present, fail with error.
	 */
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	if (!conn) {
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
		if (!conn) {
			err = cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_NOT_CONNECTED);
			goto done;
		}

		/* Continue with pairing via SMP */

		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_SUCCESS);
		goto done;
	}

1614
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
1615 1616
	if (!cmd) {
		err = -ENOMEM;
1617
		goto done;
1618 1619
	}

1620
	/* Continue with pairing via HCI */
1621 1622 1623 1624 1625 1626 1627 1628 1629
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

1630 1631
	if (err < 0)
		mgmt_pending_remove(cmd);
1632

1633
done:
1634
	hci_dev_unlock(hdev);
1635 1636 1637 1638 1639
	hci_dev_put(hdev);

	return err;
}

1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670
static int user_confirm_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_confirm_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_REPLY,
			HCI_OP_USER_CONFIRM_REPLY, 0);
}

static int user_confirm_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
	struct mgmt_cp_user_confirm_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_NEG_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_NEG_REPLY,
			HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
}

1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701
static int user_passkey_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_passkey_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_REPLY,
			HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
}

static int user_passkey_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
	struct mgmt_cp_user_passkey_neg_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_NEG_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_NEG_REPLY,
			HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
}

1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713
static int set_local_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_set_local_name *mgmt_cp = (void *) data;
	struct hci_cp_write_local_name hci_cp;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
1714 1715
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1716 1717 1718

	hdev = hci_dev_get(index);
	if (!hdev)
1719 1720
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1721

1722
	hci_dev_lock(hdev);
1723

1724
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1737
	hci_dev_unlock(hdev);
1738 1739 1740 1741 1742
	hci_dev_put(hdev);

	return err;
}

1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753
static int read_local_oob_data(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1754
						MGMT_STATUS_INVALID_PARAMS);
1755

1756
	hci_dev_lock(hdev);
1757 1758 1759

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1760
						MGMT_STATUS_NOT_POWERED);
1761 1762 1763 1764 1765
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1766
						MGMT_STATUS_NOT_SUPPORTED);
1767 1768 1769
		goto unlock;
	}

1770
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
1771 1772
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
							MGMT_STATUS_BUSY);
1773 1774 1775
		goto unlock;
	}

1776
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
1777 1778 1779 1780 1781 1782 1783 1784 1785 1786
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
1787
	hci_dev_unlock(hdev);
1788 1789 1790 1791 1792
	hci_dev_put(hdev);

	return err;
}

1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803
static int add_remote_oob_data(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_add_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1804
						MGMT_STATUS_INVALID_PARAMS);
1805 1806 1807 1808

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1809
						MGMT_STATUS_INVALID_PARAMS);
1810

1811
	hci_dev_lock(hdev);
1812 1813 1814 1815

	err = hci_add_remote_oob_data(hdev, &cp->bdaddr, cp->hash,
								cp->randomizer);
	if (err < 0)
1816 1817
		err = cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_FAILED);
1818 1819 1820 1821
	else
		err = cmd_complete(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA, NULL,
									0);

1822
	hci_dev_unlock(hdev);
1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838
	hci_dev_put(hdev);

	return err;
}

static int remove_remote_oob_data(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_remove_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1839
						MGMT_STATUS_INVALID_PARAMS);
1840 1841 1842 1843

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1844
						MGMT_STATUS_INVALID_PARAMS);
1845

1846
	hci_dev_lock(hdev);
1847 1848 1849 1850

	err = hci_remove_remote_oob_data(hdev, &cp->bdaddr);
	if (err < 0)
		err = cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1851
						MGMT_STATUS_INVALID_PARAMS);
1852 1853 1854 1855
	else
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
								NULL, 0);

1856
	hci_dev_unlock(hdev);
1857 1858 1859 1860 1861
	hci_dev_put(hdev);

	return err;
}

1862 1863
static int start_discovery(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
1864
{
1865
	struct mgmt_cp_start_discovery *cp = (void *) data;
1866 1867 1868 1869 1870 1871
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

1872 1873 1874 1875
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);

1876 1877
	hdev = hci_dev_get(index);
	if (!hdev)
1878 1879
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1880

1881
	hci_dev_lock(hdev);
1882

1883
	if (!test_bit(HCI_UP, &hdev->flags)) {
1884 1885
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_NOT_POWERED);
1886 1887 1888
		goto failed;
	}

1889
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
1890 1891 1892 1893 1894
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
1895
	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
1896 1897 1898 1899
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1900
	hci_dev_unlock(hdev);
1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915
	hci_dev_put(hdev);

	return err;
}

static int stop_discovery(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
1916 1917
		return cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1918

1919
	hci_dev_lock(hdev);
1920

1921
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
1922 1923 1924 1925 1926
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1927
	err = hci_cancel_inquiry(hdev);
1928 1929 1930 1931
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1932
	hci_dev_unlock(hdev);
1933 1934 1935 1936 1937
	hci_dev_put(hdev);

	return err;
}

1938 1939 1940 1941
static int block_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
1942
	struct mgmt_cp_block_device *cp = (void *) data;
1943 1944 1945 1946 1947 1948
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
1949
						MGMT_STATUS_INVALID_PARAMS);
1950 1951 1952 1953

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
1954
						MGMT_STATUS_INVALID_PARAMS);
1955

1956
	hci_dev_lock(hdev);
1957

1958 1959
	err = hci_blacklist_add(hdev, &cp->bdaddr);
	if (err < 0)
1960 1961
		err = cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
							MGMT_STATUS_FAILED);
1962 1963 1964
	else
		err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE,
							NULL, 0);
1965

1966
	hci_dev_unlock(hdev);
1967 1968 1969 1970 1971 1972 1973 1974 1975
	hci_dev_put(hdev);

	return err;
}

static int unblock_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
1976
	struct mgmt_cp_unblock_device *cp = (void *) data;
1977 1978 1979 1980 1981 1982
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
1983
						MGMT_STATUS_INVALID_PARAMS);
1984 1985 1986 1987

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
1988
						MGMT_STATUS_INVALID_PARAMS);
1989

1990
	hci_dev_lock(hdev);
1991

1992 1993 1994
	err = hci_blacklist_del(hdev, &cp->bdaddr);

	if (err < 0)
1995 1996
		err = cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1997 1998 1999
	else
		err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE,
								NULL, 0);
2000

2001
	hci_dev_unlock(hdev);
2002 2003 2004 2005 2006
	hci_dev_put(hdev);

	return err;
}

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
static int set_fast_connectable(struct sock *sk, u16 index,
					unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_fast_connectable *cp = (void *) data;
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2020
						MGMT_STATUS_INVALID_PARAMS);
2021 2022 2023 2024

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2025
						MGMT_STATUS_INVALID_PARAMS);
2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042

	hci_dev_lock(hdev);

	if (cp->enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2043
							MGMT_STATUS_FAILED);
2044 2045 2046 2047 2048 2049
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2050
							MGMT_STATUS_FAILED);
2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062
		goto done;
	}

	err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
							NULL, 0);
done:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

2063 2064 2065 2066
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
	unsigned char *buf;
	struct mgmt_hdr *hdr;
2067
	u16 opcode, index, len;
2068 2069 2070 2071 2072 2073 2074
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2075
	buf = kmalloc(msglen, GFP_KERNEL);
2076 2077 2078 2079 2080 2081 2082 2083 2084 2085
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

	hdr = (struct mgmt_hdr *) buf;
	opcode = get_unaligned_le16(&hdr->opcode);
2086
	index = get_unaligned_le16(&hdr->index);
2087 2088 2089 2090 2091 2092 2093 2094
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

	switch (opcode) {
2095 2096 2097
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2098 2099 2100
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2101
	case MGMT_OP_READ_INFO:
2102
		err = read_controller_info(sk, index);
2103
		break;
2104
	case MGMT_OP_SET_POWERED:
2105
		err = set_powered(sk, index, buf + sizeof(*hdr), len);
2106
		break;
2107
	case MGMT_OP_SET_DISCOVERABLE:
2108
		err = set_discoverable(sk, index, buf + sizeof(*hdr), len);
2109
		break;
2110
	case MGMT_OP_SET_CONNECTABLE:
2111
		err = set_connectable(sk, index, buf + sizeof(*hdr), len);
2112
		break;
2113
	case MGMT_OP_SET_PAIRABLE:
2114
		err = set_pairable(sk, index, buf + sizeof(*hdr), len);
2115
		break;
2116
	case MGMT_OP_ADD_UUID:
2117
		err = add_uuid(sk, index, buf + sizeof(*hdr), len);
2118 2119
		break;
	case MGMT_OP_REMOVE_UUID:
2120
		err = remove_uuid(sk, index, buf + sizeof(*hdr), len);
2121
		break;
2122
	case MGMT_OP_SET_DEV_CLASS:
2123
		err = set_dev_class(sk, index, buf + sizeof(*hdr), len);
2124 2125
		break;
	case MGMT_OP_SET_SERVICE_CACHE:
2126
		err = set_service_cache(sk, index, buf + sizeof(*hdr), len);
2127
		break;
2128 2129
	case MGMT_OP_LOAD_LINK_KEYS:
		err = load_link_keys(sk, index, buf + sizeof(*hdr), len);
2130
		break;
2131 2132
	case MGMT_OP_REMOVE_KEYS:
		err = remove_keys(sk, index, buf + sizeof(*hdr), len);
2133
		break;
2134
	case MGMT_OP_DISCONNECT:
2135
		err = disconnect(sk, index, buf + sizeof(*hdr), len);
2136
		break;
2137
	case MGMT_OP_GET_CONNECTIONS:
2138
		err = get_connections(sk, index);
2139
		break;
2140
	case MGMT_OP_PIN_CODE_REPLY:
2141
		err = pin_code_reply(sk, index, buf + sizeof(*hdr), len);
2142 2143
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2144
		err = pin_code_neg_reply(sk, index, buf + sizeof(*hdr), len);
2145
		break;
2146
	case MGMT_OP_SET_IO_CAPABILITY:
2147
		err = set_io_capability(sk, index, buf + sizeof(*hdr), len);
2148
		break;
2149
	case MGMT_OP_PAIR_DEVICE:
2150
		err = pair_device(sk, index, buf + sizeof(*hdr), len);
2151
		break;
2152
	case MGMT_OP_USER_CONFIRM_REPLY:
2153
		err = user_confirm_reply(sk, index, buf + sizeof(*hdr), len);
2154 2155
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2156 2157
		err = user_confirm_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2158
		break;
2159 2160 2161 2162 2163 2164 2165
	case MGMT_OP_USER_PASSKEY_REPLY:
		err = user_passkey_reply(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
		err = user_passkey_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
		break;
2166 2167 2168
	case MGMT_OP_SET_LOCAL_NAME:
		err = set_local_name(sk, index, buf + sizeof(*hdr), len);
		break;
2169 2170 2171
	case MGMT_OP_READ_LOCAL_OOB_DATA:
		err = read_local_oob_data(sk, index);
		break;
2172 2173 2174 2175 2176 2177 2178
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
		err = add_remote_oob_data(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
		err = remove_remote_oob_data(sk, index, buf + sizeof(*hdr),
									len);
		break;
2179
	case MGMT_OP_START_DISCOVERY:
2180
		err = start_discovery(sk, index, buf + sizeof(*hdr), len);
2181 2182 2183 2184
		break;
	case MGMT_OP_STOP_DISCOVERY:
		err = stop_discovery(sk, index);
		break;
2185 2186 2187 2188 2189 2190
	case MGMT_OP_BLOCK_DEVICE:
		err = block_device(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
		err = unblock_device(sk, index, buf + sizeof(*hdr), len);
		break;
2191 2192 2193 2194
	case MGMT_OP_SET_FAST_CONNECTABLE:
		err = set_fast_connectable(sk, index, buf + sizeof(*hdr),
								len);
		break;
2195 2196
	default:
		BT_DBG("Unknown op %u", opcode);
2197 2198
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2199 2200 2201
		break;
	}

2202 2203 2204
	if (err < 0)
		goto done;

2205 2206 2207 2208 2209 2210
	err = msglen;

done:
	kfree(buf);
	return err;
}
2211

2212 2213 2214 2215 2216 2217 2218 2219
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2220
int mgmt_index_added(struct hci_dev *hdev)
2221
{
2222
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2223 2224
}

2225
int mgmt_index_removed(struct hci_dev *hdev)
2226
{
2227 2228
	u8 status = ENODEV;

2229
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2230

2231
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2232 2233
}

2234
struct cmd_lookup {
2235
	u8 val;
2236 2237 2238
	struct sock *sk;
};

2239
static void mode_rsp(struct pending_cmd *cmd, void *data)
2240
{
2241
	struct mgmt_mode *cp = cmd->param;
2242
	struct cmd_lookup *match = data;
2243

2244
	if (cp->val != match->val)
2245 2246
		return;

2247
	send_mode_rsp(cmd->sk, cmd->opcode, cmd->index, cp->val);
2248 2249 2250 2251 2252 2253 2254 2255 2256

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2257
}
2258

2259
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2260
{
2261
	struct mgmt_mode ev;
2262
	struct cmd_lookup match = { powered, NULL };
2263
	int ret;
2264

2265
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, mode_rsp, &match);
2266

2267 2268
	if (!powered) {
		u8 status = ENETDOWN;
2269
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2270 2271
	}

2272
	ev.val = powered;
2273

2274
	ret = mgmt_event(MGMT_EV_POWERED, hdev, &ev, sizeof(ev), match.sk);
2275 2276 2277 2278 2279

	if (match.sk)
		sock_put(match.sk);

	return ret;
2280
}
2281

2282
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2283
{
2284
	struct mgmt_mode ev;
2285 2286 2287
	struct cmd_lookup match = { discoverable, NULL };
	int ret;

2288
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, mode_rsp, &match);
2289 2290

	ev.val = discoverable;
2291

2292
	ret = mgmt_event(MGMT_EV_DISCOVERABLE, hdev, &ev, sizeof(ev),
2293
								match.sk);
2294 2295 2296 2297 2298 2299

	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2300

2301
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2302
{
2303
	struct mgmt_mode ev;
2304 2305 2306
	struct cmd_lookup match = { connectable, NULL };
	int ret;

2307
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, mode_rsp, &match);
2308

2309
	ev.val = connectable;
2310

2311
	ret = mgmt_event(MGMT_EV_CONNECTABLE, hdev, &ev, sizeof(ev), match.sk);
2312 2313 2314 2315 2316 2317

	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2318

2319
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2320
{
2321 2322
	u8 mgmt_err = mgmt_status(status);

2323
	if (scan & SCAN_PAGE)
2324
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
2325
						cmd_status_rsp, &mgmt_err);
2326 2327

	if (scan & SCAN_INQUIRY)
2328
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
2329
						cmd_status_rsp, &mgmt_err);
2330 2331 2332 2333

	return 0;
}

2334 2335
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
2336
{
2337
	struct mgmt_ev_new_link_key ev;
2338

2339
	memset(&ev, 0, sizeof(ev));
2340

2341 2342 2343 2344 2345
	ev.store_hint = persistent;
	bacpy(&ev.key.bdaddr, &key->bdaddr);
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
2346

2347
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
2348
}
2349

2350 2351
int mgmt_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
								u8 addr_type)
2352
{
2353
	struct mgmt_addr_info ev;
2354 2355

	bacpy(&ev.bdaddr, bdaddr);
2356
	ev.type = link_to_mgmt(link_type, addr_type);
2357

2358
	return mgmt_event(MGMT_EV_CONNECTED, hdev, &ev, sizeof(ev), NULL);
2359 2360
}

2361 2362
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
2363
	struct mgmt_cp_disconnect *cp = cmd->param;
2364
	struct sock **sk = data;
2365
	struct mgmt_rp_disconnect rp;
2366

2367
	bacpy(&rp.bdaddr, &cp->bdaddr);
2368
	rp.status = 0;
2369

2370
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, &rp, sizeof(rp));
2371 2372 2373 2374

	*sk = cmd->sk;
	sock_hold(*sk);

2375
	mgmt_pending_remove(cmd);
2376 2377
}

2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394
static void remove_keys_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;
	struct mgmt_cp_remove_keys *cp = cmd->param;
	struct mgmt_rp_remove_keys rp;

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
	if (status != NULL)
		rp.status = *status;

	cmd_complete(cmd->sk, cmd->index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));

	mgmt_pending_remove(cmd);
}

2395 2396
int mgmt_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
								u8 addr_type)
2397
{
2398
	struct mgmt_addr_info ev;
2399 2400 2401
	struct sock *sk = NULL;
	int err;

2402
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
2403 2404

	bacpy(&ev.bdaddr, bdaddr);
2405
	ev.type = link_to_mgmt(link_type, addr_type);
2406

2407
	err = mgmt_event(MGMT_EV_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
2408 2409 2410 2411

	if (sk)
		sock_put(sk);

2412 2413
	mgmt_pending_foreach(MGMT_OP_REMOVE_KEYS, hdev, remove_keys_rsp, NULL);

2414 2415 2416
	return err;
}

2417
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2418 2419
{
	struct pending_cmd *cmd;
2420
	u8 mgmt_err = mgmt_status(status);
2421 2422
	int err;

2423
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
2424 2425 2426
	if (!cmd)
		return -ENOENT;

2427 2428 2429 2430 2431 2432 2433 2434 2435 2436
	if (bdaddr) {
		struct mgmt_rp_disconnect rp;

		bacpy(&rp.bdaddr, bdaddr);
		rp.status = status;

		err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
							&rp, sizeof(rp));
	} else
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_DISCONNECT,
2437
								mgmt_err);
2438

2439
	mgmt_pending_remove(cmd);
2440 2441

	return err;
2442
}
2443

2444 2445
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
2446 2447 2448
{
	struct mgmt_ev_connect_failed ev;

2449
	bacpy(&ev.addr.bdaddr, bdaddr);
2450
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2451
	ev.status = mgmt_status(status);
2452

2453
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
2454
}
2455

2456
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
2457 2458 2459 2460
{
	struct mgmt_ev_pin_code_request ev;

	bacpy(&ev.bdaddr, bdaddr);
2461
	ev.secure = secure;
2462

2463
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
2464
									NULL);
2465 2466
}

2467 2468
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2469 2470
{
	struct pending_cmd *cmd;
2471
	struct mgmt_rp_pin_code_reply rp;
2472 2473
	int err;

2474
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
2475 2476 2477
	if (!cmd)
		return -ENOENT;

2478
	bacpy(&rp.bdaddr, bdaddr);
2479
	rp.status = mgmt_status(status);
2480

2481
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, &rp,
2482
								sizeof(rp));
2483

2484
	mgmt_pending_remove(cmd);
2485 2486 2487 2488

	return err;
}

2489 2490
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2491 2492
{
	struct pending_cmd *cmd;
2493
	struct mgmt_rp_pin_code_reply rp;
2494 2495
	int err;

2496
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
2497 2498 2499
	if (!cmd)
		return -ENOENT;

2500
	bacpy(&rp.bdaddr, bdaddr);
2501
	rp.status = mgmt_status(status);
2502

2503
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY, &rp,
2504
								sizeof(rp));
2505

2506
	mgmt_pending_remove(cmd);
2507 2508 2509

	return err;
}
2510

2511 2512
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						__le32 value, u8 confirm_hint)
2513 2514 2515
{
	struct mgmt_ev_user_confirm_request ev;

2516
	BT_DBG("%s", hdev->name);
2517 2518

	bacpy(&ev.bdaddr, bdaddr);
2519
	ev.confirm_hint = confirm_hint;
2520 2521
	put_unaligned_le32(value, &ev.value);

2522
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
2523
									NULL);
2524 2525
}

2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr)
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.bdaddr, bdaddr);

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

2538
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
2539
							u8 status, u8 opcode)
2540 2541 2542 2543 2544
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

2545
	cmd = mgmt_pending_find(opcode, hdev);
2546 2547 2548 2549
	if (!cmd)
		return -ENOENT;

	bacpy(&rp.bdaddr, bdaddr);
2550
	rp.status = mgmt_status(status);
2551
	err = cmd_complete(cmd->sk, hdev->id, opcode, &rp, sizeof(rp));
2552

2553
	mgmt_pending_remove(cmd);
2554 2555 2556 2557

	return err;
}

2558 2559
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2560
{
2561
	return user_pairing_resp_complete(hdev, bdaddr, status,
2562 2563 2564
						MGMT_OP_USER_CONFIRM_REPLY);
}

2565 2566
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
2567
{
2568
	return user_pairing_resp_complete(hdev, bdaddr, status,
2569 2570
					MGMT_OP_USER_CONFIRM_NEG_REPLY);
}
2571

2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
						MGMT_OP_USER_PASSKEY_REPLY);
}

int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
					MGMT_OP_USER_PASSKEY_NEG_REPLY);
}

2586
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2587 2588 2589 2590
{
	struct mgmt_ev_auth_failed ev;

	bacpy(&ev.bdaddr, bdaddr);
2591
	ev.status = mgmt_status(status);
2592

2593
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
2594
}
2595

2596
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
2597 2598 2599 2600 2601 2602 2603 2604
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
	int err;

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2605
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2606 2607 2608 2609
	if (!cmd)
		goto send_event;

	if (status) {
2610
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2611
							mgmt_status(status));
2612 2613 2614
		goto failed;
	}

2615
	update_eir(hdev);
2616

2617
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, &ev,
2618 2619 2620 2621 2622
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
2623
	err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
2624 2625 2626 2627 2628 2629 2630
							cmd ? cmd->sk : NULL);

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
2631

2632 2633
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
2634 2635 2636 2637
{
	struct pending_cmd *cmd;
	int err;

2638
	BT_DBG("%s status %u", hdev->name, status);
2639

2640
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
2641 2642 2643 2644
	if (!cmd)
		return -ENOENT;

	if (status) {
2645
		err = cmd_status(cmd->sk, hdev->id,
2646 2647
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
2648 2649 2650 2651 2652 2653
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

2654 2655 2656
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
						&rp, sizeof(rp));
2657 2658 2659 2660 2661 2662
	}

	mgmt_pending_remove(cmd);

	return err;
}
2663

2664 2665
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
				u8 addr_type, u8 *dev_class, s8 rssi, u8 *eir)
2666 2667 2668 2669 2670
{
	struct mgmt_ev_device_found ev;

	memset(&ev, 0, sizeof(ev));

2671
	bacpy(&ev.addr.bdaddr, bdaddr);
2672
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2673 2674 2675 2676 2677
	ev.rssi = rssi;

	if (eir)
		memcpy(ev.eir, eir, sizeof(ev.eir));

2678 2679 2680
	if (dev_class)
		memcpy(ev.dev_class, dev_class, sizeof(ev.dev_class));

2681
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, &ev, sizeof(ev), NULL);
2682
}
2683

2684
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 *name)
2685 2686 2687 2688 2689 2690 2691 2692
{
	struct mgmt_ev_remote_name ev;

	memset(&ev, 0, sizeof(ev));

	bacpy(&ev.bdaddr, bdaddr);
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2693
	return mgmt_event(MGMT_EV_REMOTE_NAME, hdev, &ev, sizeof(ev), NULL);
2694
}
2695

2696
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
2697 2698 2699 2700
{
	struct pending_cmd *cmd;
	int err;

2701
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2702 2703 2704
	if (!cmd)
		return -ENOENT;

2705
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2706 2707 2708 2709 2710
	mgmt_pending_remove(cmd);

	return err;
}

2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, status);
	mgmt_pending_remove(cmd);

	return err;
}

2726
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
2727
{
2728 2729 2730
	struct pending_cmd *cmd;

	if (discovering)
2731
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2732
	else
2733
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
2734 2735

	if (cmd != NULL) {
2736
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, NULL, 0);
2737 2738 2739
		mgmt_pending_remove(cmd);
	}

2740
	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &discovering,
2741 2742
						sizeof(discovering), NULL);
}
2743

2744
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2745 2746 2747 2748
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

2749
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
2750 2751 2752

	bacpy(&ev.bdaddr, bdaddr);

2753 2754
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2755 2756
}

2757
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2758 2759 2760 2761
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

2762
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
2763 2764 2765

	bacpy(&ev.bdaddr, bdaddr);

2766 2767
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2768
}