mgmt.c 98.6 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36
bool enable_hs;

37
#define MGMT_VERSION	1
38
#define MGMT_REVISION	3
39

40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
78
	MGMT_OP_SET_DEVICE_ID,
79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
102
	MGMT_EV_PASSKEY_NOTIFY,
103 104
};

105
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
106

107 108 109
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

110 111
struct pending_cmd {
	struct list_head list;
112
	u16 opcode;
113
	int index;
114
	void *param;
115
	struct sock *sk;
116
	void *user_data;
117 118
};

119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

184 185 186 187 188
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

189 190 191 192 193 194 195 196
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

197
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
198 199 200 201
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
202
	int err;
203

204
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
205

206
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
207 208 209 210 211
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

212
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
213
	hdr->index = cpu_to_le16(index);
214 215 216 217
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
218
	ev->opcode = cpu_to_le16(cmd);
219

220 221
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
222 223
		kfree_skb(skb);

224
	return err;
225 226
}

227
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
228
			void *rp, size_t rp_len)
229 230 231 232
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
233
	int err;
234 235 236

	BT_DBG("sock %p", sk);

237
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
238 239 240 241 242
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

243
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
244
	hdr->index = cpu_to_le16(index);
245
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
246

247
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
248
	ev->opcode = cpu_to_le16(cmd);
249
	ev->status = status;
250 251 252

	if (rp)
		memcpy(ev->data, rp, rp_len);
253

254 255
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
256 257
		kfree_skb(skb);

258
	return err;
259 260
}

261 262
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
263 264 265 266 267 268
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
269
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
270

271
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
272
			    sizeof(rp));
273 274
}

275 276
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
277 278
{
	struct mgmt_rp_read_commands *rp;
279 280
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
281
	__le16 *opcode;
282 283 284 285 286 287 288 289 290 291 292
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

293 294
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
295 296 297 298 299 300 301

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

302
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
303
			   rp_size);
304 305 306 307 308
	kfree(rp);

	return err;
}

309 310
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
311 312
{
	struct mgmt_rp_read_index_list *rp;
313
	struct hci_dev *d;
314
	size_t rp_len;
315
	u16 count;
316
	int err;
317 318 319 320 321 322

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
323 324 325 326
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

327 328 329
		count++;
	}

330 331 332
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
333
		read_unlock(&hci_dev_list_lock);
334
		return -ENOMEM;
335
	}
336

337
	count = 0;
338
	list_for_each_entry(d, &hci_dev_list, list) {
339
		if (test_bit(HCI_SETUP, &d->dev_flags))
340 341
			continue;

342 343 344
		if (!mgmt_valid_hdev(d))
			continue;

345
		rp->index[count++] = cpu_to_le16(d->id);
346 347 348
		BT_DBG("Added hci%u", d->id);
	}

349 350 351
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

352 353
	read_unlock(&hci_dev_list_lock);

354
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
355
			   rp_len);
356

357 358 359
	kfree(rp);

	return err;
360 361
}

362 363 364 365 366 367 368
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

369
	if (lmp_ssp_capable(hdev))
370 371
		settings |= MGMT_SETTING_SSP;

372
	if (lmp_bredr_capable(hdev)) {
373
		settings |= MGMT_SETTING_CONNECTABLE;
374 375
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
376
		settings |= MGMT_SETTING_DISCOVERABLE;
377 378 379 380
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

381 382 383
	if (enable_hs)
		settings |= MGMT_SETTING_HS;

384
	if (lmp_le_capable(hdev))
385
		settings |= MGMT_SETTING_LE;
386 387 388 389 390 391 392 393

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

394
	if (hdev_is_powered(hdev))
395 396
		settings |= MGMT_SETTING_POWERED;

397
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
398 399
		settings |= MGMT_SETTING_CONNECTABLE;

400 401 402
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

403
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
404 405
		settings |= MGMT_SETTING_DISCOVERABLE;

406
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
407 408
		settings |= MGMT_SETTING_PAIRABLE;

409
	if (lmp_bredr_capable(hdev))
410 411
		settings |= MGMT_SETTING_BREDR;

412
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
413 414
		settings |= MGMT_SETTING_LE;

415
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
416 417
		settings |= MGMT_SETTING_LINK_SECURITY;

418
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
419 420
		settings |= MGMT_SETTING_SSP;

421 422 423
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

424 425 426
	return settings;
}

427 428
#define PNP_INFO_SVCLASS_ID		0x1200

429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

560
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
561 562 563 564 565 566 567
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

568 569 570 571 572 573 574 575 576 577 578 579
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

580
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
581
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
582
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
583 584
}

585
static void update_eir(struct hci_request *req)
586
{
587
	struct hci_dev *hdev = req->hdev;
588 589
	struct hci_cp_write_eir cp;

590
	if (!hdev_is_powered(hdev))
591
		return;
592

593
	if (!lmp_ext_inq_capable(hdev))
594
		return;
595

596
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
597
		return;
598

599
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
600
		return;
601 602 603 604 605 606

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
607
		return;
608 609 610

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

611
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
612 613 614 615 616 617 618 619 620 621 622 623 624
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

625
static void update_class(struct hci_request *req)
626
{
627
	struct hci_dev *hdev = req->hdev;
628 629 630 631
	u8 cod[3];

	BT_DBG("%s", hdev->name);

632
	if (!hdev_is_powered(hdev))
633
		return;
634

635
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
636
		return;
637 638 639 640 641 642

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
643
		return;
644

645
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
646 647
}

648 649 650
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
651
					    service_cache.work);
652
	struct hci_request req;
653

654
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
655 656
		return;

657 658
	hci_req_init(&req, hdev);

659 660
	hci_dev_lock(hdev);

661 662
	update_eir(&req);
	update_class(&req);
663 664

	hci_dev_unlock(hdev);
665 666

	hci_req_run(&req, NULL);
667 668
}

669
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
670
{
671
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
672 673
		return;

674
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
675

676 677 678 679 680 681
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
682 683
}

684
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
685
				void *data, u16 data_len)
686
{
687
	struct mgmt_rp_read_info rp;
688

689
	BT_DBG("sock %p %s", sk, hdev->name);
690

691
	hci_dev_lock(hdev);
692

693 694
	memset(&rp, 0, sizeof(rp));

695
	bacpy(&rp.bdaddr, &hdev->bdaddr);
696

697
	rp.version = hdev->hci_ver;
698
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
699 700 701

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
702

703
	memcpy(rp.dev_class, hdev->dev_class, 3);
704

705
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
706
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
707

708
	hci_dev_unlock(hdev);
709

710
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
711
			    sizeof(rp));
712 713
}

714 715 716
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
717
	kfree(cmd->param);
718 719 720
	kfree(cmd);
}

721
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
722 723
					    struct hci_dev *hdev, void *data,
					    u16 len)
724 725 726
{
	struct pending_cmd *cmd;

727
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
728
	if (!cmd)
729
		return NULL;
730 731

	cmd->opcode = opcode;
732
	cmd->index = hdev->id;
733

734
	cmd->param = kmalloc(len, GFP_KERNEL);
735
	if (!cmd->param) {
736
		kfree(cmd);
737
		return NULL;
738 739
	}

740 741
	if (data)
		memcpy(cmd->param, data, len);
742 743 744 745

	cmd->sk = sk;
	sock_hold(sk);

746
	list_add(&cmd->list, &hdev->mgmt_pending);
747

748
	return cmd;
749 750
}

751
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
752 753
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
754
				 void *data)
755
{
756
	struct pending_cmd *cmd, *tmp;
757

758
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
759
		if (opcode > 0 && cmd->opcode != opcode)
760 761 762 763 764 765
			continue;

		cb(cmd, data);
	}
}

766
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
767
{
768
	struct pending_cmd *cmd;
769

770
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
771 772
		if (cmd->opcode == opcode)
			return cmd;
773 774 775 776 777
	}

	return NULL;
}

778
static void mgmt_pending_remove(struct pending_cmd *cmd)
779 780 781 782 783
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

784
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
785
{
786
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
787

788
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
789
			    sizeof(settings));
790 791
}

792
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
793
		       u16 len)
794
{
795
	struct mgmt_mode *cp = data;
796
	struct pending_cmd *cmd;
797
	int err;
798

799
	BT_DBG("request for %s", hdev->name);
800

801 802 803 804
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

805
	hci_dev_lock(hdev);
806

807 808 809 810
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
811 812 813
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
814 815 816 817
			goto failed;
		}
	}

818
	if (!!cp->val == hdev_is_powered(hdev)) {
819
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
820 821 822
		goto failed;
	}

823
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
824
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
825
				 MGMT_STATUS_BUSY);
826 827 828
		goto failed;
	}

829
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
830 831
	if (!cmd) {
		err = -ENOMEM;
832
		goto failed;
833
	}
834

835
	if (cp->val)
836
		queue_work(hdev->req_workqueue, &hdev->power_on);
837
	else
838
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
839

840
	err = 0;
841 842

failed:
843
	hci_dev_unlock(hdev);
844
	return err;
845 846
}

847 848
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
849 850 851 852
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

853
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
854 855 856 857 858 859 860 861
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
862
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
863 864 865 866 867
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

868 869 870
	/* Time stamp */
	__net_timestamp(skb);

871 872 873 874 875 876 877 878 879 880 881 882 883 884 885
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

886
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
887
			    u16 len)
888
{
889
	struct mgmt_cp_set_discoverable *cp = data;
890
	struct pending_cmd *cmd;
891
	u16 timeout;
892 893 894
	u8 scan;
	int err;

895
	BT_DBG("request for %s", hdev->name);
896

897 898 899 900
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				 MGMT_STATUS_NOT_SUPPORTED);

901 902 903 904
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

905
	timeout = __le16_to_cpu(cp->timeout);
906
	if (!cp->val && timeout > 0)
907
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
908
				  MGMT_STATUS_INVALID_PARAMS);
909

910
	hci_dev_lock(hdev);
911

912
	if (!hdev_is_powered(hdev) && timeout > 0) {
913
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
914
				 MGMT_STATUS_NOT_POWERED);
915 916 917
		goto failed;
	}

918
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
919
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
920
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
921
				 MGMT_STATUS_BUSY);
922 923 924
		goto failed;
	}

925
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
926
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
927
				 MGMT_STATUS_REJECTED);
928 929 930 931
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
932 933 934 935 936 937 938
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

939
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
940 941 942 943 944 945
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

946 947 948 949
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
950 951 952 953 954 955 956 957 958 959 960
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

961
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
962 963 964
		goto failed;
	}

965
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
966 967
	if (!cmd) {
		err = -ENOMEM;
968
		goto failed;
969
	}
970 971 972

	scan = SCAN_PAGE;

973
	if (cp->val)
974
		scan |= SCAN_INQUIRY;
975
	else
976
		cancel_delayed_work(&hdev->discov_off);
977 978 979

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
980
		mgmt_pending_remove(cmd);
981

982
	if (cp->val)
983
		hdev->discov_timeout = timeout;
984

985
failed:
986
	hci_dev_unlock(hdev);
987 988 989
	return err;
}

990 991
static void write_fast_connectable(struct hci_request *req, bool enable)
{
992
	struct hci_dev *hdev = req->hdev;
993 994 995
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

996 997 998
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1013 1014 1015 1016 1017 1018 1019
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1020 1021
}

1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1042
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1043
			   u16 len)
1044
{
1045
	struct mgmt_mode *cp = data;
1046
	struct pending_cmd *cmd;
1047
	struct hci_request req;
1048 1049 1050
	u8 scan;
	int err;

1051
	BT_DBG("request for %s", hdev->name);
1052

1053 1054 1055 1056
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

1057 1058 1059 1060
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1061
	hci_dev_lock(hdev);
1062

1063
	if (!hdev_is_powered(hdev)) {
1064 1065 1066 1067 1068
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

1069
		if (cp->val) {
1070
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1071
		} else {
1072 1073 1074
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
1075

1076
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1077 1078 1079 1080 1081 1082
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1083 1084 1085
		goto failed;
	}

1086
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1087
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1088
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1089
				 MGMT_STATUS_BUSY);
1090 1091 1092
		goto failed;
	}

1093
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1094
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1095 1096 1097
		goto failed;
	}

1098
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1099 1100
	if (!cmd) {
		err = -ENOMEM;
1101
		goto failed;
1102
	}
1103

1104
	if (cp->val) {
1105
		scan = SCAN_PAGE;
1106
	} else {
1107 1108
		scan = 0;

1109
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1110
		    hdev->discov_timeout > 0)
1111 1112 1113
			cancel_delayed_work(&hdev->discov_off);
	}

1114 1115 1116 1117
	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);

1118 1119 1120 1121 1122 1123 1124
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1125 1126
		write_fast_connectable(&req, false);

1127
	err = hci_req_run(&req, set_connectable_complete);
1128
	if (err < 0)
1129
		mgmt_pending_remove(cmd);
1130 1131

failed:
1132
	hci_dev_unlock(hdev);
1133 1134 1135
	return err;
}

1136
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1137
			u16 len)
1138
{
1139
	struct mgmt_mode *cp = data;
1140 1141
	int err;

1142
	BT_DBG("request for %s", hdev->name);
1143

1144 1145 1146 1147
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1148
	hci_dev_lock(hdev);
1149 1150

	if (cp->val)
1151
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1152
	else
1153
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1154

1155
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1156 1157 1158
	if (err < 0)
		goto failed;

1159
	err = new_settings(hdev, sk);
1160 1161

failed:
1162
	hci_dev_unlock(hdev);
1163 1164 1165
	return err;
}

1166 1167
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1168 1169 1170
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1171
	u8 val;
1172 1173
	int err;

1174
	BT_DBG("request for %s", hdev->name);
1175

1176 1177 1178 1179
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_NOT_SUPPORTED);

1180 1181 1182 1183
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1184 1185
	hci_dev_lock(hdev);

1186
	if (!hdev_is_powered(hdev)) {
1187 1188 1189
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1190
					  &hdev->dev_flags)) {
1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1202 1203 1204 1205
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1206
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1207
				 MGMT_STATUS_BUSY);
1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1235
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1236 1237 1238
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1239
	u8 val;
1240 1241
	int err;

1242
	BT_DBG("request for %s", hdev->name);
1243

1244 1245 1246
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1247

1248 1249 1250 1251
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1252
	hci_dev_lock(hdev);
1253

1254 1255
	val = !!cp->val;

1256
	if (!hdev_is_powered(hdev)) {
1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1271 1272 1273 1274
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1275 1276
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1302
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1303 1304 1305
{
	struct mgmt_mode *cp = data;

1306
	BT_DBG("request for %s", hdev->name);
1307

1308 1309
	if (!enable_hs)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1310
				  MGMT_STATUS_NOT_SUPPORTED);
1311

1312 1313 1314 1315
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1316 1317 1318 1319 1320
	if (cp->val)
		set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
	else
		clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);

1321
	return send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1322 1323
}

1324
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1325 1326 1327 1328 1329
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
	int err;
1330
	u8 val, enabled;
1331

1332
	BT_DBG("request for %s", hdev->name);
1333

1334 1335 1336
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1337

1338 1339 1340 1341
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1342 1343 1344 1345 1346
	/* LE-only devices do not allow toggling LE on/off */
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1347
	hci_dev_lock(hdev);
1348 1349

	val = !!cp->val;
1350
	enabled = lmp_host_le_capable(hdev);
1351

1352
	if (!hdev_is_powered(hdev) || val == enabled) {
1353 1354 1355 1356 1357 1358 1359 1360 1361
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1362
			goto unlock;
1363 1364 1365 1366

		if (changed)
			err = new_settings(hdev, sk);

1367
		goto unlock;
1368 1369 1370
	}

	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
1371
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1372
				 MGMT_STATUS_BUSY);
1373
		goto unlock;
1374 1375 1376 1377 1378
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1379
		goto unlock;
1380 1381 1382 1383 1384 1385
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1386
		hci_cp.simul = lmp_le_br_capable(hdev);
1387 1388
	}

1389 1390
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
			   &hci_cp);
1391
	if (err < 0)
1392 1393
		mgmt_pending_remove(cmd);

1394 1395
unlock:
	hci_dev_unlock(hdev);
1396 1397 1398
	return err;
}

1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1467
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1468
{
1469
	struct mgmt_cp_add_uuid *cp = data;
1470
	struct pending_cmd *cmd;
1471
	struct hci_request req;
1472 1473 1474
	struct bt_uuid *uuid;
	int err;

1475
	BT_DBG("request for %s", hdev->name);
1476

1477
	hci_dev_lock(hdev);
1478

1479
	if (pending_eir_or_class(hdev)) {
1480
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1481
				 MGMT_STATUS_BUSY);
1482 1483 1484
		goto failed;
	}

1485
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1486 1487 1488 1489 1490 1491
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1492
	uuid->svc_hint = cp->svc_hint;
1493
	uuid->size = get_uuid_size(cp->uuid);
1494

1495
	list_add_tail(&uuid->list, &hdev->uuids);
1496

1497
	hci_req_init(&req, hdev);
1498

1499 1500 1501
	update_class(&req);
	update_eir(&req);

1502 1503 1504 1505
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1506

1507
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1508
				   hdev->dev_class, 3);
1509 1510 1511 1512
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1513
	if (!cmd) {
1514
		err = -ENOMEM;
1515 1516 1517 1518
		goto failed;
	}

	err = 0;
1519 1520

failed:
1521
	hci_dev_unlock(hdev);
1522 1523 1524
	return err;
}

1525 1526 1527 1528 1529 1530
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1531 1532
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1533 1534 1535 1536 1537 1538
		return true;
	}

	return false;
}

1539 1540 1541 1542 1543 1544 1545
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1546
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1547
		       u16 len)
1548
{
1549
	struct mgmt_cp_remove_uuid *cp = data;
1550
	struct pending_cmd *cmd;
1551
	struct bt_uuid *match, *tmp;
1552
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1553
	struct hci_request req;
1554 1555
	int err, found;

1556
	BT_DBG("request for %s", hdev->name);
1557

1558
	hci_dev_lock(hdev);
1559

1560
	if (pending_eir_or_class(hdev)) {
1561
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1562
				 MGMT_STATUS_BUSY);
1563 1564 1565
		goto unlock;
	}

1566 1567
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1568

1569
		if (enable_service_cache(hdev)) {
1570
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1571
					   0, hdev->dev_class, 3);
1572 1573
			goto unlock;
		}
1574

1575
		goto update_class;
1576 1577 1578 1579
	}

	found = 0;

1580
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1581 1582 1583 1584
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1585
		kfree(match);
1586 1587 1588 1589
		found++;
	}

	if (found == 0) {
1590
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1591
				 MGMT_STATUS_INVALID_PARAMS);
1592 1593 1594
		goto unlock;
	}

1595
update_class:
1596
	hci_req_init(&req, hdev);
1597

1598 1599 1600
	update_class(&req);
	update_eir(&req);

1601 1602 1603 1604
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1605

1606
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1607
				   hdev->dev_class, 3);
1608 1609 1610 1611
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1612
	if (!cmd) {
1613
		err = -ENOMEM;
1614 1615 1616 1617
		goto unlock;
	}

	err = 0;
1618 1619

unlock:
1620
	hci_dev_unlock(hdev);
1621 1622 1623
	return err;
}

1624 1625 1626 1627 1628 1629 1630
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1631
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1632
			 u16 len)
1633
{
1634
	struct mgmt_cp_set_dev_class *cp = data;
1635
	struct pending_cmd *cmd;
1636
	struct hci_request req;
1637 1638
	int err;

1639
	BT_DBG("request for %s", hdev->name);
1640

1641 1642 1643
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1644

1645
	hci_dev_lock(hdev);
1646

1647 1648 1649 1650 1651
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
1652

1653 1654 1655 1656 1657
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
1658

1659 1660 1661
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1662
	if (!hdev_is_powered(hdev)) {
1663
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1664
				   hdev->dev_class, 3);
1665 1666 1667
		goto unlock;
	}

1668 1669
	hci_req_init(&req, hdev);

1670
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1671 1672 1673
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1674
		update_eir(&req);
1675
	}
1676

1677 1678
	update_class(&req);

1679 1680 1681 1682
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1683

1684
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1685
				   hdev->dev_class, 3);
1686 1687 1688 1689
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1690
	if (!cmd) {
1691
		err = -ENOMEM;
1692 1693 1694 1695
		goto unlock;
	}

	err = 0;
1696

1697
unlock:
1698
	hci_dev_unlock(hdev);
1699 1700 1701
	return err;
}

1702
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1703
			  u16 len)
1704
{
1705
	struct mgmt_cp_load_link_keys *cp = data;
1706
	u16 key_count, expected_len;
1707
	int i;
1708

1709
	key_count = __le16_to_cpu(cp->key_count);
1710

1711 1712
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1713
	if (expected_len != len) {
1714
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1715
		       len, expected_len);
1716
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1717
				  MGMT_STATUS_INVALID_PARAMS);
1718 1719
	}

1720 1721 1722 1723
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1724
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1725
	       key_count);
1726

1727 1728 1729 1730 1731 1732 1733 1734
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1735
	hci_dev_lock(hdev);
1736 1737 1738 1739

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
1740
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1741
	else
1742
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1743

1744
	for (i = 0; i < key_count; i++) {
1745
		struct mgmt_link_key_info *key = &cp->keys[i];
1746

1747
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1748
				 key->type, key->pin_len);
1749 1750
	}

1751
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1752

1753
	hci_dev_unlock(hdev);
1754

1755
	return 0;
1756 1757
}

1758
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1759
			   u8 addr_type, struct sock *skip_sk)
1760 1761 1762 1763 1764 1765 1766
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1767
			  skip_sk);
1768 1769
}

1770
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1771
			 u16 len)
1772
{
1773 1774
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1775 1776
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1777 1778 1779
	struct hci_conn *conn;
	int err;

1780
	memset(&rp, 0, sizeof(rp));
1781 1782
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1783

1784 1785 1786 1787 1788
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1789 1790 1791 1792 1793
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1794 1795
	hci_dev_lock(hdev);

1796
	if (!hdev_is_powered(hdev)) {
1797
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1798
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1799 1800 1801
		goto unlock;
	}

1802
	if (cp->addr.type == BDADDR_BREDR)
1803 1804 1805
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1806

1807
	if (err < 0) {
1808
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1809
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1810 1811 1812
		goto unlock;
	}

1813
	if (cp->disconnect) {
1814
		if (cp->addr.type == BDADDR_BREDR)
1815
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1816
						       &cp->addr.bdaddr);
1817 1818
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1819
						       &cp->addr.bdaddr);
1820 1821 1822
	} else {
		conn = NULL;
	}
1823

1824
	if (!conn) {
1825
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1826
				   &rp, sizeof(rp));
1827
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1828 1829
		goto unlock;
	}
1830

1831
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1832
			       sizeof(*cp));
1833 1834 1835
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1836 1837
	}

1838
	dc.handle = cpu_to_le16(conn->handle);
1839 1840 1841 1842 1843
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1844
unlock:
1845
	hci_dev_unlock(hdev);
1846 1847 1848
	return err;
}

1849
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1850
		      u16 len)
1851
{
1852
	struct mgmt_cp_disconnect *cp = data;
1853
	struct mgmt_rp_disconnect rp;
1854
	struct hci_cp_disconnect dc;
1855
	struct pending_cmd *cmd;
1856 1857 1858 1859 1860
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1861 1862 1863 1864
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1865
	if (!bdaddr_type_is_valid(cp->addr.type))
1866 1867 1868
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1869

1870
	hci_dev_lock(hdev);
1871 1872

	if (!test_bit(HCI_UP, &hdev->flags)) {
1873 1874
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1875 1876 1877
		goto failed;
	}

1878
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1879 1880
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
1881 1882 1883
		goto failed;
	}

1884
	if (cp->addr.type == BDADDR_BREDR)
1885 1886
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
1887 1888
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1889

1890
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
1891 1892
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
1893 1894 1895
		goto failed;
	}

1896
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1897 1898
	if (!cmd) {
		err = -ENOMEM;
1899
		goto failed;
1900
	}
1901

1902
	dc.handle = cpu_to_le16(conn->handle);
1903
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
1904 1905 1906

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1907
		mgmt_pending_remove(cmd);
1908 1909

failed:
1910
	hci_dev_unlock(hdev);
1911 1912 1913
	return err;
}

1914
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
1915 1916 1917
{
	switch (link_type) {
	case LE_LINK:
1918 1919
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
1920
			return BDADDR_LE_PUBLIC;
1921

1922
		default:
1923
			/* Fallback to LE Random address type */
1924
			return BDADDR_LE_RANDOM;
1925
		}
1926

1927
	default:
1928
		/* Fallback to BR/EDR type */
1929
		return BDADDR_BREDR;
1930 1931 1932
	}
}

1933 1934
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
1935 1936
{
	struct mgmt_rp_get_connections *rp;
1937
	struct hci_conn *c;
1938
	size_t rp_len;
1939 1940
	int err;
	u16 i;
1941 1942 1943

	BT_DBG("");

1944
	hci_dev_lock(hdev);
1945

1946
	if (!hdev_is_powered(hdev)) {
1947
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
1948
				 MGMT_STATUS_NOT_POWERED);
1949 1950 1951
		goto unlock;
	}

1952
	i = 0;
1953 1954
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
1955
			i++;
1956 1957
	}

1958
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1959
	rp = kmalloc(rp_len, GFP_KERNEL);
1960
	if (!rp) {
1961 1962 1963 1964 1965
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
1966
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1967 1968
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1969
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1970
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
1971
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
1972 1973 1974 1975
			continue;
		i++;
	}

1976
	rp->conn_count = cpu_to_le16(i);
1977

1978 1979
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1980

1981
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
1982
			   rp_len);
1983

1984
	kfree(rp);
1985 1986

unlock:
1987
	hci_dev_unlock(hdev);
1988 1989 1990
	return err;
}

1991
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
1992
				   struct mgmt_cp_pin_code_neg_reply *cp)
1993 1994 1995 1996
{
	struct pending_cmd *cmd;
	int err;

1997
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1998
			       sizeof(*cp));
1999 2000 2001
	if (!cmd)
		return -ENOMEM;

2002
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2003
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2004 2005 2006 2007 2008 2009
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2010
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2011
			  u16 len)
2012
{
2013
	struct hci_conn *conn;
2014
	struct mgmt_cp_pin_code_reply *cp = data;
2015
	struct hci_cp_pin_code_reply reply;
2016
	struct pending_cmd *cmd;
2017 2018 2019 2020
	int err;

	BT_DBG("");

2021
	hci_dev_lock(hdev);
2022

2023
	if (!hdev_is_powered(hdev)) {
2024
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2025
				 MGMT_STATUS_NOT_POWERED);
2026 2027 2028
		goto failed;
	}

2029
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2030
	if (!conn) {
2031
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2032
				 MGMT_STATUS_NOT_CONNECTED);
2033 2034 2035 2036
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2037 2038 2039
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2040 2041 2042

		BT_ERR("PIN code is not 16 bytes long");

2043
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2044
		if (err >= 0)
2045
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2046
					 MGMT_STATUS_INVALID_PARAMS);
2047 2048 2049 2050

		goto failed;
	}

2051
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2052 2053
	if (!cmd) {
		err = -ENOMEM;
2054
		goto failed;
2055
	}
2056

2057
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2058
	reply.pin_len = cp->pin_len;
2059
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2060 2061 2062

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2063
		mgmt_pending_remove(cmd);
2064 2065

failed:
2066
	hci_dev_unlock(hdev);
2067 2068 2069
	return err;
}

2070 2071
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2072
{
2073
	struct mgmt_cp_set_io_capability *cp = data;
2074 2075 2076

	BT_DBG("");

2077
	hci_dev_lock(hdev);
2078 2079 2080 2081

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2082
	       hdev->io_capability);
2083

2084
	hci_dev_unlock(hdev);
2085

2086 2087
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2088 2089
}

2090
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2091 2092
{
	struct hci_dev *hdev = conn->hdev;
2093
	struct pending_cmd *cmd;
2094

2095
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2113
	bacpy(&rp.addr.bdaddr, &conn->dst);
2114
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2115

2116
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2117
		     &rp, sizeof(rp));
2118 2119 2120 2121 2122 2123

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2124
	hci_conn_drop(conn);
2125

2126
	mgmt_pending_remove(cmd);
2127 2128 2129 2130 2131 2132 2133 2134 2135
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2136
	if (!cmd)
2137
		BT_DBG("Unable to find a pending command");
2138
	else
2139
		pairing_complete(cmd, mgmt_status(status));
2140 2141
}

2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2158
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2159
		       u16 len)
2160
{
2161
	struct mgmt_cp_pair_device *cp = data;
2162
	struct mgmt_rp_pair_device rp;
2163 2164 2165 2166 2167 2168 2169
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2170 2171 2172 2173
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2174 2175 2176 2177 2178
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2179
	hci_dev_lock(hdev);
2180

2181
	if (!hdev_is_powered(hdev)) {
2182 2183
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2184 2185 2186
		goto unlock;
	}

2187 2188
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2189
		auth_type = HCI_AT_DEDICATED_BONDING;
2190
	else
2191 2192
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2193
	if (cp->addr.type == BDADDR_BREDR)
2194 2195
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2196
	else
2197 2198
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2199

2200
	if (IS_ERR(conn)) {
2201 2202 2203 2204 2205 2206 2207
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2208
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2209
				   status, &rp,
2210
				   sizeof(rp));
2211 2212 2213 2214
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2215
		hci_conn_drop(conn);
2216
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2217
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2218 2219 2220
		goto unlock;
	}

2221
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2222 2223
	if (!cmd) {
		err = -ENOMEM;
2224
		hci_conn_drop(conn);
2225 2226 2227
		goto unlock;
	}

2228
	/* For LE, just connecting isn't a proof that the pairing finished */
2229
	if (cp->addr.type == BDADDR_BREDR)
2230
		conn->connect_cfm_cb = pairing_complete_cb;
2231 2232
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2233

2234 2235 2236 2237 2238 2239
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2240
	    hci_conn_security(conn, sec_level, auth_type))
2241 2242 2243 2244 2245
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2246
	hci_dev_unlock(hdev);
2247 2248 2249
	return err;
}

2250 2251
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2252
{
2253
	struct mgmt_addr_info *addr = data;
2254 2255 2256 2257 2258 2259 2260 2261
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2262
	if (!hdev_is_powered(hdev)) {
2263
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2264
				 MGMT_STATUS_NOT_POWERED);
2265 2266 2267
		goto unlock;
	}

2268 2269
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2270
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2271
				 MGMT_STATUS_INVALID_PARAMS);
2272 2273 2274 2275 2276 2277
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2278
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2279
				 MGMT_STATUS_INVALID_PARAMS);
2280 2281 2282 2283 2284
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2285
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2286
			   addr, sizeof(*addr));
2287 2288 2289 2290 2291
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2292
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2293
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2294
			     u16 hci_op, __le32 passkey)
2295 2296
{
	struct pending_cmd *cmd;
2297
	struct hci_conn *conn;
2298 2299
	int err;

2300
	hci_dev_lock(hdev);
2301

2302
	if (!hdev_is_powered(hdev)) {
2303 2304 2305
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2306
		goto done;
2307 2308
	}

2309 2310
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2311
	else
2312
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2313 2314

	if (!conn) {
2315 2316 2317
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2318 2319
		goto done;
	}
2320

2321
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2322
		/* Continue with pairing via SMP */
2323 2324 2325
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2326 2327 2328
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2329
		else
2330 2331 2332
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2333 2334 2335 2336

		goto done;
	}

2337
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2338 2339
	if (!cmd) {
		err = -ENOMEM;
2340
		goto done;
2341 2342
	}

2343
	/* Continue with pairing via HCI */
2344 2345 2346
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2347
		bacpy(&cp.bdaddr, &addr->bdaddr);
2348 2349 2350
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2351 2352
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2353

2354 2355
	if (err < 0)
		mgmt_pending_remove(cmd);
2356

2357
done:
2358
	hci_dev_unlock(hdev);
2359 2360 2361
	return err;
}

2362 2363 2364 2365 2366 2367 2368
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2369
	return user_pairing_resp(sk, hdev, &cp->addr,
2370 2371 2372 2373
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2374 2375
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2376
{
2377
	struct mgmt_cp_user_confirm_reply *cp = data;
2378 2379 2380 2381

	BT_DBG("");

	if (len != sizeof(*cp))
2382
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2383
				  MGMT_STATUS_INVALID_PARAMS);
2384

2385
	return user_pairing_resp(sk, hdev, &cp->addr,
2386 2387
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2388 2389
}

2390
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2391
				  void *data, u16 len)
2392
{
2393
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2394 2395 2396

	BT_DBG("");

2397
	return user_pairing_resp(sk, hdev, &cp->addr,
2398 2399
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2400 2401
}

2402 2403
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2404
{
2405
	struct mgmt_cp_user_passkey_reply *cp = data;
2406 2407 2408

	BT_DBG("");

2409
	return user_pairing_resp(sk, hdev, &cp->addr,
2410 2411
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2412 2413
}

2414
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2415
				  void *data, u16 len)
2416
{
2417
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2418 2419 2420

	BT_DBG("");

2421
	return user_pairing_resp(sk, hdev, &cp->addr,
2422 2423
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2424 2425
}

2426
static void update_name(struct hci_request *req)
2427
{
2428
	struct hci_dev *hdev = req->hdev;
2429 2430
	struct hci_cp_write_local_name cp;

2431
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2432

2433
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2434 2435
}

2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2464
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2465
			  u16 len)
2466
{
2467
	struct mgmt_cp_set_local_name *cp = data;
2468
	struct pending_cmd *cmd;
2469
	struct hci_request req;
2470 2471 2472 2473
	int err;

	BT_DBG("");

2474
	hci_dev_lock(hdev);
2475

2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

2487
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2488

2489
	if (!hdev_is_powered(hdev)) {
2490
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2491 2492

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2493
				   data, len);
2494 2495 2496 2497
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2498
				 sk);
2499

2500 2501 2502
		goto failed;
	}

2503
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2504 2505 2506 2507 2508
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2509 2510
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

2511
	hci_req_init(&req, hdev);
2512 2513 2514 2515 2516 2517 2518 2519 2520

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

	if (lmp_le_capable(hdev))
		hci_update_ad(&req);

2521
	err = hci_req_run(&req, set_name_complete);
2522 2523 2524 2525
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2526
	hci_dev_unlock(hdev);
2527 2528 2529
	return err;
}

2530
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2531
			       void *data, u16 data_len)
2532 2533 2534 2535
{
	struct pending_cmd *cmd;
	int err;

2536
	BT_DBG("%s", hdev->name);
2537

2538
	hci_dev_lock(hdev);
2539

2540
	if (!hdev_is_powered(hdev)) {
2541
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2542
				 MGMT_STATUS_NOT_POWERED);
2543 2544 2545
		goto unlock;
	}

2546
	if (!lmp_ssp_capable(hdev)) {
2547
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2548
				 MGMT_STATUS_NOT_SUPPORTED);
2549 2550 2551
		goto unlock;
	}

2552
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2553
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2554
				 MGMT_STATUS_BUSY);
2555 2556 2557
		goto unlock;
	}

2558
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2559 2560 2561 2562 2563 2564 2565 2566 2567 2568
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2569
	hci_dev_unlock(hdev);
2570 2571 2572
	return err;
}

2573
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2574
			       void *data, u16 len)
2575
{
2576
	struct mgmt_cp_add_remote_oob_data *cp = data;
2577
	u8 status;
2578 2579
	int err;

2580
	BT_DBG("%s ", hdev->name);
2581

2582
	hci_dev_lock(hdev);
2583

2584
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2585
				      cp->randomizer);
2586
	if (err < 0)
2587
		status = MGMT_STATUS_FAILED;
2588
	else
2589
		status = MGMT_STATUS_SUCCESS;
2590

2591
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2592
			   &cp->addr, sizeof(cp->addr));
2593

2594
	hci_dev_unlock(hdev);
2595 2596 2597
	return err;
}

2598
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2599
				  void *data, u16 len)
2600
{
2601
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2602
	u8 status;
2603 2604
	int err;

2605
	BT_DBG("%s", hdev->name);
2606

2607
	hci_dev_lock(hdev);
2608

2609
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2610
	if (err < 0)
2611
		status = MGMT_STATUS_INVALID_PARAMS;
2612
	else
2613
		status = MGMT_STATUS_SUCCESS;
2614

2615
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2616
			   status, &cp->addr, sizeof(cp->addr));
2617

2618
	hci_dev_unlock(hdev);
2619 2620 2621
	return err;
}

2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2661
				   DISCOV_LE_TIMEOUT);
2662 2663 2664 2665
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2666
				   DISCOV_INTERLEAVED_TIMEOUT);
2667 2668 2669 2670 2671 2672 2673 2674 2675 2676
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

2677
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2678
			   void *data, u16 len)
2679
{
2680
	struct mgmt_cp_start_discovery *cp = data;
2681
	struct pending_cmd *cmd;
2682 2683 2684 2685 2686 2687
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
2688 2689
	int err;

2690
	BT_DBG("%s", hdev->name);
2691

2692
	hci_dev_lock(hdev);
2693

2694
	if (!hdev_is_powered(hdev)) {
2695
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2696
				 MGMT_STATUS_NOT_POWERED);
2697 2698 2699
		goto failed;
	}

2700 2701 2702 2703 2704 2705
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2706
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2707
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2708
				 MGMT_STATUS_BUSY);
2709 2710 2711
		goto failed;
	}

2712
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2713 2714 2715 2716 2717
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2718 2719
	hdev->discovery.type = cp->type;

2720 2721
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
2722
	switch (hdev->discovery.type) {
2723
	case DISCOV_TYPE_BREDR:
2724 2725 2726 2727 2728 2729 2730
		if (!lmp_bredr_capable(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
2742
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
2743
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
2744 2745 2746
		break;

	case DISCOV_TYPE_LE:
2747
	case DISCOV_TYPE_INTERLEAVED:
2748
		if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
2749 2750 2751 2752 2753 2754
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2755 2756
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
		    !lmp_bredr_capable(hdev)) {
2757 2758 2759 2760 2761 2762
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778
		if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
2779 2780
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
2781 2782 2783 2784 2785 2786 2787 2788
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
2789 2790
		break;

2791
	default:
2792 2793 2794 2795
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2796
	}
2797

2798
	err = hci_req_run(&req, start_discovery_complete);
2799 2800
	if (err < 0)
		mgmt_pending_remove(cmd);
2801 2802
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2803 2804

failed:
2805
	hci_dev_unlock(hdev);
2806 2807 2808
	return err;
}

2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

2842
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2843
			  u16 len)
2844
{
2845
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2846
	struct pending_cmd *cmd;
2847 2848
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2849 2850
	struct hci_request req;
	struct hci_cp_le_set_scan_enable enable_cp;
2851 2852
	int err;

2853
	BT_DBG("%s", hdev->name);
2854

2855
	hci_dev_lock(hdev);
2856

2857
	if (!hci_discovery_active(hdev)) {
2858
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2859 2860
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2861 2862 2863 2864
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2865
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2866 2867
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2868
		goto unlock;
2869 2870
	}

2871
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2872 2873
	if (!cmd) {
		err = -ENOMEM;
2874 2875 2876
		goto unlock;
	}

2877 2878
	hci_req_init(&req, hdev);

2879 2880
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
2881 2882 2883 2884 2885 2886 2887 2888 2889 2890
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

			memset(&enable_cp, 0, sizeof(enable_cp));
			enable_cp.enable = LE_SCAN_DISABLE;
			hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
				    sizeof(enable_cp), &enable_cp);
		}
2891

2892 2893 2894 2895
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
2896
						     NAME_PENDING);
2897
		if (!e) {
2898
			mgmt_pending_remove(cmd);
2899 2900 2901 2902 2903 2904 2905
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
2906

2907
		bacpy(&cp.bdaddr, &e->data.bdaddr);
2908 2909
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
2910 2911 2912 2913 2914

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
2915 2916 2917 2918 2919 2920

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
2921 2922
	}

2923
	err = hci_req_run(&req, stop_discovery_complete);
2924 2925
	if (err < 0)
		mgmt_pending_remove(cmd);
2926 2927
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2928

2929
unlock:
2930
	hci_dev_unlock(hdev);
2931 2932 2933
	return err;
}

2934
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
2935
			u16 len)
2936
{
2937
	struct mgmt_cp_confirm_name *cp = data;
2938 2939 2940
	struct inquiry_entry *e;
	int err;

2941
	BT_DBG("%s", hdev->name);
2942 2943 2944

	hci_dev_lock(hdev);

2945
	if (!hci_discovery_active(hdev)) {
2946
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2947
				 MGMT_STATUS_FAILED);
2948 2949 2950
		goto failed;
	}

2951
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
2952
	if (!e) {
2953
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2954
				 MGMT_STATUS_INVALID_PARAMS);
2955 2956 2957 2958 2959 2960 2961 2962
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2963
		hci_inquiry_cache_update_resolve(hdev, e);
2964 2965
	}

2966 2967
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
2968 2969 2970 2971 2972 2973

failed:
	hci_dev_unlock(hdev);
	return err;
}

2974
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
2975
			u16 len)
2976
{
2977
	struct mgmt_cp_block_device *cp = data;
2978
	u8 status;
2979 2980
	int err;

2981
	BT_DBG("%s", hdev->name);
2982

2983
	if (!bdaddr_type_is_valid(cp->addr.type))
2984 2985 2986
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
2987

2988
	hci_dev_lock(hdev);
2989

2990
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2991
	if (err < 0)
2992
		status = MGMT_STATUS_FAILED;
2993
	else
2994
		status = MGMT_STATUS_SUCCESS;
2995

2996
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
2997
			   &cp->addr, sizeof(cp->addr));
2998

2999
	hci_dev_unlock(hdev);
3000 3001 3002 3003

	return err;
}

3004
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3005
			  u16 len)
3006
{
3007
	struct mgmt_cp_unblock_device *cp = data;
3008
	u8 status;
3009 3010
	int err;

3011
	BT_DBG("%s", hdev->name);
3012

3013
	if (!bdaddr_type_is_valid(cp->addr.type))
3014 3015 3016
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3017

3018
	hci_dev_lock(hdev);
3019

3020
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3021
	if (err < 0)
3022
		status = MGMT_STATUS_INVALID_PARAMS;
3023
	else
3024
		status = MGMT_STATUS_SUCCESS;
3025

3026
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3027
			   &cp->addr, sizeof(cp->addr));
3028

3029
	hci_dev_unlock(hdev);
3030 3031 3032 3033

	return err;
}

3034 3035 3036 3037
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3038
	struct hci_request req;
3039
	int err;
3040
	__u16 source;
3041 3042 3043

	BT_DBG("%s", hdev->name);

3044 3045 3046 3047 3048 3049
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3050 3051
	hci_dev_lock(hdev);

3052
	hdev->devid_source = source;
3053 3054 3055 3056 3057 3058
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3059 3060 3061
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3062 3063 3064 3065 3066 3067

	hci_dev_unlock(hdev);

	return err;
}

3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3084 3085 3086 3087 3088 3089 3090
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3091 3092 3093 3094 3095 3096 3097 3098 3099 3100
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3101
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3102
				void *data, u16 len)
3103
{
3104
	struct mgmt_mode *cp = data;
3105 3106
	struct pending_cmd *cmd;
	struct hci_request req;
3107 3108
	int err;

3109
	BT_DBG("%s", hdev->name);
3110

3111
	if (!lmp_bredr_capable(hdev) || hdev->hci_ver < BLUETOOTH_VER_1_2)
3112 3113 3114
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3115 3116 3117 3118
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3119
	if (!hdev_is_powered(hdev))
3120
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3121
				  MGMT_STATUS_NOT_POWERED);
3122 3123

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3124
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3125
				  MGMT_STATUS_REJECTED);
3126 3127 3128

	hci_dev_lock(hdev);

3129 3130 3131 3132 3133 3134
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3135 3136 3137 3138 3139 3140
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3141 3142 3143 3144 3145
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3146 3147
	}

3148 3149
	hci_req_init(&req, hdev);

3150
	write_fast_connectable(&req, cp->val);
3151 3152

	err = hci_req_run(&req, fast_connectable_complete);
3153
	if (err < 0) {
3154
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3155
				 MGMT_STATUS_FAILED);
3156
		mgmt_pending_remove(cmd);
3157 3158
	}

3159
unlock:
3160
	hci_dev_unlock(hdev);
3161

3162 3163 3164
	return err;
}

3165 3166
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
3167 3168
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
3169 3170
	if (key->master != 0x00 && key->master != 0x01)
		return false;
3171 3172
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
3173 3174 3175
	return true;
}

3176
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
3177
			       void *cp_data, u16 len)
3178 3179 3180
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
3181
	int i, err;
3182

3183
	key_count = __le16_to_cpu(cp->key_count);
3184 3185 3186 3187 3188

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
3189
		       len, expected_len);
3190
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
3191
				  MGMT_STATUS_INVALID_PARAMS);
3192 3193
	}

3194
	BT_DBG("%s key_count %u", hdev->name, key_count);
3195

3196 3197 3198
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

3199
		if (!ltk_is_valid(key))
3200 3201 3202 3203 3204
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

3218
		hci_add_ltk(hdev, &key->addr.bdaddr,
3219
			    bdaddr_to_le(key->addr.type),
3220 3221
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
3222 3223
	}

3224 3225 3226
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

3227 3228
	hci_dev_unlock(hdev);

3229
	return err;
3230 3231
}

3232
static const struct mgmt_handler {
3233 3234
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
3235 3236
	bool var_len;
	size_t data_len;
3237 3238
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
3278
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
3279 3280 3281
};


3282 3283
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
3284 3285
	void *buf;
	u8 *cp;
3286
	struct mgmt_hdr *hdr;
3287
	u16 opcode, index, len;
3288
	struct hci_dev *hdev = NULL;
3289
	const struct mgmt_handler *handler;
3290 3291 3292 3293 3294 3295 3296
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

3297
	buf = kmalloc(msglen, GFP_KERNEL);
3298 3299 3300 3301 3302 3303 3304 3305
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

3306
	hdr = buf;
3307 3308 3309
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
3310 3311 3312 3313 3314 3315

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

3316
	if (index != MGMT_INDEX_NONE) {
3317 3318 3319
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
3320
					 MGMT_STATUS_INVALID_INDEX);
3321 3322 3323 3324
			goto done;
		}
	}

3325
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
3326
	    mgmt_handlers[opcode].func == NULL) {
3327
		BT_DBG("Unknown op %u", opcode);
3328
		err = cmd_status(sk, index, opcode,
3329
				 MGMT_STATUS_UNKNOWN_COMMAND);
3330 3331 3332 3333
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
3334
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
3335
		err = cmd_status(sk, index, opcode,
3336
				 MGMT_STATUS_INVALID_INDEX);
3337
		goto done;
3338 3339
	}

3340 3341 3342
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
3343
	    (!handler->var_len && len != handler->data_len)) {
3344
		err = cmd_status(sk, index, opcode,
3345
				 MGMT_STATUS_INVALID_PARAMS);
3346 3347 3348
		goto done;
	}

3349 3350 3351 3352 3353
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

3354
	err = handler->func(sk, hdev, cp, len);
3355 3356 3357
	if (err < 0)
		goto done;

3358 3359 3360
	err = msglen;

done:
3361 3362 3363
	if (hdev)
		hci_dev_put(hdev);

3364 3365 3366
	kfree(buf);
	return err;
}
3367

3368 3369 3370 3371 3372 3373 3374 3375
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

3376
int mgmt_index_added(struct hci_dev *hdev)
3377
{
3378 3379 3380
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3381
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
3382 3383
}

3384
int mgmt_index_removed(struct hci_dev *hdev)
3385
{
3386
	u8 status = MGMT_STATUS_INVALID_INDEX;
3387

3388 3389 3390
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3391
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3392

3393
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
3394 3395
}

3396
struct cmd_lookup {
3397
	struct sock *sk;
3398
	struct hci_dev *hdev;
3399
	u8 mgmt_status;
3400 3401
};

3402
static void settings_rsp(struct pending_cmd *cmd, void *data)
3403
{
3404
	struct cmd_lookup *match = data;
3405

3406
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
3407 3408 3409 3410 3411 3412 3413 3414 3415

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
3416
}
3417

3418
static void set_bredr_scan(struct hci_request *req)
3419
{
3420
	struct hci_dev *hdev = req->hdev;
3421 3422
	u8 scan = 0;

3423 3424 3425 3426 3427 3428
	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

3429 3430 3431 3432 3433
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

3434 3435
	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3436 3437
}

3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

3456
static int powered_update_hci(struct hci_dev *hdev)
3457
{
3458
	struct hci_request req;
3459
	u8 link_sec;
3460

3461 3462
	hci_req_init(&req, hdev);

3463 3464 3465
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
3466

3467
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
3468
	}
3469

3470 3471
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
3472
		struct hci_cp_write_le_host_supported cp;
3473

3474 3475
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
3476

3477 3478 3479 3480 3481
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
3482 3483
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
3484
	}
3485

3486 3487
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
3488 3489
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
3490

3491
	if (lmp_bredr_capable(hdev)) {
3492 3493
		set_bredr_scan(&req);
		update_class(&req);
3494
		update_name(&req);
3495
		update_eir(&req);
3496
	}
3497

3498
	return hci_req_run(&req, powered_complete);
3499
}
3500

3501 3502 3503
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
3504 3505
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
3506
	int err;
3507

3508 3509 3510 3511
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
3512 3513
		if (powered_update_hci(hdev) == 0)
			return 0;
3514

3515 3516 3517
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
3518 3519
	}

3520 3521 3522 3523 3524 3525 3526 3527
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
3528
	err = new_settings(hdev, match.sk);
3529 3530 3531 3532

	if (match.sk)
		sock_put(match.sk);

3533
	return err;
3534
}
3535

3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556
int mgmt_set_powered_failed(struct hci_dev *hdev, int err)
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
		return -ENOENT;

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

	err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);

	mgmt_pending_remove(cmd);

	return err;
}

3557
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3558
{
3559
	struct cmd_lookup match = { NULL, hdev };
3560 3561
	bool changed = false;
	int err = 0;
3562

3563 3564 3565 3566 3567 3568 3569
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3570

3571
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3572
			     &match);
3573

3574 3575
	if (changed)
		err = new_settings(hdev, match.sk);
3576

3577 3578 3579
	if (match.sk)
		sock_put(match.sk);

3580
	return err;
3581
}
3582

3583
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3584
{
3585
	struct pending_cmd *cmd;
3586 3587
	bool changed = false;
	int err = 0;
3588

3589 3590 3591 3592 3593 3594 3595
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3596

3597
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
3598

3599
	if (changed)
3600
		err = new_settings(hdev, cmd ? cmd->sk : NULL);
3601

3602
	return err;
3603
}
3604

3605
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3606
{
3607 3608
	u8 mgmt_err = mgmt_status(status);

3609
	if (scan & SCAN_PAGE)
3610
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3611
				     cmd_status_rsp, &mgmt_err);
3612 3613

	if (scan & SCAN_INQUIRY)
3614
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3615
				     cmd_status_rsp, &mgmt_err);
3616 3617 3618 3619

	return 0;
}

3620 3621
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3622
{
3623
	struct mgmt_ev_new_link_key ev;
3624

3625
	memset(&ev, 0, sizeof(ev));
3626

3627
	ev.store_hint = persistent;
3628
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3629
	ev.key.addr.type = BDADDR_BREDR;
3630
	ev.key.type = key->type;
3631
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3632
	ev.key.pin_len = key->pin_len;
3633

3634
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3635
}
3636

3637 3638 3639 3640 3641 3642 3643 3644
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3645
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
3646 3647 3648 3649 3650 3651 3652 3653 3654 3655
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

3656 3657
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
3658 3659
}

3660
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3661 3662
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
3663
{
3664 3665 3666
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
3667

3668
	bacpy(&ev->addr.bdaddr, bdaddr);
3669
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3670

3671
	ev->flags = __cpu_to_le32(flags);
3672

3673 3674
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
3675
					  name, name_len);
3676 3677

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
3678
		eir_len = eir_append_data(ev->eir, eir_len,
3679
					  EIR_CLASS_OF_DEV, dev_class, 3);
3680

3681
	ev->eir_len = cpu_to_le16(eir_len);
3682 3683

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
3684
			  sizeof(*ev) + eir_len, NULL);
3685 3686
}

3687 3688
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
3689
	struct mgmt_cp_disconnect *cp = cmd->param;
3690
	struct sock **sk = data;
3691
	struct mgmt_rp_disconnect rp;
3692

3693 3694
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3695

3696
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
3697
		     sizeof(rp));
3698 3699 3700 3701

	*sk = cmd->sk;
	sock_hold(*sk);

3702
	mgmt_pending_remove(cmd);
3703 3704
}

3705
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
3706
{
3707
	struct hci_dev *hdev = data;
3708 3709
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
3710 3711

	memset(&rp, 0, sizeof(rp));
3712 3713
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3714

3715 3716
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

3717
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
3718 3719 3720 3721

	mgmt_pending_remove(cmd);
}

3722
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
3723
			     u8 link_type, u8 addr_type, u8 reason)
3724
{
3725
	struct mgmt_ev_device_disconnected ev;
3726 3727 3728
	struct sock *sk = NULL;
	int err;

3729
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
3730

3731 3732 3733
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
3734

3735
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
3736
			 sk);
3737 3738

	if (sk)
3739
		sock_put(sk);
3740

3741
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
3742
			     hdev);
3743

3744 3745 3746
	return err;
}

3747
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
3748
			   u8 link_type, u8 addr_type, u8 status)
3749
{
3750
	struct mgmt_rp_disconnect rp;
3751 3752 3753
	struct pending_cmd *cmd;
	int err;

3754 3755 3756
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

3757
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
3758 3759 3760
	if (!cmd)
		return -ENOENT;

3761
	bacpy(&rp.addr.bdaddr, bdaddr);
3762
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3763

3764
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
3765
			   mgmt_status(status), &rp, sizeof(rp));
3766

3767
	mgmt_pending_remove(cmd);
3768 3769

	return err;
3770
}
3771

3772
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3773
			u8 addr_type, u8 status)
3774 3775 3776
{
	struct mgmt_ev_connect_failed ev;

3777
	bacpy(&ev.addr.bdaddr, bdaddr);
3778
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3779
	ev.status = mgmt_status(status);
3780

3781
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
3782
}
3783

3784
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
3785 3786 3787
{
	struct mgmt_ev_pin_code_request ev;

3788
	bacpy(&ev.addr.bdaddr, bdaddr);
3789
	ev.addr.type = BDADDR_BREDR;
3790
	ev.secure = secure;
3791

3792
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
3793
			  NULL);
3794 3795
}

3796
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3797
				 u8 status)
3798 3799
{
	struct pending_cmd *cmd;
3800
	struct mgmt_rp_pin_code_reply rp;
3801 3802
	int err;

3803
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
3804 3805 3806
	if (!cmd)
		return -ENOENT;

3807
	bacpy(&rp.addr.bdaddr, bdaddr);
3808
	rp.addr.type = BDADDR_BREDR;
3809

3810
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
3811
			   mgmt_status(status), &rp, sizeof(rp));
3812

3813
	mgmt_pending_remove(cmd);
3814 3815 3816 3817

	return err;
}

3818
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3819
				     u8 status)
3820 3821
{
	struct pending_cmd *cmd;
3822
	struct mgmt_rp_pin_code_reply rp;
3823 3824
	int err;

3825
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
3826 3827 3828
	if (!cmd)
		return -ENOENT;

3829
	bacpy(&rp.addr.bdaddr, bdaddr);
3830
	rp.addr.type = BDADDR_BREDR;
3831

3832
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
3833
			   mgmt_status(status), &rp, sizeof(rp));
3834

3835
	mgmt_pending_remove(cmd);
3836 3837 3838

	return err;
}
3839

3840
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3841 3842
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
3843 3844 3845
{
	struct mgmt_ev_user_confirm_request ev;

3846
	BT_DBG("%s", hdev->name);
3847

3848
	bacpy(&ev.addr.bdaddr, bdaddr);
3849
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3850
	ev.confirm_hint = confirm_hint;
3851
	ev.value = value;
3852

3853
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3854
			  NULL);
3855 3856
}

3857
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3858
			      u8 link_type, u8 addr_type)
3859 3860 3861 3862 3863
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3864
	bacpy(&ev.addr.bdaddr, bdaddr);
3865
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3866 3867

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
3868
			  NULL);
3869 3870
}

3871
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3872 3873
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
3874 3875 3876 3877 3878
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3879
	cmd = mgmt_pending_find(opcode, hdev);
3880 3881 3882
	if (!cmd)
		return -ENOENT;

3883
	bacpy(&rp.addr.bdaddr, bdaddr);
3884
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3885
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
3886
			   &rp, sizeof(rp));
3887

3888
	mgmt_pending_remove(cmd);
3889 3890 3891 3892

	return err;
}

3893
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3894
				     u8 link_type, u8 addr_type, u8 status)
3895
{
3896
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3897
					  status, MGMT_OP_USER_CONFIRM_REPLY);
3898 3899
}

3900
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3901
					 u8 link_type, u8 addr_type, u8 status)
3902
{
3903
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3904 3905
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
3906
}
3907

3908
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3909
				     u8 link_type, u8 addr_type, u8 status)
3910
{
3911
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3912
					  status, MGMT_OP_USER_PASSKEY_REPLY);
3913 3914
}

3915
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3916
					 u8 link_type, u8 addr_type, u8 status)
3917
{
3918
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3919 3920
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
3921 3922
}

3923 3924 3925 3926 3927 3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

3939
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3940
		     u8 addr_type, u8 status)
3941 3942 3943
{
	struct mgmt_ev_auth_failed ev;

3944
	bacpy(&ev.addr.bdaddr, bdaddr);
3945
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3946
	ev.status = mgmt_status(status);
3947

3948
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3949
}
3950

3951 3952 3953
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
3954 3955
	bool changed = false;
	int err = 0;
3956 3957 3958 3959

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
3960
				     cmd_status_rsp, &mgmt_err);
3961 3962 3963
		return 0;
	}

3964 3965 3966 3967 3968 3969 3970 3971
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

3972
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
3973
			     &match);
3974

3975 3976
	if (changed)
		err = new_settings(hdev, match.sk);
3977 3978 3979 3980 3981 3982 3983

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3984
static void clear_eir(struct hci_request *req)
3985
{
3986
	struct hci_dev *hdev = req->hdev;
3987 3988
	struct hci_cp_write_eir cp;

3989
	if (!lmp_ext_inq_capable(hdev))
3990
		return;
3991

3992 3993
	memset(hdev->eir, 0, sizeof(hdev->eir));

3994 3995
	memset(&cp, 0, sizeof(cp));

3996
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
3997 3998
}

3999
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
4000 4001
{
	struct cmd_lookup match = { NULL, hdev };
4002
	struct hci_request req;
4003 4004
	bool changed = false;
	int err = 0;
4005 4006 4007

	if (status) {
		u8 mgmt_err = mgmt_status(status);
4008 4009

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
4010
						 &hdev->dev_flags))
4011 4012
			err = new_settings(hdev, NULL);

4013 4014
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
4015 4016 4017 4018 4019 4020 4021 4022 4023 4024

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
4025 4026 4027 4028
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

4029 4030
	if (changed)
		err = new_settings(hdev, match.sk);
4031

4032
	if (match.sk)
4033 4034
		sock_put(match.sk);

4035 4036
	hci_req_init(&req, hdev);

4037
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
4038
		update_eir(&req);
4039
	else
4040 4041 4042
		clear_eir(&req);

	hci_req_run(&req, NULL);
4043

4044 4045 4046
	return err;
}

4047
static void sk_lookup(struct pending_cmd *cmd, void *data)
4048 4049 4050 4051 4052 4053 4054 4055 4056
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

4057
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
4058
				   u8 status)
4059
{
4060 4061
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
4062

4063 4064 4065
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
4066 4067

	if (!status)
4068 4069
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
4070 4071 4072

	if (match.sk)
		sock_put(match.sk);
4073 4074 4075 4076

	return err;
}

4077
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
4078 4079
{
	struct mgmt_cp_set_local_name ev;
4080
	struct pending_cmd *cmd;
4081

4082 4083
	if (status)
		return 0;
4084 4085 4086

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
4087
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
4088

4089
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
4090 4091
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
4092

4093 4094 4095 4096 4097
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
			return 0;
4098
	}
4099

4100 4101
	return mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			  cmd ? cmd->sk : NULL);
4102
}
4103

4104
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
4105
					    u8 *randomizer, u8 status)
4106 4107 4108 4109
{
	struct pending_cmd *cmd;
	int err;

4110
	BT_DBG("%s status %u", hdev->name, status);
4111

4112
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
4113 4114 4115 4116
	if (!cmd)
		return -ENOENT;

	if (status) {
4117 4118
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
4119 4120 4121 4122 4123 4124
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

4125
		err = cmd_complete(cmd->sk, hdev->id,
4126 4127
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
4128 4129 4130 4131 4132 4133
	}

	mgmt_pending_remove(cmd);

	return err;
}
4134

4135 4136 4137 4138 4139 4140 4141 4142 4143 4144
int mgmt_le_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;
	int err = 0;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		if (enable && test_and_clear_bit(HCI_LE_ENABLED,
4145
						 &hdev->dev_flags))
4146
			err = new_settings(hdev, NULL);
4147

4148 4149
		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	if (changed)
		err = new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

4173
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4174 4175
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
4176
{
4177 4178
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
4179
	size_t ev_size;
4180

4181 4182 4183
	if (!hci_discovery_active(hdev))
		return -EPERM;

4184 4185
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
4186 4187
		return -EINVAL;

4188 4189
	memset(buf, 0, sizeof(buf));

4190
	bacpy(&ev->addr.bdaddr, bdaddr);
4191
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4192
	ev->rssi = rssi;
4193
	if (cfm_name)
4194
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
4195
	if (!ssp)
4196
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
4197

4198
	if (eir_len > 0)
4199
		memcpy(ev->eir, eir, eir_len);
4200

4201 4202
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
4203
					  dev_class, 3);
4204

4205
	ev->eir_len = cpu_to_le16(eir_len);
4206
	ev_size = sizeof(*ev) + eir_len;
4207

4208
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
4209
}
4210

4211
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4212
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
4213
{
4214 4215 4216
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
4217

4218
	ev = (struct mgmt_ev_device_found *) buf;
4219

4220 4221 4222
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
4223
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4224 4225 4226
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
4227
				  name_len);
4228

4229
	ev->eir_len = cpu_to_le16(eir_len);
4230

4231
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
4232
			  sizeof(*ev) + eir_len, NULL);
4233
}
4234

4235
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
4236
{
4237
	struct mgmt_ev_discovering ev;
4238 4239
	struct pending_cmd *cmd;

4240 4241
	BT_DBG("%s discovering %u", hdev->name, discovering);

4242
	if (discovering)
4243
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
4244
	else
4245
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
4246 4247

	if (cmd != NULL) {
4248 4249
		u8 type = hdev->discovery.type;

4250 4251
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
4252 4253 4254
		mgmt_pending_remove(cmd);
	}

4255 4256 4257 4258 4259
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
4260
}
4261

4262
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4263 4264 4265 4266
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

4267
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
4268

4269 4270
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4271

4272
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
4273
			  cmd ? cmd->sk : NULL);
4274 4275
}

4276
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4277 4278 4279 4280
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

4281
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
4282

4283 4284
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4285

4286
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
4287
			  cmd ? cmd->sk : NULL);
4288
}
4289 4290 4291

module_param(enable_hs, bool, 0644);
MODULE_PARM_DESC(enable_hs, "Enable High Speed support");