mgmt.c 65.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2010  Nokia Corporation

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

25
#include <linux/kernel.h>
26
#include <linux/uaccess.h>
27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36 37
#define MGMT_VERSION	0
#define MGMT_REVISION	1

A
Andre Guedes 已提交
38 39
#define INQUIRY_LEN_BREDR 0x08 /* TGAP(100) */

40 41
#define SERVICE_CACHE_TIMEOUT (5 * 1000)

42 43
struct pending_cmd {
	struct list_head list;
44
	u16 opcode;
45
	int index;
46
	void *param;
47
	struct sock *sk;
48
	void *user_data;
49 50
};

51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

124
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
125 126 127 128
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
129
	int err;
130

131
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
132 133 134 135 136 137 138 139

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
140
	hdr->index = cpu_to_le16(index);
141 142 143 144 145 146
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

147 148
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
149 150
		kfree_skb(skb);

151
	return err;
152 153
}

154 155
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, void *rp,
								size_t rp_len)
156 157 158 159
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
160
	int err;
161 162 163

	BT_DBG("sock %p", sk);

164
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
165 166 167 168 169
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

170
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
171
	hdr->index = cpu_to_le16(index);
172
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
173

174 175
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
176 177 178

	if (rp)
		memcpy(ev->data, rp, rp_len);
179

180 181
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
182 183
		kfree_skb(skb);

184
	return err;;
185 186
}

187 188 189 190 191 192 193 194 195
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

196 197
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, &rp,
								sizeof(rp));
198 199
}

200 201 202 203
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
204
	struct hci_dev *d;
205
	size_t rp_len;
206
	u16 count;
207
	int i, err;
208 209 210 211 212 213 214 215 216 217

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

218 219 220
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
221
		read_unlock(&hci_dev_list_lock);
222
		return -ENOMEM;
223
	}
224 225 226 227

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
228
	list_for_each_entry(d, &hci_dev_list, list) {
229
		if (test_and_clear_bit(HCI_AUTO_OFF, &d->dev_flags))
230
			cancel_delayed_work(&d->power_off);
231

232
		if (test_bit(HCI_SETUP, &d->dev_flags))
233 234
			continue;

235 236 237 238 239 240
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

241 242
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, rp,
									rp_len);
243

244 245 246
	kfree(rp);

	return err;
247 248
}

249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_FAST_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
	settings |= MGMT_SETTING_PAIRABLE;

	if (hdev->features[6] & LMP_SIMPLE_PAIR)
		settings |= MGMT_SETTING_SSP;

	if (!(hdev->features[4] & LMP_NO_BREDR)) {
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

	if (hdev->features[4] & LMP_LE)
		settings |= MGMT_SETTING_LE;

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	if (test_bit(HCI_UP, &hdev->flags))
		settings |= MGMT_SETTING_POWERED;
	else
		return settings;

	if (test_bit(HCI_PSCAN, &hdev->flags))
		settings |= MGMT_SETTING_CONNECTABLE;

	if (test_bit(HCI_ISCAN, &hdev->flags))
		settings |= MGMT_SETTING_DISCOVERABLE;

288
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
289 290 291 292 293
		settings |= MGMT_SETTING_PAIRABLE;

	if (!(hdev->features[4] & LMP_NO_BREDR))
		settings |= MGMT_SETTING_BREDR;

A
Andre Guedes 已提交
294
	if (hdev->host_features[0] & LMP_HOST_LE)
295 296 297 298 299 300 301 302 303 304 305
		settings |= MGMT_SETTING_LE;

	if (test_bit(HCI_AUTH, &hdev->flags))
		settings |= MGMT_SETTING_LINK_SECURITY;

	if (hdev->ssp_mode > 0)
		settings |= MGMT_SETTING_SSP;

	return settings;
}

306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421
#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

	if (hdev->ssp_mode == 0)
		return 0;

422
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];

	BT_DBG("%s", hdev->name);

454
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
455 456 457 458 459 460 461 462 463 464 465 466
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
}

467 468 469 470 471
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
							service_cache.work);

472
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
473 474 475 476 477 478 479 480 481 482 483 484
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

static void mgmt_init_hdev(struct hci_dev *hdev)
{
485
	if (!test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
486 487
		INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);

488
	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
489 490 491 492
		schedule_delayed_work(&hdev->service_cache,
				msecs_to_jiffies(SERVICE_CACHE_TIMEOUT));
}

493
static int read_controller_info(struct sock *sk, u16 index)
494
{
495
	struct mgmt_rp_read_info rp;
496
	struct hci_dev *hdev;
497

498
	BT_DBG("sock %p hci%u", sk, index);
499

500
	hdev = hci_dev_get(index);
501
	if (!hdev)
502 503
		return cmd_status(sk, index, MGMT_OP_READ_INFO,
						MGMT_STATUS_INVALID_PARAMS);
504

505
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags))
506
		cancel_delayed_work_sync(&hdev->power_off);
507

508
	hci_dev_lock(hdev);
509

510 511
	if (test_and_clear_bit(HCI_PI_MGMT_INIT, &hci_pi(sk)->flags))
		mgmt_init_hdev(hdev);
512

513 514
	memset(&rp, 0, sizeof(rp));

515
	bacpy(&rp.bdaddr, &hdev->bdaddr);
516

517
	rp.version = hdev->hci_ver;
518

519 520 521 522
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
523

524
	memcpy(rp.dev_class, hdev->dev_class, 3);
525

526 527
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));

528
	hci_dev_unlock(hdev);
529
	hci_dev_put(hdev);
530

531
	return cmd_complete(sk, index, MGMT_OP_READ_INFO, &rp, sizeof(rp));
532 533
}

534 535 536
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
537
	kfree(cmd->param);
538 539 540
	kfree(cmd);
}

541
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
542 543
							struct hci_dev *hdev,
							void *data, u16 len)
544 545 546 547 548
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
549
		return NULL;
550 551

	cmd->opcode = opcode;
552
	cmd->index = hdev->id;
553

554 555
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
556
		kfree(cmd);
557
		return NULL;
558 559
	}

560 561
	if (data)
		memcpy(cmd->param, data, len);
562 563 564 565

	cmd->sk = sk;
	sock_hold(sk);

566
	list_add(&cmd->list, &hdev->mgmt_pending);
567

568
	return cmd;
569 570
}

571
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
572 573 574 575 576
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

577
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
578 579 580 581
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

582
		if (opcode > 0 && cmd->opcode != opcode)
583 584 585 586 587 588
			continue;

		cb(cmd, data);
	}
}

589
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
590
{
591
	struct pending_cmd *cmd;
592

593
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
594 595
		if (cmd->opcode == opcode)
			return cmd;
596 597 598 599 600
	}

	return NULL;
}

601
static void mgmt_pending_remove(struct pending_cmd *cmd)
602 603 604 605 606
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

607
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
608
{
609
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
610

611
	return cmd_complete(sk, hdev->id, opcode, &settings, sizeof(settings));
612 613
}

614
static int set_powered(struct sock *sk, u16 index, unsigned char *data, u16 len)
615
{
616
	struct mgmt_mode *cp;
617
	struct hci_dev *hdev;
618 619
	struct pending_cmd *cmd;
	int err, up;
620 621 622

	cp = (void *) data;

623
	BT_DBG("request for hci%u", index);
624

625
	if (len != sizeof(*cp))
626 627
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
628

629
	hdev = hci_dev_get(index);
630
	if (!hdev)
631 632
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
633

634
	hci_dev_lock(hdev);
635 636

	up = test_bit(HCI_UP, &hdev->flags);
637
	if ((cp->val && up) || (!cp->val && !up)) {
638
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
639 640 641
		goto failed;
	}

642
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
643 644
		err = cmd_status(sk, index, MGMT_OP_SET_POWERED,
							MGMT_STATUS_BUSY);
645 646 647
		goto failed;
	}

648
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
649 650
	if (!cmd) {
		err = -ENOMEM;
651
		goto failed;
652
	}
653

654
	if (cp->val)
655
		schedule_work(&hdev->power_on);
656
	else
657
		schedule_work(&hdev->power_off.work);
658

659
	err = 0;
660 661

failed:
662
	hci_dev_unlock(hdev);
663
	hci_dev_put(hdev);
664
	return err;
665 666
}

667 668
static int set_discoverable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
669
{
670
	struct mgmt_cp_set_discoverable *cp;
671
	struct hci_dev *hdev;
672
	struct pending_cmd *cmd;
673 674 675 676 677
	u8 scan;
	int err;

	cp = (void *) data;

678
	BT_DBG("request for hci%u", index);
679

680
	if (len != sizeof(*cp))
681 682
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
683

684
	hdev = hci_dev_get(index);
685
	if (!hdev)
686 687
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
688

689
	hci_dev_lock(hdev);
690 691

	if (!test_bit(HCI_UP, &hdev->flags)) {
692 693
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_NOT_POWERED);
694 695 696
		goto failed;
	}

697 698
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
699 700
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
							MGMT_STATUS_BUSY);
701 702 703
		goto failed;
	}

704
	if (cp->val == test_bit(HCI_ISCAN, &hdev->flags) &&
705
					test_bit(HCI_PSCAN, &hdev->flags)) {
706
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
707 708 709
		goto failed;
	}

710
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
711 712
	if (!cmd) {
		err = -ENOMEM;
713
		goto failed;
714
	}
715 716 717

	scan = SCAN_PAGE;

718
	if (cp->val)
719
		scan |= SCAN_INQUIRY;
720
	else
721
		cancel_delayed_work(&hdev->discov_off);
722 723 724

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
725
		mgmt_pending_remove(cmd);
726

727 728 729
	if (cp->val)
		hdev->discov_timeout = get_unaligned_le16(&cp->timeout);

730
failed:
731
	hci_dev_unlock(hdev);
732 733 734 735 736
	hci_dev_put(hdev);

	return err;
}

737 738
static int set_connectable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
739
{
740
	struct mgmt_mode *cp;
741
	struct hci_dev *hdev;
742
	struct pending_cmd *cmd;
743 744 745 746 747
	u8 scan;
	int err;

	cp = (void *) data;

748
	BT_DBG("request for hci%u", index);
749

750
	if (len != sizeof(*cp))
751 752
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
753

754
	hdev = hci_dev_get(index);
755
	if (!hdev)
756 757
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
758

759
	hci_dev_lock(hdev);
760 761

	if (!test_bit(HCI_UP, &hdev->flags)) {
762 763
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_NOT_POWERED);
764 765 766
		goto failed;
	}

767 768
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
769 770
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
							MGMT_STATUS_BUSY);
771 772 773
		goto failed;
	}

774
	if (cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
775
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
776 777 778
		goto failed;
	}

779
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
780 781
	if (!cmd) {
		err = -ENOMEM;
782
		goto failed;
783
	}
784

785
	if (cp->val)
786 787 788 789 790 791
		scan = SCAN_PAGE;
	else
		scan = 0;

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
792
		mgmt_pending_remove(cmd);
793 794

failed:
795
	hci_dev_unlock(hdev);
796 797 798 799 800
	hci_dev_put(hdev);

	return err;
}

801 802
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
803 804 805 806 807 808 809 810 811 812 813 814
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	bt_cb(skb)->channel = HCI_CHANNEL_CONTROL;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
815 816 817 818
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
819 820
	hdr->len = cpu_to_le16(data_len);

821 822
	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);
823 824 825 826 827 828 829

	hci_send_to_sock(NULL, skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

830 831
static int set_pairable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
832
{
833
	struct mgmt_mode *cp;
834
	struct hci_dev *hdev;
835
	__le32 ev;
836 837 838 839
	int err;

	cp = (void *) data;

840
	BT_DBG("request for hci%u", index);
841

842
	if (len != sizeof(*cp))
843 844
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
845

846
	hdev = hci_dev_get(index);
847
	if (!hdev)
848 849
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
850

851
	hci_dev_lock(hdev);
852 853

	if (cp->val)
854
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
855
	else
856
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
857

858
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
859 860 861
	if (err < 0)
		goto failed;

862
	ev = cpu_to_le32(get_current_settings(hdev));
863

864
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), sk);
865 866

failed:
867
	hci_dev_unlock(hdev);
868 869 870 871 872
	hci_dev_put(hdev);

	return err;
}

873
static int add_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
874 875 876 877 878 879 880 881
{
	struct mgmt_cp_add_uuid *cp;
	struct hci_dev *hdev;
	struct bt_uuid *uuid;
	int err;

	cp = (void *) data;

882
	BT_DBG("request for hci%u", index);
883

884
	if (len != sizeof(*cp))
885 886
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
887

888
	hdev = hci_dev_get(index);
889
	if (!hdev)
890 891
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
892

893
	hci_dev_lock(hdev);
894 895 896 897 898 899 900 901

	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
902
	uuid->svc_hint = cp->svc_hint;
903 904 905

	list_add(&uuid->list, &hdev->uuids);

906 907 908 909
	err = update_class(hdev);
	if (err < 0)
		goto failed;

910 911 912 913
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

914
	err = cmd_complete(sk, index, MGMT_OP_ADD_UUID, NULL, 0);
915 916

failed:
917
	hci_dev_unlock(hdev);
918 919 920 921 922
	hci_dev_put(hdev);

	return err;
}

923
static int remove_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
924 925
{
	struct list_head *p, *n;
926
	struct mgmt_cp_remove_uuid *cp;
927 928 929 930 931 932
	struct hci_dev *hdev;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

	cp = (void *) data;

933
	BT_DBG("request for hci%u", index);
934

935
	if (len != sizeof(*cp))
936 937
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
938

939
	hdev = hci_dev_get(index);
940
	if (!hdev)
941 942
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
943

944
	hci_dev_lock(hdev);
945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963

	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
		goto unlock;
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
964 965
		err = cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
966 967 968
		goto unlock;
	}

969 970 971 972
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

973 974 975 976
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

977
	err = cmd_complete(sk, index, MGMT_OP_REMOVE_UUID, NULL, 0);
978 979

unlock:
980
	hci_dev_unlock(hdev);
981 982 983 984 985
	hci_dev_put(hdev);

	return err;
}

986 987
static int set_dev_class(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
988 989 990 991 992 993 994
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_dev_class *cp;
	int err;

	cp = (void *) data;

995
	BT_DBG("request for hci%u", index);
996

997
	if (len != sizeof(*cp))
998 999
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1000

1001
	hdev = hci_dev_get(index);
1002
	if (!hdev)
1003 1004
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1005

1006
	hci_dev_lock(hdev);
1007 1008 1009 1010

	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1011
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1012 1013 1014
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1015
		update_eir(hdev);
1016
	}
1017

1018 1019 1020
	err = update_class(hdev);

	if (err == 0)
1021
		err = cmd_complete(sk, index, MGMT_OP_SET_DEV_CLASS, NULL, 0);
1022

1023
	hci_dev_unlock(hdev);
1024 1025 1026 1027 1028
	hci_dev_put(hdev);

	return err;
}

1029 1030
static int load_link_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1031 1032
{
	struct hci_dev *hdev;
1033
	struct mgmt_cp_load_link_keys *cp;
1034
	u16 key_count, expected_len;
1035
	int i;
1036 1037

	cp = (void *) data;
1038 1039

	if (len < sizeof(*cp))
1040 1041
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1042

1043 1044
	key_count = get_unaligned_le16(&cp->key_count);

1045 1046
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1047
	if (expected_len != len) {
1048
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1049
							len, expected_len);
1050 1051
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1052 1053
	}

1054
	hdev = hci_dev_get(index);
1055
	if (!hdev)
1056 1057
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1058

1059
	BT_DBG("hci%u debug_keys %u key_count %u", index, cp->debug_keys,
1060 1061
								key_count);

1062
	hci_dev_lock(hdev);
1063 1064 1065

	hci_link_keys_clear(hdev);

1066
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1067 1068

	if (cp->debug_keys)
1069
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1070
	else
1071
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1072

1073
	for (i = 0; i < key_count; i++) {
1074
		struct mgmt_link_key_info *key = &cp->keys[i];
1075

1076
		hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type,
1077 1078 1079
								key->pin_len);
	}

1080 1081
	cmd_complete(sk, index, MGMT_OP_LOAD_LINK_KEYS, NULL, 0);

1082
	hci_dev_unlock(hdev);
1083 1084
	hci_dev_put(hdev);

1085
	return 0;
1086 1087
}

1088 1089
static int remove_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1090 1091
{
	struct hci_dev *hdev;
1092
	struct mgmt_cp_remove_keys *cp;
1093 1094 1095
	struct mgmt_rp_remove_keys rp;
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1096 1097 1098 1099 1100
	struct hci_conn *conn;
	int err;

	cp = (void *) data;

1101
	if (len != sizeof(*cp))
1102 1103
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1104

1105
	hdev = hci_dev_get(index);
1106
	if (!hdev)
1107 1108
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1109

1110
	hci_dev_lock(hdev);
1111

1112 1113
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
1114
	rp.status = MGMT_STATUS_FAILED;
1115

1116 1117
	err = hci_remove_link_key(hdev, &cp->bdaddr);
	if (err < 0) {
1118
		rp.status = MGMT_STATUS_NOT_PAIRED;
1119 1120 1121
		goto unlock;
	}

1122 1123 1124
	if (!test_bit(HCI_UP, &hdev->flags) || !cp->disconnect) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1125
		goto unlock;
1126
	}
1127 1128

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1129 1130 1131 1132 1133
	if (!conn) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
		goto unlock;
	}
1134

1135 1136 1137 1138
	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_KEYS, hdev, cp, sizeof(*cp));
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1139 1140
	}

1141 1142 1143 1144 1145 1146
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1147
unlock:
1148
	if (err < 0)
1149 1150
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1151
	hci_dev_unlock(hdev);
1152 1153 1154 1155 1156
	hci_dev_put(hdev);

	return err;
}

1157
static int disconnect(struct sock *sk, u16 index, unsigned char *data, u16 len)
1158 1159 1160 1161
{
	struct hci_dev *hdev;
	struct mgmt_cp_disconnect *cp;
	struct hci_cp_disconnect dc;
1162
	struct pending_cmd *cmd;
1163 1164 1165 1166 1167 1168 1169
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1170
	if (len != sizeof(*cp))
1171 1172
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1173

1174
	hdev = hci_dev_get(index);
1175
	if (!hdev)
1176 1177
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1178

1179
	hci_dev_lock(hdev);
1180 1181

	if (!test_bit(HCI_UP, &hdev->flags)) {
1182 1183
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_POWERED);
1184 1185 1186
		goto failed;
	}

1187
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1188 1189
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
							MGMT_STATUS_BUSY);
1190 1191 1192 1193
		goto failed;
	}

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1194 1195 1196
	if (!conn)
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->bdaddr);

1197
	if (!conn) {
1198 1199
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_CONNECTED);
1200 1201 1202
		goto failed;
	}

1203
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1204 1205
	if (!cmd) {
		err = -ENOMEM;
1206
		goto failed;
1207
	}
1208 1209 1210 1211 1212 1213

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1214
		mgmt_pending_remove(cmd);
1215 1216

failed:
1217
	hci_dev_unlock(hdev);
1218 1219 1220 1221 1222
	hci_dev_put(hdev);

	return err;
}

1223
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1224 1225 1226
{
	switch (link_type) {
	case LE_LINK:
1227 1228 1229 1230 1231 1232 1233 1234
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1235 1236 1237 1238 1239 1240 1241
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1242
static int get_connections(struct sock *sk, u16 index)
1243 1244 1245
{
	struct mgmt_rp_get_connections *rp;
	struct hci_dev *hdev;
1246
	struct hci_conn *c;
1247
	struct list_head *p;
1248
	size_t rp_len;
1249
	u16 count;
1250 1251 1252 1253
	int i, err;

	BT_DBG("");

1254
	hdev = hci_dev_get(index);
1255
	if (!hdev)
1256 1257
		return cmd_status(sk, index, MGMT_OP_GET_CONNECTIONS,
						MGMT_STATUS_INVALID_PARAMS);
1258

1259
	hci_dev_lock(hdev);
1260 1261 1262 1263 1264 1265

	count = 0;
	list_for_each(p, &hdev->conn_hash.list) {
		count++;
	}

1266
	rp_len = sizeof(*rp) + (count * sizeof(struct mgmt_addr_info));
1267 1268
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1269 1270 1271 1272 1273 1274 1275
		err = -ENOMEM;
		goto unlock;
	}

	put_unaligned_le16(count, &rp->conn_count);

	i = 0;
1276 1277
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1278
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1279 1280 1281 1282 1283 1284 1285
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1286

1287
	err = cmd_complete(sk, index, MGMT_OP_GET_CONNECTIONS, rp, rp_len);
1288 1289

unlock:
1290
	kfree(rp);
1291
	hci_dev_unlock(hdev);
1292 1293 1294 1295
	hci_dev_put(hdev);
	return err;
}

1296 1297 1298 1299 1300 1301
static int send_pin_code_neg_reply(struct sock *sk, u16 index,
		struct hci_dev *hdev, struct mgmt_cp_pin_code_neg_reply *cp)
{
	struct pending_cmd *cmd;
	int err;

1302
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, sizeof(cp->bdaddr),
								&cp->bdaddr);
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1315 1316
static int pin_code_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1317 1318
{
	struct hci_dev *hdev;
1319
	struct hci_conn *conn;
1320
	struct mgmt_cp_pin_code_reply *cp;
1321
	struct mgmt_cp_pin_code_neg_reply ncp;
1322
	struct hci_cp_pin_code_reply reply;
1323
	struct pending_cmd *cmd;
1324 1325 1326 1327 1328 1329
	int err;

	BT_DBG("");

	cp = (void *) data;

1330
	if (len != sizeof(*cp))
1331 1332
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1333

1334
	hdev = hci_dev_get(index);
1335
	if (!hdev)
1336 1337
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1338

1339
	hci_dev_lock(hdev);
1340 1341

	if (!test_bit(HCI_UP, &hdev->flags)) {
1342 1343
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_POWERED);
1344 1345 1346
		goto failed;
	}

1347 1348
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
	if (!conn) {
1349 1350
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_CONNECTED);
1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
		bacpy(&ncp.bdaddr, &cp->bdaddr);

		BT_ERR("PIN code is not 16 bytes long");

		err = send_pin_code_neg_reply(sk, index, hdev, &ncp);
		if (err >= 0)
			err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
1362
						MGMT_STATUS_INVALID_PARAMS);
1363 1364 1365 1366

		goto failed;
	}

1367
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1368 1369
	if (!cmd) {
		err = -ENOMEM;
1370
		goto failed;
1371
	}
1372 1373 1374

	bacpy(&reply.bdaddr, &cp->bdaddr);
	reply.pin_len = cp->pin_len;
1375
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1376 1377 1378

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1379
		mgmt_pending_remove(cmd);
1380 1381

failed:
1382
	hci_dev_unlock(hdev);
1383 1384 1385 1386 1387
	hci_dev_put(hdev);

	return err;
}

1388 1389
static int pin_code_neg_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1390 1391 1392 1393 1394 1395 1396 1397 1398
{
	struct hci_dev *hdev;
	struct mgmt_cp_pin_code_neg_reply *cp;
	int err;

	BT_DBG("");

	cp = (void *) data;

1399 1400
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1401
						MGMT_STATUS_INVALID_PARAMS);
1402

1403
	hdev = hci_dev_get(index);
1404
	if (!hdev)
1405
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1406
						MGMT_STATUS_INVALID_PARAMS);
1407

1408
	hci_dev_lock(hdev);
1409 1410

	if (!test_bit(HCI_UP, &hdev->flags)) {
1411
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1412
						MGMT_STATUS_NOT_POWERED);
1413 1414 1415
		goto failed;
	}

1416
	err = send_pin_code_neg_reply(sk, index, hdev, cp);
1417 1418

failed:
1419
	hci_dev_unlock(hdev);
1420 1421 1422 1423 1424
	hci_dev_put(hdev);

	return err;
}

1425 1426
static int set_io_capability(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1427 1428 1429 1430 1431 1432 1433 1434
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_io_capability *cp;

	BT_DBG("");

	cp = (void *) data;

1435
	if (len != sizeof(*cp))
1436 1437
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1438

1439
	hdev = hci_dev_get(index);
1440
	if (!hdev)
1441 1442
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1443

1444
	hci_dev_lock(hdev);
1445 1446 1447 1448

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1449
							hdev->io_capability);
1450

1451
	hci_dev_unlock(hdev);
1452 1453
	hci_dev_put(hdev);

1454
	return cmd_complete(sk, index, MGMT_OP_SET_IO_CAPABILITY, NULL, 0);
1455 1456
}

1457 1458 1459
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1460
	struct pending_cmd *cmd;
1461

1462
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1480 1481
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1482 1483
	rp.status = status;

1484
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, &rp, sizeof(rp));
1485 1486 1487 1488 1489 1490 1491 1492

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1493
	mgmt_pending_remove(cmd);
1494 1495 1496 1497 1498 1499 1500 1501 1502
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1503
	if (!cmd)
1504
		BT_DBG("Unable to find a pending command");
1505 1506
	else
		pairing_complete(cmd, status);
1507 1508
}

1509
static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len)
1510 1511 1512
{
	struct hci_dev *hdev;
	struct mgmt_cp_pair_device *cp;
1513
	struct mgmt_rp_pair_device rp;
1514 1515 1516 1517 1518 1519 1520 1521 1522
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1523
	if (len != sizeof(*cp))
1524 1525
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1526

1527
	hdev = hci_dev_get(index);
1528
	if (!hdev)
1529 1530
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1531

1532
	hci_dev_lock(hdev);
1533

1534 1535
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1536
		auth_type = HCI_AT_DEDICATED_BONDING;
1537
	else
1538 1539
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1540 1541
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1542 1543
								auth_type);
	else
1544
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1545 1546
								auth_type);

1547 1548 1549 1550
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1551
	if (IS_ERR(conn)) {
1552 1553 1554
		rp.status = -PTR_ERR(conn);
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1555 1556 1557 1558 1559
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1560 1561 1562
		rp.status = EBUSY;
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1563 1564 1565
		goto unlock;
	}

1566
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1567 1568 1569 1570 1571 1572
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1573
	/* For LE, just connecting isn't a proof that the pairing finished */
1574
	if (cp->addr.type == MGMT_ADDR_BREDR)
1575 1576
		conn->connect_cfm_cb = pairing_complete_cb;

1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1589
	hci_dev_unlock(hdev);
1590 1591 1592 1593 1594
	hci_dev_put(hdev);

	return err;
}

1595 1596
static int user_pairing_resp(struct sock *sk, u16 index, bdaddr_t *bdaddr,
					u16 mgmt_op, u16 hci_op, __le32 passkey)
1597 1598 1599
{
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
1600
	struct hci_conn *conn;
1601 1602
	int err;

1603
	hdev = hci_dev_get(index);
1604
	if (!hdev)
1605 1606
		return cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_INVALID_PARAMS);
1607

1608
	hci_dev_lock(hdev);
1609

1610
	if (!test_bit(HCI_UP, &hdev->flags)) {
1611 1612
		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_NOT_POWERED);
		goto done;
1613 1614
	}

1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633
	/*
	 * Check for an existing ACL link, if present pair via
	 * HCI commands.
	 *
	 * If no ACL link is present, check for an LE link and if
	 * present, pair via the SMP engine.
	 *
	 * If neither ACL nor LE links are present, fail with error.
	 */
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	if (!conn) {
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
		if (!conn) {
			err = cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_NOT_CONNECTED);
			goto done;
		}

		/* Continue with pairing via SMP */
1634 1635 1636 1637 1638 1639 1640 1641
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_SUCCESS);
		else
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_FAILED);
1642 1643 1644 1645

		goto done;
	}

1646
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
1647 1648
	if (!cmd) {
		err = -ENOMEM;
1649
		goto done;
1650 1651
	}

1652
	/* Continue with pairing via HCI */
1653 1654 1655 1656 1657 1658 1659 1660 1661
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

1662 1663
	if (err < 0)
		mgmt_pending_remove(cmd);
1664

1665
done:
1666
	hci_dev_unlock(hdev);
1667 1668 1669 1670 1671
	hci_dev_put(hdev);

	return err;
}

1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689
static int user_confirm_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_confirm_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_REPLY,
			HCI_OP_USER_CONFIRM_REPLY, 0);
}

static int user_confirm_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
1690
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_NEG_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_NEG_REPLY,
			HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
}

1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733
static int user_passkey_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_passkey_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_REPLY,
			HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
}

static int user_passkey_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
	struct mgmt_cp_user_passkey_neg_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_NEG_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_NEG_REPLY,
			HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
}

1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745
static int set_local_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_set_local_name *mgmt_cp = (void *) data;
	struct hci_cp_write_local_name hci_cp;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
1746 1747
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1748 1749 1750

	hdev = hci_dev_get(index);
	if (!hdev)
1751 1752
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1753

1754
	hci_dev_lock(hdev);
1755

1756
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1769
	hci_dev_unlock(hdev);
1770 1771 1772 1773 1774
	hci_dev_put(hdev);

	return err;
}

1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785
static int read_local_oob_data(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1786
						MGMT_STATUS_INVALID_PARAMS);
1787

1788
	hci_dev_lock(hdev);
1789 1790 1791

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1792
						MGMT_STATUS_NOT_POWERED);
1793 1794 1795 1796 1797
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1798
						MGMT_STATUS_NOT_SUPPORTED);
1799 1800 1801
		goto unlock;
	}

1802
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
1803 1804
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
							MGMT_STATUS_BUSY);
1805 1806 1807
		goto unlock;
	}

1808
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
1809 1810 1811 1812 1813 1814 1815 1816 1817 1818
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
1819
	hci_dev_unlock(hdev);
1820 1821 1822 1823 1824
	hci_dev_put(hdev);

	return err;
}

1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835
static int add_remote_oob_data(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_add_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1836
						MGMT_STATUS_INVALID_PARAMS);
1837 1838 1839 1840

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1841
						MGMT_STATUS_INVALID_PARAMS);
1842

1843
	hci_dev_lock(hdev);
1844 1845 1846 1847

	err = hci_add_remote_oob_data(hdev, &cp->bdaddr, cp->hash,
								cp->randomizer);
	if (err < 0)
1848 1849
		err = cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_FAILED);
1850 1851 1852 1853
	else
		err = cmd_complete(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA, NULL,
									0);

1854
	hci_dev_unlock(hdev);
1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870
	hci_dev_put(hdev);

	return err;
}

static int remove_remote_oob_data(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_remove_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1871
						MGMT_STATUS_INVALID_PARAMS);
1872 1873 1874 1875

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1876
						MGMT_STATUS_INVALID_PARAMS);
1877

1878
	hci_dev_lock(hdev);
1879 1880 1881 1882

	err = hci_remove_remote_oob_data(hdev, &cp->bdaddr);
	if (err < 0)
		err = cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1883
						MGMT_STATUS_INVALID_PARAMS);
1884 1885 1886 1887
	else
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
								NULL, 0);

1888
	hci_dev_unlock(hdev);
1889 1890 1891 1892 1893
	hci_dev_put(hdev);

	return err;
}

1894 1895
static int start_discovery(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
1896
{
1897
	struct mgmt_cp_start_discovery *cp = (void *) data;
1898 1899 1900 1901 1902 1903
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

1904 1905 1906 1907
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);

1908 1909
	hdev = hci_dev_get(index);
	if (!hdev)
1910 1911
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1912

1913
	hci_dev_lock(hdev);
1914

1915
	if (!test_bit(HCI_UP, &hdev->flags)) {
1916 1917
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_NOT_POWERED);
1918 1919 1920
		goto failed;
	}

1921 1922 1923 1924 1925 1926
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_BUSY);
		goto failed;
	}

1927
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
1928 1929 1930 1931 1932
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
1933
	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
1934 1935
	if (err < 0)
		mgmt_pending_remove(cmd);
1936 1937
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
1938 1939

failed:
1940
	hci_dev_unlock(hdev);
1941 1942 1943 1944 1945 1946 1947 1948 1949
	hci_dev_put(hdev);

	return err;
}

static int stop_discovery(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
1950 1951
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
1952 1953 1954 1955 1956 1957
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
1958 1959
		return cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1960

1961
	hci_dev_lock(hdev);
1962

1963
	if (!hci_discovery_active(hdev)) {
1964 1965
		err = cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_REJECTED);
1966
		goto unlock;
1967 1968
	}

1969
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
1970 1971
	if (!cmd) {
		err = -ENOMEM;
1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989
		goto unlock;
	}

	if (hdev->discovery.state == DISCOVERY_INQUIRY) {
		err = hci_cancel_inquiry(hdev);
		if (err < 0)
			mgmt_pending_remove(cmd);
		else
			hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
		goto unlock;
	}

	e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_PENDING);
	if (!e) {
		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, index, MGMT_OP_STOP_DISCOVERY, NULL, 0);
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
		goto unlock;
1990 1991
	}

1992 1993 1994
	bacpy(&cp.bdaddr, &e->data.bdaddr);
	err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
							sizeof(cp), &cp);
1995 1996
	if (err < 0)
		mgmt_pending_remove(cmd);
1997 1998
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
1999

2000
unlock:
2001
	hci_dev_unlock(hdev);
2002 2003 2004 2005 2006
	hci_dev_put(hdev);

	return err;
}

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027
static int confirm_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_confirm_name *cp = (void *) data;
	struct inquiry_entry *e;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

2028 2029 2030 2031 2032 2033
	if (!hci_discovery_active(hdev)) {
		err = cmd_status(sk, index, MGMT_OP_CONFIRM_NAME,
							MGMT_STATUS_FAILED);
		goto failed;
	}

2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->bdaddr);
	if (!e) {
		err = cmd_status (sk, index, MGMT_OP_CONFIRM_NAME,
				MGMT_STATUS_INVALID_PARAMS);
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2046
		hci_inquiry_cache_update_resolve(hdev, e);
2047 2048 2049 2050 2051 2052 2053 2054 2055 2056
	}

	err = 0;

failed:
	hci_dev_unlock(hdev);

	return err;
}

2057 2058 2059 2060
static int block_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
2061
	struct mgmt_cp_block_device *cp = (void *) data;
2062 2063 2064 2065 2066 2067
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2068
						MGMT_STATUS_INVALID_PARAMS);
2069 2070 2071 2072

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
2073
						MGMT_STATUS_INVALID_PARAMS);
2074

2075
	hci_dev_lock(hdev);
2076

2077 2078
	err = hci_blacklist_add(hdev, &cp->bdaddr);
	if (err < 0)
2079 2080
		err = cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
							MGMT_STATUS_FAILED);
2081 2082 2083
	else
		err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE,
							NULL, 0);
2084

2085
	hci_dev_unlock(hdev);
2086 2087 2088 2089 2090 2091 2092 2093 2094
	hci_dev_put(hdev);

	return err;
}

static int unblock_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
2095
	struct mgmt_cp_unblock_device *cp = (void *) data;
2096 2097 2098 2099 2100 2101
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2102
						MGMT_STATUS_INVALID_PARAMS);
2103 2104 2105 2106

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2107
						MGMT_STATUS_INVALID_PARAMS);
2108

2109
	hci_dev_lock(hdev);
2110

2111 2112 2113
	err = hci_blacklist_del(hdev, &cp->bdaddr);

	if (err < 0)
2114 2115
		err = cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
2116 2117 2118
	else
		err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE,
								NULL, 0);
2119

2120
	hci_dev_unlock(hdev);
2121 2122 2123 2124 2125
	hci_dev_put(hdev);

	return err;
}

2126 2127 2128 2129
static int set_fast_connectable(struct sock *sk, u16 index,
					unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
2130
	struct mgmt_mode *cp = (void *) data;
2131 2132 2133 2134 2135 2136 2137 2138
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2139
						MGMT_STATUS_INVALID_PARAMS);
2140 2141 2142 2143

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2144
						MGMT_STATUS_INVALID_PARAMS);
2145 2146 2147

	hci_dev_lock(hdev);

2148
	if (cp->val) {
2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2162
							MGMT_STATUS_FAILED);
2163 2164 2165 2166 2167 2168
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2169
							MGMT_STATUS_FAILED);
2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181
		goto done;
	}

	err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
							NULL, 0);
done:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

2182 2183 2184 2185
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
	unsigned char *buf;
	struct mgmt_hdr *hdr;
2186
	u16 opcode, index, len;
2187 2188 2189 2190 2191 2192 2193
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2194
	buf = kmalloc(msglen, GFP_KERNEL);
2195 2196 2197 2198 2199 2200 2201 2202 2203 2204
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

	hdr = (struct mgmt_hdr *) buf;
	opcode = get_unaligned_le16(&hdr->opcode);
2205
	index = get_unaligned_le16(&hdr->index);
2206 2207 2208 2209 2210 2211 2212 2213
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

	switch (opcode) {
2214 2215 2216
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2217 2218 2219
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2220
	case MGMT_OP_READ_INFO:
2221
		err = read_controller_info(sk, index);
2222
		break;
2223
	case MGMT_OP_SET_POWERED:
2224
		err = set_powered(sk, index, buf + sizeof(*hdr), len);
2225
		break;
2226
	case MGMT_OP_SET_DISCOVERABLE:
2227
		err = set_discoverable(sk, index, buf + sizeof(*hdr), len);
2228
		break;
2229
	case MGMT_OP_SET_CONNECTABLE:
2230
		err = set_connectable(sk, index, buf + sizeof(*hdr), len);
2231
		break;
2232 2233 2234 2235
	case MGMT_OP_SET_FAST_CONNECTABLE:
		err = set_fast_connectable(sk, index, buf + sizeof(*hdr),
								len);
		break;
2236
	case MGMT_OP_SET_PAIRABLE:
2237
		err = set_pairable(sk, index, buf + sizeof(*hdr), len);
2238
		break;
2239
	case MGMT_OP_ADD_UUID:
2240
		err = add_uuid(sk, index, buf + sizeof(*hdr), len);
2241 2242
		break;
	case MGMT_OP_REMOVE_UUID:
2243
		err = remove_uuid(sk, index, buf + sizeof(*hdr), len);
2244
		break;
2245
	case MGMT_OP_SET_DEV_CLASS:
2246
		err = set_dev_class(sk, index, buf + sizeof(*hdr), len);
2247
		break;
2248 2249
	case MGMT_OP_LOAD_LINK_KEYS:
		err = load_link_keys(sk, index, buf + sizeof(*hdr), len);
2250
		break;
2251 2252
	case MGMT_OP_REMOVE_KEYS:
		err = remove_keys(sk, index, buf + sizeof(*hdr), len);
2253
		break;
2254
	case MGMT_OP_DISCONNECT:
2255
		err = disconnect(sk, index, buf + sizeof(*hdr), len);
2256
		break;
2257
	case MGMT_OP_GET_CONNECTIONS:
2258
		err = get_connections(sk, index);
2259
		break;
2260
	case MGMT_OP_PIN_CODE_REPLY:
2261
		err = pin_code_reply(sk, index, buf + sizeof(*hdr), len);
2262 2263
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2264
		err = pin_code_neg_reply(sk, index, buf + sizeof(*hdr), len);
2265
		break;
2266
	case MGMT_OP_SET_IO_CAPABILITY:
2267
		err = set_io_capability(sk, index, buf + sizeof(*hdr), len);
2268
		break;
2269
	case MGMT_OP_PAIR_DEVICE:
2270
		err = pair_device(sk, index, buf + sizeof(*hdr), len);
2271
		break;
2272
	case MGMT_OP_USER_CONFIRM_REPLY:
2273
		err = user_confirm_reply(sk, index, buf + sizeof(*hdr), len);
2274 2275
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2276 2277
		err = user_confirm_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2278
		break;
2279 2280 2281 2282 2283 2284
	case MGMT_OP_USER_PASSKEY_REPLY:
		err = user_passkey_reply(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
		err = user_passkey_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2285
		break;
2286 2287 2288
	case MGMT_OP_SET_LOCAL_NAME:
		err = set_local_name(sk, index, buf + sizeof(*hdr), len);
		break;
2289 2290 2291
	case MGMT_OP_READ_LOCAL_OOB_DATA:
		err = read_local_oob_data(sk, index);
		break;
2292 2293 2294 2295 2296 2297 2298
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
		err = add_remote_oob_data(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
		err = remove_remote_oob_data(sk, index, buf + sizeof(*hdr),
									len);
		break;
2299
	case MGMT_OP_START_DISCOVERY:
2300
		err = start_discovery(sk, index, buf + sizeof(*hdr), len);
2301 2302 2303 2304
		break;
	case MGMT_OP_STOP_DISCOVERY:
		err = stop_discovery(sk, index);
		break;
2305 2306 2307
	case MGMT_OP_CONFIRM_NAME:
		err = confirm_name(sk, index, buf + sizeof(*hdr), len);
		break;
2308 2309 2310 2311 2312 2313
	case MGMT_OP_BLOCK_DEVICE:
		err = block_device(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
		err = unblock_device(sk, index, buf + sizeof(*hdr), len);
		break;
2314 2315
	default:
		BT_DBG("Unknown op %u", opcode);
2316 2317
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2318 2319 2320
		break;
	}

2321 2322 2323
	if (err < 0)
		goto done;

2324 2325 2326 2327 2328 2329
	err = msglen;

done:
	kfree(buf);
	return err;
}
2330

2331 2332 2333 2334 2335 2336 2337 2338
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2339
int mgmt_index_added(struct hci_dev *hdev)
2340
{
2341
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2342 2343
}

2344
int mgmt_index_removed(struct hci_dev *hdev)
2345
{
2346 2347
	u8 status = ENODEV;

2348
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2349

2350
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2351 2352
}

2353
struct cmd_lookup {
2354
	u8 val;
2355
	struct sock *sk;
2356
	struct hci_dev *hdev;
2357 2358
};

2359
static void settings_rsp(struct pending_cmd *cmd, void *data)
2360
{
2361
	struct cmd_lookup *match = data;
2362

2363
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2364 2365 2366 2367 2368 2369 2370 2371 2372

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2373
}
2374

2375
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2376
{
2377 2378
	struct cmd_lookup match = { powered, NULL, hdev };
	__le32 ev;
2379
	int ret;
2380

2381
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2382

2383 2384
	if (!powered) {
		u8 status = ENETDOWN;
2385
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2386 2387
	}

2388
	ev = cpu_to_le32(get_current_settings(hdev));
2389

2390 2391
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
								match.sk);
2392 2393 2394 2395 2396

	if (match.sk)
		sock_put(match.sk);

	return ret;
2397
}
2398

2399
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2400
{
2401 2402
	struct cmd_lookup match = { discoverable, NULL, hdev };
	__le32 ev;
2403 2404
	int ret;

2405
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp, &match);
2406

2407
	ev = cpu_to_le32(get_current_settings(hdev));
2408

2409
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
2410
								match.sk);
2411 2412 2413 2414 2415
	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2416

2417
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2418
{
2419 2420
	__le32 ev;
	struct cmd_lookup match = { connectable, NULL, hdev };
2421 2422
	int ret;

2423 2424
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
								&match);
2425

2426
	ev = cpu_to_le32(get_current_settings(hdev));
2427

2428
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);
2429 2430 2431 2432 2433 2434

	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2435

2436
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2437
{
2438 2439
	u8 mgmt_err = mgmt_status(status);

2440
	if (scan & SCAN_PAGE)
2441
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
2442
						cmd_status_rsp, &mgmt_err);
2443 2444

	if (scan & SCAN_INQUIRY)
2445
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
2446
						cmd_status_rsp, &mgmt_err);
2447 2448 2449 2450

	return 0;
}

2451 2452
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
2453
{
2454
	struct mgmt_ev_new_link_key ev;
2455

2456
	memset(&ev, 0, sizeof(ev));
2457

2458 2459 2460 2461 2462
	ev.store_hint = persistent;
	bacpy(&ev.key.bdaddr, &key->bdaddr);
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
2463

2464
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
2465
}
2466

2467
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
2468
								u8 addr_type)
2469
{
2470
	struct mgmt_addr_info ev;
2471 2472

	bacpy(&ev.bdaddr, bdaddr);
2473
	ev.type = link_to_mgmt(link_type, addr_type);
2474

2475 2476
	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, &ev, sizeof(ev),
									NULL);
2477 2478
}

2479 2480
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
2481
	struct mgmt_cp_disconnect *cp = cmd->param;
2482
	struct sock **sk = data;
2483
	struct mgmt_rp_disconnect rp;
2484

2485
	bacpy(&rp.bdaddr, &cp->bdaddr);
2486
	rp.status = 0;
2487

2488
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, &rp, sizeof(rp));
2489 2490 2491 2492

	*sk = cmd->sk;
	sock_hold(*sk);

2493
	mgmt_pending_remove(cmd);
2494 2495
}

2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512
static void remove_keys_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;
	struct mgmt_cp_remove_keys *cp = cmd->param;
	struct mgmt_rp_remove_keys rp;

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
	if (status != NULL)
		rp.status = *status;

	cmd_complete(cmd->sk, cmd->index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));

	mgmt_pending_remove(cmd);
}

2513 2514
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
2515
{
2516
	struct mgmt_addr_info ev;
2517 2518 2519
	struct sock *sk = NULL;
	int err;

2520
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
2521 2522

	bacpy(&ev.bdaddr, bdaddr);
2523
	ev.type = link_to_mgmt(link_type, addr_type);
2524

2525 2526
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
									sk);
2527 2528 2529 2530

	if (sk)
		sock_put(sk);

2531 2532
	mgmt_pending_foreach(MGMT_OP_REMOVE_KEYS, hdev, remove_keys_rsp, NULL);

2533 2534 2535
	return err;
}

2536
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2537 2538
{
	struct pending_cmd *cmd;
2539
	u8 mgmt_err = mgmt_status(status);
2540 2541
	int err;

2542
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
2543 2544 2545
	if (!cmd)
		return -ENOENT;

2546 2547 2548 2549 2550 2551 2552 2553 2554 2555
	if (bdaddr) {
		struct mgmt_rp_disconnect rp;

		bacpy(&rp.bdaddr, bdaddr);
		rp.status = status;

		err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
							&rp, sizeof(rp));
	} else
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_DISCONNECT,
2556
								mgmt_err);
2557

2558
	mgmt_pending_remove(cmd);
2559 2560

	return err;
2561
}
2562

2563 2564
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
2565 2566 2567
{
	struct mgmt_ev_connect_failed ev;

2568
	bacpy(&ev.addr.bdaddr, bdaddr);
2569
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2570
	ev.status = mgmt_status(status);
2571

2572
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
2573
}
2574

2575
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
2576 2577 2578 2579
{
	struct mgmt_ev_pin_code_request ev;

	bacpy(&ev.bdaddr, bdaddr);
2580
	ev.secure = secure;
2581

2582
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
2583
									NULL);
2584 2585
}

2586 2587
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2588 2589
{
	struct pending_cmd *cmd;
2590
	struct mgmt_rp_pin_code_reply rp;
2591 2592
	int err;

2593
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
2594 2595 2596
	if (!cmd)
		return -ENOENT;

2597
	bacpy(&rp.bdaddr, bdaddr);
2598
	rp.status = mgmt_status(status);
2599

2600
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, &rp,
2601
								sizeof(rp));
2602

2603
	mgmt_pending_remove(cmd);
2604 2605 2606 2607

	return err;
}

2608 2609
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2610 2611
{
	struct pending_cmd *cmd;
2612
	struct mgmt_rp_pin_code_reply rp;
2613 2614
	int err;

2615
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
2616 2617 2618
	if (!cmd)
		return -ENOENT;

2619
	bacpy(&rp.bdaddr, bdaddr);
2620
	rp.status = mgmt_status(status);
2621

2622
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY, &rp,
2623
								sizeof(rp));
2624

2625
	mgmt_pending_remove(cmd);
2626 2627 2628

	return err;
}
2629

2630 2631
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						__le32 value, u8 confirm_hint)
2632 2633 2634
{
	struct mgmt_ev_user_confirm_request ev;

2635
	BT_DBG("%s", hdev->name);
2636 2637

	bacpy(&ev.bdaddr, bdaddr);
2638
	ev.confirm_hint = confirm_hint;
2639 2640
	put_unaligned_le32(value, &ev.value);

2641
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
2642
									NULL);
2643 2644
}

2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr)
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.bdaddr, bdaddr);

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

2657
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
2658
							u8 status, u8 opcode)
2659 2660 2661 2662 2663
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

2664
	cmd = mgmt_pending_find(opcode, hdev);
2665 2666 2667 2668
	if (!cmd)
		return -ENOENT;

	bacpy(&rp.bdaddr, bdaddr);
2669
	rp.status = mgmt_status(status);
2670
	err = cmd_complete(cmd->sk, hdev->id, opcode, &rp, sizeof(rp));
2671

2672
	mgmt_pending_remove(cmd);
2673 2674 2675 2676

	return err;
}

2677 2678
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2679
{
2680
	return user_pairing_resp_complete(hdev, bdaddr, status,
2681 2682 2683
						MGMT_OP_USER_CONFIRM_REPLY);
}

2684 2685
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
2686
{
2687
	return user_pairing_resp_complete(hdev, bdaddr, status,
2688 2689
					MGMT_OP_USER_CONFIRM_NEG_REPLY);
}
2690

2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
						MGMT_OP_USER_PASSKEY_REPLY);
}

int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
					MGMT_OP_USER_PASSKEY_NEG_REPLY);
}

2705
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2706 2707 2708 2709
{
	struct mgmt_ev_auth_failed ev;

	bacpy(&ev.bdaddr, bdaddr);
2710
	ev.status = mgmt_status(status);
2711

2712
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
2713
}
2714

2715
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
2716 2717 2718 2719 2720 2721 2722 2723
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
	int err;

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2724
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2725 2726 2727 2728
	if (!cmd)
		goto send_event;

	if (status) {
2729
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2730
							mgmt_status(status));
2731 2732 2733
		goto failed;
	}

2734
	update_eir(hdev);
2735

2736
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, &ev,
2737 2738 2739 2740 2741
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
2742
	err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
2743 2744 2745 2746 2747 2748 2749
							cmd ? cmd->sk : NULL);

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
2750

2751 2752
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
2753 2754 2755 2756
{
	struct pending_cmd *cmd;
	int err;

2757
	BT_DBG("%s status %u", hdev->name, status);
2758

2759
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
2760 2761 2762 2763
	if (!cmd)
		return -ENOENT;

	if (status) {
2764
		err = cmd_status(cmd->sk, hdev->id,
2765 2766
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
2767 2768 2769 2770 2771 2772
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

2773 2774 2775
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
						&rp, sizeof(rp));
2776 2777 2778 2779 2780 2781
	}

	mgmt_pending_remove(cmd);

	return err;
}
2782

2783
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
2784
				u8 addr_type, u8 *dev_class, s8 rssi,
2785
				u8 cfm_name, u8 *eir, u16 eir_len)
2786
{
2787 2788
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
2789
	size_t ev_size;
2790

2791 2792
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
2793 2794
		return -EINVAL;

2795 2796
	memset(buf, 0, sizeof(buf));

2797 2798 2799 2800
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;
	ev->confirm_name = cfm_name;
2801

2802
	if (eir_len > 0)
2803
		memcpy(ev->eir, eir, eir_len);
2804

2805 2806 2807 2808 2809 2810 2811
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
								dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	ev_size = sizeof(*ev) + eir_len;
2812

2813
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
2814
}
2815

2816
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 *name)
2817 2818 2819 2820 2821 2822 2823 2824
{
	struct mgmt_ev_remote_name ev;

	memset(&ev, 0, sizeof(ev));

	bacpy(&ev.bdaddr, bdaddr);
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2825
	return mgmt_event(MGMT_EV_REMOTE_NAME, hdev, &ev, sizeof(ev), NULL);
2826
}
2827

2828
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
2829 2830 2831 2832
{
	struct pending_cmd *cmd;
	int err;

2833
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2834 2835 2836
	if (!cmd)
		return -ENOENT;

2837
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2838 2839 2840 2841 2842
	mgmt_pending_remove(cmd);

	return err;
}

2843 2844 2845 2846 2847 2848 2849 2850 2851
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

2852
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2853 2854 2855 2856 2857
	mgmt_pending_remove(cmd);

	return err;
}

2858
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
2859
{
2860 2861 2862
	struct pending_cmd *cmd;

	if (discovering)
2863
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2864
	else
2865
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
2866 2867

	if (cmd != NULL) {
2868
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, NULL, 0);
2869 2870 2871
		mgmt_pending_remove(cmd);
	}

2872
	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &discovering,
2873 2874
						sizeof(discovering), NULL);
}
2875

2876
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2877 2878 2879 2880
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

2881
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
2882 2883 2884

	bacpy(&ev.bdaddr, bdaddr);

2885 2886
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2887 2888
}

2889
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2890 2891 2892 2893
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

2894
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
2895 2896 2897

	bacpy(&ev.bdaddr, bdaddr);

2898 2899
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2900
}