mgmt.c 105.8 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35
#define MGMT_VERSION	1
36
#define MGMT_REVISION	3
37

38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
76
	MGMT_OP_SET_DEVICE_ID,
77
	MGMT_OP_SET_ADVERTISING,
78
	MGMT_OP_SET_BREDR,
79
	MGMT_OP_SET_STATIC_ADDRESS,
80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
103
	MGMT_EV_PASSKEY_NOTIFY,
104 105
};

106
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
107

108 109 110
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

111 112
struct pending_cmd {
	struct list_head list;
113
	u16 opcode;
114
	int index;
115
	void *param;
116
	struct sock *sk;
117
	void *user_data;
118 119
};

120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

185 186 187 188 189
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

190 191 192 193 194 195 196 197
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

198
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
199 200 201 202
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
203
	int err;
204

205
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
206

207
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
208 209 210 211 212
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

213
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
214
	hdr->index = cpu_to_le16(index);
215 216 217 218
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
219
	ev->opcode = cpu_to_le16(cmd);
220

221 222
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
223 224
		kfree_skb(skb);

225
	return err;
226 227
}

228
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
229
			void *rp, size_t rp_len)
230 231 232 233
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
234
	int err;
235 236 237

	BT_DBG("sock %p", sk);

238
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
239 240 241 242 243
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

244
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
245
	hdr->index = cpu_to_le16(index);
246
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
247

248
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
249
	ev->opcode = cpu_to_le16(cmd);
250
	ev->status = status;
251 252 253

	if (rp)
		memcpy(ev->data, rp, rp_len);
254

255 256
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
257 258
		kfree_skb(skb);

259
	return err;
260 261
}

262 263
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
264 265 266 267 268 269
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
270
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
271

272
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
273
			    sizeof(rp));
274 275
}

276 277
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
278 279
{
	struct mgmt_rp_read_commands *rp;
280 281
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
282
	__le16 *opcode;
283 284 285 286 287 288 289 290 291 292 293
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

294 295
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
296 297 298 299 300 301 302

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

303
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
304
			   rp_size);
305 306 307 308 309
	kfree(rp);

	return err;
}

310 311
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
312 313
{
	struct mgmt_rp_read_index_list *rp;
314
	struct hci_dev *d;
315
	size_t rp_len;
316
	u16 count;
317
	int err;
318 319 320 321 322 323

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
324 325 326 327
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

328 329 330
		count++;
	}

331 332 333
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
334
		read_unlock(&hci_dev_list_lock);
335
		return -ENOMEM;
336
	}
337

338
	count = 0;
339
	list_for_each_entry(d, &hci_dev_list, list) {
340
		if (test_bit(HCI_SETUP, &d->dev_flags))
341 342
			continue;

343 344 345
		if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
			continue;

346 347 348
		if (!mgmt_valid_hdev(d))
			continue;

349
		rp->index[count++] = cpu_to_le16(d->id);
350 351 352
		BT_DBG("Added hci%u", d->id);
	}

353 354 355
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

356 357
	read_unlock(&hci_dev_list_lock);

358
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
359
			   rp_len);
360

361 362 363
	kfree(rp);

	return err;
364 365
}

366 367 368 369 370 371 372
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

373
	if (lmp_ssp_capable(hdev))
374 375
		settings |= MGMT_SETTING_SSP;

376
	if (lmp_bredr_capable(hdev)) {
377
		settings |= MGMT_SETTING_CONNECTABLE;
378 379
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
380
		settings |= MGMT_SETTING_DISCOVERABLE;
381 382
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
383
		settings |= MGMT_SETTING_HS;
384
	}
385

386
	if (lmp_le_capable(hdev)) {
387
		settings |= MGMT_SETTING_LE;
388 389
		settings |= MGMT_SETTING_ADVERTISING;
	}
390 391 392 393 394 395 396 397

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

398
	if (hdev_is_powered(hdev))
399 400
		settings |= MGMT_SETTING_POWERED;

401
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
402 403
		settings |= MGMT_SETTING_CONNECTABLE;

404 405 406
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

407
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
408 409
		settings |= MGMT_SETTING_DISCOVERABLE;

410
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
411 412
		settings |= MGMT_SETTING_PAIRABLE;

413
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
414 415
		settings |= MGMT_SETTING_BREDR;

416
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
417 418
		settings |= MGMT_SETTING_LE;

419
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
420 421
		settings |= MGMT_SETTING_LINK_SECURITY;

422
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
423 424
		settings |= MGMT_SETTING_SSP;

425 426 427
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

428 429 430
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags))
		settings |= MGMT_SETTING_ADVERTISING;

431 432 433
	return settings;
}

434 435
#define PNP_INFO_SVCLASS_ID		0x1200

436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

567
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
568 569 570 571 572 573 574
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

575 576 577 578 579 580 581 582 583 584 585 586
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

587
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
588
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
589
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
590 591
}

592
static void update_eir(struct hci_request *req)
593
{
594
	struct hci_dev *hdev = req->hdev;
595 596
	struct hci_cp_write_eir cp;

597
	if (!hdev_is_powered(hdev))
598
		return;
599

600
	if (!lmp_ext_inq_capable(hdev))
601
		return;
602

603
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
604
		return;
605

606
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
607
		return;
608 609 610 611 612 613

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
614
		return;
615 616 617

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

618
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
619 620 621 622 623 624 625 626 627 628 629 630 631
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

632
static void update_class(struct hci_request *req)
633
{
634
	struct hci_dev *hdev = req->hdev;
635 636 637 638
	u8 cod[3];

	BT_DBG("%s", hdev->name);

639
	if (!hdev_is_powered(hdev))
640
		return;
641

642
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
643
		return;
644 645 646 647 648 649

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
650
		return;
651

652
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
653 654
}

655 656 657
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
658
					    service_cache.work);
659
	struct hci_request req;
660

661
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
662 663
		return;

664 665
	hci_req_init(&req, hdev);

666 667
	hci_dev_lock(hdev);

668 669
	update_eir(&req);
	update_class(&req);
670 671

	hci_dev_unlock(hdev);
672 673

	hci_req_run(&req, NULL);
674 675
}

676
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
677
{
678
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
679 680
		return;

681
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
682

683 684 685 686 687 688
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
689 690
}

691
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
692
				void *data, u16 data_len)
693
{
694
	struct mgmt_rp_read_info rp;
695

696
	BT_DBG("sock %p %s", sk, hdev->name);
697

698
	hci_dev_lock(hdev);
699

700 701
	memset(&rp, 0, sizeof(rp));

702
	bacpy(&rp.bdaddr, &hdev->bdaddr);
703

704
	rp.version = hdev->hci_ver;
705
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
706 707 708

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
709

710
	memcpy(rp.dev_class, hdev->dev_class, 3);
711

712
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
713
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
714

715
	hci_dev_unlock(hdev);
716

717
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
718
			    sizeof(rp));
719 720
}

721 722 723
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
724
	kfree(cmd->param);
725 726 727
	kfree(cmd);
}

728
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
729 730
					    struct hci_dev *hdev, void *data,
					    u16 len)
731 732 733
{
	struct pending_cmd *cmd;

734
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
735
	if (!cmd)
736
		return NULL;
737 738

	cmd->opcode = opcode;
739
	cmd->index = hdev->id;
740

741
	cmd->param = kmalloc(len, GFP_KERNEL);
742
	if (!cmd->param) {
743
		kfree(cmd);
744
		return NULL;
745 746
	}

747 748
	if (data)
		memcpy(cmd->param, data, len);
749 750 751 752

	cmd->sk = sk;
	sock_hold(sk);

753
	list_add(&cmd->list, &hdev->mgmt_pending);
754

755
	return cmd;
756 757
}

758
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
759 760
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
761
				 void *data)
762
{
763
	struct pending_cmd *cmd, *tmp;
764

765
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
766
		if (opcode > 0 && cmd->opcode != opcode)
767 768 769 770 771 772
			continue;

		cb(cmd, data);
	}
}

773
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
774
{
775
	struct pending_cmd *cmd;
776

777
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
778 779
		if (cmd->opcode == opcode)
			return cmd;
780 781 782 783 784
	}

	return NULL;
}

785
static void mgmt_pending_remove(struct pending_cmd *cmd)
786 787 788 789 790
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

791
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
792
{
793
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
794

795
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
796
			    sizeof(settings));
797 798
}

799
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
800
		       u16 len)
801
{
802
	struct mgmt_mode *cp = data;
803
	struct pending_cmd *cmd;
804
	int err;
805

806
	BT_DBG("request for %s", hdev->name);
807

808 809 810 811
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

812
	hci_dev_lock(hdev);
813

814 815 816 817 818 819
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

820 821 822 823
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
824 825 826
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
827 828 829 830
			goto failed;
		}
	}

831
	if (!!cp->val == hdev_is_powered(hdev)) {
832
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
833 834 835
		goto failed;
	}

836
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
837 838
	if (!cmd) {
		err = -ENOMEM;
839
		goto failed;
840
	}
841

842
	if (cp->val)
843
		queue_work(hdev->req_workqueue, &hdev->power_on);
844
	else
845
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
846

847
	err = 0;
848 849

failed:
850
	hci_dev_unlock(hdev);
851
	return err;
852 853
}

854 855
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
856 857 858 859
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

860
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
861 862 863 864 865 866 867 868
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
869
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
870 871 872 873 874
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

875 876 877
	/* Time stamp */
	__net_timestamp(skb);

878 879 880 881 882 883 884 885 886 887 888 889 890 891 892
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

static void settings_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

923
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
924
			    u16 len)
925
{
926
	struct mgmt_cp_set_discoverable *cp = data;
927
	struct pending_cmd *cmd;
928
	u16 timeout;
929 930 931
	u8 scan;
	int err;

932
	BT_DBG("request for %s", hdev->name);
933

934
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
935 936 937
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				 MGMT_STATUS_NOT_SUPPORTED);

938 939 940 941
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

942
	timeout = __le16_to_cpu(cp->timeout);
943
	if (!cp->val && timeout > 0)
944
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
945
				  MGMT_STATUS_INVALID_PARAMS);
946

947
	hci_dev_lock(hdev);
948

949
	if (!hdev_is_powered(hdev) && timeout > 0) {
950
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
951
				 MGMT_STATUS_NOT_POWERED);
952 953 954
		goto failed;
	}

955
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
956
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
957
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
958
				 MGMT_STATUS_BUSY);
959 960 961
		goto failed;
	}

962
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
963
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
964
				 MGMT_STATUS_REJECTED);
965 966 967 968
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
969 970 971 972 973 974 975
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

976
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
977 978 979 980 981 982
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

983 984 985 986
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
987 988 989 990 991 992 993 994 995 996 997
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

998
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
999 1000 1001
		goto failed;
	}

1002
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1003 1004
	if (!cmd) {
		err = -ENOMEM;
1005
		goto failed;
1006
	}
1007 1008 1009

	scan = SCAN_PAGE;

1010
	if (cp->val)
1011
		scan |= SCAN_INQUIRY;
1012
	else
1013
		cancel_delayed_work(&hdev->discov_off);
1014 1015 1016

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1017
		mgmt_pending_remove(cmd);
1018

1019
	if (cp->val)
1020
		hdev->discov_timeout = timeout;
1021

1022
failed:
1023
	hci_dev_unlock(hdev);
1024 1025 1026
	return err;
}

1027 1028
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1029
	struct hci_dev *hdev = req->hdev;
1030 1031 1032
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1033 1034 1035
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1050 1051 1052 1053 1054 1055 1056
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1057 1058
}

1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1079
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1080
			   u16 len)
1081
{
1082
	struct mgmt_mode *cp = data;
1083
	struct pending_cmd *cmd;
1084
	struct hci_request req;
1085 1086 1087
	u8 scan;
	int err;

1088
	BT_DBG("request for %s", hdev->name);
1089

1090
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1091 1092 1093
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

1094 1095 1096 1097
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1098
	hci_dev_lock(hdev);
1099

1100
	if (!hdev_is_powered(hdev)) {
1101 1102 1103 1104 1105
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

1106
		if (cp->val) {
1107
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1108
		} else {
1109 1110 1111
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
1112

1113
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1114 1115 1116 1117 1118 1119
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1120 1121 1122
		goto failed;
	}

1123
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1124
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1125
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1126
				 MGMT_STATUS_BUSY);
1127 1128 1129
		goto failed;
	}

1130
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1131
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1132 1133 1134
		goto failed;
	}

1135
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1136 1137
	if (!cmd) {
		err = -ENOMEM;
1138
		goto failed;
1139
	}
1140

1141
	if (cp->val) {
1142
		scan = SCAN_PAGE;
1143
	} else {
1144 1145
		scan = 0;

1146
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1147
		    hdev->discov_timeout > 0)
1148 1149 1150
			cancel_delayed_work(&hdev->discov_off);
	}

1151 1152 1153 1154
	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);

1155 1156 1157 1158 1159 1160 1161
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1162 1163
		write_fast_connectable(&req, false);

1164
	err = hci_req_run(&req, set_connectable_complete);
1165
	if (err < 0)
1166
		mgmt_pending_remove(cmd);
1167 1168

failed:
1169
	hci_dev_unlock(hdev);
1170 1171 1172
	return err;
}

1173
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1174
			u16 len)
1175
{
1176
	struct mgmt_mode *cp = data;
1177 1178
	int err;

1179
	BT_DBG("request for %s", hdev->name);
1180

1181 1182 1183 1184
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1185
	hci_dev_lock(hdev);
1186 1187

	if (cp->val)
1188
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1189
	else
1190
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1191

1192
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1193 1194 1195
	if (err < 0)
		goto failed;

1196
	err = new_settings(hdev, sk);
1197 1198

failed:
1199
	hci_dev_unlock(hdev);
1200 1201 1202
	return err;
}

1203 1204
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1205 1206 1207
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1208
	u8 val;
1209 1210
	int err;

1211
	BT_DBG("request for %s", hdev->name);
1212

1213
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1214 1215 1216
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_NOT_SUPPORTED);

1217 1218 1219 1220
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1221 1222
	hci_dev_lock(hdev);

1223
	if (!hdev_is_powered(hdev)) {
1224 1225 1226
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1227
					  &hdev->dev_flags)) {
1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1239 1240 1241 1242
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1243
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1244
				 MGMT_STATUS_BUSY);
1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1272
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1273 1274 1275
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1276
	u8 val;
1277 1278
	int err;

1279
	BT_DBG("request for %s", hdev->name);
1280

1281 1282 1283
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1284

1285 1286 1287 1288
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1289
	hci_dev_lock(hdev);
1290

1291 1292
	val = !!cp->val;

1293
	if (!hdev_is_powered(hdev)) {
1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1308 1309 1310 1311
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1312 1313
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1339
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1340 1341
{
	struct mgmt_mode *cp = data;
1342 1343
	bool changed;
	int err;
1344

1345
	BT_DBG("request for %s", hdev->name);
1346

1347
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1348
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1349
				  MGMT_STATUS_NOT_SUPPORTED);
1350

1351 1352 1353 1354
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1355 1356
	hci_dev_lock(hdev);

1357
	if (cp->val) {
1358
		changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1359 1360 1361 1362 1363 1364 1365
	} else {
		if (hdev_is_powered(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					 MGMT_STATUS_REJECTED);
			goto unlock;
		}

1366
		changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1367
	}
1368 1369 1370 1371 1372 1373 1374

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1375

1376 1377 1378
unlock:
	hci_dev_unlock(hdev);
	return err;
1379 1380
}

1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400
static void le_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

1401
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1402 1403 1404 1405
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
1406
	struct hci_request req;
1407
	int err;
1408
	u8 val, enabled;
1409

1410
	BT_DBG("request for %s", hdev->name);
1411

1412 1413 1414
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1415

1416 1417 1418 1419
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1420
	/* LE-only devices do not allow toggling LE on/off */
1421
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1422 1423 1424
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1425
	hci_dev_lock(hdev);
1426 1427

	val = !!cp->val;
1428
	enabled = lmp_host_le_capable(hdev);
1429

1430
	if (!hdev_is_powered(hdev) || val == enabled) {
1431 1432 1433 1434 1435 1436 1437
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

1438 1439 1440 1441 1442
		if (!val && test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			clear_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

1443 1444
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1445
			goto unlock;
1446 1447 1448 1449

		if (changed)
			err = new_settings(hdev, sk);

1450
		goto unlock;
1451 1452
	}

1453 1454
	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1455
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1456
				 MGMT_STATUS_BUSY);
1457
		goto unlock;
1458 1459 1460 1461 1462
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1463
		goto unlock;
1464 1465 1466 1467 1468 1469
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1470
		hci_cp.simul = lmp_le_br_capable(hdev);
1471 1472
	}

1473 1474
	hci_req_init(&req, hdev);

1475 1476 1477
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags) && !val)
		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

1478 1479 1480 1481
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1482
	if (err < 0)
1483 1484
		mgmt_pending_remove(cmd);

1485 1486
unlock:
	hci_dev_unlock(hdev);
1487 1488 1489
	return err;
}

1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1558
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1559
{
1560
	struct mgmt_cp_add_uuid *cp = data;
1561
	struct pending_cmd *cmd;
1562
	struct hci_request req;
1563 1564 1565
	struct bt_uuid *uuid;
	int err;

1566
	BT_DBG("request for %s", hdev->name);
1567

1568
	hci_dev_lock(hdev);
1569

1570
	if (pending_eir_or_class(hdev)) {
1571
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1572
				 MGMT_STATUS_BUSY);
1573 1574 1575
		goto failed;
	}

1576
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1577 1578 1579 1580 1581 1582
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1583
	uuid->svc_hint = cp->svc_hint;
1584
	uuid->size = get_uuid_size(cp->uuid);
1585

1586
	list_add_tail(&uuid->list, &hdev->uuids);
1587

1588
	hci_req_init(&req, hdev);
1589

1590 1591 1592
	update_class(&req);
	update_eir(&req);

1593 1594 1595 1596
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1597

1598
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1599
				   hdev->dev_class, 3);
1600 1601 1602 1603
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1604
	if (!cmd) {
1605
		err = -ENOMEM;
1606 1607 1608 1609
		goto failed;
	}

	err = 0;
1610 1611

failed:
1612
	hci_dev_unlock(hdev);
1613 1614 1615
	return err;
}

1616 1617 1618 1619 1620 1621
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1622 1623
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1624 1625 1626 1627 1628 1629
		return true;
	}

	return false;
}

1630 1631 1632 1633 1634 1635 1636
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1637
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1638
		       u16 len)
1639
{
1640
	struct mgmt_cp_remove_uuid *cp = data;
1641
	struct pending_cmd *cmd;
1642
	struct bt_uuid *match, *tmp;
1643
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1644
	struct hci_request req;
1645 1646
	int err, found;

1647
	BT_DBG("request for %s", hdev->name);
1648

1649
	hci_dev_lock(hdev);
1650

1651
	if (pending_eir_or_class(hdev)) {
1652
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1653
				 MGMT_STATUS_BUSY);
1654 1655 1656
		goto unlock;
	}

1657 1658
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1659

1660
		if (enable_service_cache(hdev)) {
1661
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1662
					   0, hdev->dev_class, 3);
1663 1664
			goto unlock;
		}
1665

1666
		goto update_class;
1667 1668 1669 1670
	}

	found = 0;

1671
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1672 1673 1674 1675
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1676
		kfree(match);
1677 1678 1679 1680
		found++;
	}

	if (found == 0) {
1681
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1682
				 MGMT_STATUS_INVALID_PARAMS);
1683 1684 1685
		goto unlock;
	}

1686
update_class:
1687
	hci_req_init(&req, hdev);
1688

1689 1690 1691
	update_class(&req);
	update_eir(&req);

1692 1693 1694 1695
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1696

1697
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1698
				   hdev->dev_class, 3);
1699 1700 1701 1702
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1703
	if (!cmd) {
1704
		err = -ENOMEM;
1705 1706 1707 1708
		goto unlock;
	}

	err = 0;
1709 1710

unlock:
1711
	hci_dev_unlock(hdev);
1712 1713 1714
	return err;
}

1715 1716 1717 1718 1719 1720 1721
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1722
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1723
			 u16 len)
1724
{
1725
	struct mgmt_cp_set_dev_class *cp = data;
1726
	struct pending_cmd *cmd;
1727
	struct hci_request req;
1728 1729
	int err;

1730
	BT_DBG("request for %s", hdev->name);
1731

1732
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1733 1734
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1735

1736
	hci_dev_lock(hdev);
1737

1738 1739 1740 1741 1742
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
1743

1744 1745 1746 1747 1748
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
1749

1750 1751 1752
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1753
	if (!hdev_is_powered(hdev)) {
1754
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1755
				   hdev->dev_class, 3);
1756 1757 1758
		goto unlock;
	}

1759 1760
	hci_req_init(&req, hdev);

1761
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1762 1763 1764
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1765
		update_eir(&req);
1766
	}
1767

1768 1769
	update_class(&req);

1770 1771 1772 1773
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1774

1775
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1776
				   hdev->dev_class, 3);
1777 1778 1779 1780
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1781
	if (!cmd) {
1782
		err = -ENOMEM;
1783 1784 1785 1786
		goto unlock;
	}

	err = 0;
1787

1788
unlock:
1789
	hci_dev_unlock(hdev);
1790 1791 1792
	return err;
}

1793
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1794
			  u16 len)
1795
{
1796
	struct mgmt_cp_load_link_keys *cp = data;
1797
	u16 key_count, expected_len;
1798
	int i;
1799

1800
	key_count = __le16_to_cpu(cp->key_count);
1801

1802 1803
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1804
	if (expected_len != len) {
1805
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1806
		       len, expected_len);
1807
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1808
				  MGMT_STATUS_INVALID_PARAMS);
1809 1810
	}

1811 1812 1813 1814
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1815
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1816
	       key_count);
1817

1818 1819 1820 1821 1822 1823 1824 1825
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1826
	hci_dev_lock(hdev);
1827 1828 1829 1830

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
1831
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1832
	else
1833
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1834

1835
	for (i = 0; i < key_count; i++) {
1836
		struct mgmt_link_key_info *key = &cp->keys[i];
1837

1838
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1839
				 key->type, key->pin_len);
1840 1841
	}

1842
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1843

1844
	hci_dev_unlock(hdev);
1845

1846
	return 0;
1847 1848
}

1849
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1850
			   u8 addr_type, struct sock *skip_sk)
1851 1852 1853 1854 1855 1856 1857
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1858
			  skip_sk);
1859 1860
}

1861
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1862
			 u16 len)
1863
{
1864 1865
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1866 1867
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1868 1869 1870
	struct hci_conn *conn;
	int err;

1871
	memset(&rp, 0, sizeof(rp));
1872 1873
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1874

1875 1876 1877 1878 1879
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1880 1881 1882 1883 1884
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1885 1886
	hci_dev_lock(hdev);

1887
	if (!hdev_is_powered(hdev)) {
1888
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1889
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1890 1891 1892
		goto unlock;
	}

1893
	if (cp->addr.type == BDADDR_BREDR)
1894 1895 1896
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1897

1898
	if (err < 0) {
1899
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1900
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1901 1902 1903
		goto unlock;
	}

1904
	if (cp->disconnect) {
1905
		if (cp->addr.type == BDADDR_BREDR)
1906
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1907
						       &cp->addr.bdaddr);
1908 1909
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1910
						       &cp->addr.bdaddr);
1911 1912 1913
	} else {
		conn = NULL;
	}
1914

1915
	if (!conn) {
1916
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1917
				   &rp, sizeof(rp));
1918
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1919 1920
		goto unlock;
	}
1921

1922
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1923
			       sizeof(*cp));
1924 1925 1926
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1927 1928
	}

1929
	dc.handle = cpu_to_le16(conn->handle);
1930 1931 1932 1933 1934
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1935
unlock:
1936
	hci_dev_unlock(hdev);
1937 1938 1939
	return err;
}

1940
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1941
		      u16 len)
1942
{
1943
	struct mgmt_cp_disconnect *cp = data;
1944
	struct mgmt_rp_disconnect rp;
1945
	struct hci_cp_disconnect dc;
1946
	struct pending_cmd *cmd;
1947 1948 1949 1950 1951
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1952 1953 1954 1955
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1956
	if (!bdaddr_type_is_valid(cp->addr.type))
1957 1958 1959
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1960

1961
	hci_dev_lock(hdev);
1962 1963

	if (!test_bit(HCI_UP, &hdev->flags)) {
1964 1965
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1966 1967 1968
		goto failed;
	}

1969
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1970 1971
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
1972 1973 1974
		goto failed;
	}

1975
	if (cp->addr.type == BDADDR_BREDR)
1976 1977
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
1978 1979
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1980

1981
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
1982 1983
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
1984 1985 1986
		goto failed;
	}

1987
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1988 1989
	if (!cmd) {
		err = -ENOMEM;
1990
		goto failed;
1991
	}
1992

1993
	dc.handle = cpu_to_le16(conn->handle);
1994
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
1995 1996 1997

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1998
		mgmt_pending_remove(cmd);
1999 2000

failed:
2001
	hci_dev_unlock(hdev);
2002 2003 2004
	return err;
}

2005
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2006 2007 2008
{
	switch (link_type) {
	case LE_LINK:
2009 2010
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2011
			return BDADDR_LE_PUBLIC;
2012

2013
		default:
2014
			/* Fallback to LE Random address type */
2015
			return BDADDR_LE_RANDOM;
2016
		}
2017

2018
	default:
2019
		/* Fallback to BR/EDR type */
2020
		return BDADDR_BREDR;
2021 2022 2023
	}
}

2024 2025
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2026 2027
{
	struct mgmt_rp_get_connections *rp;
2028
	struct hci_conn *c;
2029
	size_t rp_len;
2030 2031
	int err;
	u16 i;
2032 2033 2034

	BT_DBG("");

2035
	hci_dev_lock(hdev);
2036

2037
	if (!hdev_is_powered(hdev)) {
2038
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
2039
				 MGMT_STATUS_NOT_POWERED);
2040 2041 2042
		goto unlock;
	}

2043
	i = 0;
2044 2045
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2046
			i++;
2047 2048
	}

2049
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2050
	rp = kmalloc(rp_len, GFP_KERNEL);
2051
	if (!rp) {
2052 2053 2054 2055 2056
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2057
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2058 2059
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2060
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2061
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2062
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2063 2064 2065 2066
			continue;
		i++;
	}

2067
	rp->conn_count = cpu_to_le16(i);
2068

2069 2070
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2071

2072
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
2073
			   rp_len);
2074

2075
	kfree(rp);
2076 2077

unlock:
2078
	hci_dev_unlock(hdev);
2079 2080 2081
	return err;
}

2082
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2083
				   struct mgmt_cp_pin_code_neg_reply *cp)
2084 2085 2086 2087
{
	struct pending_cmd *cmd;
	int err;

2088
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2089
			       sizeof(*cp));
2090 2091 2092
	if (!cmd)
		return -ENOMEM;

2093
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2094
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2095 2096 2097 2098 2099 2100
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2101
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2102
			  u16 len)
2103
{
2104
	struct hci_conn *conn;
2105
	struct mgmt_cp_pin_code_reply *cp = data;
2106
	struct hci_cp_pin_code_reply reply;
2107
	struct pending_cmd *cmd;
2108 2109 2110 2111
	int err;

	BT_DBG("");

2112
	hci_dev_lock(hdev);
2113

2114
	if (!hdev_is_powered(hdev)) {
2115
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2116
				 MGMT_STATUS_NOT_POWERED);
2117 2118 2119
		goto failed;
	}

2120
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2121
	if (!conn) {
2122
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2123
				 MGMT_STATUS_NOT_CONNECTED);
2124 2125 2126 2127
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2128 2129 2130
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2131 2132 2133

		BT_ERR("PIN code is not 16 bytes long");

2134
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2135
		if (err >= 0)
2136
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2137
					 MGMT_STATUS_INVALID_PARAMS);
2138 2139 2140 2141

		goto failed;
	}

2142
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2143 2144
	if (!cmd) {
		err = -ENOMEM;
2145
		goto failed;
2146
	}
2147

2148
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2149
	reply.pin_len = cp->pin_len;
2150
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2151 2152 2153

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2154
		mgmt_pending_remove(cmd);
2155 2156

failed:
2157
	hci_dev_unlock(hdev);
2158 2159 2160
	return err;
}

2161 2162
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2163
{
2164
	struct mgmt_cp_set_io_capability *cp = data;
2165 2166 2167

	BT_DBG("");

2168
	hci_dev_lock(hdev);
2169 2170 2171 2172

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2173
	       hdev->io_capability);
2174

2175
	hci_dev_unlock(hdev);
2176

2177 2178
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2179 2180
}

2181
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2182 2183
{
	struct hci_dev *hdev = conn->hdev;
2184
	struct pending_cmd *cmd;
2185

2186
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2204
	bacpy(&rp.addr.bdaddr, &conn->dst);
2205
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2206

2207
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2208
		     &rp, sizeof(rp));
2209 2210 2211 2212 2213 2214

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2215
	hci_conn_drop(conn);
2216

2217
	mgmt_pending_remove(cmd);
2218 2219 2220 2221 2222 2223 2224 2225 2226
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2227
	if (!cmd)
2228
		BT_DBG("Unable to find a pending command");
2229
	else
2230
		pairing_complete(cmd, mgmt_status(status));
2231 2232
}

2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2249
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2250
		       u16 len)
2251
{
2252
	struct mgmt_cp_pair_device *cp = data;
2253
	struct mgmt_rp_pair_device rp;
2254 2255 2256 2257 2258 2259 2260
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2261 2262 2263 2264
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2265 2266 2267 2268 2269
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2270
	hci_dev_lock(hdev);
2271

2272
	if (!hdev_is_powered(hdev)) {
2273 2274
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2275 2276 2277
		goto unlock;
	}

2278 2279
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2280
		auth_type = HCI_AT_DEDICATED_BONDING;
2281
	else
2282 2283
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2284
	if (cp->addr.type == BDADDR_BREDR)
2285 2286
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2287
	else
2288 2289
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2290

2291
	if (IS_ERR(conn)) {
2292 2293 2294 2295 2296 2297 2298
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2299
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2300
				   status, &rp,
2301
				   sizeof(rp));
2302 2303 2304 2305
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2306
		hci_conn_drop(conn);
2307
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2308
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2309 2310 2311
		goto unlock;
	}

2312
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2313 2314
	if (!cmd) {
		err = -ENOMEM;
2315
		hci_conn_drop(conn);
2316 2317 2318
		goto unlock;
	}

2319
	/* For LE, just connecting isn't a proof that the pairing finished */
2320
	if (cp->addr.type == BDADDR_BREDR)
2321
		conn->connect_cfm_cb = pairing_complete_cb;
2322 2323
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2324

2325 2326 2327 2328 2329 2330
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2331
	    hci_conn_security(conn, sec_level, auth_type))
2332 2333 2334 2335 2336
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2337
	hci_dev_unlock(hdev);
2338 2339 2340
	return err;
}

2341 2342
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2343
{
2344
	struct mgmt_addr_info *addr = data;
2345 2346 2347 2348 2349 2350 2351 2352
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2353
	if (!hdev_is_powered(hdev)) {
2354
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2355
				 MGMT_STATUS_NOT_POWERED);
2356 2357 2358
		goto unlock;
	}

2359 2360
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2361
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2362
				 MGMT_STATUS_INVALID_PARAMS);
2363 2364 2365 2366 2367 2368
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2369
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2370
				 MGMT_STATUS_INVALID_PARAMS);
2371 2372 2373 2374 2375
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2376
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2377
			   addr, sizeof(*addr));
2378 2379 2380 2381 2382
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2383
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2384
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2385
			     u16 hci_op, __le32 passkey)
2386 2387
{
	struct pending_cmd *cmd;
2388
	struct hci_conn *conn;
2389 2390
	int err;

2391
	hci_dev_lock(hdev);
2392

2393
	if (!hdev_is_powered(hdev)) {
2394 2395 2396
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2397
		goto done;
2398 2399
	}

2400 2401
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2402
	else
2403
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2404 2405

	if (!conn) {
2406 2407 2408
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2409 2410
		goto done;
	}
2411

2412
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2413
		/* Continue with pairing via SMP */
2414 2415 2416
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2417 2418 2419
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2420
		else
2421 2422 2423
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2424 2425 2426 2427

		goto done;
	}

2428
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2429 2430
	if (!cmd) {
		err = -ENOMEM;
2431
		goto done;
2432 2433
	}

2434
	/* Continue with pairing via HCI */
2435 2436 2437
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2438
		bacpy(&cp.bdaddr, &addr->bdaddr);
2439 2440 2441
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2442 2443
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2444

2445 2446
	if (err < 0)
		mgmt_pending_remove(cmd);
2447

2448
done:
2449
	hci_dev_unlock(hdev);
2450 2451 2452
	return err;
}

2453 2454 2455 2456 2457 2458 2459
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2460
	return user_pairing_resp(sk, hdev, &cp->addr,
2461 2462 2463 2464
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2465 2466
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2467
{
2468
	struct mgmt_cp_user_confirm_reply *cp = data;
2469 2470 2471 2472

	BT_DBG("");

	if (len != sizeof(*cp))
2473
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2474
				  MGMT_STATUS_INVALID_PARAMS);
2475

2476
	return user_pairing_resp(sk, hdev, &cp->addr,
2477 2478
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2479 2480
}

2481
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2482
				  void *data, u16 len)
2483
{
2484
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2485 2486 2487

	BT_DBG("");

2488
	return user_pairing_resp(sk, hdev, &cp->addr,
2489 2490
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2491 2492
}

2493 2494
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2495
{
2496
	struct mgmt_cp_user_passkey_reply *cp = data;
2497 2498 2499

	BT_DBG("");

2500
	return user_pairing_resp(sk, hdev, &cp->addr,
2501 2502
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2503 2504
}

2505
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2506
				  void *data, u16 len)
2507
{
2508
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2509 2510 2511

	BT_DBG("");

2512
	return user_pairing_resp(sk, hdev, &cp->addr,
2513 2514
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2515 2516
}

2517
static void update_name(struct hci_request *req)
2518
{
2519
	struct hci_dev *hdev = req->hdev;
2520 2521
	struct hci_cp_write_local_name cp;

2522
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2523

2524
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2525 2526
}

2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2555
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2556
			  u16 len)
2557
{
2558
	struct mgmt_cp_set_local_name *cp = data;
2559
	struct pending_cmd *cmd;
2560
	struct hci_request req;
2561 2562 2563 2564
	int err;

	BT_DBG("");

2565
	hci_dev_lock(hdev);
2566

2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

2578
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2579

2580
	if (!hdev_is_powered(hdev)) {
2581
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2582 2583

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2584
				   data, len);
2585 2586 2587 2588
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2589
				 sk);
2590

2591 2592 2593
		goto failed;
	}

2594
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2595 2596 2597 2598 2599
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2600 2601
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

2602
	hci_req_init(&req, hdev);
2603 2604 2605 2606 2607 2608 2609 2610 2611

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

	if (lmp_le_capable(hdev))
		hci_update_ad(&req);

2612
	err = hci_req_run(&req, set_name_complete);
2613 2614 2615 2616
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2617
	hci_dev_unlock(hdev);
2618 2619 2620
	return err;
}

2621
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2622
			       void *data, u16 data_len)
2623 2624 2625 2626
{
	struct pending_cmd *cmd;
	int err;

2627
	BT_DBG("%s", hdev->name);
2628

2629
	hci_dev_lock(hdev);
2630

2631
	if (!hdev_is_powered(hdev)) {
2632
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2633
				 MGMT_STATUS_NOT_POWERED);
2634 2635 2636
		goto unlock;
	}

2637
	if (!lmp_ssp_capable(hdev)) {
2638
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2639
				 MGMT_STATUS_NOT_SUPPORTED);
2640 2641 2642
		goto unlock;
	}

2643
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2644
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2645
				 MGMT_STATUS_BUSY);
2646 2647 2648
		goto unlock;
	}

2649
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2650 2651 2652 2653 2654 2655 2656 2657 2658 2659
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2660
	hci_dev_unlock(hdev);
2661 2662 2663
	return err;
}

2664
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2665
			       void *data, u16 len)
2666
{
2667
	struct mgmt_cp_add_remote_oob_data *cp = data;
2668
	u8 status;
2669 2670
	int err;

2671
	BT_DBG("%s ", hdev->name);
2672

2673
	hci_dev_lock(hdev);
2674

2675
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2676
				      cp->randomizer);
2677
	if (err < 0)
2678
		status = MGMT_STATUS_FAILED;
2679
	else
2680
		status = MGMT_STATUS_SUCCESS;
2681

2682
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2683
			   &cp->addr, sizeof(cp->addr));
2684

2685
	hci_dev_unlock(hdev);
2686 2687 2688
	return err;
}

2689
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2690
				  void *data, u16 len)
2691
{
2692
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2693
	u8 status;
2694 2695
	int err;

2696
	BT_DBG("%s", hdev->name);
2697

2698
	hci_dev_lock(hdev);
2699

2700
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2701
	if (err < 0)
2702
		status = MGMT_STATUS_INVALID_PARAMS;
2703
	else
2704
		status = MGMT_STATUS_SUCCESS;
2705

2706
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2707
			   status, &cp->addr, sizeof(cp->addr));
2708

2709
	hci_dev_unlock(hdev);
2710 2711 2712
	return err;
}

2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2752
				   DISCOV_LE_TIMEOUT);
2753 2754 2755 2756
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2757
				   DISCOV_INTERLEAVED_TIMEOUT);
2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

2768
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2769
			   void *data, u16 len)
2770
{
2771
	struct mgmt_cp_start_discovery *cp = data;
2772
	struct pending_cmd *cmd;
2773 2774 2775 2776 2777 2778
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
2779 2780
	int err;

2781
	BT_DBG("%s", hdev->name);
2782

2783
	hci_dev_lock(hdev);
2784

2785
	if (!hdev_is_powered(hdev)) {
2786
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2787
				 MGMT_STATUS_NOT_POWERED);
2788 2789 2790
		goto failed;
	}

2791 2792 2793 2794 2795 2796
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2797
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2798
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2799
				 MGMT_STATUS_BUSY);
2800 2801 2802
		goto failed;
	}

2803
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2804 2805 2806 2807 2808
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2809 2810
	hdev->discovery.type = cp->type;

2811 2812
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
2813
	switch (hdev->discovery.type) {
2814
	case DISCOV_TYPE_BREDR:
2815
		if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
2816 2817 2818 2819 2820 2821
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
2833
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
2834
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
2835 2836 2837
		break;

	case DISCOV_TYPE_LE:
2838
	case DISCOV_TYPE_INTERLEAVED:
2839
		if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
2840 2841 2842 2843 2844 2845
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2846
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
2847
		    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
2848 2849 2850 2851 2852 2853
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869
		if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
2870 2871
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
2872 2873 2874 2875 2876 2877 2878 2879
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
2880 2881
		break;

2882
	default:
2883 2884 2885 2886
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2887
	}
2888

2889
	err = hci_req_run(&req, start_discovery_complete);
2890 2891
	if (err < 0)
		mgmt_pending_remove(cmd);
2892 2893
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2894 2895

failed:
2896
	hci_dev_unlock(hdev);
2897 2898 2899
	return err;
}

2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

2916 2917 2918 2919 2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

2933
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2934
			  u16 len)
2935
{
2936
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2937
	struct pending_cmd *cmd;
2938 2939
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2940 2941
	struct hci_request req;
	struct hci_cp_le_set_scan_enable enable_cp;
2942 2943
	int err;

2944
	BT_DBG("%s", hdev->name);
2945

2946
	hci_dev_lock(hdev);
2947

2948
	if (!hci_discovery_active(hdev)) {
2949
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2950 2951
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2952 2953 2954 2955
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2956
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2957 2958
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2959
		goto unlock;
2960 2961
	}

2962
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2963 2964
	if (!cmd) {
		err = -ENOMEM;
2965 2966 2967
		goto unlock;
	}

2968 2969
	hci_req_init(&req, hdev);

2970 2971
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
2972 2973 2974 2975 2976 2977 2978 2979 2980 2981
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

			memset(&enable_cp, 0, sizeof(enable_cp));
			enable_cp.enable = LE_SCAN_DISABLE;
			hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
				    sizeof(enable_cp), &enable_cp);
		}
2982

2983 2984 2985 2986
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
2987
						     NAME_PENDING);
2988
		if (!e) {
2989
			mgmt_pending_remove(cmd);
2990 2991 2992 2993 2994 2995 2996
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
2997

2998
		bacpy(&cp.bdaddr, &e->data.bdaddr);
2999 3000
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
3001 3002 3003 3004 3005

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
3006 3007 3008 3009 3010 3011

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
3012 3013
	}

3014
	err = hci_req_run(&req, stop_discovery_complete);
3015 3016
	if (err < 0)
		mgmt_pending_remove(cmd);
3017 3018
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
3019

3020
unlock:
3021
	hci_dev_unlock(hdev);
3022 3023 3024
	return err;
}

3025
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3026
			u16 len)
3027
{
3028
	struct mgmt_cp_confirm_name *cp = data;
3029 3030 3031
	struct inquiry_entry *e;
	int err;

3032
	BT_DBG("%s", hdev->name);
3033 3034 3035

	hci_dev_lock(hdev);

3036
	if (!hci_discovery_active(hdev)) {
3037
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3038
				 MGMT_STATUS_FAILED);
3039 3040 3041
		goto failed;
	}

3042
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3043
	if (!e) {
3044
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3045
				 MGMT_STATUS_INVALID_PARAMS);
3046 3047 3048 3049 3050 3051 3052 3053
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3054
		hci_inquiry_cache_update_resolve(hdev, e);
3055 3056
	}

3057 3058
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
3059 3060 3061 3062 3063 3064

failed:
	hci_dev_unlock(hdev);
	return err;
}

3065
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3066
			u16 len)
3067
{
3068
	struct mgmt_cp_block_device *cp = data;
3069
	u8 status;
3070 3071
	int err;

3072
	BT_DBG("%s", hdev->name);
3073

3074
	if (!bdaddr_type_is_valid(cp->addr.type))
3075 3076 3077
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3078

3079
	hci_dev_lock(hdev);
3080

3081
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
3082
	if (err < 0)
3083
		status = MGMT_STATUS_FAILED;
3084
	else
3085
		status = MGMT_STATUS_SUCCESS;
3086

3087
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
3088
			   &cp->addr, sizeof(cp->addr));
3089

3090
	hci_dev_unlock(hdev);
3091 3092 3093 3094

	return err;
}

3095
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3096
			  u16 len)
3097
{
3098
	struct mgmt_cp_unblock_device *cp = data;
3099
	u8 status;
3100 3101
	int err;

3102
	BT_DBG("%s", hdev->name);
3103

3104
	if (!bdaddr_type_is_valid(cp->addr.type))
3105 3106 3107
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3108

3109
	hci_dev_lock(hdev);
3110

3111
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3112
	if (err < 0)
3113
		status = MGMT_STATUS_INVALID_PARAMS;
3114
	else
3115
		status = MGMT_STATUS_SUCCESS;
3116

3117
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3118
			   &cp->addr, sizeof(cp->addr));
3119

3120
	hci_dev_unlock(hdev);
3121 3122 3123 3124

	return err;
}

3125 3126 3127 3128
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3129
	struct hci_request req;
3130
	int err;
3131
	__u16 source;
3132 3133 3134

	BT_DBG("%s", hdev->name);

3135 3136 3137 3138 3139 3140
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3141 3142
	hci_dev_lock(hdev);

3143
	hdev->devid_source = source;
3144 3145 3146 3147 3148 3149
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3150 3151 3152
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3153 3154 3155 3156 3157 3158

	hci_dev_unlock(hdev);

	return err;
}

3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250
static void set_advertising_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	u8 val, enabled;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	val = !!cp->val;
	enabled = test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);

	if (!hdev_is_powered(hdev) || val == enabled) {
		bool changed = false;

		if (val != test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			change_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_REJECTED);

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3307 3308 3309 3310 3311 3312 3313
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3314 3315 3316 3317 3318 3319 3320 3321 3322 3323
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3324
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3325
				void *data, u16 len)
3326
{
3327
	struct mgmt_mode *cp = data;
3328 3329
	struct pending_cmd *cmd;
	struct hci_request req;
3330 3331
	int err;

3332
	BT_DBG("%s", hdev->name);
3333

3334 3335
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
3336 3337 3338
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3339 3340 3341 3342
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3343
	if (!hdev_is_powered(hdev))
3344
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3345
				  MGMT_STATUS_NOT_POWERED);
3346 3347

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3348
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3349
				  MGMT_STATUS_REJECTED);
3350 3351 3352

	hci_dev_lock(hdev);

3353 3354 3355 3356 3357 3358
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3359 3360 3361 3362 3363 3364
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3365 3366 3367 3368 3369
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3370 3371
	}

3372 3373
	hci_req_init(&req, hdev);

3374
	write_fast_connectable(&req, cp->val);
3375 3376

	err = hci_req_run(&req, fast_connectable_complete);
3377
	if (err < 0) {
3378
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3379
				 MGMT_STATUS_FAILED);
3380
		mgmt_pending_remove(cmd);
3381 3382
	}

3383
unlock:
3384
	hci_dev_unlock(hdev);
3385

3386 3387 3388
	return err;
}

3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503
static void set_bredr_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
		clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
		}

		change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_REJECTED);
		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	/* We need to flip the bit already here so that hci_update_ad
	 * generates the correct flags.
	 */
	set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

	hci_req_init(&req, hdev);
	hci_update_ad(&req);
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3504 3505
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
3506 3507
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
3508 3509
	if (key->master != 0x00 && key->master != 0x01)
		return false;
3510 3511
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
3512 3513 3514
	return true;
}

3515
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
3516
			       void *cp_data, u16 len)
3517 3518 3519
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
3520
	int i, err;
3521

3522
	key_count = __le16_to_cpu(cp->key_count);
3523 3524 3525 3526 3527

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
3528
		       len, expected_len);
3529
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
3530
				  MGMT_STATUS_INVALID_PARAMS);
3531 3532
	}

3533
	BT_DBG("%s key_count %u", hdev->name, key_count);
3534

3535 3536 3537
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

3538
		if (!ltk_is_valid(key))
3539 3540 3541 3542 3543
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

3557
		hci_add_ltk(hdev, &key->addr.bdaddr,
3558
			    bdaddr_to_le(key->addr.type),
3559 3560
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
3561 3562
	}

3563 3564 3565
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

3566 3567
	hci_dev_unlock(hdev);

3568
	return err;
3569 3570
}

3571
static const struct mgmt_handler {
3572 3573
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
3574 3575
	bool var_len;
	size_t data_len;
3576 3577
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
3617
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
3618
	{ set_advertising,        false, MGMT_SETTING_SIZE },
3619
	{ set_bredr,              false, MGMT_SETTING_SIZE },
3620
	{ set_static_address,     false, MGMT_SET_STATIC_ADDRESS_SIZE },
3621 3622 3623
};


3624 3625
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
3626 3627
	void *buf;
	u8 *cp;
3628
	struct mgmt_hdr *hdr;
3629
	u16 opcode, index, len;
3630
	struct hci_dev *hdev = NULL;
3631
	const struct mgmt_handler *handler;
3632 3633 3634 3635 3636 3637 3638
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

3639
	buf = kmalloc(msglen, GFP_KERNEL);
3640 3641 3642 3643 3644 3645 3646 3647
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

3648
	hdr = buf;
3649 3650 3651
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
3652 3653 3654 3655 3656 3657

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

3658
	if (index != MGMT_INDEX_NONE) {
3659 3660 3661
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
3662
					 MGMT_STATUS_INVALID_INDEX);
3663 3664
			goto done;
		}
3665 3666 3667 3668 3669 3670

		if (test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
			err = cmd_status(sk, index, opcode,
					 MGMT_STATUS_INVALID_INDEX);
			goto done;
		}
3671 3672
	}

3673
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
3674
	    mgmt_handlers[opcode].func == NULL) {
3675
		BT_DBG("Unknown op %u", opcode);
3676
		err = cmd_status(sk, index, opcode,
3677
				 MGMT_STATUS_UNKNOWN_COMMAND);
3678 3679 3680 3681
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
3682
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
3683
		err = cmd_status(sk, index, opcode,
3684
				 MGMT_STATUS_INVALID_INDEX);
3685
		goto done;
3686 3687
	}

3688 3689 3690
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
3691
	    (!handler->var_len && len != handler->data_len)) {
3692
		err = cmd_status(sk, index, opcode,
3693
				 MGMT_STATUS_INVALID_PARAMS);
3694 3695 3696
		goto done;
	}

3697 3698 3699 3700 3701
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

3702
	err = handler->func(sk, hdev, cp, len);
3703 3704 3705
	if (err < 0)
		goto done;

3706 3707 3708
	err = msglen;

done:
3709 3710 3711
	if (hdev)
		hci_dev_put(hdev);

3712 3713 3714
	kfree(buf);
	return err;
}
3715

3716
int mgmt_index_added(struct hci_dev *hdev)
3717
{
3718 3719 3720
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3721
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
3722 3723
}

3724
int mgmt_index_removed(struct hci_dev *hdev)
3725
{
3726
	u8 status = MGMT_STATUS_INVALID_INDEX;
3727

3728 3729 3730
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3731
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3732

3733
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
3734 3735
}

3736
static void set_bredr_scan(struct hci_request *req)
3737
{
3738
	struct hci_dev *hdev = req->hdev;
3739 3740
	u8 scan = 0;

3741 3742 3743 3744 3745 3746
	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

3747 3748 3749 3750 3751
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

3752 3753
	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3754 3755
}

3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767 3768 3769 3770 3771 3772 3773
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

3774
static int powered_update_hci(struct hci_dev *hdev)
3775
{
3776
	struct hci_request req;
3777
	u8 link_sec;
3778

3779 3780
	hci_req_init(&req, hdev);

3781 3782 3783
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
3784

3785
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
3786
	}
3787

3788 3789
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
3790
		struct hci_cp_write_le_host_supported cp;
3791

3792 3793
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
3794

3795 3796 3797 3798 3799
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
3800 3801
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
3802 3803 3804

		/* In case BR/EDR was toggled during the AUTO_OFF phase */
		hci_update_ad(&req);
3805
	}
3806

3807 3808 3809 3810 3811 3812 3813
	if (lmp_le_capable(hdev)) {
		/* Set random address to static address if configured */
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			hci_req_add(&req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
				    &hdev->static_addr);
	}

3814 3815 3816 3817 3818 3819
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
		u8 adv = 0x01;

		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(adv), &adv);
	}

3820 3821
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
3822 3823
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
3824

3825
	if (lmp_bredr_capable(hdev)) {
3826 3827
		if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
			set_bredr_scan(&req);
3828
		update_class(&req);
3829
		update_name(&req);
3830
		update_eir(&req);
3831
	}
3832

3833
	return hci_req_run(&req, powered_complete);
3834
}
3835

3836 3837 3838
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
3839 3840
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
3841
	int err;
3842

3843 3844 3845 3846
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
3847 3848
		if (powered_update_hci(hdev) == 0)
			return 0;
3849

3850 3851 3852
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
3853 3854
	}

3855 3856 3857 3858 3859 3860 3861 3862
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
3863
	err = new_settings(hdev, match.sk);
3864 3865 3866 3867

	if (match.sk)
		sock_put(match.sk);

3868
	return err;
3869
}
3870

3871 3872 3873 3874 3875 3876 3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889 3890 3891
int mgmt_set_powered_failed(struct hci_dev *hdev, int err)
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
		return -ENOENT;

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

	err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);

	mgmt_pending_remove(cmd);

	return err;
}

3892
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3893
{
3894
	struct cmd_lookup match = { NULL, hdev };
3895 3896
	bool changed = false;
	int err = 0;
3897

3898 3899 3900 3901 3902 3903 3904
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3905

3906
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3907
			     &match);
3908

3909 3910
	if (changed)
		err = new_settings(hdev, match.sk);
3911

3912 3913 3914
	if (match.sk)
		sock_put(match.sk);

3915
	return err;
3916
}
3917

3918
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3919
{
3920
	struct pending_cmd *cmd;
3921 3922
	bool changed = false;
	int err = 0;
3923

3924 3925 3926 3927 3928 3929 3930
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3931

3932
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
3933

3934
	if (changed)
3935
		err = new_settings(hdev, cmd ? cmd->sk : NULL);
3936

3937
	return err;
3938
}
3939

3940
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3941
{
3942 3943
	u8 mgmt_err = mgmt_status(status);

3944
	if (scan & SCAN_PAGE)
3945
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3946
				     cmd_status_rsp, &mgmt_err);
3947 3948

	if (scan & SCAN_INQUIRY)
3949
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3950
				     cmd_status_rsp, &mgmt_err);
3951 3952 3953 3954

	return 0;
}

3955 3956
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3957
{
3958
	struct mgmt_ev_new_link_key ev;
3959

3960
	memset(&ev, 0, sizeof(ev));
3961

3962
	ev.store_hint = persistent;
3963
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3964
	ev.key.addr.type = BDADDR_BREDR;
3965
	ev.key.type = key->type;
3966
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3967
	ev.key.pin_len = key->pin_len;
3968

3969
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3970
}
3971

3972 3973 3974 3975 3976 3977 3978 3979
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3980
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
3981 3982 3983 3984 3985 3986 3987 3988 3989 3990
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

3991 3992
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
3993 3994
}

3995
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3996 3997
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
3998
{
3999 4000 4001
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
4002

4003
	bacpy(&ev->addr.bdaddr, bdaddr);
4004
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4005

4006
	ev->flags = __cpu_to_le32(flags);
4007

4008 4009
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
4010
					  name, name_len);
4011 4012

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
4013
		eir_len = eir_append_data(ev->eir, eir_len,
4014
					  EIR_CLASS_OF_DEV, dev_class, 3);
4015

4016
	ev->eir_len = cpu_to_le16(eir_len);
4017 4018

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
4019
			  sizeof(*ev) + eir_len, NULL);
4020 4021
}

4022 4023
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
4024
	struct mgmt_cp_disconnect *cp = cmd->param;
4025
	struct sock **sk = data;
4026
	struct mgmt_rp_disconnect rp;
4027

4028 4029
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4030

4031
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
4032
		     sizeof(rp));
4033 4034 4035 4036

	*sk = cmd->sk;
	sock_hold(*sk);

4037
	mgmt_pending_remove(cmd);
4038 4039
}

4040
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
4041
{
4042
	struct hci_dev *hdev = data;
4043 4044
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
4045 4046

	memset(&rp, 0, sizeof(rp));
4047 4048
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4049

4050 4051
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

4052
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
4053 4054 4055 4056

	mgmt_pending_remove(cmd);
}

4057
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
4058
			     u8 link_type, u8 addr_type, u8 reason)
4059
{
4060
	struct mgmt_ev_device_disconnected ev;
4061 4062 4063
	struct sock *sk = NULL;
	int err;

4064
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
4065

4066 4067 4068
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
4069

4070
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
4071
			 sk);
4072 4073

	if (sk)
4074
		sock_put(sk);
4075

4076
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
4077
			     hdev);
4078

4079 4080 4081
	return err;
}

4082
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
4083
			   u8 link_type, u8 addr_type, u8 status)
4084
{
4085
	struct mgmt_rp_disconnect rp;
4086 4087 4088
	struct pending_cmd *cmd;
	int err;

4089 4090 4091
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

4092
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
4093 4094 4095
	if (!cmd)
		return -ENOENT;

4096
	bacpy(&rp.addr.bdaddr, bdaddr);
4097
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4098

4099
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
4100
			   mgmt_status(status), &rp, sizeof(rp));
4101

4102
	mgmt_pending_remove(cmd);
4103 4104

	return err;
4105
}
4106

4107
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4108
			u8 addr_type, u8 status)
4109 4110 4111
{
	struct mgmt_ev_connect_failed ev;

4112
	bacpy(&ev.addr.bdaddr, bdaddr);
4113
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4114
	ev.status = mgmt_status(status);
4115

4116
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
4117
}
4118

4119
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
4120 4121 4122
{
	struct mgmt_ev_pin_code_request ev;

4123
	bacpy(&ev.addr.bdaddr, bdaddr);
4124
	ev.addr.type = BDADDR_BREDR;
4125
	ev.secure = secure;
4126

4127
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
4128
			  NULL);
4129 4130
}

4131
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4132
				 u8 status)
4133 4134
{
	struct pending_cmd *cmd;
4135
	struct mgmt_rp_pin_code_reply rp;
4136 4137
	int err;

4138
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
4139 4140 4141
	if (!cmd)
		return -ENOENT;

4142
	bacpy(&rp.addr.bdaddr, bdaddr);
4143
	rp.addr.type = BDADDR_BREDR;
4144

4145
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
4146
			   mgmt_status(status), &rp, sizeof(rp));
4147

4148
	mgmt_pending_remove(cmd);
4149 4150 4151 4152

	return err;
}

4153
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4154
				     u8 status)
4155 4156
{
	struct pending_cmd *cmd;
4157
	struct mgmt_rp_pin_code_reply rp;
4158 4159
	int err;

4160
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
4161 4162 4163
	if (!cmd)
		return -ENOENT;

4164
	bacpy(&rp.addr.bdaddr, bdaddr);
4165
	rp.addr.type = BDADDR_BREDR;
4166

4167
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
4168
			   mgmt_status(status), &rp, sizeof(rp));
4169

4170
	mgmt_pending_remove(cmd);
4171 4172 4173

	return err;
}
4174

4175
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4176 4177
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
4178 4179 4180
{
	struct mgmt_ev_user_confirm_request ev;

4181
	BT_DBG("%s", hdev->name);
4182

4183
	bacpy(&ev.addr.bdaddr, bdaddr);
4184
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4185
	ev.confirm_hint = confirm_hint;
4186
	ev.value = value;
4187

4188
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
4189
			  NULL);
4190 4191
}

4192
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4193
			      u8 link_type, u8 addr_type)
4194 4195 4196 4197 4198
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

4199
	bacpy(&ev.addr.bdaddr, bdaddr);
4200
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4201 4202

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
4203
			  NULL);
4204 4205
}

4206
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4207 4208
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
4209 4210 4211 4212 4213
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

4214
	cmd = mgmt_pending_find(opcode, hdev);
4215 4216 4217
	if (!cmd)
		return -ENOENT;

4218
	bacpy(&rp.addr.bdaddr, bdaddr);
4219
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4220
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
4221
			   &rp, sizeof(rp));
4222

4223
	mgmt_pending_remove(cmd);
4224 4225 4226 4227

	return err;
}

4228
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4229
				     u8 link_type, u8 addr_type, u8 status)
4230
{
4231
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4232
					  status, MGMT_OP_USER_CONFIRM_REPLY);
4233 4234
}

4235
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4236
					 u8 link_type, u8 addr_type, u8 status)
4237
{
4238
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4239 4240
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
4241
}
4242

4243
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4244
				     u8 link_type, u8 addr_type, u8 status)
4245
{
4246
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4247
					  status, MGMT_OP_USER_PASSKEY_REPLY);
4248 4249
}

4250
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4251
					 u8 link_type, u8 addr_type, u8 status)
4252
{
4253
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4254 4255
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
4256 4257
}

4258 4259 4260 4261 4262 4263 4264 4265 4266 4267 4268 4269 4270 4271 4272 4273
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

4274
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4275
		     u8 addr_type, u8 status)
4276 4277 4278
{
	struct mgmt_ev_auth_failed ev;

4279
	bacpy(&ev.addr.bdaddr, bdaddr);
4280
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4281
	ev.status = mgmt_status(status);
4282

4283
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
4284
}
4285

4286 4287 4288
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
4289 4290
	bool changed = false;
	int err = 0;
4291 4292 4293 4294

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
4295
				     cmd_status_rsp, &mgmt_err);
4296 4297 4298
		return 0;
	}

4299 4300 4301 4302 4303 4304 4305 4306
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

4307
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
4308
			     &match);
4309

4310 4311
	if (changed)
		err = new_settings(hdev, match.sk);
4312 4313 4314 4315 4316 4317 4318

	if (match.sk)
		sock_put(match.sk);

	return err;
}

4319
static void clear_eir(struct hci_request *req)
4320
{
4321
	struct hci_dev *hdev = req->hdev;
4322 4323
	struct hci_cp_write_eir cp;

4324
	if (!lmp_ext_inq_capable(hdev))
4325
		return;
4326

4327 4328
	memset(hdev->eir, 0, sizeof(hdev->eir));

4329 4330
	memset(&cp, 0, sizeof(cp));

4331
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
4332 4333
}

4334
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
4335 4336
{
	struct cmd_lookup match = { NULL, hdev };
4337
	struct hci_request req;
4338 4339
	bool changed = false;
	int err = 0;
4340 4341 4342

	if (status) {
		u8 mgmt_err = mgmt_status(status);
4343 4344

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
4345
						 &hdev->dev_flags))
4346 4347
			err = new_settings(hdev, NULL);

4348 4349
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
4350 4351 4352 4353 4354 4355 4356 4357 4358 4359

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
4360 4361 4362 4363
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

4364 4365
	if (changed)
		err = new_settings(hdev, match.sk);
4366

4367
	if (match.sk)
4368 4369
		sock_put(match.sk);

4370 4371
	hci_req_init(&req, hdev);

4372
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
4373
		update_eir(&req);
4374
	else
4375 4376 4377
		clear_eir(&req);

	hci_req_run(&req, NULL);
4378

4379 4380 4381
	return err;
}

4382
static void sk_lookup(struct pending_cmd *cmd, void *data)
4383 4384 4385 4386 4387 4388 4389 4390 4391
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

4392
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
4393
				   u8 status)
4394
{
4395 4396
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
4397

4398 4399 4400
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
4401 4402

	if (!status)
4403 4404
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
4405 4406 4407

	if (match.sk)
		sock_put(match.sk);
4408 4409 4410 4411

	return err;
}

4412
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
4413 4414
{
	struct mgmt_cp_set_local_name ev;
4415
	struct pending_cmd *cmd;
4416

4417 4418
	if (status)
		return 0;
4419 4420 4421

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
4422
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
4423

4424
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
4425 4426
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
4427

4428 4429 4430 4431 4432
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
			return 0;
4433
	}
4434

4435 4436
	return mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			  cmd ? cmd->sk : NULL);
4437
}
4438

4439
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
4440
					    u8 *randomizer, u8 status)
4441 4442 4443 4444
{
	struct pending_cmd *cmd;
	int err;

4445
	BT_DBG("%s status %u", hdev->name, status);
4446

4447
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
4448 4449 4450 4451
	if (!cmd)
		return -ENOENT;

	if (status) {
4452 4453
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
4454 4455 4456 4457 4458 4459
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

4460
		err = cmd_complete(cmd->sk, hdev->id,
4461 4462
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
4463 4464 4465 4466 4467 4468
	}

	mgmt_pending_remove(cmd);

	return err;
}
4469

4470
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4471 4472
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
4473
{
4474 4475
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
4476
	size_t ev_size;
4477

4478 4479 4480
	if (!hci_discovery_active(hdev))
		return -EPERM;

4481 4482
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
4483 4484
		return -EINVAL;

4485 4486
	memset(buf, 0, sizeof(buf));

4487
	bacpy(&ev->addr.bdaddr, bdaddr);
4488
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4489
	ev->rssi = rssi;
4490
	if (cfm_name)
4491
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
4492
	if (!ssp)
4493
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
4494

4495
	if (eir_len > 0)
4496
		memcpy(ev->eir, eir, eir_len);
4497

4498 4499
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
4500
					  dev_class, 3);
4501

4502
	ev->eir_len = cpu_to_le16(eir_len);
4503
	ev_size = sizeof(*ev) + eir_len;
4504

4505
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
4506
}
4507

4508
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4509
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
4510
{
4511 4512 4513
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
4514

4515
	ev = (struct mgmt_ev_device_found *) buf;
4516

4517 4518 4519
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
4520
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4521 4522 4523
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
4524
				  name_len);
4525

4526
	ev->eir_len = cpu_to_le16(eir_len);
4527

4528
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
4529
			  sizeof(*ev) + eir_len, NULL);
4530
}
4531

4532
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
4533
{
4534
	struct mgmt_ev_discovering ev;
4535 4536
	struct pending_cmd *cmd;

4537 4538
	BT_DBG("%s discovering %u", hdev->name, discovering);

4539
	if (discovering)
4540
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
4541
	else
4542
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
4543 4544

	if (cmd != NULL) {
4545 4546
		u8 type = hdev->discovery.type;

4547 4548
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
4549 4550 4551
		mgmt_pending_remove(cmd);
	}

4552 4553 4554 4555 4556
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
4557
}
4558

4559
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4560 4561 4562 4563
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

4564
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
4565

4566 4567
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4568

4569
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
4570
			  cmd ? cmd->sk : NULL);
4571 4572
}

4573
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4574 4575 4576 4577
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

4578
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
4579

4580 4581
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4582

4583
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
4584
			  cmd ? cmd->sk : NULL);
4585
}