Bluetooth: Fix updating Identity Address in L2CAP channels
[deliverable/linux.git] / net / bluetooth / mgmt.c
CommitLineData
0381101f
JH
1/*
2 BlueZ - Bluetooth protocol stack for Linux
ea585ab5 3
0381101f 4 Copyright (C) 2010 Nokia Corporation
ea585ab5 5 Copyright (C) 2011-2012 Intel Corporation
0381101f
JH
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI Management interface */
26
3a9a231d 27#include <linux/module.h>
0381101f
JH
28#include <asm/unaligned.h>
29
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
32#include <net/bluetooth/mgmt.h>
ac4b7236
MH
33
34#include "smp.h"
0381101f 35
2da9c55c 36#define MGMT_VERSION 1
40456644 37#define MGMT_REVISION 5
02d98129 38
e70bb2e8
JH
39static const u16 mgmt_commands[] = {
40 MGMT_OP_READ_INDEX_LIST,
41 MGMT_OP_READ_INFO,
42 MGMT_OP_SET_POWERED,
43 MGMT_OP_SET_DISCOVERABLE,
44 MGMT_OP_SET_CONNECTABLE,
45 MGMT_OP_SET_FAST_CONNECTABLE,
46 MGMT_OP_SET_PAIRABLE,
47 MGMT_OP_SET_LINK_SECURITY,
48 MGMT_OP_SET_SSP,
49 MGMT_OP_SET_HS,
50 MGMT_OP_SET_LE,
51 MGMT_OP_SET_DEV_CLASS,
52 MGMT_OP_SET_LOCAL_NAME,
53 MGMT_OP_ADD_UUID,
54 MGMT_OP_REMOVE_UUID,
55 MGMT_OP_LOAD_LINK_KEYS,
56 MGMT_OP_LOAD_LONG_TERM_KEYS,
57 MGMT_OP_DISCONNECT,
58 MGMT_OP_GET_CONNECTIONS,
59 MGMT_OP_PIN_CODE_REPLY,
60 MGMT_OP_PIN_CODE_NEG_REPLY,
61 MGMT_OP_SET_IO_CAPABILITY,
62 MGMT_OP_PAIR_DEVICE,
63 MGMT_OP_CANCEL_PAIR_DEVICE,
64 MGMT_OP_UNPAIR_DEVICE,
65 MGMT_OP_USER_CONFIRM_REPLY,
66 MGMT_OP_USER_CONFIRM_NEG_REPLY,
67 MGMT_OP_USER_PASSKEY_REPLY,
68 MGMT_OP_USER_PASSKEY_NEG_REPLY,
69 MGMT_OP_READ_LOCAL_OOB_DATA,
70 MGMT_OP_ADD_REMOTE_OOB_DATA,
71 MGMT_OP_REMOVE_REMOTE_OOB_DATA,
72 MGMT_OP_START_DISCOVERY,
73 MGMT_OP_STOP_DISCOVERY,
74 MGMT_OP_CONFIRM_NAME,
75 MGMT_OP_BLOCK_DEVICE,
76 MGMT_OP_UNBLOCK_DEVICE,
cdbaccca 77 MGMT_OP_SET_DEVICE_ID,
4375f103 78 MGMT_OP_SET_ADVERTISING,
0663ca2a 79 MGMT_OP_SET_BREDR,
d13eafce 80 MGMT_OP_SET_STATIC_ADDRESS,
7f72134e 81 MGMT_OP_SET_SCAN_PARAMS,
e98d2ce2 82 MGMT_OP_SET_SECURE_CONN,
4e39ac81 83 MGMT_OP_SET_DEBUG_KEYS,
41edf160 84 MGMT_OP_LOAD_IRKS,
e70bb2e8
JH
85};
86
87static const u16 mgmt_events[] = {
88 MGMT_EV_CONTROLLER_ERROR,
89 MGMT_EV_INDEX_ADDED,
90 MGMT_EV_INDEX_REMOVED,
91 MGMT_EV_NEW_SETTINGS,
92 MGMT_EV_CLASS_OF_DEV_CHANGED,
93 MGMT_EV_LOCAL_NAME_CHANGED,
94 MGMT_EV_NEW_LINK_KEY,
95 MGMT_EV_NEW_LONG_TERM_KEY,
96 MGMT_EV_DEVICE_CONNECTED,
97 MGMT_EV_DEVICE_DISCONNECTED,
98 MGMT_EV_CONNECT_FAILED,
99 MGMT_EV_PIN_CODE_REQUEST,
100 MGMT_EV_USER_CONFIRM_REQUEST,
101 MGMT_EV_USER_PASSKEY_REQUEST,
102 MGMT_EV_AUTH_FAILED,
103 MGMT_EV_DEVICE_FOUND,
104 MGMT_EV_DISCOVERING,
105 MGMT_EV_DEVICE_BLOCKED,
106 MGMT_EV_DEVICE_UNBLOCKED,
107 MGMT_EV_DEVICE_UNPAIRED,
92a25256 108 MGMT_EV_PASSKEY_NOTIFY,
e70bb2e8
JH
109};
110
17b02e62 111#define CACHE_TIMEOUT msecs_to_jiffies(2 * 1000)
7d78525d 112
4b34ee78
JH
113#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
114 !test_bit(HCI_AUTO_OFF, &hdev->dev_flags))
115
eec8d2bc
JH
116struct pending_cmd {
117 struct list_head list;
fc2f4b13 118 u16 opcode;
eec8d2bc 119 int index;
c68fb7ff 120 void *param;
eec8d2bc 121 struct sock *sk;
e9a416b5 122 void *user_data;
eec8d2bc
JH
123};
124
ca69b795
JH
125/* HCI to MGMT error code conversion table */
126static u8 mgmt_status_table[] = {
127 MGMT_STATUS_SUCCESS,
128 MGMT_STATUS_UNKNOWN_COMMAND, /* Unknown Command */
129 MGMT_STATUS_NOT_CONNECTED, /* No Connection */
130 MGMT_STATUS_FAILED, /* Hardware Failure */
131 MGMT_STATUS_CONNECT_FAILED, /* Page Timeout */
132 MGMT_STATUS_AUTH_FAILED, /* Authentication Failed */
eadd663a 133 MGMT_STATUS_AUTH_FAILED, /* PIN or Key Missing */
ca69b795
JH
134 MGMT_STATUS_NO_RESOURCES, /* Memory Full */
135 MGMT_STATUS_TIMEOUT, /* Connection Timeout */
136 MGMT_STATUS_NO_RESOURCES, /* Max Number of Connections */
137 MGMT_STATUS_NO_RESOURCES, /* Max Number of SCO Connections */
138 MGMT_STATUS_ALREADY_CONNECTED, /* ACL Connection Exists */
139 MGMT_STATUS_BUSY, /* Command Disallowed */
140 MGMT_STATUS_NO_RESOURCES, /* Rejected Limited Resources */
141 MGMT_STATUS_REJECTED, /* Rejected Security */
142 MGMT_STATUS_REJECTED, /* Rejected Personal */
143 MGMT_STATUS_TIMEOUT, /* Host Timeout */
144 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Feature */
145 MGMT_STATUS_INVALID_PARAMS, /* Invalid Parameters */
146 MGMT_STATUS_DISCONNECTED, /* OE User Ended Connection */
147 MGMT_STATUS_NO_RESOURCES, /* OE Low Resources */
148 MGMT_STATUS_DISCONNECTED, /* OE Power Off */
149 MGMT_STATUS_DISCONNECTED, /* Connection Terminated */
150 MGMT_STATUS_BUSY, /* Repeated Attempts */
151 MGMT_STATUS_REJECTED, /* Pairing Not Allowed */
152 MGMT_STATUS_FAILED, /* Unknown LMP PDU */
153 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Remote Feature */
154 MGMT_STATUS_REJECTED, /* SCO Offset Rejected */
155 MGMT_STATUS_REJECTED, /* SCO Interval Rejected */
156 MGMT_STATUS_REJECTED, /* Air Mode Rejected */
157 MGMT_STATUS_INVALID_PARAMS, /* Invalid LMP Parameters */
158 MGMT_STATUS_FAILED, /* Unspecified Error */
159 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported LMP Parameter Value */
160 MGMT_STATUS_FAILED, /* Role Change Not Allowed */
161 MGMT_STATUS_TIMEOUT, /* LMP Response Timeout */
162 MGMT_STATUS_FAILED, /* LMP Error Transaction Collision */
163 MGMT_STATUS_FAILED, /* LMP PDU Not Allowed */
164 MGMT_STATUS_REJECTED, /* Encryption Mode Not Accepted */
165 MGMT_STATUS_FAILED, /* Unit Link Key Used */
166 MGMT_STATUS_NOT_SUPPORTED, /* QoS Not Supported */
167 MGMT_STATUS_TIMEOUT, /* Instant Passed */
168 MGMT_STATUS_NOT_SUPPORTED, /* Pairing Not Supported */
169 MGMT_STATUS_FAILED, /* Transaction Collision */
170 MGMT_STATUS_INVALID_PARAMS, /* Unacceptable Parameter */
171 MGMT_STATUS_REJECTED, /* QoS Rejected */
172 MGMT_STATUS_NOT_SUPPORTED, /* Classification Not Supported */
173 MGMT_STATUS_REJECTED, /* Insufficient Security */
174 MGMT_STATUS_INVALID_PARAMS, /* Parameter Out Of Range */
175 MGMT_STATUS_BUSY, /* Role Switch Pending */
176 MGMT_STATUS_FAILED, /* Slot Violation */
177 MGMT_STATUS_FAILED, /* Role Switch Failed */
178 MGMT_STATUS_INVALID_PARAMS, /* EIR Too Large */
179 MGMT_STATUS_NOT_SUPPORTED, /* Simple Pairing Not Supported */
180 MGMT_STATUS_BUSY, /* Host Busy Pairing */
181 MGMT_STATUS_REJECTED, /* Rejected, No Suitable Channel */
182 MGMT_STATUS_BUSY, /* Controller Busy */
183 MGMT_STATUS_INVALID_PARAMS, /* Unsuitable Connection Interval */
184 MGMT_STATUS_TIMEOUT, /* Directed Advertising Timeout */
185 MGMT_STATUS_AUTH_FAILED, /* Terminated Due to MIC Failure */
186 MGMT_STATUS_CONNECT_FAILED, /* Connection Establishment Failed */
187 MGMT_STATUS_CONNECT_FAILED, /* MAC Connection Failed */
188};
189
190static u8 mgmt_status(u8 hci_status)
191{
192 if (hci_status < ARRAY_SIZE(mgmt_status_table))
193 return mgmt_status_table[hci_status];
194
195 return MGMT_STATUS_FAILED;
196}
197
4e51eae9 198static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
f7b64e69
JH
199{
200 struct sk_buff *skb;
201 struct mgmt_hdr *hdr;
202 struct mgmt_ev_cmd_status *ev;
56b7d137 203 int err;
f7b64e69 204
34eb525c 205 BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
f7b64e69 206
790eff44 207 skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
f7b64e69
JH
208 if (!skb)
209 return -ENOMEM;
210
211 hdr = (void *) skb_put(skb, sizeof(*hdr));
212
612dfce9 213 hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
4e51eae9 214 hdr->index = cpu_to_le16(index);
f7b64e69
JH
215 hdr->len = cpu_to_le16(sizeof(*ev));
216
217 ev = (void *) skb_put(skb, sizeof(*ev));
218 ev->status = status;
eb55ef07 219 ev->opcode = cpu_to_le16(cmd);
f7b64e69 220
56b7d137
GP
221 err = sock_queue_rcv_skb(sk, skb);
222 if (err < 0)
f7b64e69
JH
223 kfree_skb(skb);
224
56b7d137 225 return err;
f7b64e69
JH
226}
227
aee9b218 228static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
04124681 229 void *rp, size_t rp_len)
02d98129
JH
230{
231 struct sk_buff *skb;
232 struct mgmt_hdr *hdr;
233 struct mgmt_ev_cmd_complete *ev;
56b7d137 234 int err;
02d98129
JH
235
236 BT_DBG("sock %p", sk);
237
790eff44 238 skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
02d98129
JH
239 if (!skb)
240 return -ENOMEM;
241
242 hdr = (void *) skb_put(skb, sizeof(*hdr));
02d98129 243
612dfce9 244 hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
4e51eae9 245 hdr->index = cpu_to_le16(index);
a38528f1 246 hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
02d98129 247
a38528f1 248 ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
eb55ef07 249 ev->opcode = cpu_to_le16(cmd);
aee9b218 250 ev->status = status;
8020c16a
SJ
251
252 if (rp)
253 memcpy(ev->data, rp, rp_len);
02d98129 254
56b7d137
GP
255 err = sock_queue_rcv_skb(sk, skb);
256 if (err < 0)
02d98129
JH
257 kfree_skb(skb);
258
e5f0e151 259 return err;
02d98129
JH
260}
261
04124681
GP
262static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
263 u16 data_len)
a38528f1
JH
264{
265 struct mgmt_rp_read_version rp;
266
267 BT_DBG("sock %p", sk);
268
269 rp.version = MGMT_VERSION;
eb55ef07 270 rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
a38528f1 271
aee9b218 272 return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
04124681 273 sizeof(rp));
a38528f1
JH
274}
275
04124681
GP
276static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
277 u16 data_len)
e70bb2e8
JH
278{
279 struct mgmt_rp_read_commands *rp;
eb55ef07
MH
280 const u16 num_commands = ARRAY_SIZE(mgmt_commands);
281 const u16 num_events = ARRAY_SIZE(mgmt_events);
2e3c35ea 282 __le16 *opcode;
e70bb2e8
JH
283 size_t rp_size;
284 int i, err;
285
286 BT_DBG("sock %p", sk);
287
288 rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));
289
290 rp = kmalloc(rp_size, GFP_KERNEL);
291 if (!rp)
292 return -ENOMEM;
293
eb55ef07
MH
294 rp->num_commands = __constant_cpu_to_le16(num_commands);
295 rp->num_events = __constant_cpu_to_le16(num_events);
e70bb2e8
JH
296
297 for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
298 put_unaligned_le16(mgmt_commands[i], opcode);
299
300 for (i = 0; i < num_events; i++, opcode++)
301 put_unaligned_le16(mgmt_events[i], opcode);
302
aee9b218 303 err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
04124681 304 rp_size);
e70bb2e8
JH
305 kfree(rp);
306
307 return err;
308}
309
04124681
GP
310static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
311 u16 data_len)
faba42eb 312{
faba42eb 313 struct mgmt_rp_read_index_list *rp;
8035ded4 314 struct hci_dev *d;
a38528f1 315 size_t rp_len;
faba42eb 316 u16 count;
476e44cb 317 int err;
faba42eb
JH
318
319 BT_DBG("sock %p", sk);
320
321 read_lock(&hci_dev_list_lock);
322
323 count = 0;
bb4b2a9a 324 list_for_each_entry(d, &hci_dev_list, list) {
1514b892
MH
325 if (d->dev_type == HCI_BREDR)
326 count++;
faba42eb
JH
327 }
328
a38528f1
JH
329 rp_len = sizeof(*rp) + (2 * count);
330 rp = kmalloc(rp_len, GFP_ATOMIC);
331 if (!rp) {
b2c60d42 332 read_unlock(&hci_dev_list_lock);
faba42eb 333 return -ENOMEM;
b2c60d42 334 }
faba42eb 335
476e44cb 336 count = 0;
8035ded4 337 list_for_each_entry(d, &hci_dev_list, list) {
a8b2d5c2 338 if (test_bit(HCI_SETUP, &d->dev_flags))
ab81cbf9
JH
339 continue;
340
0736cfa8
MH
341 if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
342 continue;
343
1514b892
MH
344 if (d->dev_type == HCI_BREDR) {
345 rp->index[count++] = cpu_to_le16(d->id);
346 BT_DBG("Added hci%u", d->id);
347 }
faba42eb
JH
348 }
349
476e44cb
JH
350 rp->num_controllers = cpu_to_le16(count);
351 rp_len = sizeof(*rp) + (2 * count);
352
faba42eb
JH
353 read_unlock(&hci_dev_list_lock);
354
aee9b218 355 err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
04124681 356 rp_len);
faba42eb 357
a38528f1
JH
358 kfree(rp);
359
360 return err;
faba42eb
JH
361}
362
69ab39ea
JH
363static u32 get_supported_settings(struct hci_dev *hdev)
364{
365 u32 settings = 0;
366
367 settings |= MGMT_SETTING_POWERED;
69ab39ea 368 settings |= MGMT_SETTING_PAIRABLE;
b1de97d8 369 settings |= MGMT_SETTING_DEBUG_KEYS;
69ab39ea 370
ed3fa31f 371 if (lmp_bredr_capable(hdev)) {
33c525c0 372 settings |= MGMT_SETTING_CONNECTABLE;
1a47aee8
JH
373 if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
374 settings |= MGMT_SETTING_FAST_CONNECTABLE;
33c525c0 375 settings |= MGMT_SETTING_DISCOVERABLE;
69ab39ea
JH
376 settings |= MGMT_SETTING_BREDR;
377 settings |= MGMT_SETTING_LINK_SECURITY;
a82974c9
MH
378
379 if (lmp_ssp_capable(hdev)) {
380 settings |= MGMT_SETTING_SSP;
381 settings |= MGMT_SETTING_HS;
382 }
e98d2ce2 383
5afeac14
MH
384 if (lmp_sc_capable(hdev) ||
385 test_bit(HCI_FORCE_SC, &hdev->dev_flags))
e98d2ce2 386 settings |= MGMT_SETTING_SECURE_CONN;
848566b3 387 }
d7b7e796 388
eeca6f89 389 if (lmp_le_capable(hdev)) {
9d42820f 390 settings |= MGMT_SETTING_LE;
eeca6f89
JH
391 settings |= MGMT_SETTING_ADVERTISING;
392 }
69ab39ea
JH
393
394 return settings;
395}
396
397static u32 get_current_settings(struct hci_dev *hdev)
398{
399 u32 settings = 0;
400
f1f0eb02 401 if (hdev_is_powered(hdev))
f0d4b78a
MH
402 settings |= MGMT_SETTING_POWERED;
403
5e5282bb 404 if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
69ab39ea
JH
405 settings |= MGMT_SETTING_CONNECTABLE;
406
1a4d3c4b
JH
407 if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
408 settings |= MGMT_SETTING_FAST_CONNECTABLE;
409
5e5282bb 410 if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
69ab39ea
JH
411 settings |= MGMT_SETTING_DISCOVERABLE;
412
a8b2d5c2 413 if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
69ab39ea
JH
414 settings |= MGMT_SETTING_PAIRABLE;
415
56f87901 416 if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
69ab39ea
JH
417 settings |= MGMT_SETTING_BREDR;
418
06199cf8 419 if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
69ab39ea
JH
420 settings |= MGMT_SETTING_LE;
421
47990ea0 422 if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
69ab39ea
JH
423 settings |= MGMT_SETTING_LINK_SECURITY;
424
84bde9d6 425 if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
69ab39ea
JH
426 settings |= MGMT_SETTING_SSP;
427
6d80dfd0
JH
428 if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
429 settings |= MGMT_SETTING_HS;
430
f3d3444a 431 if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
eeca6f89
JH
432 settings |= MGMT_SETTING_ADVERTISING;
433
e98d2ce2
MH
434 if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
435 settings |= MGMT_SETTING_SECURE_CONN;
436
b1de97d8
MH
437 if (test_bit(HCI_DEBUG_KEYS, &hdev->dev_flags))
438 settings |= MGMT_SETTING_DEBUG_KEYS;
439
69ab39ea
JH
440 return settings;
441}
442
ef580372
JH
443#define PNP_INFO_SVCLASS_ID 0x1200
444
213202ed
JH
445static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
446{
447 u8 *ptr = data, *uuids_start = NULL;
448 struct bt_uuid *uuid;
449
450 if (len < 4)
451 return ptr;
452
453 list_for_each_entry(uuid, &hdev->uuids, list) {
454 u16 uuid16;
455
456 if (uuid->size != 16)
457 continue;
458
459 uuid16 = get_unaligned_le16(&uuid->uuid[12]);
460 if (uuid16 < 0x1100)
461 continue;
462
463 if (uuid16 == PNP_INFO_SVCLASS_ID)
464 continue;
465
466 if (!uuids_start) {
467 uuids_start = ptr;
468 uuids_start[0] = 1;
469 uuids_start[1] = EIR_UUID16_ALL;
470 ptr += 2;
471 }
472
473 /* Stop if not enough space to put next UUID */
474 if ((ptr - data) + sizeof(u16) > len) {
475 uuids_start[1] = EIR_UUID16_SOME;
476 break;
477 }
478
479 *ptr++ = (uuid16 & 0x00ff);
480 *ptr++ = (uuid16 & 0xff00) >> 8;
481 uuids_start[0] += sizeof(uuid16);
482 }
483
484 return ptr;
485}
486
cdf1963f
JH
487static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
488{
489 u8 *ptr = data, *uuids_start = NULL;
490 struct bt_uuid *uuid;
491
492 if (len < 6)
493 return ptr;
494
495 list_for_each_entry(uuid, &hdev->uuids, list) {
496 if (uuid->size != 32)
497 continue;
498
499 if (!uuids_start) {
500 uuids_start = ptr;
501 uuids_start[0] = 1;
502 uuids_start[1] = EIR_UUID32_ALL;
503 ptr += 2;
504 }
505
506 /* Stop if not enough space to put next UUID */
507 if ((ptr - data) + sizeof(u32) > len) {
508 uuids_start[1] = EIR_UUID32_SOME;
509 break;
510 }
511
512 memcpy(ptr, &uuid->uuid[12], sizeof(u32));
513 ptr += sizeof(u32);
514 uuids_start[0] += sizeof(u32);
515 }
516
517 return ptr;
518}
519
c00d575b
JH
520static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
521{
522 u8 *ptr = data, *uuids_start = NULL;
523 struct bt_uuid *uuid;
524
525 if (len < 18)
526 return ptr;
527
528 list_for_each_entry(uuid, &hdev->uuids, list) {
529 if (uuid->size != 128)
530 continue;
531
532 if (!uuids_start) {
533 uuids_start = ptr;
534 uuids_start[0] = 1;
535 uuids_start[1] = EIR_UUID128_ALL;
536 ptr += 2;
537 }
538
539 /* Stop if not enough space to put next UUID */
540 if ((ptr - data) + 16 > len) {
541 uuids_start[1] = EIR_UUID128_SOME;
542 break;
543 }
544
545 memcpy(ptr, uuid->uuid, 16);
546 ptr += 16;
547 uuids_start[0] += 16;
548 }
549
550 return ptr;
551}
552
eb2a8d20
JH
553static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
554{
555 struct pending_cmd *cmd;
556
557 list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
558 if (cmd->opcode == opcode)
559 return cmd;
560 }
561
562 return NULL;
563}
564
f14d8f64
MH
565static u8 create_scan_rsp_data(struct hci_dev *hdev, u8 *ptr)
566{
7a5f4990
MH
567 u8 ad_len = 0;
568 size_t name_len;
569
570 name_len = strlen(hdev->dev_name);
571 if (name_len > 0) {
572 size_t max_len = HCI_MAX_AD_LENGTH - ad_len - 2;
573
574 if (name_len > max_len) {
575 name_len = max_len;
576 ptr[1] = EIR_NAME_SHORT;
577 } else
578 ptr[1] = EIR_NAME_COMPLETE;
579
580 ptr[0] = name_len + 1;
581
582 memcpy(ptr + 2, hdev->dev_name, name_len);
583
584 ad_len += (name_len + 2);
585 ptr += (name_len + 2);
586 }
587
588 return ad_len;
f14d8f64
MH
589}
590
591static void update_scan_rsp_data(struct hci_request *req)
592{
593 struct hci_dev *hdev = req->hdev;
594 struct hci_cp_le_set_scan_rsp_data cp;
595 u8 len;
596
7751ef1b 597 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
f14d8f64
MH
598 return;
599
600 memset(&cp, 0, sizeof(cp));
601
602 len = create_scan_rsp_data(hdev, cp.data);
603
eb438b5f
JH
604 if (hdev->scan_rsp_data_len == len &&
605 memcmp(cp.data, hdev->scan_rsp_data, len) == 0)
f14d8f64
MH
606 return;
607
eb438b5f
JH
608 memcpy(hdev->scan_rsp_data, cp.data, sizeof(cp.data));
609 hdev->scan_rsp_data_len = len;
f14d8f64
MH
610
611 cp.length = len;
612
613 hci_req_add(req, HCI_OP_LE_SET_SCAN_RSP_DATA, sizeof(cp), &cp);
614}
615
9a43e25f
JH
616static u8 get_adv_discov_flags(struct hci_dev *hdev)
617{
618 struct pending_cmd *cmd;
619
620 /* If there's a pending mgmt command the flags will not yet have
621 * their final values, so check for this first.
622 */
623 cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
624 if (cmd) {
625 struct mgmt_mode *cp = cmd->param;
626 if (cp->val == 0x01)
627 return LE_AD_GENERAL;
628 else if (cp->val == 0x02)
629 return LE_AD_LIMITED;
630 } else {
631 if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
632 return LE_AD_LIMITED;
633 else if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
634 return LE_AD_GENERAL;
635 }
636
637 return 0;
638}
639
46cad2ed 640static u8 create_adv_data(struct hci_dev *hdev, u8 *ptr)
441ad2d0
MH
641{
642 u8 ad_len = 0, flags = 0;
441ad2d0 643
9a43e25f 644 flags |= get_adv_discov_flags(hdev);
441ad2d0 645
e834004b 646 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
441ad2d0 647 flags |= LE_AD_NO_BREDR;
441ad2d0
MH
648
649 if (flags) {
650 BT_DBG("adv flags 0x%02x", flags);
651
652 ptr[0] = 2;
653 ptr[1] = EIR_FLAGS;
654 ptr[2] = flags;
655
656 ad_len += 3;
657 ptr += 3;
658 }
659
660 if (hdev->adv_tx_power != HCI_TX_POWER_INVALID) {
661 ptr[0] = 2;
662 ptr[1] = EIR_TX_POWER;
663 ptr[2] = (u8) hdev->adv_tx_power;
664
665 ad_len += 3;
666 ptr += 3;
667 }
668
441ad2d0
MH
669 return ad_len;
670}
671
5947f4bc 672static void update_adv_data(struct hci_request *req)
441ad2d0
MH
673{
674 struct hci_dev *hdev = req->hdev;
675 struct hci_cp_le_set_adv_data cp;
676 u8 len;
677
10994ce6 678 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
441ad2d0
MH
679 return;
680
681 memset(&cp, 0, sizeof(cp));
682
46cad2ed 683 len = create_adv_data(hdev, cp.data);
441ad2d0
MH
684
685 if (hdev->adv_data_len == len &&
686 memcmp(cp.data, hdev->adv_data, len) == 0)
687 return;
688
689 memcpy(hdev->adv_data, cp.data, sizeof(cp.data));
690 hdev->adv_data_len = len;
691
692 cp.length = len;
693
694 hci_req_add(req, HCI_OP_LE_SET_ADV_DATA, sizeof(cp), &cp);
695}
696
ef580372
JH
697static void create_eir(struct hci_dev *hdev, u8 *data)
698{
699 u8 *ptr = data;
ef580372
JH
700 size_t name_len;
701
702 name_len = strlen(hdev->dev_name);
703
704 if (name_len > 0) {
705 /* EIR Data type */
706 if (name_len > 48) {
707 name_len = 48;
708 ptr[1] = EIR_NAME_SHORT;
709 } else
710 ptr[1] = EIR_NAME_COMPLETE;
711
712 /* EIR Data length */
713 ptr[0] = name_len + 1;
714
715 memcpy(ptr + 2, hdev->dev_name, name_len);
716
ef580372
JH
717 ptr += (name_len + 2);
718 }
719
bbaf444a 720 if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
91c4e9b1
MH
721 ptr[0] = 2;
722 ptr[1] = EIR_TX_POWER;
723 ptr[2] = (u8) hdev->inq_tx_power;
724
91c4e9b1
MH
725 ptr += 3;
726 }
727
2b9be137
MH
728 if (hdev->devid_source > 0) {
729 ptr[0] = 9;
730 ptr[1] = EIR_DEVICE_ID;
731
732 put_unaligned_le16(hdev->devid_source, ptr + 2);
733 put_unaligned_le16(hdev->devid_vendor, ptr + 4);
734 put_unaligned_le16(hdev->devid_product, ptr + 6);
735 put_unaligned_le16(hdev->devid_version, ptr + 8);
736
2b9be137
MH
737 ptr += 10;
738 }
739
213202ed 740 ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
cdf1963f 741 ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
c00d575b 742 ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
ef580372
JH
743}
744
890ea898 745static void update_eir(struct hci_request *req)
ef580372 746{
890ea898 747 struct hci_dev *hdev = req->hdev;
ef580372
JH
748 struct hci_cp_write_eir cp;
749
504c8dcd 750 if (!hdev_is_powered(hdev))
890ea898 751 return;
7770c4aa 752
976eb20e 753 if (!lmp_ext_inq_capable(hdev))
890ea898 754 return;
ef580372 755
84bde9d6 756 if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
890ea898 757 return;
ef580372 758
a8b2d5c2 759 if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
890ea898 760 return;
ef580372
JH
761
762 memset(&cp, 0, sizeof(cp));
763
764 create_eir(hdev, cp.data);
765
766 if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
890ea898 767 return;
ef580372
JH
768
769 memcpy(hdev->eir, cp.data, sizeof(cp.data));
770
890ea898 771 hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
ef580372
JH
772}
773
774static u8 get_service_classes(struct hci_dev *hdev)
775{
776 struct bt_uuid *uuid;
777 u8 val = 0;
778
779 list_for_each_entry(uuid, &hdev->uuids, list)
780 val |= uuid->svc_hint;
781
782 return val;
783}
784
890ea898 785static void update_class(struct hci_request *req)
ef580372 786{
890ea898 787 struct hci_dev *hdev = req->hdev;
ef580372
JH
788 u8 cod[3];
789
790 BT_DBG("%s", hdev->name);
791
504c8dcd 792 if (!hdev_is_powered(hdev))
890ea898 793 return;
7770c4aa 794
f87ea1da
JH
795 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
796 return;
797
a8b2d5c2 798 if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
890ea898 799 return;
ef580372
JH
800
801 cod[0] = hdev->minor_class;
802 cod[1] = hdev->major_class;
803 cod[2] = get_service_classes(hdev);
804
6acd7db4
MH
805 if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
806 cod[1] |= 0x20;
807
ef580372 808 if (memcmp(cod, hdev->dev_class, 3) == 0)
890ea898 809 return;
ef580372 810
890ea898 811 hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
ef580372
JH
812}
813
7d78525d
JH
814static void service_cache_off(struct work_struct *work)
815{
816 struct hci_dev *hdev = container_of(work, struct hci_dev,
04124681 817 service_cache.work);
890ea898 818 struct hci_request req;
7d78525d 819
a8b2d5c2 820 if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
7d78525d
JH
821 return;
822
890ea898
JH
823 hci_req_init(&req, hdev);
824
7d78525d
JH
825 hci_dev_lock(hdev);
826
890ea898
JH
827 update_eir(&req);
828 update_class(&req);
7d78525d
JH
829
830 hci_dev_unlock(hdev);
890ea898
JH
831
832 hci_req_run(&req, NULL);
7d78525d
JH
833}
834
6a919082 835static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
7d78525d 836{
4f87da80 837 if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
6a919082
JH
838 return;
839
4f87da80 840 INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
7d78525d 841
4f87da80
JH
842 /* Non-mgmt controlled devices get this bit set
843 * implicitly so that pairing works for them, however
844 * for mgmt we require user-space to explicitly enable
845 * it
846 */
847 clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
7d78525d
JH
848}
849
0f4e68cf 850static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
04124681 851 void *data, u16 data_len)
0381101f 852{
a38528f1 853 struct mgmt_rp_read_info rp;
f7b64e69 854
bdb6d971 855 BT_DBG("sock %p %s", sk, hdev->name);
f7b64e69 856
09fd0de5 857 hci_dev_lock(hdev);
f7b64e69 858
dc4fe30b
JH
859 memset(&rp, 0, sizeof(rp));
860
69ab39ea 861 bacpy(&rp.bdaddr, &hdev->bdaddr);
f7b64e69 862
69ab39ea 863 rp.version = hdev->hci_ver;
eb55ef07 864 rp.manufacturer = cpu_to_le16(hdev->manufacturer);
69ab39ea
JH
865
866 rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
867 rp.current_settings = cpu_to_le32(get_current_settings(hdev));
f7b64e69 868
a38528f1 869 memcpy(rp.dev_class, hdev->dev_class, 3);
f7b64e69 870
dc4fe30b 871 memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
27fcc362 872 memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
dc4fe30b 873
09fd0de5 874 hci_dev_unlock(hdev);
0381101f 875
bdb6d971 876 return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
04124681 877 sizeof(rp));
0381101f
JH
878}
879
eec8d2bc
JH
880static void mgmt_pending_free(struct pending_cmd *cmd)
881{
882 sock_put(cmd->sk);
c68fb7ff 883 kfree(cmd->param);
eec8d2bc
JH
884 kfree(cmd);
885}
886
366a0336 887static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
04124681
GP
888 struct hci_dev *hdev, void *data,
889 u16 len)
eec8d2bc
JH
890{
891 struct pending_cmd *cmd;
892
12b94565 893 cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
eec8d2bc 894 if (!cmd)
366a0336 895 return NULL;
eec8d2bc
JH
896
897 cmd->opcode = opcode;
2e58ef3e 898 cmd->index = hdev->id;
eec8d2bc 899
12b94565 900 cmd->param = kmalloc(len, GFP_KERNEL);
c68fb7ff 901 if (!cmd->param) {
eec8d2bc 902 kfree(cmd);
366a0336 903 return NULL;
eec8d2bc
JH
904 }
905
8fce6357
SJ
906 if (data)
907 memcpy(cmd->param, data, len);
eec8d2bc
JH
908
909 cmd->sk = sk;
910 sock_hold(sk);
911
2e58ef3e 912 list_add(&cmd->list, &hdev->mgmt_pending);
eec8d2bc 913
366a0336 914 return cmd;
eec8d2bc
JH
915}
916
744cf19e 917static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
8fc9ced3
GP
918 void (*cb)(struct pending_cmd *cmd,
919 void *data),
04124681 920 void *data)
eec8d2bc 921{
a3d09356 922 struct pending_cmd *cmd, *tmp;
eec8d2bc 923
a3d09356 924 list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
b24752fe 925 if (opcode > 0 && cmd->opcode != opcode)
eec8d2bc
JH
926 continue;
927
eec8d2bc
JH
928 cb(cmd, data);
929 }
930}
931
a664b5bc 932static void mgmt_pending_remove(struct pending_cmd *cmd)
73f22f62 933{
73f22f62
JH
934 list_del(&cmd->list);
935 mgmt_pending_free(cmd);
936}
937
69ab39ea 938static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
8680570b 939{
69ab39ea 940 __le32 settings = cpu_to_le32(get_current_settings(hdev));
8680570b 941
aee9b218 942 return cmd_complete(sk, hdev->id, opcode, 0, &settings,
04124681 943 sizeof(settings));
8680570b
JH
944}
945
bdb6d971 946static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 947 u16 len)
eec8d2bc 948{
650f726d 949 struct mgmt_mode *cp = data;
366a0336 950 struct pending_cmd *cmd;
4b34ee78 951 int err;
eec8d2bc 952
bdb6d971 953 BT_DBG("request for %s", hdev->name);
eec8d2bc 954
a7e80f25
JH
955 if (cp->val != 0x00 && cp->val != 0x01)
956 return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
957 MGMT_STATUS_INVALID_PARAMS);
958
09fd0de5 959 hci_dev_lock(hdev);
eec8d2bc 960
87b95ba6
JH
961 if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
962 err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
963 MGMT_STATUS_BUSY);
964 goto failed;
965 }
966
f0d4b78a
MH
967 if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
968 cancel_delayed_work(&hdev->power_off);
969
970 if (cp->val) {
a1d70450
JH
971 mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
972 data, len);
973 err = mgmt_powered(hdev, 1);
f0d4b78a
MH
974 goto failed;
975 }
976 }
977
4b34ee78 978 if (!!cp->val == hdev_is_powered(hdev)) {
69ab39ea 979 err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
eec8d2bc
JH
980 goto failed;
981 }
982
2e58ef3e 983 cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
366a0336
JH
984 if (!cmd) {
985 err = -ENOMEM;
eec8d2bc 986 goto failed;
366a0336 987 }
eec8d2bc 988
72a734ec 989 if (cp->val)
19202573 990 queue_work(hdev->req_workqueue, &hdev->power_on);
eec8d2bc 991 else
19202573 992 queue_work(hdev->req_workqueue, &hdev->power_off.work);
eec8d2bc 993
366a0336 994 err = 0;
eec8d2bc
JH
995
996failed:
09fd0de5 997 hci_dev_unlock(hdev);
366a0336 998 return err;
eec8d2bc
JH
999}
1000
04124681
GP
1001static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
1002 struct sock *skip_sk)
beadb2bd
JH
1003{
1004 struct sk_buff *skb;
1005 struct mgmt_hdr *hdr;
1006
790eff44 1007 skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
beadb2bd
JH
1008 if (!skb)
1009 return -ENOMEM;
1010
1011 hdr = (void *) skb_put(skb, sizeof(*hdr));
1012 hdr->opcode = cpu_to_le16(event);
1013 if (hdev)
1014 hdr->index = cpu_to_le16(hdev->id);
1015 else
612dfce9 1016 hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
beadb2bd
JH
1017 hdr->len = cpu_to_le16(data_len);
1018
1019 if (data)
1020 memcpy(skb_put(skb, data_len), data, data_len);
1021
97e0bdeb
MH
1022 /* Time stamp */
1023 __net_timestamp(skb);
1024
beadb2bd
JH
1025 hci_send_to_control(skb, skip_sk);
1026 kfree_skb(skb);
1027
1028 return 0;
1029}
1030
1031static int new_settings(struct hci_dev *hdev, struct sock *skip)
1032{
1033 __le32 ev;
1034
1035 ev = cpu_to_le32(get_current_settings(hdev));
1036
1037 return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
1038}
1039
bd99abdd
JH
1040struct cmd_lookup {
1041 struct sock *sk;
1042 struct hci_dev *hdev;
1043 u8 mgmt_status;
1044};
1045
1046static void settings_rsp(struct pending_cmd *cmd, void *data)
1047{
1048 struct cmd_lookup *match = data;
1049
1050 send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
1051
1052 list_del(&cmd->list);
1053
1054 if (match->sk == NULL) {
1055 match->sk = cmd->sk;
1056 sock_hold(match->sk);
1057 }
1058
1059 mgmt_pending_free(cmd);
1060}
1061
1062static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
1063{
1064 u8 *status = data;
1065
1066 cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
1067 mgmt_pending_remove(cmd);
1068}
1069
e6fe7986
JH
1070static u8 mgmt_bredr_support(struct hci_dev *hdev)
1071{
1072 if (!lmp_bredr_capable(hdev))
1073 return MGMT_STATUS_NOT_SUPPORTED;
1074 else if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1075 return MGMT_STATUS_REJECTED;
1076 else
1077 return MGMT_STATUS_SUCCESS;
1078}
1079
1080static u8 mgmt_le_support(struct hci_dev *hdev)
1081{
1082 if (!lmp_le_capable(hdev))
1083 return MGMT_STATUS_NOT_SUPPORTED;
1084 else if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
1085 return MGMT_STATUS_REJECTED;
1086 else
1087 return MGMT_STATUS_SUCCESS;
1088}
1089
bfaf8c9f
JH
1090static void set_discoverable_complete(struct hci_dev *hdev, u8 status)
1091{
1092 struct pending_cmd *cmd;
1093 struct mgmt_mode *cp;
970ba524 1094 struct hci_request req;
bfaf8c9f
JH
1095 bool changed;
1096
1097 BT_DBG("status 0x%02x", status);
1098
1099 hci_dev_lock(hdev);
1100
1101 cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
1102 if (!cmd)
1103 goto unlock;
1104
1105 if (status) {
1106 u8 mgmt_err = mgmt_status(status);
1107 cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
310a3d48 1108 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
bfaf8c9f
JH
1109 goto remove_cmd;
1110 }
1111
1112 cp = cmd->param;
d4462a07 1113 if (cp->val) {
bfaf8c9f
JH
1114 changed = !test_and_set_bit(HCI_DISCOVERABLE,
1115 &hdev->dev_flags);
d4462a07
MH
1116
1117 if (hdev->discov_timeout > 0) {
1118 int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
1119 queue_delayed_work(hdev->workqueue, &hdev->discov_off,
1120 to);
1121 }
1122 } else {
bfaf8c9f
JH
1123 changed = test_and_clear_bit(HCI_DISCOVERABLE,
1124 &hdev->dev_flags);
d4462a07 1125 }
bfaf8c9f
JH
1126
1127 send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1128
1129 if (changed)
1130 new_settings(hdev, cmd->sk);
1131
970ba524
MH
1132 /* When the discoverable mode gets changed, make sure
1133 * that class of device has the limited discoverable
1134 * bit correctly set.
1135 */
1136 hci_req_init(&req, hdev);
1137 update_class(&req);
1138 hci_req_run(&req, NULL);
1139
bfaf8c9f
JH
1140remove_cmd:
1141 mgmt_pending_remove(cmd);
1142
1143unlock:
1144 hci_dev_unlock(hdev);
1145}
1146
bdb6d971 1147static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 1148 u16 len)
73f22f62 1149{
650f726d 1150 struct mgmt_cp_set_discoverable *cp = data;
366a0336 1151 struct pending_cmd *cmd;
bfaf8c9f 1152 struct hci_request req;
5e5282bb 1153 u16 timeout;
9a43e25f 1154 u8 scan;
73f22f62
JH
1155 int err;
1156
bdb6d971 1157 BT_DBG("request for %s", hdev->name);
73f22f62 1158
9a43e25f
JH
1159 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
1160 !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
33c525c0 1161 return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
9a43e25f 1162 MGMT_STATUS_REJECTED);
33c525c0 1163
310a3d48 1164 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
a7e80f25
JH
1165 return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1166 MGMT_STATUS_INVALID_PARAMS);
1167
1f350c87 1168 timeout = __le16_to_cpu(cp->timeout);
310a3d48
MH
1169
1170 /* Disabling discoverable requires that no timeout is set,
1171 * and enabling limited discoverable requires a timeout.
1172 */
1173 if ((cp->val == 0x00 && timeout > 0) ||
1174 (cp->val == 0x02 && timeout == 0))
bdb6d971 1175 return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
04124681 1176 MGMT_STATUS_INVALID_PARAMS);
73f22f62 1177
09fd0de5 1178 hci_dev_lock(hdev);
73f22f62 1179
5e5282bb 1180 if (!hdev_is_powered(hdev) && timeout > 0) {
bdb6d971 1181 err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
04124681 1182 MGMT_STATUS_NOT_POWERED);
73f22f62
JH
1183 goto failed;
1184 }
1185
2e58ef3e 1186 if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
8ce8e2b5 1187 mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
bdb6d971 1188 err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
04124681 1189 MGMT_STATUS_BUSY);
73f22f62
JH
1190 goto failed;
1191 }
1192
5e5282bb 1193 if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
bdb6d971 1194 err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
04124681 1195 MGMT_STATUS_REJECTED);
5e5282bb
JH
1196 goto failed;
1197 }
1198
1199 if (!hdev_is_powered(hdev)) {
0224d2fa
JH
1200 bool changed = false;
1201
310a3d48
MH
1202 /* Setting limited discoverable when powered off is
1203 * not a valid operation since it requires a timeout
1204 * and so no need to check HCI_LIMITED_DISCOVERABLE.
1205 */
0224d2fa
JH
1206 if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
1207 change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
1208 changed = true;
1209 }
1210
5e5282bb 1211 err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
0224d2fa
JH
1212 if (err < 0)
1213 goto failed;
1214
1215 if (changed)
1216 err = new_settings(hdev, sk);
1217
5e5282bb
JH
1218 goto failed;
1219 }
1220
310a3d48
MH
1221 /* If the current mode is the same, then just update the timeout
1222 * value with the new value. And if only the timeout gets updated,
1223 * then no need for any HCI transactions.
1224 */
1225 if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags) &&
1226 (cp->val == 0x02) == test_bit(HCI_LIMITED_DISCOVERABLE,
1227 &hdev->dev_flags)) {
36261547
MH
1228 cancel_delayed_work(&hdev->discov_off);
1229 hdev->discov_timeout = timeout;
955638ec 1230
36261547
MH
1231 if (cp->val && hdev->discov_timeout > 0) {
1232 int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
955638ec 1233 queue_delayed_work(hdev->workqueue, &hdev->discov_off,
36261547 1234 to);
955638ec
MH
1235 }
1236
69ab39ea 1237 err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
73f22f62
JH
1238 goto failed;
1239 }
1240
2e58ef3e 1241 cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
366a0336
JH
1242 if (!cmd) {
1243 err = -ENOMEM;
73f22f62 1244 goto failed;
366a0336 1245 }
73f22f62 1246
310a3d48
MH
1247 /* Cancel any potential discoverable timeout that might be
1248 * still active and store new timeout value. The arming of
1249 * the timeout happens in the complete handler.
1250 */
1251 cancel_delayed_work(&hdev->discov_off);
1252 hdev->discov_timeout = timeout;
1253
b456f87c
JH
1254 /* Limited discoverable mode */
1255 if (cp->val == 0x02)
1256 set_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1257 else
1258 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1259
bfaf8c9f
JH
1260 hci_req_init(&req, hdev);
1261
9a43e25f
JH
1262 /* The procedure for LE-only controllers is much simpler - just
1263 * update the advertising data.
1264 */
1265 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1266 goto update_ad;
1267
73f22f62
JH
1268 scan = SCAN_PAGE;
1269
310a3d48
MH
1270 if (cp->val) {
1271 struct hci_cp_write_current_iac_lap hci_cp;
1272
1273 if (cp->val == 0x02) {
1274 /* Limited discoverable mode */
33337dcb 1275 hci_cp.num_iac = min_t(u8, hdev->num_iac, 2);
310a3d48
MH
1276 hci_cp.iac_lap[0] = 0x00; /* LIAC */
1277 hci_cp.iac_lap[1] = 0x8b;
1278 hci_cp.iac_lap[2] = 0x9e;
1279 hci_cp.iac_lap[3] = 0x33; /* GIAC */
1280 hci_cp.iac_lap[4] = 0x8b;
1281 hci_cp.iac_lap[5] = 0x9e;
1282 } else {
1283 /* General discoverable mode */
310a3d48
MH
1284 hci_cp.num_iac = 1;
1285 hci_cp.iac_lap[0] = 0x33; /* GIAC */
1286 hci_cp.iac_lap[1] = 0x8b;
1287 hci_cp.iac_lap[2] = 0x9e;
1288 }
1289
1290 hci_req_add(&req, HCI_OP_WRITE_CURRENT_IAC_LAP,
1291 (hci_cp.num_iac * 3) + 1, &hci_cp);
1292
73f22f62 1293 scan |= SCAN_INQUIRY;
310a3d48
MH
1294 } else {
1295 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1296 }
73f22f62 1297
310a3d48 1298 hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, sizeof(scan), &scan);
bfaf8c9f 1299
9a43e25f
JH
1300update_ad:
1301 update_adv_data(&req);
1302
bfaf8c9f 1303 err = hci_req_run(&req, set_discoverable_complete);
73f22f62 1304 if (err < 0)
a664b5bc 1305 mgmt_pending_remove(cmd);
73f22f62
JH
1306
1307failed:
09fd0de5 1308 hci_dev_unlock(hdev);
73f22f62
JH
1309 return err;
1310}
1311
406d7804
JH
1312static void write_fast_connectable(struct hci_request *req, bool enable)
1313{
bd98b996 1314 struct hci_dev *hdev = req->hdev;
406d7804
JH
1315 struct hci_cp_write_page_scan_activity acp;
1316 u8 type;
1317
547003b1
JH
1318 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1319 return;
1320
4c01f8b8
JH
1321 if (hdev->hci_ver < BLUETOOTH_VER_1_2)
1322 return;
1323
406d7804
JH
1324 if (enable) {
1325 type = PAGE_SCAN_TYPE_INTERLACED;
1326
1327 /* 160 msec page scan interval */
1328 acp.interval = __constant_cpu_to_le16(0x0100);
1329 } else {
1330 type = PAGE_SCAN_TYPE_STANDARD; /* default */
1331
1332 /* default 1.28 sec page scan */
1333 acp.interval = __constant_cpu_to_le16(0x0800);
1334 }
1335
1336 acp.window = __constant_cpu_to_le16(0x0012);
1337
bd98b996
JH
1338 if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
1339 __cpu_to_le16(hdev->page_scan_window) != acp.window)
1340 hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
1341 sizeof(acp), &acp);
1342
1343 if (hdev->page_scan_type != type)
1344 hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
406d7804
JH
1345}
1346
1987fdc7
JH
1347static u8 get_adv_type(struct hci_dev *hdev)
1348{
1349 struct pending_cmd *cmd;
1350 bool connectable;
1351
1352 /* If there's a pending mgmt command the flag will not yet have
1353 * it's final value, so check for this first.
1354 */
1355 cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
1356 if (cmd) {
1357 struct mgmt_mode *cp = cmd->param;
1358 connectable = !!cp->val;
1359 } else {
1360 connectable = test_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1361 }
1362
1363 return connectable ? LE_ADV_IND : LE_ADV_NONCONN_IND;
1364}
1365
95c66e75
JH
1366static void enable_advertising(struct hci_request *req)
1367{
1368 struct hci_dev *hdev = req->hdev;
1369 struct hci_cp_le_set_adv_param cp;
1370 u8 enable = 0x01;
1371
1372 memset(&cp, 0, sizeof(cp));
1373 cp.min_interval = __constant_cpu_to_le16(0x0800);
1374 cp.max_interval = __constant_cpu_to_le16(0x0800);
1987fdc7 1375 cp.type = get_adv_type(hdev);
79830f66 1376 cp.own_address_type = hdev->own_addr_type;
95c66e75
JH
1377 cp.channel_map = 0x07;
1378
1379 hci_req_add(req, HCI_OP_LE_SET_ADV_PARAM, sizeof(cp), &cp);
1380
1381 hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
1382}
1383
1384static void disable_advertising(struct hci_request *req)
1385{
1386 u8 enable = 0x00;
1387
1388 hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
1389}
1390
2b76f453
JH
1391static void set_connectable_complete(struct hci_dev *hdev, u8 status)
1392{
1393 struct pending_cmd *cmd;
d7b856f9
JH
1394 struct mgmt_mode *cp;
1395 bool changed;
2b76f453
JH
1396
1397 BT_DBG("status 0x%02x", status);
1398
1399 hci_dev_lock(hdev);
1400
1401 cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
1402 if (!cmd)
1403 goto unlock;
1404
37438c1f
JH
1405 if (status) {
1406 u8 mgmt_err = mgmt_status(status);
1407 cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1408 goto remove_cmd;
1409 }
1410
d7b856f9
JH
1411 cp = cmd->param;
1412 if (cp->val)
1413 changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1414 else
1415 changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1416
2b76f453
JH
1417 send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);
1418
d7b856f9
JH
1419 if (changed)
1420 new_settings(hdev, cmd->sk);
1421
37438c1f 1422remove_cmd:
2b76f453
JH
1423 mgmt_pending_remove(cmd);
1424
1425unlock:
1426 hci_dev_unlock(hdev);
1427}
1428
e8ba3a1f
JH
1429static int set_connectable_update_settings(struct hci_dev *hdev,
1430 struct sock *sk, u8 val)
1431{
1432 bool changed = false;
1433 int err;
1434
1435 if (!!val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
1436 changed = true;
1437
1438 if (val) {
1439 set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1440 } else {
1441 clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1442 clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
1443 }
1444
1445 err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1446 if (err < 0)
1447 return err;
1448
1449 if (changed)
1450 return new_settings(hdev, sk);
1451
1452 return 0;
1453}
1454
bdb6d971 1455static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 1456 u16 len)
9fbcbb45 1457{
650f726d 1458 struct mgmt_mode *cp = data;
366a0336 1459 struct pending_cmd *cmd;
2b76f453 1460 struct hci_request req;
1987fdc7 1461 u8 scan;
9fbcbb45
JH
1462 int err;
1463
bdb6d971 1464 BT_DBG("request for %s", hdev->name);
9fbcbb45 1465
1987fdc7
JH
1466 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
1467 !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
33c525c0 1468 return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1987fdc7 1469 MGMT_STATUS_REJECTED);
33c525c0 1470
a7e80f25
JH
1471 if (cp->val != 0x00 && cp->val != 0x01)
1472 return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1473 MGMT_STATUS_INVALID_PARAMS);
1474
09fd0de5 1475 hci_dev_lock(hdev);
9fbcbb45 1476
4b34ee78 1477 if (!hdev_is_powered(hdev)) {
e8ba3a1f 1478 err = set_connectable_update_settings(hdev, sk, cp->val);
9fbcbb45
JH
1479 goto failed;
1480 }
1481
2e58ef3e 1482 if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
8ce8e2b5 1483 mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
bdb6d971 1484 err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
04124681 1485 MGMT_STATUS_BUSY);
9fbcbb45
JH
1486 goto failed;
1487 }
1488
2e58ef3e 1489 cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
366a0336
JH
1490 if (!cmd) {
1491 err = -ENOMEM;
9fbcbb45 1492 goto failed;
366a0336 1493 }
9fbcbb45 1494
9b74246f 1495 hci_req_init(&req, hdev);
9fbcbb45 1496
9a43e25f
JH
1497 /* If BR/EDR is not enabled and we disable advertising as a
1498 * by-product of disabling connectable, we need to update the
1499 * advertising flags.
1500 */
1501 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
1502 if (!cp->val) {
1503 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1504 clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
1505 }
1506 update_adv_data(&req);
1507 } else if (cp->val != test_bit(HCI_PSCAN, &hdev->flags)) {
9b74246f
JH
1508 if (cp->val) {
1509 scan = SCAN_PAGE;
1510 } else {
1511 scan = 0;
1512
1513 if (test_bit(HCI_ISCAN, &hdev->flags) &&
8d6083fe 1514 hdev->discov_timeout > 0)
9b74246f
JH
1515 cancel_delayed_work(&hdev->discov_off);
1516 }
2b76f453 1517
9b74246f
JH
1518 hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
1519 }
2b76f453 1520
4c01f8b8
JH
1521 /* If we're going from non-connectable to connectable or
1522 * vice-versa when fast connectable is enabled ensure that fast
1523 * connectable gets disabled. write_fast_connectable won't do
1524 * anything if the page scan parameters are already what they
1525 * should be.
1526 */
1527 if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
e36a3769
JH
1528 write_fast_connectable(&req, false);
1529
1987fdc7
JH
1530 if (test_bit(HCI_ADVERTISING, &hdev->dev_flags) &&
1531 hci_conn_num(hdev, LE_LINK) == 0) {
1532 disable_advertising(&req);
1533 enable_advertising(&req);
1534 }
1535
2b76f453 1536 err = hci_req_run(&req, set_connectable_complete);
9b74246f 1537 if (err < 0) {
a664b5bc 1538 mgmt_pending_remove(cmd);
9b74246f 1539 if (err == -ENODATA)
a81070ba
JH
1540 err = set_connectable_update_settings(hdev, sk,
1541 cp->val);
9b74246f
JH
1542 goto failed;
1543 }
9fbcbb45
JH
1544
1545failed:
09fd0de5 1546 hci_dev_unlock(hdev);
9fbcbb45
JH
1547 return err;
1548}
1549
bdb6d971 1550static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 1551 u16 len)
c542a06c 1552{
650f726d 1553 struct mgmt_mode *cp = data;
55594356 1554 bool changed;
c542a06c
JH
1555 int err;
1556
bdb6d971 1557 BT_DBG("request for %s", hdev->name);
c542a06c 1558
a7e80f25
JH
1559 if (cp->val != 0x00 && cp->val != 0x01)
1560 return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
1561 MGMT_STATUS_INVALID_PARAMS);
1562
09fd0de5 1563 hci_dev_lock(hdev);
c542a06c
JH
1564
1565 if (cp->val)
55594356 1566 changed = !test_and_set_bit(HCI_PAIRABLE, &hdev->dev_flags);
c542a06c 1567 else
55594356 1568 changed = test_and_clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
c542a06c 1569
69ab39ea 1570 err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
c542a06c 1571 if (err < 0)
55594356 1572 goto unlock;
c542a06c 1573
55594356
MH
1574 if (changed)
1575 err = new_settings(hdev, sk);
c542a06c 1576
55594356 1577unlock:
09fd0de5 1578 hci_dev_unlock(hdev);
c542a06c
JH
1579 return err;
1580}
1581
04124681
GP
1582static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
1583 u16 len)
33ef95ed
JH
1584{
1585 struct mgmt_mode *cp = data;
1586 struct pending_cmd *cmd;
e6fe7986 1587 u8 val, status;
33ef95ed
JH
1588 int err;
1589
bdb6d971 1590 BT_DBG("request for %s", hdev->name);
33ef95ed 1591
e6fe7986
JH
1592 status = mgmt_bredr_support(hdev);
1593 if (status)
33c525c0 1594 return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
e6fe7986 1595 status);
33c525c0 1596
a7e80f25
JH
1597 if (cp->val != 0x00 && cp->val != 0x01)
1598 return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1599 MGMT_STATUS_INVALID_PARAMS);
1600
33ef95ed
JH
1601 hci_dev_lock(hdev);
1602
4b34ee78 1603 if (!hdev_is_powered(hdev)) {
47990ea0
JH
1604 bool changed = false;
1605
1606 if (!!cp->val != test_bit(HCI_LINK_SECURITY,
8ce8e2b5 1607 &hdev->dev_flags)) {
47990ea0
JH
1608 change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
1609 changed = true;
1610 }
1611
1612 err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
1613 if (err < 0)
1614 goto failed;
1615
1616 if (changed)
1617 err = new_settings(hdev, sk);
1618
33ef95ed
JH
1619 goto failed;
1620 }
1621
1622 if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
bdb6d971 1623 err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
04124681 1624 MGMT_STATUS_BUSY);
33ef95ed
JH
1625 goto failed;
1626 }
1627
1628 val = !!cp->val;
1629
1630 if (test_bit(HCI_AUTH, &hdev->flags) == val) {
1631 err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
1632 goto failed;
1633 }
1634
1635 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
1636 if (!cmd) {
1637 err = -ENOMEM;
1638 goto failed;
1639 }
1640
1641 err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
1642 if (err < 0) {
1643 mgmt_pending_remove(cmd);
1644 goto failed;
1645 }
1646
1647failed:
1648 hci_dev_unlock(hdev);
33ef95ed
JH
1649 return err;
1650}
1651
bdb6d971 1652static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
ed2c4ee3
JH
1653{
1654 struct mgmt_mode *cp = data;
1655 struct pending_cmd *cmd;
72ef0c1a 1656 u8 status;
ed2c4ee3
JH
1657 int err;
1658
bdb6d971 1659 BT_DBG("request for %s", hdev->name);
ed2c4ee3 1660
cdba5281
MH
1661 status = mgmt_bredr_support(hdev);
1662 if (status)
1663 return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);
1664
13ecd8b6
JH
1665 if (!lmp_ssp_capable(hdev))
1666 return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1667 MGMT_STATUS_NOT_SUPPORTED);
ed2c4ee3 1668
a7e80f25
JH
1669 if (cp->val != 0x00 && cp->val != 0x01)
1670 return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1671 MGMT_STATUS_INVALID_PARAMS);
1672
13ecd8b6 1673 hci_dev_lock(hdev);
6c8f12c1 1674
4b34ee78 1675 if (!hdev_is_powered(hdev)) {
9ecb3e24 1676 bool changed;
c0ecddc2 1677
9ecb3e24
MH
1678 if (cp->val) {
1679 changed = !test_and_set_bit(HCI_SSP_ENABLED,
1680 &hdev->dev_flags);
1681 } else {
1682 changed = test_and_clear_bit(HCI_SSP_ENABLED,
1683 &hdev->dev_flags);
1684 if (!changed)
1685 changed = test_and_clear_bit(HCI_HS_ENABLED,
1686 &hdev->dev_flags);
1687 else
1688 clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
c0ecddc2
JH
1689 }
1690
1691 err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
1692 if (err < 0)
1693 goto failed;
1694
1695 if (changed)
1696 err = new_settings(hdev, sk);
1697
ed2c4ee3
JH
1698 goto failed;
1699 }
1700
9ecb3e24
MH
1701 if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev) ||
1702 mgmt_pending_find(MGMT_OP_SET_HS, hdev)) {
d97dcb66
SJ
1703 err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1704 MGMT_STATUS_BUSY);
ed2c4ee3
JH
1705 goto failed;
1706 }
1707
72ef0c1a 1708 if (!!cp->val == test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
ed2c4ee3
JH
1709 err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
1710 goto failed;
1711 }
1712
1713 cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
1714 if (!cmd) {
1715 err = -ENOMEM;
1716 goto failed;
1717 }
1718
72ef0c1a 1719 err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val);
ed2c4ee3
JH
1720 if (err < 0) {
1721 mgmt_pending_remove(cmd);
1722 goto failed;
1723 }
1724
1725failed:
1726 hci_dev_unlock(hdev);
ed2c4ee3
JH
1727 return err;
1728}
1729
bdb6d971 1730static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
6d80dfd0
JH
1731{
1732 struct mgmt_mode *cp = data;
ee392693 1733 bool changed;
e6fe7986 1734 u8 status;
ee392693 1735 int err;
6d80dfd0 1736
bdb6d971 1737 BT_DBG("request for %s", hdev->name);
6d80dfd0 1738
e6fe7986
JH
1739 status = mgmt_bredr_support(hdev);
1740 if (status)
1741 return cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
6d80dfd0 1742
9ecb3e24
MH
1743 if (!lmp_ssp_capable(hdev))
1744 return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1745 MGMT_STATUS_NOT_SUPPORTED);
1746
1747 if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
1748 return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1749 MGMT_STATUS_REJECTED);
1750
a7e80f25
JH
1751 if (cp->val != 0x00 && cp->val != 0x01)
1752 return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1753 MGMT_STATUS_INVALID_PARAMS);
1754
ee392693
MH
1755 hci_dev_lock(hdev);
1756
a0cdf960 1757 if (cp->val) {
ee392693 1758 changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
a0cdf960
MH
1759 } else {
1760 if (hdev_is_powered(hdev)) {
1761 err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1762 MGMT_STATUS_REJECTED);
1763 goto unlock;
1764 }
1765
ee392693 1766 changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
a0cdf960 1767 }
ee392693
MH
1768
1769 err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1770 if (err < 0)
1771 goto unlock;
1772
1773 if (changed)
1774 err = new_settings(hdev, sk);
6d80dfd0 1775
ee392693
MH
1776unlock:
1777 hci_dev_unlock(hdev);
1778 return err;
6d80dfd0
JH
1779}
1780
416a4ae5
JH
1781static void le_enable_complete(struct hci_dev *hdev, u8 status)
1782{
1783 struct cmd_lookup match = { NULL, hdev };
1784
1785 if (status) {
1786 u8 mgmt_err = mgmt_status(status);
1787
1788 mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
1789 &mgmt_err);
1790 return;
1791 }
1792
1793 mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);
1794
1795 new_settings(hdev, match.sk);
1796
1797 if (match.sk)
1798 sock_put(match.sk);
441ad2d0
MH
1799
1800 /* Make sure the controller has a good default for
1801 * advertising data. Restrict the update to when LE
1802 * has actually been enabled. During power on, the
1803 * update in powered_update_hci will take care of it.
1804 */
1805 if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
1806 struct hci_request req;
1807
1808 hci_dev_lock(hdev);
1809
1810 hci_req_init(&req, hdev);
5947f4bc 1811 update_adv_data(&req);
f14d8f64 1812 update_scan_rsp_data(&req);
441ad2d0
MH
1813 hci_req_run(&req, NULL);
1814
1815 hci_dev_unlock(hdev);
1816 }
416a4ae5
JH
1817}
1818
bdb6d971 1819static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
06199cf8
JH
1820{
1821 struct mgmt_mode *cp = data;
1822 struct hci_cp_write_le_host_supported hci_cp;
1823 struct pending_cmd *cmd;
416a4ae5 1824 struct hci_request req;
06199cf8 1825 int err;
0b60eba1 1826 u8 val, enabled;
06199cf8 1827
bdb6d971 1828 BT_DBG("request for %s", hdev->name);
06199cf8 1829
13ecd8b6
JH
1830 if (!lmp_le_capable(hdev))
1831 return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1832 MGMT_STATUS_NOT_SUPPORTED);
1de028ce 1833
a7e80f25
JH
1834 if (cp->val != 0x00 && cp->val != 0x01)
1835 return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1836 MGMT_STATUS_INVALID_PARAMS);
1837
c73eee91 1838 /* LE-only devices do not allow toggling LE on/off */
56f87901 1839 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
c73eee91
JH
1840 return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1841 MGMT_STATUS_REJECTED);
1842
13ecd8b6 1843 hci_dev_lock(hdev);
06199cf8
JH
1844
1845 val = !!cp->val;
ffa88e02 1846 enabled = lmp_host_le_capable(hdev);
06199cf8 1847
0b60eba1 1848 if (!hdev_is_powered(hdev) || val == enabled) {
06199cf8
JH
1849 bool changed = false;
1850
1851 if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
1852 change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
1853 changed = true;
1854 }
1855
f3d3444a
JH
1856 if (!val && test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
1857 clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
eeca6f89
JH
1858 changed = true;
1859 }
1860
06199cf8
JH
1861 err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
1862 if (err < 0)
1de028ce 1863 goto unlock;
06199cf8
JH
1864
1865 if (changed)
1866 err = new_settings(hdev, sk);
1867
1de028ce 1868 goto unlock;
06199cf8
JH
1869 }
1870
4375f103
JH
1871 if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
1872 mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
bdb6d971 1873 err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
04124681 1874 MGMT_STATUS_BUSY);
1de028ce 1875 goto unlock;
06199cf8
JH
1876 }
1877
1878 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
1879 if (!cmd) {
1880 err = -ENOMEM;
1de028ce 1881 goto unlock;
06199cf8
JH
1882 }
1883
441ad2d0
MH
1884 hci_req_init(&req, hdev);
1885
06199cf8
JH
1886 memset(&hci_cp, 0, sizeof(hci_cp));
1887
1888 if (val) {
1889 hci_cp.le = val;
ffa88e02 1890 hci_cp.simul = lmp_le_br_capable(hdev);
441ad2d0
MH
1891 } else {
1892 if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
1893 disable_advertising(&req);
06199cf8
JH
1894 }
1895
416a4ae5
JH
1896 hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
1897 &hci_cp);
1898
1899 err = hci_req_run(&req, le_enable_complete);
0c01bc48 1900 if (err < 0)
06199cf8 1901 mgmt_pending_remove(cmd);
06199cf8 1902
1de028ce
JH
1903unlock:
1904 hci_dev_unlock(hdev);
06199cf8
JH
1905 return err;
1906}
1907
0cab9c80
JH
1908/* This is a helper function to test for pending mgmt commands that can
1909 * cause CoD or EIR HCI commands. We can only allow one such pending
1910 * mgmt command at a time since otherwise we cannot easily track what
1911 * the current values are, will be, and based on that calculate if a new
1912 * HCI command needs to be sent and if yes with what value.
1913 */
1914static bool pending_eir_or_class(struct hci_dev *hdev)
1915{
1916 struct pending_cmd *cmd;
1917
1918 list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1919 switch (cmd->opcode) {
1920 case MGMT_OP_ADD_UUID:
1921 case MGMT_OP_REMOVE_UUID:
1922 case MGMT_OP_SET_DEV_CLASS:
1923 case MGMT_OP_SET_POWERED:
1924 return true;
1925 }
1926 }
1927
1928 return false;
1929}
1930
83be8eca
JH
1931static const u8 bluetooth_base_uuid[] = {
1932 0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
1933 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
1934};
1935
1936static u8 get_uuid_size(const u8 *uuid)
1937{
1938 u32 val;
1939
1940 if (memcmp(uuid, bluetooth_base_uuid, 12))
1941 return 128;
1942
1943 val = get_unaligned_le32(&uuid[12]);
1944 if (val > 0xffff)
1945 return 32;
1946
1947 return 16;
1948}
1949
92da6097
JH
1950static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
1951{
1952 struct pending_cmd *cmd;
1953
1954 hci_dev_lock(hdev);
1955
1956 cmd = mgmt_pending_find(mgmt_op, hdev);
1957 if (!cmd)
1958 goto unlock;
1959
1960 cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
1961 hdev->dev_class, 3);
1962
1963 mgmt_pending_remove(cmd);
1964
1965unlock:
1966 hci_dev_unlock(hdev);
1967}
1968
1969static void add_uuid_complete(struct hci_dev *hdev, u8 status)
1970{
1971 BT_DBG("status 0x%02x", status);
1972
1973 mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
1974}
1975
bdb6d971 1976static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
2aeb9a1a 1977{
650f726d 1978 struct mgmt_cp_add_uuid *cp = data;
90e70454 1979 struct pending_cmd *cmd;
890ea898 1980 struct hci_request req;
2aeb9a1a 1981 struct bt_uuid *uuid;
2aeb9a1a
JH
1982 int err;
1983
bdb6d971 1984 BT_DBG("request for %s", hdev->name);
2aeb9a1a 1985
09fd0de5 1986 hci_dev_lock(hdev);
2aeb9a1a 1987
0cab9c80 1988 if (pending_eir_or_class(hdev)) {
bdb6d971 1989 err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
04124681 1990 MGMT_STATUS_BUSY);
c95f0ba7
JH
1991 goto failed;
1992 }
1993
92c4c204 1994 uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
2aeb9a1a
JH
1995 if (!uuid) {
1996 err = -ENOMEM;
1997 goto failed;
1998 }
1999
2000 memcpy(uuid->uuid, cp->uuid, 16);
1aff6f09 2001 uuid->svc_hint = cp->svc_hint;
83be8eca 2002 uuid->size = get_uuid_size(cp->uuid);
2aeb9a1a 2003
de66aa63 2004 list_add_tail(&uuid->list, &hdev->uuids);
2aeb9a1a 2005
890ea898 2006 hci_req_init(&req, hdev);
1aff6f09 2007
890ea898
JH
2008 update_class(&req);
2009 update_eir(&req);
2010
92da6097
JH
2011 err = hci_req_run(&req, add_uuid_complete);
2012 if (err < 0) {
2013 if (err != -ENODATA)
2014 goto failed;
80a1e1db 2015
bdb6d971 2016 err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
04124681 2017 hdev->dev_class, 3);
90e70454
JH
2018 goto failed;
2019 }
2020
2021 cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
890ea898 2022 if (!cmd) {
90e70454 2023 err = -ENOMEM;
890ea898
JH
2024 goto failed;
2025 }
2026
2027 err = 0;
2aeb9a1a
JH
2028
2029failed:
09fd0de5 2030 hci_dev_unlock(hdev);
2aeb9a1a
JH
2031 return err;
2032}
2033
24b78d0f
JH
2034static bool enable_service_cache(struct hci_dev *hdev)
2035{
2036 if (!hdev_is_powered(hdev))
2037 return false;
2038
2039 if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
46818ed5
JH
2040 queue_delayed_work(hdev->workqueue, &hdev->service_cache,
2041 CACHE_TIMEOUT);
24b78d0f
JH
2042 return true;
2043 }
2044
2045 return false;
2046}
2047
92da6097
JH
2048static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
2049{
2050 BT_DBG("status 0x%02x", status);
2051
2052 mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
2053}
2054
bdb6d971 2055static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
8ce8e2b5 2056 u16 len)
2aeb9a1a 2057{
650f726d 2058 struct mgmt_cp_remove_uuid *cp = data;
90e70454 2059 struct pending_cmd *cmd;
056341c8 2060 struct bt_uuid *match, *tmp;
2aeb9a1a 2061 u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
890ea898 2062 struct hci_request req;
2aeb9a1a
JH
2063 int err, found;
2064
bdb6d971 2065 BT_DBG("request for %s", hdev->name);
2aeb9a1a 2066
09fd0de5 2067 hci_dev_lock(hdev);
2aeb9a1a 2068
0cab9c80 2069 if (pending_eir_or_class(hdev)) {
bdb6d971 2070 err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
04124681 2071 MGMT_STATUS_BUSY);
c95f0ba7
JH
2072 goto unlock;
2073 }
2074
2aeb9a1a 2075 if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
35f7498a 2076 hci_uuids_clear(hdev);
4004b6d9 2077
24b78d0f 2078 if (enable_service_cache(hdev)) {
bdb6d971 2079 err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
04124681 2080 0, hdev->dev_class, 3);
24b78d0f
JH
2081 goto unlock;
2082 }
4004b6d9 2083
9246a869 2084 goto update_class;
2aeb9a1a
JH
2085 }
2086
2087 found = 0;
2088
056341c8 2089 list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
2aeb9a1a
JH
2090 if (memcmp(match->uuid, cp->uuid, 16) != 0)
2091 continue;
2092
2093 list_del(&match->list);
482049f7 2094 kfree(match);
2aeb9a1a
JH
2095 found++;
2096 }
2097
2098 if (found == 0) {
bdb6d971 2099 err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
04124681 2100 MGMT_STATUS_INVALID_PARAMS);
2aeb9a1a
JH
2101 goto unlock;
2102 }
2103
9246a869 2104update_class:
890ea898 2105 hci_req_init(&req, hdev);
1aff6f09 2106
890ea898
JH
2107 update_class(&req);
2108 update_eir(&req);
2109
92da6097
JH
2110 err = hci_req_run(&req, remove_uuid_complete);
2111 if (err < 0) {
2112 if (err != -ENODATA)
2113 goto unlock;
80a1e1db 2114
bdb6d971 2115 err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
04124681 2116 hdev->dev_class, 3);
90e70454
JH
2117 goto unlock;
2118 }
2119
2120 cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
890ea898 2121 if (!cmd) {
90e70454 2122 err = -ENOMEM;
890ea898
JH
2123 goto unlock;
2124 }
2125
2126 err = 0;
2aeb9a1a
JH
2127
2128unlock:
09fd0de5 2129 hci_dev_unlock(hdev);
2aeb9a1a
JH
2130 return err;
2131}
2132
92da6097
JH
2133static void set_class_complete(struct hci_dev *hdev, u8 status)
2134{
2135 BT_DBG("status 0x%02x", status);
2136
2137 mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
2138}
2139
bdb6d971 2140static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2141 u16 len)
1aff6f09 2142{
650f726d 2143 struct mgmt_cp_set_dev_class *cp = data;
90e70454 2144 struct pending_cmd *cmd;
890ea898 2145 struct hci_request req;
1aff6f09
JH
2146 int err;
2147
bdb6d971 2148 BT_DBG("request for %s", hdev->name);
1aff6f09 2149
6203fc98 2150 if (!lmp_bredr_capable(hdev))
13ecd8b6
JH
2151 return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
2152 MGMT_STATUS_NOT_SUPPORTED);
1aff6f09 2153
0cab9c80 2154 hci_dev_lock(hdev);
ee98f473 2155
0cab9c80
JH
2156 if (pending_eir_or_class(hdev)) {
2157 err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
2158 MGMT_STATUS_BUSY);
2159 goto unlock;
2160 }
c95f0ba7 2161
0cab9c80
JH
2162 if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
2163 err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
2164 MGMT_STATUS_INVALID_PARAMS);
2165 goto unlock;
2166 }
575b3a02 2167
932f5ff5
JH
2168 hdev->major_class = cp->major;
2169 hdev->minor_class = cp->minor;
2170
b5235a65 2171 if (!hdev_is_powered(hdev)) {
bdb6d971 2172 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
04124681 2173 hdev->dev_class, 3);
b5235a65
JH
2174 goto unlock;
2175 }
2176
890ea898
JH
2177 hci_req_init(&req, hdev);
2178
a8b2d5c2 2179 if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
7d78525d
JH
2180 hci_dev_unlock(hdev);
2181 cancel_delayed_work_sync(&hdev->service_cache);
2182 hci_dev_lock(hdev);
890ea898 2183 update_eir(&req);
7d78525d 2184 }
14c0b608 2185
890ea898
JH
2186 update_class(&req);
2187
92da6097
JH
2188 err = hci_req_run(&req, set_class_complete);
2189 if (err < 0) {
2190 if (err != -ENODATA)
2191 goto unlock;
1aff6f09 2192
bdb6d971 2193 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
04124681 2194 hdev->dev_class, 3);
90e70454
JH
2195 goto unlock;
2196 }
2197
2198 cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
890ea898 2199 if (!cmd) {
90e70454 2200 err = -ENOMEM;
890ea898
JH
2201 goto unlock;
2202 }
2203
2204 err = 0;
1aff6f09 2205
b5235a65 2206unlock:
09fd0de5 2207 hci_dev_unlock(hdev);
1aff6f09
JH
2208 return err;
2209}
2210
bdb6d971 2211static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
8ce8e2b5 2212 u16 len)
55ed8ca1 2213{
650f726d 2214 struct mgmt_cp_load_link_keys *cp = data;
4e51eae9 2215 u16 key_count, expected_len;
b1de97d8 2216 bool changed;
a492cd52 2217 int i;
55ed8ca1 2218
9060d5cf
MH
2219 BT_DBG("request for %s", hdev->name);
2220
2221 if (!lmp_bredr_capable(hdev))
2222 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
2223 MGMT_STATUS_NOT_SUPPORTED);
2224
1f350c87 2225 key_count = __le16_to_cpu(cp->key_count);
55ed8ca1 2226
86742e1e
JH
2227 expected_len = sizeof(*cp) + key_count *
2228 sizeof(struct mgmt_link_key_info);
a492cd52 2229 if (expected_len != len) {
86742e1e 2230 BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
8ce8e2b5 2231 len, expected_len);
bdb6d971 2232 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
04124681 2233 MGMT_STATUS_INVALID_PARAMS);
55ed8ca1
JH
2234 }
2235
4ae14301
JH
2236 if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
2237 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
2238 MGMT_STATUS_INVALID_PARAMS);
2239
bdb6d971 2240 BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
8ce8e2b5 2241 key_count);
55ed8ca1 2242
4ee71b20
JH
2243 for (i = 0; i < key_count; i++) {
2244 struct mgmt_link_key_info *key = &cp->keys[i];
2245
8e991132 2246 if (key->addr.type != BDADDR_BREDR || key->type > 0x08)
4ee71b20
JH
2247 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
2248 MGMT_STATUS_INVALID_PARAMS);
2249 }
2250
09fd0de5 2251 hci_dev_lock(hdev);
55ed8ca1
JH
2252
2253 hci_link_keys_clear(hdev);
2254
55ed8ca1 2255 if (cp->debug_keys)
b1de97d8 2256 changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
55ed8ca1 2257 else
b1de97d8
MH
2258 changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
2259
2260 if (changed)
2261 new_settings(hdev, NULL);
55ed8ca1 2262
a492cd52 2263 for (i = 0; i < key_count; i++) {
86742e1e 2264 struct mgmt_link_key_info *key = &cp->keys[i];
55ed8ca1 2265
d753fdc4 2266 hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
04124681 2267 key->type, key->pin_len);
55ed8ca1
JH
2268 }
2269
bdb6d971 2270 cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
0e5f875a 2271
09fd0de5 2272 hci_dev_unlock(hdev);
55ed8ca1 2273
a492cd52 2274 return 0;
55ed8ca1
JH
2275}
2276
b1078ad0 2277static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681 2278 u8 addr_type, struct sock *skip_sk)
b1078ad0
JH
2279{
2280 struct mgmt_ev_device_unpaired ev;
2281
2282 bacpy(&ev.addr.bdaddr, bdaddr);
2283 ev.addr.type = addr_type;
2284
2285 return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
04124681 2286 skip_sk);
b1078ad0
JH
2287}
2288
bdb6d971 2289static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2290 u16 len)
55ed8ca1 2291{
124f6e35
JH
2292 struct mgmt_cp_unpair_device *cp = data;
2293 struct mgmt_rp_unpair_device rp;
a8a1d19e
JH
2294 struct hci_cp_disconnect dc;
2295 struct pending_cmd *cmd;
55ed8ca1 2296 struct hci_conn *conn;
55ed8ca1
JH
2297 int err;
2298
a8a1d19e 2299 memset(&rp, 0, sizeof(rp));
124f6e35
JH
2300 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
2301 rp.addr.type = cp->addr.type;
a8a1d19e 2302
4ee71b20
JH
2303 if (!bdaddr_type_is_valid(cp->addr.type))
2304 return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2305 MGMT_STATUS_INVALID_PARAMS,
2306 &rp, sizeof(rp));
2307
118da70b
JH
2308 if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
2309 return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2310 MGMT_STATUS_INVALID_PARAMS,
2311 &rp, sizeof(rp));
2312
4ee71b20
JH
2313 hci_dev_lock(hdev);
2314
86a8cfc6 2315 if (!hdev_is_powered(hdev)) {
bdb6d971 2316 err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
04124681 2317 MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
86a8cfc6
JH
2318 goto unlock;
2319 }
2320
e0b2b27e 2321 if (cp->addr.type == BDADDR_BREDR) {
124f6e35 2322 err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
e0b2b27e
JH
2323 } else {
2324 u8 addr_type;
2325
2326 if (cp->addr.type == BDADDR_LE_PUBLIC)
2327 addr_type = ADDR_LE_DEV_PUBLIC;
2328 else
2329 addr_type = ADDR_LE_DEV_RANDOM;
2330
a7ec7338
JH
2331 hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type);
2332
e0b2b27e
JH
2333 err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type);
2334 }
b0dbfb46 2335
55ed8ca1 2336 if (err < 0) {
bdb6d971 2337 err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
04124681 2338 MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
55ed8ca1
JH
2339 goto unlock;
2340 }
2341
86a8cfc6 2342 if (cp->disconnect) {
591f47f3 2343 if (cp->addr.type == BDADDR_BREDR)
86a8cfc6 2344 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
8ce8e2b5 2345 &cp->addr.bdaddr);
86a8cfc6
JH
2346 else
2347 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
8ce8e2b5 2348 &cp->addr.bdaddr);
86a8cfc6
JH
2349 } else {
2350 conn = NULL;
2351 }
124f6e35 2352
a8a1d19e 2353 if (!conn) {
bdb6d971 2354 err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
04124681 2355 &rp, sizeof(rp));
b1078ad0 2356 device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
a8a1d19e
JH
2357 goto unlock;
2358 }
55ed8ca1 2359
124f6e35 2360 cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
04124681 2361 sizeof(*cp));
a8a1d19e
JH
2362 if (!cmd) {
2363 err = -ENOMEM;
2364 goto unlock;
55ed8ca1
JH
2365 }
2366
eb55ef07 2367 dc.handle = cpu_to_le16(conn->handle);
a8a1d19e
JH
2368 dc.reason = 0x13; /* Remote User Terminated Connection */
2369 err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
2370 if (err < 0)
2371 mgmt_pending_remove(cmd);
2372
55ed8ca1 2373unlock:
09fd0de5 2374 hci_dev_unlock(hdev);
55ed8ca1
JH
2375 return err;
2376}
2377
bdb6d971 2378static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2379 u16 len)
8962ee74 2380{
650f726d 2381 struct mgmt_cp_disconnect *cp = data;
06a63b19 2382 struct mgmt_rp_disconnect rp;
8962ee74 2383 struct hci_cp_disconnect dc;
366a0336 2384 struct pending_cmd *cmd;
8962ee74 2385 struct hci_conn *conn;
8962ee74
JH
2386 int err;
2387
2388 BT_DBG("");
2389
06a63b19
JH
2390 memset(&rp, 0, sizeof(rp));
2391 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
2392 rp.addr.type = cp->addr.type;
2393
4ee71b20 2394 if (!bdaddr_type_is_valid(cp->addr.type))
06a63b19
JH
2395 return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
2396 MGMT_STATUS_INVALID_PARAMS,
2397 &rp, sizeof(rp));
4ee71b20 2398
09fd0de5 2399 hci_dev_lock(hdev);
8962ee74
JH
2400
2401 if (!test_bit(HCI_UP, &hdev->flags)) {
06a63b19
JH
2402 err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
2403 MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
8962ee74
JH
2404 goto failed;
2405 }
2406
2e58ef3e 2407 if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
06a63b19
JH
2408 err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
2409 MGMT_STATUS_BUSY, &rp, sizeof(rp));
8962ee74
JH
2410 goto failed;
2411 }
2412
591f47f3 2413 if (cp->addr.type == BDADDR_BREDR)
8fc9ced3
GP
2414 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
2415 &cp->addr.bdaddr);
88c3df13
JH
2416 else
2417 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
365227e5 2418
f960727e 2419 if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
06a63b19
JH
2420 err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
2421 MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
8962ee74
JH
2422 goto failed;
2423 }
2424
2e58ef3e 2425 cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
366a0336
JH
2426 if (!cmd) {
2427 err = -ENOMEM;
8962ee74 2428 goto failed;
366a0336 2429 }
8962ee74 2430
eb55ef07 2431 dc.handle = cpu_to_le16(conn->handle);
3701f944 2432 dc.reason = HCI_ERROR_REMOTE_USER_TERM;
8962ee74
JH
2433
2434 err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
2435 if (err < 0)
a664b5bc 2436 mgmt_pending_remove(cmd);
8962ee74
JH
2437
2438failed:
09fd0de5 2439 hci_dev_unlock(hdev);
8962ee74
JH
2440 return err;
2441}
2442
57c1477c 2443static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
4c659c39
JH
2444{
2445 switch (link_type) {
2446 case LE_LINK:
48264f06
JH
2447 switch (addr_type) {
2448 case ADDR_LE_DEV_PUBLIC:
591f47f3 2449 return BDADDR_LE_PUBLIC;
0ed09148 2450
48264f06 2451 default:
0ed09148 2452 /* Fallback to LE Random address type */
591f47f3 2453 return BDADDR_LE_RANDOM;
48264f06 2454 }
0ed09148 2455
4c659c39 2456 default:
0ed09148 2457 /* Fallback to BR/EDR type */
591f47f3 2458 return BDADDR_BREDR;
4c659c39
JH
2459 }
2460}
2461
04124681
GP
2462static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
2463 u16 data_len)
2784eb41 2464{
2784eb41 2465 struct mgmt_rp_get_connections *rp;
8035ded4 2466 struct hci_conn *c;
a38528f1 2467 size_t rp_len;
60fc5fb6
JH
2468 int err;
2469 u16 i;
2784eb41
JH
2470
2471 BT_DBG("");
2472
09fd0de5 2473 hci_dev_lock(hdev);
2784eb41 2474
5f97c1df 2475 if (!hdev_is_powered(hdev)) {
bdb6d971 2476 err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
04124681 2477 MGMT_STATUS_NOT_POWERED);
5f97c1df
JH
2478 goto unlock;
2479 }
2480
60fc5fb6 2481 i = 0;
b644ba33
JH
2482 list_for_each_entry(c, &hdev->conn_hash.list, list) {
2483 if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
60fc5fb6 2484 i++;
2784eb41
JH
2485 }
2486
60fc5fb6 2487 rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
92c4c204 2488 rp = kmalloc(rp_len, GFP_KERNEL);
a38528f1 2489 if (!rp) {
2784eb41
JH
2490 err = -ENOMEM;
2491 goto unlock;
2492 }
2493
2784eb41 2494 i = 0;
4c659c39 2495 list_for_each_entry(c, &hdev->conn_hash.list, list) {
b644ba33
JH
2496 if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2497 continue;
4c659c39 2498 bacpy(&rp->addr[i].bdaddr, &c->dst);
57c1477c 2499 rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
0ed09148 2500 if (c->type == SCO_LINK || c->type == ESCO_LINK)
4c659c39
JH
2501 continue;
2502 i++;
2503 }
2504
eb55ef07 2505 rp->conn_count = cpu_to_le16(i);
60fc5fb6 2506
4c659c39
JH
2507 /* Recalculate length in case of filtered SCO connections, etc */
2508 rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2784eb41 2509
bdb6d971 2510 err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
04124681 2511 rp_len);
2784eb41 2512
a38528f1 2513 kfree(rp);
5f97c1df
JH
2514
2515unlock:
09fd0de5 2516 hci_dev_unlock(hdev);
2784eb41
JH
2517 return err;
2518}
2519
bdb6d971 2520static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
04124681 2521 struct mgmt_cp_pin_code_neg_reply *cp)
96d97a67
WR
2522{
2523 struct pending_cmd *cmd;
2524 int err;
2525
2e58ef3e 2526 cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
04124681 2527 sizeof(*cp));
96d97a67
WR
2528 if (!cmd)
2529 return -ENOMEM;
2530
d8457698 2531 err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
04124681 2532 sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
96d97a67
WR
2533 if (err < 0)
2534 mgmt_pending_remove(cmd);
2535
2536 return err;
2537}
2538
bdb6d971 2539static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2540 u16 len)
980e1a53 2541{
96d97a67 2542 struct hci_conn *conn;
650f726d 2543 struct mgmt_cp_pin_code_reply *cp = data;
980e1a53 2544 struct hci_cp_pin_code_reply reply;
366a0336 2545 struct pending_cmd *cmd;
980e1a53
JH
2546 int err;
2547
2548 BT_DBG("");
2549
09fd0de5 2550 hci_dev_lock(hdev);
980e1a53 2551
4b34ee78 2552 if (!hdev_is_powered(hdev)) {
bdb6d971 2553 err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
04124681 2554 MGMT_STATUS_NOT_POWERED);
980e1a53
JH
2555 goto failed;
2556 }
2557
d8457698 2558 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
96d97a67 2559 if (!conn) {
bdb6d971 2560 err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
04124681 2561 MGMT_STATUS_NOT_CONNECTED);
96d97a67
WR
2562 goto failed;
2563 }
2564
2565 if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
d8457698
JH
2566 struct mgmt_cp_pin_code_neg_reply ncp;
2567
2568 memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
96d97a67
WR
2569
2570 BT_ERR("PIN code is not 16 bytes long");
2571
bdb6d971 2572 err = send_pin_code_neg_reply(sk, hdev, &ncp);
96d97a67 2573 if (err >= 0)
bdb6d971 2574 err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
04124681 2575 MGMT_STATUS_INVALID_PARAMS);
96d97a67
WR
2576
2577 goto failed;
2578 }
2579
00abfe44 2580 cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
366a0336
JH
2581 if (!cmd) {
2582 err = -ENOMEM;
980e1a53 2583 goto failed;
366a0336 2584 }
980e1a53 2585
d8457698 2586 bacpy(&reply.bdaddr, &cp->addr.bdaddr);
980e1a53 2587 reply.pin_len = cp->pin_len;
24718ca5 2588 memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
980e1a53
JH
2589
2590 err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
2591 if (err < 0)
a664b5bc 2592 mgmt_pending_remove(cmd);
980e1a53
JH
2593
2594failed:
09fd0de5 2595 hci_dev_unlock(hdev);
980e1a53
JH
2596 return err;
2597}
2598
04124681
GP
2599static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
2600 u16 len)
17fa4b9d 2601{
650f726d 2602 struct mgmt_cp_set_io_capability *cp = data;
17fa4b9d
JH
2603
2604 BT_DBG("");
2605
09fd0de5 2606 hci_dev_lock(hdev);
17fa4b9d
JH
2607
2608 hdev->io_capability = cp->io_capability;
2609
2610 BT_DBG("%s IO capability set to 0x%02x", hdev->name,
8ce8e2b5 2611 hdev->io_capability);
17fa4b9d 2612
09fd0de5 2613 hci_dev_unlock(hdev);
17fa4b9d 2614
04124681
GP
2615 return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
2616 0);
17fa4b9d
JH
2617}
2618
6039aa73 2619static struct pending_cmd *find_pairing(struct hci_conn *conn)
e9a416b5
JH
2620{
2621 struct hci_dev *hdev = conn->hdev;
8035ded4 2622 struct pending_cmd *cmd;
e9a416b5 2623
2e58ef3e 2624 list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
e9a416b5
JH
2625 if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
2626 continue;
2627
e9a416b5
JH
2628 if (cmd->user_data != conn)
2629 continue;
2630
2631 return cmd;
2632 }
2633
2634 return NULL;
2635}
2636
2637static void pairing_complete(struct pending_cmd *cmd, u8 status)
2638{
2639 struct mgmt_rp_pair_device rp;
2640 struct hci_conn *conn = cmd->user_data;
2641
ba4e564f 2642 bacpy(&rp.addr.bdaddr, &conn->dst);
57c1477c 2643 rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
e9a416b5 2644
aee9b218 2645 cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
04124681 2646 &rp, sizeof(rp));
e9a416b5
JH
2647
2648 /* So we don't get further callbacks for this connection */
2649 conn->connect_cfm_cb = NULL;
2650 conn->security_cfm_cb = NULL;
2651 conn->disconn_cfm_cb = NULL;
2652
76a68ba0 2653 hci_conn_drop(conn);
e9a416b5 2654
a664b5bc 2655 mgmt_pending_remove(cmd);
e9a416b5
JH
2656}
2657
2658static void pairing_complete_cb(struct hci_conn *conn, u8 status)
2659{
2660 struct pending_cmd *cmd;
2661
2662 BT_DBG("status %u", status);
2663
2664 cmd = find_pairing(conn);
56e5cb86 2665 if (!cmd)
e9a416b5 2666 BT_DBG("Unable to find a pending command");
56e5cb86 2667 else
e211326c 2668 pairing_complete(cmd, mgmt_status(status));
e9a416b5
JH
2669}
2670
4c47d739
VA
2671static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
2672{
2673 struct pending_cmd *cmd;
2674
2675 BT_DBG("status %u", status);
2676
2677 if (!status)
2678 return;
2679
2680 cmd = find_pairing(conn);
2681 if (!cmd)
2682 BT_DBG("Unable to find a pending command");
2683 else
2684 pairing_complete(cmd, mgmt_status(status));
2685}
2686
bdb6d971 2687static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2688 u16 len)
e9a416b5 2689{
650f726d 2690 struct mgmt_cp_pair_device *cp = data;
1425acb7 2691 struct mgmt_rp_pair_device rp;
e9a416b5
JH
2692 struct pending_cmd *cmd;
2693 u8 sec_level, auth_type;
2694 struct hci_conn *conn;
e9a416b5
JH
2695 int err;
2696
2697 BT_DBG("");
2698
f950a30e
SJ
2699 memset(&rp, 0, sizeof(rp));
2700 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
2701 rp.addr.type = cp->addr.type;
2702
4ee71b20
JH
2703 if (!bdaddr_type_is_valid(cp->addr.type))
2704 return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2705 MGMT_STATUS_INVALID_PARAMS,
2706 &rp, sizeof(rp));
2707
09fd0de5 2708 hci_dev_lock(hdev);
e9a416b5 2709
5f97c1df 2710 if (!hdev_is_powered(hdev)) {
f950a30e
SJ
2711 err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2712 MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
5f97c1df
JH
2713 goto unlock;
2714 }
2715
c908df36
VCG
2716 sec_level = BT_SECURITY_MEDIUM;
2717 if (cp->io_cap == 0x03)
e9a416b5 2718 auth_type = HCI_AT_DEDICATED_BONDING;
c908df36 2719 else
e9a416b5 2720 auth_type = HCI_AT_DEDICATED_BONDING_MITM;
e9a416b5 2721
591f47f3 2722 if (cp->addr.type == BDADDR_BREDR)
b12f62cf
AG
2723 conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
2724 cp->addr.type, sec_level, auth_type);
7a512d01 2725 else
b12f62cf
AG
2726 conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
2727 cp->addr.type, sec_level, auth_type);
7a512d01 2728
30e76272 2729 if (IS_ERR(conn)) {
489dc48e
AK
2730 int status;
2731
2732 if (PTR_ERR(conn) == -EBUSY)
2733 status = MGMT_STATUS_BUSY;
2734 else
2735 status = MGMT_STATUS_CONNECT_FAILED;
2736
bdb6d971 2737 err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
489dc48e 2738 status, &rp,
04124681 2739 sizeof(rp));
e9a416b5
JH
2740 goto unlock;
2741 }
2742
2743 if (conn->connect_cfm_cb) {
76a68ba0 2744 hci_conn_drop(conn);
bdb6d971 2745 err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
04124681 2746 MGMT_STATUS_BUSY, &rp, sizeof(rp));
e9a416b5
JH
2747 goto unlock;
2748 }
2749
2e58ef3e 2750 cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
e9a416b5
JH
2751 if (!cmd) {
2752 err = -ENOMEM;
76a68ba0 2753 hci_conn_drop(conn);
e9a416b5
JH
2754 goto unlock;
2755 }
2756
7a512d01 2757 /* For LE, just connecting isn't a proof that the pairing finished */
591f47f3 2758 if (cp->addr.type == BDADDR_BREDR)
7a512d01 2759 conn->connect_cfm_cb = pairing_complete_cb;
4c47d739
VA
2760 else
2761 conn->connect_cfm_cb = le_connect_complete_cb;
7a512d01 2762
e9a416b5
JH
2763 conn->security_cfm_cb = pairing_complete_cb;
2764 conn->disconn_cfm_cb = pairing_complete_cb;
2765 conn->io_capability = cp->io_cap;
2766 cmd->user_data = conn;
2767
2768 if (conn->state == BT_CONNECTED &&
8ce8e2b5 2769 hci_conn_security(conn, sec_level, auth_type))
e9a416b5
JH
2770 pairing_complete(cmd, 0);
2771
2772 err = 0;
2773
2774unlock:
09fd0de5 2775 hci_dev_unlock(hdev);
e9a416b5
JH
2776 return err;
2777}
2778
04124681
GP
2779static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2780 u16 len)
28424707 2781{
0f4e68cf 2782 struct mgmt_addr_info *addr = data;
28424707
JH
2783 struct pending_cmd *cmd;
2784 struct hci_conn *conn;
2785 int err;
2786
2787 BT_DBG("");
2788
28424707
JH
2789 hci_dev_lock(hdev);
2790
5f97c1df 2791 if (!hdev_is_powered(hdev)) {
bdb6d971 2792 err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
04124681 2793 MGMT_STATUS_NOT_POWERED);
5f97c1df
JH
2794 goto unlock;
2795 }
2796
28424707
JH
2797 cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
2798 if (!cmd) {
bdb6d971 2799 err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
04124681 2800 MGMT_STATUS_INVALID_PARAMS);
28424707
JH
2801 goto unlock;
2802 }
2803
2804 conn = cmd->user_data;
2805
2806 if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
bdb6d971 2807 err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
04124681 2808 MGMT_STATUS_INVALID_PARAMS);
28424707
JH
2809 goto unlock;
2810 }
2811
2812 pairing_complete(cmd, MGMT_STATUS_CANCELLED);
2813
bdb6d971 2814 err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
04124681 2815 addr, sizeof(*addr));
28424707
JH
2816unlock:
2817 hci_dev_unlock(hdev);
28424707
JH
2818 return err;
2819}
2820
bdb6d971 2821static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
1707c60e 2822 struct mgmt_addr_info *addr, u16 mgmt_op,
04124681 2823 u16 hci_op, __le32 passkey)
a5c29683 2824{
a5c29683 2825 struct pending_cmd *cmd;
0df4c185 2826 struct hci_conn *conn;
a5c29683
JH
2827 int err;
2828
09fd0de5 2829 hci_dev_lock(hdev);
08ba5382 2830
4b34ee78 2831 if (!hdev_is_powered(hdev)) {
feb94d3d
JH
2832 err = cmd_complete(sk, hdev->id, mgmt_op,
2833 MGMT_STATUS_NOT_POWERED, addr,
2834 sizeof(*addr));
0df4c185 2835 goto done;
a5c29683
JH
2836 }
2837
1707c60e
JH
2838 if (addr->type == BDADDR_BREDR)
2839 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
272d90df 2840 else
1707c60e 2841 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
272d90df
JH
2842
2843 if (!conn) {
feb94d3d
JH
2844 err = cmd_complete(sk, hdev->id, mgmt_op,
2845 MGMT_STATUS_NOT_CONNECTED, addr,
2846 sizeof(*addr));
272d90df
JH
2847 goto done;
2848 }
47c15e2b 2849
1707c60e 2850 if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
47c15e2b 2851 /* Continue with pairing via SMP */
5fe57d9e
BG
2852 err = smp_user_confirm_reply(conn, mgmt_op, passkey);
2853
2854 if (!err)
feb94d3d
JH
2855 err = cmd_complete(sk, hdev->id, mgmt_op,
2856 MGMT_STATUS_SUCCESS, addr,
2857 sizeof(*addr));
5fe57d9e 2858 else
feb94d3d
JH
2859 err = cmd_complete(sk, hdev->id, mgmt_op,
2860 MGMT_STATUS_FAILED, addr,
2861 sizeof(*addr));
47c15e2b 2862
47c15e2b
BG
2863 goto done;
2864 }
2865
1707c60e 2866 cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
a5c29683
JH
2867 if (!cmd) {
2868 err = -ENOMEM;
0df4c185 2869 goto done;
a5c29683
JH
2870 }
2871
0df4c185 2872 /* Continue with pairing via HCI */
604086b7
BG
2873 if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
2874 struct hci_cp_user_passkey_reply cp;
2875
1707c60e 2876 bacpy(&cp.bdaddr, &addr->bdaddr);
604086b7
BG
2877 cp.passkey = passkey;
2878 err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
2879 } else
1707c60e
JH
2880 err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
2881 &addr->bdaddr);
604086b7 2882
a664b5bc
JH
2883 if (err < 0)
2884 mgmt_pending_remove(cmd);
a5c29683 2885
0df4c185 2886done:
09fd0de5 2887 hci_dev_unlock(hdev);
a5c29683
JH
2888 return err;
2889}
2890
afeb019d
JK
2891static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2892 void *data, u16 len)
2893{
2894 struct mgmt_cp_pin_code_neg_reply *cp = data;
2895
2896 BT_DBG("");
2897
1707c60e 2898 return user_pairing_resp(sk, hdev, &cp->addr,
afeb019d
JK
2899 MGMT_OP_PIN_CODE_NEG_REPLY,
2900 HCI_OP_PIN_CODE_NEG_REPLY, 0);
2901}
2902
04124681
GP
2903static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2904 u16 len)
0df4c185 2905{
650f726d 2906 struct mgmt_cp_user_confirm_reply *cp = data;
0df4c185
BG
2907
2908 BT_DBG("");
2909
2910 if (len != sizeof(*cp))
bdb6d971 2911 return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
04124681 2912 MGMT_STATUS_INVALID_PARAMS);
0df4c185 2913
1707c60e 2914 return user_pairing_resp(sk, hdev, &cp->addr,
04124681
GP
2915 MGMT_OP_USER_CONFIRM_REPLY,
2916 HCI_OP_USER_CONFIRM_REPLY, 0);
0df4c185
BG
2917}
2918
bdb6d971 2919static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
04124681 2920 void *data, u16 len)
0df4c185 2921{
c9c2659f 2922 struct mgmt_cp_user_confirm_neg_reply *cp = data;
0df4c185
BG
2923
2924 BT_DBG("");
2925
1707c60e 2926 return user_pairing_resp(sk, hdev, &cp->addr,
04124681
GP
2927 MGMT_OP_USER_CONFIRM_NEG_REPLY,
2928 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
0df4c185
BG
2929}
2930
04124681
GP
2931static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2932 u16 len)
604086b7 2933{
650f726d 2934 struct mgmt_cp_user_passkey_reply *cp = data;
604086b7
BG
2935
2936 BT_DBG("");
2937
1707c60e 2938 return user_pairing_resp(sk, hdev, &cp->addr,
04124681
GP
2939 MGMT_OP_USER_PASSKEY_REPLY,
2940 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
604086b7
BG
2941}
2942
bdb6d971 2943static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
04124681 2944 void *data, u16 len)
604086b7 2945{
650f726d 2946 struct mgmt_cp_user_passkey_neg_reply *cp = data;
604086b7
BG
2947
2948 BT_DBG("");
2949
1707c60e 2950 return user_pairing_resp(sk, hdev, &cp->addr,
04124681
GP
2951 MGMT_OP_USER_PASSKEY_NEG_REPLY,
2952 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
604086b7
BG
2953}
2954
13928971 2955static void update_name(struct hci_request *req)
2b4bf397 2956{
13928971 2957 struct hci_dev *hdev = req->hdev;
2b4bf397
JH
2958 struct hci_cp_write_local_name cp;
2959
13928971 2960 memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2b4bf397 2961
890ea898 2962 hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2b4bf397
JH
2963}
2964
13928971
JH
2965static void set_name_complete(struct hci_dev *hdev, u8 status)
2966{
2967 struct mgmt_cp_set_local_name *cp;
2968 struct pending_cmd *cmd;
2969
2970 BT_DBG("status 0x%02x", status);
2971
2972 hci_dev_lock(hdev);
2973
2974 cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2975 if (!cmd)
2976 goto unlock;
2977
2978 cp = cmd->param;
2979
2980 if (status)
2981 cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2982 mgmt_status(status));
2983 else
2984 cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2985 cp, sizeof(*cp));
2986
2987 mgmt_pending_remove(cmd);
2988
2989unlock:
2990 hci_dev_unlock(hdev);
2991}
2992
bdb6d971 2993static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 2994 u16 len)
b312b161 2995{
2b4bf397 2996 struct mgmt_cp_set_local_name *cp = data;
b312b161 2997 struct pending_cmd *cmd;
890ea898 2998 struct hci_request req;
b312b161
JH
2999 int err;
3000
3001 BT_DBG("");
3002
09fd0de5 3003 hci_dev_lock(hdev);
b312b161 3004
b3f2ca94
JH
3005 /* If the old values are the same as the new ones just return a
3006 * direct command complete event.
3007 */
3008 if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
3009 !memcmp(hdev->short_name, cp->short_name,
3010 sizeof(hdev->short_name))) {
3011 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
3012 data, len);
3013 goto failed;
3014 }
3015
2b4bf397 3016 memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
28cc7bde 3017
b5235a65 3018 if (!hdev_is_powered(hdev)) {
2b4bf397 3019 memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
28cc7bde
JH
3020
3021 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
04124681 3022 data, len);
28cc7bde
JH
3023 if (err < 0)
3024 goto failed;
3025
3026 err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
04124681 3027 sk);
28cc7bde 3028
b5235a65
JH
3029 goto failed;
3030 }
3031
28cc7bde 3032 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
b312b161
JH
3033 if (!cmd) {
3034 err = -ENOMEM;
3035 goto failed;
3036 }
3037
13928971
JH
3038 memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
3039
890ea898 3040 hci_req_init(&req, hdev);
3f985050
JH
3041
3042 if (lmp_bredr_capable(hdev)) {
3043 update_name(&req);
3044 update_eir(&req);
3045 }
3046
7a5f4990
MH
3047 /* The name is stored in the scan response data and so
3048 * no need to udpate the advertising data here.
3049 */
3f985050 3050 if (lmp_le_capable(hdev))
7a5f4990 3051 update_scan_rsp_data(&req);
3f985050 3052
13928971 3053 err = hci_req_run(&req, set_name_complete);
b312b161
JH
3054 if (err < 0)
3055 mgmt_pending_remove(cmd);
3056
3057failed:
09fd0de5 3058 hci_dev_unlock(hdev);
b312b161
JH
3059 return err;
3060}
3061
0f4e68cf 3062static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
04124681 3063 void *data, u16 data_len)
c35938b2 3064{
c35938b2
SJ
3065 struct pending_cmd *cmd;
3066 int err;
3067
bdb6d971 3068 BT_DBG("%s", hdev->name);
c35938b2 3069
09fd0de5 3070 hci_dev_lock(hdev);
c35938b2 3071
4b34ee78 3072 if (!hdev_is_powered(hdev)) {
bdb6d971 3073 err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
04124681 3074 MGMT_STATUS_NOT_POWERED);
c35938b2
SJ
3075 goto unlock;
3076 }
3077
9a1a1996 3078 if (!lmp_ssp_capable(hdev)) {
bdb6d971 3079 err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
04124681 3080 MGMT_STATUS_NOT_SUPPORTED);
c35938b2
SJ
3081 goto unlock;
3082 }
3083
2e58ef3e 3084 if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
bdb6d971 3085 err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
04124681 3086 MGMT_STATUS_BUSY);
c35938b2
SJ
3087 goto unlock;
3088 }
3089
2e58ef3e 3090 cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
c35938b2
SJ
3091 if (!cmd) {
3092 err = -ENOMEM;
3093 goto unlock;
3094 }
3095
4d2d2796
MH
3096 if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
3097 err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_EXT_DATA,
3098 0, NULL);
3099 else
3100 err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
3101
c35938b2
SJ
3102 if (err < 0)
3103 mgmt_pending_remove(cmd);
3104
3105unlock:
09fd0de5 3106 hci_dev_unlock(hdev);
c35938b2
SJ
3107 return err;
3108}
3109
bdb6d971 3110static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
04124681 3111 void *data, u16 len)
2763eda6 3112{
2763eda6
SJ
3113 int err;
3114
bdb6d971 3115 BT_DBG("%s ", hdev->name);
2763eda6 3116
09fd0de5 3117 hci_dev_lock(hdev);
2763eda6 3118
ec109113
MH
3119 if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) {
3120 struct mgmt_cp_add_remote_oob_data *cp = data;
3121 u8 status;
bf1e3541 3122
ec109113
MH
3123 err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
3124 cp->hash, cp->randomizer);
3125 if (err < 0)
3126 status = MGMT_STATUS_FAILED;
3127 else
3128 status = MGMT_STATUS_SUCCESS;
3129
3130 err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
3131 status, &cp->addr, sizeof(cp->addr));
3132 } else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) {
3133 struct mgmt_cp_add_remote_oob_ext_data *cp = data;
3134 u8 status;
3135
3136 err = hci_add_remote_oob_ext_data(hdev, &cp->addr.bdaddr,
3137 cp->hash192,
3138 cp->randomizer192,
3139 cp->hash256,
3140 cp->randomizer256);
3141 if (err < 0)
3142 status = MGMT_STATUS_FAILED;
3143 else
3144 status = MGMT_STATUS_SUCCESS;
3145
3146 err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
3147 status, &cp->addr, sizeof(cp->addr));
3148 } else {
3149 BT_ERR("add_remote_oob_data: invalid length of %u bytes", len);
3150 err = cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
3151 MGMT_STATUS_INVALID_PARAMS);
3152 }
2763eda6 3153
09fd0de5 3154 hci_dev_unlock(hdev);
2763eda6
SJ
3155 return err;
3156}
3157
bdb6d971 3158static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
8ce8e2b5 3159 void *data, u16 len)
2763eda6 3160{
650f726d 3161 struct mgmt_cp_remove_remote_oob_data *cp = data;
bf1e3541 3162 u8 status;
2763eda6
SJ
3163 int err;
3164
bdb6d971 3165 BT_DBG("%s", hdev->name);
2763eda6 3166
09fd0de5 3167 hci_dev_lock(hdev);
2763eda6 3168
664ce4cc 3169 err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2763eda6 3170 if (err < 0)
bf1e3541 3171 status = MGMT_STATUS_INVALID_PARAMS;
2763eda6 3172 else
a6785be2 3173 status = MGMT_STATUS_SUCCESS;
bf1e3541 3174
bdb6d971 3175 err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
04124681 3176 status, &cp->addr, sizeof(cp->addr));
2763eda6 3177
09fd0de5 3178 hci_dev_unlock(hdev);
2763eda6
SJ
3179 return err;
3180}
3181
41dc2bd6
AG
3182static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
3183{
3184 struct pending_cmd *cmd;
3185 u8 type;
3186 int err;
3187
3188 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
3189
3190 cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3191 if (!cmd)
3192 return -ENOENT;
3193
3194 type = hdev->discovery.type;
3195
3196 err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3197 &type, sizeof(type));
3198 mgmt_pending_remove(cmd);
3199
3200 return err;
3201}
3202
7c307720
AG
3203static void start_discovery_complete(struct hci_dev *hdev, u8 status)
3204{
3205 BT_DBG("status %d", status);
3206
3207 if (status) {
3208 hci_dev_lock(hdev);
3209 mgmt_start_discovery_failed(hdev, status);
3210 hci_dev_unlock(hdev);
3211 return;
3212 }
3213
3214 hci_dev_lock(hdev);
3215 hci_discovery_set_state(hdev, DISCOVERY_FINDING);
3216 hci_dev_unlock(hdev);
3217
3218 switch (hdev->discovery.type) {
3219 case DISCOV_TYPE_LE:
3220 queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
0d8cc935 3221 DISCOV_LE_TIMEOUT);
7c307720
AG
3222 break;
3223
3224 case DISCOV_TYPE_INTERLEAVED:
3225 queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
0d8cc935 3226 DISCOV_INTERLEAVED_TIMEOUT);
7c307720
AG
3227 break;
3228
3229 case DISCOV_TYPE_BREDR:
3230 break;
3231
3232 default:
3233 BT_ERR("Invalid discovery type %d", hdev->discovery.type);
3234 }
3235}
3236
bdb6d971 3237static int start_discovery(struct sock *sk, struct hci_dev *hdev,
04124681 3238 void *data, u16 len)
14a53664 3239{
650f726d 3240 struct mgmt_cp_start_discovery *cp = data;
14a53664 3241 struct pending_cmd *cmd;
7c307720
AG
3242 struct hci_cp_le_set_scan_param param_cp;
3243 struct hci_cp_le_set_scan_enable enable_cp;
3244 struct hci_cp_inquiry inq_cp;
3245 struct hci_request req;
3246 /* General inquiry access code (GIAC) */
3247 u8 lap[3] = { 0x33, 0x8b, 0x9e };
e6fe7986 3248 u8 status;
14a53664
JH
3249 int err;
3250
bdb6d971 3251 BT_DBG("%s", hdev->name);
14a53664 3252
09fd0de5 3253 hci_dev_lock(hdev);
14a53664 3254
4b34ee78 3255 if (!hdev_is_powered(hdev)) {
bdb6d971 3256 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
04124681 3257 MGMT_STATUS_NOT_POWERED);
bd2d1334
JH
3258 goto failed;
3259 }
3260
642be6c7
AG
3261 if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
3262 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3263 MGMT_STATUS_BUSY);
3264 goto failed;
3265 }
3266
ff9ef578 3267 if (hdev->discovery.state != DISCOVERY_STOPPED) {
bdb6d971 3268 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
04124681 3269 MGMT_STATUS_BUSY);
ff9ef578
JH
3270 goto failed;
3271 }
3272
2e58ef3e 3273 cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
14a53664
JH
3274 if (!cmd) {
3275 err = -ENOMEM;
3276 goto failed;
3277 }
3278
4aab14e5
AG
3279 hdev->discovery.type = cp->type;
3280
7c307720
AG
3281 hci_req_init(&req, hdev);
3282
4aab14e5 3283 switch (hdev->discovery.type) {
f39799f5 3284 case DISCOV_TYPE_BREDR:
e6fe7986
JH
3285 status = mgmt_bredr_support(hdev);
3286 if (status) {
04106755 3287 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
e6fe7986 3288 status);
04106755
JH
3289 mgmt_pending_remove(cmd);
3290 goto failed;
3291 }
3292
7c307720
AG
3293 if (test_bit(HCI_INQUIRY, &hdev->flags)) {
3294 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3295 MGMT_STATUS_BUSY);
3296 mgmt_pending_remove(cmd);
3297 goto failed;
3298 }
3299
3300 hci_inquiry_cache_flush(hdev);
3301
3302 memset(&inq_cp, 0, sizeof(inq_cp));
3303 memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
0d8cc935 3304 inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
7c307720 3305 hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
f39799f5
AG
3306 break;
3307
3308 case DISCOV_TYPE_LE:
7c307720 3309 case DISCOV_TYPE_INTERLEAVED:
e6fe7986
JH
3310 status = mgmt_le_support(hdev);
3311 if (status) {
04106755 3312 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
e6fe7986 3313 status);
04106755
JH
3314 mgmt_pending_remove(cmd);
3315 goto failed;
3316 }
3317
7c307720 3318 if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
56f87901 3319 !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
04106755
JH
3320 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3321 MGMT_STATUS_NOT_SUPPORTED);
3322 mgmt_pending_remove(cmd);
3323 goto failed;
3324 }
3325
f3d3444a 3326 if (test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
7c307720
AG
3327 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3328 MGMT_STATUS_REJECTED);
3329 mgmt_pending_remove(cmd);
3330 goto failed;
3331 }
3332
3333 if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
3334 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3335 MGMT_STATUS_BUSY);
3336 mgmt_pending_remove(cmd);
3337 goto failed;
3338 }
3339
3340 memset(&param_cp, 0, sizeof(param_cp));
3341 param_cp.type = LE_SCAN_ACTIVE;
0d8cc935
AG
3342 param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
3343 param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
79830f66 3344 param_cp.own_address_type = hdev->own_addr_type;
7c307720
AG
3345 hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
3346 &param_cp);
3347
3348 memset(&enable_cp, 0, sizeof(enable_cp));
3349 enable_cp.enable = LE_SCAN_ENABLE;
3350 enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
3351 hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
3352 &enable_cp);
5e0452c0
AG
3353 break;
3354
f39799f5 3355 default:
04106755
JH
3356 err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3357 MGMT_STATUS_INVALID_PARAMS);
3358 mgmt_pending_remove(cmd);
3359 goto failed;
f39799f5 3360 }
3fd24153 3361
7c307720 3362 err = hci_req_run(&req, start_discovery_complete);
14a53664
JH
3363 if (err < 0)
3364 mgmt_pending_remove(cmd);
ff9ef578
JH
3365 else
3366 hci_discovery_set_state(hdev, DISCOVERY_STARTING);
14a53664
JH
3367
3368failed:
09fd0de5 3369 hci_dev_unlock(hdev);
14a53664
JH
3370 return err;
3371}
3372
1183fdca
AG
3373static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
3374{
3375 struct pending_cmd *cmd;
3376 int err;
3377
3378 cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3379 if (!cmd)
3380 return -ENOENT;
3381
3382 err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3383 &hdev->discovery.type, sizeof(hdev->discovery.type));
3384 mgmt_pending_remove(cmd);
3385
3386 return err;
3387}
3388
0e05bba6
AG
3389static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
3390{
3391 BT_DBG("status %d", status);
3392
3393 hci_dev_lock(hdev);
3394
3395 if (status) {
3396 mgmt_stop_discovery_failed(hdev, status);
3397 goto unlock;
3398 }
3399
3400 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
3401
3402unlock:
3403 hci_dev_unlock(hdev);
3404}
3405
bdb6d971 3406static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 3407 u16 len)
14a53664 3408{
d930650b 3409 struct mgmt_cp_stop_discovery *mgmt_cp = data;
14a53664 3410 struct pending_cmd *cmd;
30dc78e1
JH
3411 struct hci_cp_remote_name_req_cancel cp;
3412 struct inquiry_entry *e;
0e05bba6
AG
3413 struct hci_request req;
3414 struct hci_cp_le_set_scan_enable enable_cp;
14a53664
JH
3415 int err;
3416
bdb6d971 3417 BT_DBG("%s", hdev->name);
14a53664 3418
09fd0de5 3419 hci_dev_lock(hdev);
14a53664 3420
30dc78e1 3421 if (!hci_discovery_active(hdev)) {
bdb6d971 3422 err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
04124681
GP
3423 MGMT_STATUS_REJECTED, &mgmt_cp->type,
3424 sizeof(mgmt_cp->type));
d930650b
JH
3425 goto unlock;
3426 }
3427
3428 if (hdev->discovery.type != mgmt_cp->type) {
bdb6d971 3429 err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
04124681
GP
3430 MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
3431 sizeof(mgmt_cp->type));
30dc78e1 3432 goto unlock;
ff9ef578
JH
3433 }
3434
2e58ef3e 3435 cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
14a53664
JH
3436 if (!cmd) {
3437 err = -ENOMEM;
30dc78e1
JH
3438 goto unlock;
3439 }
3440
0e05bba6
AG
3441 hci_req_init(&req, hdev);
3442
e0d9727e
AG
3443 switch (hdev->discovery.state) {
3444 case DISCOVERY_FINDING:
0e05bba6
AG
3445 if (test_bit(HCI_INQUIRY, &hdev->flags)) {
3446 hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
3447 } else {
3448 cancel_delayed_work(&hdev->le_scan_disable);
3449
3450 memset(&enable_cp, 0, sizeof(enable_cp));
3451 enable_cp.enable = LE_SCAN_DISABLE;
3452 hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
3453 sizeof(enable_cp), &enable_cp);
3454 }
c9ecc48e 3455
e0d9727e
AG
3456 break;
3457
3458 case DISCOVERY_RESOLVING:
3459 e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
8ce8e2b5 3460 NAME_PENDING);
e0d9727e 3461 if (!e) {
30dc78e1 3462 mgmt_pending_remove(cmd);
e0d9727e
AG
3463 err = cmd_complete(sk, hdev->id,
3464 MGMT_OP_STOP_DISCOVERY, 0,
3465 &mgmt_cp->type,
3466 sizeof(mgmt_cp->type));
3467 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
3468 goto unlock;
3469 }
30dc78e1 3470
e0d9727e 3471 bacpy(&cp.bdaddr, &e->data.bdaddr);
0e05bba6
AG
3472 hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
3473 &cp);
e0d9727e
AG
3474
3475 break;
3476
3477 default:
3478 BT_DBG("unknown discovery state %u", hdev->discovery.state);
0e05bba6
AG
3479
3480 mgmt_pending_remove(cmd);
3481 err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
3482 MGMT_STATUS_FAILED, &mgmt_cp->type,
3483 sizeof(mgmt_cp->type));
3484 goto unlock;
14a53664
JH
3485 }
3486
0e05bba6 3487 err = hci_req_run(&req, stop_discovery_complete);
14a53664
JH
3488 if (err < 0)
3489 mgmt_pending_remove(cmd);
ff9ef578
JH
3490 else
3491 hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
14a53664 3492
30dc78e1 3493unlock:
09fd0de5 3494 hci_dev_unlock(hdev);
14a53664
JH
3495 return err;
3496}
3497
bdb6d971 3498static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 3499 u16 len)
561aafbc 3500{
650f726d 3501 struct mgmt_cp_confirm_name *cp = data;
561aafbc 3502 struct inquiry_entry *e;
561aafbc
JH
3503 int err;
3504
bdb6d971 3505 BT_DBG("%s", hdev->name);
561aafbc 3506
561aafbc
JH
3507 hci_dev_lock(hdev);
3508
30dc78e1 3509 if (!hci_discovery_active(hdev)) {
bdb6d971 3510 err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
04124681 3511 MGMT_STATUS_FAILED);
30dc78e1
JH
3512 goto failed;
3513 }
3514
a198e7b1 3515 e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
561aafbc 3516 if (!e) {
bdb6d971 3517 err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
04124681 3518 MGMT_STATUS_INVALID_PARAMS);
561aafbc
JH
3519 goto failed;
3520 }
3521
3522 if (cp->name_known) {
3523 e->name_state = NAME_KNOWN;
3524 list_del(&e->list);
3525 } else {
3526 e->name_state = NAME_NEEDED;
a3d4e20a 3527 hci_inquiry_cache_update_resolve(hdev, e);
561aafbc
JH
3528 }
3529
e384662b
JH
3530 err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
3531 sizeof(cp->addr));
561aafbc
JH
3532
3533failed:
3534 hci_dev_unlock(hdev);
561aafbc
JH
3535 return err;
3536}
3537
bdb6d971 3538static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 3539 u16 len)
7fbec224 3540{
650f726d 3541 struct mgmt_cp_block_device *cp = data;
f0eeea8b 3542 u8 status;
7fbec224
AJ
3543 int err;
3544
bdb6d971 3545 BT_DBG("%s", hdev->name);
7fbec224 3546
4ee71b20 3547 if (!bdaddr_type_is_valid(cp->addr.type))
5d0846d4
JH
3548 return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
3549 MGMT_STATUS_INVALID_PARAMS,
3550 &cp->addr, sizeof(cp->addr));
4ee71b20 3551
09fd0de5 3552 hci_dev_lock(hdev);
5e762444 3553
88c1fe4b 3554 err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
7fbec224 3555 if (err < 0)
f0eeea8b 3556 status = MGMT_STATUS_FAILED;
7fbec224 3557 else
a6785be2 3558 status = MGMT_STATUS_SUCCESS;
f0eeea8b 3559
bdb6d971 3560 err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
04124681 3561 &cp->addr, sizeof(cp->addr));
5e762444 3562
09fd0de5 3563 hci_dev_unlock(hdev);
7fbec224
AJ
3564
3565 return err;
3566}
3567
bdb6d971 3568static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
04124681 3569 u16 len)
7fbec224 3570{
650f726d 3571 struct mgmt_cp_unblock_device *cp = data;
f0eeea8b 3572 u8 status;
7fbec224
AJ
3573 int err;
3574
bdb6d971 3575 BT_DBG("%s", hdev->name);
7fbec224 3576
4ee71b20 3577 if (!bdaddr_type_is_valid(cp->addr.type))
5d0846d4
JH
3578 return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
3579 MGMT_STATUS_INVALID_PARAMS,
3580 &cp->addr, sizeof(cp->addr));
4ee71b20 3581
09fd0de5 3582 hci_dev_lock(hdev);
5e762444 3583
88c1fe4b 3584 err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
7fbec224 3585 if (err < 0)
f0eeea8b 3586 status = MGMT_STATUS_INVALID_PARAMS;
7fbec224 3587 else
a6785be2 3588 status = MGMT_STATUS_SUCCESS;
f0eeea8b 3589
bdb6d971 3590 err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
04124681 3591 &cp->addr, sizeof(cp->addr));
5e762444 3592
09fd0de5 3593 hci_dev_unlock(hdev);
7fbec224
AJ
3594
3595 return err;
3596}
3597
cdbaccca
MH
3598static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
3599 u16 len)
3600{
3601 struct mgmt_cp_set_device_id *cp = data;
890ea898 3602 struct hci_request req;
cdbaccca 3603 int err;
c72d4b8a 3604 __u16 source;
cdbaccca
MH
3605
3606 BT_DBG("%s", hdev->name);
3607
c72d4b8a
SJ
3608 source = __le16_to_cpu(cp->source);
3609
3610 if (source > 0x0002)
3611 return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
3612 MGMT_STATUS_INVALID_PARAMS);
3613
cdbaccca
MH
3614 hci_dev_lock(hdev);
3615
c72d4b8a 3616 hdev->devid_source = source;
cdbaccca
MH
3617 hdev->devid_vendor = __le16_to_cpu(cp->vendor);
3618 hdev->devid_product = __le16_to_cpu(cp->product);
3619 hdev->devid_version = __le16_to_cpu(cp->version);
3620
3621 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);
3622
890ea898
JH
3623 hci_req_init(&req, hdev);
3624 update_eir(&req);
3625 hci_req_run(&req, NULL);
cdbaccca
MH
3626
3627 hci_dev_unlock(hdev);
3628
3629 return err;
3630}
3631
4375f103
JH
3632static void set_advertising_complete(struct hci_dev *hdev, u8 status)
3633{
3634 struct cmd_lookup match = { NULL, hdev };
3635
3636 if (status) {
3637 u8 mgmt_err = mgmt_status(status);
3638
3639 mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
3640 cmd_status_rsp, &mgmt_err);
3641 return;
3642 }
3643
3644 mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
3645 &match);
3646
3647 new_settings(hdev, match.sk);
3648
3649 if (match.sk)
3650 sock_put(match.sk);
3651}
3652
21b5187f
MH
3653static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data,
3654 u16 len)
4375f103
JH
3655{
3656 struct mgmt_mode *cp = data;
3657 struct pending_cmd *cmd;
3658 struct hci_request req;
e6fe7986 3659 u8 val, enabled, status;
4375f103
JH
3660 int err;
3661
3662 BT_DBG("request for %s", hdev->name);
3663
e6fe7986
JH
3664 status = mgmt_le_support(hdev);
3665 if (status)
4375f103 3666 return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
e6fe7986 3667 status);
4375f103
JH
3668
3669 if (cp->val != 0x00 && cp->val != 0x01)
3670 return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3671 MGMT_STATUS_INVALID_PARAMS);
3672
3673 hci_dev_lock(hdev);
3674
3675 val = !!cp->val;
f3d3444a 3676 enabled = test_bit(HCI_ADVERTISING, &hdev->dev_flags);
4375f103 3677
f74ca9b8
JH
3678 /* The following conditions are ones which mean that we should
3679 * not do any HCI communication but directly send a mgmt
3680 * response to user space (after toggling the flag if
3681 * necessary).
3682 */
3683 if (!hdev_is_powered(hdev) || val == enabled ||
b145edcd 3684 hci_conn_num(hdev, LE_LINK) > 0) {
4375f103
JH
3685 bool changed = false;
3686
f3d3444a
JH
3687 if (val != test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
3688 change_bit(HCI_ADVERTISING, &hdev->dev_flags);
4375f103
JH
3689 changed = true;
3690 }
3691
3692 err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
3693 if (err < 0)
3694 goto unlock;
3695
3696 if (changed)
3697 err = new_settings(hdev, sk);
3698
3699 goto unlock;
3700 }
3701
3702 if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
3703 mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
3704 err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3705 MGMT_STATUS_BUSY);
3706 goto unlock;
3707 }
3708
3709 cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
3710 if (!cmd) {
3711 err = -ENOMEM;
3712 goto unlock;
3713 }
3714
3715 hci_req_init(&req, hdev);
3716
bba3aa55
MH
3717 if (val)
3718 enable_advertising(&req);
3719 else
3720 disable_advertising(&req);
4375f103
JH
3721
3722 err = hci_req_run(&req, set_advertising_complete);
3723 if (err < 0)
3724 mgmt_pending_remove(cmd);
3725
3726unlock:
3727 hci_dev_unlock(hdev);
3728 return err;
3729}
3730
d13eafce
MH
3731static int set_static_address(struct sock *sk, struct hci_dev *hdev,
3732 void *data, u16 len)
3733{
3734 struct mgmt_cp_set_static_address *cp = data;
3735 int err;
3736
3737 BT_DBG("%s", hdev->name);
3738
62af4443 3739 if (!lmp_le_capable(hdev))
d13eafce 3740 return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
62af4443 3741 MGMT_STATUS_NOT_SUPPORTED);
d13eafce
MH
3742
3743 if (hdev_is_powered(hdev))
3744 return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
3745 MGMT_STATUS_REJECTED);
3746
3747 if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
3748 if (!bacmp(&cp->bdaddr, BDADDR_NONE))
3749 return cmd_status(sk, hdev->id,
3750 MGMT_OP_SET_STATIC_ADDRESS,
3751 MGMT_STATUS_INVALID_PARAMS);
3752
3753 /* Two most significant bits shall be set */
3754 if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
3755 return cmd_status(sk, hdev->id,
3756 MGMT_OP_SET_STATIC_ADDRESS,
3757 MGMT_STATUS_INVALID_PARAMS);
3758 }
3759
3760 hci_dev_lock(hdev);
3761
3762 bacpy(&hdev->static_addr, &cp->bdaddr);
3763
3764 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);
3765
3766 hci_dev_unlock(hdev);
3767
3768 return err;
3769}
3770
14b49b9a
MH
3771static int set_scan_params(struct sock *sk, struct hci_dev *hdev,
3772 void *data, u16 len)
3773{
3774 struct mgmt_cp_set_scan_params *cp = data;
3775 __u16 interval, window;
3776 int err;
3777
3778 BT_DBG("%s", hdev->name);
3779
3780 if (!lmp_le_capable(hdev))
3781 return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
3782 MGMT_STATUS_NOT_SUPPORTED);
3783
3784 interval = __le16_to_cpu(cp->interval);
3785
3786 if (interval < 0x0004 || interval > 0x4000)
3787 return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
3788 MGMT_STATUS_INVALID_PARAMS);
3789
3790 window = __le16_to_cpu(cp->window);
3791
3792 if (window < 0x0004 || window > 0x4000)
3793 return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
3794 MGMT_STATUS_INVALID_PARAMS);
3795
899e1075
MH
3796 if (window > interval)
3797 return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
3798 MGMT_STATUS_INVALID_PARAMS);
3799
14b49b9a
MH
3800 hci_dev_lock(hdev);
3801
3802 hdev->le_scan_interval = interval;
3803 hdev->le_scan_window = window;
3804
3805 err = cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0, NULL, 0);
3806
3807 hci_dev_unlock(hdev);
3808
3809 return err;
3810}
3811
33e38b3e
JH
3812static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
3813{
3814 struct pending_cmd *cmd;
3815
3816 BT_DBG("status 0x%02x", status);
3817
3818 hci_dev_lock(hdev);
3819
3820 cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
3821 if (!cmd)
3822 goto unlock;
3823
3824 if (status) {
3825 cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3826 mgmt_status(status));
3827 } else {
1a4d3c4b
JH
3828 struct mgmt_mode *cp = cmd->param;
3829
3830 if (cp->val)
3831 set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
3832 else
3833 clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
3834
33e38b3e
JH
3835 send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
3836 new_settings(hdev, cmd->sk);
3837 }
3838
3839 mgmt_pending_remove(cmd);
3840
3841unlock:
3842 hci_dev_unlock(hdev);
3843}
3844
bdb6d971 3845static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
04124681 3846 void *data, u16 len)
f6422ec6 3847{
650f726d 3848 struct mgmt_mode *cp = data;
33e38b3e
JH
3849 struct pending_cmd *cmd;
3850 struct hci_request req;
f6422ec6
AJ
3851 int err;
3852
bdb6d971 3853 BT_DBG("%s", hdev->name);
f6422ec6 3854
56f87901
JH
3855 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
3856 hdev->hci_ver < BLUETOOTH_VER_1_2)
33c525c0
JH
3857 return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3858 MGMT_STATUS_NOT_SUPPORTED);
3859
a7e80f25
JH
3860 if (cp->val != 0x00 && cp->val != 0x01)
3861 return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3862 MGMT_STATUS_INVALID_PARAMS);
3863
5400c044 3864 if (!hdev_is_powered(hdev))
bdb6d971 3865 return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
04124681 3866 MGMT_STATUS_NOT_POWERED);
5400c044
JH
3867
3868 if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
bdb6d971 3869 return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
04124681 3870 MGMT_STATUS_REJECTED);
f6422ec6
AJ
3871
3872 hci_dev_lock(hdev);
3873
05cbf29f
JH
3874 if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
3875 err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3876 MGMT_STATUS_BUSY);
3877 goto unlock;
3878 }
3879
1a4d3c4b
JH
3880 if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
3881 err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
3882 hdev);
3883 goto unlock;
3884 }
3885
33e38b3e
JH
3886 cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
3887 data, len);
3888 if (!cmd) {
3889 err = -ENOMEM;
3890 goto unlock;
f6422ec6
AJ
3891 }
3892
33e38b3e
JH
3893 hci_req_init(&req, hdev);
3894
406d7804 3895 write_fast_connectable(&req, cp->val);
33e38b3e
JH
3896
3897 err = hci_req_run(&req, fast_connectable_complete);
f6422ec6 3898 if (err < 0) {
bdb6d971 3899 err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
04124681 3900 MGMT_STATUS_FAILED);
33e38b3e 3901 mgmt_pending_remove(cmd);
f6422ec6
AJ
3902 }
3903
33e38b3e 3904unlock:
f6422ec6 3905 hci_dev_unlock(hdev);
33e38b3e 3906
f6422ec6
AJ
3907 return err;
3908}
3909
67e5a7a3
JH
3910static void set_bredr_scan(struct hci_request *req)
3911{
3912 struct hci_dev *hdev = req->hdev;
3913 u8 scan = 0;
3914
3915 /* Ensure that fast connectable is disabled. This function will
3916 * not do anything if the page scan parameters are already what
3917 * they should be.
3918 */
3919 write_fast_connectable(req, false);
3920
3921 if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3922 scan |= SCAN_PAGE;
3923 if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
3924 scan |= SCAN_INQUIRY;
3925
3926 if (scan)
3927 hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3928}
3929
0663ca2a
JH
3930static void set_bredr_complete(struct hci_dev *hdev, u8 status)
3931{
3932 struct pending_cmd *cmd;
3933
3934 BT_DBG("status 0x%02x", status);
3935
3936 hci_dev_lock(hdev);
3937
3938 cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
3939 if (!cmd)
3940 goto unlock;
3941
3942 if (status) {
3943 u8 mgmt_err = mgmt_status(status);
3944
3945 /* We need to restore the flag if related HCI commands
3946 * failed.
3947 */
3948 clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);
3949
3950 cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
3951 } else {
3952 send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
3953 new_settings(hdev, cmd->sk);
3954 }
3955
3956 mgmt_pending_remove(cmd);
3957
3958unlock:
3959 hci_dev_unlock(hdev);
3960}
3961
3962static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
3963{
3964 struct mgmt_mode *cp = data;
3965 struct pending_cmd *cmd;
3966 struct hci_request req;
3967 int err;
3968
3969 BT_DBG("request for %s", hdev->name);
3970
3971 if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
3972 return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
3973 MGMT_STATUS_NOT_SUPPORTED);
3974
3975 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
3976 return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
3977 MGMT_STATUS_REJECTED);
3978
3979 if (cp->val != 0x00 && cp->val != 0x01)
3980 return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
3981 MGMT_STATUS_INVALID_PARAMS);
3982
3983 hci_dev_lock(hdev);
3984
3985 if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
3986 err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
3987 goto unlock;
3988 }
3989
3990 if (!hdev_is_powered(hdev)) {
3991 if (!cp->val) {
0663ca2a
JH
3992 clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
3993 clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
3994 clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
3995 clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
3996 clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
3997 }
3998
3999 change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);
4000
4001 err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
4002 if (err < 0)
4003 goto unlock;
4004
4005 err = new_settings(hdev, sk);
4006 goto unlock;
4007 }
4008
4009 /* Reject disabling when powered on */
4010 if (!cp->val) {
4011 err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
4012 MGMT_STATUS_REJECTED);
4013 goto unlock;
4014 }
4015
4016 if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
4017 err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
4018 MGMT_STATUS_BUSY);
4019 goto unlock;
4020 }
4021
4022 cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
4023 if (!cmd) {
4024 err = -ENOMEM;
4025 goto unlock;
4026 }
4027
5947f4bc 4028 /* We need to flip the bit already here so that update_adv_data
0663ca2a
JH
4029 * generates the correct flags.
4030 */
4031 set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);
4032
4033 hci_req_init(&req, hdev);
aa8af46e
JH
4034
4035 if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
4036 set_bredr_scan(&req);
4037
f14d8f64
MH
4038 /* Since only the advertising data flags will change, there
4039 * is no need to update the scan response data.
4040 */
5947f4bc 4041 update_adv_data(&req);
aa8af46e 4042
0663ca2a
JH
4043 err = hci_req_run(&req, set_bredr_complete);
4044 if (err < 0)
4045 mgmt_pending_remove(cmd);
4046
4047unlock:
4048 hci_dev_unlock(hdev);
4049 return err;
4050}
4051
eac83dc6
MH
4052static int set_secure_conn(struct sock *sk, struct hci_dev *hdev,
4053 void *data, u16 len)
4054{
4055 struct mgmt_mode *cp = data;
4056 struct pending_cmd *cmd;
0ab04a9c 4057 u8 val, status;
eac83dc6
MH
4058 int err;
4059
4060 BT_DBG("request for %s", hdev->name);
4061
4062 status = mgmt_bredr_support(hdev);
4063 if (status)
4064 return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4065 status);
4066
5afeac14
MH
4067 if (!lmp_sc_capable(hdev) &&
4068 !test_bit(HCI_FORCE_SC, &hdev->dev_flags))
eac83dc6
MH
4069 return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4070 MGMT_STATUS_NOT_SUPPORTED);
4071
0ab04a9c 4072 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
eac83dc6
MH
4073 return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4074 MGMT_STATUS_INVALID_PARAMS);
4075
4076 hci_dev_lock(hdev);
4077
4078 if (!hdev_is_powered(hdev)) {
4079 bool changed;
4080
0ab04a9c 4081 if (cp->val) {
eac83dc6
MH
4082 changed = !test_and_set_bit(HCI_SC_ENABLED,
4083 &hdev->dev_flags);
0ab04a9c
MH
4084 if (cp->val == 0x02)
4085 set_bit(HCI_SC_ONLY, &hdev->dev_flags);
4086 else
4087 clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
4088 } else {
eac83dc6
MH
4089 changed = test_and_clear_bit(HCI_SC_ENABLED,
4090 &hdev->dev_flags);
0ab04a9c
MH
4091 clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
4092 }
eac83dc6
MH
4093
4094 err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
4095 if (err < 0)
4096 goto failed;
4097
4098 if (changed)
4099 err = new_settings(hdev, sk);
4100
4101 goto failed;
4102 }
4103
4104 if (mgmt_pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) {
4105 err = cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4106 MGMT_STATUS_BUSY);
4107 goto failed;
4108 }
4109
0ab04a9c
MH
4110 val = !!cp->val;
4111
4112 if (val == test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
4113 (cp->val == 0x02) == test_bit(HCI_SC_ONLY, &hdev->dev_flags)) {
eac83dc6
MH
4114 err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
4115 goto failed;
4116 }
4117
4118 cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len);
4119 if (!cmd) {
4120 err = -ENOMEM;
4121 goto failed;
4122 }
4123
0ab04a9c 4124 err = hci_send_cmd(hdev, HCI_OP_WRITE_SC_SUPPORT, 1, &val);
eac83dc6
MH
4125 if (err < 0) {
4126 mgmt_pending_remove(cmd);
4127 goto failed;
4128 }
4129
0ab04a9c
MH
4130 if (cp->val == 0x02)
4131 set_bit(HCI_SC_ONLY, &hdev->dev_flags);
4132 else
4133 clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
4134
eac83dc6
MH
4135failed:
4136 hci_dev_unlock(hdev);
4137 return err;
4138}
4139
4e39ac81
MH
4140static int set_debug_keys(struct sock *sk, struct hci_dev *hdev,
4141 void *data, u16 len)
4142{
4143 struct mgmt_mode *cp = data;
4144 bool changed;
4145 int err;
4146
4147 BT_DBG("request for %s", hdev->name);
4148
4149 if (cp->val != 0x00 && cp->val != 0x01)
4150 return cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS,
4151 MGMT_STATUS_INVALID_PARAMS);
4152
4153 hci_dev_lock(hdev);
4154
4155 if (cp->val)
4156 changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
4157 else
4158 changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
4159
4160 err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev);
4161 if (err < 0)
4162 goto unlock;
4163
4164 if (changed)
4165 err = new_settings(hdev, sk);
4166
4167unlock:
4168 hci_dev_unlock(hdev);
4169 return err;
4170}
4171
41edf160
JH
4172static bool irk_is_valid(struct mgmt_irk_info *irk)
4173{
4174 switch (irk->addr.type) {
4175 case BDADDR_LE_PUBLIC:
4176 return true;
4177
4178 case BDADDR_LE_RANDOM:
4179 /* Two most significant bits shall be set */
4180 if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0)
4181 return false;
4182 return true;
4183 }
4184
4185 return false;
4186}
4187
4188static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data,
4189 u16 len)
4190{
4191 struct mgmt_cp_load_irks *cp = cp_data;
4192 u16 irk_count, expected_len;
4193 int i, err;
4194
4195 BT_DBG("request for %s", hdev->name);
4196
4197 if (!lmp_le_capable(hdev))
4198 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
4199 MGMT_STATUS_NOT_SUPPORTED);
4200
4201 irk_count = __le16_to_cpu(cp->irk_count);
4202
4203 expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info);
4204 if (expected_len != len) {
4205 BT_ERR("load_irks: expected %u bytes, got %u bytes",
4206 len, expected_len);
4207 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
4208 MGMT_STATUS_INVALID_PARAMS);
4209 }
4210
4211 BT_DBG("%s irk_count %u", hdev->name, irk_count);
4212
4213 for (i = 0; i < irk_count; i++) {
4214 struct mgmt_irk_info *key = &cp->irks[i];
4215
4216 if (!irk_is_valid(key))
4217 return cmd_status(sk, hdev->id,
4218 MGMT_OP_LOAD_IRKS,
4219 MGMT_STATUS_INVALID_PARAMS);
4220 }
4221
4222 hci_dev_lock(hdev);
4223
4224 hci_smp_irks_clear(hdev);
4225
4226 for (i = 0; i < irk_count; i++) {
4227 struct mgmt_irk_info *irk = &cp->irks[i];
4228 u8 addr_type;
4229
4230 if (irk->addr.type == BDADDR_LE_PUBLIC)
4231 addr_type = ADDR_LE_DEV_PUBLIC;
4232 else
4233 addr_type = ADDR_LE_DEV_RANDOM;
4234
4235 hci_add_irk(hdev, &irk->addr.bdaddr, addr_type, irk->val,
4236 BDADDR_ANY);
4237 }
4238
4239 set_bit(HCI_RPA_RESOLVING, &hdev->dev_flags);
4240
4241 err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0);
4242
4243 hci_dev_unlock(hdev);
4244
4245 return err;
4246}
4247
3f706b72
JH
4248static bool ltk_is_valid(struct mgmt_ltk_info *key)
4249{
4250 if (key->master != 0x00 && key->master != 0x01)
4251 return false;
490cb0b3
MH
4252
4253 switch (key->addr.type) {
4254 case BDADDR_LE_PUBLIC:
4255 return true;
4256
4257 case BDADDR_LE_RANDOM:
4258 /* Two most significant bits shall be set */
4259 if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0)
4260 return false;
4261 return true;
4262 }
4263
4264 return false;
3f706b72
JH
4265}
4266
bdb6d971 4267static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
04124681 4268 void *cp_data, u16 len)
346af67b 4269{
346af67b
VCG
4270 struct mgmt_cp_load_long_term_keys *cp = cp_data;
4271 u16 key_count, expected_len;
715a5bf2 4272 int i, err;
346af67b 4273
cf99ba13
MH
4274 BT_DBG("request for %s", hdev->name);
4275
4276 if (!lmp_le_capable(hdev))
4277 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
4278 MGMT_STATUS_NOT_SUPPORTED);
4279
1f350c87 4280 key_count = __le16_to_cpu(cp->key_count);
346af67b
VCG
4281
4282 expected_len = sizeof(*cp) + key_count *
4283 sizeof(struct mgmt_ltk_info);
4284 if (expected_len != len) {
4285 BT_ERR("load_keys: expected %u bytes, got %u bytes",
8ce8e2b5 4286 len, expected_len);
bdb6d971 4287 return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
e57e619f 4288 MGMT_STATUS_INVALID_PARAMS);
346af67b
VCG
4289 }
4290
bdb6d971 4291 BT_DBG("%s key_count %u", hdev->name, key_count);
346af67b 4292
54ad6d8a
JH
4293 for (i = 0; i < key_count; i++) {
4294 struct mgmt_ltk_info *key = &cp->keys[i];
4295
3f706b72 4296 if (!ltk_is_valid(key))
54ad6d8a
JH
4297 return cmd_status(sk, hdev->id,
4298 MGMT_OP_LOAD_LONG_TERM_KEYS,
4299 MGMT_STATUS_INVALID_PARAMS);
4300 }
4301
346af67b
VCG
4302 hci_dev_lock(hdev);
4303
4304 hci_smp_ltks_clear(hdev);
4305
4306 for (i = 0; i < key_count; i++) {
4307 struct mgmt_ltk_info *key = &cp->keys[i];
79d95a19
MH
4308 u8 type, addr_type;
4309
4310 if (key->addr.type == BDADDR_LE_PUBLIC)
4311 addr_type = ADDR_LE_DEV_PUBLIC;
4312 else
4313 addr_type = ADDR_LE_DEV_RANDOM;
346af67b
VCG
4314
4315 if (key->master)
4316 type = HCI_SMP_LTK;
4317 else
4318 type = HCI_SMP_LTK_SLAVE;
4319
79d95a19 4320 hci_add_ltk(hdev, &key->addr.bdaddr, addr_type,
d40f3eef 4321 type, 0, key->type, key->val,
04124681 4322 key->enc_size, key->ediv, key->rand);
346af67b
VCG
4323 }
4324
715a5bf2
JH
4325 err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
4326 NULL, 0);
4327
346af67b 4328 hci_dev_unlock(hdev);
346af67b 4329
715a5bf2 4330 return err;
346af67b
VCG
4331}
4332
2e3c35ea 4333static const struct mgmt_handler {
04124681
GP
4334 int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
4335 u16 data_len);
be22b54e
JH
4336 bool var_len;
4337 size_t data_len;
0f4e68cf
JH
4338} mgmt_handlers[] = {
4339 { NULL }, /* 0x0000 (no command) */
be22b54e
JH
4340 { read_version, false, MGMT_READ_VERSION_SIZE },
4341 { read_commands, false, MGMT_READ_COMMANDS_SIZE },
4342 { read_index_list, false, MGMT_READ_INDEX_LIST_SIZE },
4343 { read_controller_info, false, MGMT_READ_INFO_SIZE },
4344 { set_powered, false, MGMT_SETTING_SIZE },
4345 { set_discoverable, false, MGMT_SET_DISCOVERABLE_SIZE },
4346 { set_connectable, false, MGMT_SETTING_SIZE },
4347 { set_fast_connectable, false, MGMT_SETTING_SIZE },
4348 { set_pairable, false, MGMT_SETTING_SIZE },
4349 { set_link_security, false, MGMT_SETTING_SIZE },
4350 { set_ssp, false, MGMT_SETTING_SIZE },
4351 { set_hs, false, MGMT_SETTING_SIZE },
4352 { set_le, false, MGMT_SETTING_SIZE },
4353 { set_dev_class, false, MGMT_SET_DEV_CLASS_SIZE },
4354 { set_local_name, false, MGMT_SET_LOCAL_NAME_SIZE },
4355 { add_uuid, false, MGMT_ADD_UUID_SIZE },
4356 { remove_uuid, false, MGMT_REMOVE_UUID_SIZE },
4357 { load_link_keys, true, MGMT_LOAD_LINK_KEYS_SIZE },
4358 { load_long_term_keys, true, MGMT_LOAD_LONG_TERM_KEYS_SIZE },
4359 { disconnect, false, MGMT_DISCONNECT_SIZE },
4360 { get_connections, false, MGMT_GET_CONNECTIONS_SIZE },
4361 { pin_code_reply, false, MGMT_PIN_CODE_REPLY_SIZE },
4362 { pin_code_neg_reply, false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
4363 { set_io_capability, false, MGMT_SET_IO_CAPABILITY_SIZE },
4364 { pair_device, false, MGMT_PAIR_DEVICE_SIZE },
4365 { cancel_pair_device, false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
4366 { unpair_device, false, MGMT_UNPAIR_DEVICE_SIZE },
4367 { user_confirm_reply, false, MGMT_USER_CONFIRM_REPLY_SIZE },
4368 { user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
4369 { user_passkey_reply, false, MGMT_USER_PASSKEY_REPLY_SIZE },
4370 { user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
4371 { read_local_oob_data, false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
ec109113 4372 { add_remote_oob_data, true, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
be22b54e
JH
4373 { remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
4374 { start_discovery, false, MGMT_START_DISCOVERY_SIZE },
4375 { stop_discovery, false, MGMT_STOP_DISCOVERY_SIZE },
4376 { confirm_name, false, MGMT_CONFIRM_NAME_SIZE },
4377 { block_device, false, MGMT_BLOCK_DEVICE_SIZE },
4378 { unblock_device, false, MGMT_UNBLOCK_DEVICE_SIZE },
cdbaccca 4379 { set_device_id, false, MGMT_SET_DEVICE_ID_SIZE },
4375f103 4380 { set_advertising, false, MGMT_SETTING_SIZE },
0663ca2a 4381 { set_bredr, false, MGMT_SETTING_SIZE },
d13eafce 4382 { set_static_address, false, MGMT_SET_STATIC_ADDRESS_SIZE },
14b49b9a 4383 { set_scan_params, false, MGMT_SET_SCAN_PARAMS_SIZE },
eac83dc6 4384 { set_secure_conn, false, MGMT_SETTING_SIZE },
4e39ac81 4385 { set_debug_keys, false, MGMT_SETTING_SIZE },
41edf160
JH
4386 { },
4387 { load_irks, true, MGMT_LOAD_IRKS_SIZE },
0f4e68cf
JH
4388};
4389
4390
0381101f
JH
4391int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
4392{
650f726d
VCG
4393 void *buf;
4394 u8 *cp;
0381101f 4395 struct mgmt_hdr *hdr;
4e51eae9 4396 u16 opcode, index, len;
bdb6d971 4397 struct hci_dev *hdev = NULL;
2e3c35ea 4398 const struct mgmt_handler *handler;
0381101f
JH
4399 int err;
4400
4401 BT_DBG("got %zu bytes", msglen);
4402
4403 if (msglen < sizeof(*hdr))
4404 return -EINVAL;
4405
e63a15ec 4406 buf = kmalloc(msglen, GFP_KERNEL);
0381101f
JH
4407 if (!buf)
4408 return -ENOMEM;
4409
4410 if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
4411 err = -EFAULT;
4412 goto done;
4413 }
4414
650f726d 4415 hdr = buf;
1f350c87
MH
4416 opcode = __le16_to_cpu(hdr->opcode);
4417 index = __le16_to_cpu(hdr->index);
4418 len = __le16_to_cpu(hdr->len);
0381101f
JH
4419
4420 if (len != msglen - sizeof(*hdr)) {
4421 err = -EINVAL;
4422 goto done;
4423 }
4424
0f4e68cf 4425 if (index != MGMT_INDEX_NONE) {
bdb6d971
JH
4426 hdev = hci_dev_get(index);
4427 if (!hdev) {
4428 err = cmd_status(sk, index, opcode,
04124681 4429 MGMT_STATUS_INVALID_INDEX);
bdb6d971
JH
4430 goto done;
4431 }
0736cfa8 4432
cebf4cfd
JH
4433 if (test_bit(HCI_SETUP, &hdev->dev_flags) ||
4434 test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
0736cfa8
MH
4435 err = cmd_status(sk, index, opcode,
4436 MGMT_STATUS_INVALID_INDEX);
4437 goto done;
4438 }
bdb6d971
JH
4439 }
4440
0f4e68cf 4441 if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
8ce8e2b5 4442 mgmt_handlers[opcode].func == NULL) {
0381101f 4443 BT_DBG("Unknown op %u", opcode);
ca69b795 4444 err = cmd_status(sk, index, opcode,
04124681 4445 MGMT_STATUS_UNKNOWN_COMMAND);
0f4e68cf
JH
4446 goto done;
4447 }
4448
4449 if ((hdev && opcode < MGMT_OP_READ_INFO) ||
8ce8e2b5 4450 (!hdev && opcode >= MGMT_OP_READ_INFO)) {
0f4e68cf 4451 err = cmd_status(sk, index, opcode,
04124681 4452 MGMT_STATUS_INVALID_INDEX);
0f4e68cf 4453 goto done;
0381101f
JH
4454 }
4455
be22b54e
JH
4456 handler = &mgmt_handlers[opcode];
4457
4458 if ((handler->var_len && len < handler->data_len) ||
8ce8e2b5 4459 (!handler->var_len && len != handler->data_len)) {
be22b54e 4460 err = cmd_status(sk, index, opcode,
04124681 4461 MGMT_STATUS_INVALID_PARAMS);
be22b54e
JH
4462 goto done;
4463 }
4464
0f4e68cf
JH
4465 if (hdev)
4466 mgmt_init_hdev(sk, hdev);
4467
4468 cp = buf + sizeof(*hdr);
4469
be22b54e 4470 err = handler->func(sk, hdev, cp, len);
e41d8b4e
JH
4471 if (err < 0)
4472 goto done;
4473
0381101f
JH
4474 err = msglen;
4475
4476done:
bdb6d971
JH
4477 if (hdev)
4478 hci_dev_put(hdev);
4479
0381101f
JH
4480 kfree(buf);
4481 return err;
4482}
c71e97bf 4483
bf6b56db 4484void mgmt_index_added(struct hci_dev *hdev)
c71e97bf 4485{
1514b892 4486 if (hdev->dev_type != HCI_BREDR)
bf6b56db 4487 return;
bb4b2a9a 4488
bf6b56db 4489 mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
c71e97bf
JH
4490}
4491
bf6b56db 4492void mgmt_index_removed(struct hci_dev *hdev)
c71e97bf 4493{
5f159032 4494 u8 status = MGMT_STATUS_INVALID_INDEX;
b24752fe 4495
1514b892 4496 if (hdev->dev_type != HCI_BREDR)
bf6b56db 4497 return;
bb4b2a9a 4498
744cf19e 4499 mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
b24752fe 4500
bf6b56db 4501 mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
eec8d2bc
JH
4502}
4503
229ab39c
JH
4504static void powered_complete(struct hci_dev *hdev, u8 status)
4505{
4506 struct cmd_lookup match = { NULL, hdev };
4507
4508 BT_DBG("status 0x%02x", status);
4509
4510 hci_dev_lock(hdev);
4511
4512 mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
4513
4514 new_settings(hdev, match.sk);
4515
4516 hci_dev_unlock(hdev);
4517
4518 if (match.sk)
4519 sock_put(match.sk);
4520}
4521
70da6243 4522static int powered_update_hci(struct hci_dev *hdev)
5add6af8 4523{
890ea898 4524 struct hci_request req;
70da6243 4525 u8 link_sec;
5add6af8 4526
890ea898
JH
4527 hci_req_init(&req, hdev);
4528
70da6243
JH
4529 if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
4530 !lmp_host_ssp_capable(hdev)) {
4531 u8 ssp = 1;
5e5282bb 4532
890ea898 4533 hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
70da6243 4534 }
5add6af8 4535
c73eee91
JH
4536 if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
4537 lmp_bredr_capable(hdev)) {
70da6243 4538 struct hci_cp_write_le_host_supported cp;
f0ff92fb 4539
70da6243
JH
4540 cp.le = 1;
4541 cp.simul = lmp_le_br_capable(hdev);
3d1cbdd6 4542
70da6243
JH
4543 /* Check first if we already have the right
4544 * host state (host features set)
4545 */
4546 if (cp.le != lmp_host_le_capable(hdev) ||
4547 cp.simul != lmp_host_le_br_capable(hdev))
890ea898
JH
4548 hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
4549 sizeof(cp), &cp);
70da6243 4550 }
3d1cbdd6 4551
d13eafce
MH
4552 if (lmp_le_capable(hdev)) {
4553 /* Set random address to static address if configured */
4554 if (bacmp(&hdev->static_addr, BDADDR_ANY))
4555 hci_req_add(&req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
4556 &hdev->static_addr);
eeca6f89 4557
441ad2d0
MH
4558 /* Make sure the controller has a good default for
4559 * advertising data. This also applies to the case
4560 * where BR/EDR was toggled during the AUTO_OFF phase.
4561 */
f14d8f64 4562 if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
5947f4bc 4563 update_adv_data(&req);
f14d8f64
MH
4564 update_scan_rsp_data(&req);
4565 }
441ad2d0 4566
bba3aa55
MH
4567 if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
4568 enable_advertising(&req);
eeca6f89
JH
4569 }
4570
70da6243
JH
4571 link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
4572 if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
890ea898
JH
4573 hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
4574 sizeof(link_sec), &link_sec);
562fcc24 4575
70da6243 4576 if (lmp_bredr_capable(hdev)) {
56f87901
JH
4577 if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
4578 set_bredr_scan(&req);
890ea898 4579 update_class(&req);
13928971 4580 update_name(&req);
890ea898 4581 update_eir(&req);
70da6243 4582 }
562fcc24 4583
229ab39c 4584 return hci_req_run(&req, powered_complete);
70da6243 4585}
562fcc24 4586
70da6243
JH
4587int mgmt_powered(struct hci_dev *hdev, u8 powered)
4588{
4589 struct cmd_lookup match = { NULL, hdev };
229ab39c
JH
4590 u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
4591 u8 zero_cod[] = { 0, 0, 0 };
70da6243 4592 int err;
f0ff92fb 4593
70da6243
JH
4594 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
4595 return 0;
4596
70da6243 4597 if (powered) {
229ab39c
JH
4598 if (powered_update_hci(hdev) == 0)
4599 return 0;
fe038884 4600
229ab39c
JH
4601 mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
4602 &match);
4603 goto new_settings;
b24752fe
JH
4604 }
4605
229ab39c
JH
4606 mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
4607 mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);
4608
4609 if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
4610 mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
4611 zero_cod, sizeof(zero_cod), NULL);
4612
4613new_settings:
beadb2bd 4614 err = new_settings(hdev, match.sk);
eec8d2bc
JH
4615
4616 if (match.sk)
4617 sock_put(match.sk);
4618
7bb895d6 4619 return err;
5add6af8 4620}
73f22f62 4621
3eec705e 4622void mgmt_set_powered_failed(struct hci_dev *hdev, int err)
96570ffc
JH
4623{
4624 struct pending_cmd *cmd;
4625 u8 status;
4626
4627 cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
4628 if (!cmd)
3eec705e 4629 return;
96570ffc
JH
4630
4631 if (err == -ERFKILL)
4632 status = MGMT_STATUS_RFKILLED;
4633 else
4634 status = MGMT_STATUS_FAILED;
4635
3eec705e 4636 cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);
96570ffc
JH
4637
4638 mgmt_pending_remove(cmd);
96570ffc
JH
4639}
4640
d1967ff8
MH
4641void mgmt_discoverable_timeout(struct hci_dev *hdev)
4642{
4643 struct hci_request req;
d1967ff8
MH
4644
4645 hci_dev_lock(hdev);
4646
4647 /* When discoverable timeout triggers, then just make sure
4648 * the limited discoverable flag is cleared. Even in the case
4649 * of a timeout triggered from general discoverable, it is
4650 * safe to unconditionally clear the flag.
4651 */
4652 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
9a43e25f 4653 clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
d1967ff8
MH
4654
4655 hci_req_init(&req, hdev);
4b580614
JH
4656 if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
4657 u8 scan = SCAN_PAGE;
4658 hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE,
4659 sizeof(scan), &scan);
4660 }
d1967ff8 4661 update_class(&req);
9a43e25f 4662 update_adv_data(&req);
d1967ff8
MH
4663 hci_req_run(&req, NULL);
4664
4665 hdev->discov_timeout = 0;
4666
9a43e25f
JH
4667 new_settings(hdev, NULL);
4668
d1967ff8
MH
4669 hci_dev_unlock(hdev);
4670}
4671
86a75645 4672void mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
73f22f62 4673{
86a75645 4674 bool changed;
73f22f62 4675
bfaf8c9f
JH
4676 /* Nothing needed here if there's a pending command since that
4677 * commands request completion callback takes care of everything
4678 * necessary.
4679 */
4680 if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev))
86a75645 4681 return;
bfaf8c9f 4682
9a43e25f 4683 if (discoverable) {
86a75645 4684 changed = !test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
9a43e25f
JH
4685 } else {
4686 clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
86a75645 4687 changed = test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
9a43e25f
JH
4688 }
4689
4690 if (changed) {
4691 struct hci_request req;
4692
4693 /* In case this change in discoverable was triggered by
4694 * a disabling of connectable there could be a need to
4695 * update the advertising flags.
4696 */
4697 hci_req_init(&req, hdev);
4698 update_adv_data(&req);
4699 hci_req_run(&req, NULL);
73f22f62 4700
86a75645 4701 new_settings(hdev, NULL);
9a43e25f 4702 }
73f22f62 4703}
9fbcbb45 4704
a330916c 4705void mgmt_connectable(struct hci_dev *hdev, u8 connectable)
9fbcbb45 4706{
a330916c 4707 bool changed;
9fbcbb45 4708
d7b856f9
JH
4709 /* Nothing needed here if there's a pending command since that
4710 * commands request completion callback takes care of everything
4711 * necessary.
4712 */
4713 if (mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev))
a330916c 4714 return;
d7b856f9 4715
a330916c
MH
4716 if (connectable)
4717 changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
4718 else
4719 changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
9fbcbb45 4720
beadb2bd 4721 if (changed)
a330916c 4722 new_settings(hdev, NULL);
9fbcbb45 4723}
55ed8ca1 4724
4796e8af 4725void mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2d7cee58 4726{
ca69b795
JH
4727 u8 mgmt_err = mgmt_status(status);
4728
2d7cee58 4729 if (scan & SCAN_PAGE)
744cf19e 4730 mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
04124681 4731 cmd_status_rsp, &mgmt_err);
2d7cee58
JH
4732
4733 if (scan & SCAN_INQUIRY)
744cf19e 4734 mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
04124681 4735 cmd_status_rsp, &mgmt_err);
2d7cee58
JH
4736}
4737
dc4a5ee2
MH
4738void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
4739 bool persistent)
55ed8ca1 4740{
86742e1e 4741 struct mgmt_ev_new_link_key ev;
55ed8ca1 4742
a492cd52 4743 memset(&ev, 0, sizeof(ev));
55ed8ca1 4744
a492cd52 4745 ev.store_hint = persistent;
d753fdc4 4746 bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
591f47f3 4747 ev.key.addr.type = BDADDR_BREDR;
a492cd52 4748 ev.key.type = key->type;
9b3b4460 4749 memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
a492cd52 4750 ev.key.pin_len = key->pin_len;
55ed8ca1 4751
dc4a5ee2 4752 mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
55ed8ca1 4753}
f7520543 4754
083368f7 4755void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
346af67b
VCG
4756{
4757 struct mgmt_ev_new_long_term_key ev;
4758
4759 memset(&ev, 0, sizeof(ev));
4760
4761 ev.store_hint = persistent;
4762 bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
57c1477c 4763 ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
d40f3eef 4764 ev.key.type = key->authenticated;
346af67b
VCG
4765 ev.key.enc_size = key->enc_size;
4766 ev.key.ediv = key->ediv;
4767
4768 if (key->type == HCI_SMP_LTK)
4769 ev.key.master = 1;
4770
4771 memcpy(ev.key.rand, key->rand, sizeof(key->rand));
4772 memcpy(ev.key.val, key->val, sizeof(key->val));
4773
083368f7 4774 mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL);
346af67b
VCG
4775}
4776
94933991
MH
4777static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data,
4778 u8 data_len)
4779{
4780 eir[eir_len++] = sizeof(type) + data_len;
4781 eir[eir_len++] = type;
4782 memcpy(&eir[eir_len], data, data_len);
4783 eir_len += data_len;
4784
4785 return eir_len;
4786}
4787
ecd90ae7
MH
4788void mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4789 u8 addr_type, u32 flags, u8 *name, u8 name_len,
4790 u8 *dev_class)
f7520543 4791{
b644ba33
JH
4792 char buf[512];
4793 struct mgmt_ev_device_connected *ev = (void *) buf;
4794 u16 eir_len = 0;
f7520543 4795
b644ba33 4796 bacpy(&ev->addr.bdaddr, bdaddr);
57c1477c 4797 ev->addr.type = link_to_bdaddr(link_type, addr_type);
f7520543 4798
c95f0ba7 4799 ev->flags = __cpu_to_le32(flags);
08c79b61 4800
b644ba33
JH
4801 if (name_len > 0)
4802 eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
04124681 4803 name, name_len);
b644ba33
JH
4804
4805 if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
53156385 4806 eir_len = eir_append_data(ev->eir, eir_len,
04124681 4807 EIR_CLASS_OF_DEV, dev_class, 3);
b644ba33 4808
eb55ef07 4809 ev->eir_len = cpu_to_le16(eir_len);
b644ba33 4810
ecd90ae7
MH
4811 mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
4812 sizeof(*ev) + eir_len, NULL);
f7520543
JH
4813}
4814
8962ee74
JH
4815static void disconnect_rsp(struct pending_cmd *cmd, void *data)
4816{
c68fb7ff 4817 struct mgmt_cp_disconnect *cp = cmd->param;
8962ee74 4818 struct sock **sk = data;
a38528f1 4819 struct mgmt_rp_disconnect rp;
8962ee74 4820
88c3df13
JH
4821 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
4822 rp.addr.type = cp->addr.type;
8962ee74 4823
aee9b218 4824 cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
04124681 4825 sizeof(rp));
8962ee74
JH
4826
4827 *sk = cmd->sk;
4828 sock_hold(*sk);
4829
a664b5bc 4830 mgmt_pending_remove(cmd);
8962ee74
JH
4831}
4832
124f6e35 4833static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
a8a1d19e 4834{
b1078ad0 4835 struct hci_dev *hdev = data;
124f6e35
JH
4836 struct mgmt_cp_unpair_device *cp = cmd->param;
4837 struct mgmt_rp_unpair_device rp;
a8a1d19e
JH
4838
4839 memset(&rp, 0, sizeof(rp));
124f6e35
JH
4840 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
4841 rp.addr.type = cp->addr.type;
a8a1d19e 4842
b1078ad0
JH
4843 device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);
4844
aee9b218 4845 cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
a8a1d19e
JH
4846
4847 mgmt_pending_remove(cmd);
4848}
4849
9b80ec5e
MH
4850void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
4851 u8 link_type, u8 addr_type, u8 reason)
f7520543 4852{
f0d6a0ea 4853 struct mgmt_ev_device_disconnected ev;
8962ee74 4854 struct sock *sk = NULL;
8962ee74 4855
57eb776f
AG
4856 if (link_type != ACL_LINK && link_type != LE_LINK)
4857 return;
4858
744cf19e 4859 mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
f7520543 4860
f0d6a0ea
MA
4861 bacpy(&ev.addr.bdaddr, bdaddr);
4862 ev.addr.type = link_to_bdaddr(link_type, addr_type);
4863 ev.reason = reason;
f7520543 4864
9b80ec5e 4865 mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
8962ee74
JH
4866
4867 if (sk)
d97dcb66 4868 sock_put(sk);
8962ee74 4869
124f6e35 4870 mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
04124681 4871 hdev);
8962ee74
JH
4872}
4873
7892924c
MH
4874void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
4875 u8 link_type, u8 addr_type, u8 status)
8962ee74 4876{
3655bba8
AG
4877 u8 bdaddr_type = link_to_bdaddr(link_type, addr_type);
4878 struct mgmt_cp_disconnect *cp;
88c3df13 4879 struct mgmt_rp_disconnect rp;
8962ee74 4880 struct pending_cmd *cmd;
8962ee74 4881
36a75f1b
JD
4882 mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
4883 hdev);
4884
2e58ef3e 4885 cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
8962ee74 4886 if (!cmd)
7892924c 4887 return;
8962ee74 4888
3655bba8
AG
4889 cp = cmd->param;
4890
4891 if (bacmp(bdaddr, &cp->addr.bdaddr))
4892 return;
4893
4894 if (cp->addr.type != bdaddr_type)
4895 return;
4896
88c3df13 4897 bacpy(&rp.addr.bdaddr, bdaddr);
3655bba8 4898 rp.addr.type = bdaddr_type;
37d9ef76 4899
7892924c
MH
4900 cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
4901 mgmt_status(status), &rp, sizeof(rp));
8962ee74 4902
a664b5bc 4903 mgmt_pending_remove(cmd);
f7520543 4904}
17d5c04c 4905
445608d0
MH
4906void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4907 u8 addr_type, u8 status)
17d5c04c
JH
4908{
4909 struct mgmt_ev_connect_failed ev;
4910
4c659c39 4911 bacpy(&ev.addr.bdaddr, bdaddr);
57c1477c 4912 ev.addr.type = link_to_bdaddr(link_type, addr_type);
ca69b795 4913 ev.status = mgmt_status(status);
17d5c04c 4914
445608d0 4915 mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
17d5c04c 4916}
980e1a53 4917
ce0e4a0d 4918void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
980e1a53
JH
4919{
4920 struct mgmt_ev_pin_code_request ev;
4921
d8457698 4922 bacpy(&ev.addr.bdaddr, bdaddr);
591f47f3 4923 ev.addr.type = BDADDR_BREDR;
a770bb5a 4924 ev.secure = secure;
980e1a53 4925
ce0e4a0d 4926 mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL);
980e1a53
JH
4927}
4928
e669cf80
MH
4929void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4930 u8 status)
980e1a53
JH
4931{
4932 struct pending_cmd *cmd;
ac56fb13 4933 struct mgmt_rp_pin_code_reply rp;
980e1a53 4934
2e58ef3e 4935 cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
980e1a53 4936 if (!cmd)
e669cf80 4937 return;
980e1a53 4938
d8457698 4939 bacpy(&rp.addr.bdaddr, bdaddr);
591f47f3 4940 rp.addr.type = BDADDR_BREDR;
ac56fb13 4941
e669cf80
MH
4942 cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
4943 mgmt_status(status), &rp, sizeof(rp));
980e1a53 4944
a664b5bc 4945 mgmt_pending_remove(cmd);
980e1a53
JH
4946}
4947
3eb38528
MH
4948void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4949 u8 status)
980e1a53
JH
4950{
4951 struct pending_cmd *cmd;
ac56fb13 4952 struct mgmt_rp_pin_code_reply rp;
980e1a53 4953
2e58ef3e 4954 cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
980e1a53 4955 if (!cmd)
3eb38528 4956 return;
980e1a53 4957
d8457698 4958 bacpy(&rp.addr.bdaddr, bdaddr);
591f47f3 4959 rp.addr.type = BDADDR_BREDR;
ac56fb13 4960
3eb38528
MH
4961 cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
4962 mgmt_status(status), &rp, sizeof(rp));
980e1a53 4963
a664b5bc 4964 mgmt_pending_remove(cmd);
980e1a53 4965}
a5c29683 4966
744cf19e 4967int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681
GP
4968 u8 link_type, u8 addr_type, __le32 value,
4969 u8 confirm_hint)
a5c29683
JH
4970{
4971 struct mgmt_ev_user_confirm_request ev;
4972
744cf19e 4973 BT_DBG("%s", hdev->name);
a5c29683 4974
272d90df 4975 bacpy(&ev.addr.bdaddr, bdaddr);
57c1477c 4976 ev.addr.type = link_to_bdaddr(link_type, addr_type);
55bc1a37 4977 ev.confirm_hint = confirm_hint;
78e8098e 4978 ev.value = value;
a5c29683 4979
744cf19e 4980 return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
04124681 4981 NULL);
a5c29683
JH
4982}
4983
272d90df 4984int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
8ce8e2b5 4985 u8 link_type, u8 addr_type)
604086b7
BG
4986{
4987 struct mgmt_ev_user_passkey_request ev;
4988
4989 BT_DBG("%s", hdev->name);
4990
272d90df 4991 bacpy(&ev.addr.bdaddr, bdaddr);
57c1477c 4992 ev.addr.type = link_to_bdaddr(link_type, addr_type);
604086b7
BG
4993
4994 return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
04124681 4995 NULL);
604086b7
BG
4996}
4997
0df4c185 4998static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
8ce8e2b5
GP
4999 u8 link_type, u8 addr_type, u8 status,
5000 u8 opcode)
a5c29683
JH
5001{
5002 struct pending_cmd *cmd;
5003 struct mgmt_rp_user_confirm_reply rp;
5004 int err;
5005
2e58ef3e 5006 cmd = mgmt_pending_find(opcode, hdev);
a5c29683
JH
5007 if (!cmd)
5008 return -ENOENT;
5009
272d90df 5010 bacpy(&rp.addr.bdaddr, bdaddr);
57c1477c 5011 rp.addr.type = link_to_bdaddr(link_type, addr_type);
aee9b218 5012 err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
04124681 5013 &rp, sizeof(rp));
a5c29683 5014
a664b5bc 5015 mgmt_pending_remove(cmd);
a5c29683
JH
5016
5017 return err;
5018}
5019
744cf19e 5020int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681 5021 u8 link_type, u8 addr_type, u8 status)
a5c29683 5022{
272d90df 5023 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
04124681 5024 status, MGMT_OP_USER_CONFIRM_REPLY);
a5c29683
JH
5025}
5026
272d90df 5027int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681 5028 u8 link_type, u8 addr_type, u8 status)
a5c29683 5029{
272d90df 5030 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
8fc9ced3
GP
5031 status,
5032 MGMT_OP_USER_CONFIRM_NEG_REPLY);
a5c29683 5033}
2a611692 5034
604086b7 5035int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681 5036 u8 link_type, u8 addr_type, u8 status)
604086b7 5037{
272d90df 5038 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
04124681 5039 status, MGMT_OP_USER_PASSKEY_REPLY);
604086b7
BG
5040}
5041
272d90df 5042int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
04124681 5043 u8 link_type, u8 addr_type, u8 status)
604086b7 5044{
272d90df 5045 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
8fc9ced3
GP
5046 status,
5047 MGMT_OP_USER_PASSKEY_NEG_REPLY);
604086b7
BG
5048}
5049
92a25256
JH
5050int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
5051 u8 link_type, u8 addr_type, u32 passkey,
5052 u8 entered)
5053{
5054 struct mgmt_ev_passkey_notify ev;
5055
5056 BT_DBG("%s", hdev->name);
5057
5058 bacpy(&ev.addr.bdaddr, bdaddr);
5059 ev.addr.type = link_to_bdaddr(link_type, addr_type);
5060 ev.passkey = __cpu_to_le32(passkey);
5061 ev.entered = entered;
5062
5063 return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
5064}
5065
e546099c
MH
5066void mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
5067 u8 addr_type, u8 status)
2a611692
JH
5068{
5069 struct mgmt_ev_auth_failed ev;
5070
bab73cb6 5071 bacpy(&ev.addr.bdaddr, bdaddr);
57c1477c 5072 ev.addr.type = link_to_bdaddr(link_type, addr_type);
ca69b795 5073 ev.status = mgmt_status(status);
2a611692 5074
e546099c 5075 mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
2a611692 5076}
b312b161 5077
464996ae 5078void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
33ef95ed
JH
5079{
5080 struct cmd_lookup match = { NULL, hdev };
464996ae 5081 bool changed;
33ef95ed
JH
5082
5083 if (status) {
5084 u8 mgmt_err = mgmt_status(status);
5085 mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
04124681 5086 cmd_status_rsp, &mgmt_err);
464996ae 5087 return;
33ef95ed
JH
5088 }
5089
464996ae
MH
5090 if (test_bit(HCI_AUTH, &hdev->flags))
5091 changed = !test_and_set_bit(HCI_LINK_SECURITY,
5092 &hdev->dev_flags);
5093 else
5094 changed = test_and_clear_bit(HCI_LINK_SECURITY,
5095 &hdev->dev_flags);
47990ea0 5096
33ef95ed 5097 mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
04124681 5098 &match);
33ef95ed 5099
47990ea0 5100 if (changed)
464996ae 5101 new_settings(hdev, match.sk);
33ef95ed
JH
5102
5103 if (match.sk)
5104 sock_put(match.sk);
33ef95ed
JH
5105}
5106
890ea898 5107static void clear_eir(struct hci_request *req)
cacaf52f 5108{
890ea898 5109 struct hci_dev *hdev = req->hdev;
cacaf52f
JH
5110 struct hci_cp_write_eir cp;
5111
976eb20e 5112 if (!lmp_ext_inq_capable(hdev))
890ea898 5113 return;
cacaf52f 5114
c80da27e
JH
5115 memset(hdev->eir, 0, sizeof(hdev->eir));
5116
cacaf52f
JH
5117 memset(&cp, 0, sizeof(cp));
5118
890ea898 5119 hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
cacaf52f
JH
5120}
5121
3e248560 5122void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
ed2c4ee3
JH
5123{
5124 struct cmd_lookup match = { NULL, hdev };
890ea898 5125 struct hci_request req;
c0ecddc2 5126 bool changed = false;
ed2c4ee3
JH
5127
5128 if (status) {
5129 u8 mgmt_err = mgmt_status(status);
c0ecddc2
JH
5130
5131 if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
9ecb3e24
MH
5132 &hdev->dev_flags)) {
5133 clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
3e248560 5134 new_settings(hdev, NULL);
9ecb3e24 5135 }
c0ecddc2 5136
04124681
GP
5137 mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
5138 &mgmt_err);
3e248560 5139 return;
c0ecddc2
JH
5140 }
5141
5142 if (enable) {
9ecb3e24 5143 changed = !test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
c0ecddc2 5144 } else {
9ecb3e24
MH
5145 changed = test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
5146 if (!changed)
5147 changed = test_and_clear_bit(HCI_HS_ENABLED,
5148 &hdev->dev_flags);
5149 else
5150 clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
ed2c4ee3
JH
5151 }
5152
5153 mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);
5154
c0ecddc2 5155 if (changed)
3e248560 5156 new_settings(hdev, match.sk);
ed2c4ee3 5157
5fc6ebb1 5158 if (match.sk)
ed2c4ee3
JH
5159 sock_put(match.sk);
5160
890ea898
JH
5161 hci_req_init(&req, hdev);
5162
5fc6ebb1 5163 if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
890ea898 5164 update_eir(&req);
5fc6ebb1 5165 else
890ea898
JH
5166 clear_eir(&req);
5167
5168 hci_req_run(&req, NULL);
ed2c4ee3
JH
5169}
5170
eac83dc6
MH
5171void mgmt_sc_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
5172{
5173 struct cmd_lookup match = { NULL, hdev };
5174 bool changed = false;
5175
5176 if (status) {
5177 u8 mgmt_err = mgmt_status(status);
5178
0ab04a9c
MH
5179 if (enable) {
5180 if (test_and_clear_bit(HCI_SC_ENABLED,
5181 &hdev->dev_flags))
5182 new_settings(hdev, NULL);
5183 clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
5184 }
eac83dc6
MH
5185
5186 mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
5187 cmd_status_rsp, &mgmt_err);
5188 return;
5189 }
5190
0ab04a9c 5191 if (enable) {
eac83dc6 5192 changed = !test_and_set_bit(HCI_SC_ENABLED, &hdev->dev_flags);
0ab04a9c 5193 } else {
eac83dc6 5194 changed = test_and_clear_bit(HCI_SC_ENABLED, &hdev->dev_flags);
0ab04a9c
MH
5195 clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
5196 }
eac83dc6
MH
5197
5198 mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
5199 settings_rsp, &match);
5200
5201 if (changed)
5202 new_settings(hdev, match.sk);
5203
5204 if (match.sk)
5205 sock_put(match.sk);
5206}
5207
92da6097 5208static void sk_lookup(struct pending_cmd *cmd, void *data)
90e70454
JH
5209{
5210 struct cmd_lookup *match = data;
5211
90e70454
JH
5212 if (match->sk == NULL) {
5213 match->sk = cmd->sk;
5214 sock_hold(match->sk);
5215 }
90e70454
JH
5216}
5217
4e1b0245
MH
5218void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
5219 u8 status)
7f9a903c 5220{
90e70454 5221 struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
7f9a903c 5222
92da6097
JH
5223 mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
5224 mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
5225 mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
90e70454
JH
5226
5227 if (!status)
4e1b0245
MH
5228 mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class, 3,
5229 NULL);
90e70454
JH
5230
5231 if (match.sk)
5232 sock_put(match.sk);
7f9a903c
MH
5233}
5234
7667da34 5235void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
b312b161 5236{
b312b161 5237 struct mgmt_cp_set_local_name ev;
13928971 5238 struct pending_cmd *cmd;
28cc7bde 5239
13928971 5240 if (status)
7667da34 5241 return;
b312b161
JH
5242
5243 memset(&ev, 0, sizeof(ev));
5244 memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
28cc7bde 5245 memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
b312b161 5246
2e58ef3e 5247 cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
13928971
JH
5248 if (!cmd) {
5249 memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
28cc7bde 5250
13928971
JH
5251 /* If this is a HCI command related to powering on the
5252 * HCI dev don't send any mgmt signals.
5253 */
5254 if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
7667da34 5255 return;
890ea898 5256 }
b312b161 5257
7667da34
MH
5258 mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
5259 cmd ? cmd->sk : NULL);
b312b161 5260}
c35938b2 5261
4d2d2796
MH
5262void mgmt_read_local_oob_data_complete(struct hci_dev *hdev, u8 *hash192,
5263 u8 *randomizer192, u8 *hash256,
5264 u8 *randomizer256, u8 status)
c35938b2
SJ
5265{
5266 struct pending_cmd *cmd;
c35938b2 5267
744cf19e 5268 BT_DBG("%s status %u", hdev->name, status);
c35938b2 5269
2e58ef3e 5270 cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
c35938b2 5271 if (!cmd)
3edaf092 5272 return;
c35938b2
SJ
5273
5274 if (status) {
3edaf092
MH
5275 cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
5276 mgmt_status(status));
c35938b2 5277 } else {
4d2d2796
MH
5278 if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
5279 hash256 && randomizer256) {
5280 struct mgmt_rp_read_local_oob_ext_data rp;
5281
5282 memcpy(rp.hash192, hash192, sizeof(rp.hash192));
5283 memcpy(rp.randomizer192, randomizer192,
5284 sizeof(rp.randomizer192));
c35938b2 5285
4d2d2796
MH
5286 memcpy(rp.hash256, hash256, sizeof(rp.hash256));
5287 memcpy(rp.randomizer256, randomizer256,
5288 sizeof(rp.randomizer256));
c35938b2 5289
4d2d2796
MH
5290 cmd_complete(cmd->sk, hdev->id,
5291 MGMT_OP_READ_LOCAL_OOB_DATA, 0,
5292 &rp, sizeof(rp));
5293 } else {
5294 struct mgmt_rp_read_local_oob_data rp;
5295
5296 memcpy(rp.hash, hash192, sizeof(rp.hash));
5297 memcpy(rp.randomizer, randomizer192,
5298 sizeof(rp.randomizer));
5299
5300 cmd_complete(cmd->sk, hdev->id,
5301 MGMT_OP_READ_LOCAL_OOB_DATA, 0,
5302 &rp, sizeof(rp));
5303 }
c35938b2
SJ
5304 }
5305
5306 mgmt_pending_remove(cmd);
c35938b2 5307}
e17acd40 5308
901801b9
MH
5309void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
5310 u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
5311 ssp, u8 *eir, u16 eir_len)
e17acd40 5312{
e319d2e7
JH
5313 char buf[512];
5314 struct mgmt_ev_device_found *ev = (void *) buf;
1dc06093 5315 size_t ev_size;
e17acd40 5316
12602d0c 5317 if (!hci_discovery_active(hdev))
901801b9 5318 return;
12602d0c 5319
1dc06093
JH
5320 /* Leave 5 bytes for a potential CoD field */
5321 if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
901801b9 5322 return;
7d262f86 5323
1dc06093
JH
5324 memset(buf, 0, sizeof(buf));
5325
e319d2e7 5326 bacpy(&ev->addr.bdaddr, bdaddr);
57c1477c 5327 ev->addr.type = link_to_bdaddr(link_type, addr_type);
e319d2e7 5328 ev->rssi = rssi;
9a395a80 5329 if (cfm_name)
612dfce9 5330 ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
388fc8fa 5331 if (!ssp)
612dfce9 5332 ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
e17acd40 5333
1dc06093 5334 if (eir_len > 0)
e319d2e7 5335 memcpy(ev->eir, eir, eir_len);
e17acd40 5336
1dc06093
JH
5337 if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
5338 eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
04124681 5339 dev_class, 3);
1dc06093 5340
eb55ef07 5341 ev->eir_len = cpu_to_le16(eir_len);
1dc06093 5342 ev_size = sizeof(*ev) + eir_len;
f8523598 5343
901801b9 5344 mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
e17acd40 5345}
a88a9652 5346
9cf12aee
MH
5347void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
5348 u8 addr_type, s8 rssi, u8 *name, u8 name_len)
a88a9652 5349{
b644ba33
JH
5350 struct mgmt_ev_device_found *ev;
5351 char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
5352 u16 eir_len;
a88a9652 5353
b644ba33 5354 ev = (struct mgmt_ev_device_found *) buf;
a88a9652 5355
b644ba33
JH
5356 memset(buf, 0, sizeof(buf));
5357
5358 bacpy(&ev->addr.bdaddr, bdaddr);
57c1477c 5359 ev->addr.type = link_to_bdaddr(link_type, addr_type);
b644ba33
JH
5360 ev->rssi = rssi;
5361
5362 eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
04124681 5363 name_len);
b644ba33 5364
eb55ef07 5365 ev->eir_len = cpu_to_le16(eir_len);
a88a9652 5366
9cf12aee 5367 mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL);
a88a9652 5368}
314b2381 5369
2f1e063b 5370void mgmt_discovering(struct hci_dev *hdev, u8 discovering)
314b2381 5371{
f963e8e9 5372 struct mgmt_ev_discovering ev;
164a6e78
JH
5373 struct pending_cmd *cmd;
5374
343fb145
AG
5375 BT_DBG("%s discovering %u", hdev->name, discovering);
5376
164a6e78 5377 if (discovering)
2e58ef3e 5378 cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
164a6e78 5379 else
2e58ef3e 5380 cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
164a6e78
JH
5381
5382 if (cmd != NULL) {
f808e166
JH
5383 u8 type = hdev->discovery.type;
5384
04124681
GP
5385 cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
5386 sizeof(type));
164a6e78
JH
5387 mgmt_pending_remove(cmd);
5388 }
5389
f963e8e9
JH
5390 memset(&ev, 0, sizeof(ev));
5391 ev.type = hdev->discovery.type;
5392 ev.discovering = discovering;
5393
2f1e063b 5394 mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
314b2381 5395}
5e762444 5396
88c1fe4b 5397int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
5e762444
AJ
5398{
5399 struct pending_cmd *cmd;
5400 struct mgmt_ev_device_blocked ev;
5401
2e58ef3e 5402 cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
5e762444 5403
88c1fe4b
JH
5404 bacpy(&ev.addr.bdaddr, bdaddr);
5405 ev.addr.type = type;
5e762444 5406
744cf19e 5407 return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
04124681 5408 cmd ? cmd->sk : NULL);
5e762444
AJ
5409}
5410
88c1fe4b 5411int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
5e762444
AJ
5412{
5413 struct pending_cmd *cmd;
5414 struct mgmt_ev_device_unblocked ev;
5415
2e58ef3e 5416 cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
5e762444 5417
88c1fe4b
JH
5418 bacpy(&ev.addr.bdaddr, bdaddr);
5419 ev.addr.type = type;
5e762444 5420
744cf19e 5421 return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
04124681 5422 cmd ? cmd->sk : NULL);
5e762444 5423}
5976e608
MH
5424
5425static void adv_enable_complete(struct hci_dev *hdev, u8 status)
5426{
5427 BT_DBG("%s status %u", hdev->name, status);
5428
5429 /* Clear the advertising mgmt setting if we failed to re-enable it */
5430 if (status) {
5431 clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
a6d811ed 5432 new_settings(hdev, NULL);
5976e608
MH
5433 }
5434}
5435
5436void mgmt_reenable_advertising(struct hci_dev *hdev)
5437{
5438 struct hci_request req;
5439
b145edcd 5440 if (hci_conn_num(hdev, LE_LINK) > 0)
5976e608
MH
5441 return;
5442
5443 if (!test_bit(HCI_ADVERTISING, &hdev->dev_flags))
5444 return;
5445
5446 hci_req_init(&req, hdev);
5447 enable_advertising(&req);
5448
5449 /* If this fails we have no option but to let user space know
5450 * that we've disabled advertising.
5451 */
5452 if (hci_req_run(&req, adv_enable_complete) < 0) {
5453 clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
a6d811ed 5454 new_settings(hdev, NULL);
5976e608
MH
5455 }
5456}
This page took 0.627327 seconds and 5 git commands to generate.