1 /* 2 BlueZ - Bluetooth protocol stack for Linux 3 4 Copyright (C) 2010 Nokia Corporation 5 Copyright (C) 2011-2012 Intel Corporation 6 7 This program is free software; you can redistribute it and/or modify 8 it under the terms of the GNU General Public License version 2 as 9 published by the Free Software Foundation; 10 11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS 12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. 14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY 15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES 16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 19 20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, 21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS 22 SOFTWARE IS DISCLAIMED. 23 */ 24 25 /* Bluetooth HCI Management interface */ 26 27 #include <linux/module.h> 28 #include <asm/unaligned.h> 29 30 #include <net/bluetooth/bluetooth.h> 31 #include <net/bluetooth/hci_core.h> 32 #include <net/bluetooth/hci_sock.h> 33 #include <net/bluetooth/l2cap.h> 34 #include <net/bluetooth/mgmt.h> 35 36 #include "hci_request.h" 37 #include "smp.h" 38 #include "mgmt_util.h" 39 #include "mgmt_config.h" 40 #include "msft.h" 41 #include "eir.h" 42 #include "aosp.h" 43 44 #define MGMT_VERSION 1 45 #define MGMT_REVISION 22 46 47 static const u16 mgmt_commands[] = { 48 MGMT_OP_READ_INDEX_LIST, 49 MGMT_OP_READ_INFO, 50 MGMT_OP_SET_POWERED, 51 MGMT_OP_SET_DISCOVERABLE, 52 MGMT_OP_SET_CONNECTABLE, 53 MGMT_OP_SET_FAST_CONNECTABLE, 54 MGMT_OP_SET_BONDABLE, 55 MGMT_OP_SET_LINK_SECURITY, 56 MGMT_OP_SET_SSP, 57 MGMT_OP_SET_HS, 58 MGMT_OP_SET_LE, 59 MGMT_OP_SET_DEV_CLASS, 60 MGMT_OP_SET_LOCAL_NAME, 61 MGMT_OP_ADD_UUID, 62 MGMT_OP_REMOVE_UUID, 63 MGMT_OP_LOAD_LINK_KEYS, 64 MGMT_OP_LOAD_LONG_TERM_KEYS, 65 MGMT_OP_DISCONNECT, 66 MGMT_OP_GET_CONNECTIONS, 67 MGMT_OP_PIN_CODE_REPLY, 68 MGMT_OP_PIN_CODE_NEG_REPLY, 69 MGMT_OP_SET_IO_CAPABILITY, 70 MGMT_OP_PAIR_DEVICE, 71 MGMT_OP_CANCEL_PAIR_DEVICE, 72 MGMT_OP_UNPAIR_DEVICE, 73 MGMT_OP_USER_CONFIRM_REPLY, 74 MGMT_OP_USER_CONFIRM_NEG_REPLY, 75 MGMT_OP_USER_PASSKEY_REPLY, 76 MGMT_OP_USER_PASSKEY_NEG_REPLY, 77 MGMT_OP_READ_LOCAL_OOB_DATA, 78 MGMT_OP_ADD_REMOTE_OOB_DATA, 79 MGMT_OP_REMOVE_REMOTE_OOB_DATA, 80 MGMT_OP_START_DISCOVERY, 81 MGMT_OP_STOP_DISCOVERY, 82 MGMT_OP_CONFIRM_NAME, 83 MGMT_OP_BLOCK_DEVICE, 84 MGMT_OP_UNBLOCK_DEVICE, 85 MGMT_OP_SET_DEVICE_ID, 86 MGMT_OP_SET_ADVERTISING, 87 MGMT_OP_SET_BREDR, 88 MGMT_OP_SET_STATIC_ADDRESS, 89 MGMT_OP_SET_SCAN_PARAMS, 90 MGMT_OP_SET_SECURE_CONN, 91 MGMT_OP_SET_DEBUG_KEYS, 92 MGMT_OP_SET_PRIVACY, 93 MGMT_OP_LOAD_IRKS, 94 MGMT_OP_GET_CONN_INFO, 95 MGMT_OP_GET_CLOCK_INFO, 96 MGMT_OP_ADD_DEVICE, 97 MGMT_OP_REMOVE_DEVICE, 98 MGMT_OP_LOAD_CONN_PARAM, 99 MGMT_OP_READ_UNCONF_INDEX_LIST, 100 MGMT_OP_READ_CONFIG_INFO, 101 MGMT_OP_SET_EXTERNAL_CONFIG, 102 MGMT_OP_SET_PUBLIC_ADDRESS, 103 MGMT_OP_START_SERVICE_DISCOVERY, 104 MGMT_OP_READ_LOCAL_OOB_EXT_DATA, 105 MGMT_OP_READ_EXT_INDEX_LIST, 106 MGMT_OP_READ_ADV_FEATURES, 107 MGMT_OP_ADD_ADVERTISING, 108 MGMT_OP_REMOVE_ADVERTISING, 109 MGMT_OP_GET_ADV_SIZE_INFO, 110 MGMT_OP_START_LIMITED_DISCOVERY, 111 MGMT_OP_READ_EXT_INFO, 112 MGMT_OP_SET_APPEARANCE, 113 MGMT_OP_GET_PHY_CONFIGURATION, 114 MGMT_OP_SET_PHY_CONFIGURATION, 115 MGMT_OP_SET_BLOCKED_KEYS, 116 MGMT_OP_SET_WIDEBAND_SPEECH, 117 MGMT_OP_READ_CONTROLLER_CAP, 118 MGMT_OP_READ_EXP_FEATURES_INFO, 119 MGMT_OP_SET_EXP_FEATURE, 120 MGMT_OP_READ_DEF_SYSTEM_CONFIG, 121 MGMT_OP_SET_DEF_SYSTEM_CONFIG, 122 MGMT_OP_READ_DEF_RUNTIME_CONFIG, 123 MGMT_OP_SET_DEF_RUNTIME_CONFIG, 124 MGMT_OP_GET_DEVICE_FLAGS, 125 MGMT_OP_SET_DEVICE_FLAGS, 126 MGMT_OP_READ_ADV_MONITOR_FEATURES, 127 MGMT_OP_ADD_ADV_PATTERNS_MONITOR, 128 MGMT_OP_REMOVE_ADV_MONITOR, 129 MGMT_OP_ADD_EXT_ADV_PARAMS, 130 MGMT_OP_ADD_EXT_ADV_DATA, 131 MGMT_OP_ADD_ADV_PATTERNS_MONITOR_RSSI, 132 }; 133 134 static const u16 mgmt_events[] = { 135 MGMT_EV_CONTROLLER_ERROR, 136 MGMT_EV_INDEX_ADDED, 137 MGMT_EV_INDEX_REMOVED, 138 MGMT_EV_NEW_SETTINGS, 139 MGMT_EV_CLASS_OF_DEV_CHANGED, 140 MGMT_EV_LOCAL_NAME_CHANGED, 141 MGMT_EV_NEW_LINK_KEY, 142 MGMT_EV_NEW_LONG_TERM_KEY, 143 MGMT_EV_DEVICE_CONNECTED, 144 MGMT_EV_DEVICE_DISCONNECTED, 145 MGMT_EV_CONNECT_FAILED, 146 MGMT_EV_PIN_CODE_REQUEST, 147 MGMT_EV_USER_CONFIRM_REQUEST, 148 MGMT_EV_USER_PASSKEY_REQUEST, 149 MGMT_EV_AUTH_FAILED, 150 MGMT_EV_DEVICE_FOUND, 151 MGMT_EV_DISCOVERING, 152 MGMT_EV_DEVICE_BLOCKED, 153 MGMT_EV_DEVICE_UNBLOCKED, 154 MGMT_EV_DEVICE_UNPAIRED, 155 MGMT_EV_PASSKEY_NOTIFY, 156 MGMT_EV_NEW_IRK, 157 MGMT_EV_NEW_CSRK, 158 MGMT_EV_DEVICE_ADDED, 159 MGMT_EV_DEVICE_REMOVED, 160 MGMT_EV_NEW_CONN_PARAM, 161 MGMT_EV_UNCONF_INDEX_ADDED, 162 MGMT_EV_UNCONF_INDEX_REMOVED, 163 MGMT_EV_NEW_CONFIG_OPTIONS, 164 MGMT_EV_EXT_INDEX_ADDED, 165 MGMT_EV_EXT_INDEX_REMOVED, 166 MGMT_EV_LOCAL_OOB_DATA_UPDATED, 167 MGMT_EV_ADVERTISING_ADDED, 168 MGMT_EV_ADVERTISING_REMOVED, 169 MGMT_EV_EXT_INFO_CHANGED, 170 MGMT_EV_PHY_CONFIGURATION_CHANGED, 171 MGMT_EV_EXP_FEATURE_CHANGED, 172 MGMT_EV_DEVICE_FLAGS_CHANGED, 173 MGMT_EV_ADV_MONITOR_ADDED, 174 MGMT_EV_ADV_MONITOR_REMOVED, 175 MGMT_EV_CONTROLLER_SUSPEND, 176 MGMT_EV_CONTROLLER_RESUME, 177 MGMT_EV_ADV_MONITOR_DEVICE_FOUND, 178 MGMT_EV_ADV_MONITOR_DEVICE_LOST, 179 }; 180 181 static const u16 mgmt_untrusted_commands[] = { 182 MGMT_OP_READ_INDEX_LIST, 183 MGMT_OP_READ_INFO, 184 MGMT_OP_READ_UNCONF_INDEX_LIST, 185 MGMT_OP_READ_CONFIG_INFO, 186 MGMT_OP_READ_EXT_INDEX_LIST, 187 MGMT_OP_READ_EXT_INFO, 188 MGMT_OP_READ_CONTROLLER_CAP, 189 MGMT_OP_READ_EXP_FEATURES_INFO, 190 MGMT_OP_READ_DEF_SYSTEM_CONFIG, 191 MGMT_OP_READ_DEF_RUNTIME_CONFIG, 192 }; 193 194 static const u16 mgmt_untrusted_events[] = { 195 MGMT_EV_INDEX_ADDED, 196 MGMT_EV_INDEX_REMOVED, 197 MGMT_EV_NEW_SETTINGS, 198 MGMT_EV_CLASS_OF_DEV_CHANGED, 199 MGMT_EV_LOCAL_NAME_CHANGED, 200 MGMT_EV_UNCONF_INDEX_ADDED, 201 MGMT_EV_UNCONF_INDEX_REMOVED, 202 MGMT_EV_NEW_CONFIG_OPTIONS, 203 MGMT_EV_EXT_INDEX_ADDED, 204 MGMT_EV_EXT_INDEX_REMOVED, 205 MGMT_EV_EXT_INFO_CHANGED, 206 MGMT_EV_EXP_FEATURE_CHANGED, 207 }; 208 209 #define CACHE_TIMEOUT msecs_to_jiffies(2 * 1000) 210 211 #define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \ 212 "\x00\x00\x00\x00\x00\x00\x00\x00" 213 214 /* HCI to MGMT error code conversion table */ 215 static const u8 mgmt_status_table[] = { 216 MGMT_STATUS_SUCCESS, 217 MGMT_STATUS_UNKNOWN_COMMAND, /* Unknown Command */ 218 MGMT_STATUS_NOT_CONNECTED, /* No Connection */ 219 MGMT_STATUS_FAILED, /* Hardware Failure */ 220 MGMT_STATUS_CONNECT_FAILED, /* Page Timeout */ 221 MGMT_STATUS_AUTH_FAILED, /* Authentication Failed */ 222 MGMT_STATUS_AUTH_FAILED, /* PIN or Key Missing */ 223 MGMT_STATUS_NO_RESOURCES, /* Memory Full */ 224 MGMT_STATUS_TIMEOUT, /* Connection Timeout */ 225 MGMT_STATUS_NO_RESOURCES, /* Max Number of Connections */ 226 MGMT_STATUS_NO_RESOURCES, /* Max Number of SCO Connections */ 227 MGMT_STATUS_ALREADY_CONNECTED, /* ACL Connection Exists */ 228 MGMT_STATUS_BUSY, /* Command Disallowed */ 229 MGMT_STATUS_NO_RESOURCES, /* Rejected Limited Resources */ 230 MGMT_STATUS_REJECTED, /* Rejected Security */ 231 MGMT_STATUS_REJECTED, /* Rejected Personal */ 232 MGMT_STATUS_TIMEOUT, /* Host Timeout */ 233 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Feature */ 234 MGMT_STATUS_INVALID_PARAMS, /* Invalid Parameters */ 235 MGMT_STATUS_DISCONNECTED, /* OE User Ended Connection */ 236 MGMT_STATUS_NO_RESOURCES, /* OE Low Resources */ 237 MGMT_STATUS_DISCONNECTED, /* OE Power Off */ 238 MGMT_STATUS_DISCONNECTED, /* Connection Terminated */ 239 MGMT_STATUS_BUSY, /* Repeated Attempts */ 240 MGMT_STATUS_REJECTED, /* Pairing Not Allowed */ 241 MGMT_STATUS_FAILED, /* Unknown LMP PDU */ 242 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Remote Feature */ 243 MGMT_STATUS_REJECTED, /* SCO Offset Rejected */ 244 MGMT_STATUS_REJECTED, /* SCO Interval Rejected */ 245 MGMT_STATUS_REJECTED, /* Air Mode Rejected */ 246 MGMT_STATUS_INVALID_PARAMS, /* Invalid LMP Parameters */ 247 MGMT_STATUS_FAILED, /* Unspecified Error */ 248 MGMT_STATUS_NOT_SUPPORTED, /* Unsupported LMP Parameter Value */ 249 MGMT_STATUS_FAILED, /* Role Change Not Allowed */ 250 MGMT_STATUS_TIMEOUT, /* LMP Response Timeout */ 251 MGMT_STATUS_FAILED, /* LMP Error Transaction Collision */ 252 MGMT_STATUS_FAILED, /* LMP PDU Not Allowed */ 253 MGMT_STATUS_REJECTED, /* Encryption Mode Not Accepted */ 254 MGMT_STATUS_FAILED, /* Unit Link Key Used */ 255 MGMT_STATUS_NOT_SUPPORTED, /* QoS Not Supported */ 256 MGMT_STATUS_TIMEOUT, /* Instant Passed */ 257 MGMT_STATUS_NOT_SUPPORTED, /* Pairing Not Supported */ 258 MGMT_STATUS_FAILED, /* Transaction Collision */ 259 MGMT_STATUS_FAILED, /* Reserved for future use */ 260 MGMT_STATUS_INVALID_PARAMS, /* Unacceptable Parameter */ 261 MGMT_STATUS_REJECTED, /* QoS Rejected */ 262 MGMT_STATUS_NOT_SUPPORTED, /* Classification Not Supported */ 263 MGMT_STATUS_REJECTED, /* Insufficient Security */ 264 MGMT_STATUS_INVALID_PARAMS, /* Parameter Out Of Range */ 265 MGMT_STATUS_FAILED, /* Reserved for future use */ 266 MGMT_STATUS_BUSY, /* Role Switch Pending */ 267 MGMT_STATUS_FAILED, /* Reserved for future use */ 268 MGMT_STATUS_FAILED, /* Slot Violation */ 269 MGMT_STATUS_FAILED, /* Role Switch Failed */ 270 MGMT_STATUS_INVALID_PARAMS, /* EIR Too Large */ 271 MGMT_STATUS_NOT_SUPPORTED, /* Simple Pairing Not Supported */ 272 MGMT_STATUS_BUSY, /* Host Busy Pairing */ 273 MGMT_STATUS_REJECTED, /* Rejected, No Suitable Channel */ 274 MGMT_STATUS_BUSY, /* Controller Busy */ 275 MGMT_STATUS_INVALID_PARAMS, /* Unsuitable Connection Interval */ 276 MGMT_STATUS_TIMEOUT, /* Directed Advertising Timeout */ 277 MGMT_STATUS_AUTH_FAILED, /* Terminated Due to MIC Failure */ 278 MGMT_STATUS_CONNECT_FAILED, /* Connection Establishment Failed */ 279 MGMT_STATUS_CONNECT_FAILED, /* MAC Connection Failed */ 280 }; 281 282 static u8 mgmt_errno_status(int err) 283 { 284 switch (err) { 285 case 0: 286 return MGMT_STATUS_SUCCESS; 287 case -EPERM: 288 return MGMT_STATUS_REJECTED; 289 case -EINVAL: 290 return MGMT_STATUS_INVALID_PARAMS; 291 case -EOPNOTSUPP: 292 return MGMT_STATUS_NOT_SUPPORTED; 293 case -EBUSY: 294 return MGMT_STATUS_BUSY; 295 case -ETIMEDOUT: 296 return MGMT_STATUS_AUTH_FAILED; 297 case -ENOMEM: 298 return MGMT_STATUS_NO_RESOURCES; 299 case -EISCONN: 300 return MGMT_STATUS_ALREADY_CONNECTED; 301 case -ENOTCONN: 302 return MGMT_STATUS_DISCONNECTED; 303 } 304 305 return MGMT_STATUS_FAILED; 306 } 307 308 static u8 mgmt_status(int err) 309 { 310 if (err < 0) 311 return mgmt_errno_status(err); 312 313 if (err < ARRAY_SIZE(mgmt_status_table)) 314 return mgmt_status_table[err]; 315 316 return MGMT_STATUS_FAILED; 317 } 318 319 static int mgmt_index_event(u16 event, struct hci_dev *hdev, void *data, 320 u16 len, int flag) 321 { 322 return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, 323 flag, NULL); 324 } 325 326 static int mgmt_limited_event(u16 event, struct hci_dev *hdev, void *data, 327 u16 len, int flag, struct sock *skip_sk) 328 { 329 return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, 330 flag, skip_sk); 331 } 332 333 static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 len, 334 struct sock *skip_sk) 335 { 336 return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, 337 HCI_SOCK_TRUSTED, skip_sk); 338 } 339 340 static int mgmt_event_skb(struct sk_buff *skb, struct sock *skip_sk) 341 { 342 return mgmt_send_event_skb(HCI_CHANNEL_CONTROL, skb, HCI_SOCK_TRUSTED, 343 skip_sk); 344 } 345 346 static u8 le_addr_type(u8 mgmt_addr_type) 347 { 348 if (mgmt_addr_type == BDADDR_LE_PUBLIC) 349 return ADDR_LE_DEV_PUBLIC; 350 else 351 return ADDR_LE_DEV_RANDOM; 352 } 353 354 void mgmt_fill_version_info(void *ver) 355 { 356 struct mgmt_rp_read_version *rp = ver; 357 358 rp->version = MGMT_VERSION; 359 rp->revision = cpu_to_le16(MGMT_REVISION); 360 } 361 362 static int read_version(struct sock *sk, struct hci_dev *hdev, void *data, 363 u16 data_len) 364 { 365 struct mgmt_rp_read_version rp; 366 367 bt_dev_dbg(hdev, "sock %p", sk); 368 369 mgmt_fill_version_info(&rp); 370 371 return mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, 372 &rp, sizeof(rp)); 373 } 374 375 static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data, 376 u16 data_len) 377 { 378 struct mgmt_rp_read_commands *rp; 379 u16 num_commands, num_events; 380 size_t rp_size; 381 int i, err; 382 383 bt_dev_dbg(hdev, "sock %p", sk); 384 385 if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) { 386 num_commands = ARRAY_SIZE(mgmt_commands); 387 num_events = ARRAY_SIZE(mgmt_events); 388 } else { 389 num_commands = ARRAY_SIZE(mgmt_untrusted_commands); 390 num_events = ARRAY_SIZE(mgmt_untrusted_events); 391 } 392 393 rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16)); 394 395 rp = kmalloc(rp_size, GFP_KERNEL); 396 if (!rp) 397 return -ENOMEM; 398 399 rp->num_commands = cpu_to_le16(num_commands); 400 rp->num_events = cpu_to_le16(num_events); 401 402 if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) { 403 __le16 *opcode = rp->opcodes; 404 405 for (i = 0; i < num_commands; i++, opcode++) 406 put_unaligned_le16(mgmt_commands[i], opcode); 407 408 for (i = 0; i < num_events; i++, opcode++) 409 put_unaligned_le16(mgmt_events[i], opcode); 410 } else { 411 __le16 *opcode = rp->opcodes; 412 413 for (i = 0; i < num_commands; i++, opcode++) 414 put_unaligned_le16(mgmt_untrusted_commands[i], opcode); 415 416 for (i = 0; i < num_events; i++, opcode++) 417 put_unaligned_le16(mgmt_untrusted_events[i], opcode); 418 } 419 420 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, 421 rp, rp_size); 422 kfree(rp); 423 424 return err; 425 } 426 427 static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data, 428 u16 data_len) 429 { 430 struct mgmt_rp_read_index_list *rp; 431 struct hci_dev *d; 432 size_t rp_len; 433 u16 count; 434 int err; 435 436 bt_dev_dbg(hdev, "sock %p", sk); 437 438 read_lock(&hci_dev_list_lock); 439 440 count = 0; 441 list_for_each_entry(d, &hci_dev_list, list) { 442 if (d->dev_type == HCI_PRIMARY && 443 !hci_dev_test_flag(d, HCI_UNCONFIGURED)) 444 count++; 445 } 446 447 rp_len = sizeof(*rp) + (2 * count); 448 rp = kmalloc(rp_len, GFP_ATOMIC); 449 if (!rp) { 450 read_unlock(&hci_dev_list_lock); 451 return -ENOMEM; 452 } 453 454 count = 0; 455 list_for_each_entry(d, &hci_dev_list, list) { 456 if (hci_dev_test_flag(d, HCI_SETUP) || 457 hci_dev_test_flag(d, HCI_CONFIG) || 458 hci_dev_test_flag(d, HCI_USER_CHANNEL)) 459 continue; 460 461 /* Devices marked as raw-only are neither configured 462 * nor unconfigured controllers. 463 */ 464 if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) 465 continue; 466 467 if (d->dev_type == HCI_PRIMARY && 468 !hci_dev_test_flag(d, HCI_UNCONFIGURED)) { 469 rp->index[count++] = cpu_to_le16(d->id); 470 bt_dev_dbg(hdev, "Added hci%u", d->id); 471 } 472 } 473 474 rp->num_controllers = cpu_to_le16(count); 475 rp_len = sizeof(*rp) + (2 * count); 476 477 read_unlock(&hci_dev_list_lock); 478 479 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 480 0, rp, rp_len); 481 482 kfree(rp); 483 484 return err; 485 } 486 487 static int read_unconf_index_list(struct sock *sk, struct hci_dev *hdev, 488 void *data, u16 data_len) 489 { 490 struct mgmt_rp_read_unconf_index_list *rp; 491 struct hci_dev *d; 492 size_t rp_len; 493 u16 count; 494 int err; 495 496 bt_dev_dbg(hdev, "sock %p", sk); 497 498 read_lock(&hci_dev_list_lock); 499 500 count = 0; 501 list_for_each_entry(d, &hci_dev_list, list) { 502 if (d->dev_type == HCI_PRIMARY && 503 hci_dev_test_flag(d, HCI_UNCONFIGURED)) 504 count++; 505 } 506 507 rp_len = sizeof(*rp) + (2 * count); 508 rp = kmalloc(rp_len, GFP_ATOMIC); 509 if (!rp) { 510 read_unlock(&hci_dev_list_lock); 511 return -ENOMEM; 512 } 513 514 count = 0; 515 list_for_each_entry(d, &hci_dev_list, list) { 516 if (hci_dev_test_flag(d, HCI_SETUP) || 517 hci_dev_test_flag(d, HCI_CONFIG) || 518 hci_dev_test_flag(d, HCI_USER_CHANNEL)) 519 continue; 520 521 /* Devices marked as raw-only are neither configured 522 * nor unconfigured controllers. 523 */ 524 if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) 525 continue; 526 527 if (d->dev_type == HCI_PRIMARY && 528 hci_dev_test_flag(d, HCI_UNCONFIGURED)) { 529 rp->index[count++] = cpu_to_le16(d->id); 530 bt_dev_dbg(hdev, "Added hci%u", d->id); 531 } 532 } 533 534 rp->num_controllers = cpu_to_le16(count); 535 rp_len = sizeof(*rp) + (2 * count); 536 537 read_unlock(&hci_dev_list_lock); 538 539 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, 540 MGMT_OP_READ_UNCONF_INDEX_LIST, 0, rp, rp_len); 541 542 kfree(rp); 543 544 return err; 545 } 546 547 static int read_ext_index_list(struct sock *sk, struct hci_dev *hdev, 548 void *data, u16 data_len) 549 { 550 struct mgmt_rp_read_ext_index_list *rp; 551 struct hci_dev *d; 552 u16 count; 553 int err; 554 555 bt_dev_dbg(hdev, "sock %p", sk); 556 557 read_lock(&hci_dev_list_lock); 558 559 count = 0; 560 list_for_each_entry(d, &hci_dev_list, list) { 561 if (d->dev_type == HCI_PRIMARY || d->dev_type == HCI_AMP) 562 count++; 563 } 564 565 rp = kmalloc(struct_size(rp, entry, count), GFP_ATOMIC); 566 if (!rp) { 567 read_unlock(&hci_dev_list_lock); 568 return -ENOMEM; 569 } 570 571 count = 0; 572 list_for_each_entry(d, &hci_dev_list, list) { 573 if (hci_dev_test_flag(d, HCI_SETUP) || 574 hci_dev_test_flag(d, HCI_CONFIG) || 575 hci_dev_test_flag(d, HCI_USER_CHANNEL)) 576 continue; 577 578 /* Devices marked as raw-only are neither configured 579 * nor unconfigured controllers. 580 */ 581 if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) 582 continue; 583 584 if (d->dev_type == HCI_PRIMARY) { 585 if (hci_dev_test_flag(d, HCI_UNCONFIGURED)) 586 rp->entry[count].type = 0x01; 587 else 588 rp->entry[count].type = 0x00; 589 } else if (d->dev_type == HCI_AMP) { 590 rp->entry[count].type = 0x02; 591 } else { 592 continue; 593 } 594 595 rp->entry[count].bus = d->bus; 596 rp->entry[count++].index = cpu_to_le16(d->id); 597 bt_dev_dbg(hdev, "Added hci%u", d->id); 598 } 599 600 rp->num_controllers = cpu_to_le16(count); 601 602 read_unlock(&hci_dev_list_lock); 603 604 /* If this command is called at least once, then all the 605 * default index and unconfigured index events are disabled 606 * and from now on only extended index events are used. 607 */ 608 hci_sock_set_flag(sk, HCI_MGMT_EXT_INDEX_EVENTS); 609 hci_sock_clear_flag(sk, HCI_MGMT_INDEX_EVENTS); 610 hci_sock_clear_flag(sk, HCI_MGMT_UNCONF_INDEX_EVENTS); 611 612 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, 613 MGMT_OP_READ_EXT_INDEX_LIST, 0, rp, 614 struct_size(rp, entry, count)); 615 616 kfree(rp); 617 618 return err; 619 } 620 621 static bool is_configured(struct hci_dev *hdev) 622 { 623 if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) && 624 !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED)) 625 return false; 626 627 if ((test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) || 628 test_bit(HCI_QUIRK_USE_BDADDR_PROPERTY, &hdev->quirks)) && 629 !bacmp(&hdev->public_addr, BDADDR_ANY)) 630 return false; 631 632 return true; 633 } 634 635 static __le32 get_missing_options(struct hci_dev *hdev) 636 { 637 u32 options = 0; 638 639 if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) && 640 !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED)) 641 options |= MGMT_OPTION_EXTERNAL_CONFIG; 642 643 if ((test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) || 644 test_bit(HCI_QUIRK_USE_BDADDR_PROPERTY, &hdev->quirks)) && 645 !bacmp(&hdev->public_addr, BDADDR_ANY)) 646 options |= MGMT_OPTION_PUBLIC_ADDRESS; 647 648 return cpu_to_le32(options); 649 } 650 651 static int new_options(struct hci_dev *hdev, struct sock *skip) 652 { 653 __le32 options = get_missing_options(hdev); 654 655 return mgmt_limited_event(MGMT_EV_NEW_CONFIG_OPTIONS, hdev, &options, 656 sizeof(options), HCI_MGMT_OPTION_EVENTS, skip); 657 } 658 659 static int send_options_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev) 660 { 661 __le32 options = get_missing_options(hdev); 662 663 return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &options, 664 sizeof(options)); 665 } 666 667 static int read_config_info(struct sock *sk, struct hci_dev *hdev, 668 void *data, u16 data_len) 669 { 670 struct mgmt_rp_read_config_info rp; 671 u32 options = 0; 672 673 bt_dev_dbg(hdev, "sock %p", sk); 674 675 hci_dev_lock(hdev); 676 677 memset(&rp, 0, sizeof(rp)); 678 rp.manufacturer = cpu_to_le16(hdev->manufacturer); 679 680 if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks)) 681 options |= MGMT_OPTION_EXTERNAL_CONFIG; 682 683 if (hdev->set_bdaddr) 684 options |= MGMT_OPTION_PUBLIC_ADDRESS; 685 686 rp.supported_options = cpu_to_le32(options); 687 rp.missing_options = get_missing_options(hdev); 688 689 hci_dev_unlock(hdev); 690 691 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_CONFIG_INFO, 0, 692 &rp, sizeof(rp)); 693 } 694 695 static u32 get_supported_phys(struct hci_dev *hdev) 696 { 697 u32 supported_phys = 0; 698 699 if (lmp_bredr_capable(hdev)) { 700 supported_phys |= MGMT_PHY_BR_1M_1SLOT; 701 702 if (hdev->features[0][0] & LMP_3SLOT) 703 supported_phys |= MGMT_PHY_BR_1M_3SLOT; 704 705 if (hdev->features[0][0] & LMP_5SLOT) 706 supported_phys |= MGMT_PHY_BR_1M_5SLOT; 707 708 if (lmp_edr_2m_capable(hdev)) { 709 supported_phys |= MGMT_PHY_EDR_2M_1SLOT; 710 711 if (lmp_edr_3slot_capable(hdev)) 712 supported_phys |= MGMT_PHY_EDR_2M_3SLOT; 713 714 if (lmp_edr_5slot_capable(hdev)) 715 supported_phys |= MGMT_PHY_EDR_2M_5SLOT; 716 717 if (lmp_edr_3m_capable(hdev)) { 718 supported_phys |= MGMT_PHY_EDR_3M_1SLOT; 719 720 if (lmp_edr_3slot_capable(hdev)) 721 supported_phys |= MGMT_PHY_EDR_3M_3SLOT; 722 723 if (lmp_edr_5slot_capable(hdev)) 724 supported_phys |= MGMT_PHY_EDR_3M_5SLOT; 725 } 726 } 727 } 728 729 if (lmp_le_capable(hdev)) { 730 supported_phys |= MGMT_PHY_LE_1M_TX; 731 supported_phys |= MGMT_PHY_LE_1M_RX; 732 733 if (hdev->le_features[1] & HCI_LE_PHY_2M) { 734 supported_phys |= MGMT_PHY_LE_2M_TX; 735 supported_phys |= MGMT_PHY_LE_2M_RX; 736 } 737 738 if (hdev->le_features[1] & HCI_LE_PHY_CODED) { 739 supported_phys |= MGMT_PHY_LE_CODED_TX; 740 supported_phys |= MGMT_PHY_LE_CODED_RX; 741 } 742 } 743 744 return supported_phys; 745 } 746 747 static u32 get_selected_phys(struct hci_dev *hdev) 748 { 749 u32 selected_phys = 0; 750 751 if (lmp_bredr_capable(hdev)) { 752 selected_phys |= MGMT_PHY_BR_1M_1SLOT; 753 754 if (hdev->pkt_type & (HCI_DM3 | HCI_DH3)) 755 selected_phys |= MGMT_PHY_BR_1M_3SLOT; 756 757 if (hdev->pkt_type & (HCI_DM5 | HCI_DH5)) 758 selected_phys |= MGMT_PHY_BR_1M_5SLOT; 759 760 if (lmp_edr_2m_capable(hdev)) { 761 if (!(hdev->pkt_type & HCI_2DH1)) 762 selected_phys |= MGMT_PHY_EDR_2M_1SLOT; 763 764 if (lmp_edr_3slot_capable(hdev) && 765 !(hdev->pkt_type & HCI_2DH3)) 766 selected_phys |= MGMT_PHY_EDR_2M_3SLOT; 767 768 if (lmp_edr_5slot_capable(hdev) && 769 !(hdev->pkt_type & HCI_2DH5)) 770 selected_phys |= MGMT_PHY_EDR_2M_5SLOT; 771 772 if (lmp_edr_3m_capable(hdev)) { 773 if (!(hdev->pkt_type & HCI_3DH1)) 774 selected_phys |= MGMT_PHY_EDR_3M_1SLOT; 775 776 if (lmp_edr_3slot_capable(hdev) && 777 !(hdev->pkt_type & HCI_3DH3)) 778 selected_phys |= MGMT_PHY_EDR_3M_3SLOT; 779 780 if (lmp_edr_5slot_capable(hdev) && 781 !(hdev->pkt_type & HCI_3DH5)) 782 selected_phys |= MGMT_PHY_EDR_3M_5SLOT; 783 } 784 } 785 } 786 787 if (lmp_le_capable(hdev)) { 788 if (hdev->le_tx_def_phys & HCI_LE_SET_PHY_1M) 789 selected_phys |= MGMT_PHY_LE_1M_TX; 790 791 if (hdev->le_rx_def_phys & HCI_LE_SET_PHY_1M) 792 selected_phys |= MGMT_PHY_LE_1M_RX; 793 794 if (hdev->le_tx_def_phys & HCI_LE_SET_PHY_2M) 795 selected_phys |= MGMT_PHY_LE_2M_TX; 796 797 if (hdev->le_rx_def_phys & HCI_LE_SET_PHY_2M) 798 selected_phys |= MGMT_PHY_LE_2M_RX; 799 800 if (hdev->le_tx_def_phys & HCI_LE_SET_PHY_CODED) 801 selected_phys |= MGMT_PHY_LE_CODED_TX; 802 803 if (hdev->le_rx_def_phys & HCI_LE_SET_PHY_CODED) 804 selected_phys |= MGMT_PHY_LE_CODED_RX; 805 } 806 807 return selected_phys; 808 } 809 810 static u32 get_configurable_phys(struct hci_dev *hdev) 811 { 812 return (get_supported_phys(hdev) & ~MGMT_PHY_BR_1M_1SLOT & 813 ~MGMT_PHY_LE_1M_TX & ~MGMT_PHY_LE_1M_RX); 814 } 815 816 static u32 get_supported_settings(struct hci_dev *hdev) 817 { 818 u32 settings = 0; 819 820 settings |= MGMT_SETTING_POWERED; 821 settings |= MGMT_SETTING_BONDABLE; 822 settings |= MGMT_SETTING_DEBUG_KEYS; 823 settings |= MGMT_SETTING_CONNECTABLE; 824 settings |= MGMT_SETTING_DISCOVERABLE; 825 826 if (lmp_bredr_capable(hdev)) { 827 if (hdev->hci_ver >= BLUETOOTH_VER_1_2) 828 settings |= MGMT_SETTING_FAST_CONNECTABLE; 829 settings |= MGMT_SETTING_BREDR; 830 settings |= MGMT_SETTING_LINK_SECURITY; 831 832 if (lmp_ssp_capable(hdev)) { 833 settings |= MGMT_SETTING_SSP; 834 if (IS_ENABLED(CONFIG_BT_HS)) 835 settings |= MGMT_SETTING_HS; 836 } 837 838 if (lmp_sc_capable(hdev)) 839 settings |= MGMT_SETTING_SECURE_CONN; 840 841 if (test_bit(HCI_QUIRK_WIDEBAND_SPEECH_SUPPORTED, 842 &hdev->quirks)) 843 settings |= MGMT_SETTING_WIDEBAND_SPEECH; 844 } 845 846 if (lmp_le_capable(hdev)) { 847 settings |= MGMT_SETTING_LE; 848 settings |= MGMT_SETTING_SECURE_CONN; 849 settings |= MGMT_SETTING_PRIVACY; 850 settings |= MGMT_SETTING_STATIC_ADDRESS; 851 settings |= MGMT_SETTING_ADVERTISING; 852 } 853 854 if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) || 855 hdev->set_bdaddr) 856 settings |= MGMT_SETTING_CONFIGURATION; 857 858 settings |= MGMT_SETTING_PHY_CONFIGURATION; 859 860 return settings; 861 } 862 863 static u32 get_current_settings(struct hci_dev *hdev) 864 { 865 u32 settings = 0; 866 867 if (hdev_is_powered(hdev)) 868 settings |= MGMT_SETTING_POWERED; 869 870 if (hci_dev_test_flag(hdev, HCI_CONNECTABLE)) 871 settings |= MGMT_SETTING_CONNECTABLE; 872 873 if (hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) 874 settings |= MGMT_SETTING_FAST_CONNECTABLE; 875 876 if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) 877 settings |= MGMT_SETTING_DISCOVERABLE; 878 879 if (hci_dev_test_flag(hdev, HCI_BONDABLE)) 880 settings |= MGMT_SETTING_BONDABLE; 881 882 if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 883 settings |= MGMT_SETTING_BREDR; 884 885 if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) 886 settings |= MGMT_SETTING_LE; 887 888 if (hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) 889 settings |= MGMT_SETTING_LINK_SECURITY; 890 891 if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) 892 settings |= MGMT_SETTING_SSP; 893 894 if (hci_dev_test_flag(hdev, HCI_HS_ENABLED)) 895 settings |= MGMT_SETTING_HS; 896 897 if (hci_dev_test_flag(hdev, HCI_ADVERTISING)) 898 settings |= MGMT_SETTING_ADVERTISING; 899 900 if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) 901 settings |= MGMT_SETTING_SECURE_CONN; 902 903 if (hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS)) 904 settings |= MGMT_SETTING_DEBUG_KEYS; 905 906 if (hci_dev_test_flag(hdev, HCI_PRIVACY)) 907 settings |= MGMT_SETTING_PRIVACY; 908 909 /* The current setting for static address has two purposes. The 910 * first is to indicate if the static address will be used and 911 * the second is to indicate if it is actually set. 912 * 913 * This means if the static address is not configured, this flag 914 * will never be set. If the address is configured, then if the 915 * address is actually used decides if the flag is set or not. 916 * 917 * For single mode LE only controllers and dual-mode controllers 918 * with BR/EDR disabled, the existence of the static address will 919 * be evaluated. 920 */ 921 if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) || 922 !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) || 923 !bacmp(&hdev->bdaddr, BDADDR_ANY)) { 924 if (bacmp(&hdev->static_addr, BDADDR_ANY)) 925 settings |= MGMT_SETTING_STATIC_ADDRESS; 926 } 927 928 if (hci_dev_test_flag(hdev, HCI_WIDEBAND_SPEECH_ENABLED)) 929 settings |= MGMT_SETTING_WIDEBAND_SPEECH; 930 931 return settings; 932 } 933 934 static struct mgmt_pending_cmd *pending_find(u16 opcode, struct hci_dev *hdev) 935 { 936 return mgmt_pending_find(HCI_CHANNEL_CONTROL, opcode, hdev); 937 } 938 939 u8 mgmt_get_adv_discov_flags(struct hci_dev *hdev) 940 { 941 struct mgmt_pending_cmd *cmd; 942 943 /* If there's a pending mgmt command the flags will not yet have 944 * their final values, so check for this first. 945 */ 946 cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev); 947 if (cmd) { 948 struct mgmt_mode *cp = cmd->param; 949 if (cp->val == 0x01) 950 return LE_AD_GENERAL; 951 else if (cp->val == 0x02) 952 return LE_AD_LIMITED; 953 } else { 954 if (hci_dev_test_flag(hdev, HCI_LIMITED_DISCOVERABLE)) 955 return LE_AD_LIMITED; 956 else if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) 957 return LE_AD_GENERAL; 958 } 959 960 return 0; 961 } 962 963 bool mgmt_get_connectable(struct hci_dev *hdev) 964 { 965 struct mgmt_pending_cmd *cmd; 966 967 /* If there's a pending mgmt command the flag will not yet have 968 * it's final value, so check for this first. 969 */ 970 cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev); 971 if (cmd) { 972 struct mgmt_mode *cp = cmd->param; 973 974 return cp->val; 975 } 976 977 return hci_dev_test_flag(hdev, HCI_CONNECTABLE); 978 } 979 980 static int service_cache_sync(struct hci_dev *hdev, void *data) 981 { 982 hci_update_eir_sync(hdev); 983 hci_update_class_sync(hdev); 984 985 return 0; 986 } 987 988 static void service_cache_off(struct work_struct *work) 989 { 990 struct hci_dev *hdev = container_of(work, struct hci_dev, 991 service_cache.work); 992 993 if (!hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) 994 return; 995 996 hci_cmd_sync_queue(hdev, service_cache_sync, NULL, NULL); 997 } 998 999 static int rpa_expired_sync(struct hci_dev *hdev, void *data) 1000 { 1001 /* The generation of a new RPA and programming it into the 1002 * controller happens in the hci_req_enable_advertising() 1003 * function. 1004 */ 1005 if (ext_adv_capable(hdev)) 1006 return hci_start_ext_adv_sync(hdev, hdev->cur_adv_instance); 1007 else 1008 return hci_enable_advertising_sync(hdev); 1009 } 1010 1011 static void rpa_expired(struct work_struct *work) 1012 { 1013 struct hci_dev *hdev = container_of(work, struct hci_dev, 1014 rpa_expired.work); 1015 1016 bt_dev_dbg(hdev, ""); 1017 1018 hci_dev_set_flag(hdev, HCI_RPA_EXPIRED); 1019 1020 if (!hci_dev_test_flag(hdev, HCI_ADVERTISING)) 1021 return; 1022 1023 hci_cmd_sync_queue(hdev, rpa_expired_sync, NULL, NULL); 1024 } 1025 1026 static void discov_off(struct work_struct *work) 1027 { 1028 struct hci_dev *hdev = container_of(work, struct hci_dev, 1029 discov_off.work); 1030 1031 bt_dev_dbg(hdev, ""); 1032 1033 hci_dev_lock(hdev); 1034 1035 /* When discoverable timeout triggers, then just make sure 1036 * the limited discoverable flag is cleared. Even in the case 1037 * of a timeout triggered from general discoverable, it is 1038 * safe to unconditionally clear the flag. 1039 */ 1040 hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); 1041 hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); 1042 hdev->discov_timeout = 0; 1043 1044 hci_update_discoverable(hdev); 1045 1046 mgmt_new_settings(hdev); 1047 1048 hci_dev_unlock(hdev); 1049 } 1050 1051 static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev) 1052 { 1053 if (hci_dev_test_and_set_flag(hdev, HCI_MGMT)) 1054 return; 1055 1056 BT_INFO("MGMT ver %d.%d", MGMT_VERSION, MGMT_REVISION); 1057 1058 INIT_DELAYED_WORK(&hdev->discov_off, discov_off); 1059 INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off); 1060 INIT_DELAYED_WORK(&hdev->rpa_expired, rpa_expired); 1061 1062 /* Non-mgmt controlled devices get this bit set 1063 * implicitly so that pairing works for them, however 1064 * for mgmt we require user-space to explicitly enable 1065 * it 1066 */ 1067 hci_dev_clear_flag(hdev, HCI_BONDABLE); 1068 } 1069 1070 static int read_controller_info(struct sock *sk, struct hci_dev *hdev, 1071 void *data, u16 data_len) 1072 { 1073 struct mgmt_rp_read_info rp; 1074 1075 bt_dev_dbg(hdev, "sock %p", sk); 1076 1077 hci_dev_lock(hdev); 1078 1079 memset(&rp, 0, sizeof(rp)); 1080 1081 bacpy(&rp.bdaddr, &hdev->bdaddr); 1082 1083 rp.version = hdev->hci_ver; 1084 rp.manufacturer = cpu_to_le16(hdev->manufacturer); 1085 1086 rp.supported_settings = cpu_to_le32(get_supported_settings(hdev)); 1087 rp.current_settings = cpu_to_le32(get_current_settings(hdev)); 1088 1089 memcpy(rp.dev_class, hdev->dev_class, 3); 1090 1091 memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name)); 1092 memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name)); 1093 1094 hci_dev_unlock(hdev); 1095 1096 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp, 1097 sizeof(rp)); 1098 } 1099 1100 static u16 append_eir_data_to_buf(struct hci_dev *hdev, u8 *eir) 1101 { 1102 u16 eir_len = 0; 1103 size_t name_len; 1104 1105 if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 1106 eir_len = eir_append_data(eir, eir_len, EIR_CLASS_OF_DEV, 1107 hdev->dev_class, 3); 1108 1109 if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) 1110 eir_len = eir_append_le16(eir, eir_len, EIR_APPEARANCE, 1111 hdev->appearance); 1112 1113 name_len = strnlen(hdev->dev_name, sizeof(hdev->dev_name)); 1114 eir_len = eir_append_data(eir, eir_len, EIR_NAME_COMPLETE, 1115 hdev->dev_name, name_len); 1116 1117 name_len = strnlen(hdev->short_name, sizeof(hdev->short_name)); 1118 eir_len = eir_append_data(eir, eir_len, EIR_NAME_SHORT, 1119 hdev->short_name, name_len); 1120 1121 return eir_len; 1122 } 1123 1124 static int read_ext_controller_info(struct sock *sk, struct hci_dev *hdev, 1125 void *data, u16 data_len) 1126 { 1127 char buf[512]; 1128 struct mgmt_rp_read_ext_info *rp = (void *)buf; 1129 u16 eir_len; 1130 1131 bt_dev_dbg(hdev, "sock %p", sk); 1132 1133 memset(&buf, 0, sizeof(buf)); 1134 1135 hci_dev_lock(hdev); 1136 1137 bacpy(&rp->bdaddr, &hdev->bdaddr); 1138 1139 rp->version = hdev->hci_ver; 1140 rp->manufacturer = cpu_to_le16(hdev->manufacturer); 1141 1142 rp->supported_settings = cpu_to_le32(get_supported_settings(hdev)); 1143 rp->current_settings = cpu_to_le32(get_current_settings(hdev)); 1144 1145 1146 eir_len = append_eir_data_to_buf(hdev, rp->eir); 1147 rp->eir_len = cpu_to_le16(eir_len); 1148 1149 hci_dev_unlock(hdev); 1150 1151 /* If this command is called at least once, then the events 1152 * for class of device and local name changes are disabled 1153 * and only the new extended controller information event 1154 * is used. 1155 */ 1156 hci_sock_set_flag(sk, HCI_MGMT_EXT_INFO_EVENTS); 1157 hci_sock_clear_flag(sk, HCI_MGMT_DEV_CLASS_EVENTS); 1158 hci_sock_clear_flag(sk, HCI_MGMT_LOCAL_NAME_EVENTS); 1159 1160 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_EXT_INFO, 0, rp, 1161 sizeof(*rp) + eir_len); 1162 } 1163 1164 static int ext_info_changed(struct hci_dev *hdev, struct sock *skip) 1165 { 1166 char buf[512]; 1167 struct mgmt_ev_ext_info_changed *ev = (void *)buf; 1168 u16 eir_len; 1169 1170 memset(buf, 0, sizeof(buf)); 1171 1172 eir_len = append_eir_data_to_buf(hdev, ev->eir); 1173 ev->eir_len = cpu_to_le16(eir_len); 1174 1175 return mgmt_limited_event(MGMT_EV_EXT_INFO_CHANGED, hdev, ev, 1176 sizeof(*ev) + eir_len, 1177 HCI_MGMT_EXT_INFO_EVENTS, skip); 1178 } 1179 1180 static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev) 1181 { 1182 __le32 settings = cpu_to_le32(get_current_settings(hdev)); 1183 1184 return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &settings, 1185 sizeof(settings)); 1186 } 1187 1188 void mgmt_advertising_added(struct sock *sk, struct hci_dev *hdev, u8 instance) 1189 { 1190 struct mgmt_ev_advertising_added ev; 1191 1192 ev.instance = instance; 1193 1194 mgmt_event(MGMT_EV_ADVERTISING_ADDED, hdev, &ev, sizeof(ev), sk); 1195 } 1196 1197 void mgmt_advertising_removed(struct sock *sk, struct hci_dev *hdev, 1198 u8 instance) 1199 { 1200 struct mgmt_ev_advertising_removed ev; 1201 1202 ev.instance = instance; 1203 1204 mgmt_event(MGMT_EV_ADVERTISING_REMOVED, hdev, &ev, sizeof(ev), sk); 1205 } 1206 1207 static void cancel_adv_timeout(struct hci_dev *hdev) 1208 { 1209 if (hdev->adv_instance_timeout) { 1210 hdev->adv_instance_timeout = 0; 1211 cancel_delayed_work(&hdev->adv_instance_expire); 1212 } 1213 } 1214 1215 /* This function requires the caller holds hdev->lock */ 1216 static void restart_le_actions(struct hci_dev *hdev) 1217 { 1218 struct hci_conn_params *p; 1219 1220 list_for_each_entry(p, &hdev->le_conn_params, list) { 1221 /* Needed for AUTO_OFF case where might not "really" 1222 * have been powered off. 1223 */ 1224 list_del_init(&p->action); 1225 1226 switch (p->auto_connect) { 1227 case HCI_AUTO_CONN_DIRECT: 1228 case HCI_AUTO_CONN_ALWAYS: 1229 list_add(&p->action, &hdev->pend_le_conns); 1230 break; 1231 case HCI_AUTO_CONN_REPORT: 1232 list_add(&p->action, &hdev->pend_le_reports); 1233 break; 1234 default: 1235 break; 1236 } 1237 } 1238 } 1239 1240 static int new_settings(struct hci_dev *hdev, struct sock *skip) 1241 { 1242 __le32 ev = cpu_to_le32(get_current_settings(hdev)); 1243 1244 return mgmt_limited_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, 1245 sizeof(ev), HCI_MGMT_SETTING_EVENTS, skip); 1246 } 1247 1248 static void mgmt_set_powered_complete(struct hci_dev *hdev, void *data, int err) 1249 { 1250 struct mgmt_pending_cmd *cmd = data; 1251 struct mgmt_mode *cp; 1252 1253 /* Make sure cmd still outstanding. */ 1254 if (cmd != pending_find(MGMT_OP_SET_POWERED, hdev)) 1255 return; 1256 1257 cp = cmd->param; 1258 1259 bt_dev_dbg(hdev, "err %d", err); 1260 1261 if (!err) { 1262 if (cp->val) { 1263 hci_dev_lock(hdev); 1264 restart_le_actions(hdev); 1265 hci_update_passive_scan(hdev); 1266 hci_dev_unlock(hdev); 1267 } 1268 1269 send_settings_rsp(cmd->sk, cmd->opcode, hdev); 1270 1271 /* Only call new_setting for power on as power off is deferred 1272 * to hdev->power_off work which does call hci_dev_do_close. 1273 */ 1274 if (cp->val) 1275 new_settings(hdev, cmd->sk); 1276 } else { 1277 mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, 1278 mgmt_status(err)); 1279 } 1280 1281 mgmt_pending_remove(cmd); 1282 } 1283 1284 static int set_powered_sync(struct hci_dev *hdev, void *data) 1285 { 1286 struct mgmt_pending_cmd *cmd = data; 1287 struct mgmt_mode *cp = cmd->param; 1288 1289 BT_DBG("%s", hdev->name); 1290 1291 return hci_set_powered_sync(hdev, cp->val); 1292 } 1293 1294 static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data, 1295 u16 len) 1296 { 1297 struct mgmt_mode *cp = data; 1298 struct mgmt_pending_cmd *cmd; 1299 int err; 1300 1301 bt_dev_dbg(hdev, "sock %p", sk); 1302 1303 if (cp->val != 0x00 && cp->val != 0x01) 1304 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED, 1305 MGMT_STATUS_INVALID_PARAMS); 1306 1307 hci_dev_lock(hdev); 1308 1309 if (pending_find(MGMT_OP_SET_POWERED, hdev)) { 1310 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED, 1311 MGMT_STATUS_BUSY); 1312 goto failed; 1313 } 1314 1315 if (!!cp->val == hdev_is_powered(hdev)) { 1316 err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev); 1317 goto failed; 1318 } 1319 1320 cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len); 1321 if (!cmd) { 1322 err = -ENOMEM; 1323 goto failed; 1324 } 1325 1326 err = hci_cmd_sync_queue(hdev, set_powered_sync, cmd, 1327 mgmt_set_powered_complete); 1328 1329 if (err < 0) 1330 mgmt_pending_remove(cmd); 1331 1332 failed: 1333 hci_dev_unlock(hdev); 1334 return err; 1335 } 1336 1337 int mgmt_new_settings(struct hci_dev *hdev) 1338 { 1339 return new_settings(hdev, NULL); 1340 } 1341 1342 struct cmd_lookup { 1343 struct sock *sk; 1344 struct hci_dev *hdev; 1345 u8 mgmt_status; 1346 }; 1347 1348 static void settings_rsp(struct mgmt_pending_cmd *cmd, void *data) 1349 { 1350 struct cmd_lookup *match = data; 1351 1352 send_settings_rsp(cmd->sk, cmd->opcode, match->hdev); 1353 1354 list_del(&cmd->list); 1355 1356 if (match->sk == NULL) { 1357 match->sk = cmd->sk; 1358 sock_hold(match->sk); 1359 } 1360 1361 mgmt_pending_free(cmd); 1362 } 1363 1364 static void cmd_status_rsp(struct mgmt_pending_cmd *cmd, void *data) 1365 { 1366 u8 *status = data; 1367 1368 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, *status); 1369 mgmt_pending_remove(cmd); 1370 } 1371 1372 static void cmd_complete_rsp(struct mgmt_pending_cmd *cmd, void *data) 1373 { 1374 if (cmd->cmd_complete) { 1375 u8 *status = data; 1376 1377 cmd->cmd_complete(cmd, *status); 1378 mgmt_pending_remove(cmd); 1379 1380 return; 1381 } 1382 1383 cmd_status_rsp(cmd, data); 1384 } 1385 1386 static int generic_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) 1387 { 1388 return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, 1389 cmd->param, cmd->param_len); 1390 } 1391 1392 static int addr_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) 1393 { 1394 return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, 1395 cmd->param, sizeof(struct mgmt_addr_info)); 1396 } 1397 1398 static u8 mgmt_bredr_support(struct hci_dev *hdev) 1399 { 1400 if (!lmp_bredr_capable(hdev)) 1401 return MGMT_STATUS_NOT_SUPPORTED; 1402 else if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 1403 return MGMT_STATUS_REJECTED; 1404 else 1405 return MGMT_STATUS_SUCCESS; 1406 } 1407 1408 static u8 mgmt_le_support(struct hci_dev *hdev) 1409 { 1410 if (!lmp_le_capable(hdev)) 1411 return MGMT_STATUS_NOT_SUPPORTED; 1412 else if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) 1413 return MGMT_STATUS_REJECTED; 1414 else 1415 return MGMT_STATUS_SUCCESS; 1416 } 1417 1418 static void mgmt_set_discoverable_complete(struct hci_dev *hdev, void *data, 1419 int err) 1420 { 1421 struct mgmt_pending_cmd *cmd = data; 1422 1423 bt_dev_dbg(hdev, "err %d", err); 1424 1425 /* Make sure cmd still outstanding. */ 1426 if (cmd != pending_find(MGMT_OP_SET_DISCOVERABLE, hdev)) 1427 return; 1428 1429 hci_dev_lock(hdev); 1430 1431 if (err) { 1432 u8 mgmt_err = mgmt_status(err); 1433 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); 1434 hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); 1435 goto done; 1436 } 1437 1438 if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE) && 1439 hdev->discov_timeout > 0) { 1440 int to = msecs_to_jiffies(hdev->discov_timeout * 1000); 1441 queue_delayed_work(hdev->req_workqueue, &hdev->discov_off, to); 1442 } 1443 1444 send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev); 1445 new_settings(hdev, cmd->sk); 1446 1447 done: 1448 mgmt_pending_remove(cmd); 1449 hci_dev_unlock(hdev); 1450 } 1451 1452 static int set_discoverable_sync(struct hci_dev *hdev, void *data) 1453 { 1454 BT_DBG("%s", hdev->name); 1455 1456 return hci_update_discoverable_sync(hdev); 1457 } 1458 1459 static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data, 1460 u16 len) 1461 { 1462 struct mgmt_cp_set_discoverable *cp = data; 1463 struct mgmt_pending_cmd *cmd; 1464 u16 timeout; 1465 int err; 1466 1467 bt_dev_dbg(hdev, "sock %p", sk); 1468 1469 if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) && 1470 !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 1471 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1472 MGMT_STATUS_REJECTED); 1473 1474 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) 1475 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1476 MGMT_STATUS_INVALID_PARAMS); 1477 1478 timeout = __le16_to_cpu(cp->timeout); 1479 1480 /* Disabling discoverable requires that no timeout is set, 1481 * and enabling limited discoverable requires a timeout. 1482 */ 1483 if ((cp->val == 0x00 && timeout > 0) || 1484 (cp->val == 0x02 && timeout == 0)) 1485 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1486 MGMT_STATUS_INVALID_PARAMS); 1487 1488 hci_dev_lock(hdev); 1489 1490 if (!hdev_is_powered(hdev) && timeout > 0) { 1491 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1492 MGMT_STATUS_NOT_POWERED); 1493 goto failed; 1494 } 1495 1496 if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) || 1497 pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) { 1498 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1499 MGMT_STATUS_BUSY); 1500 goto failed; 1501 } 1502 1503 if (!hci_dev_test_flag(hdev, HCI_CONNECTABLE)) { 1504 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1505 MGMT_STATUS_REJECTED); 1506 goto failed; 1507 } 1508 1509 if (hdev->advertising_paused) { 1510 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, 1511 MGMT_STATUS_BUSY); 1512 goto failed; 1513 } 1514 1515 if (!hdev_is_powered(hdev)) { 1516 bool changed = false; 1517 1518 /* Setting limited discoverable when powered off is 1519 * not a valid operation since it requires a timeout 1520 * and so no need to check HCI_LIMITED_DISCOVERABLE. 1521 */ 1522 if (!!cp->val != hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) { 1523 hci_dev_change_flag(hdev, HCI_DISCOVERABLE); 1524 changed = true; 1525 } 1526 1527 err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev); 1528 if (err < 0) 1529 goto failed; 1530 1531 if (changed) 1532 err = new_settings(hdev, sk); 1533 1534 goto failed; 1535 } 1536 1537 /* If the current mode is the same, then just update the timeout 1538 * value with the new value. And if only the timeout gets updated, 1539 * then no need for any HCI transactions. 1540 */ 1541 if (!!cp->val == hci_dev_test_flag(hdev, HCI_DISCOVERABLE) && 1542 (cp->val == 0x02) == hci_dev_test_flag(hdev, 1543 HCI_LIMITED_DISCOVERABLE)) { 1544 cancel_delayed_work(&hdev->discov_off); 1545 hdev->discov_timeout = timeout; 1546 1547 if (cp->val && hdev->discov_timeout > 0) { 1548 int to = msecs_to_jiffies(hdev->discov_timeout * 1000); 1549 queue_delayed_work(hdev->req_workqueue, 1550 &hdev->discov_off, to); 1551 } 1552 1553 err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev); 1554 goto failed; 1555 } 1556 1557 cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len); 1558 if (!cmd) { 1559 err = -ENOMEM; 1560 goto failed; 1561 } 1562 1563 /* Cancel any potential discoverable timeout that might be 1564 * still active and store new timeout value. The arming of 1565 * the timeout happens in the complete handler. 1566 */ 1567 cancel_delayed_work(&hdev->discov_off); 1568 hdev->discov_timeout = timeout; 1569 1570 if (cp->val) 1571 hci_dev_set_flag(hdev, HCI_DISCOVERABLE); 1572 else 1573 hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); 1574 1575 /* Limited discoverable mode */ 1576 if (cp->val == 0x02) 1577 hci_dev_set_flag(hdev, HCI_LIMITED_DISCOVERABLE); 1578 else 1579 hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); 1580 1581 err = hci_cmd_sync_queue(hdev, set_discoverable_sync, cmd, 1582 mgmt_set_discoverable_complete); 1583 1584 if (err < 0) 1585 mgmt_pending_remove(cmd); 1586 1587 failed: 1588 hci_dev_unlock(hdev); 1589 return err; 1590 } 1591 1592 static void mgmt_set_connectable_complete(struct hci_dev *hdev, void *data, 1593 int err) 1594 { 1595 struct mgmt_pending_cmd *cmd = data; 1596 1597 bt_dev_dbg(hdev, "err %d", err); 1598 1599 /* Make sure cmd still outstanding. */ 1600 if (cmd != pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) 1601 return; 1602 1603 hci_dev_lock(hdev); 1604 1605 if (err) { 1606 u8 mgmt_err = mgmt_status(err); 1607 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); 1608 goto done; 1609 } 1610 1611 send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev); 1612 new_settings(hdev, cmd->sk); 1613 1614 done: 1615 if (cmd) 1616 mgmt_pending_remove(cmd); 1617 1618 hci_dev_unlock(hdev); 1619 } 1620 1621 static int set_connectable_update_settings(struct hci_dev *hdev, 1622 struct sock *sk, u8 val) 1623 { 1624 bool changed = false; 1625 int err; 1626 1627 if (!!val != hci_dev_test_flag(hdev, HCI_CONNECTABLE)) 1628 changed = true; 1629 1630 if (val) { 1631 hci_dev_set_flag(hdev, HCI_CONNECTABLE); 1632 } else { 1633 hci_dev_clear_flag(hdev, HCI_CONNECTABLE); 1634 hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); 1635 } 1636 1637 err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev); 1638 if (err < 0) 1639 return err; 1640 1641 if (changed) { 1642 hci_update_scan(hdev); 1643 hci_update_passive_scan(hdev); 1644 return new_settings(hdev, sk); 1645 } 1646 1647 return 0; 1648 } 1649 1650 static int set_connectable_sync(struct hci_dev *hdev, void *data) 1651 { 1652 BT_DBG("%s", hdev->name); 1653 1654 return hci_update_connectable_sync(hdev); 1655 } 1656 1657 static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data, 1658 u16 len) 1659 { 1660 struct mgmt_mode *cp = data; 1661 struct mgmt_pending_cmd *cmd; 1662 int err; 1663 1664 bt_dev_dbg(hdev, "sock %p", sk); 1665 1666 if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) && 1667 !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 1668 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, 1669 MGMT_STATUS_REJECTED); 1670 1671 if (cp->val != 0x00 && cp->val != 0x01) 1672 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, 1673 MGMT_STATUS_INVALID_PARAMS); 1674 1675 hci_dev_lock(hdev); 1676 1677 if (!hdev_is_powered(hdev)) { 1678 err = set_connectable_update_settings(hdev, sk, cp->val); 1679 goto failed; 1680 } 1681 1682 if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) || 1683 pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) { 1684 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, 1685 MGMT_STATUS_BUSY); 1686 goto failed; 1687 } 1688 1689 cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len); 1690 if (!cmd) { 1691 err = -ENOMEM; 1692 goto failed; 1693 } 1694 1695 if (cp->val) { 1696 hci_dev_set_flag(hdev, HCI_CONNECTABLE); 1697 } else { 1698 if (hdev->discov_timeout > 0) 1699 cancel_delayed_work(&hdev->discov_off); 1700 1701 hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); 1702 hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); 1703 hci_dev_clear_flag(hdev, HCI_CONNECTABLE); 1704 } 1705 1706 err = hci_cmd_sync_queue(hdev, set_connectable_sync, cmd, 1707 mgmt_set_connectable_complete); 1708 1709 if (err < 0) 1710 mgmt_pending_remove(cmd); 1711 1712 failed: 1713 hci_dev_unlock(hdev); 1714 return err; 1715 } 1716 1717 static int set_bondable(struct sock *sk, struct hci_dev *hdev, void *data, 1718 u16 len) 1719 { 1720 struct mgmt_mode *cp = data; 1721 bool changed; 1722 int err; 1723 1724 bt_dev_dbg(hdev, "sock %p", sk); 1725 1726 if (cp->val != 0x00 && cp->val != 0x01) 1727 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BONDABLE, 1728 MGMT_STATUS_INVALID_PARAMS); 1729 1730 hci_dev_lock(hdev); 1731 1732 if (cp->val) 1733 changed = !hci_dev_test_and_set_flag(hdev, HCI_BONDABLE); 1734 else 1735 changed = hci_dev_test_and_clear_flag(hdev, HCI_BONDABLE); 1736 1737 err = send_settings_rsp(sk, MGMT_OP_SET_BONDABLE, hdev); 1738 if (err < 0) 1739 goto unlock; 1740 1741 if (changed) { 1742 /* In limited privacy mode the change of bondable mode 1743 * may affect the local advertising address. 1744 */ 1745 hci_update_discoverable(hdev); 1746 1747 err = new_settings(hdev, sk); 1748 } 1749 1750 unlock: 1751 hci_dev_unlock(hdev); 1752 return err; 1753 } 1754 1755 static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data, 1756 u16 len) 1757 { 1758 struct mgmt_mode *cp = data; 1759 struct mgmt_pending_cmd *cmd; 1760 u8 val, status; 1761 int err; 1762 1763 bt_dev_dbg(hdev, "sock %p", sk); 1764 1765 status = mgmt_bredr_support(hdev); 1766 if (status) 1767 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, 1768 status); 1769 1770 if (cp->val != 0x00 && cp->val != 0x01) 1771 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, 1772 MGMT_STATUS_INVALID_PARAMS); 1773 1774 hci_dev_lock(hdev); 1775 1776 if (!hdev_is_powered(hdev)) { 1777 bool changed = false; 1778 1779 if (!!cp->val != hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) { 1780 hci_dev_change_flag(hdev, HCI_LINK_SECURITY); 1781 changed = true; 1782 } 1783 1784 err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev); 1785 if (err < 0) 1786 goto failed; 1787 1788 if (changed) 1789 err = new_settings(hdev, sk); 1790 1791 goto failed; 1792 } 1793 1794 if (pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) { 1795 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, 1796 MGMT_STATUS_BUSY); 1797 goto failed; 1798 } 1799 1800 val = !!cp->val; 1801 1802 if (test_bit(HCI_AUTH, &hdev->flags) == val) { 1803 err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev); 1804 goto failed; 1805 } 1806 1807 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len); 1808 if (!cmd) { 1809 err = -ENOMEM; 1810 goto failed; 1811 } 1812 1813 err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val); 1814 if (err < 0) { 1815 mgmt_pending_remove(cmd); 1816 goto failed; 1817 } 1818 1819 failed: 1820 hci_dev_unlock(hdev); 1821 return err; 1822 } 1823 1824 static void set_ssp_complete(struct hci_dev *hdev, void *data, int err) 1825 { 1826 struct cmd_lookup match = { NULL, hdev }; 1827 struct mgmt_pending_cmd *cmd = data; 1828 struct mgmt_mode *cp = cmd->param; 1829 u8 enable = cp->val; 1830 bool changed; 1831 1832 /* Make sure cmd still outstanding. */ 1833 if (cmd != pending_find(MGMT_OP_SET_SSP, hdev)) 1834 return; 1835 1836 if (err) { 1837 u8 mgmt_err = mgmt_status(err); 1838 1839 if (enable && hci_dev_test_and_clear_flag(hdev, 1840 HCI_SSP_ENABLED)) { 1841 hci_dev_clear_flag(hdev, HCI_HS_ENABLED); 1842 new_settings(hdev, NULL); 1843 } 1844 1845 mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp, 1846 &mgmt_err); 1847 return; 1848 } 1849 1850 if (enable) { 1851 changed = !hci_dev_test_and_set_flag(hdev, HCI_SSP_ENABLED); 1852 } else { 1853 changed = hci_dev_test_and_clear_flag(hdev, HCI_SSP_ENABLED); 1854 1855 if (!changed) 1856 changed = hci_dev_test_and_clear_flag(hdev, 1857 HCI_HS_ENABLED); 1858 else 1859 hci_dev_clear_flag(hdev, HCI_HS_ENABLED); 1860 } 1861 1862 mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match); 1863 1864 if (changed) 1865 new_settings(hdev, match.sk); 1866 1867 if (match.sk) 1868 sock_put(match.sk); 1869 1870 hci_update_eir_sync(hdev); 1871 } 1872 1873 static int set_ssp_sync(struct hci_dev *hdev, void *data) 1874 { 1875 struct mgmt_pending_cmd *cmd = data; 1876 struct mgmt_mode *cp = cmd->param; 1877 bool changed = false; 1878 int err; 1879 1880 if (cp->val) 1881 changed = !hci_dev_test_and_set_flag(hdev, HCI_SSP_ENABLED); 1882 1883 err = hci_write_ssp_mode_sync(hdev, cp->val); 1884 1885 if (!err && changed) 1886 hci_dev_clear_flag(hdev, HCI_SSP_ENABLED); 1887 1888 return err; 1889 } 1890 1891 static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) 1892 { 1893 struct mgmt_mode *cp = data; 1894 struct mgmt_pending_cmd *cmd; 1895 u8 status; 1896 int err; 1897 1898 bt_dev_dbg(hdev, "sock %p", sk); 1899 1900 status = mgmt_bredr_support(hdev); 1901 if (status) 1902 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status); 1903 1904 if (!lmp_ssp_capable(hdev)) 1905 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, 1906 MGMT_STATUS_NOT_SUPPORTED); 1907 1908 if (cp->val != 0x00 && cp->val != 0x01) 1909 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, 1910 MGMT_STATUS_INVALID_PARAMS); 1911 1912 hci_dev_lock(hdev); 1913 1914 if (!hdev_is_powered(hdev)) { 1915 bool changed; 1916 1917 if (cp->val) { 1918 changed = !hci_dev_test_and_set_flag(hdev, 1919 HCI_SSP_ENABLED); 1920 } else { 1921 changed = hci_dev_test_and_clear_flag(hdev, 1922 HCI_SSP_ENABLED); 1923 if (!changed) 1924 changed = hci_dev_test_and_clear_flag(hdev, 1925 HCI_HS_ENABLED); 1926 else 1927 hci_dev_clear_flag(hdev, HCI_HS_ENABLED); 1928 } 1929 1930 err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev); 1931 if (err < 0) 1932 goto failed; 1933 1934 if (changed) 1935 err = new_settings(hdev, sk); 1936 1937 goto failed; 1938 } 1939 1940 if (pending_find(MGMT_OP_SET_SSP, hdev)) { 1941 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, 1942 MGMT_STATUS_BUSY); 1943 goto failed; 1944 } 1945 1946 if (!!cp->val == hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { 1947 err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev); 1948 goto failed; 1949 } 1950 1951 cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len); 1952 if (!cmd) 1953 err = -ENOMEM; 1954 else 1955 err = hci_cmd_sync_queue(hdev, set_ssp_sync, cmd, 1956 set_ssp_complete); 1957 1958 if (err < 0) { 1959 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, 1960 MGMT_STATUS_FAILED); 1961 1962 if (cmd) 1963 mgmt_pending_remove(cmd); 1964 } 1965 1966 failed: 1967 hci_dev_unlock(hdev); 1968 return err; 1969 } 1970 1971 static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) 1972 { 1973 struct mgmt_mode *cp = data; 1974 bool changed; 1975 u8 status; 1976 int err; 1977 1978 bt_dev_dbg(hdev, "sock %p", sk); 1979 1980 if (!IS_ENABLED(CONFIG_BT_HS)) 1981 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 1982 MGMT_STATUS_NOT_SUPPORTED); 1983 1984 status = mgmt_bredr_support(hdev); 1985 if (status) 1986 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status); 1987 1988 if (!lmp_ssp_capable(hdev)) 1989 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 1990 MGMT_STATUS_NOT_SUPPORTED); 1991 1992 if (!hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) 1993 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 1994 MGMT_STATUS_REJECTED); 1995 1996 if (cp->val != 0x00 && cp->val != 0x01) 1997 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 1998 MGMT_STATUS_INVALID_PARAMS); 1999 2000 hci_dev_lock(hdev); 2001 2002 if (pending_find(MGMT_OP_SET_SSP, hdev)) { 2003 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 2004 MGMT_STATUS_BUSY); 2005 goto unlock; 2006 } 2007 2008 if (cp->val) { 2009 changed = !hci_dev_test_and_set_flag(hdev, HCI_HS_ENABLED); 2010 } else { 2011 if (hdev_is_powered(hdev)) { 2012 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, 2013 MGMT_STATUS_REJECTED); 2014 goto unlock; 2015 } 2016 2017 changed = hci_dev_test_and_clear_flag(hdev, HCI_HS_ENABLED); 2018 } 2019 2020 err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev); 2021 if (err < 0) 2022 goto unlock; 2023 2024 if (changed) 2025 err = new_settings(hdev, sk); 2026 2027 unlock: 2028 hci_dev_unlock(hdev); 2029 return err; 2030 } 2031 2032 static void set_le_complete(struct hci_dev *hdev, void *data, int err) 2033 { 2034 struct cmd_lookup match = { NULL, hdev }; 2035 u8 status = mgmt_status(err); 2036 2037 bt_dev_dbg(hdev, "err %d", err); 2038 2039 if (status) { 2040 mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp, 2041 &status); 2042 return; 2043 } 2044 2045 mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match); 2046 2047 new_settings(hdev, match.sk); 2048 2049 if (match.sk) 2050 sock_put(match.sk); 2051 } 2052 2053 static int set_le_sync(struct hci_dev *hdev, void *data) 2054 { 2055 struct mgmt_pending_cmd *cmd = data; 2056 struct mgmt_mode *cp = cmd->param; 2057 u8 val = !!cp->val; 2058 int err; 2059 2060 if (!val) { 2061 if (hci_dev_test_flag(hdev, HCI_LE_ADV)) 2062 hci_disable_advertising_sync(hdev); 2063 2064 if (ext_adv_capable(hdev)) 2065 hci_remove_ext_adv_instance_sync(hdev, 0, cmd->sk); 2066 } else { 2067 hci_dev_set_flag(hdev, HCI_LE_ENABLED); 2068 } 2069 2070 err = hci_write_le_host_supported_sync(hdev, val, 0); 2071 2072 /* Make sure the controller has a good default for 2073 * advertising data. Restrict the update to when LE 2074 * has actually been enabled. During power on, the 2075 * update in powered_update_hci will take care of it. 2076 */ 2077 if (!err && hci_dev_test_flag(hdev, HCI_LE_ENABLED)) { 2078 if (ext_adv_capable(hdev)) { 2079 int status; 2080 2081 status = hci_setup_ext_adv_instance_sync(hdev, 0x00); 2082 if (!status) 2083 hci_update_scan_rsp_data_sync(hdev, 0x00); 2084 } else { 2085 hci_update_adv_data_sync(hdev, 0x00); 2086 hci_update_scan_rsp_data_sync(hdev, 0x00); 2087 } 2088 2089 hci_update_passive_scan(hdev); 2090 } 2091 2092 return err; 2093 } 2094 2095 static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) 2096 { 2097 struct mgmt_mode *cp = data; 2098 struct mgmt_pending_cmd *cmd; 2099 int err; 2100 u8 val, enabled; 2101 2102 bt_dev_dbg(hdev, "sock %p", sk); 2103 2104 if (!lmp_le_capable(hdev)) 2105 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, 2106 MGMT_STATUS_NOT_SUPPORTED); 2107 2108 if (cp->val != 0x00 && cp->val != 0x01) 2109 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, 2110 MGMT_STATUS_INVALID_PARAMS); 2111 2112 /* Bluetooth single mode LE only controllers or dual-mode 2113 * controllers configured as LE only devices, do not allow 2114 * switching LE off. These have either LE enabled explicitly 2115 * or BR/EDR has been previously switched off. 2116 * 2117 * When trying to enable an already enabled LE, then gracefully 2118 * send a positive response. Trying to disable it however will 2119 * result into rejection. 2120 */ 2121 if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { 2122 if (cp->val == 0x01) 2123 return send_settings_rsp(sk, MGMT_OP_SET_LE, hdev); 2124 2125 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, 2126 MGMT_STATUS_REJECTED); 2127 } 2128 2129 hci_dev_lock(hdev); 2130 2131 val = !!cp->val; 2132 enabled = lmp_host_le_capable(hdev); 2133 2134 if (!val) 2135 hci_req_clear_adv_instance(hdev, NULL, NULL, 0x00, true); 2136 2137 if (!hdev_is_powered(hdev) || val == enabled) { 2138 bool changed = false; 2139 2140 if (val != hci_dev_test_flag(hdev, HCI_LE_ENABLED)) { 2141 hci_dev_change_flag(hdev, HCI_LE_ENABLED); 2142 changed = true; 2143 } 2144 2145 if (!val && hci_dev_test_flag(hdev, HCI_ADVERTISING)) { 2146 hci_dev_clear_flag(hdev, HCI_ADVERTISING); 2147 changed = true; 2148 } 2149 2150 err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev); 2151 if (err < 0) 2152 goto unlock; 2153 2154 if (changed) 2155 err = new_settings(hdev, sk); 2156 2157 goto unlock; 2158 } 2159 2160 if (pending_find(MGMT_OP_SET_LE, hdev) || 2161 pending_find(MGMT_OP_SET_ADVERTISING, hdev)) { 2162 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, 2163 MGMT_STATUS_BUSY); 2164 goto unlock; 2165 } 2166 2167 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len); 2168 if (!cmd) 2169 err = -ENOMEM; 2170 else 2171 err = hci_cmd_sync_queue(hdev, set_le_sync, cmd, 2172 set_le_complete); 2173 2174 if (err < 0) { 2175 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, 2176 MGMT_STATUS_FAILED); 2177 2178 if (cmd) 2179 mgmt_pending_remove(cmd); 2180 } 2181 2182 unlock: 2183 hci_dev_unlock(hdev); 2184 return err; 2185 } 2186 2187 /* This is a helper function to test for pending mgmt commands that can 2188 * cause CoD or EIR HCI commands. We can only allow one such pending 2189 * mgmt command at a time since otherwise we cannot easily track what 2190 * the current values are, will be, and based on that calculate if a new 2191 * HCI command needs to be sent and if yes with what value. 2192 */ 2193 static bool pending_eir_or_class(struct hci_dev *hdev) 2194 { 2195 struct mgmt_pending_cmd *cmd; 2196 2197 list_for_each_entry(cmd, &hdev->mgmt_pending, list) { 2198 switch (cmd->opcode) { 2199 case MGMT_OP_ADD_UUID: 2200 case MGMT_OP_REMOVE_UUID: 2201 case MGMT_OP_SET_DEV_CLASS: 2202 case MGMT_OP_SET_POWERED: 2203 return true; 2204 } 2205 } 2206 2207 return false; 2208 } 2209 2210 static const u8 bluetooth_base_uuid[] = { 2211 0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80, 2212 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 2213 }; 2214 2215 static u8 get_uuid_size(const u8 *uuid) 2216 { 2217 u32 val; 2218 2219 if (memcmp(uuid, bluetooth_base_uuid, 12)) 2220 return 128; 2221 2222 val = get_unaligned_le32(&uuid[12]); 2223 if (val > 0xffff) 2224 return 32; 2225 2226 return 16; 2227 } 2228 2229 static void mgmt_class_complete(struct hci_dev *hdev, void *data, int err) 2230 { 2231 struct mgmt_pending_cmd *cmd = data; 2232 2233 bt_dev_dbg(hdev, "err %d", err); 2234 2235 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 2236 mgmt_status(err), hdev->dev_class, 3); 2237 2238 mgmt_pending_free(cmd); 2239 } 2240 2241 static int add_uuid_sync(struct hci_dev *hdev, void *data) 2242 { 2243 int err; 2244 2245 err = hci_update_class_sync(hdev); 2246 if (err) 2247 return err; 2248 2249 return hci_update_eir_sync(hdev); 2250 } 2251 2252 static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) 2253 { 2254 struct mgmt_cp_add_uuid *cp = data; 2255 struct mgmt_pending_cmd *cmd; 2256 struct bt_uuid *uuid; 2257 int err; 2258 2259 bt_dev_dbg(hdev, "sock %p", sk); 2260 2261 hci_dev_lock(hdev); 2262 2263 if (pending_eir_or_class(hdev)) { 2264 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID, 2265 MGMT_STATUS_BUSY); 2266 goto failed; 2267 } 2268 2269 uuid = kmalloc(sizeof(*uuid), GFP_KERNEL); 2270 if (!uuid) { 2271 err = -ENOMEM; 2272 goto failed; 2273 } 2274 2275 memcpy(uuid->uuid, cp->uuid, 16); 2276 uuid->svc_hint = cp->svc_hint; 2277 uuid->size = get_uuid_size(cp->uuid); 2278 2279 list_add_tail(&uuid->list, &hdev->uuids); 2280 2281 cmd = mgmt_pending_new(sk, MGMT_OP_ADD_UUID, hdev, data, len); 2282 if (!cmd) { 2283 err = -ENOMEM; 2284 goto failed; 2285 } 2286 2287 err = hci_cmd_sync_queue(hdev, add_uuid_sync, cmd, mgmt_class_complete); 2288 if (err < 0) { 2289 mgmt_pending_free(cmd); 2290 goto failed; 2291 } 2292 2293 failed: 2294 hci_dev_unlock(hdev); 2295 return err; 2296 } 2297 2298 static bool enable_service_cache(struct hci_dev *hdev) 2299 { 2300 if (!hdev_is_powered(hdev)) 2301 return false; 2302 2303 if (!hci_dev_test_and_set_flag(hdev, HCI_SERVICE_CACHE)) { 2304 queue_delayed_work(hdev->workqueue, &hdev->service_cache, 2305 CACHE_TIMEOUT); 2306 return true; 2307 } 2308 2309 return false; 2310 } 2311 2312 static int remove_uuid_sync(struct hci_dev *hdev, void *data) 2313 { 2314 int err; 2315 2316 err = hci_update_class_sync(hdev); 2317 if (err) 2318 return err; 2319 2320 return hci_update_eir_sync(hdev); 2321 } 2322 2323 static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data, 2324 u16 len) 2325 { 2326 struct mgmt_cp_remove_uuid *cp = data; 2327 struct mgmt_pending_cmd *cmd; 2328 struct bt_uuid *match, *tmp; 2329 static const u8 bt_uuid_any[] = { 2330 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 2331 }; 2332 int err, found; 2333 2334 bt_dev_dbg(hdev, "sock %p", sk); 2335 2336 hci_dev_lock(hdev); 2337 2338 if (pending_eir_or_class(hdev)) { 2339 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID, 2340 MGMT_STATUS_BUSY); 2341 goto unlock; 2342 } 2343 2344 if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) { 2345 hci_uuids_clear(hdev); 2346 2347 if (enable_service_cache(hdev)) { 2348 err = mgmt_cmd_complete(sk, hdev->id, 2349 MGMT_OP_REMOVE_UUID, 2350 0, hdev->dev_class, 3); 2351 goto unlock; 2352 } 2353 2354 goto update_class; 2355 } 2356 2357 found = 0; 2358 2359 list_for_each_entry_safe(match, tmp, &hdev->uuids, list) { 2360 if (memcmp(match->uuid, cp->uuid, 16) != 0) 2361 continue; 2362 2363 list_del(&match->list); 2364 kfree(match); 2365 found++; 2366 } 2367 2368 if (found == 0) { 2369 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID, 2370 MGMT_STATUS_INVALID_PARAMS); 2371 goto unlock; 2372 } 2373 2374 update_class: 2375 cmd = mgmt_pending_new(sk, MGMT_OP_REMOVE_UUID, hdev, data, len); 2376 if (!cmd) { 2377 err = -ENOMEM; 2378 goto unlock; 2379 } 2380 2381 err = hci_cmd_sync_queue(hdev, remove_uuid_sync, cmd, 2382 mgmt_class_complete); 2383 if (err < 0) 2384 mgmt_pending_free(cmd); 2385 2386 unlock: 2387 hci_dev_unlock(hdev); 2388 return err; 2389 } 2390 2391 static int set_class_sync(struct hci_dev *hdev, void *data) 2392 { 2393 int err = 0; 2394 2395 if (hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) { 2396 cancel_delayed_work_sync(&hdev->service_cache); 2397 err = hci_update_eir_sync(hdev); 2398 } 2399 2400 if (err) 2401 return err; 2402 2403 return hci_update_class_sync(hdev); 2404 } 2405 2406 static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data, 2407 u16 len) 2408 { 2409 struct mgmt_cp_set_dev_class *cp = data; 2410 struct mgmt_pending_cmd *cmd; 2411 int err; 2412 2413 bt_dev_dbg(hdev, "sock %p", sk); 2414 2415 if (!lmp_bredr_capable(hdev)) 2416 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 2417 MGMT_STATUS_NOT_SUPPORTED); 2418 2419 hci_dev_lock(hdev); 2420 2421 if (pending_eir_or_class(hdev)) { 2422 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 2423 MGMT_STATUS_BUSY); 2424 goto unlock; 2425 } 2426 2427 if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) { 2428 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 2429 MGMT_STATUS_INVALID_PARAMS); 2430 goto unlock; 2431 } 2432 2433 hdev->major_class = cp->major; 2434 hdev->minor_class = cp->minor; 2435 2436 if (!hdev_is_powered(hdev)) { 2437 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0, 2438 hdev->dev_class, 3); 2439 goto unlock; 2440 } 2441 2442 cmd = mgmt_pending_new(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len); 2443 if (!cmd) { 2444 err = -ENOMEM; 2445 goto unlock; 2446 } 2447 2448 err = hci_cmd_sync_queue(hdev, set_class_sync, cmd, 2449 mgmt_class_complete); 2450 if (err < 0) 2451 mgmt_pending_free(cmd); 2452 2453 unlock: 2454 hci_dev_unlock(hdev); 2455 return err; 2456 } 2457 2458 static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data, 2459 u16 len) 2460 { 2461 struct mgmt_cp_load_link_keys *cp = data; 2462 const u16 max_key_count = ((U16_MAX - sizeof(*cp)) / 2463 sizeof(struct mgmt_link_key_info)); 2464 u16 key_count, expected_len; 2465 bool changed; 2466 int i; 2467 2468 bt_dev_dbg(hdev, "sock %p", sk); 2469 2470 if (!lmp_bredr_capable(hdev)) 2471 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 2472 MGMT_STATUS_NOT_SUPPORTED); 2473 2474 key_count = __le16_to_cpu(cp->key_count); 2475 if (key_count > max_key_count) { 2476 bt_dev_err(hdev, "load_link_keys: too big key_count value %u", 2477 key_count); 2478 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 2479 MGMT_STATUS_INVALID_PARAMS); 2480 } 2481 2482 expected_len = struct_size(cp, keys, key_count); 2483 if (expected_len != len) { 2484 bt_dev_err(hdev, "load_link_keys: expected %u bytes, got %u bytes", 2485 expected_len, len); 2486 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 2487 MGMT_STATUS_INVALID_PARAMS); 2488 } 2489 2490 if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01) 2491 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 2492 MGMT_STATUS_INVALID_PARAMS); 2493 2494 bt_dev_dbg(hdev, "debug_keys %u key_count %u", cp->debug_keys, 2495 key_count); 2496 2497 for (i = 0; i < key_count; i++) { 2498 struct mgmt_link_key_info *key = &cp->keys[i]; 2499 2500 if (key->addr.type != BDADDR_BREDR || key->type > 0x08) 2501 return mgmt_cmd_status(sk, hdev->id, 2502 MGMT_OP_LOAD_LINK_KEYS, 2503 MGMT_STATUS_INVALID_PARAMS); 2504 } 2505 2506 hci_dev_lock(hdev); 2507 2508 hci_link_keys_clear(hdev); 2509 2510 if (cp->debug_keys) 2511 changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS); 2512 else 2513 changed = hci_dev_test_and_clear_flag(hdev, 2514 HCI_KEEP_DEBUG_KEYS); 2515 2516 if (changed) 2517 new_settings(hdev, NULL); 2518 2519 for (i = 0; i < key_count; i++) { 2520 struct mgmt_link_key_info *key = &cp->keys[i]; 2521 2522 if (hci_is_blocked_key(hdev, 2523 HCI_BLOCKED_KEY_TYPE_LINKKEY, 2524 key->val)) { 2525 bt_dev_warn(hdev, "Skipping blocked link key for %pMR", 2526 &key->addr.bdaddr); 2527 continue; 2528 } 2529 2530 /* Always ignore debug keys and require a new pairing if 2531 * the user wants to use them. 2532 */ 2533 if (key->type == HCI_LK_DEBUG_COMBINATION) 2534 continue; 2535 2536 hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val, 2537 key->type, key->pin_len, NULL); 2538 } 2539 2540 mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0); 2541 2542 hci_dev_unlock(hdev); 2543 2544 return 0; 2545 } 2546 2547 static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr, 2548 u8 addr_type, struct sock *skip_sk) 2549 { 2550 struct mgmt_ev_device_unpaired ev; 2551 2552 bacpy(&ev.addr.bdaddr, bdaddr); 2553 ev.addr.type = addr_type; 2554 2555 return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev), 2556 skip_sk); 2557 } 2558 2559 static void unpair_device_complete(struct hci_dev *hdev, void *data, int err) 2560 { 2561 struct mgmt_pending_cmd *cmd = data; 2562 struct mgmt_cp_unpair_device *cp = cmd->param; 2563 2564 if (!err) 2565 device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk); 2566 2567 cmd->cmd_complete(cmd, err); 2568 mgmt_pending_free(cmd); 2569 } 2570 2571 static int unpair_device_sync(struct hci_dev *hdev, void *data) 2572 { 2573 struct mgmt_pending_cmd *cmd = data; 2574 struct mgmt_cp_unpair_device *cp = cmd->param; 2575 struct hci_conn *conn; 2576 2577 if (cp->addr.type == BDADDR_BREDR) 2578 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 2579 &cp->addr.bdaddr); 2580 else 2581 conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, 2582 le_addr_type(cp->addr.type)); 2583 2584 if (!conn) 2585 return 0; 2586 2587 return hci_abort_conn_sync(hdev, conn, HCI_ERROR_REMOTE_USER_TERM); 2588 } 2589 2590 static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data, 2591 u16 len) 2592 { 2593 struct mgmt_cp_unpair_device *cp = data; 2594 struct mgmt_rp_unpair_device rp; 2595 struct hci_conn_params *params; 2596 struct mgmt_pending_cmd *cmd; 2597 struct hci_conn *conn; 2598 u8 addr_type; 2599 int err; 2600 2601 memset(&rp, 0, sizeof(rp)); 2602 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 2603 rp.addr.type = cp->addr.type; 2604 2605 if (!bdaddr_type_is_valid(cp->addr.type)) 2606 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 2607 MGMT_STATUS_INVALID_PARAMS, 2608 &rp, sizeof(rp)); 2609 2610 if (cp->disconnect != 0x00 && cp->disconnect != 0x01) 2611 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 2612 MGMT_STATUS_INVALID_PARAMS, 2613 &rp, sizeof(rp)); 2614 2615 hci_dev_lock(hdev); 2616 2617 if (!hdev_is_powered(hdev)) { 2618 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 2619 MGMT_STATUS_NOT_POWERED, &rp, 2620 sizeof(rp)); 2621 goto unlock; 2622 } 2623 2624 if (cp->addr.type == BDADDR_BREDR) { 2625 /* If disconnection is requested, then look up the 2626 * connection. If the remote device is connected, it 2627 * will be later used to terminate the link. 2628 * 2629 * Setting it to NULL explicitly will cause no 2630 * termination of the link. 2631 */ 2632 if (cp->disconnect) 2633 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 2634 &cp->addr.bdaddr); 2635 else 2636 conn = NULL; 2637 2638 err = hci_remove_link_key(hdev, &cp->addr.bdaddr); 2639 if (err < 0) { 2640 err = mgmt_cmd_complete(sk, hdev->id, 2641 MGMT_OP_UNPAIR_DEVICE, 2642 MGMT_STATUS_NOT_PAIRED, &rp, 2643 sizeof(rp)); 2644 goto unlock; 2645 } 2646 2647 goto done; 2648 } 2649 2650 /* LE address type */ 2651 addr_type = le_addr_type(cp->addr.type); 2652 2653 /* Abort any ongoing SMP pairing. Removes ltk and irk if they exist. */ 2654 err = smp_cancel_and_remove_pairing(hdev, &cp->addr.bdaddr, addr_type); 2655 if (err < 0) { 2656 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 2657 MGMT_STATUS_NOT_PAIRED, &rp, 2658 sizeof(rp)); 2659 goto unlock; 2660 } 2661 2662 conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, addr_type); 2663 if (!conn) { 2664 hci_conn_params_del(hdev, &cp->addr.bdaddr, addr_type); 2665 goto done; 2666 } 2667 2668 2669 /* Defer clearing up the connection parameters until closing to 2670 * give a chance of keeping them if a repairing happens. 2671 */ 2672 set_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags); 2673 2674 /* Disable auto-connection parameters if present */ 2675 params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, addr_type); 2676 if (params) { 2677 if (params->explicit_connect) 2678 params->auto_connect = HCI_AUTO_CONN_EXPLICIT; 2679 else 2680 params->auto_connect = HCI_AUTO_CONN_DISABLED; 2681 } 2682 2683 /* If disconnection is not requested, then clear the connection 2684 * variable so that the link is not terminated. 2685 */ 2686 if (!cp->disconnect) 2687 conn = NULL; 2688 2689 done: 2690 /* If the connection variable is set, then termination of the 2691 * link is requested. 2692 */ 2693 if (!conn) { 2694 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0, 2695 &rp, sizeof(rp)); 2696 device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk); 2697 goto unlock; 2698 } 2699 2700 cmd = mgmt_pending_new(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp, 2701 sizeof(*cp)); 2702 if (!cmd) { 2703 err = -ENOMEM; 2704 goto unlock; 2705 } 2706 2707 cmd->cmd_complete = addr_cmd_complete; 2708 2709 err = hci_cmd_sync_queue(hdev, unpair_device_sync, cmd, 2710 unpair_device_complete); 2711 if (err < 0) 2712 mgmt_pending_free(cmd); 2713 2714 unlock: 2715 hci_dev_unlock(hdev); 2716 return err; 2717 } 2718 2719 static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data, 2720 u16 len) 2721 { 2722 struct mgmt_cp_disconnect *cp = data; 2723 struct mgmt_rp_disconnect rp; 2724 struct mgmt_pending_cmd *cmd; 2725 struct hci_conn *conn; 2726 int err; 2727 2728 bt_dev_dbg(hdev, "sock %p", sk); 2729 2730 memset(&rp, 0, sizeof(rp)); 2731 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 2732 rp.addr.type = cp->addr.type; 2733 2734 if (!bdaddr_type_is_valid(cp->addr.type)) 2735 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, 2736 MGMT_STATUS_INVALID_PARAMS, 2737 &rp, sizeof(rp)); 2738 2739 hci_dev_lock(hdev); 2740 2741 if (!test_bit(HCI_UP, &hdev->flags)) { 2742 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, 2743 MGMT_STATUS_NOT_POWERED, &rp, 2744 sizeof(rp)); 2745 goto failed; 2746 } 2747 2748 if (pending_find(MGMT_OP_DISCONNECT, hdev)) { 2749 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, 2750 MGMT_STATUS_BUSY, &rp, sizeof(rp)); 2751 goto failed; 2752 } 2753 2754 if (cp->addr.type == BDADDR_BREDR) 2755 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 2756 &cp->addr.bdaddr); 2757 else 2758 conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, 2759 le_addr_type(cp->addr.type)); 2760 2761 if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) { 2762 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, 2763 MGMT_STATUS_NOT_CONNECTED, &rp, 2764 sizeof(rp)); 2765 goto failed; 2766 } 2767 2768 cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len); 2769 if (!cmd) { 2770 err = -ENOMEM; 2771 goto failed; 2772 } 2773 2774 cmd->cmd_complete = generic_cmd_complete; 2775 2776 err = hci_disconnect(conn, HCI_ERROR_REMOTE_USER_TERM); 2777 if (err < 0) 2778 mgmt_pending_remove(cmd); 2779 2780 failed: 2781 hci_dev_unlock(hdev); 2782 return err; 2783 } 2784 2785 static u8 link_to_bdaddr(u8 link_type, u8 addr_type) 2786 { 2787 switch (link_type) { 2788 case LE_LINK: 2789 switch (addr_type) { 2790 case ADDR_LE_DEV_PUBLIC: 2791 return BDADDR_LE_PUBLIC; 2792 2793 default: 2794 /* Fallback to LE Random address type */ 2795 return BDADDR_LE_RANDOM; 2796 } 2797 2798 default: 2799 /* Fallback to BR/EDR type */ 2800 return BDADDR_BREDR; 2801 } 2802 } 2803 2804 static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data, 2805 u16 data_len) 2806 { 2807 struct mgmt_rp_get_connections *rp; 2808 struct hci_conn *c; 2809 int err; 2810 u16 i; 2811 2812 bt_dev_dbg(hdev, "sock %p", sk); 2813 2814 hci_dev_lock(hdev); 2815 2816 if (!hdev_is_powered(hdev)) { 2817 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 2818 MGMT_STATUS_NOT_POWERED); 2819 goto unlock; 2820 } 2821 2822 i = 0; 2823 list_for_each_entry(c, &hdev->conn_hash.list, list) { 2824 if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags)) 2825 i++; 2826 } 2827 2828 rp = kmalloc(struct_size(rp, addr, i), GFP_KERNEL); 2829 if (!rp) { 2830 err = -ENOMEM; 2831 goto unlock; 2832 } 2833 2834 i = 0; 2835 list_for_each_entry(c, &hdev->conn_hash.list, list) { 2836 if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags)) 2837 continue; 2838 bacpy(&rp->addr[i].bdaddr, &c->dst); 2839 rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type); 2840 if (c->type == SCO_LINK || c->type == ESCO_LINK) 2841 continue; 2842 i++; 2843 } 2844 2845 rp->conn_count = cpu_to_le16(i); 2846 2847 /* Recalculate length in case of filtered SCO connections, etc */ 2848 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp, 2849 struct_size(rp, addr, i)); 2850 2851 kfree(rp); 2852 2853 unlock: 2854 hci_dev_unlock(hdev); 2855 return err; 2856 } 2857 2858 static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev, 2859 struct mgmt_cp_pin_code_neg_reply *cp) 2860 { 2861 struct mgmt_pending_cmd *cmd; 2862 int err; 2863 2864 cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp, 2865 sizeof(*cp)); 2866 if (!cmd) 2867 return -ENOMEM; 2868 2869 cmd->cmd_complete = addr_cmd_complete; 2870 2871 err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, 2872 sizeof(cp->addr.bdaddr), &cp->addr.bdaddr); 2873 if (err < 0) 2874 mgmt_pending_remove(cmd); 2875 2876 return err; 2877 } 2878 2879 static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data, 2880 u16 len) 2881 { 2882 struct hci_conn *conn; 2883 struct mgmt_cp_pin_code_reply *cp = data; 2884 struct hci_cp_pin_code_reply reply; 2885 struct mgmt_pending_cmd *cmd; 2886 int err; 2887 2888 bt_dev_dbg(hdev, "sock %p", sk); 2889 2890 hci_dev_lock(hdev); 2891 2892 if (!hdev_is_powered(hdev)) { 2893 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, 2894 MGMT_STATUS_NOT_POWERED); 2895 goto failed; 2896 } 2897 2898 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr); 2899 if (!conn) { 2900 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, 2901 MGMT_STATUS_NOT_CONNECTED); 2902 goto failed; 2903 } 2904 2905 if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) { 2906 struct mgmt_cp_pin_code_neg_reply ncp; 2907 2908 memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr)); 2909 2910 bt_dev_err(hdev, "PIN code is not 16 bytes long"); 2911 2912 err = send_pin_code_neg_reply(sk, hdev, &ncp); 2913 if (err >= 0) 2914 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, 2915 MGMT_STATUS_INVALID_PARAMS); 2916 2917 goto failed; 2918 } 2919 2920 cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len); 2921 if (!cmd) { 2922 err = -ENOMEM; 2923 goto failed; 2924 } 2925 2926 cmd->cmd_complete = addr_cmd_complete; 2927 2928 bacpy(&reply.bdaddr, &cp->addr.bdaddr); 2929 reply.pin_len = cp->pin_len; 2930 memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code)); 2931 2932 err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply); 2933 if (err < 0) 2934 mgmt_pending_remove(cmd); 2935 2936 failed: 2937 hci_dev_unlock(hdev); 2938 return err; 2939 } 2940 2941 static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data, 2942 u16 len) 2943 { 2944 struct mgmt_cp_set_io_capability *cp = data; 2945 2946 bt_dev_dbg(hdev, "sock %p", sk); 2947 2948 if (cp->io_capability > SMP_IO_KEYBOARD_DISPLAY) 2949 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 2950 MGMT_STATUS_INVALID_PARAMS); 2951 2952 hci_dev_lock(hdev); 2953 2954 hdev->io_capability = cp->io_capability; 2955 2956 bt_dev_dbg(hdev, "IO capability set to 0x%02x", hdev->io_capability); 2957 2958 hci_dev_unlock(hdev); 2959 2960 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, 2961 NULL, 0); 2962 } 2963 2964 static struct mgmt_pending_cmd *find_pairing(struct hci_conn *conn) 2965 { 2966 struct hci_dev *hdev = conn->hdev; 2967 struct mgmt_pending_cmd *cmd; 2968 2969 list_for_each_entry(cmd, &hdev->mgmt_pending, list) { 2970 if (cmd->opcode != MGMT_OP_PAIR_DEVICE) 2971 continue; 2972 2973 if (cmd->user_data != conn) 2974 continue; 2975 2976 return cmd; 2977 } 2978 2979 return NULL; 2980 } 2981 2982 static int pairing_complete(struct mgmt_pending_cmd *cmd, u8 status) 2983 { 2984 struct mgmt_rp_pair_device rp; 2985 struct hci_conn *conn = cmd->user_data; 2986 int err; 2987 2988 bacpy(&rp.addr.bdaddr, &conn->dst); 2989 rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type); 2990 2991 err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, 2992 status, &rp, sizeof(rp)); 2993 2994 /* So we don't get further callbacks for this connection */ 2995 conn->connect_cfm_cb = NULL; 2996 conn->security_cfm_cb = NULL; 2997 conn->disconn_cfm_cb = NULL; 2998 2999 hci_conn_drop(conn); 3000 3001 /* The device is paired so there is no need to remove 3002 * its connection parameters anymore. 3003 */ 3004 clear_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags); 3005 3006 hci_conn_put(conn); 3007 3008 return err; 3009 } 3010 3011 void mgmt_smp_complete(struct hci_conn *conn, bool complete) 3012 { 3013 u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED; 3014 struct mgmt_pending_cmd *cmd; 3015 3016 cmd = find_pairing(conn); 3017 if (cmd) { 3018 cmd->cmd_complete(cmd, status); 3019 mgmt_pending_remove(cmd); 3020 } 3021 } 3022 3023 static void pairing_complete_cb(struct hci_conn *conn, u8 status) 3024 { 3025 struct mgmt_pending_cmd *cmd; 3026 3027 BT_DBG("status %u", status); 3028 3029 cmd = find_pairing(conn); 3030 if (!cmd) { 3031 BT_DBG("Unable to find a pending command"); 3032 return; 3033 } 3034 3035 cmd->cmd_complete(cmd, mgmt_status(status)); 3036 mgmt_pending_remove(cmd); 3037 } 3038 3039 static void le_pairing_complete_cb(struct hci_conn *conn, u8 status) 3040 { 3041 struct mgmt_pending_cmd *cmd; 3042 3043 BT_DBG("status %u", status); 3044 3045 if (!status) 3046 return; 3047 3048 cmd = find_pairing(conn); 3049 if (!cmd) { 3050 BT_DBG("Unable to find a pending command"); 3051 return; 3052 } 3053 3054 cmd->cmd_complete(cmd, mgmt_status(status)); 3055 mgmt_pending_remove(cmd); 3056 } 3057 3058 static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data, 3059 u16 len) 3060 { 3061 struct mgmt_cp_pair_device *cp = data; 3062 struct mgmt_rp_pair_device rp; 3063 struct mgmt_pending_cmd *cmd; 3064 u8 sec_level, auth_type; 3065 struct hci_conn *conn; 3066 int err; 3067 3068 bt_dev_dbg(hdev, "sock %p", sk); 3069 3070 memset(&rp, 0, sizeof(rp)); 3071 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 3072 rp.addr.type = cp->addr.type; 3073 3074 if (!bdaddr_type_is_valid(cp->addr.type)) 3075 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3076 MGMT_STATUS_INVALID_PARAMS, 3077 &rp, sizeof(rp)); 3078 3079 if (cp->io_cap > SMP_IO_KEYBOARD_DISPLAY) 3080 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3081 MGMT_STATUS_INVALID_PARAMS, 3082 &rp, sizeof(rp)); 3083 3084 hci_dev_lock(hdev); 3085 3086 if (!hdev_is_powered(hdev)) { 3087 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3088 MGMT_STATUS_NOT_POWERED, &rp, 3089 sizeof(rp)); 3090 goto unlock; 3091 } 3092 3093 if (hci_bdaddr_is_paired(hdev, &cp->addr.bdaddr, cp->addr.type)) { 3094 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3095 MGMT_STATUS_ALREADY_PAIRED, &rp, 3096 sizeof(rp)); 3097 goto unlock; 3098 } 3099 3100 sec_level = BT_SECURITY_MEDIUM; 3101 auth_type = HCI_AT_DEDICATED_BONDING; 3102 3103 if (cp->addr.type == BDADDR_BREDR) { 3104 conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, 3105 auth_type, CONN_REASON_PAIR_DEVICE); 3106 } else { 3107 u8 addr_type = le_addr_type(cp->addr.type); 3108 struct hci_conn_params *p; 3109 3110 /* When pairing a new device, it is expected to remember 3111 * this device for future connections. Adding the connection 3112 * parameter information ahead of time allows tracking 3113 * of the peripheral preferred values and will speed up any 3114 * further connection establishment. 3115 * 3116 * If connection parameters already exist, then they 3117 * will be kept and this function does nothing. 3118 */ 3119 p = hci_conn_params_add(hdev, &cp->addr.bdaddr, addr_type); 3120 3121 if (p->auto_connect == HCI_AUTO_CONN_EXPLICIT) 3122 p->auto_connect = HCI_AUTO_CONN_DISABLED; 3123 3124 conn = hci_connect_le_scan(hdev, &cp->addr.bdaddr, addr_type, 3125 sec_level, HCI_LE_CONN_TIMEOUT, 3126 CONN_REASON_PAIR_DEVICE); 3127 } 3128 3129 if (IS_ERR(conn)) { 3130 int status; 3131 3132 if (PTR_ERR(conn) == -EBUSY) 3133 status = MGMT_STATUS_BUSY; 3134 else if (PTR_ERR(conn) == -EOPNOTSUPP) 3135 status = MGMT_STATUS_NOT_SUPPORTED; 3136 else if (PTR_ERR(conn) == -ECONNREFUSED) 3137 status = MGMT_STATUS_REJECTED; 3138 else 3139 status = MGMT_STATUS_CONNECT_FAILED; 3140 3141 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3142 status, &rp, sizeof(rp)); 3143 goto unlock; 3144 } 3145 3146 if (conn->connect_cfm_cb) { 3147 hci_conn_drop(conn); 3148 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, 3149 MGMT_STATUS_BUSY, &rp, sizeof(rp)); 3150 goto unlock; 3151 } 3152 3153 cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len); 3154 if (!cmd) { 3155 err = -ENOMEM; 3156 hci_conn_drop(conn); 3157 goto unlock; 3158 } 3159 3160 cmd->cmd_complete = pairing_complete; 3161 3162 /* For LE, just connecting isn't a proof that the pairing finished */ 3163 if (cp->addr.type == BDADDR_BREDR) { 3164 conn->connect_cfm_cb = pairing_complete_cb; 3165 conn->security_cfm_cb = pairing_complete_cb; 3166 conn->disconn_cfm_cb = pairing_complete_cb; 3167 } else { 3168 conn->connect_cfm_cb = le_pairing_complete_cb; 3169 conn->security_cfm_cb = le_pairing_complete_cb; 3170 conn->disconn_cfm_cb = le_pairing_complete_cb; 3171 } 3172 3173 conn->io_capability = cp->io_cap; 3174 cmd->user_data = hci_conn_get(conn); 3175 3176 if ((conn->state == BT_CONNECTED || conn->state == BT_CONFIG) && 3177 hci_conn_security(conn, sec_level, auth_type, true)) { 3178 cmd->cmd_complete(cmd, 0); 3179 mgmt_pending_remove(cmd); 3180 } 3181 3182 err = 0; 3183 3184 unlock: 3185 hci_dev_unlock(hdev); 3186 return err; 3187 } 3188 3189 static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data, 3190 u16 len) 3191 { 3192 struct mgmt_addr_info *addr = data; 3193 struct mgmt_pending_cmd *cmd; 3194 struct hci_conn *conn; 3195 int err; 3196 3197 bt_dev_dbg(hdev, "sock %p", sk); 3198 3199 hci_dev_lock(hdev); 3200 3201 if (!hdev_is_powered(hdev)) { 3202 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 3203 MGMT_STATUS_NOT_POWERED); 3204 goto unlock; 3205 } 3206 3207 cmd = pending_find(MGMT_OP_PAIR_DEVICE, hdev); 3208 if (!cmd) { 3209 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 3210 MGMT_STATUS_INVALID_PARAMS); 3211 goto unlock; 3212 } 3213 3214 conn = cmd->user_data; 3215 3216 if (bacmp(&addr->bdaddr, &conn->dst) != 0) { 3217 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 3218 MGMT_STATUS_INVALID_PARAMS); 3219 goto unlock; 3220 } 3221 3222 cmd->cmd_complete(cmd, MGMT_STATUS_CANCELLED); 3223 mgmt_pending_remove(cmd); 3224 3225 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0, 3226 addr, sizeof(*addr)); 3227 3228 /* Since user doesn't want to proceed with the connection, abort any 3229 * ongoing pairing and then terminate the link if it was created 3230 * because of the pair device action. 3231 */ 3232 if (addr->type == BDADDR_BREDR) 3233 hci_remove_link_key(hdev, &addr->bdaddr); 3234 else 3235 smp_cancel_and_remove_pairing(hdev, &addr->bdaddr, 3236 le_addr_type(addr->type)); 3237 3238 if (conn->conn_reason == CONN_REASON_PAIR_DEVICE) 3239 hci_abort_conn(conn, HCI_ERROR_REMOTE_USER_TERM); 3240 3241 unlock: 3242 hci_dev_unlock(hdev); 3243 return err; 3244 } 3245 3246 static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev, 3247 struct mgmt_addr_info *addr, u16 mgmt_op, 3248 u16 hci_op, __le32 passkey) 3249 { 3250 struct mgmt_pending_cmd *cmd; 3251 struct hci_conn *conn; 3252 int err; 3253 3254 hci_dev_lock(hdev); 3255 3256 if (!hdev_is_powered(hdev)) { 3257 err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, 3258 MGMT_STATUS_NOT_POWERED, addr, 3259 sizeof(*addr)); 3260 goto done; 3261 } 3262 3263 if (addr->type == BDADDR_BREDR) 3264 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr); 3265 else 3266 conn = hci_conn_hash_lookup_le(hdev, &addr->bdaddr, 3267 le_addr_type(addr->type)); 3268 3269 if (!conn) { 3270 err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, 3271 MGMT_STATUS_NOT_CONNECTED, addr, 3272 sizeof(*addr)); 3273 goto done; 3274 } 3275 3276 if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) { 3277 err = smp_user_confirm_reply(conn, mgmt_op, passkey); 3278 if (!err) 3279 err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, 3280 MGMT_STATUS_SUCCESS, addr, 3281 sizeof(*addr)); 3282 else 3283 err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, 3284 MGMT_STATUS_FAILED, addr, 3285 sizeof(*addr)); 3286 3287 goto done; 3288 } 3289 3290 cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr)); 3291 if (!cmd) { 3292 err = -ENOMEM; 3293 goto done; 3294 } 3295 3296 cmd->cmd_complete = addr_cmd_complete; 3297 3298 /* Continue with pairing via HCI */ 3299 if (hci_op == HCI_OP_USER_PASSKEY_REPLY) { 3300 struct hci_cp_user_passkey_reply cp; 3301 3302 bacpy(&cp.bdaddr, &addr->bdaddr); 3303 cp.passkey = passkey; 3304 err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp); 3305 } else 3306 err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr), 3307 &addr->bdaddr); 3308 3309 if (err < 0) 3310 mgmt_pending_remove(cmd); 3311 3312 done: 3313 hci_dev_unlock(hdev); 3314 return err; 3315 } 3316 3317 static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev, 3318 void *data, u16 len) 3319 { 3320 struct mgmt_cp_pin_code_neg_reply *cp = data; 3321 3322 bt_dev_dbg(hdev, "sock %p", sk); 3323 3324 return user_pairing_resp(sk, hdev, &cp->addr, 3325 MGMT_OP_PIN_CODE_NEG_REPLY, 3326 HCI_OP_PIN_CODE_NEG_REPLY, 0); 3327 } 3328 3329 static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data, 3330 u16 len) 3331 { 3332 struct mgmt_cp_user_confirm_reply *cp = data; 3333 3334 bt_dev_dbg(hdev, "sock %p", sk); 3335 3336 if (len != sizeof(*cp)) 3337 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY, 3338 MGMT_STATUS_INVALID_PARAMS); 3339 3340 return user_pairing_resp(sk, hdev, &cp->addr, 3341 MGMT_OP_USER_CONFIRM_REPLY, 3342 HCI_OP_USER_CONFIRM_REPLY, 0); 3343 } 3344 3345 static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev, 3346 void *data, u16 len) 3347 { 3348 struct mgmt_cp_user_confirm_neg_reply *cp = data; 3349 3350 bt_dev_dbg(hdev, "sock %p", sk); 3351 3352 return user_pairing_resp(sk, hdev, &cp->addr, 3353 MGMT_OP_USER_CONFIRM_NEG_REPLY, 3354 HCI_OP_USER_CONFIRM_NEG_REPLY, 0); 3355 } 3356 3357 static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data, 3358 u16 len) 3359 { 3360 struct mgmt_cp_user_passkey_reply *cp = data; 3361 3362 bt_dev_dbg(hdev, "sock %p", sk); 3363 3364 return user_pairing_resp(sk, hdev, &cp->addr, 3365 MGMT_OP_USER_PASSKEY_REPLY, 3366 HCI_OP_USER_PASSKEY_REPLY, cp->passkey); 3367 } 3368 3369 static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev, 3370 void *data, u16 len) 3371 { 3372 struct mgmt_cp_user_passkey_neg_reply *cp = data; 3373 3374 bt_dev_dbg(hdev, "sock %p", sk); 3375 3376 return user_pairing_resp(sk, hdev, &cp->addr, 3377 MGMT_OP_USER_PASSKEY_NEG_REPLY, 3378 HCI_OP_USER_PASSKEY_NEG_REPLY, 0); 3379 } 3380 3381 static int adv_expire_sync(struct hci_dev *hdev, u32 flags) 3382 { 3383 struct adv_info *adv_instance; 3384 3385 adv_instance = hci_find_adv_instance(hdev, hdev->cur_adv_instance); 3386 if (!adv_instance) 3387 return 0; 3388 3389 /* stop if current instance doesn't need to be changed */ 3390 if (!(adv_instance->flags & flags)) 3391 return 0; 3392 3393 cancel_adv_timeout(hdev); 3394 3395 adv_instance = hci_get_next_instance(hdev, adv_instance->instance); 3396 if (!adv_instance) 3397 return 0; 3398 3399 hci_schedule_adv_instance_sync(hdev, adv_instance->instance, true); 3400 3401 return 0; 3402 } 3403 3404 static int name_changed_sync(struct hci_dev *hdev, void *data) 3405 { 3406 return adv_expire_sync(hdev, MGMT_ADV_FLAG_LOCAL_NAME); 3407 } 3408 3409 static void set_name_complete(struct hci_dev *hdev, void *data, int err) 3410 { 3411 struct mgmt_pending_cmd *cmd = data; 3412 struct mgmt_cp_set_local_name *cp = cmd->param; 3413 u8 status = mgmt_status(err); 3414 3415 bt_dev_dbg(hdev, "err %d", err); 3416 3417 if (cmd != pending_find(MGMT_OP_SET_LOCAL_NAME, hdev)) 3418 return; 3419 3420 if (status) { 3421 mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 3422 status); 3423 } else { 3424 mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, 3425 cp, sizeof(*cp)); 3426 3427 if (hci_dev_test_flag(hdev, HCI_LE_ADV)) 3428 hci_cmd_sync_queue(hdev, name_changed_sync, NULL, NULL); 3429 } 3430 3431 mgmt_pending_remove(cmd); 3432 } 3433 3434 static int set_name_sync(struct hci_dev *hdev, void *data) 3435 { 3436 if (lmp_bredr_capable(hdev)) { 3437 hci_update_name_sync(hdev); 3438 hci_update_eir_sync(hdev); 3439 } 3440 3441 /* The name is stored in the scan response data and so 3442 * no need to update the advertising data here. 3443 */ 3444 if (lmp_le_capable(hdev) && hci_dev_test_flag(hdev, HCI_ADVERTISING)) 3445 hci_update_scan_rsp_data_sync(hdev, hdev->cur_adv_instance); 3446 3447 return 0; 3448 } 3449 3450 static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data, 3451 u16 len) 3452 { 3453 struct mgmt_cp_set_local_name *cp = data; 3454 struct mgmt_pending_cmd *cmd; 3455 int err; 3456 3457 bt_dev_dbg(hdev, "sock %p", sk); 3458 3459 hci_dev_lock(hdev); 3460 3461 /* If the old values are the same as the new ones just return a 3462 * direct command complete event. 3463 */ 3464 if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) && 3465 !memcmp(hdev->short_name, cp->short_name, 3466 sizeof(hdev->short_name))) { 3467 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, 3468 data, len); 3469 goto failed; 3470 } 3471 3472 memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name)); 3473 3474 if (!hdev_is_powered(hdev)) { 3475 memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name)); 3476 3477 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, 3478 data, len); 3479 if (err < 0) 3480 goto failed; 3481 3482 err = mgmt_limited_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, 3483 len, HCI_MGMT_LOCAL_NAME_EVENTS, sk); 3484 ext_info_changed(hdev, sk); 3485 3486 goto failed; 3487 } 3488 3489 cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len); 3490 if (!cmd) 3491 err = -ENOMEM; 3492 else 3493 err = hci_cmd_sync_queue(hdev, set_name_sync, cmd, 3494 set_name_complete); 3495 3496 if (err < 0) { 3497 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 3498 MGMT_STATUS_FAILED); 3499 3500 if (cmd) 3501 mgmt_pending_remove(cmd); 3502 3503 goto failed; 3504 } 3505 3506 memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name)); 3507 3508 failed: 3509 hci_dev_unlock(hdev); 3510 return err; 3511 } 3512 3513 static int appearance_changed_sync(struct hci_dev *hdev, void *data) 3514 { 3515 return adv_expire_sync(hdev, MGMT_ADV_FLAG_APPEARANCE); 3516 } 3517 3518 static int set_appearance(struct sock *sk, struct hci_dev *hdev, void *data, 3519 u16 len) 3520 { 3521 struct mgmt_cp_set_appearance *cp = data; 3522 u16 appearance; 3523 int err; 3524 3525 bt_dev_dbg(hdev, "sock %p", sk); 3526 3527 if (!lmp_le_capable(hdev)) 3528 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_APPEARANCE, 3529 MGMT_STATUS_NOT_SUPPORTED); 3530 3531 appearance = le16_to_cpu(cp->appearance); 3532 3533 hci_dev_lock(hdev); 3534 3535 if (hdev->appearance != appearance) { 3536 hdev->appearance = appearance; 3537 3538 if (hci_dev_test_flag(hdev, HCI_LE_ADV)) 3539 hci_cmd_sync_queue(hdev, appearance_changed_sync, NULL, 3540 NULL); 3541 3542 ext_info_changed(hdev, sk); 3543 } 3544 3545 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_APPEARANCE, 0, NULL, 3546 0); 3547 3548 hci_dev_unlock(hdev); 3549 3550 return err; 3551 } 3552 3553 static int get_phy_configuration(struct sock *sk, struct hci_dev *hdev, 3554 void *data, u16 len) 3555 { 3556 struct mgmt_rp_get_phy_configuration rp; 3557 3558 bt_dev_dbg(hdev, "sock %p", sk); 3559 3560 hci_dev_lock(hdev); 3561 3562 memset(&rp, 0, sizeof(rp)); 3563 3564 rp.supported_phys = cpu_to_le32(get_supported_phys(hdev)); 3565 rp.selected_phys = cpu_to_le32(get_selected_phys(hdev)); 3566 rp.configurable_phys = cpu_to_le32(get_configurable_phys(hdev)); 3567 3568 hci_dev_unlock(hdev); 3569 3570 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_PHY_CONFIGURATION, 0, 3571 &rp, sizeof(rp)); 3572 } 3573 3574 int mgmt_phy_configuration_changed(struct hci_dev *hdev, struct sock *skip) 3575 { 3576 struct mgmt_ev_phy_configuration_changed ev; 3577 3578 memset(&ev, 0, sizeof(ev)); 3579 3580 ev.selected_phys = cpu_to_le32(get_selected_phys(hdev)); 3581 3582 return mgmt_event(MGMT_EV_PHY_CONFIGURATION_CHANGED, hdev, &ev, 3583 sizeof(ev), skip); 3584 } 3585 3586 static void set_default_phy_complete(struct hci_dev *hdev, void *data, int err) 3587 { 3588 struct mgmt_pending_cmd *cmd = data; 3589 struct sk_buff *skb = cmd->skb; 3590 u8 status = mgmt_status(err); 3591 3592 if (cmd != pending_find(MGMT_OP_SET_PHY_CONFIGURATION, hdev)) 3593 return; 3594 3595 if (!status) { 3596 if (!skb) 3597 status = MGMT_STATUS_FAILED; 3598 else if (IS_ERR(skb)) 3599 status = mgmt_status(PTR_ERR(skb)); 3600 else 3601 status = mgmt_status(skb->data[0]); 3602 } 3603 3604 bt_dev_dbg(hdev, "status %d", status); 3605 3606 if (status) { 3607 mgmt_cmd_status(cmd->sk, hdev->id, 3608 MGMT_OP_SET_PHY_CONFIGURATION, status); 3609 } else { 3610 mgmt_cmd_complete(cmd->sk, hdev->id, 3611 MGMT_OP_SET_PHY_CONFIGURATION, 0, 3612 NULL, 0); 3613 3614 mgmt_phy_configuration_changed(hdev, cmd->sk); 3615 } 3616 3617 if (skb && !IS_ERR(skb)) 3618 kfree_skb(skb); 3619 3620 mgmt_pending_remove(cmd); 3621 } 3622 3623 static int set_default_phy_sync(struct hci_dev *hdev, void *data) 3624 { 3625 struct mgmt_pending_cmd *cmd = data; 3626 struct mgmt_cp_set_phy_configuration *cp = cmd->param; 3627 struct hci_cp_le_set_default_phy cp_phy; 3628 u32 selected_phys = __le32_to_cpu(cp->selected_phys); 3629 3630 memset(&cp_phy, 0, sizeof(cp_phy)); 3631 3632 if (!(selected_phys & MGMT_PHY_LE_TX_MASK)) 3633 cp_phy.all_phys |= 0x01; 3634 3635 if (!(selected_phys & MGMT_PHY_LE_RX_MASK)) 3636 cp_phy.all_phys |= 0x02; 3637 3638 if (selected_phys & MGMT_PHY_LE_1M_TX) 3639 cp_phy.tx_phys |= HCI_LE_SET_PHY_1M; 3640 3641 if (selected_phys & MGMT_PHY_LE_2M_TX) 3642 cp_phy.tx_phys |= HCI_LE_SET_PHY_2M; 3643 3644 if (selected_phys & MGMT_PHY_LE_CODED_TX) 3645 cp_phy.tx_phys |= HCI_LE_SET_PHY_CODED; 3646 3647 if (selected_phys & MGMT_PHY_LE_1M_RX) 3648 cp_phy.rx_phys |= HCI_LE_SET_PHY_1M; 3649 3650 if (selected_phys & MGMT_PHY_LE_2M_RX) 3651 cp_phy.rx_phys |= HCI_LE_SET_PHY_2M; 3652 3653 if (selected_phys & MGMT_PHY_LE_CODED_RX) 3654 cp_phy.rx_phys |= HCI_LE_SET_PHY_CODED; 3655 3656 cmd->skb = __hci_cmd_sync(hdev, HCI_OP_LE_SET_DEFAULT_PHY, 3657 sizeof(cp_phy), &cp_phy, HCI_CMD_TIMEOUT); 3658 3659 return 0; 3660 } 3661 3662 static int set_phy_configuration(struct sock *sk, struct hci_dev *hdev, 3663 void *data, u16 len) 3664 { 3665 struct mgmt_cp_set_phy_configuration *cp = data; 3666 struct mgmt_pending_cmd *cmd; 3667 u32 selected_phys, configurable_phys, supported_phys, unconfigure_phys; 3668 u16 pkt_type = (HCI_DH1 | HCI_DM1); 3669 bool changed = false; 3670 int err; 3671 3672 bt_dev_dbg(hdev, "sock %p", sk); 3673 3674 configurable_phys = get_configurable_phys(hdev); 3675 supported_phys = get_supported_phys(hdev); 3676 selected_phys = __le32_to_cpu(cp->selected_phys); 3677 3678 if (selected_phys & ~supported_phys) 3679 return mgmt_cmd_status(sk, hdev->id, 3680 MGMT_OP_SET_PHY_CONFIGURATION, 3681 MGMT_STATUS_INVALID_PARAMS); 3682 3683 unconfigure_phys = supported_phys & ~configurable_phys; 3684 3685 if ((selected_phys & unconfigure_phys) != unconfigure_phys) 3686 return mgmt_cmd_status(sk, hdev->id, 3687 MGMT_OP_SET_PHY_CONFIGURATION, 3688 MGMT_STATUS_INVALID_PARAMS); 3689 3690 if (selected_phys == get_selected_phys(hdev)) 3691 return mgmt_cmd_complete(sk, hdev->id, 3692 MGMT_OP_SET_PHY_CONFIGURATION, 3693 0, NULL, 0); 3694 3695 hci_dev_lock(hdev); 3696 3697 if (!hdev_is_powered(hdev)) { 3698 err = mgmt_cmd_status(sk, hdev->id, 3699 MGMT_OP_SET_PHY_CONFIGURATION, 3700 MGMT_STATUS_REJECTED); 3701 goto unlock; 3702 } 3703 3704 if (pending_find(MGMT_OP_SET_PHY_CONFIGURATION, hdev)) { 3705 err = mgmt_cmd_status(sk, hdev->id, 3706 MGMT_OP_SET_PHY_CONFIGURATION, 3707 MGMT_STATUS_BUSY); 3708 goto unlock; 3709 } 3710 3711 if (selected_phys & MGMT_PHY_BR_1M_3SLOT) 3712 pkt_type |= (HCI_DH3 | HCI_DM3); 3713 else 3714 pkt_type &= ~(HCI_DH3 | HCI_DM3); 3715 3716 if (selected_phys & MGMT_PHY_BR_1M_5SLOT) 3717 pkt_type |= (HCI_DH5 | HCI_DM5); 3718 else 3719 pkt_type &= ~(HCI_DH5 | HCI_DM5); 3720 3721 if (selected_phys & MGMT_PHY_EDR_2M_1SLOT) 3722 pkt_type &= ~HCI_2DH1; 3723 else 3724 pkt_type |= HCI_2DH1; 3725 3726 if (selected_phys & MGMT_PHY_EDR_2M_3SLOT) 3727 pkt_type &= ~HCI_2DH3; 3728 else 3729 pkt_type |= HCI_2DH3; 3730 3731 if (selected_phys & MGMT_PHY_EDR_2M_5SLOT) 3732 pkt_type &= ~HCI_2DH5; 3733 else 3734 pkt_type |= HCI_2DH5; 3735 3736 if (selected_phys & MGMT_PHY_EDR_3M_1SLOT) 3737 pkt_type &= ~HCI_3DH1; 3738 else 3739 pkt_type |= HCI_3DH1; 3740 3741 if (selected_phys & MGMT_PHY_EDR_3M_3SLOT) 3742 pkt_type &= ~HCI_3DH3; 3743 else 3744 pkt_type |= HCI_3DH3; 3745 3746 if (selected_phys & MGMT_PHY_EDR_3M_5SLOT) 3747 pkt_type &= ~HCI_3DH5; 3748 else 3749 pkt_type |= HCI_3DH5; 3750 3751 if (pkt_type != hdev->pkt_type) { 3752 hdev->pkt_type = pkt_type; 3753 changed = true; 3754 } 3755 3756 if ((selected_phys & MGMT_PHY_LE_MASK) == 3757 (get_selected_phys(hdev) & MGMT_PHY_LE_MASK)) { 3758 if (changed) 3759 mgmt_phy_configuration_changed(hdev, sk); 3760 3761 err = mgmt_cmd_complete(sk, hdev->id, 3762 MGMT_OP_SET_PHY_CONFIGURATION, 3763 0, NULL, 0); 3764 3765 goto unlock; 3766 } 3767 3768 cmd = mgmt_pending_add(sk, MGMT_OP_SET_PHY_CONFIGURATION, hdev, data, 3769 len); 3770 if (!cmd) 3771 err = -ENOMEM; 3772 else 3773 err = hci_cmd_sync_queue(hdev, set_default_phy_sync, cmd, 3774 set_default_phy_complete); 3775 3776 if (err < 0) { 3777 err = mgmt_cmd_status(sk, hdev->id, 3778 MGMT_OP_SET_PHY_CONFIGURATION, 3779 MGMT_STATUS_FAILED); 3780 3781 if (cmd) 3782 mgmt_pending_remove(cmd); 3783 } 3784 3785 unlock: 3786 hci_dev_unlock(hdev); 3787 3788 return err; 3789 } 3790 3791 static int set_blocked_keys(struct sock *sk, struct hci_dev *hdev, void *data, 3792 u16 len) 3793 { 3794 int err = MGMT_STATUS_SUCCESS; 3795 struct mgmt_cp_set_blocked_keys *keys = data; 3796 const u16 max_key_count = ((U16_MAX - sizeof(*keys)) / 3797 sizeof(struct mgmt_blocked_key_info)); 3798 u16 key_count, expected_len; 3799 int i; 3800 3801 bt_dev_dbg(hdev, "sock %p", sk); 3802 3803 key_count = __le16_to_cpu(keys->key_count); 3804 if (key_count > max_key_count) { 3805 bt_dev_err(hdev, "too big key_count value %u", key_count); 3806 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BLOCKED_KEYS, 3807 MGMT_STATUS_INVALID_PARAMS); 3808 } 3809 3810 expected_len = struct_size(keys, keys, key_count); 3811 if (expected_len != len) { 3812 bt_dev_err(hdev, "expected %u bytes, got %u bytes", 3813 expected_len, len); 3814 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BLOCKED_KEYS, 3815 MGMT_STATUS_INVALID_PARAMS); 3816 } 3817 3818 hci_dev_lock(hdev); 3819 3820 hci_blocked_keys_clear(hdev); 3821 3822 for (i = 0; i < key_count; ++i) { 3823 struct blocked_key *b = kzalloc(sizeof(*b), GFP_KERNEL); 3824 3825 if (!b) { 3826 err = MGMT_STATUS_NO_RESOURCES; 3827 break; 3828 } 3829 3830 b->type = keys->keys[i].type; 3831 memcpy(b->val, keys->keys[i].val, sizeof(b->val)); 3832 list_add_rcu(&b->list, &hdev->blocked_keys); 3833 } 3834 hci_dev_unlock(hdev); 3835 3836 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_BLOCKED_KEYS, 3837 err, NULL, 0); 3838 } 3839 3840 static int set_wideband_speech(struct sock *sk, struct hci_dev *hdev, 3841 void *data, u16 len) 3842 { 3843 struct mgmt_mode *cp = data; 3844 int err; 3845 bool changed = false; 3846 3847 bt_dev_dbg(hdev, "sock %p", sk); 3848 3849 if (!test_bit(HCI_QUIRK_WIDEBAND_SPEECH_SUPPORTED, &hdev->quirks)) 3850 return mgmt_cmd_status(sk, hdev->id, 3851 MGMT_OP_SET_WIDEBAND_SPEECH, 3852 MGMT_STATUS_NOT_SUPPORTED); 3853 3854 if (cp->val != 0x00 && cp->val != 0x01) 3855 return mgmt_cmd_status(sk, hdev->id, 3856 MGMT_OP_SET_WIDEBAND_SPEECH, 3857 MGMT_STATUS_INVALID_PARAMS); 3858 3859 hci_dev_lock(hdev); 3860 3861 if (hdev_is_powered(hdev) && 3862 !!cp->val != hci_dev_test_flag(hdev, 3863 HCI_WIDEBAND_SPEECH_ENABLED)) { 3864 err = mgmt_cmd_status(sk, hdev->id, 3865 MGMT_OP_SET_WIDEBAND_SPEECH, 3866 MGMT_STATUS_REJECTED); 3867 goto unlock; 3868 } 3869 3870 if (cp->val) 3871 changed = !hci_dev_test_and_set_flag(hdev, 3872 HCI_WIDEBAND_SPEECH_ENABLED); 3873 else 3874 changed = hci_dev_test_and_clear_flag(hdev, 3875 HCI_WIDEBAND_SPEECH_ENABLED); 3876 3877 err = send_settings_rsp(sk, MGMT_OP_SET_WIDEBAND_SPEECH, hdev); 3878 if (err < 0) 3879 goto unlock; 3880 3881 if (changed) 3882 err = new_settings(hdev, sk); 3883 3884 unlock: 3885 hci_dev_unlock(hdev); 3886 return err; 3887 } 3888 3889 static int read_controller_cap(struct sock *sk, struct hci_dev *hdev, 3890 void *data, u16 data_len) 3891 { 3892 char buf[20]; 3893 struct mgmt_rp_read_controller_cap *rp = (void *)buf; 3894 u16 cap_len = 0; 3895 u8 flags = 0; 3896 u8 tx_power_range[2]; 3897 3898 bt_dev_dbg(hdev, "sock %p", sk); 3899 3900 memset(&buf, 0, sizeof(buf)); 3901 3902 hci_dev_lock(hdev); 3903 3904 /* When the Read Simple Pairing Options command is supported, then 3905 * the remote public key validation is supported. 3906 * 3907 * Alternatively, when Microsoft extensions are available, they can 3908 * indicate support for public key validation as well. 3909 */ 3910 if ((hdev->commands[41] & 0x08) || msft_curve_validity(hdev)) 3911 flags |= 0x01; /* Remote public key validation (BR/EDR) */ 3912 3913 flags |= 0x02; /* Remote public key validation (LE) */ 3914 3915 /* When the Read Encryption Key Size command is supported, then the 3916 * encryption key size is enforced. 3917 */ 3918 if (hdev->commands[20] & 0x10) 3919 flags |= 0x04; /* Encryption key size enforcement (BR/EDR) */ 3920 3921 flags |= 0x08; /* Encryption key size enforcement (LE) */ 3922 3923 cap_len = eir_append_data(rp->cap, cap_len, MGMT_CAP_SEC_FLAGS, 3924 &flags, 1); 3925 3926 /* When the Read Simple Pairing Options command is supported, then 3927 * also max encryption key size information is provided. 3928 */ 3929 if (hdev->commands[41] & 0x08) 3930 cap_len = eir_append_le16(rp->cap, cap_len, 3931 MGMT_CAP_MAX_ENC_KEY_SIZE, 3932 hdev->max_enc_key_size); 3933 3934 cap_len = eir_append_le16(rp->cap, cap_len, 3935 MGMT_CAP_SMP_MAX_ENC_KEY_SIZE, 3936 SMP_MAX_ENC_KEY_SIZE); 3937 3938 /* Append the min/max LE tx power parameters if we were able to fetch 3939 * it from the controller 3940 */ 3941 if (hdev->commands[38] & 0x80) { 3942 memcpy(&tx_power_range[0], &hdev->min_le_tx_power, 1); 3943 memcpy(&tx_power_range[1], &hdev->max_le_tx_power, 1); 3944 cap_len = eir_append_data(rp->cap, cap_len, MGMT_CAP_LE_TX_PWR, 3945 tx_power_range, 2); 3946 } 3947 3948 rp->cap_len = cpu_to_le16(cap_len); 3949 3950 hci_dev_unlock(hdev); 3951 3952 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_CONTROLLER_CAP, 0, 3953 rp, sizeof(*rp) + cap_len); 3954 } 3955 3956 #ifdef CONFIG_BT_FEATURE_DEBUG 3957 /* d4992530-b9ec-469f-ab01-6c481c47da1c */ 3958 static const u8 debug_uuid[16] = { 3959 0x1c, 0xda, 0x47, 0x1c, 0x48, 0x6c, 0x01, 0xab, 3960 0x9f, 0x46, 0xec, 0xb9, 0x30, 0x25, 0x99, 0xd4, 3961 }; 3962 #endif 3963 3964 /* 330859bc-7506-492d-9370-9a6f0614037f */ 3965 static const u8 quality_report_uuid[16] = { 3966 0x7f, 0x03, 0x14, 0x06, 0x6f, 0x9a, 0x70, 0x93, 3967 0x2d, 0x49, 0x06, 0x75, 0xbc, 0x59, 0x08, 0x33, 3968 }; 3969 3970 /* a6695ace-ee7f-4fb9-881a-5fac66c629af */ 3971 static const u8 offload_codecs_uuid[16] = { 3972 0xaf, 0x29, 0xc6, 0x66, 0xac, 0x5f, 0x1a, 0x88, 3973 0xb9, 0x4f, 0x7f, 0xee, 0xce, 0x5a, 0x69, 0xa6, 3974 }; 3975 3976 /* 671b10b5-42c0-4696-9227-eb28d1b049d6 */ 3977 static const u8 le_simultaneous_roles_uuid[16] = { 3978 0xd6, 0x49, 0xb0, 0xd1, 0x28, 0xeb, 0x27, 0x92, 3979 0x96, 0x46, 0xc0, 0x42, 0xb5, 0x10, 0x1b, 0x67, 3980 }; 3981 3982 /* 15c0a148-c273-11ea-b3de-0242ac130004 */ 3983 static const u8 rpa_resolution_uuid[16] = { 3984 0x04, 0x00, 0x13, 0xac, 0x42, 0x02, 0xde, 0xb3, 3985 0xea, 0x11, 0x73, 0xc2, 0x48, 0xa1, 0xc0, 0x15, 3986 }; 3987 3988 /* 6fbaf188-05e0-496a-9885-d6ddfdb4e03e */ 3989 static const u8 iso_socket_uuid[16] = { 3990 0x3e, 0xe0, 0xb4, 0xfd, 0xdd, 0xd6, 0x85, 0x98, 3991 0x6a, 0x49, 0xe0, 0x05, 0x88, 0xf1, 0xba, 0x6f, 3992 }; 3993 3994 static int read_exp_features_info(struct sock *sk, struct hci_dev *hdev, 3995 void *data, u16 data_len) 3996 { 3997 char buf[122]; /* Enough space for 6 features: 2 + 20 * 6 */ 3998 struct mgmt_rp_read_exp_features_info *rp = (void *)buf; 3999 u16 idx = 0; 4000 u32 flags; 4001 4002 bt_dev_dbg(hdev, "sock %p", sk); 4003 4004 memset(&buf, 0, sizeof(buf)); 4005 4006 #ifdef CONFIG_BT_FEATURE_DEBUG 4007 if (!hdev) { 4008 flags = bt_dbg_get() ? BIT(0) : 0; 4009 4010 memcpy(rp->features[idx].uuid, debug_uuid, 16); 4011 rp->features[idx].flags = cpu_to_le32(flags); 4012 idx++; 4013 } 4014 #endif 4015 4016 if (hdev && hci_dev_le_state_simultaneous(hdev)) { 4017 if (hci_dev_test_flag(hdev, HCI_LE_SIMULTANEOUS_ROLES)) 4018 flags = BIT(0); 4019 else 4020 flags = 0; 4021 4022 memcpy(rp->features[idx].uuid, le_simultaneous_roles_uuid, 16); 4023 rp->features[idx].flags = cpu_to_le32(flags); 4024 idx++; 4025 } 4026 4027 if (hdev && ll_privacy_capable(hdev)) { 4028 if (hci_dev_test_flag(hdev, HCI_ENABLE_LL_PRIVACY)) 4029 flags = BIT(0) | BIT(1); 4030 else 4031 flags = BIT(1); 4032 4033 memcpy(rp->features[idx].uuid, rpa_resolution_uuid, 16); 4034 rp->features[idx].flags = cpu_to_le32(flags); 4035 idx++; 4036 } 4037 4038 if (hdev && (aosp_has_quality_report(hdev) || 4039 hdev->set_quality_report)) { 4040 if (hci_dev_test_flag(hdev, HCI_QUALITY_REPORT)) 4041 flags = BIT(0); 4042 else 4043 flags = 0; 4044 4045 memcpy(rp->features[idx].uuid, quality_report_uuid, 16); 4046 rp->features[idx].flags = cpu_to_le32(flags); 4047 idx++; 4048 } 4049 4050 if (hdev && hdev->get_data_path_id) { 4051 if (hci_dev_test_flag(hdev, HCI_OFFLOAD_CODECS_ENABLED)) 4052 flags = BIT(0); 4053 else 4054 flags = 0; 4055 4056 memcpy(rp->features[idx].uuid, offload_codecs_uuid, 16); 4057 rp->features[idx].flags = cpu_to_le32(flags); 4058 idx++; 4059 } 4060 4061 if (IS_ENABLED(CONFIG_BT_LE)) { 4062 flags = iso_enabled() ? BIT(0) : 0; 4063 memcpy(rp->features[idx].uuid, iso_socket_uuid, 16); 4064 rp->features[idx].flags = cpu_to_le32(flags); 4065 idx++; 4066 } 4067 4068 rp->feature_count = cpu_to_le16(idx); 4069 4070 /* After reading the experimental features information, enable 4071 * the events to update client on any future change. 4072 */ 4073 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4074 4075 return mgmt_cmd_complete(sk, hdev ? hdev->id : MGMT_INDEX_NONE, 4076 MGMT_OP_READ_EXP_FEATURES_INFO, 4077 0, rp, sizeof(*rp) + (20 * idx)); 4078 } 4079 4080 static int exp_ll_privacy_feature_changed(bool enabled, struct hci_dev *hdev, 4081 struct sock *skip) 4082 { 4083 struct mgmt_ev_exp_feature_changed ev; 4084 4085 memset(&ev, 0, sizeof(ev)); 4086 memcpy(ev.uuid, rpa_resolution_uuid, 16); 4087 ev.flags = cpu_to_le32((enabled ? BIT(0) : 0) | BIT(1)); 4088 4089 // Do we need to be atomic with the conn_flags? 4090 if (enabled && privacy_mode_capable(hdev)) 4091 hdev->conn_flags |= HCI_CONN_FLAG_DEVICE_PRIVACY; 4092 else 4093 hdev->conn_flags &= ~HCI_CONN_FLAG_DEVICE_PRIVACY; 4094 4095 return mgmt_limited_event(MGMT_EV_EXP_FEATURE_CHANGED, hdev, 4096 &ev, sizeof(ev), 4097 HCI_MGMT_EXP_FEATURE_EVENTS, skip); 4098 4099 } 4100 4101 static int exp_feature_changed(struct hci_dev *hdev, const u8 *uuid, 4102 bool enabled, struct sock *skip) 4103 { 4104 struct mgmt_ev_exp_feature_changed ev; 4105 4106 memset(&ev, 0, sizeof(ev)); 4107 memcpy(ev.uuid, uuid, 16); 4108 ev.flags = cpu_to_le32(enabled ? BIT(0) : 0); 4109 4110 return mgmt_limited_event(MGMT_EV_EXP_FEATURE_CHANGED, hdev, 4111 &ev, sizeof(ev), 4112 HCI_MGMT_EXP_FEATURE_EVENTS, skip); 4113 } 4114 4115 #define EXP_FEAT(_uuid, _set_func) \ 4116 { \ 4117 .uuid = _uuid, \ 4118 .set_func = _set_func, \ 4119 } 4120 4121 /* The zero key uuid is special. Multiple exp features are set through it. */ 4122 static int set_zero_key_func(struct sock *sk, struct hci_dev *hdev, 4123 struct mgmt_cp_set_exp_feature *cp, u16 data_len) 4124 { 4125 struct mgmt_rp_set_exp_feature rp; 4126 4127 memset(rp.uuid, 0, 16); 4128 rp.flags = cpu_to_le32(0); 4129 4130 #ifdef CONFIG_BT_FEATURE_DEBUG 4131 if (!hdev) { 4132 bool changed = bt_dbg_get(); 4133 4134 bt_dbg_set(false); 4135 4136 if (changed) 4137 exp_feature_changed(NULL, ZERO_KEY, false, sk); 4138 } 4139 #endif 4140 4141 if (hdev && use_ll_privacy(hdev) && !hdev_is_powered(hdev)) { 4142 bool changed; 4143 4144 changed = hci_dev_test_and_clear_flag(hdev, 4145 HCI_ENABLE_LL_PRIVACY); 4146 if (changed) 4147 exp_feature_changed(hdev, rpa_resolution_uuid, false, 4148 sk); 4149 } 4150 4151 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4152 4153 return mgmt_cmd_complete(sk, hdev ? hdev->id : MGMT_INDEX_NONE, 4154 MGMT_OP_SET_EXP_FEATURE, 0, 4155 &rp, sizeof(rp)); 4156 } 4157 4158 #ifdef CONFIG_BT_FEATURE_DEBUG 4159 static int set_debug_func(struct sock *sk, struct hci_dev *hdev, 4160 struct mgmt_cp_set_exp_feature *cp, u16 data_len) 4161 { 4162 struct mgmt_rp_set_exp_feature rp; 4163 4164 bool val, changed; 4165 int err; 4166 4167 /* Command requires to use the non-controller index */ 4168 if (hdev) 4169 return mgmt_cmd_status(sk, hdev->id, 4170 MGMT_OP_SET_EXP_FEATURE, 4171 MGMT_STATUS_INVALID_INDEX); 4172 4173 /* Parameters are limited to a single octet */ 4174 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4175 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4176 MGMT_OP_SET_EXP_FEATURE, 4177 MGMT_STATUS_INVALID_PARAMS); 4178 4179 /* Only boolean on/off is supported */ 4180 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4181 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4182 MGMT_OP_SET_EXP_FEATURE, 4183 MGMT_STATUS_INVALID_PARAMS); 4184 4185 val = !!cp->param[0]; 4186 changed = val ? !bt_dbg_get() : bt_dbg_get(); 4187 bt_dbg_set(val); 4188 4189 memcpy(rp.uuid, debug_uuid, 16); 4190 rp.flags = cpu_to_le32(val ? BIT(0) : 0); 4191 4192 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4193 4194 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, 4195 MGMT_OP_SET_EXP_FEATURE, 0, 4196 &rp, sizeof(rp)); 4197 4198 if (changed) 4199 exp_feature_changed(hdev, debug_uuid, val, sk); 4200 4201 return err; 4202 } 4203 #endif 4204 4205 static int set_rpa_resolution_func(struct sock *sk, struct hci_dev *hdev, 4206 struct mgmt_cp_set_exp_feature *cp, 4207 u16 data_len) 4208 { 4209 struct mgmt_rp_set_exp_feature rp; 4210 bool val, changed; 4211 int err; 4212 u32 flags; 4213 4214 /* Command requires to use the controller index */ 4215 if (!hdev) 4216 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4217 MGMT_OP_SET_EXP_FEATURE, 4218 MGMT_STATUS_INVALID_INDEX); 4219 4220 /* Changes can only be made when controller is powered down */ 4221 if (hdev_is_powered(hdev)) 4222 return mgmt_cmd_status(sk, hdev->id, 4223 MGMT_OP_SET_EXP_FEATURE, 4224 MGMT_STATUS_REJECTED); 4225 4226 /* Parameters are limited to a single octet */ 4227 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4228 return mgmt_cmd_status(sk, hdev->id, 4229 MGMT_OP_SET_EXP_FEATURE, 4230 MGMT_STATUS_INVALID_PARAMS); 4231 4232 /* Only boolean on/off is supported */ 4233 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4234 return mgmt_cmd_status(sk, hdev->id, 4235 MGMT_OP_SET_EXP_FEATURE, 4236 MGMT_STATUS_INVALID_PARAMS); 4237 4238 val = !!cp->param[0]; 4239 4240 if (val) { 4241 changed = !hci_dev_test_and_set_flag(hdev, 4242 HCI_ENABLE_LL_PRIVACY); 4243 hci_dev_clear_flag(hdev, HCI_ADVERTISING); 4244 4245 /* Enable LL privacy + supported settings changed */ 4246 flags = BIT(0) | BIT(1); 4247 } else { 4248 changed = hci_dev_test_and_clear_flag(hdev, 4249 HCI_ENABLE_LL_PRIVACY); 4250 4251 /* Disable LL privacy + supported settings changed */ 4252 flags = BIT(1); 4253 } 4254 4255 memcpy(rp.uuid, rpa_resolution_uuid, 16); 4256 rp.flags = cpu_to_le32(flags); 4257 4258 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4259 4260 err = mgmt_cmd_complete(sk, hdev->id, 4261 MGMT_OP_SET_EXP_FEATURE, 0, 4262 &rp, sizeof(rp)); 4263 4264 if (changed) 4265 exp_ll_privacy_feature_changed(val, hdev, sk); 4266 4267 return err; 4268 } 4269 4270 static int set_quality_report_func(struct sock *sk, struct hci_dev *hdev, 4271 struct mgmt_cp_set_exp_feature *cp, 4272 u16 data_len) 4273 { 4274 struct mgmt_rp_set_exp_feature rp; 4275 bool val, changed; 4276 int err; 4277 4278 /* Command requires to use a valid controller index */ 4279 if (!hdev) 4280 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4281 MGMT_OP_SET_EXP_FEATURE, 4282 MGMT_STATUS_INVALID_INDEX); 4283 4284 /* Parameters are limited to a single octet */ 4285 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4286 return mgmt_cmd_status(sk, hdev->id, 4287 MGMT_OP_SET_EXP_FEATURE, 4288 MGMT_STATUS_INVALID_PARAMS); 4289 4290 /* Only boolean on/off is supported */ 4291 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4292 return mgmt_cmd_status(sk, hdev->id, 4293 MGMT_OP_SET_EXP_FEATURE, 4294 MGMT_STATUS_INVALID_PARAMS); 4295 4296 hci_req_sync_lock(hdev); 4297 4298 val = !!cp->param[0]; 4299 changed = (val != hci_dev_test_flag(hdev, HCI_QUALITY_REPORT)); 4300 4301 if (!aosp_has_quality_report(hdev) && !hdev->set_quality_report) { 4302 err = mgmt_cmd_status(sk, hdev->id, 4303 MGMT_OP_SET_EXP_FEATURE, 4304 MGMT_STATUS_NOT_SUPPORTED); 4305 goto unlock_quality_report; 4306 } 4307 4308 if (changed) { 4309 if (hdev->set_quality_report) 4310 err = hdev->set_quality_report(hdev, val); 4311 else 4312 err = aosp_set_quality_report(hdev, val); 4313 4314 if (err) { 4315 err = mgmt_cmd_status(sk, hdev->id, 4316 MGMT_OP_SET_EXP_FEATURE, 4317 MGMT_STATUS_FAILED); 4318 goto unlock_quality_report; 4319 } 4320 4321 if (val) 4322 hci_dev_set_flag(hdev, HCI_QUALITY_REPORT); 4323 else 4324 hci_dev_clear_flag(hdev, HCI_QUALITY_REPORT); 4325 } 4326 4327 bt_dev_dbg(hdev, "quality report enable %d changed %d", val, changed); 4328 4329 memcpy(rp.uuid, quality_report_uuid, 16); 4330 rp.flags = cpu_to_le32(val ? BIT(0) : 0); 4331 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4332 4333 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_EXP_FEATURE, 0, 4334 &rp, sizeof(rp)); 4335 4336 if (changed) 4337 exp_feature_changed(hdev, quality_report_uuid, val, sk); 4338 4339 unlock_quality_report: 4340 hci_req_sync_unlock(hdev); 4341 return err; 4342 } 4343 4344 static int set_offload_codec_func(struct sock *sk, struct hci_dev *hdev, 4345 struct mgmt_cp_set_exp_feature *cp, 4346 u16 data_len) 4347 { 4348 bool val, changed; 4349 int err; 4350 struct mgmt_rp_set_exp_feature rp; 4351 4352 /* Command requires to use a valid controller index */ 4353 if (!hdev) 4354 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4355 MGMT_OP_SET_EXP_FEATURE, 4356 MGMT_STATUS_INVALID_INDEX); 4357 4358 /* Parameters are limited to a single octet */ 4359 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4360 return mgmt_cmd_status(sk, hdev->id, 4361 MGMT_OP_SET_EXP_FEATURE, 4362 MGMT_STATUS_INVALID_PARAMS); 4363 4364 /* Only boolean on/off is supported */ 4365 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4366 return mgmt_cmd_status(sk, hdev->id, 4367 MGMT_OP_SET_EXP_FEATURE, 4368 MGMT_STATUS_INVALID_PARAMS); 4369 4370 val = !!cp->param[0]; 4371 changed = (val != hci_dev_test_flag(hdev, HCI_OFFLOAD_CODECS_ENABLED)); 4372 4373 if (!hdev->get_data_path_id) { 4374 return mgmt_cmd_status(sk, hdev->id, 4375 MGMT_OP_SET_EXP_FEATURE, 4376 MGMT_STATUS_NOT_SUPPORTED); 4377 } 4378 4379 if (changed) { 4380 if (val) 4381 hci_dev_set_flag(hdev, HCI_OFFLOAD_CODECS_ENABLED); 4382 else 4383 hci_dev_clear_flag(hdev, HCI_OFFLOAD_CODECS_ENABLED); 4384 } 4385 4386 bt_dev_info(hdev, "offload codecs enable %d changed %d", 4387 val, changed); 4388 4389 memcpy(rp.uuid, offload_codecs_uuid, 16); 4390 rp.flags = cpu_to_le32(val ? BIT(0) : 0); 4391 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4392 err = mgmt_cmd_complete(sk, hdev->id, 4393 MGMT_OP_SET_EXP_FEATURE, 0, 4394 &rp, sizeof(rp)); 4395 4396 if (changed) 4397 exp_feature_changed(hdev, offload_codecs_uuid, val, sk); 4398 4399 return err; 4400 } 4401 4402 static int set_le_simultaneous_roles_func(struct sock *sk, struct hci_dev *hdev, 4403 struct mgmt_cp_set_exp_feature *cp, 4404 u16 data_len) 4405 { 4406 bool val, changed; 4407 int err; 4408 struct mgmt_rp_set_exp_feature rp; 4409 4410 /* Command requires to use a valid controller index */ 4411 if (!hdev) 4412 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4413 MGMT_OP_SET_EXP_FEATURE, 4414 MGMT_STATUS_INVALID_INDEX); 4415 4416 /* Parameters are limited to a single octet */ 4417 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4418 return mgmt_cmd_status(sk, hdev->id, 4419 MGMT_OP_SET_EXP_FEATURE, 4420 MGMT_STATUS_INVALID_PARAMS); 4421 4422 /* Only boolean on/off is supported */ 4423 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4424 return mgmt_cmd_status(sk, hdev->id, 4425 MGMT_OP_SET_EXP_FEATURE, 4426 MGMT_STATUS_INVALID_PARAMS); 4427 4428 val = !!cp->param[0]; 4429 changed = (val != hci_dev_test_flag(hdev, HCI_LE_SIMULTANEOUS_ROLES)); 4430 4431 if (!hci_dev_le_state_simultaneous(hdev)) { 4432 return mgmt_cmd_status(sk, hdev->id, 4433 MGMT_OP_SET_EXP_FEATURE, 4434 MGMT_STATUS_NOT_SUPPORTED); 4435 } 4436 4437 if (changed) { 4438 if (val) 4439 hci_dev_set_flag(hdev, HCI_LE_SIMULTANEOUS_ROLES); 4440 else 4441 hci_dev_clear_flag(hdev, HCI_LE_SIMULTANEOUS_ROLES); 4442 } 4443 4444 bt_dev_info(hdev, "LE simultaneous roles enable %d changed %d", 4445 val, changed); 4446 4447 memcpy(rp.uuid, le_simultaneous_roles_uuid, 16); 4448 rp.flags = cpu_to_le32(val ? BIT(0) : 0); 4449 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4450 err = mgmt_cmd_complete(sk, hdev->id, 4451 MGMT_OP_SET_EXP_FEATURE, 0, 4452 &rp, sizeof(rp)); 4453 4454 if (changed) 4455 exp_feature_changed(hdev, le_simultaneous_roles_uuid, val, sk); 4456 4457 return err; 4458 } 4459 4460 #ifdef CONFIG_BT_LE 4461 static int set_iso_socket_func(struct sock *sk, struct hci_dev *hdev, 4462 struct mgmt_cp_set_exp_feature *cp, u16 data_len) 4463 { 4464 struct mgmt_rp_set_exp_feature rp; 4465 bool val, changed = false; 4466 int err; 4467 4468 /* Command requires to use the non-controller index */ 4469 if (hdev) 4470 return mgmt_cmd_status(sk, hdev->id, 4471 MGMT_OP_SET_EXP_FEATURE, 4472 MGMT_STATUS_INVALID_INDEX); 4473 4474 /* Parameters are limited to a single octet */ 4475 if (data_len != MGMT_SET_EXP_FEATURE_SIZE + 1) 4476 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4477 MGMT_OP_SET_EXP_FEATURE, 4478 MGMT_STATUS_INVALID_PARAMS); 4479 4480 /* Only boolean on/off is supported */ 4481 if (cp->param[0] != 0x00 && cp->param[0] != 0x01) 4482 return mgmt_cmd_status(sk, MGMT_INDEX_NONE, 4483 MGMT_OP_SET_EXP_FEATURE, 4484 MGMT_STATUS_INVALID_PARAMS); 4485 4486 val = cp->param[0] ? true : false; 4487 if (val) 4488 err = iso_init(); 4489 else 4490 err = iso_exit(); 4491 4492 if (!err) 4493 changed = true; 4494 4495 memcpy(rp.uuid, iso_socket_uuid, 16); 4496 rp.flags = cpu_to_le32(val ? BIT(0) : 0); 4497 4498 hci_sock_set_flag(sk, HCI_MGMT_EXP_FEATURE_EVENTS); 4499 4500 err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, 4501 MGMT_OP_SET_EXP_FEATURE, 0, 4502 &rp, sizeof(rp)); 4503 4504 if (changed) 4505 exp_feature_changed(hdev, iso_socket_uuid, val, sk); 4506 4507 return err; 4508 } 4509 #endif 4510 4511 static const struct mgmt_exp_feature { 4512 const u8 *uuid; 4513 int (*set_func)(struct sock *sk, struct hci_dev *hdev, 4514 struct mgmt_cp_set_exp_feature *cp, u16 data_len); 4515 } exp_features[] = { 4516 EXP_FEAT(ZERO_KEY, set_zero_key_func), 4517 #ifdef CONFIG_BT_FEATURE_DEBUG 4518 EXP_FEAT(debug_uuid, set_debug_func), 4519 #endif 4520 EXP_FEAT(rpa_resolution_uuid, set_rpa_resolution_func), 4521 EXP_FEAT(quality_report_uuid, set_quality_report_func), 4522 EXP_FEAT(offload_codecs_uuid, set_offload_codec_func), 4523 EXP_FEAT(le_simultaneous_roles_uuid, set_le_simultaneous_roles_func), 4524 #ifdef CONFIG_BT_LE 4525 EXP_FEAT(iso_socket_uuid, set_iso_socket_func), 4526 #endif 4527 4528 /* end with a null feature */ 4529 EXP_FEAT(NULL, NULL) 4530 }; 4531 4532 static int set_exp_feature(struct sock *sk, struct hci_dev *hdev, 4533 void *data, u16 data_len) 4534 { 4535 struct mgmt_cp_set_exp_feature *cp = data; 4536 size_t i = 0; 4537 4538 bt_dev_dbg(hdev, "sock %p", sk); 4539 4540 for (i = 0; exp_features[i].uuid; i++) { 4541 if (!memcmp(cp->uuid, exp_features[i].uuid, 16)) 4542 return exp_features[i].set_func(sk, hdev, cp, data_len); 4543 } 4544 4545 return mgmt_cmd_status(sk, hdev ? hdev->id : MGMT_INDEX_NONE, 4546 MGMT_OP_SET_EXP_FEATURE, 4547 MGMT_STATUS_NOT_SUPPORTED); 4548 } 4549 4550 static u32 get_params_flags(struct hci_dev *hdev, 4551 struct hci_conn_params *params) 4552 { 4553 u32 flags = hdev->conn_flags; 4554 4555 /* Devices using RPAs can only be programmed in the acceptlist if 4556 * LL Privacy has been enable otherwise they cannot mark 4557 * HCI_CONN_FLAG_REMOTE_WAKEUP. 4558 */ 4559 if ((flags & HCI_CONN_FLAG_REMOTE_WAKEUP) && !use_ll_privacy(hdev) && 4560 hci_find_irk_by_addr(hdev, ¶ms->addr, params->addr_type)) 4561 flags &= ~HCI_CONN_FLAG_REMOTE_WAKEUP; 4562 4563 return flags; 4564 } 4565 4566 static int get_device_flags(struct sock *sk, struct hci_dev *hdev, void *data, 4567 u16 data_len) 4568 { 4569 struct mgmt_cp_get_device_flags *cp = data; 4570 struct mgmt_rp_get_device_flags rp; 4571 struct bdaddr_list_with_flags *br_params; 4572 struct hci_conn_params *params; 4573 u32 supported_flags; 4574 u32 current_flags = 0; 4575 u8 status = MGMT_STATUS_INVALID_PARAMS; 4576 4577 bt_dev_dbg(hdev, "Get device flags %pMR (type 0x%x)\n", 4578 &cp->addr.bdaddr, cp->addr.type); 4579 4580 hci_dev_lock(hdev); 4581 4582 supported_flags = hdev->conn_flags; 4583 4584 memset(&rp, 0, sizeof(rp)); 4585 4586 if (cp->addr.type == BDADDR_BREDR) { 4587 br_params = hci_bdaddr_list_lookup_with_flags(&hdev->accept_list, 4588 &cp->addr.bdaddr, 4589 cp->addr.type); 4590 if (!br_params) 4591 goto done; 4592 4593 current_flags = br_params->flags; 4594 } else { 4595 params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, 4596 le_addr_type(cp->addr.type)); 4597 if (!params) 4598 goto done; 4599 4600 supported_flags = get_params_flags(hdev, params); 4601 current_flags = params->flags; 4602 } 4603 4604 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 4605 rp.addr.type = cp->addr.type; 4606 rp.supported_flags = cpu_to_le32(supported_flags); 4607 rp.current_flags = cpu_to_le32(current_flags); 4608 4609 status = MGMT_STATUS_SUCCESS; 4610 4611 done: 4612 hci_dev_unlock(hdev); 4613 4614 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_DEVICE_FLAGS, status, 4615 &rp, sizeof(rp)); 4616 } 4617 4618 static void device_flags_changed(struct sock *sk, struct hci_dev *hdev, 4619 bdaddr_t *bdaddr, u8 bdaddr_type, 4620 u32 supported_flags, u32 current_flags) 4621 { 4622 struct mgmt_ev_device_flags_changed ev; 4623 4624 bacpy(&ev.addr.bdaddr, bdaddr); 4625 ev.addr.type = bdaddr_type; 4626 ev.supported_flags = cpu_to_le32(supported_flags); 4627 ev.current_flags = cpu_to_le32(current_flags); 4628 4629 mgmt_event(MGMT_EV_DEVICE_FLAGS_CHANGED, hdev, &ev, sizeof(ev), sk); 4630 } 4631 4632 static int set_device_flags(struct sock *sk, struct hci_dev *hdev, void *data, 4633 u16 len) 4634 { 4635 struct mgmt_cp_set_device_flags *cp = data; 4636 struct bdaddr_list_with_flags *br_params; 4637 struct hci_conn_params *params; 4638 u8 status = MGMT_STATUS_INVALID_PARAMS; 4639 u32 supported_flags; 4640 u32 current_flags = __le32_to_cpu(cp->current_flags); 4641 4642 bt_dev_dbg(hdev, "Set device flags %pMR (type 0x%x) = 0x%x", 4643 &cp->addr.bdaddr, cp->addr.type, current_flags); 4644 4645 // We should take hci_dev_lock() early, I think.. conn_flags can change 4646 supported_flags = hdev->conn_flags; 4647 4648 if ((supported_flags | current_flags) != supported_flags) { 4649 bt_dev_warn(hdev, "Bad flag given (0x%x) vs supported (0x%0x)", 4650 current_flags, supported_flags); 4651 goto done; 4652 } 4653 4654 hci_dev_lock(hdev); 4655 4656 if (cp->addr.type == BDADDR_BREDR) { 4657 br_params = hci_bdaddr_list_lookup_with_flags(&hdev->accept_list, 4658 &cp->addr.bdaddr, 4659 cp->addr.type); 4660 4661 if (br_params) { 4662 br_params->flags = current_flags; 4663 status = MGMT_STATUS_SUCCESS; 4664 } else { 4665 bt_dev_warn(hdev, "No such BR/EDR device %pMR (0x%x)", 4666 &cp->addr.bdaddr, cp->addr.type); 4667 } 4668 4669 goto unlock; 4670 } 4671 4672 params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, 4673 le_addr_type(cp->addr.type)); 4674 if (!params) { 4675 bt_dev_warn(hdev, "No such LE device %pMR (0x%x)", 4676 &cp->addr.bdaddr, le_addr_type(cp->addr.type)); 4677 goto unlock; 4678 } 4679 4680 supported_flags = get_params_flags(hdev, params); 4681 4682 if ((supported_flags | current_flags) != supported_flags) { 4683 bt_dev_warn(hdev, "Bad flag given (0x%x) vs supported (0x%0x)", 4684 current_flags, supported_flags); 4685 goto unlock; 4686 } 4687 4688 params->flags = current_flags; 4689 status = MGMT_STATUS_SUCCESS; 4690 4691 /* Update passive scan if HCI_CONN_FLAG_DEVICE_PRIVACY 4692 * has been set. 4693 */ 4694 if (params->flags & HCI_CONN_FLAG_DEVICE_PRIVACY) 4695 hci_update_passive_scan(hdev); 4696 4697 unlock: 4698 hci_dev_unlock(hdev); 4699 4700 done: 4701 if (status == MGMT_STATUS_SUCCESS) 4702 device_flags_changed(sk, hdev, &cp->addr.bdaddr, cp->addr.type, 4703 supported_flags, current_flags); 4704 4705 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_FLAGS, status, 4706 &cp->addr, sizeof(cp->addr)); 4707 } 4708 4709 static void mgmt_adv_monitor_added(struct sock *sk, struct hci_dev *hdev, 4710 u16 handle) 4711 { 4712 struct mgmt_ev_adv_monitor_added ev; 4713 4714 ev.monitor_handle = cpu_to_le16(handle); 4715 4716 mgmt_event(MGMT_EV_ADV_MONITOR_ADDED, hdev, &ev, sizeof(ev), sk); 4717 } 4718 4719 void mgmt_adv_monitor_removed(struct hci_dev *hdev, u16 handle) 4720 { 4721 struct mgmt_ev_adv_monitor_removed ev; 4722 struct mgmt_pending_cmd *cmd; 4723 struct sock *sk_skip = NULL; 4724 struct mgmt_cp_remove_adv_monitor *cp; 4725 4726 cmd = pending_find(MGMT_OP_REMOVE_ADV_MONITOR, hdev); 4727 if (cmd) { 4728 cp = cmd->param; 4729 4730 if (cp->monitor_handle) 4731 sk_skip = cmd->sk; 4732 } 4733 4734 ev.monitor_handle = cpu_to_le16(handle); 4735 4736 mgmt_event(MGMT_EV_ADV_MONITOR_REMOVED, hdev, &ev, sizeof(ev), sk_skip); 4737 } 4738 4739 static int read_adv_mon_features(struct sock *sk, struct hci_dev *hdev, 4740 void *data, u16 len) 4741 { 4742 struct adv_monitor *monitor = NULL; 4743 struct mgmt_rp_read_adv_monitor_features *rp = NULL; 4744 int handle, err; 4745 size_t rp_size = 0; 4746 __u32 supported = 0; 4747 __u32 enabled = 0; 4748 __u16 num_handles = 0; 4749 __u16 handles[HCI_MAX_ADV_MONITOR_NUM_HANDLES]; 4750 4751 BT_DBG("request for %s", hdev->name); 4752 4753 hci_dev_lock(hdev); 4754 4755 if (msft_monitor_supported(hdev)) 4756 supported |= MGMT_ADV_MONITOR_FEATURE_MASK_OR_PATTERNS; 4757 4758 idr_for_each_entry(&hdev->adv_monitors_idr, monitor, handle) 4759 handles[num_handles++] = monitor->handle; 4760 4761 hci_dev_unlock(hdev); 4762 4763 rp_size = sizeof(*rp) + (num_handles * sizeof(u16)); 4764 rp = kmalloc(rp_size, GFP_KERNEL); 4765 if (!rp) 4766 return -ENOMEM; 4767 4768 /* All supported features are currently enabled */ 4769 enabled = supported; 4770 4771 rp->supported_features = cpu_to_le32(supported); 4772 rp->enabled_features = cpu_to_le32(enabled); 4773 rp->max_num_handles = cpu_to_le16(HCI_MAX_ADV_MONITOR_NUM_HANDLES); 4774 rp->max_num_patterns = HCI_MAX_ADV_MONITOR_NUM_PATTERNS; 4775 rp->num_handles = cpu_to_le16(num_handles); 4776 if (num_handles) 4777 memcpy(&rp->handles, &handles, (num_handles * sizeof(u16))); 4778 4779 err = mgmt_cmd_complete(sk, hdev->id, 4780 MGMT_OP_READ_ADV_MONITOR_FEATURES, 4781 MGMT_STATUS_SUCCESS, rp, rp_size); 4782 4783 kfree(rp); 4784 4785 return err; 4786 } 4787 4788 static void mgmt_add_adv_patterns_monitor_complete(struct hci_dev *hdev, 4789 void *data, int status) 4790 { 4791 struct mgmt_rp_add_adv_patterns_monitor rp; 4792 struct mgmt_pending_cmd *cmd = data; 4793 struct adv_monitor *monitor = cmd->user_data; 4794 4795 hci_dev_lock(hdev); 4796 4797 rp.monitor_handle = cpu_to_le16(monitor->handle); 4798 4799 if (!status) { 4800 mgmt_adv_monitor_added(cmd->sk, hdev, monitor->handle); 4801 hdev->adv_monitors_cnt++; 4802 if (monitor->state == ADV_MONITOR_STATE_NOT_REGISTERED) 4803 monitor->state = ADV_MONITOR_STATE_REGISTERED; 4804 hci_update_passive_scan(hdev); 4805 } 4806 4807 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 4808 mgmt_status(status), &rp, sizeof(rp)); 4809 mgmt_pending_remove(cmd); 4810 4811 hci_dev_unlock(hdev); 4812 bt_dev_dbg(hdev, "add monitor %d complete, status %d", 4813 rp.monitor_handle, status); 4814 } 4815 4816 static int mgmt_add_adv_patterns_monitor_sync(struct hci_dev *hdev, void *data) 4817 { 4818 struct mgmt_pending_cmd *cmd = data; 4819 struct adv_monitor *monitor = cmd->user_data; 4820 4821 return hci_add_adv_monitor(hdev, monitor); 4822 } 4823 4824 static int __add_adv_patterns_monitor(struct sock *sk, struct hci_dev *hdev, 4825 struct adv_monitor *m, u8 status, 4826 void *data, u16 len, u16 op) 4827 { 4828 struct mgmt_pending_cmd *cmd; 4829 int err; 4830 4831 hci_dev_lock(hdev); 4832 4833 if (status) 4834 goto unlock; 4835 4836 if (pending_find(MGMT_OP_SET_LE, hdev) || 4837 pending_find(MGMT_OP_ADD_ADV_PATTERNS_MONITOR, hdev) || 4838 pending_find(MGMT_OP_ADD_ADV_PATTERNS_MONITOR_RSSI, hdev) || 4839 pending_find(MGMT_OP_REMOVE_ADV_MONITOR, hdev)) { 4840 status = MGMT_STATUS_BUSY; 4841 goto unlock; 4842 } 4843 4844 cmd = mgmt_pending_add(sk, op, hdev, data, len); 4845 if (!cmd) { 4846 status = MGMT_STATUS_NO_RESOURCES; 4847 goto unlock; 4848 } 4849 4850 cmd->user_data = m; 4851 err = hci_cmd_sync_queue(hdev, mgmt_add_adv_patterns_monitor_sync, cmd, 4852 mgmt_add_adv_patterns_monitor_complete); 4853 if (err) { 4854 if (err == -ENOMEM) 4855 status = MGMT_STATUS_NO_RESOURCES; 4856 else 4857 status = MGMT_STATUS_FAILED; 4858 4859 goto unlock; 4860 } 4861 4862 hci_dev_unlock(hdev); 4863 4864 return 0; 4865 4866 unlock: 4867 hci_free_adv_monitor(hdev, m); 4868 hci_dev_unlock(hdev); 4869 return mgmt_cmd_status(sk, hdev->id, op, status); 4870 } 4871 4872 static void parse_adv_monitor_rssi(struct adv_monitor *m, 4873 struct mgmt_adv_rssi_thresholds *rssi) 4874 { 4875 if (rssi) { 4876 m->rssi.low_threshold = rssi->low_threshold; 4877 m->rssi.low_threshold_timeout = 4878 __le16_to_cpu(rssi->low_threshold_timeout); 4879 m->rssi.high_threshold = rssi->high_threshold; 4880 m->rssi.high_threshold_timeout = 4881 __le16_to_cpu(rssi->high_threshold_timeout); 4882 m->rssi.sampling_period = rssi->sampling_period; 4883 } else { 4884 /* Default values. These numbers are the least constricting 4885 * parameters for MSFT API to work, so it behaves as if there 4886 * are no rssi parameter to consider. May need to be changed 4887 * if other API are to be supported. 4888 */ 4889 m->rssi.low_threshold = -127; 4890 m->rssi.low_threshold_timeout = 60; 4891 m->rssi.high_threshold = -127; 4892 m->rssi.high_threshold_timeout = 0; 4893 m->rssi.sampling_period = 0; 4894 } 4895 } 4896 4897 static u8 parse_adv_monitor_pattern(struct adv_monitor *m, u8 pattern_count, 4898 struct mgmt_adv_pattern *patterns) 4899 { 4900 u8 offset = 0, length = 0; 4901 struct adv_pattern *p = NULL; 4902 int i; 4903 4904 for (i = 0; i < pattern_count; i++) { 4905 offset = patterns[i].offset; 4906 length = patterns[i].length; 4907 if (offset >= HCI_MAX_AD_LENGTH || 4908 length > HCI_MAX_AD_LENGTH || 4909 (offset + length) > HCI_MAX_AD_LENGTH) 4910 return MGMT_STATUS_INVALID_PARAMS; 4911 4912 p = kmalloc(sizeof(*p), GFP_KERNEL); 4913 if (!p) 4914 return MGMT_STATUS_NO_RESOURCES; 4915 4916 p->ad_type = patterns[i].ad_type; 4917 p->offset = patterns[i].offset; 4918 p->length = patterns[i].length; 4919 memcpy(p->value, patterns[i].value, p->length); 4920 4921 INIT_LIST_HEAD(&p->list); 4922 list_add(&p->list, &m->patterns); 4923 } 4924 4925 return MGMT_STATUS_SUCCESS; 4926 } 4927 4928 static int add_adv_patterns_monitor(struct sock *sk, struct hci_dev *hdev, 4929 void *data, u16 len) 4930 { 4931 struct mgmt_cp_add_adv_patterns_monitor *cp = data; 4932 struct adv_monitor *m = NULL; 4933 u8 status = MGMT_STATUS_SUCCESS; 4934 size_t expected_size = sizeof(*cp); 4935 4936 BT_DBG("request for %s", hdev->name); 4937 4938 if (len <= sizeof(*cp)) { 4939 status = MGMT_STATUS_INVALID_PARAMS; 4940 goto done; 4941 } 4942 4943 expected_size += cp->pattern_count * sizeof(struct mgmt_adv_pattern); 4944 if (len != expected_size) { 4945 status = MGMT_STATUS_INVALID_PARAMS; 4946 goto done; 4947 } 4948 4949 m = kzalloc(sizeof(*m), GFP_KERNEL); 4950 if (!m) { 4951 status = MGMT_STATUS_NO_RESOURCES; 4952 goto done; 4953 } 4954 4955 INIT_LIST_HEAD(&m->patterns); 4956 4957 parse_adv_monitor_rssi(m, NULL); 4958 status = parse_adv_monitor_pattern(m, cp->pattern_count, cp->patterns); 4959 4960 done: 4961 return __add_adv_patterns_monitor(sk, hdev, m, status, data, len, 4962 MGMT_OP_ADD_ADV_PATTERNS_MONITOR); 4963 } 4964 4965 static int add_adv_patterns_monitor_rssi(struct sock *sk, struct hci_dev *hdev, 4966 void *data, u16 len) 4967 { 4968 struct mgmt_cp_add_adv_patterns_monitor_rssi *cp = data; 4969 struct adv_monitor *m = NULL; 4970 u8 status = MGMT_STATUS_SUCCESS; 4971 size_t expected_size = sizeof(*cp); 4972 4973 BT_DBG("request for %s", hdev->name); 4974 4975 if (len <= sizeof(*cp)) { 4976 status = MGMT_STATUS_INVALID_PARAMS; 4977 goto done; 4978 } 4979 4980 expected_size += cp->pattern_count * sizeof(struct mgmt_adv_pattern); 4981 if (len != expected_size) { 4982 status = MGMT_STATUS_INVALID_PARAMS; 4983 goto done; 4984 } 4985 4986 m = kzalloc(sizeof(*m), GFP_KERNEL); 4987 if (!m) { 4988 status = MGMT_STATUS_NO_RESOURCES; 4989 goto done; 4990 } 4991 4992 INIT_LIST_HEAD(&m->patterns); 4993 4994 parse_adv_monitor_rssi(m, &cp->rssi); 4995 status = parse_adv_monitor_pattern(m, cp->pattern_count, cp->patterns); 4996 4997 done: 4998 return __add_adv_patterns_monitor(sk, hdev, m, status, data, len, 4999 MGMT_OP_ADD_ADV_PATTERNS_MONITOR_RSSI); 5000 } 5001 5002 static void mgmt_remove_adv_monitor_complete(struct hci_dev *hdev, 5003 void *data, int status) 5004 { 5005 struct mgmt_rp_remove_adv_monitor rp; 5006 struct mgmt_pending_cmd *cmd = data; 5007 struct mgmt_cp_remove_adv_monitor *cp = cmd->param; 5008 5009 hci_dev_lock(hdev); 5010 5011 rp.monitor_handle = cp->monitor_handle; 5012 5013 if (!status) 5014 hci_update_passive_scan(hdev); 5015 5016 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 5017 mgmt_status(status), &rp, sizeof(rp)); 5018 mgmt_pending_remove(cmd); 5019 5020 hci_dev_unlock(hdev); 5021 bt_dev_dbg(hdev, "remove monitor %d complete, status %d", 5022 rp.monitor_handle, status); 5023 } 5024 5025 static int mgmt_remove_adv_monitor_sync(struct hci_dev *hdev, void *data) 5026 { 5027 struct mgmt_pending_cmd *cmd = data; 5028 struct mgmt_cp_remove_adv_monitor *cp = cmd->param; 5029 u16 handle = __le16_to_cpu(cp->monitor_handle); 5030 5031 if (!handle) 5032 return hci_remove_all_adv_monitor(hdev); 5033 5034 return hci_remove_single_adv_monitor(hdev, handle); 5035 } 5036 5037 static int remove_adv_monitor(struct sock *sk, struct hci_dev *hdev, 5038 void *data, u16 len) 5039 { 5040 struct mgmt_pending_cmd *cmd; 5041 int err, status; 5042 5043 hci_dev_lock(hdev); 5044 5045 if (pending_find(MGMT_OP_SET_LE, hdev) || 5046 pending_find(MGMT_OP_REMOVE_ADV_MONITOR, hdev) || 5047 pending_find(MGMT_OP_ADD_ADV_PATTERNS_MONITOR, hdev) || 5048 pending_find(MGMT_OP_ADD_ADV_PATTERNS_MONITOR_RSSI, hdev)) { 5049 status = MGMT_STATUS_BUSY; 5050 goto unlock; 5051 } 5052 5053 cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_ADV_MONITOR, hdev, data, len); 5054 if (!cmd) { 5055 status = MGMT_STATUS_NO_RESOURCES; 5056 goto unlock; 5057 } 5058 5059 err = hci_cmd_sync_queue(hdev, mgmt_remove_adv_monitor_sync, cmd, 5060 mgmt_remove_adv_monitor_complete); 5061 5062 if (err) { 5063 mgmt_pending_remove(cmd); 5064 5065 if (err == -ENOMEM) 5066 status = MGMT_STATUS_NO_RESOURCES; 5067 else 5068 status = MGMT_STATUS_FAILED; 5069 5070 goto unlock; 5071 } 5072 5073 hci_dev_unlock(hdev); 5074 5075 return 0; 5076 5077 unlock: 5078 hci_dev_unlock(hdev); 5079 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADV_MONITOR, 5080 status); 5081 } 5082 5083 static void read_local_oob_data_complete(struct hci_dev *hdev, void *data, int err) 5084 { 5085 struct mgmt_rp_read_local_oob_data mgmt_rp; 5086 size_t rp_size = sizeof(mgmt_rp); 5087 struct mgmt_pending_cmd *cmd = data; 5088 struct sk_buff *skb = cmd->skb; 5089 u8 status = mgmt_status(err); 5090 5091 if (!status) { 5092 if (!skb) 5093 status = MGMT_STATUS_FAILED; 5094 else if (IS_ERR(skb)) 5095 status = mgmt_status(PTR_ERR(skb)); 5096 else 5097 status = mgmt_status(skb->data[0]); 5098 } 5099 5100 bt_dev_dbg(hdev, "status %d", status); 5101 5102 if (status) { 5103 mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, status); 5104 goto remove; 5105 } 5106 5107 memset(&mgmt_rp, 0, sizeof(mgmt_rp)); 5108 5109 if (!bredr_sc_enabled(hdev)) { 5110 struct hci_rp_read_local_oob_data *rp = (void *) skb->data; 5111 5112 if (skb->len < sizeof(*rp)) { 5113 mgmt_cmd_status(cmd->sk, hdev->id, 5114 MGMT_OP_READ_LOCAL_OOB_DATA, 5115 MGMT_STATUS_FAILED); 5116 goto remove; 5117 } 5118 5119 memcpy(mgmt_rp.hash192, rp->hash, sizeof(rp->hash)); 5120 memcpy(mgmt_rp.rand192, rp->rand, sizeof(rp->rand)); 5121 5122 rp_size -= sizeof(mgmt_rp.hash256) + sizeof(mgmt_rp.rand256); 5123 } else { 5124 struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data; 5125 5126 if (skb->len < sizeof(*rp)) { 5127 mgmt_cmd_status(cmd->sk, hdev->id, 5128 MGMT_OP_READ_LOCAL_OOB_DATA, 5129 MGMT_STATUS_FAILED); 5130 goto remove; 5131 } 5132 5133 memcpy(mgmt_rp.hash192, rp->hash192, sizeof(rp->hash192)); 5134 memcpy(mgmt_rp.rand192, rp->rand192, sizeof(rp->rand192)); 5135 5136 memcpy(mgmt_rp.hash256, rp->hash256, sizeof(rp->hash256)); 5137 memcpy(mgmt_rp.rand256, rp->rand256, sizeof(rp->rand256)); 5138 } 5139 5140 mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, 5141 MGMT_STATUS_SUCCESS, &mgmt_rp, rp_size); 5142 5143 remove: 5144 if (skb && !IS_ERR(skb)) 5145 kfree_skb(skb); 5146 5147 mgmt_pending_free(cmd); 5148 } 5149 5150 static int read_local_oob_data_sync(struct hci_dev *hdev, void *data) 5151 { 5152 struct mgmt_pending_cmd *cmd = data; 5153 5154 if (bredr_sc_enabled(hdev)) 5155 cmd->skb = hci_read_local_oob_data_sync(hdev, true, cmd->sk); 5156 else 5157 cmd->skb = hci_read_local_oob_data_sync(hdev, false, cmd->sk); 5158 5159 if (IS_ERR(cmd->skb)) 5160 return PTR_ERR(cmd->skb); 5161 else 5162 return 0; 5163 } 5164 5165 static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev, 5166 void *data, u16 data_len) 5167 { 5168 struct mgmt_pending_cmd *cmd; 5169 int err; 5170 5171 bt_dev_dbg(hdev, "sock %p", sk); 5172 5173 hci_dev_lock(hdev); 5174 5175 if (!hdev_is_powered(hdev)) { 5176 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, 5177 MGMT_STATUS_NOT_POWERED); 5178 goto unlock; 5179 } 5180 5181 if (!lmp_ssp_capable(hdev)) { 5182 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, 5183 MGMT_STATUS_NOT_SUPPORTED); 5184 goto unlock; 5185 } 5186 5187 cmd = mgmt_pending_new(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0); 5188 if (!cmd) 5189 err = -ENOMEM; 5190 else 5191 err = hci_cmd_sync_queue(hdev, read_local_oob_data_sync, cmd, 5192 read_local_oob_data_complete); 5193 5194 if (err < 0) { 5195 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, 5196 MGMT_STATUS_FAILED); 5197 5198 if (cmd) 5199 mgmt_pending_free(cmd); 5200 } 5201 5202 unlock: 5203 hci_dev_unlock(hdev); 5204 return err; 5205 } 5206 5207 static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev, 5208 void *data, u16 len) 5209 { 5210 struct mgmt_addr_info *addr = data; 5211 int err; 5212 5213 bt_dev_dbg(hdev, "sock %p", sk); 5214 5215 if (!bdaddr_type_is_valid(addr->type)) 5216 return mgmt_cmd_complete(sk, hdev->id, 5217 MGMT_OP_ADD_REMOTE_OOB_DATA, 5218 MGMT_STATUS_INVALID_PARAMS, 5219 addr, sizeof(*addr)); 5220 5221 hci_dev_lock(hdev); 5222 5223 if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) { 5224 struct mgmt_cp_add_remote_oob_data *cp = data; 5225 u8 status; 5226 5227 if (cp->addr.type != BDADDR_BREDR) { 5228 err = mgmt_cmd_complete(sk, hdev->id, 5229 MGMT_OP_ADD_REMOTE_OOB_DATA, 5230 MGMT_STATUS_INVALID_PARAMS, 5231 &cp->addr, sizeof(cp->addr)); 5232 goto unlock; 5233 } 5234 5235 err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, 5236 cp->addr.type, cp->hash, 5237 cp->rand, NULL, NULL); 5238 if (err < 0) 5239 status = MGMT_STATUS_FAILED; 5240 else 5241 status = MGMT_STATUS_SUCCESS; 5242 5243 err = mgmt_cmd_complete(sk, hdev->id, 5244 MGMT_OP_ADD_REMOTE_OOB_DATA, status, 5245 &cp->addr, sizeof(cp->addr)); 5246 } else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) { 5247 struct mgmt_cp_add_remote_oob_ext_data *cp = data; 5248 u8 *rand192, *hash192, *rand256, *hash256; 5249 u8 status; 5250 5251 if (bdaddr_type_is_le(cp->addr.type)) { 5252 /* Enforce zero-valued 192-bit parameters as 5253 * long as legacy SMP OOB isn't implemented. 5254 */ 5255 if (memcmp(cp->rand192, ZERO_KEY, 16) || 5256 memcmp(cp->hash192, ZERO_KEY, 16)) { 5257 err = mgmt_cmd_complete(sk, hdev->id, 5258 MGMT_OP_ADD_REMOTE_OOB_DATA, 5259 MGMT_STATUS_INVALID_PARAMS, 5260 addr, sizeof(*addr)); 5261 goto unlock; 5262 } 5263 5264 rand192 = NULL; 5265 hash192 = NULL; 5266 } else { 5267 /* In case one of the P-192 values is set to zero, 5268 * then just disable OOB data for P-192. 5269 */ 5270 if (!memcmp(cp->rand192, ZERO_KEY, 16) || 5271 !memcmp(cp->hash192, ZERO_KEY, 16)) { 5272 rand192 = NULL; 5273 hash192 = NULL; 5274 } else { 5275 rand192 = cp->rand192; 5276 hash192 = cp->hash192; 5277 } 5278 } 5279 5280 /* In case one of the P-256 values is set to zero, then just 5281 * disable OOB data for P-256. 5282 */ 5283 if (!memcmp(cp->rand256, ZERO_KEY, 16) || 5284 !memcmp(cp->hash256, ZERO_KEY, 16)) { 5285 rand256 = NULL; 5286 hash256 = NULL; 5287 } else { 5288 rand256 = cp->rand256; 5289 hash256 = cp->hash256; 5290 } 5291 5292 err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, 5293 cp->addr.type, hash192, rand192, 5294 hash256, rand256); 5295 if (err < 0) 5296 status = MGMT_STATUS_FAILED; 5297 else 5298 status = MGMT_STATUS_SUCCESS; 5299 5300 err = mgmt_cmd_complete(sk, hdev->id, 5301 MGMT_OP_ADD_REMOTE_OOB_DATA, 5302 status, &cp->addr, sizeof(cp->addr)); 5303 } else { 5304 bt_dev_err(hdev, "add_remote_oob_data: invalid len of %u bytes", 5305 len); 5306 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, 5307 MGMT_STATUS_INVALID_PARAMS); 5308 } 5309 5310 unlock: 5311 hci_dev_unlock(hdev); 5312 return err; 5313 } 5314 5315 static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev, 5316 void *data, u16 len) 5317 { 5318 struct mgmt_cp_remove_remote_oob_data *cp = data; 5319 u8 status; 5320 int err; 5321 5322 bt_dev_dbg(hdev, "sock %p", sk); 5323 5324 if (cp->addr.type != BDADDR_BREDR) 5325 return mgmt_cmd_complete(sk, hdev->id, 5326 MGMT_OP_REMOVE_REMOTE_OOB_DATA, 5327 MGMT_STATUS_INVALID_PARAMS, 5328 &cp->addr, sizeof(cp->addr)); 5329 5330 hci_dev_lock(hdev); 5331 5332 if (!bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { 5333 hci_remote_oob_data_clear(hdev); 5334 status = MGMT_STATUS_SUCCESS; 5335 goto done; 5336 } 5337 5338 err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr, cp->addr.type); 5339 if (err < 0) 5340 status = MGMT_STATUS_INVALID_PARAMS; 5341 else 5342 status = MGMT_STATUS_SUCCESS; 5343 5344 done: 5345 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA, 5346 status, &cp->addr, sizeof(cp->addr)); 5347 5348 hci_dev_unlock(hdev); 5349 return err; 5350 } 5351 5352 void mgmt_start_discovery_complete(struct hci_dev *hdev, u8 status) 5353 { 5354 struct mgmt_pending_cmd *cmd; 5355 5356 bt_dev_dbg(hdev, "status %u", status); 5357 5358 hci_dev_lock(hdev); 5359 5360 cmd = pending_find(MGMT_OP_START_DISCOVERY, hdev); 5361 if (!cmd) 5362 cmd = pending_find(MGMT_OP_START_SERVICE_DISCOVERY, hdev); 5363 5364 if (!cmd) 5365 cmd = pending_find(MGMT_OP_START_LIMITED_DISCOVERY, hdev); 5366 5367 if (cmd) { 5368 cmd->cmd_complete(cmd, mgmt_status(status)); 5369 mgmt_pending_remove(cmd); 5370 } 5371 5372 hci_dev_unlock(hdev); 5373 } 5374 5375 static bool discovery_type_is_valid(struct hci_dev *hdev, uint8_t type, 5376 uint8_t *mgmt_status) 5377 { 5378 switch (type) { 5379 case DISCOV_TYPE_LE: 5380 *mgmt_status = mgmt_le_support(hdev); 5381 if (*mgmt_status) 5382 return false; 5383 break; 5384 case DISCOV_TYPE_INTERLEAVED: 5385 *mgmt_status = mgmt_le_support(hdev); 5386 if (*mgmt_status) 5387 return false; 5388 fallthrough; 5389 case DISCOV_TYPE_BREDR: 5390 *mgmt_status = mgmt_bredr_support(hdev); 5391 if (*mgmt_status) 5392 return false; 5393 break; 5394 default: 5395 *mgmt_status = MGMT_STATUS_INVALID_PARAMS; 5396 return false; 5397 } 5398 5399 return true; 5400 } 5401 5402 static void start_discovery_complete(struct hci_dev *hdev, void *data, int err) 5403 { 5404 struct mgmt_pending_cmd *cmd = data; 5405 5406 if (cmd != pending_find(MGMT_OP_START_DISCOVERY, hdev) && 5407 cmd != pending_find(MGMT_OP_START_LIMITED_DISCOVERY, hdev) && 5408 cmd != pending_find(MGMT_OP_START_SERVICE_DISCOVERY, hdev)) 5409 return; 5410 5411 bt_dev_dbg(hdev, "err %d", err); 5412 5413 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(err), 5414 cmd->param, 1); 5415 mgmt_pending_remove(cmd); 5416 5417 hci_discovery_set_state(hdev, err ? DISCOVERY_STOPPED: 5418 DISCOVERY_FINDING); 5419 } 5420 5421 static int start_discovery_sync(struct hci_dev *hdev, void *data) 5422 { 5423 return hci_start_discovery_sync(hdev); 5424 } 5425 5426 static int start_discovery_internal(struct sock *sk, struct hci_dev *hdev, 5427 u16 op, void *data, u16 len) 5428 { 5429 struct mgmt_cp_start_discovery *cp = data; 5430 struct mgmt_pending_cmd *cmd; 5431 u8 status; 5432 int err; 5433 5434 bt_dev_dbg(hdev, "sock %p", sk); 5435 5436 hci_dev_lock(hdev); 5437 5438 if (!hdev_is_powered(hdev)) { 5439 err = mgmt_cmd_complete(sk, hdev->id, op, 5440 MGMT_STATUS_NOT_POWERED, 5441 &cp->type, sizeof(cp->type)); 5442 goto failed; 5443 } 5444 5445 if (hdev->discovery.state != DISCOVERY_STOPPED || 5446 hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) { 5447 err = mgmt_cmd_complete(sk, hdev->id, op, MGMT_STATUS_BUSY, 5448 &cp->type, sizeof(cp->type)); 5449 goto failed; 5450 } 5451 5452 if (!discovery_type_is_valid(hdev, cp->type, &status)) { 5453 err = mgmt_cmd_complete(sk, hdev->id, op, status, 5454 &cp->type, sizeof(cp->type)); 5455 goto failed; 5456 } 5457 5458 /* Can't start discovery when it is paused */ 5459 if (hdev->discovery_paused) { 5460 err = mgmt_cmd_complete(sk, hdev->id, op, MGMT_STATUS_BUSY, 5461 &cp->type, sizeof(cp->type)); 5462 goto failed; 5463 } 5464 5465 /* Clear the discovery filter first to free any previously 5466 * allocated memory for the UUID list. 5467 */ 5468 hci_discovery_filter_clear(hdev); 5469 5470 hdev->discovery.type = cp->type; 5471 hdev->discovery.report_invalid_rssi = false; 5472 if (op == MGMT_OP_START_LIMITED_DISCOVERY) 5473 hdev->discovery.limited = true; 5474 else 5475 hdev->discovery.limited = false; 5476 5477 cmd = mgmt_pending_add(sk, op, hdev, data, len); 5478 if (!cmd) { 5479 err = -ENOMEM; 5480 goto failed; 5481 } 5482 5483 err = hci_cmd_sync_queue(hdev, start_discovery_sync, cmd, 5484 start_discovery_complete); 5485 if (err < 0) { 5486 mgmt_pending_remove(cmd); 5487 goto failed; 5488 } 5489 5490 hci_discovery_set_state(hdev, DISCOVERY_STARTING); 5491 5492 failed: 5493 hci_dev_unlock(hdev); 5494 return err; 5495 } 5496 5497 static int start_discovery(struct sock *sk, struct hci_dev *hdev, 5498 void *data, u16 len) 5499 { 5500 return start_discovery_internal(sk, hdev, MGMT_OP_START_DISCOVERY, 5501 data, len); 5502 } 5503 5504 static int start_limited_discovery(struct sock *sk, struct hci_dev *hdev, 5505 void *data, u16 len) 5506 { 5507 return start_discovery_internal(sk, hdev, 5508 MGMT_OP_START_LIMITED_DISCOVERY, 5509 data, len); 5510 } 5511 5512 static int start_service_discovery(struct sock *sk, struct hci_dev *hdev, 5513 void *data, u16 len) 5514 { 5515 struct mgmt_cp_start_service_discovery *cp = data; 5516 struct mgmt_pending_cmd *cmd; 5517 const u16 max_uuid_count = ((U16_MAX - sizeof(*cp)) / 16); 5518 u16 uuid_count, expected_len; 5519 u8 status; 5520 int err; 5521 5522 bt_dev_dbg(hdev, "sock %p", sk); 5523 5524 hci_dev_lock(hdev); 5525 5526 if (!hdev_is_powered(hdev)) { 5527 err = mgmt_cmd_complete(sk, hdev->id, 5528 MGMT_OP_START_SERVICE_DISCOVERY, 5529 MGMT_STATUS_NOT_POWERED, 5530 &cp->type, sizeof(cp->type)); 5531 goto failed; 5532 } 5533 5534 if (hdev->discovery.state != DISCOVERY_STOPPED || 5535 hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) { 5536 err = mgmt_cmd_complete(sk, hdev->id, 5537 MGMT_OP_START_SERVICE_DISCOVERY, 5538 MGMT_STATUS_BUSY, &cp->type, 5539 sizeof(cp->type)); 5540 goto failed; 5541 } 5542 5543 if (hdev->discovery_paused) { 5544 err = mgmt_cmd_complete(sk, hdev->id, 5545 MGMT_OP_START_SERVICE_DISCOVERY, 5546 MGMT_STATUS_BUSY, &cp->type, 5547 sizeof(cp->type)); 5548 goto failed; 5549 } 5550 5551 uuid_count = __le16_to_cpu(cp->uuid_count); 5552 if (uuid_count > max_uuid_count) { 5553 bt_dev_err(hdev, "service_discovery: too big uuid_count value %u", 5554 uuid_count); 5555 err = mgmt_cmd_complete(sk, hdev->id, 5556 MGMT_OP_START_SERVICE_DISCOVERY, 5557 MGMT_STATUS_INVALID_PARAMS, &cp->type, 5558 sizeof(cp->type)); 5559 goto failed; 5560 } 5561 5562 expected_len = sizeof(*cp) + uuid_count * 16; 5563 if (expected_len != len) { 5564 bt_dev_err(hdev, "service_discovery: expected %u bytes, got %u bytes", 5565 expected_len, len); 5566 err = mgmt_cmd_complete(sk, hdev->id, 5567 MGMT_OP_START_SERVICE_DISCOVERY, 5568 MGMT_STATUS_INVALID_PARAMS, &cp->type, 5569 sizeof(cp->type)); 5570 goto failed; 5571 } 5572 5573 if (!discovery_type_is_valid(hdev, cp->type, &status)) { 5574 err = mgmt_cmd_complete(sk, hdev->id, 5575 MGMT_OP_START_SERVICE_DISCOVERY, 5576 status, &cp->type, sizeof(cp->type)); 5577 goto failed; 5578 } 5579 5580 cmd = mgmt_pending_add(sk, MGMT_OP_START_SERVICE_DISCOVERY, 5581 hdev, data, len); 5582 if (!cmd) { 5583 err = -ENOMEM; 5584 goto failed; 5585 } 5586 5587 /* Clear the discovery filter first to free any previously 5588 * allocated memory for the UUID list. 5589 */ 5590 hci_discovery_filter_clear(hdev); 5591 5592 hdev->discovery.result_filtering = true; 5593 hdev->discovery.type = cp->type; 5594 hdev->discovery.rssi = cp->rssi; 5595 hdev->discovery.uuid_count = uuid_count; 5596 5597 if (uuid_count > 0) { 5598 hdev->discovery.uuids = kmemdup(cp->uuids, uuid_count * 16, 5599 GFP_KERNEL); 5600 if (!hdev->discovery.uuids) { 5601 err = mgmt_cmd_complete(sk, hdev->id, 5602 MGMT_OP_START_SERVICE_DISCOVERY, 5603 MGMT_STATUS_FAILED, 5604 &cp->type, sizeof(cp->type)); 5605 mgmt_pending_remove(cmd); 5606 goto failed; 5607 } 5608 } 5609 5610 err = hci_cmd_sync_queue(hdev, start_discovery_sync, cmd, 5611 start_discovery_complete); 5612 if (err < 0) { 5613 mgmt_pending_remove(cmd); 5614 goto failed; 5615 } 5616 5617 hci_discovery_set_state(hdev, DISCOVERY_STARTING); 5618 5619 failed: 5620 hci_dev_unlock(hdev); 5621 return err; 5622 } 5623 5624 void mgmt_stop_discovery_complete(struct hci_dev *hdev, u8 status) 5625 { 5626 struct mgmt_pending_cmd *cmd; 5627 5628 bt_dev_dbg(hdev, "status %u", status); 5629 5630 hci_dev_lock(hdev); 5631 5632 cmd = pending_find(MGMT_OP_STOP_DISCOVERY, hdev); 5633 if (cmd) { 5634 cmd->cmd_complete(cmd, mgmt_status(status)); 5635 mgmt_pending_remove(cmd); 5636 } 5637 5638 hci_dev_unlock(hdev); 5639 } 5640 5641 static void stop_discovery_complete(struct hci_dev *hdev, void *data, int err) 5642 { 5643 struct mgmt_pending_cmd *cmd = data; 5644 5645 if (cmd != pending_find(MGMT_OP_STOP_DISCOVERY, hdev)) 5646 return; 5647 5648 bt_dev_dbg(hdev, "err %d", err); 5649 5650 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(err), 5651 cmd->param, 1); 5652 mgmt_pending_remove(cmd); 5653 5654 if (!err) 5655 hci_discovery_set_state(hdev, DISCOVERY_STOPPED); 5656 } 5657 5658 static int stop_discovery_sync(struct hci_dev *hdev, void *data) 5659 { 5660 return hci_stop_discovery_sync(hdev); 5661 } 5662 5663 static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data, 5664 u16 len) 5665 { 5666 struct mgmt_cp_stop_discovery *mgmt_cp = data; 5667 struct mgmt_pending_cmd *cmd; 5668 int err; 5669 5670 bt_dev_dbg(hdev, "sock %p", sk); 5671 5672 hci_dev_lock(hdev); 5673 5674 if (!hci_discovery_active(hdev)) { 5675 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY, 5676 MGMT_STATUS_REJECTED, &mgmt_cp->type, 5677 sizeof(mgmt_cp->type)); 5678 goto unlock; 5679 } 5680 5681 if (hdev->discovery.type != mgmt_cp->type) { 5682 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY, 5683 MGMT_STATUS_INVALID_PARAMS, 5684 &mgmt_cp->type, sizeof(mgmt_cp->type)); 5685 goto unlock; 5686 } 5687 5688 cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, data, len); 5689 if (!cmd) { 5690 err = -ENOMEM; 5691 goto unlock; 5692 } 5693 5694 err = hci_cmd_sync_queue(hdev, stop_discovery_sync, cmd, 5695 stop_discovery_complete); 5696 if (err < 0) { 5697 mgmt_pending_remove(cmd); 5698 goto unlock; 5699 } 5700 5701 hci_discovery_set_state(hdev, DISCOVERY_STOPPING); 5702 5703 unlock: 5704 hci_dev_unlock(hdev); 5705 return err; 5706 } 5707 5708 static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data, 5709 u16 len) 5710 { 5711 struct mgmt_cp_confirm_name *cp = data; 5712 struct inquiry_entry *e; 5713 int err; 5714 5715 bt_dev_dbg(hdev, "sock %p", sk); 5716 5717 hci_dev_lock(hdev); 5718 5719 if (!hci_discovery_active(hdev)) { 5720 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 5721 MGMT_STATUS_FAILED, &cp->addr, 5722 sizeof(cp->addr)); 5723 goto failed; 5724 } 5725 5726 e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr); 5727 if (!e) { 5728 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 5729 MGMT_STATUS_INVALID_PARAMS, &cp->addr, 5730 sizeof(cp->addr)); 5731 goto failed; 5732 } 5733 5734 if (cp->name_known) { 5735 e->name_state = NAME_KNOWN; 5736 list_del(&e->list); 5737 } else { 5738 e->name_state = NAME_NEEDED; 5739 hci_inquiry_cache_update_resolve(hdev, e); 5740 } 5741 5742 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, 5743 &cp->addr, sizeof(cp->addr)); 5744 5745 failed: 5746 hci_dev_unlock(hdev); 5747 return err; 5748 } 5749 5750 static int block_device(struct sock *sk, struct hci_dev *hdev, void *data, 5751 u16 len) 5752 { 5753 struct mgmt_cp_block_device *cp = data; 5754 u8 status; 5755 int err; 5756 5757 bt_dev_dbg(hdev, "sock %p", sk); 5758 5759 if (!bdaddr_type_is_valid(cp->addr.type)) 5760 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, 5761 MGMT_STATUS_INVALID_PARAMS, 5762 &cp->addr, sizeof(cp->addr)); 5763 5764 hci_dev_lock(hdev); 5765 5766 err = hci_bdaddr_list_add(&hdev->reject_list, &cp->addr.bdaddr, 5767 cp->addr.type); 5768 if (err < 0) { 5769 status = MGMT_STATUS_FAILED; 5770 goto done; 5771 } 5772 5773 mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &cp->addr, sizeof(cp->addr), 5774 sk); 5775 status = MGMT_STATUS_SUCCESS; 5776 5777 done: 5778 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status, 5779 &cp->addr, sizeof(cp->addr)); 5780 5781 hci_dev_unlock(hdev); 5782 5783 return err; 5784 } 5785 5786 static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data, 5787 u16 len) 5788 { 5789 struct mgmt_cp_unblock_device *cp = data; 5790 u8 status; 5791 int err; 5792 5793 bt_dev_dbg(hdev, "sock %p", sk); 5794 5795 if (!bdaddr_type_is_valid(cp->addr.type)) 5796 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, 5797 MGMT_STATUS_INVALID_PARAMS, 5798 &cp->addr, sizeof(cp->addr)); 5799 5800 hci_dev_lock(hdev); 5801 5802 err = hci_bdaddr_list_del(&hdev->reject_list, &cp->addr.bdaddr, 5803 cp->addr.type); 5804 if (err < 0) { 5805 status = MGMT_STATUS_INVALID_PARAMS; 5806 goto done; 5807 } 5808 5809 mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &cp->addr, sizeof(cp->addr), 5810 sk); 5811 status = MGMT_STATUS_SUCCESS; 5812 5813 done: 5814 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status, 5815 &cp->addr, sizeof(cp->addr)); 5816 5817 hci_dev_unlock(hdev); 5818 5819 return err; 5820 } 5821 5822 static int set_device_id_sync(struct hci_dev *hdev, void *data) 5823 { 5824 return hci_update_eir_sync(hdev); 5825 } 5826 5827 static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data, 5828 u16 len) 5829 { 5830 struct mgmt_cp_set_device_id *cp = data; 5831 int err; 5832 __u16 source; 5833 5834 bt_dev_dbg(hdev, "sock %p", sk); 5835 5836 source = __le16_to_cpu(cp->source); 5837 5838 if (source > 0x0002) 5839 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 5840 MGMT_STATUS_INVALID_PARAMS); 5841 5842 hci_dev_lock(hdev); 5843 5844 hdev->devid_source = source; 5845 hdev->devid_vendor = __le16_to_cpu(cp->vendor); 5846 hdev->devid_product = __le16_to_cpu(cp->product); 5847 hdev->devid_version = __le16_to_cpu(cp->version); 5848 5849 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, 5850 NULL, 0); 5851 5852 hci_cmd_sync_queue(hdev, set_device_id_sync, NULL, NULL); 5853 5854 hci_dev_unlock(hdev); 5855 5856 return err; 5857 } 5858 5859 static void enable_advertising_instance(struct hci_dev *hdev, int err) 5860 { 5861 if (err) 5862 bt_dev_err(hdev, "failed to re-configure advertising %d", err); 5863 else 5864 bt_dev_dbg(hdev, "status %d", err); 5865 } 5866 5867 static void set_advertising_complete(struct hci_dev *hdev, void *data, int err) 5868 { 5869 struct cmd_lookup match = { NULL, hdev }; 5870 u8 instance; 5871 struct adv_info *adv_instance; 5872 u8 status = mgmt_status(err); 5873 5874 if (status) { 5875 mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, 5876 cmd_status_rsp, &status); 5877 return; 5878 } 5879 5880 if (hci_dev_test_flag(hdev, HCI_LE_ADV)) 5881 hci_dev_set_flag(hdev, HCI_ADVERTISING); 5882 else 5883 hci_dev_clear_flag(hdev, HCI_ADVERTISING); 5884 5885 mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp, 5886 &match); 5887 5888 new_settings(hdev, match.sk); 5889 5890 if (match.sk) 5891 sock_put(match.sk); 5892 5893 /* If "Set Advertising" was just disabled and instance advertising was 5894 * set up earlier, then re-enable multi-instance advertising. 5895 */ 5896 if (hci_dev_test_flag(hdev, HCI_ADVERTISING) || 5897 list_empty(&hdev->adv_instances)) 5898 return; 5899 5900 instance = hdev->cur_adv_instance; 5901 if (!instance) { 5902 adv_instance = list_first_entry_or_null(&hdev->adv_instances, 5903 struct adv_info, list); 5904 if (!adv_instance) 5905 return; 5906 5907 instance = adv_instance->instance; 5908 } 5909 5910 err = hci_schedule_adv_instance_sync(hdev, instance, true); 5911 5912 enable_advertising_instance(hdev, err); 5913 } 5914 5915 static int set_adv_sync(struct hci_dev *hdev, void *data) 5916 { 5917 struct mgmt_pending_cmd *cmd = data; 5918 struct mgmt_mode *cp = cmd->param; 5919 u8 val = !!cp->val; 5920 5921 if (cp->val == 0x02) 5922 hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE); 5923 else 5924 hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); 5925 5926 cancel_adv_timeout(hdev); 5927 5928 if (val) { 5929 /* Switch to instance "0" for the Set Advertising setting. 5930 * We cannot use update_[adv|scan_rsp]_data() here as the 5931 * HCI_ADVERTISING flag is not yet set. 5932 */ 5933 hdev->cur_adv_instance = 0x00; 5934 5935 if (ext_adv_capable(hdev)) { 5936 hci_start_ext_adv_sync(hdev, 0x00); 5937 } else { 5938 hci_update_adv_data_sync(hdev, 0x00); 5939 hci_update_scan_rsp_data_sync(hdev, 0x00); 5940 hci_enable_advertising_sync(hdev); 5941 } 5942 } else { 5943 hci_disable_advertising_sync(hdev); 5944 } 5945 5946 return 0; 5947 } 5948 5949 static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data, 5950 u16 len) 5951 { 5952 struct mgmt_mode *cp = data; 5953 struct mgmt_pending_cmd *cmd; 5954 u8 val, status; 5955 int err; 5956 5957 bt_dev_dbg(hdev, "sock %p", sk); 5958 5959 status = mgmt_le_support(hdev); 5960 if (status) 5961 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, 5962 status); 5963 5964 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) 5965 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, 5966 MGMT_STATUS_INVALID_PARAMS); 5967 5968 if (hdev->advertising_paused) 5969 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, 5970 MGMT_STATUS_BUSY); 5971 5972 hci_dev_lock(hdev); 5973 5974 val = !!cp->val; 5975 5976 /* The following conditions are ones which mean that we should 5977 * not do any HCI communication but directly send a mgmt 5978 * response to user space (after toggling the flag if 5979 * necessary). 5980 */ 5981 if (!hdev_is_powered(hdev) || 5982 (val == hci_dev_test_flag(hdev, HCI_ADVERTISING) && 5983 (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_ADVERTISING_CONNECTABLE)) || 5984 hci_conn_num(hdev, LE_LINK) > 0 || 5985 (hci_dev_test_flag(hdev, HCI_LE_SCAN) && 5986 hdev->le_scan_type == LE_SCAN_ACTIVE)) { 5987 bool changed; 5988 5989 if (cp->val) { 5990 hdev->cur_adv_instance = 0x00; 5991 changed = !hci_dev_test_and_set_flag(hdev, HCI_ADVERTISING); 5992 if (cp->val == 0x02) 5993 hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE); 5994 else 5995 hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); 5996 } else { 5997 changed = hci_dev_test_and_clear_flag(hdev, HCI_ADVERTISING); 5998 hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); 5999 } 6000 6001 err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev); 6002 if (err < 0) 6003 goto unlock; 6004 6005 if (changed) 6006 err = new_settings(hdev, sk); 6007 6008 goto unlock; 6009 } 6010 6011 if (pending_find(MGMT_OP_SET_ADVERTISING, hdev) || 6012 pending_find(MGMT_OP_SET_LE, hdev)) { 6013 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, 6014 MGMT_STATUS_BUSY); 6015 goto unlock; 6016 } 6017 6018 cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len); 6019 if (!cmd) 6020 err = -ENOMEM; 6021 else 6022 err = hci_cmd_sync_queue(hdev, set_adv_sync, cmd, 6023 set_advertising_complete); 6024 6025 if (err < 0 && cmd) 6026 mgmt_pending_remove(cmd); 6027 6028 unlock: 6029 hci_dev_unlock(hdev); 6030 return err; 6031 } 6032 6033 static int set_static_address(struct sock *sk, struct hci_dev *hdev, 6034 void *data, u16 len) 6035 { 6036 struct mgmt_cp_set_static_address *cp = data; 6037 int err; 6038 6039 bt_dev_dbg(hdev, "sock %p", sk); 6040 6041 if (!lmp_le_capable(hdev)) 6042 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 6043 MGMT_STATUS_NOT_SUPPORTED); 6044 6045 if (hdev_is_powered(hdev)) 6046 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 6047 MGMT_STATUS_REJECTED); 6048 6049 if (bacmp(&cp->bdaddr, BDADDR_ANY)) { 6050 if (!bacmp(&cp->bdaddr, BDADDR_NONE)) 6051 return mgmt_cmd_status(sk, hdev->id, 6052 MGMT_OP_SET_STATIC_ADDRESS, 6053 MGMT_STATUS_INVALID_PARAMS); 6054 6055 /* Two most significant bits shall be set */ 6056 if ((cp->bdaddr.b[5] & 0xc0) != 0xc0) 6057 return mgmt_cmd_status(sk, hdev->id, 6058 MGMT_OP_SET_STATIC_ADDRESS, 6059 MGMT_STATUS_INVALID_PARAMS); 6060 } 6061 6062 hci_dev_lock(hdev); 6063 6064 bacpy(&hdev->static_addr, &cp->bdaddr); 6065 6066 err = send_settings_rsp(sk, MGMT_OP_SET_STATIC_ADDRESS, hdev); 6067 if (err < 0) 6068 goto unlock; 6069 6070 err = new_settings(hdev, sk); 6071 6072 unlock: 6073 hci_dev_unlock(hdev); 6074 return err; 6075 } 6076 6077 static int set_scan_params(struct sock *sk, struct hci_dev *hdev, 6078 void *data, u16 len) 6079 { 6080 struct mgmt_cp_set_scan_params *cp = data; 6081 __u16 interval, window; 6082 int err; 6083 6084 bt_dev_dbg(hdev, "sock %p", sk); 6085 6086 if (!lmp_le_capable(hdev)) 6087 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 6088 MGMT_STATUS_NOT_SUPPORTED); 6089 6090 interval = __le16_to_cpu(cp->interval); 6091 6092 if (interval < 0x0004 || interval > 0x4000) 6093 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 6094 MGMT_STATUS_INVALID_PARAMS); 6095 6096 window = __le16_to_cpu(cp->window); 6097 6098 if (window < 0x0004 || window > 0x4000) 6099 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 6100 MGMT_STATUS_INVALID_PARAMS); 6101 6102 if (window > interval) 6103 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 6104 MGMT_STATUS_INVALID_PARAMS); 6105 6106 hci_dev_lock(hdev); 6107 6108 hdev->le_scan_interval = interval; 6109 hdev->le_scan_window = window; 6110 6111 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0, 6112 NULL, 0); 6113 6114 /* If background scan is running, restart it so new parameters are 6115 * loaded. 6116 */ 6117 if (hci_dev_test_flag(hdev, HCI_LE_SCAN) && 6118 hdev->discovery.state == DISCOVERY_STOPPED) 6119 hci_update_passive_scan(hdev); 6120 6121 hci_dev_unlock(hdev); 6122 6123 return err; 6124 } 6125 6126 static void fast_connectable_complete(struct hci_dev *hdev, void *data, int err) 6127 { 6128 struct mgmt_pending_cmd *cmd = data; 6129 6130 bt_dev_dbg(hdev, "err %d", err); 6131 6132 if (err) { 6133 mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, 6134 mgmt_status(err)); 6135 } else { 6136 struct mgmt_mode *cp = cmd->param; 6137 6138 if (cp->val) 6139 hci_dev_set_flag(hdev, HCI_FAST_CONNECTABLE); 6140 else 6141 hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE); 6142 6143 send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev); 6144 new_settings(hdev, cmd->sk); 6145 } 6146 6147 mgmt_pending_free(cmd); 6148 } 6149 6150 static int write_fast_connectable_sync(struct hci_dev *hdev, void *data) 6151 { 6152 struct mgmt_pending_cmd *cmd = data; 6153 struct mgmt_mode *cp = cmd->param; 6154 6155 return hci_write_fast_connectable_sync(hdev, cp->val); 6156 } 6157 6158 static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev, 6159 void *data, u16 len) 6160 { 6161 struct mgmt_mode *cp = data; 6162 struct mgmt_pending_cmd *cmd; 6163 int err; 6164 6165 bt_dev_dbg(hdev, "sock %p", sk); 6166 6167 if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) || 6168 hdev->hci_ver < BLUETOOTH_VER_1_2) 6169 return mgmt_cmd_status(sk, hdev->id, 6170 MGMT_OP_SET_FAST_CONNECTABLE, 6171 MGMT_STATUS_NOT_SUPPORTED); 6172 6173 if (cp->val != 0x00 && cp->val != 0x01) 6174 return mgmt_cmd_status(sk, hdev->id, 6175 MGMT_OP_SET_FAST_CONNECTABLE, 6176 MGMT_STATUS_INVALID_PARAMS); 6177 6178 hci_dev_lock(hdev); 6179 6180 if (!!cp->val == hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) { 6181 err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev); 6182 goto unlock; 6183 } 6184 6185 if (!hdev_is_powered(hdev)) { 6186 hci_dev_change_flag(hdev, HCI_FAST_CONNECTABLE); 6187 err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev); 6188 new_settings(hdev, sk); 6189 goto unlock; 6190 } 6191 6192 cmd = mgmt_pending_new(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev, data, 6193 len); 6194 if (!cmd) 6195 err = -ENOMEM; 6196 else 6197 err = hci_cmd_sync_queue(hdev, write_fast_connectable_sync, cmd, 6198 fast_connectable_complete); 6199 6200 if (err < 0) { 6201 mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, 6202 MGMT_STATUS_FAILED); 6203 6204 if (cmd) 6205 mgmt_pending_free(cmd); 6206 } 6207 6208 unlock: 6209 hci_dev_unlock(hdev); 6210 6211 return err; 6212 } 6213 6214 static void set_bredr_complete(struct hci_dev *hdev, void *data, int err) 6215 { 6216 struct mgmt_pending_cmd *cmd = data; 6217 6218 bt_dev_dbg(hdev, "err %d", err); 6219 6220 if (err) { 6221 u8 mgmt_err = mgmt_status(err); 6222 6223 /* We need to restore the flag if related HCI commands 6224 * failed. 6225 */ 6226 hci_dev_clear_flag(hdev, HCI_BREDR_ENABLED); 6227 6228 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); 6229 } else { 6230 send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev); 6231 new_settings(hdev, cmd->sk); 6232 } 6233 6234 mgmt_pending_free(cmd); 6235 } 6236 6237 static int set_bredr_sync(struct hci_dev *hdev, void *data) 6238 { 6239 int status; 6240 6241 status = hci_write_fast_connectable_sync(hdev, false); 6242 6243 if (!status) 6244 status = hci_update_scan_sync(hdev); 6245 6246 /* Since only the advertising data flags will change, there 6247 * is no need to update the scan response data. 6248 */ 6249 if (!status) 6250 status = hci_update_adv_data_sync(hdev, hdev->cur_adv_instance); 6251 6252 return status; 6253 } 6254 6255 static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) 6256 { 6257 struct mgmt_mode *cp = data; 6258 struct mgmt_pending_cmd *cmd; 6259 int err; 6260 6261 bt_dev_dbg(hdev, "sock %p", sk); 6262 6263 if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev)) 6264 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6265 MGMT_STATUS_NOT_SUPPORTED); 6266 6267 if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) 6268 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6269 MGMT_STATUS_REJECTED); 6270 6271 if (cp->val != 0x00 && cp->val != 0x01) 6272 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6273 MGMT_STATUS_INVALID_PARAMS); 6274 6275 hci_dev_lock(hdev); 6276 6277 if (cp->val == hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { 6278 err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev); 6279 goto unlock; 6280 } 6281 6282 if (!hdev_is_powered(hdev)) { 6283 if (!cp->val) { 6284 hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); 6285 hci_dev_clear_flag(hdev, HCI_SSP_ENABLED); 6286 hci_dev_clear_flag(hdev, HCI_LINK_SECURITY); 6287 hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE); 6288 hci_dev_clear_flag(hdev, HCI_HS_ENABLED); 6289 } 6290 6291 hci_dev_change_flag(hdev, HCI_BREDR_ENABLED); 6292 6293 err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev); 6294 if (err < 0) 6295 goto unlock; 6296 6297 err = new_settings(hdev, sk); 6298 goto unlock; 6299 } 6300 6301 /* Reject disabling when powered on */ 6302 if (!cp->val) { 6303 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6304 MGMT_STATUS_REJECTED); 6305 goto unlock; 6306 } else { 6307 /* When configuring a dual-mode controller to operate 6308 * with LE only and using a static address, then switching 6309 * BR/EDR back on is not allowed. 6310 * 6311 * Dual-mode controllers shall operate with the public 6312 * address as its identity address for BR/EDR and LE. So 6313 * reject the attempt to create an invalid configuration. 6314 * 6315 * The same restrictions applies when secure connections 6316 * has been enabled. For BR/EDR this is a controller feature 6317 * while for LE it is a host stack feature. This means that 6318 * switching BR/EDR back on when secure connections has been 6319 * enabled is not a supported transaction. 6320 */ 6321 if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && 6322 (bacmp(&hdev->static_addr, BDADDR_ANY) || 6323 hci_dev_test_flag(hdev, HCI_SC_ENABLED))) { 6324 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6325 MGMT_STATUS_REJECTED); 6326 goto unlock; 6327 } 6328 } 6329 6330 cmd = mgmt_pending_new(sk, MGMT_OP_SET_BREDR, hdev, data, len); 6331 if (!cmd) 6332 err = -ENOMEM; 6333 else 6334 err = hci_cmd_sync_queue(hdev, set_bredr_sync, cmd, 6335 set_bredr_complete); 6336 6337 if (err < 0) { 6338 mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, 6339 MGMT_STATUS_FAILED); 6340 if (cmd) 6341 mgmt_pending_free(cmd); 6342 6343 goto unlock; 6344 } 6345 6346 /* We need to flip the bit already here so that 6347 * hci_req_update_adv_data generates the correct flags. 6348 */ 6349 hci_dev_set_flag(hdev, HCI_BREDR_ENABLED); 6350 6351 unlock: 6352 hci_dev_unlock(hdev); 6353 return err; 6354 } 6355 6356 static void set_secure_conn_complete(struct hci_dev *hdev, void *data, int err) 6357 { 6358 struct mgmt_pending_cmd *cmd = data; 6359 struct mgmt_mode *cp; 6360 6361 bt_dev_dbg(hdev, "err %d", err); 6362 6363 if (err) { 6364 u8 mgmt_err = mgmt_status(err); 6365 6366 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); 6367 goto done; 6368 } 6369 6370 cp = cmd->param; 6371 6372 switch (cp->val) { 6373 case 0x00: 6374 hci_dev_clear_flag(hdev, HCI_SC_ENABLED); 6375 hci_dev_clear_flag(hdev, HCI_SC_ONLY); 6376 break; 6377 case 0x01: 6378 hci_dev_set_flag(hdev, HCI_SC_ENABLED); 6379 hci_dev_clear_flag(hdev, HCI_SC_ONLY); 6380 break; 6381 case 0x02: 6382 hci_dev_set_flag(hdev, HCI_SC_ENABLED); 6383 hci_dev_set_flag(hdev, HCI_SC_ONLY); 6384 break; 6385 } 6386 6387 send_settings_rsp(cmd->sk, cmd->opcode, hdev); 6388 new_settings(hdev, cmd->sk); 6389 6390 done: 6391 mgmt_pending_free(cmd); 6392 } 6393 6394 static int set_secure_conn_sync(struct hci_dev *hdev, void *data) 6395 { 6396 struct mgmt_pending_cmd *cmd = data; 6397 struct mgmt_mode *cp = cmd->param; 6398 u8 val = !!cp->val; 6399 6400 /* Force write of val */ 6401 hci_dev_set_flag(hdev, HCI_SC_ENABLED); 6402 6403 return hci_write_sc_support_sync(hdev, val); 6404 } 6405 6406 static int set_secure_conn(struct sock *sk, struct hci_dev *hdev, 6407 void *data, u16 len) 6408 { 6409 struct mgmt_mode *cp = data; 6410 struct mgmt_pending_cmd *cmd; 6411 u8 val; 6412 int err; 6413 6414 bt_dev_dbg(hdev, "sock %p", sk); 6415 6416 if (!lmp_sc_capable(hdev) && 6417 !hci_dev_test_flag(hdev, HCI_LE_ENABLED)) 6418 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, 6419 MGMT_STATUS_NOT_SUPPORTED); 6420 6421 if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && 6422 lmp_sc_capable(hdev) && 6423 !hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) 6424 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, 6425 MGMT_STATUS_REJECTED); 6426 6427 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) 6428 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, 6429 MGMT_STATUS_INVALID_PARAMS); 6430 6431 hci_dev_lock(hdev); 6432 6433 if (!hdev_is_powered(hdev) || !lmp_sc_capable(hdev) || 6434 !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { 6435 bool changed; 6436 6437 if (cp->val) { 6438 changed = !hci_dev_test_and_set_flag(hdev, 6439 HCI_SC_ENABLED); 6440 if (cp->val == 0x02) 6441 hci_dev_set_flag(hdev, HCI_SC_ONLY); 6442 else 6443 hci_dev_clear_flag(hdev, HCI_SC_ONLY); 6444 } else { 6445 changed = hci_dev_test_and_clear_flag(hdev, 6446 HCI_SC_ENABLED); 6447 hci_dev_clear_flag(hdev, HCI_SC_ONLY); 6448 } 6449 6450 err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev); 6451 if (err < 0) 6452 goto failed; 6453 6454 if (changed) 6455 err = new_settings(hdev, sk); 6456 6457 goto failed; 6458 } 6459 6460 val = !!cp->val; 6461 6462 if (val == hci_dev_test_flag(hdev, HCI_SC_ENABLED) && 6463 (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_SC_ONLY)) { 6464 err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev); 6465 goto failed; 6466 } 6467 6468 cmd = mgmt_pending_new(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len); 6469 if (!cmd) 6470 err = -ENOMEM; 6471 else 6472 err = hci_cmd_sync_queue(hdev, set_secure_conn_sync, cmd, 6473 set_secure_conn_complete); 6474 6475 if (err < 0) { 6476 mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, 6477 MGMT_STATUS_FAILED); 6478 if (cmd) 6479 mgmt_pending_free(cmd); 6480 } 6481 6482 failed: 6483 hci_dev_unlock(hdev); 6484 return err; 6485 } 6486 6487 static int set_debug_keys(struct sock *sk, struct hci_dev *hdev, 6488 void *data, u16 len) 6489 { 6490 struct mgmt_mode *cp = data; 6491 bool changed, use_changed; 6492 int err; 6493 6494 bt_dev_dbg(hdev, "sock %p", sk); 6495 6496 if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) 6497 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS, 6498 MGMT_STATUS_INVALID_PARAMS); 6499 6500 hci_dev_lock(hdev); 6501 6502 if (cp->val) 6503 changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS); 6504 else 6505 changed = hci_dev_test_and_clear_flag(hdev, 6506 HCI_KEEP_DEBUG_KEYS); 6507 6508 if (cp->val == 0x02) 6509 use_changed = !hci_dev_test_and_set_flag(hdev, 6510 HCI_USE_DEBUG_KEYS); 6511 else 6512 use_changed = hci_dev_test_and_clear_flag(hdev, 6513 HCI_USE_DEBUG_KEYS); 6514 6515 if (hdev_is_powered(hdev) && use_changed && 6516 hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { 6517 u8 mode = (cp->val == 0x02) ? 0x01 : 0x00; 6518 hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE, 6519 sizeof(mode), &mode); 6520 } 6521 6522 err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev); 6523 if (err < 0) 6524 goto unlock; 6525 6526 if (changed) 6527 err = new_settings(hdev, sk); 6528 6529 unlock: 6530 hci_dev_unlock(hdev); 6531 return err; 6532 } 6533 6534 static int set_privacy(struct sock *sk, struct hci_dev *hdev, void *cp_data, 6535 u16 len) 6536 { 6537 struct mgmt_cp_set_privacy *cp = cp_data; 6538 bool changed; 6539 int err; 6540 6541 bt_dev_dbg(hdev, "sock %p", sk); 6542 6543 if (!lmp_le_capable(hdev)) 6544 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, 6545 MGMT_STATUS_NOT_SUPPORTED); 6546 6547 if (cp->privacy != 0x00 && cp->privacy != 0x01 && cp->privacy != 0x02) 6548 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, 6549 MGMT_STATUS_INVALID_PARAMS); 6550 6551 if (hdev_is_powered(hdev)) 6552 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, 6553 MGMT_STATUS_REJECTED); 6554 6555 hci_dev_lock(hdev); 6556 6557 /* If user space supports this command it is also expected to 6558 * handle IRKs. Therefore, set the HCI_RPA_RESOLVING flag. 6559 */ 6560 hci_dev_set_flag(hdev, HCI_RPA_RESOLVING); 6561 6562 if (cp->privacy) { 6563 changed = !hci_dev_test_and_set_flag(hdev, HCI_PRIVACY); 6564 memcpy(hdev->irk, cp->irk, sizeof(hdev->irk)); 6565 hci_dev_set_flag(hdev, HCI_RPA_EXPIRED); 6566 hci_adv_instances_set_rpa_expired(hdev, true); 6567 if (cp->privacy == 0x02) 6568 hci_dev_set_flag(hdev, HCI_LIMITED_PRIVACY); 6569 else 6570 hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY); 6571 } else { 6572 changed = hci_dev_test_and_clear_flag(hdev, HCI_PRIVACY); 6573 memset(hdev->irk, 0, sizeof(hdev->irk)); 6574 hci_dev_clear_flag(hdev, HCI_RPA_EXPIRED); 6575 hci_adv_instances_set_rpa_expired(hdev, false); 6576 hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY); 6577 } 6578 6579 err = send_settings_rsp(sk, MGMT_OP_SET_PRIVACY, hdev); 6580 if (err < 0) 6581 goto unlock; 6582 6583 if (changed) 6584 err = new_settings(hdev, sk); 6585 6586 unlock: 6587 hci_dev_unlock(hdev); 6588 return err; 6589 } 6590 6591 static bool irk_is_valid(struct mgmt_irk_info *irk) 6592 { 6593 switch (irk->addr.type) { 6594 case BDADDR_LE_PUBLIC: 6595 return true; 6596 6597 case BDADDR_LE_RANDOM: 6598 /* Two most significant bits shall be set */ 6599 if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0) 6600 return false; 6601 return true; 6602 } 6603 6604 return false; 6605 } 6606 6607 static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data, 6608 u16 len) 6609 { 6610 struct mgmt_cp_load_irks *cp = cp_data; 6611 const u16 max_irk_count = ((U16_MAX - sizeof(*cp)) / 6612 sizeof(struct mgmt_irk_info)); 6613 u16 irk_count, expected_len; 6614 int i, err; 6615 6616 bt_dev_dbg(hdev, "sock %p", sk); 6617 6618 if (!lmp_le_capable(hdev)) 6619 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, 6620 MGMT_STATUS_NOT_SUPPORTED); 6621 6622 irk_count = __le16_to_cpu(cp->irk_count); 6623 if (irk_count > max_irk_count) { 6624 bt_dev_err(hdev, "load_irks: too big irk_count value %u", 6625 irk_count); 6626 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, 6627 MGMT_STATUS_INVALID_PARAMS); 6628 } 6629 6630 expected_len = struct_size(cp, irks, irk_count); 6631 if (expected_len != len) { 6632 bt_dev_err(hdev, "load_irks: expected %u bytes, got %u bytes", 6633 expected_len, len); 6634 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, 6635 MGMT_STATUS_INVALID_PARAMS); 6636 } 6637 6638 bt_dev_dbg(hdev, "irk_count %u", irk_count); 6639 6640 for (i = 0; i < irk_count; i++) { 6641 struct mgmt_irk_info *key = &cp->irks[i]; 6642 6643 if (!irk_is_valid(key)) 6644 return mgmt_cmd_status(sk, hdev->id, 6645 MGMT_OP_LOAD_IRKS, 6646 MGMT_STATUS_INVALID_PARAMS); 6647 } 6648 6649 hci_dev_lock(hdev); 6650 6651 hci_smp_irks_clear(hdev); 6652 6653 for (i = 0; i < irk_count; i++) { 6654 struct mgmt_irk_info *irk = &cp->irks[i]; 6655 6656 if (hci_is_blocked_key(hdev, 6657 HCI_BLOCKED_KEY_TYPE_IRK, 6658 irk->val)) { 6659 bt_dev_warn(hdev, "Skipping blocked IRK for %pMR", 6660 &irk->addr.bdaddr); 6661 continue; 6662 } 6663 6664 hci_add_irk(hdev, &irk->addr.bdaddr, 6665 le_addr_type(irk->addr.type), irk->val, 6666 BDADDR_ANY); 6667 } 6668 6669 hci_dev_set_flag(hdev, HCI_RPA_RESOLVING); 6670 6671 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0); 6672 6673 hci_dev_unlock(hdev); 6674 6675 return err; 6676 } 6677 6678 static bool ltk_is_valid(struct mgmt_ltk_info *key) 6679 { 6680 if (key->initiator != 0x00 && key->initiator != 0x01) 6681 return false; 6682 6683 switch (key->addr.type) { 6684 case BDADDR_LE_PUBLIC: 6685 return true; 6686 6687 case BDADDR_LE_RANDOM: 6688 /* Two most significant bits shall be set */ 6689 if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0) 6690 return false; 6691 return true; 6692 } 6693 6694 return false; 6695 } 6696 6697 static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev, 6698 void *cp_data, u16 len) 6699 { 6700 struct mgmt_cp_load_long_term_keys *cp = cp_data; 6701 const u16 max_key_count = ((U16_MAX - sizeof(*cp)) / 6702 sizeof(struct mgmt_ltk_info)); 6703 u16 key_count, expected_len; 6704 int i, err; 6705 6706 bt_dev_dbg(hdev, "sock %p", sk); 6707 6708 if (!lmp_le_capable(hdev)) 6709 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 6710 MGMT_STATUS_NOT_SUPPORTED); 6711 6712 key_count = __le16_to_cpu(cp->key_count); 6713 if (key_count > max_key_count) { 6714 bt_dev_err(hdev, "load_ltks: too big key_count value %u", 6715 key_count); 6716 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 6717 MGMT_STATUS_INVALID_PARAMS); 6718 } 6719 6720 expected_len = struct_size(cp, keys, key_count); 6721 if (expected_len != len) { 6722 bt_dev_err(hdev, "load_keys: expected %u bytes, got %u bytes", 6723 expected_len, len); 6724 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 6725 MGMT_STATUS_INVALID_PARAMS); 6726 } 6727 6728 bt_dev_dbg(hdev, "key_count %u", key_count); 6729 6730 for (i = 0; i < key_count; i++) { 6731 struct mgmt_ltk_info *key = &cp->keys[i]; 6732 6733 if (!ltk_is_valid(key)) 6734 return mgmt_cmd_status(sk, hdev->id, 6735 MGMT_OP_LOAD_LONG_TERM_KEYS, 6736 MGMT_STATUS_INVALID_PARAMS); 6737 } 6738 6739 hci_dev_lock(hdev); 6740 6741 hci_smp_ltks_clear(hdev); 6742 6743 for (i = 0; i < key_count; i++) { 6744 struct mgmt_ltk_info *key = &cp->keys[i]; 6745 u8 type, authenticated; 6746 6747 if (hci_is_blocked_key(hdev, 6748 HCI_BLOCKED_KEY_TYPE_LTK, 6749 key->val)) { 6750 bt_dev_warn(hdev, "Skipping blocked LTK for %pMR", 6751 &key->addr.bdaddr); 6752 continue; 6753 } 6754 6755 switch (key->type) { 6756 case MGMT_LTK_UNAUTHENTICATED: 6757 authenticated = 0x00; 6758 type = key->initiator ? SMP_LTK : SMP_LTK_RESPONDER; 6759 break; 6760 case MGMT_LTK_AUTHENTICATED: 6761 authenticated = 0x01; 6762 type = key->initiator ? SMP_LTK : SMP_LTK_RESPONDER; 6763 break; 6764 case MGMT_LTK_P256_UNAUTH: 6765 authenticated = 0x00; 6766 type = SMP_LTK_P256; 6767 break; 6768 case MGMT_LTK_P256_AUTH: 6769 authenticated = 0x01; 6770 type = SMP_LTK_P256; 6771 break; 6772 case MGMT_LTK_P256_DEBUG: 6773 authenticated = 0x00; 6774 type = SMP_LTK_P256_DEBUG; 6775 fallthrough; 6776 default: 6777 continue; 6778 } 6779 6780 hci_add_ltk(hdev, &key->addr.bdaddr, 6781 le_addr_type(key->addr.type), type, authenticated, 6782 key->val, key->enc_size, key->ediv, key->rand); 6783 } 6784 6785 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0, 6786 NULL, 0); 6787 6788 hci_dev_unlock(hdev); 6789 6790 return err; 6791 } 6792 6793 static void get_conn_info_complete(struct hci_dev *hdev, void *data, int err) 6794 { 6795 struct mgmt_pending_cmd *cmd = data; 6796 struct hci_conn *conn = cmd->user_data; 6797 struct mgmt_cp_get_conn_info *cp = cmd->param; 6798 struct mgmt_rp_get_conn_info rp; 6799 u8 status; 6800 6801 bt_dev_dbg(hdev, "err %d", err); 6802 6803 memcpy(&rp.addr, &cp->addr.bdaddr, sizeof(rp.addr)); 6804 6805 status = mgmt_status(err); 6806 if (status == MGMT_STATUS_SUCCESS) { 6807 rp.rssi = conn->rssi; 6808 rp.tx_power = conn->tx_power; 6809 rp.max_tx_power = conn->max_tx_power; 6810 } else { 6811 rp.rssi = HCI_RSSI_INVALID; 6812 rp.tx_power = HCI_TX_POWER_INVALID; 6813 rp.max_tx_power = HCI_TX_POWER_INVALID; 6814 } 6815 6816 mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_GET_CONN_INFO, status, 6817 &rp, sizeof(rp)); 6818 6819 mgmt_pending_free(cmd); 6820 } 6821 6822 static int get_conn_info_sync(struct hci_dev *hdev, void *data) 6823 { 6824 struct mgmt_pending_cmd *cmd = data; 6825 struct mgmt_cp_get_conn_info *cp = cmd->param; 6826 struct hci_conn *conn; 6827 int err; 6828 __le16 handle; 6829 6830 /* Make sure we are still connected */ 6831 if (cp->addr.type == BDADDR_BREDR) 6832 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 6833 &cp->addr.bdaddr); 6834 else 6835 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr); 6836 6837 if (!conn || conn->state != BT_CONNECTED) 6838 return MGMT_STATUS_NOT_CONNECTED; 6839 6840 cmd->user_data = conn; 6841 handle = cpu_to_le16(conn->handle); 6842 6843 /* Refresh RSSI each time */ 6844 err = hci_read_rssi_sync(hdev, handle); 6845 6846 /* For LE links TX power does not change thus we don't need to 6847 * query for it once value is known. 6848 */ 6849 if (!err && (!bdaddr_type_is_le(cp->addr.type) || 6850 conn->tx_power == HCI_TX_POWER_INVALID)) 6851 err = hci_read_tx_power_sync(hdev, handle, 0x00); 6852 6853 /* Max TX power needs to be read only once per connection */ 6854 if (!err && conn->max_tx_power == HCI_TX_POWER_INVALID) 6855 err = hci_read_tx_power_sync(hdev, handle, 0x01); 6856 6857 return err; 6858 } 6859 6860 static int get_conn_info(struct sock *sk, struct hci_dev *hdev, void *data, 6861 u16 len) 6862 { 6863 struct mgmt_cp_get_conn_info *cp = data; 6864 struct mgmt_rp_get_conn_info rp; 6865 struct hci_conn *conn; 6866 unsigned long conn_info_age; 6867 int err = 0; 6868 6869 bt_dev_dbg(hdev, "sock %p", sk); 6870 6871 memset(&rp, 0, sizeof(rp)); 6872 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 6873 rp.addr.type = cp->addr.type; 6874 6875 if (!bdaddr_type_is_valid(cp->addr.type)) 6876 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, 6877 MGMT_STATUS_INVALID_PARAMS, 6878 &rp, sizeof(rp)); 6879 6880 hci_dev_lock(hdev); 6881 6882 if (!hdev_is_powered(hdev)) { 6883 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, 6884 MGMT_STATUS_NOT_POWERED, &rp, 6885 sizeof(rp)); 6886 goto unlock; 6887 } 6888 6889 if (cp->addr.type == BDADDR_BREDR) 6890 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 6891 &cp->addr.bdaddr); 6892 else 6893 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr); 6894 6895 if (!conn || conn->state != BT_CONNECTED) { 6896 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, 6897 MGMT_STATUS_NOT_CONNECTED, &rp, 6898 sizeof(rp)); 6899 goto unlock; 6900 } 6901 6902 /* To avoid client trying to guess when to poll again for information we 6903 * calculate conn info age as random value between min/max set in hdev. 6904 */ 6905 conn_info_age = hdev->conn_info_min_age + 6906 prandom_u32_max(hdev->conn_info_max_age - 6907 hdev->conn_info_min_age); 6908 6909 /* Query controller to refresh cached values if they are too old or were 6910 * never read. 6911 */ 6912 if (time_after(jiffies, conn->conn_info_timestamp + 6913 msecs_to_jiffies(conn_info_age)) || 6914 !conn->conn_info_timestamp) { 6915 struct mgmt_pending_cmd *cmd; 6916 6917 cmd = mgmt_pending_new(sk, MGMT_OP_GET_CONN_INFO, hdev, data, 6918 len); 6919 if (!cmd) { 6920 err = -ENOMEM; 6921 } else { 6922 err = hci_cmd_sync_queue(hdev, get_conn_info_sync, 6923 cmd, get_conn_info_complete); 6924 } 6925 6926 if (err < 0) { 6927 mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, 6928 MGMT_STATUS_FAILED, &rp, sizeof(rp)); 6929 6930 if (cmd) 6931 mgmt_pending_free(cmd); 6932 6933 goto unlock; 6934 } 6935 6936 conn->conn_info_timestamp = jiffies; 6937 } else { 6938 /* Cache is valid, just reply with values cached in hci_conn */ 6939 rp.rssi = conn->rssi; 6940 rp.tx_power = conn->tx_power; 6941 rp.max_tx_power = conn->max_tx_power; 6942 6943 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, 6944 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 6945 } 6946 6947 unlock: 6948 hci_dev_unlock(hdev); 6949 return err; 6950 } 6951 6952 static void get_clock_info_complete(struct hci_dev *hdev, void *data, int err) 6953 { 6954 struct mgmt_pending_cmd *cmd = data; 6955 struct mgmt_cp_get_clock_info *cp = cmd->param; 6956 struct mgmt_rp_get_clock_info rp; 6957 struct hci_conn *conn = cmd->user_data; 6958 u8 status = mgmt_status(err); 6959 6960 bt_dev_dbg(hdev, "err %d", err); 6961 6962 memset(&rp, 0, sizeof(rp)); 6963 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 6964 rp.addr.type = cp->addr.type; 6965 6966 if (err) 6967 goto complete; 6968 6969 rp.local_clock = cpu_to_le32(hdev->clock); 6970 6971 if (conn) { 6972 rp.piconet_clock = cpu_to_le32(conn->clock); 6973 rp.accuracy = cpu_to_le16(conn->clock_accuracy); 6974 } 6975 6976 complete: 6977 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, &rp, 6978 sizeof(rp)); 6979 6980 mgmt_pending_free(cmd); 6981 } 6982 6983 static int get_clock_info_sync(struct hci_dev *hdev, void *data) 6984 { 6985 struct mgmt_pending_cmd *cmd = data; 6986 struct mgmt_cp_get_clock_info *cp = cmd->param; 6987 struct hci_cp_read_clock hci_cp; 6988 struct hci_conn *conn; 6989 6990 memset(&hci_cp, 0, sizeof(hci_cp)); 6991 hci_read_clock_sync(hdev, &hci_cp); 6992 6993 /* Make sure connection still exists */ 6994 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr); 6995 if (!conn || conn->state != BT_CONNECTED) 6996 return MGMT_STATUS_NOT_CONNECTED; 6997 6998 cmd->user_data = conn; 6999 hci_cp.handle = cpu_to_le16(conn->handle); 7000 hci_cp.which = 0x01; /* Piconet clock */ 7001 7002 return hci_read_clock_sync(hdev, &hci_cp); 7003 } 7004 7005 static int get_clock_info(struct sock *sk, struct hci_dev *hdev, void *data, 7006 u16 len) 7007 { 7008 struct mgmt_cp_get_clock_info *cp = data; 7009 struct mgmt_rp_get_clock_info rp; 7010 struct mgmt_pending_cmd *cmd; 7011 struct hci_conn *conn; 7012 int err; 7013 7014 bt_dev_dbg(hdev, "sock %p", sk); 7015 7016 memset(&rp, 0, sizeof(rp)); 7017 bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); 7018 rp.addr.type = cp->addr.type; 7019 7020 if (cp->addr.type != BDADDR_BREDR) 7021 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO, 7022 MGMT_STATUS_INVALID_PARAMS, 7023 &rp, sizeof(rp)); 7024 7025 hci_dev_lock(hdev); 7026 7027 if (!hdev_is_powered(hdev)) { 7028 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO, 7029 MGMT_STATUS_NOT_POWERED, &rp, 7030 sizeof(rp)); 7031 goto unlock; 7032 } 7033 7034 if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { 7035 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, 7036 &cp->addr.bdaddr); 7037 if (!conn || conn->state != BT_CONNECTED) { 7038 err = mgmt_cmd_complete(sk, hdev->id, 7039 MGMT_OP_GET_CLOCK_INFO, 7040 MGMT_STATUS_NOT_CONNECTED, 7041 &rp, sizeof(rp)); 7042 goto unlock; 7043 } 7044 } else { 7045 conn = NULL; 7046 } 7047 7048 cmd = mgmt_pending_new(sk, MGMT_OP_GET_CLOCK_INFO, hdev, data, len); 7049 if (!cmd) 7050 err = -ENOMEM; 7051 else 7052 err = hci_cmd_sync_queue(hdev, get_clock_info_sync, cmd, 7053 get_clock_info_complete); 7054 7055 if (err < 0) { 7056 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO, 7057 MGMT_STATUS_FAILED, &rp, sizeof(rp)); 7058 7059 if (cmd) 7060 mgmt_pending_free(cmd); 7061 } 7062 7063 7064 unlock: 7065 hci_dev_unlock(hdev); 7066 return err; 7067 } 7068 7069 static bool is_connected(struct hci_dev *hdev, bdaddr_t *addr, u8 type) 7070 { 7071 struct hci_conn *conn; 7072 7073 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, addr); 7074 if (!conn) 7075 return false; 7076 7077 if (conn->dst_type != type) 7078 return false; 7079 7080 if (conn->state != BT_CONNECTED) 7081 return false; 7082 7083 return true; 7084 } 7085 7086 /* This function requires the caller holds hdev->lock */ 7087 static int hci_conn_params_set(struct hci_dev *hdev, bdaddr_t *addr, 7088 u8 addr_type, u8 auto_connect) 7089 { 7090 struct hci_conn_params *params; 7091 7092 params = hci_conn_params_add(hdev, addr, addr_type); 7093 if (!params) 7094 return -EIO; 7095 7096 if (params->auto_connect == auto_connect) 7097 return 0; 7098 7099 list_del_init(¶ms->action); 7100 7101 switch (auto_connect) { 7102 case HCI_AUTO_CONN_DISABLED: 7103 case HCI_AUTO_CONN_LINK_LOSS: 7104 /* If auto connect is being disabled when we're trying to 7105 * connect to device, keep connecting. 7106 */ 7107 if (params->explicit_connect) 7108 list_add(¶ms->action, &hdev->pend_le_conns); 7109 break; 7110 case HCI_AUTO_CONN_REPORT: 7111 if (params->explicit_connect) 7112 list_add(¶ms->action, &hdev->pend_le_conns); 7113 else 7114 list_add(¶ms->action, &hdev->pend_le_reports); 7115 break; 7116 case HCI_AUTO_CONN_DIRECT: 7117 case HCI_AUTO_CONN_ALWAYS: 7118 if (!is_connected(hdev, addr, addr_type)) 7119 list_add(¶ms->action, &hdev->pend_le_conns); 7120 break; 7121 } 7122 7123 params->auto_connect = auto_connect; 7124 7125 bt_dev_dbg(hdev, "addr %pMR (type %u) auto_connect %u", 7126 addr, addr_type, auto_connect); 7127 7128 return 0; 7129 } 7130 7131 static void device_added(struct sock *sk, struct hci_dev *hdev, 7132 bdaddr_t *bdaddr, u8 type, u8 action) 7133 { 7134 struct mgmt_ev_device_added ev; 7135 7136 bacpy(&ev.addr.bdaddr, bdaddr); 7137 ev.addr.type = type; 7138 ev.action = action; 7139 7140 mgmt_event(MGMT_EV_DEVICE_ADDED, hdev, &ev, sizeof(ev), sk); 7141 } 7142 7143 static int add_device_sync(struct hci_dev *hdev, void *data) 7144 { 7145 return hci_update_passive_scan_sync(hdev); 7146 } 7147 7148 static int add_device(struct sock *sk, struct hci_dev *hdev, 7149 void *data, u16 len) 7150 { 7151 struct mgmt_cp_add_device *cp = data; 7152 u8 auto_conn, addr_type; 7153 struct hci_conn_params *params; 7154 int err; 7155 u32 current_flags = 0; 7156 u32 supported_flags; 7157 7158 bt_dev_dbg(hdev, "sock %p", sk); 7159 7160 if (!bdaddr_type_is_valid(cp->addr.type) || 7161 !bacmp(&cp->addr.bdaddr, BDADDR_ANY)) 7162 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, 7163 MGMT_STATUS_INVALID_PARAMS, 7164 &cp->addr, sizeof(cp->addr)); 7165 7166 if (cp->action != 0x00 && cp->action != 0x01 && cp->action != 0x02) 7167 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, 7168 MGMT_STATUS_INVALID_PARAMS, 7169 &cp->addr, sizeof(cp->addr)); 7170 7171 hci_dev_lock(hdev); 7172 7173 if (cp->addr.type == BDADDR_BREDR) { 7174 /* Only incoming connections action is supported for now */ 7175 if (cp->action != 0x01) { 7176 err = mgmt_cmd_complete(sk, hdev->id, 7177 MGMT_OP_ADD_DEVICE, 7178 MGMT_STATUS_INVALID_PARAMS, 7179 &cp->addr, sizeof(cp->addr)); 7180 goto unlock; 7181 } 7182 7183 err = hci_bdaddr_list_add_with_flags(&hdev->accept_list, 7184 &cp->addr.bdaddr, 7185 cp->addr.type, 0); 7186 if (err) 7187 goto unlock; 7188 7189 hci_update_scan(hdev); 7190 7191 goto added; 7192 } 7193 7194 addr_type = le_addr_type(cp->addr.type); 7195 7196 if (cp->action == 0x02) 7197 auto_conn = HCI_AUTO_CONN_ALWAYS; 7198 else if (cp->action == 0x01) 7199 auto_conn = HCI_AUTO_CONN_DIRECT; 7200 else 7201 auto_conn = HCI_AUTO_CONN_REPORT; 7202 7203 /* Kernel internally uses conn_params with resolvable private 7204 * address, but Add Device allows only identity addresses. 7205 * Make sure it is enforced before calling 7206 * hci_conn_params_lookup. 7207 */ 7208 if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) { 7209 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, 7210 MGMT_STATUS_INVALID_PARAMS, 7211 &cp->addr, sizeof(cp->addr)); 7212 goto unlock; 7213 } 7214 7215 /* If the connection parameters don't exist for this device, 7216 * they will be created and configured with defaults. 7217 */ 7218 if (hci_conn_params_set(hdev, &cp->addr.bdaddr, addr_type, 7219 auto_conn) < 0) { 7220 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, 7221 MGMT_STATUS_FAILED, &cp->addr, 7222 sizeof(cp->addr)); 7223 goto unlock; 7224 } else { 7225 params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, 7226 addr_type); 7227 if (params) 7228 current_flags = params->flags; 7229 } 7230 7231 err = hci_cmd_sync_queue(hdev, add_device_sync, NULL, NULL); 7232 if (err < 0) 7233 goto unlock; 7234 7235 added: 7236 device_added(sk, hdev, &cp->addr.bdaddr, cp->addr.type, cp->action); 7237 supported_flags = hdev->conn_flags; 7238 device_flags_changed(NULL, hdev, &cp->addr.bdaddr, cp->addr.type, 7239 supported_flags, current_flags); 7240 7241 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, 7242 MGMT_STATUS_SUCCESS, &cp->addr, 7243 sizeof(cp->addr)); 7244 7245 unlock: 7246 hci_dev_unlock(hdev); 7247 return err; 7248 } 7249 7250 static void device_removed(struct sock *sk, struct hci_dev *hdev, 7251 bdaddr_t *bdaddr, u8 type) 7252 { 7253 struct mgmt_ev_device_removed ev; 7254 7255 bacpy(&ev.addr.bdaddr, bdaddr); 7256 ev.addr.type = type; 7257 7258 mgmt_event(MGMT_EV_DEVICE_REMOVED, hdev, &ev, sizeof(ev), sk); 7259 } 7260 7261 static int remove_device_sync(struct hci_dev *hdev, void *data) 7262 { 7263 return hci_update_passive_scan_sync(hdev); 7264 } 7265 7266 static int remove_device(struct sock *sk, struct hci_dev *hdev, 7267 void *data, u16 len) 7268 { 7269 struct mgmt_cp_remove_device *cp = data; 7270 int err; 7271 7272 bt_dev_dbg(hdev, "sock %p", sk); 7273 7274 hci_dev_lock(hdev); 7275 7276 if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { 7277 struct hci_conn_params *params; 7278 u8 addr_type; 7279 7280 if (!bdaddr_type_is_valid(cp->addr.type)) { 7281 err = mgmt_cmd_complete(sk, hdev->id, 7282 MGMT_OP_REMOVE_DEVICE, 7283 MGMT_STATUS_INVALID_PARAMS, 7284 &cp->addr, sizeof(cp->addr)); 7285 goto unlock; 7286 } 7287 7288 if (cp->addr.type == BDADDR_BREDR) { 7289 err = hci_bdaddr_list_del(&hdev->accept_list, 7290 &cp->addr.bdaddr, 7291 cp->addr.type); 7292 if (err) { 7293 err = mgmt_cmd_complete(sk, hdev->id, 7294 MGMT_OP_REMOVE_DEVICE, 7295 MGMT_STATUS_INVALID_PARAMS, 7296 &cp->addr, 7297 sizeof(cp->addr)); 7298 goto unlock; 7299 } 7300 7301 hci_update_scan(hdev); 7302 7303 device_removed(sk, hdev, &cp->addr.bdaddr, 7304 cp->addr.type); 7305 goto complete; 7306 } 7307 7308 addr_type = le_addr_type(cp->addr.type); 7309 7310 /* Kernel internally uses conn_params with resolvable private 7311 * address, but Remove Device allows only identity addresses. 7312 * Make sure it is enforced before calling 7313 * hci_conn_params_lookup. 7314 */ 7315 if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) { 7316 err = mgmt_cmd_complete(sk, hdev->id, 7317 MGMT_OP_REMOVE_DEVICE, 7318 MGMT_STATUS_INVALID_PARAMS, 7319 &cp->addr, sizeof(cp->addr)); 7320 goto unlock; 7321 } 7322 7323 params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, 7324 addr_type); 7325 if (!params) { 7326 err = mgmt_cmd_complete(sk, hdev->id, 7327 MGMT_OP_REMOVE_DEVICE, 7328 MGMT_STATUS_INVALID_PARAMS, 7329 &cp->addr, sizeof(cp->addr)); 7330 goto unlock; 7331 } 7332 7333 if (params->auto_connect == HCI_AUTO_CONN_DISABLED || 7334 params->auto_connect == HCI_AUTO_CONN_EXPLICIT) { 7335 err = mgmt_cmd_complete(sk, hdev->id, 7336 MGMT_OP_REMOVE_DEVICE, 7337 MGMT_STATUS_INVALID_PARAMS, 7338 &cp->addr, sizeof(cp->addr)); 7339 goto unlock; 7340 } 7341 7342 list_del(¶ms->action); 7343 list_del(¶ms->list); 7344 kfree(params); 7345 7346 device_removed(sk, hdev, &cp->addr.bdaddr, cp->addr.type); 7347 } else { 7348 struct hci_conn_params *p, *tmp; 7349 struct bdaddr_list *b, *btmp; 7350 7351 if (cp->addr.type) { 7352 err = mgmt_cmd_complete(sk, hdev->id, 7353 MGMT_OP_REMOVE_DEVICE, 7354 MGMT_STATUS_INVALID_PARAMS, 7355 &cp->addr, sizeof(cp->addr)); 7356 goto unlock; 7357 } 7358 7359 list_for_each_entry_safe(b, btmp, &hdev->accept_list, list) { 7360 device_removed(sk, hdev, &b->bdaddr, b->bdaddr_type); 7361 list_del(&b->list); 7362 kfree(b); 7363 } 7364 7365 hci_update_scan(hdev); 7366 7367 list_for_each_entry_safe(p, tmp, &hdev->le_conn_params, list) { 7368 if (p->auto_connect == HCI_AUTO_CONN_DISABLED) 7369 continue; 7370 device_removed(sk, hdev, &p->addr, p->addr_type); 7371 if (p->explicit_connect) { 7372 p->auto_connect = HCI_AUTO_CONN_EXPLICIT; 7373 continue; 7374 } 7375 list_del(&p->action); 7376 list_del(&p->list); 7377 kfree(p); 7378 } 7379 7380 bt_dev_dbg(hdev, "All LE connection parameters were removed"); 7381 } 7382 7383 hci_cmd_sync_queue(hdev, remove_device_sync, NULL, NULL); 7384 7385 complete: 7386 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_DEVICE, 7387 MGMT_STATUS_SUCCESS, &cp->addr, 7388 sizeof(cp->addr)); 7389 unlock: 7390 hci_dev_unlock(hdev); 7391 return err; 7392 } 7393 7394 static int load_conn_param(struct sock *sk, struct hci_dev *hdev, void *data, 7395 u16 len) 7396 { 7397 struct mgmt_cp_load_conn_param *cp = data; 7398 const u16 max_param_count = ((U16_MAX - sizeof(*cp)) / 7399 sizeof(struct mgmt_conn_param)); 7400 u16 param_count, expected_len; 7401 int i; 7402 7403 if (!lmp_le_capable(hdev)) 7404 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 7405 MGMT_STATUS_NOT_SUPPORTED); 7406 7407 param_count = __le16_to_cpu(cp->param_count); 7408 if (param_count > max_param_count) { 7409 bt_dev_err(hdev, "load_conn_param: too big param_count value %u", 7410 param_count); 7411 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 7412 MGMT_STATUS_INVALID_PARAMS); 7413 } 7414 7415 expected_len = struct_size(cp, params, param_count); 7416 if (expected_len != len) { 7417 bt_dev_err(hdev, "load_conn_param: expected %u bytes, got %u bytes", 7418 expected_len, len); 7419 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 7420 MGMT_STATUS_INVALID_PARAMS); 7421 } 7422 7423 bt_dev_dbg(hdev, "param_count %u", param_count); 7424 7425 hci_dev_lock(hdev); 7426 7427 hci_conn_params_clear_disabled(hdev); 7428 7429 for (i = 0; i < param_count; i++) { 7430 struct mgmt_conn_param *param = &cp->params[i]; 7431 struct hci_conn_params *hci_param; 7432 u16 min, max, latency, timeout; 7433 u8 addr_type; 7434 7435 bt_dev_dbg(hdev, "Adding %pMR (type %u)", ¶m->addr.bdaddr, 7436 param->addr.type); 7437 7438 if (param->addr.type == BDADDR_LE_PUBLIC) { 7439 addr_type = ADDR_LE_DEV_PUBLIC; 7440 } else if (param->addr.type == BDADDR_LE_RANDOM) { 7441 addr_type = ADDR_LE_DEV_RANDOM; 7442 } else { 7443 bt_dev_err(hdev, "ignoring invalid connection parameters"); 7444 continue; 7445 } 7446 7447 min = le16_to_cpu(param->min_interval); 7448 max = le16_to_cpu(param->max_interval); 7449 latency = le16_to_cpu(param->latency); 7450 timeout = le16_to_cpu(param->timeout); 7451 7452 bt_dev_dbg(hdev, "min 0x%04x max 0x%04x latency 0x%04x timeout 0x%04x", 7453 min, max, latency, timeout); 7454 7455 if (hci_check_conn_params(min, max, latency, timeout) < 0) { 7456 bt_dev_err(hdev, "ignoring invalid connection parameters"); 7457 continue; 7458 } 7459 7460 hci_param = hci_conn_params_add(hdev, ¶m->addr.bdaddr, 7461 addr_type); 7462 if (!hci_param) { 7463 bt_dev_err(hdev, "failed to add connection parameters"); 7464 continue; 7465 } 7466 7467 hci_param->conn_min_interval = min; 7468 hci_param->conn_max_interval = max; 7469 hci_param->conn_latency = latency; 7470 hci_param->supervision_timeout = timeout; 7471 } 7472 7473 hci_dev_unlock(hdev); 7474 7475 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 0, 7476 NULL, 0); 7477 } 7478 7479 static int set_external_config(struct sock *sk, struct hci_dev *hdev, 7480 void *data, u16 len) 7481 { 7482 struct mgmt_cp_set_external_config *cp = data; 7483 bool changed; 7484 int err; 7485 7486 bt_dev_dbg(hdev, "sock %p", sk); 7487 7488 if (hdev_is_powered(hdev)) 7489 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, 7490 MGMT_STATUS_REJECTED); 7491 7492 if (cp->config != 0x00 && cp->config != 0x01) 7493 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, 7494 MGMT_STATUS_INVALID_PARAMS); 7495 7496 if (!test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks)) 7497 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, 7498 MGMT_STATUS_NOT_SUPPORTED); 7499 7500 hci_dev_lock(hdev); 7501 7502 if (cp->config) 7503 changed = !hci_dev_test_and_set_flag(hdev, HCI_EXT_CONFIGURED); 7504 else 7505 changed = hci_dev_test_and_clear_flag(hdev, HCI_EXT_CONFIGURED); 7506 7507 err = send_options_rsp(sk, MGMT_OP_SET_EXTERNAL_CONFIG, hdev); 7508 if (err < 0) 7509 goto unlock; 7510 7511 if (!changed) 7512 goto unlock; 7513 7514 err = new_options(hdev, sk); 7515 7516 if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED) == is_configured(hdev)) { 7517 mgmt_index_removed(hdev); 7518 7519 if (hci_dev_test_and_change_flag(hdev, HCI_UNCONFIGURED)) { 7520 hci_dev_set_flag(hdev, HCI_CONFIG); 7521 hci_dev_set_flag(hdev, HCI_AUTO_OFF); 7522 7523 queue_work(hdev->req_workqueue, &hdev->power_on); 7524 } else { 7525 set_bit(HCI_RAW, &hdev->flags); 7526 mgmt_index_added(hdev); 7527 } 7528 } 7529 7530 unlock: 7531 hci_dev_unlock(hdev); 7532 return err; 7533 } 7534 7535 static int set_public_address(struct sock *sk, struct hci_dev *hdev, 7536 void *data, u16 len) 7537 { 7538 struct mgmt_cp_set_public_address *cp = data; 7539 bool changed; 7540 int err; 7541 7542 bt_dev_dbg(hdev, "sock %p", sk); 7543 7544 if (hdev_is_powered(hdev)) 7545 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, 7546 MGMT_STATUS_REJECTED); 7547 7548 if (!bacmp(&cp->bdaddr, BDADDR_ANY)) 7549 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, 7550 MGMT_STATUS_INVALID_PARAMS); 7551 7552 if (!hdev->set_bdaddr) 7553 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, 7554 MGMT_STATUS_NOT_SUPPORTED); 7555 7556 hci_dev_lock(hdev); 7557 7558 changed = !!bacmp(&hdev->public_addr, &cp->bdaddr); 7559 bacpy(&hdev->public_addr, &cp->bdaddr); 7560 7561 err = send_options_rsp(sk, MGMT_OP_SET_PUBLIC_ADDRESS, hdev); 7562 if (err < 0) 7563 goto unlock; 7564 7565 if (!changed) 7566 goto unlock; 7567 7568 if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) 7569 err = new_options(hdev, sk); 7570 7571 if (is_configured(hdev)) { 7572 mgmt_index_removed(hdev); 7573 7574 hci_dev_clear_flag(hdev, HCI_UNCONFIGURED); 7575 7576 hci_dev_set_flag(hdev, HCI_CONFIG); 7577 hci_dev_set_flag(hdev, HCI_AUTO_OFF); 7578 7579 queue_work(hdev->req_workqueue, &hdev->power_on); 7580 } 7581 7582 unlock: 7583 hci_dev_unlock(hdev); 7584 return err; 7585 } 7586 7587 static void read_local_oob_ext_data_complete(struct hci_dev *hdev, void *data, 7588 int err) 7589 { 7590 const struct mgmt_cp_read_local_oob_ext_data *mgmt_cp; 7591 struct mgmt_rp_read_local_oob_ext_data *mgmt_rp; 7592 u8 *h192, *r192, *h256, *r256; 7593 struct mgmt_pending_cmd *cmd = data; 7594 struct sk_buff *skb = cmd->skb; 7595 u8 status = mgmt_status(err); 7596 u16 eir_len; 7597 7598 if (cmd != pending_find(MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev)) 7599 return; 7600 7601 if (!status) { 7602 if (!skb) 7603 status = MGMT_STATUS_FAILED; 7604 else if (IS_ERR(skb)) 7605 status = mgmt_status(PTR_ERR(skb)); 7606 else 7607 status = mgmt_status(skb->data[0]); 7608 } 7609 7610 bt_dev_dbg(hdev, "status %u", status); 7611 7612 mgmt_cp = cmd->param; 7613 7614 if (status) { 7615 status = mgmt_status(status); 7616 eir_len = 0; 7617 7618 h192 = NULL; 7619 r192 = NULL; 7620 h256 = NULL; 7621 r256 = NULL; 7622 } else if (!bredr_sc_enabled(hdev)) { 7623 struct hci_rp_read_local_oob_data *rp; 7624 7625 if (skb->len != sizeof(*rp)) { 7626 status = MGMT_STATUS_FAILED; 7627 eir_len = 0; 7628 } else { 7629 status = MGMT_STATUS_SUCCESS; 7630 rp = (void *)skb->data; 7631 7632 eir_len = 5 + 18 + 18; 7633 h192 = rp->hash; 7634 r192 = rp->rand; 7635 h256 = NULL; 7636 r256 = NULL; 7637 } 7638 } else { 7639 struct hci_rp_read_local_oob_ext_data *rp; 7640 7641 if (skb->len != sizeof(*rp)) { 7642 status = MGMT_STATUS_FAILED; 7643 eir_len = 0; 7644 } else { 7645 status = MGMT_STATUS_SUCCESS; 7646 rp = (void *)skb->data; 7647 7648 if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) { 7649 eir_len = 5 + 18 + 18; 7650 h192 = NULL; 7651 r192 = NULL; 7652 } else { 7653 eir_len = 5 + 18 + 18 + 18 + 18; 7654 h192 = rp->hash192; 7655 r192 = rp->rand192; 7656 } 7657 7658 h256 = rp->hash256; 7659 r256 = rp->rand256; 7660 } 7661 } 7662 7663 mgmt_rp = kmalloc(sizeof(*mgmt_rp) + eir_len, GFP_KERNEL); 7664 if (!mgmt_rp) 7665 goto done; 7666 7667 if (eir_len == 0) 7668 goto send_rsp; 7669 7670 eir_len = eir_append_data(mgmt_rp->eir, 0, EIR_CLASS_OF_DEV, 7671 hdev->dev_class, 3); 7672 7673 if (h192 && r192) { 7674 eir_len = eir_append_data(mgmt_rp->eir, eir_len, 7675 EIR_SSP_HASH_C192, h192, 16); 7676 eir_len = eir_append_data(mgmt_rp->eir, eir_len, 7677 EIR_SSP_RAND_R192, r192, 16); 7678 } 7679 7680 if (h256 && r256) { 7681 eir_len = eir_append_data(mgmt_rp->eir, eir_len, 7682 EIR_SSP_HASH_C256, h256, 16); 7683 eir_len = eir_append_data(mgmt_rp->eir, eir_len, 7684 EIR_SSP_RAND_R256, r256, 16); 7685 } 7686 7687 send_rsp: 7688 mgmt_rp->type = mgmt_cp->type; 7689 mgmt_rp->eir_len = cpu_to_le16(eir_len); 7690 7691 err = mgmt_cmd_complete(cmd->sk, hdev->id, 7692 MGMT_OP_READ_LOCAL_OOB_EXT_DATA, status, 7693 mgmt_rp, sizeof(*mgmt_rp) + eir_len); 7694 if (err < 0 || status) 7695 goto done; 7696 7697 hci_sock_set_flag(cmd->sk, HCI_MGMT_OOB_DATA_EVENTS); 7698 7699 err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev, 7700 mgmt_rp, sizeof(*mgmt_rp) + eir_len, 7701 HCI_MGMT_OOB_DATA_EVENTS, cmd->sk); 7702 done: 7703 if (skb && !IS_ERR(skb)) 7704 kfree_skb(skb); 7705 7706 kfree(mgmt_rp); 7707 mgmt_pending_remove(cmd); 7708 } 7709 7710 static int read_local_ssp_oob_req(struct hci_dev *hdev, struct sock *sk, 7711 struct mgmt_cp_read_local_oob_ext_data *cp) 7712 { 7713 struct mgmt_pending_cmd *cmd; 7714 int err; 7715 7716 cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev, 7717 cp, sizeof(*cp)); 7718 if (!cmd) 7719 return -ENOMEM; 7720 7721 err = hci_cmd_sync_queue(hdev, read_local_oob_data_sync, cmd, 7722 read_local_oob_ext_data_complete); 7723 7724 if (err < 0) { 7725 mgmt_pending_remove(cmd); 7726 return err; 7727 } 7728 7729 return 0; 7730 } 7731 7732 static int read_local_oob_ext_data(struct sock *sk, struct hci_dev *hdev, 7733 void *data, u16 data_len) 7734 { 7735 struct mgmt_cp_read_local_oob_ext_data *cp = data; 7736 struct mgmt_rp_read_local_oob_ext_data *rp; 7737 size_t rp_len; 7738 u16 eir_len; 7739 u8 status, flags, role, addr[7], hash[16], rand[16]; 7740 int err; 7741 7742 bt_dev_dbg(hdev, "sock %p", sk); 7743 7744 if (hdev_is_powered(hdev)) { 7745 switch (cp->type) { 7746 case BIT(BDADDR_BREDR): 7747 status = mgmt_bredr_support(hdev); 7748 if (status) 7749 eir_len = 0; 7750 else 7751 eir_len = 5; 7752 break; 7753 case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)): 7754 status = mgmt_le_support(hdev); 7755 if (status) 7756 eir_len = 0; 7757 else 7758 eir_len = 9 + 3 + 18 + 18 + 3; 7759 break; 7760 default: 7761 status = MGMT_STATUS_INVALID_PARAMS; 7762 eir_len = 0; 7763 break; 7764 } 7765 } else { 7766 status = MGMT_STATUS_NOT_POWERED; 7767 eir_len = 0; 7768 } 7769 7770 rp_len = sizeof(*rp) + eir_len; 7771 rp = kmalloc(rp_len, GFP_ATOMIC); 7772 if (!rp) 7773 return -ENOMEM; 7774 7775 if (!status && !lmp_ssp_capable(hdev)) { 7776 status = MGMT_STATUS_NOT_SUPPORTED; 7777 eir_len = 0; 7778 } 7779 7780 if (status) 7781 goto complete; 7782 7783 hci_dev_lock(hdev); 7784 7785 eir_len = 0; 7786 switch (cp->type) { 7787 case BIT(BDADDR_BREDR): 7788 if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { 7789 err = read_local_ssp_oob_req(hdev, sk, cp); 7790 hci_dev_unlock(hdev); 7791 if (!err) 7792 goto done; 7793 7794 status = MGMT_STATUS_FAILED; 7795 goto complete; 7796 } else { 7797 eir_len = eir_append_data(rp->eir, eir_len, 7798 EIR_CLASS_OF_DEV, 7799 hdev->dev_class, 3); 7800 } 7801 break; 7802 case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)): 7803 if (hci_dev_test_flag(hdev, HCI_SC_ENABLED) && 7804 smp_generate_oob(hdev, hash, rand) < 0) { 7805 hci_dev_unlock(hdev); 7806 status = MGMT_STATUS_FAILED; 7807 goto complete; 7808 } 7809 7810 /* This should return the active RPA, but since the RPA 7811 * is only programmed on demand, it is really hard to fill 7812 * this in at the moment. For now disallow retrieving 7813 * local out-of-band data when privacy is in use. 7814 * 7815 * Returning the identity address will not help here since 7816 * pairing happens before the identity resolving key is 7817 * known and thus the connection establishment happens 7818 * based on the RPA and not the identity address. 7819 */ 7820 if (hci_dev_test_flag(hdev, HCI_PRIVACY)) { 7821 hci_dev_unlock(hdev); 7822 status = MGMT_STATUS_REJECTED; 7823 goto complete; 7824 } 7825 7826 if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) || 7827 !bacmp(&hdev->bdaddr, BDADDR_ANY) || 7828 (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && 7829 bacmp(&hdev->static_addr, BDADDR_ANY))) { 7830 memcpy(addr, &hdev->static_addr, 6); 7831 addr[6] = 0x01; 7832 } else { 7833 memcpy(addr, &hdev->bdaddr, 6); 7834 addr[6] = 0x00; 7835 } 7836 7837 eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_BDADDR, 7838 addr, sizeof(addr)); 7839 7840 if (hci_dev_test_flag(hdev, HCI_ADVERTISING)) 7841 role = 0x02; 7842 else 7843 role = 0x01; 7844 7845 eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_ROLE, 7846 &role, sizeof(role)); 7847 7848 if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) { 7849 eir_len = eir_append_data(rp->eir, eir_len, 7850 EIR_LE_SC_CONFIRM, 7851 hash, sizeof(hash)); 7852 7853 eir_len = eir_append_data(rp->eir, eir_len, 7854 EIR_LE_SC_RANDOM, 7855 rand, sizeof(rand)); 7856 } 7857 7858 flags = mgmt_get_adv_discov_flags(hdev); 7859 7860 if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) 7861 flags |= LE_AD_NO_BREDR; 7862 7863 eir_len = eir_append_data(rp->eir, eir_len, EIR_FLAGS, 7864 &flags, sizeof(flags)); 7865 break; 7866 } 7867 7868 hci_dev_unlock(hdev); 7869 7870 hci_sock_set_flag(sk, HCI_MGMT_OOB_DATA_EVENTS); 7871 7872 status = MGMT_STATUS_SUCCESS; 7873 7874 complete: 7875 rp->type = cp->type; 7876 rp->eir_len = cpu_to_le16(eir_len); 7877 7878 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, 7879 status, rp, sizeof(*rp) + eir_len); 7880 if (err < 0 || status) 7881 goto done; 7882 7883 err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev, 7884 rp, sizeof(*rp) + eir_len, 7885 HCI_MGMT_OOB_DATA_EVENTS, sk); 7886 7887 done: 7888 kfree(rp); 7889 7890 return err; 7891 } 7892 7893 static u32 get_supported_adv_flags(struct hci_dev *hdev) 7894 { 7895 u32 flags = 0; 7896 7897 flags |= MGMT_ADV_FLAG_CONNECTABLE; 7898 flags |= MGMT_ADV_FLAG_DISCOV; 7899 flags |= MGMT_ADV_FLAG_LIMITED_DISCOV; 7900 flags |= MGMT_ADV_FLAG_MANAGED_FLAGS; 7901 flags |= MGMT_ADV_FLAG_APPEARANCE; 7902 flags |= MGMT_ADV_FLAG_LOCAL_NAME; 7903 flags |= MGMT_ADV_PARAM_DURATION; 7904 flags |= MGMT_ADV_PARAM_TIMEOUT; 7905 flags |= MGMT_ADV_PARAM_INTERVALS; 7906 flags |= MGMT_ADV_PARAM_TX_POWER; 7907 flags |= MGMT_ADV_PARAM_SCAN_RSP; 7908 7909 /* In extended adv TX_POWER returned from Set Adv Param 7910 * will be always valid. 7911 */ 7912 if ((hdev->adv_tx_power != HCI_TX_POWER_INVALID) || 7913 ext_adv_capable(hdev)) 7914 flags |= MGMT_ADV_FLAG_TX_POWER; 7915 7916 if (ext_adv_capable(hdev)) { 7917 flags |= MGMT_ADV_FLAG_SEC_1M; 7918 flags |= MGMT_ADV_FLAG_HW_OFFLOAD; 7919 flags |= MGMT_ADV_FLAG_CAN_SET_TX_POWER; 7920 7921 if (hdev->le_features[1] & HCI_LE_PHY_2M) 7922 flags |= MGMT_ADV_FLAG_SEC_2M; 7923 7924 if (hdev->le_features[1] & HCI_LE_PHY_CODED) 7925 flags |= MGMT_ADV_FLAG_SEC_CODED; 7926 } 7927 7928 return flags; 7929 } 7930 7931 static int read_adv_features(struct sock *sk, struct hci_dev *hdev, 7932 void *data, u16 data_len) 7933 { 7934 struct mgmt_rp_read_adv_features *rp; 7935 size_t rp_len; 7936 int err; 7937 struct adv_info *adv_instance; 7938 u32 supported_flags; 7939 u8 *instance; 7940 7941 bt_dev_dbg(hdev, "sock %p", sk); 7942 7943 if (!lmp_le_capable(hdev)) 7944 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES, 7945 MGMT_STATUS_REJECTED); 7946 7947 hci_dev_lock(hdev); 7948 7949 rp_len = sizeof(*rp) + hdev->adv_instance_cnt; 7950 rp = kmalloc(rp_len, GFP_ATOMIC); 7951 if (!rp) { 7952 hci_dev_unlock(hdev); 7953 return -ENOMEM; 7954 } 7955 7956 supported_flags = get_supported_adv_flags(hdev); 7957 7958 rp->supported_flags = cpu_to_le32(supported_flags); 7959 rp->max_adv_data_len = HCI_MAX_AD_LENGTH; 7960 rp->max_scan_rsp_len = HCI_MAX_AD_LENGTH; 7961 rp->max_instances = hdev->le_num_of_adv_sets; 7962 rp->num_instances = hdev->adv_instance_cnt; 7963 7964 instance = rp->instance; 7965 list_for_each_entry(adv_instance, &hdev->adv_instances, list) { 7966 *instance = adv_instance->instance; 7967 instance++; 7968 } 7969 7970 hci_dev_unlock(hdev); 7971 7972 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES, 7973 MGMT_STATUS_SUCCESS, rp, rp_len); 7974 7975 kfree(rp); 7976 7977 return err; 7978 } 7979 7980 static u8 calculate_name_len(struct hci_dev *hdev) 7981 { 7982 u8 buf[HCI_MAX_SHORT_NAME_LENGTH + 3]; 7983 7984 return eir_append_local_name(hdev, buf, 0); 7985 } 7986 7987 static u8 tlv_data_max_len(struct hci_dev *hdev, u32 adv_flags, 7988 bool is_adv_data) 7989 { 7990 u8 max_len = HCI_MAX_AD_LENGTH; 7991 7992 if (is_adv_data) { 7993 if (adv_flags & (MGMT_ADV_FLAG_DISCOV | 7994 MGMT_ADV_FLAG_LIMITED_DISCOV | 7995 MGMT_ADV_FLAG_MANAGED_FLAGS)) 7996 max_len -= 3; 7997 7998 if (adv_flags & MGMT_ADV_FLAG_TX_POWER) 7999 max_len -= 3; 8000 } else { 8001 if (adv_flags & MGMT_ADV_FLAG_LOCAL_NAME) 8002 max_len -= calculate_name_len(hdev); 8003 8004 if (adv_flags & (MGMT_ADV_FLAG_APPEARANCE)) 8005 max_len -= 4; 8006 } 8007 8008 return max_len; 8009 } 8010 8011 static bool flags_managed(u32 adv_flags) 8012 { 8013 return adv_flags & (MGMT_ADV_FLAG_DISCOV | 8014 MGMT_ADV_FLAG_LIMITED_DISCOV | 8015 MGMT_ADV_FLAG_MANAGED_FLAGS); 8016 } 8017 8018 static bool tx_power_managed(u32 adv_flags) 8019 { 8020 return adv_flags & MGMT_ADV_FLAG_TX_POWER; 8021 } 8022 8023 static bool name_managed(u32 adv_flags) 8024 { 8025 return adv_flags & MGMT_ADV_FLAG_LOCAL_NAME; 8026 } 8027 8028 static bool appearance_managed(u32 adv_flags) 8029 { 8030 return adv_flags & MGMT_ADV_FLAG_APPEARANCE; 8031 } 8032 8033 static bool tlv_data_is_valid(struct hci_dev *hdev, u32 adv_flags, u8 *data, 8034 u8 len, bool is_adv_data) 8035 { 8036 int i, cur_len; 8037 u8 max_len; 8038 8039 max_len = tlv_data_max_len(hdev, adv_flags, is_adv_data); 8040 8041 if (len > max_len) 8042 return false; 8043 8044 /* Make sure that the data is correctly formatted. */ 8045 for (i = 0; i < len; i += (cur_len + 1)) { 8046 cur_len = data[i]; 8047 8048 if (!cur_len) 8049 continue; 8050 8051 if (data[i + 1] == EIR_FLAGS && 8052 (!is_adv_data || flags_managed(adv_flags))) 8053 return false; 8054 8055 if (data[i + 1] == EIR_TX_POWER && tx_power_managed(adv_flags)) 8056 return false; 8057 8058 if (data[i + 1] == EIR_NAME_COMPLETE && name_managed(adv_flags)) 8059 return false; 8060 8061 if (data[i + 1] == EIR_NAME_SHORT && name_managed(adv_flags)) 8062 return false; 8063 8064 if (data[i + 1] == EIR_APPEARANCE && 8065 appearance_managed(adv_flags)) 8066 return false; 8067 8068 /* If the current field length would exceed the total data 8069 * length, then it's invalid. 8070 */ 8071 if (i + cur_len >= len) 8072 return false; 8073 } 8074 8075 return true; 8076 } 8077 8078 static bool requested_adv_flags_are_valid(struct hci_dev *hdev, u32 adv_flags) 8079 { 8080 u32 supported_flags, phy_flags; 8081 8082 /* The current implementation only supports a subset of the specified 8083 * flags. Also need to check mutual exclusiveness of sec flags. 8084 */ 8085 supported_flags = get_supported_adv_flags(hdev); 8086 phy_flags = adv_flags & MGMT_ADV_FLAG_SEC_MASK; 8087 if (adv_flags & ~supported_flags || 8088 ((phy_flags && (phy_flags ^ (phy_flags & -phy_flags))))) 8089 return false; 8090 8091 return true; 8092 } 8093 8094 static bool adv_busy(struct hci_dev *hdev) 8095 { 8096 return pending_find(MGMT_OP_SET_LE, hdev); 8097 } 8098 8099 static void add_adv_complete(struct hci_dev *hdev, struct sock *sk, u8 instance, 8100 int err) 8101 { 8102 struct adv_info *adv, *n; 8103 8104 bt_dev_dbg(hdev, "err %d", err); 8105 8106 hci_dev_lock(hdev); 8107 8108 list_for_each_entry_safe(adv, n, &hdev->adv_instances, list) { 8109 u8 instance; 8110 8111 if (!adv->pending) 8112 continue; 8113 8114 if (!err) { 8115 adv->pending = false; 8116 continue; 8117 } 8118 8119 instance = adv->instance; 8120 8121 if (hdev->cur_adv_instance == instance) 8122 cancel_adv_timeout(hdev); 8123 8124 hci_remove_adv_instance(hdev, instance); 8125 mgmt_advertising_removed(sk, hdev, instance); 8126 } 8127 8128 hci_dev_unlock(hdev); 8129 } 8130 8131 static void add_advertising_complete(struct hci_dev *hdev, void *data, int err) 8132 { 8133 struct mgmt_pending_cmd *cmd = data; 8134 struct mgmt_cp_add_advertising *cp = cmd->param; 8135 struct mgmt_rp_add_advertising rp; 8136 8137 memset(&rp, 0, sizeof(rp)); 8138 8139 rp.instance = cp->instance; 8140 8141 if (err) 8142 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, 8143 mgmt_status(err)); 8144 else 8145 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 8146 mgmt_status(err), &rp, sizeof(rp)); 8147 8148 add_adv_complete(hdev, cmd->sk, cp->instance, err); 8149 8150 mgmt_pending_free(cmd); 8151 } 8152 8153 static int add_advertising_sync(struct hci_dev *hdev, void *data) 8154 { 8155 struct mgmt_pending_cmd *cmd = data; 8156 struct mgmt_cp_add_advertising *cp = cmd->param; 8157 8158 return hci_schedule_adv_instance_sync(hdev, cp->instance, true); 8159 } 8160 8161 static int add_advertising(struct sock *sk, struct hci_dev *hdev, 8162 void *data, u16 data_len) 8163 { 8164 struct mgmt_cp_add_advertising *cp = data; 8165 struct mgmt_rp_add_advertising rp; 8166 u32 flags; 8167 u8 status; 8168 u16 timeout, duration; 8169 unsigned int prev_instance_cnt; 8170 u8 schedule_instance = 0; 8171 struct adv_info *adv, *next_instance; 8172 int err; 8173 struct mgmt_pending_cmd *cmd; 8174 8175 bt_dev_dbg(hdev, "sock %p", sk); 8176 8177 status = mgmt_le_support(hdev); 8178 if (status) 8179 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8180 status); 8181 8182 if (cp->instance < 1 || cp->instance > hdev->le_num_of_adv_sets) 8183 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8184 MGMT_STATUS_INVALID_PARAMS); 8185 8186 if (data_len != sizeof(*cp) + cp->adv_data_len + cp->scan_rsp_len) 8187 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8188 MGMT_STATUS_INVALID_PARAMS); 8189 8190 flags = __le32_to_cpu(cp->flags); 8191 timeout = __le16_to_cpu(cp->timeout); 8192 duration = __le16_to_cpu(cp->duration); 8193 8194 if (!requested_adv_flags_are_valid(hdev, flags)) 8195 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8196 MGMT_STATUS_INVALID_PARAMS); 8197 8198 hci_dev_lock(hdev); 8199 8200 if (timeout && !hdev_is_powered(hdev)) { 8201 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8202 MGMT_STATUS_REJECTED); 8203 goto unlock; 8204 } 8205 8206 if (adv_busy(hdev)) { 8207 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8208 MGMT_STATUS_BUSY); 8209 goto unlock; 8210 } 8211 8212 if (!tlv_data_is_valid(hdev, flags, cp->data, cp->adv_data_len, true) || 8213 !tlv_data_is_valid(hdev, flags, cp->data + cp->adv_data_len, 8214 cp->scan_rsp_len, false)) { 8215 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8216 MGMT_STATUS_INVALID_PARAMS); 8217 goto unlock; 8218 } 8219 8220 prev_instance_cnt = hdev->adv_instance_cnt; 8221 8222 adv = hci_add_adv_instance(hdev, cp->instance, flags, 8223 cp->adv_data_len, cp->data, 8224 cp->scan_rsp_len, 8225 cp->data + cp->adv_data_len, 8226 timeout, duration, 8227 HCI_ADV_TX_POWER_NO_PREFERENCE, 8228 hdev->le_adv_min_interval, 8229 hdev->le_adv_max_interval); 8230 if (IS_ERR(adv)) { 8231 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8232 MGMT_STATUS_FAILED); 8233 goto unlock; 8234 } 8235 8236 /* Only trigger an advertising added event if a new instance was 8237 * actually added. 8238 */ 8239 if (hdev->adv_instance_cnt > prev_instance_cnt) 8240 mgmt_advertising_added(sk, hdev, cp->instance); 8241 8242 if (hdev->cur_adv_instance == cp->instance) { 8243 /* If the currently advertised instance is being changed then 8244 * cancel the current advertising and schedule the next 8245 * instance. If there is only one instance then the overridden 8246 * advertising data will be visible right away. 8247 */ 8248 cancel_adv_timeout(hdev); 8249 8250 next_instance = hci_get_next_instance(hdev, cp->instance); 8251 if (next_instance) 8252 schedule_instance = next_instance->instance; 8253 } else if (!hdev->adv_instance_timeout) { 8254 /* Immediately advertise the new instance if no other 8255 * instance is currently being advertised. 8256 */ 8257 schedule_instance = cp->instance; 8258 } 8259 8260 /* If the HCI_ADVERTISING flag is set or the device isn't powered or 8261 * there is no instance to be advertised then we have no HCI 8262 * communication to make. Simply return. 8263 */ 8264 if (!hdev_is_powered(hdev) || 8265 hci_dev_test_flag(hdev, HCI_ADVERTISING) || 8266 !schedule_instance) { 8267 rp.instance = cp->instance; 8268 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8269 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 8270 goto unlock; 8271 } 8272 8273 /* We're good to go, update advertising data, parameters, and start 8274 * advertising. 8275 */ 8276 cmd = mgmt_pending_new(sk, MGMT_OP_ADD_ADVERTISING, hdev, data, 8277 data_len); 8278 if (!cmd) { 8279 err = -ENOMEM; 8280 goto unlock; 8281 } 8282 8283 cp->instance = schedule_instance; 8284 8285 err = hci_cmd_sync_queue(hdev, add_advertising_sync, cmd, 8286 add_advertising_complete); 8287 if (err < 0) 8288 mgmt_pending_free(cmd); 8289 8290 unlock: 8291 hci_dev_unlock(hdev); 8292 8293 return err; 8294 } 8295 8296 static void add_ext_adv_params_complete(struct hci_dev *hdev, void *data, 8297 int err) 8298 { 8299 struct mgmt_pending_cmd *cmd = data; 8300 struct mgmt_cp_add_ext_adv_params *cp = cmd->param; 8301 struct mgmt_rp_add_ext_adv_params rp; 8302 struct adv_info *adv; 8303 u32 flags; 8304 8305 BT_DBG("%s", hdev->name); 8306 8307 hci_dev_lock(hdev); 8308 8309 adv = hci_find_adv_instance(hdev, cp->instance); 8310 if (!adv) 8311 goto unlock; 8312 8313 rp.instance = cp->instance; 8314 rp.tx_power = adv->tx_power; 8315 8316 /* While we're at it, inform userspace of the available space for this 8317 * advertisement, given the flags that will be used. 8318 */ 8319 flags = __le32_to_cpu(cp->flags); 8320 rp.max_adv_data_len = tlv_data_max_len(hdev, flags, true); 8321 rp.max_scan_rsp_len = tlv_data_max_len(hdev, flags, false); 8322 8323 if (err) { 8324 /* If this advertisement was previously advertising and we 8325 * failed to update it, we signal that it has been removed and 8326 * delete its structure 8327 */ 8328 if (!adv->pending) 8329 mgmt_advertising_removed(cmd->sk, hdev, cp->instance); 8330 8331 hci_remove_adv_instance(hdev, cp->instance); 8332 8333 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, 8334 mgmt_status(err)); 8335 } else { 8336 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 8337 mgmt_status(err), &rp, sizeof(rp)); 8338 } 8339 8340 unlock: 8341 if (cmd) 8342 mgmt_pending_free(cmd); 8343 8344 hci_dev_unlock(hdev); 8345 } 8346 8347 static int add_ext_adv_params_sync(struct hci_dev *hdev, void *data) 8348 { 8349 struct mgmt_pending_cmd *cmd = data; 8350 struct mgmt_cp_add_ext_adv_params *cp = cmd->param; 8351 8352 return hci_setup_ext_adv_instance_sync(hdev, cp->instance); 8353 } 8354 8355 static int add_ext_adv_params(struct sock *sk, struct hci_dev *hdev, 8356 void *data, u16 data_len) 8357 { 8358 struct mgmt_cp_add_ext_adv_params *cp = data; 8359 struct mgmt_rp_add_ext_adv_params rp; 8360 struct mgmt_pending_cmd *cmd = NULL; 8361 struct adv_info *adv; 8362 u32 flags, min_interval, max_interval; 8363 u16 timeout, duration; 8364 u8 status; 8365 s8 tx_power; 8366 int err; 8367 8368 BT_DBG("%s", hdev->name); 8369 8370 status = mgmt_le_support(hdev); 8371 if (status) 8372 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8373 status); 8374 8375 if (cp->instance < 1 || cp->instance > hdev->le_num_of_adv_sets) 8376 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8377 MGMT_STATUS_INVALID_PARAMS); 8378 8379 /* The purpose of breaking add_advertising into two separate MGMT calls 8380 * for params and data is to allow more parameters to be added to this 8381 * structure in the future. For this reason, we verify that we have the 8382 * bare minimum structure we know of when the interface was defined. Any 8383 * extra parameters we don't know about will be ignored in this request. 8384 */ 8385 if (data_len < MGMT_ADD_EXT_ADV_PARAMS_MIN_SIZE) 8386 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, 8387 MGMT_STATUS_INVALID_PARAMS); 8388 8389 flags = __le32_to_cpu(cp->flags); 8390 8391 if (!requested_adv_flags_are_valid(hdev, flags)) 8392 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8393 MGMT_STATUS_INVALID_PARAMS); 8394 8395 hci_dev_lock(hdev); 8396 8397 /* In new interface, we require that we are powered to register */ 8398 if (!hdev_is_powered(hdev)) { 8399 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8400 MGMT_STATUS_REJECTED); 8401 goto unlock; 8402 } 8403 8404 if (adv_busy(hdev)) { 8405 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8406 MGMT_STATUS_BUSY); 8407 goto unlock; 8408 } 8409 8410 /* Parse defined parameters from request, use defaults otherwise */ 8411 timeout = (flags & MGMT_ADV_PARAM_TIMEOUT) ? 8412 __le16_to_cpu(cp->timeout) : 0; 8413 8414 duration = (flags & MGMT_ADV_PARAM_DURATION) ? 8415 __le16_to_cpu(cp->duration) : 8416 hdev->def_multi_adv_rotation_duration; 8417 8418 min_interval = (flags & MGMT_ADV_PARAM_INTERVALS) ? 8419 __le32_to_cpu(cp->min_interval) : 8420 hdev->le_adv_min_interval; 8421 8422 max_interval = (flags & MGMT_ADV_PARAM_INTERVALS) ? 8423 __le32_to_cpu(cp->max_interval) : 8424 hdev->le_adv_max_interval; 8425 8426 tx_power = (flags & MGMT_ADV_PARAM_TX_POWER) ? 8427 cp->tx_power : 8428 HCI_ADV_TX_POWER_NO_PREFERENCE; 8429 8430 /* Create advertising instance with no advertising or response data */ 8431 adv = hci_add_adv_instance(hdev, cp->instance, flags, 0, NULL, 0, NULL, 8432 timeout, duration, tx_power, min_interval, 8433 max_interval); 8434 8435 if (IS_ERR(adv)) { 8436 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_PARAMS, 8437 MGMT_STATUS_FAILED); 8438 goto unlock; 8439 } 8440 8441 /* Submit request for advertising params if ext adv available */ 8442 if (ext_adv_capable(hdev)) { 8443 cmd = mgmt_pending_new(sk, MGMT_OP_ADD_EXT_ADV_PARAMS, hdev, 8444 data, data_len); 8445 if (!cmd) { 8446 err = -ENOMEM; 8447 hci_remove_adv_instance(hdev, cp->instance); 8448 goto unlock; 8449 } 8450 8451 err = hci_cmd_sync_queue(hdev, add_ext_adv_params_sync, cmd, 8452 add_ext_adv_params_complete); 8453 if (err < 0) 8454 mgmt_pending_free(cmd); 8455 } else { 8456 rp.instance = cp->instance; 8457 rp.tx_power = HCI_ADV_TX_POWER_NO_PREFERENCE; 8458 rp.max_adv_data_len = tlv_data_max_len(hdev, flags, true); 8459 rp.max_scan_rsp_len = tlv_data_max_len(hdev, flags, false); 8460 err = mgmt_cmd_complete(sk, hdev->id, 8461 MGMT_OP_ADD_EXT_ADV_PARAMS, 8462 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 8463 } 8464 8465 unlock: 8466 hci_dev_unlock(hdev); 8467 8468 return err; 8469 } 8470 8471 static void add_ext_adv_data_complete(struct hci_dev *hdev, void *data, int err) 8472 { 8473 struct mgmt_pending_cmd *cmd = data; 8474 struct mgmt_cp_add_ext_adv_data *cp = cmd->param; 8475 struct mgmt_rp_add_advertising rp; 8476 8477 add_adv_complete(hdev, cmd->sk, cp->instance, err); 8478 8479 memset(&rp, 0, sizeof(rp)); 8480 8481 rp.instance = cp->instance; 8482 8483 if (err) 8484 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, 8485 mgmt_status(err)); 8486 else 8487 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 8488 mgmt_status(err), &rp, sizeof(rp)); 8489 8490 mgmt_pending_free(cmd); 8491 } 8492 8493 static int add_ext_adv_data_sync(struct hci_dev *hdev, void *data) 8494 { 8495 struct mgmt_pending_cmd *cmd = data; 8496 struct mgmt_cp_add_ext_adv_data *cp = cmd->param; 8497 int err; 8498 8499 if (ext_adv_capable(hdev)) { 8500 err = hci_update_adv_data_sync(hdev, cp->instance); 8501 if (err) 8502 return err; 8503 8504 err = hci_update_scan_rsp_data_sync(hdev, cp->instance); 8505 if (err) 8506 return err; 8507 8508 return hci_enable_ext_advertising_sync(hdev, cp->instance); 8509 } 8510 8511 return hci_schedule_adv_instance_sync(hdev, cp->instance, true); 8512 } 8513 8514 static int add_ext_adv_data(struct sock *sk, struct hci_dev *hdev, void *data, 8515 u16 data_len) 8516 { 8517 struct mgmt_cp_add_ext_adv_data *cp = data; 8518 struct mgmt_rp_add_ext_adv_data rp; 8519 u8 schedule_instance = 0; 8520 struct adv_info *next_instance; 8521 struct adv_info *adv_instance; 8522 int err = 0; 8523 struct mgmt_pending_cmd *cmd; 8524 8525 BT_DBG("%s", hdev->name); 8526 8527 hci_dev_lock(hdev); 8528 8529 adv_instance = hci_find_adv_instance(hdev, cp->instance); 8530 8531 if (!adv_instance) { 8532 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_DATA, 8533 MGMT_STATUS_INVALID_PARAMS); 8534 goto unlock; 8535 } 8536 8537 /* In new interface, we require that we are powered to register */ 8538 if (!hdev_is_powered(hdev)) { 8539 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_DATA, 8540 MGMT_STATUS_REJECTED); 8541 goto clear_new_instance; 8542 } 8543 8544 if (adv_busy(hdev)) { 8545 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_DATA, 8546 MGMT_STATUS_BUSY); 8547 goto clear_new_instance; 8548 } 8549 8550 /* Validate new data */ 8551 if (!tlv_data_is_valid(hdev, adv_instance->flags, cp->data, 8552 cp->adv_data_len, true) || 8553 !tlv_data_is_valid(hdev, adv_instance->flags, cp->data + 8554 cp->adv_data_len, cp->scan_rsp_len, false)) { 8555 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_DATA, 8556 MGMT_STATUS_INVALID_PARAMS); 8557 goto clear_new_instance; 8558 } 8559 8560 /* Set the data in the advertising instance */ 8561 hci_set_adv_instance_data(hdev, cp->instance, cp->adv_data_len, 8562 cp->data, cp->scan_rsp_len, 8563 cp->data + cp->adv_data_len); 8564 8565 /* If using software rotation, determine next instance to use */ 8566 if (hdev->cur_adv_instance == cp->instance) { 8567 /* If the currently advertised instance is being changed 8568 * then cancel the current advertising and schedule the 8569 * next instance. If there is only one instance then the 8570 * overridden advertising data will be visible right 8571 * away 8572 */ 8573 cancel_adv_timeout(hdev); 8574 8575 next_instance = hci_get_next_instance(hdev, cp->instance); 8576 if (next_instance) 8577 schedule_instance = next_instance->instance; 8578 } else if (!hdev->adv_instance_timeout) { 8579 /* Immediately advertise the new instance if no other 8580 * instance is currently being advertised. 8581 */ 8582 schedule_instance = cp->instance; 8583 } 8584 8585 /* If the HCI_ADVERTISING flag is set or there is no instance to 8586 * be advertised then we have no HCI communication to make. 8587 * Simply return. 8588 */ 8589 if (hci_dev_test_flag(hdev, HCI_ADVERTISING) || !schedule_instance) { 8590 if (adv_instance->pending) { 8591 mgmt_advertising_added(sk, hdev, cp->instance); 8592 adv_instance->pending = false; 8593 } 8594 rp.instance = cp->instance; 8595 err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_EXT_ADV_DATA, 8596 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 8597 goto unlock; 8598 } 8599 8600 cmd = mgmt_pending_new(sk, MGMT_OP_ADD_EXT_ADV_DATA, hdev, data, 8601 data_len); 8602 if (!cmd) { 8603 err = -ENOMEM; 8604 goto clear_new_instance; 8605 } 8606 8607 err = hci_cmd_sync_queue(hdev, add_ext_adv_data_sync, cmd, 8608 add_ext_adv_data_complete); 8609 if (err < 0) { 8610 mgmt_pending_free(cmd); 8611 goto clear_new_instance; 8612 } 8613 8614 /* We were successful in updating data, so trigger advertising_added 8615 * event if this is an instance that wasn't previously advertising. If 8616 * a failure occurs in the requests we initiated, we will remove the 8617 * instance again in add_advertising_complete 8618 */ 8619 if (adv_instance->pending) 8620 mgmt_advertising_added(sk, hdev, cp->instance); 8621 8622 goto unlock; 8623 8624 clear_new_instance: 8625 hci_remove_adv_instance(hdev, cp->instance); 8626 8627 unlock: 8628 hci_dev_unlock(hdev); 8629 8630 return err; 8631 } 8632 8633 static void remove_advertising_complete(struct hci_dev *hdev, void *data, 8634 int err) 8635 { 8636 struct mgmt_pending_cmd *cmd = data; 8637 struct mgmt_cp_remove_advertising *cp = cmd->param; 8638 struct mgmt_rp_remove_advertising rp; 8639 8640 bt_dev_dbg(hdev, "err %d", err); 8641 8642 memset(&rp, 0, sizeof(rp)); 8643 rp.instance = cp->instance; 8644 8645 if (err) 8646 mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, 8647 mgmt_status(err)); 8648 else 8649 mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, 8650 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 8651 8652 mgmt_pending_free(cmd); 8653 } 8654 8655 static int remove_advertising_sync(struct hci_dev *hdev, void *data) 8656 { 8657 struct mgmt_pending_cmd *cmd = data; 8658 struct mgmt_cp_remove_advertising *cp = cmd->param; 8659 int err; 8660 8661 err = hci_remove_advertising_sync(hdev, cmd->sk, cp->instance, true); 8662 if (err) 8663 return err; 8664 8665 if (list_empty(&hdev->adv_instances)) 8666 err = hci_disable_advertising_sync(hdev); 8667 8668 return err; 8669 } 8670 8671 static int remove_advertising(struct sock *sk, struct hci_dev *hdev, 8672 void *data, u16 data_len) 8673 { 8674 struct mgmt_cp_remove_advertising *cp = data; 8675 struct mgmt_pending_cmd *cmd; 8676 int err; 8677 8678 bt_dev_dbg(hdev, "sock %p", sk); 8679 8680 hci_dev_lock(hdev); 8681 8682 if (cp->instance && !hci_find_adv_instance(hdev, cp->instance)) { 8683 err = mgmt_cmd_status(sk, hdev->id, 8684 MGMT_OP_REMOVE_ADVERTISING, 8685 MGMT_STATUS_INVALID_PARAMS); 8686 goto unlock; 8687 } 8688 8689 if (pending_find(MGMT_OP_SET_LE, hdev)) { 8690 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING, 8691 MGMT_STATUS_BUSY); 8692 goto unlock; 8693 } 8694 8695 if (list_empty(&hdev->adv_instances)) { 8696 err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING, 8697 MGMT_STATUS_INVALID_PARAMS); 8698 goto unlock; 8699 } 8700 8701 cmd = mgmt_pending_new(sk, MGMT_OP_REMOVE_ADVERTISING, hdev, data, 8702 data_len); 8703 if (!cmd) { 8704 err = -ENOMEM; 8705 goto unlock; 8706 } 8707 8708 err = hci_cmd_sync_queue(hdev, remove_advertising_sync, cmd, 8709 remove_advertising_complete); 8710 if (err < 0) 8711 mgmt_pending_free(cmd); 8712 8713 unlock: 8714 hci_dev_unlock(hdev); 8715 8716 return err; 8717 } 8718 8719 static int get_adv_size_info(struct sock *sk, struct hci_dev *hdev, 8720 void *data, u16 data_len) 8721 { 8722 struct mgmt_cp_get_adv_size_info *cp = data; 8723 struct mgmt_rp_get_adv_size_info rp; 8724 u32 flags, supported_flags; 8725 8726 bt_dev_dbg(hdev, "sock %p", sk); 8727 8728 if (!lmp_le_capable(hdev)) 8729 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, 8730 MGMT_STATUS_REJECTED); 8731 8732 if (cp->instance < 1 || cp->instance > hdev->le_num_of_adv_sets) 8733 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, 8734 MGMT_STATUS_INVALID_PARAMS); 8735 8736 flags = __le32_to_cpu(cp->flags); 8737 8738 /* The current implementation only supports a subset of the specified 8739 * flags. 8740 */ 8741 supported_flags = get_supported_adv_flags(hdev); 8742 if (flags & ~supported_flags) 8743 return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, 8744 MGMT_STATUS_INVALID_PARAMS); 8745 8746 rp.instance = cp->instance; 8747 rp.flags = cp->flags; 8748 rp.max_adv_data_len = tlv_data_max_len(hdev, flags, true); 8749 rp.max_scan_rsp_len = tlv_data_max_len(hdev, flags, false); 8750 8751 return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, 8752 MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); 8753 } 8754 8755 static const struct hci_mgmt_handler mgmt_handlers[] = { 8756 { NULL }, /* 0x0000 (no command) */ 8757 { read_version, MGMT_READ_VERSION_SIZE, 8758 HCI_MGMT_NO_HDEV | 8759 HCI_MGMT_UNTRUSTED }, 8760 { read_commands, MGMT_READ_COMMANDS_SIZE, 8761 HCI_MGMT_NO_HDEV | 8762 HCI_MGMT_UNTRUSTED }, 8763 { read_index_list, MGMT_READ_INDEX_LIST_SIZE, 8764 HCI_MGMT_NO_HDEV | 8765 HCI_MGMT_UNTRUSTED }, 8766 { read_controller_info, MGMT_READ_INFO_SIZE, 8767 HCI_MGMT_UNTRUSTED }, 8768 { set_powered, MGMT_SETTING_SIZE }, 8769 { set_discoverable, MGMT_SET_DISCOVERABLE_SIZE }, 8770 { set_connectable, MGMT_SETTING_SIZE }, 8771 { set_fast_connectable, MGMT_SETTING_SIZE }, 8772 { set_bondable, MGMT_SETTING_SIZE }, 8773 { set_link_security, MGMT_SETTING_SIZE }, 8774 { set_ssp, MGMT_SETTING_SIZE }, 8775 { set_hs, MGMT_SETTING_SIZE }, 8776 { set_le, MGMT_SETTING_SIZE }, 8777 { set_dev_class, MGMT_SET_DEV_CLASS_SIZE }, 8778 { set_local_name, MGMT_SET_LOCAL_NAME_SIZE }, 8779 { add_uuid, MGMT_ADD_UUID_SIZE }, 8780 { remove_uuid, MGMT_REMOVE_UUID_SIZE }, 8781 { load_link_keys, MGMT_LOAD_LINK_KEYS_SIZE, 8782 HCI_MGMT_VAR_LEN }, 8783 { load_long_term_keys, MGMT_LOAD_LONG_TERM_KEYS_SIZE, 8784 HCI_MGMT_VAR_LEN }, 8785 { disconnect, MGMT_DISCONNECT_SIZE }, 8786 { get_connections, MGMT_GET_CONNECTIONS_SIZE }, 8787 { pin_code_reply, MGMT_PIN_CODE_REPLY_SIZE }, 8788 { pin_code_neg_reply, MGMT_PIN_CODE_NEG_REPLY_SIZE }, 8789 { set_io_capability, MGMT_SET_IO_CAPABILITY_SIZE }, 8790 { pair_device, MGMT_PAIR_DEVICE_SIZE }, 8791 { cancel_pair_device, MGMT_CANCEL_PAIR_DEVICE_SIZE }, 8792 { unpair_device, MGMT_UNPAIR_DEVICE_SIZE }, 8793 { user_confirm_reply, MGMT_USER_CONFIRM_REPLY_SIZE }, 8794 { user_confirm_neg_reply, MGMT_USER_CONFIRM_NEG_REPLY_SIZE }, 8795 { user_passkey_reply, MGMT_USER_PASSKEY_REPLY_SIZE }, 8796 { user_passkey_neg_reply, MGMT_USER_PASSKEY_NEG_REPLY_SIZE }, 8797 { read_local_oob_data, MGMT_READ_LOCAL_OOB_DATA_SIZE }, 8798 { add_remote_oob_data, MGMT_ADD_REMOTE_OOB_DATA_SIZE, 8799 HCI_MGMT_VAR_LEN }, 8800 { remove_remote_oob_data, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE }, 8801 { start_discovery, MGMT_START_DISCOVERY_SIZE }, 8802 { stop_discovery, MGMT_STOP_DISCOVERY_SIZE }, 8803 { confirm_name, MGMT_CONFIRM_NAME_SIZE }, 8804 { block_device, MGMT_BLOCK_DEVICE_SIZE }, 8805 { unblock_device, MGMT_UNBLOCK_DEVICE_SIZE }, 8806 { set_device_id, MGMT_SET_DEVICE_ID_SIZE }, 8807 { set_advertising, MGMT_SETTING_SIZE }, 8808 { set_bredr, MGMT_SETTING_SIZE }, 8809 { set_static_address, MGMT_SET_STATIC_ADDRESS_SIZE }, 8810 { set_scan_params, MGMT_SET_SCAN_PARAMS_SIZE }, 8811 { set_secure_conn, MGMT_SETTING_SIZE }, 8812 { set_debug_keys, MGMT_SETTING_SIZE }, 8813 { set_privacy, MGMT_SET_PRIVACY_SIZE }, 8814 { load_irks, MGMT_LOAD_IRKS_SIZE, 8815 HCI_MGMT_VAR_LEN }, 8816 { get_conn_info, MGMT_GET_CONN_INFO_SIZE }, 8817 { get_clock_info, MGMT_GET_CLOCK_INFO_SIZE }, 8818 { add_device, MGMT_ADD_DEVICE_SIZE }, 8819 { remove_device, MGMT_REMOVE_DEVICE_SIZE }, 8820 { load_conn_param, MGMT_LOAD_CONN_PARAM_SIZE, 8821 HCI_MGMT_VAR_LEN }, 8822 { read_unconf_index_list, MGMT_READ_UNCONF_INDEX_LIST_SIZE, 8823 HCI_MGMT_NO_HDEV | 8824 HCI_MGMT_UNTRUSTED }, 8825 { read_config_info, MGMT_READ_CONFIG_INFO_SIZE, 8826 HCI_MGMT_UNCONFIGURED | 8827 HCI_MGMT_UNTRUSTED }, 8828 { set_external_config, MGMT_SET_EXTERNAL_CONFIG_SIZE, 8829 HCI_MGMT_UNCONFIGURED }, 8830 { set_public_address, MGMT_SET_PUBLIC_ADDRESS_SIZE, 8831 HCI_MGMT_UNCONFIGURED }, 8832 { start_service_discovery, MGMT_START_SERVICE_DISCOVERY_SIZE, 8833 HCI_MGMT_VAR_LEN }, 8834 { read_local_oob_ext_data, MGMT_READ_LOCAL_OOB_EXT_DATA_SIZE }, 8835 { read_ext_index_list, MGMT_READ_EXT_INDEX_LIST_SIZE, 8836 HCI_MGMT_NO_HDEV | 8837 HCI_MGMT_UNTRUSTED }, 8838 { read_adv_features, MGMT_READ_ADV_FEATURES_SIZE }, 8839 { add_advertising, MGMT_ADD_ADVERTISING_SIZE, 8840 HCI_MGMT_VAR_LEN }, 8841 { remove_advertising, MGMT_REMOVE_ADVERTISING_SIZE }, 8842 { get_adv_size_info, MGMT_GET_ADV_SIZE_INFO_SIZE }, 8843 { start_limited_discovery, MGMT_START_DISCOVERY_SIZE }, 8844 { read_ext_controller_info,MGMT_READ_EXT_INFO_SIZE, 8845 HCI_MGMT_UNTRUSTED }, 8846 { set_appearance, MGMT_SET_APPEARANCE_SIZE }, 8847 { get_phy_configuration, MGMT_GET_PHY_CONFIGURATION_SIZE }, 8848 { set_phy_configuration, MGMT_SET_PHY_CONFIGURATION_SIZE }, 8849 { set_blocked_keys, MGMT_OP_SET_BLOCKED_KEYS_SIZE, 8850 HCI_MGMT_VAR_LEN }, 8851 { set_wideband_speech, MGMT_SETTING_SIZE }, 8852 { read_controller_cap, MGMT_READ_CONTROLLER_CAP_SIZE, 8853 HCI_MGMT_UNTRUSTED }, 8854 { read_exp_features_info, MGMT_READ_EXP_FEATURES_INFO_SIZE, 8855 HCI_MGMT_UNTRUSTED | 8856 HCI_MGMT_HDEV_OPTIONAL }, 8857 { set_exp_feature, MGMT_SET_EXP_FEATURE_SIZE, 8858 HCI_MGMT_VAR_LEN | 8859 HCI_MGMT_HDEV_OPTIONAL }, 8860 { read_def_system_config, MGMT_READ_DEF_SYSTEM_CONFIG_SIZE, 8861 HCI_MGMT_UNTRUSTED }, 8862 { set_def_system_config, MGMT_SET_DEF_SYSTEM_CONFIG_SIZE, 8863 HCI_MGMT_VAR_LEN }, 8864 { read_def_runtime_config, MGMT_READ_DEF_RUNTIME_CONFIG_SIZE, 8865 HCI_MGMT_UNTRUSTED }, 8866 { set_def_runtime_config, MGMT_SET_DEF_RUNTIME_CONFIG_SIZE, 8867 HCI_MGMT_VAR_LEN }, 8868 { get_device_flags, MGMT_GET_DEVICE_FLAGS_SIZE }, 8869 { set_device_flags, MGMT_SET_DEVICE_FLAGS_SIZE }, 8870 { read_adv_mon_features, MGMT_READ_ADV_MONITOR_FEATURES_SIZE }, 8871 { add_adv_patterns_monitor,MGMT_ADD_ADV_PATTERNS_MONITOR_SIZE, 8872 HCI_MGMT_VAR_LEN }, 8873 { remove_adv_monitor, MGMT_REMOVE_ADV_MONITOR_SIZE }, 8874 { add_ext_adv_params, MGMT_ADD_EXT_ADV_PARAMS_MIN_SIZE, 8875 HCI_MGMT_VAR_LEN }, 8876 { add_ext_adv_data, MGMT_ADD_EXT_ADV_DATA_SIZE, 8877 HCI_MGMT_VAR_LEN }, 8878 { add_adv_patterns_monitor_rssi, 8879 MGMT_ADD_ADV_PATTERNS_MONITOR_RSSI_SIZE, 8880 HCI_MGMT_VAR_LEN }, 8881 }; 8882 8883 void mgmt_index_added(struct hci_dev *hdev) 8884 { 8885 struct mgmt_ev_ext_index ev; 8886 8887 if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks)) 8888 return; 8889 8890 switch (hdev->dev_type) { 8891 case HCI_PRIMARY: 8892 if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) { 8893 mgmt_index_event(MGMT_EV_UNCONF_INDEX_ADDED, hdev, 8894 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS); 8895 ev.type = 0x01; 8896 } else { 8897 mgmt_index_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, 8898 HCI_MGMT_INDEX_EVENTS); 8899 ev.type = 0x00; 8900 } 8901 break; 8902 case HCI_AMP: 8903 ev.type = 0x02; 8904 break; 8905 default: 8906 return; 8907 } 8908 8909 ev.bus = hdev->bus; 8910 8911 mgmt_index_event(MGMT_EV_EXT_INDEX_ADDED, hdev, &ev, sizeof(ev), 8912 HCI_MGMT_EXT_INDEX_EVENTS); 8913 } 8914 8915 void mgmt_index_removed(struct hci_dev *hdev) 8916 { 8917 struct mgmt_ev_ext_index ev; 8918 u8 status = MGMT_STATUS_INVALID_INDEX; 8919 8920 if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks)) 8921 return; 8922 8923 switch (hdev->dev_type) { 8924 case HCI_PRIMARY: 8925 mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status); 8926 8927 if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) { 8928 mgmt_index_event(MGMT_EV_UNCONF_INDEX_REMOVED, hdev, 8929 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS); 8930 ev.type = 0x01; 8931 } else { 8932 mgmt_index_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, 8933 HCI_MGMT_INDEX_EVENTS); 8934 ev.type = 0x00; 8935 } 8936 break; 8937 case HCI_AMP: 8938 ev.type = 0x02; 8939 break; 8940 default: 8941 return; 8942 } 8943 8944 ev.bus = hdev->bus; 8945 8946 mgmt_index_event(MGMT_EV_EXT_INDEX_REMOVED, hdev, &ev, sizeof(ev), 8947 HCI_MGMT_EXT_INDEX_EVENTS); 8948 8949 /* Cancel any remaining timed work */ 8950 if (!hci_dev_test_flag(hdev, HCI_MGMT)) 8951 return; 8952 cancel_delayed_work_sync(&hdev->discov_off); 8953 cancel_delayed_work_sync(&hdev->service_cache); 8954 cancel_delayed_work_sync(&hdev->rpa_expired); 8955 } 8956 8957 void mgmt_power_on(struct hci_dev *hdev, int err) 8958 { 8959 struct cmd_lookup match = { NULL, hdev }; 8960 8961 bt_dev_dbg(hdev, "err %d", err); 8962 8963 hci_dev_lock(hdev); 8964 8965 if (!err) { 8966 restart_le_actions(hdev); 8967 hci_update_passive_scan(hdev); 8968 } 8969 8970 mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match); 8971 8972 new_settings(hdev, match.sk); 8973 8974 if (match.sk) 8975 sock_put(match.sk); 8976 8977 hci_dev_unlock(hdev); 8978 } 8979 8980 void __mgmt_power_off(struct hci_dev *hdev) 8981 { 8982 struct cmd_lookup match = { NULL, hdev }; 8983 u8 status, zero_cod[] = { 0, 0, 0 }; 8984 8985 mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match); 8986 8987 /* If the power off is because of hdev unregistration let 8988 * use the appropriate INVALID_INDEX status. Otherwise use 8989 * NOT_POWERED. We cover both scenarios here since later in 8990 * mgmt_index_removed() any hci_conn callbacks will have already 8991 * been triggered, potentially causing misleading DISCONNECTED 8992 * status responses. 8993 */ 8994 if (hci_dev_test_flag(hdev, HCI_UNREGISTER)) 8995 status = MGMT_STATUS_INVALID_INDEX; 8996 else 8997 status = MGMT_STATUS_NOT_POWERED; 8998 8999 mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status); 9000 9001 if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0) { 9002 mgmt_limited_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, 9003 zero_cod, sizeof(zero_cod), 9004 HCI_MGMT_DEV_CLASS_EVENTS, NULL); 9005 ext_info_changed(hdev, NULL); 9006 } 9007 9008 new_settings(hdev, match.sk); 9009 9010 if (match.sk) 9011 sock_put(match.sk); 9012 } 9013 9014 void mgmt_set_powered_failed(struct hci_dev *hdev, int err) 9015 { 9016 struct mgmt_pending_cmd *cmd; 9017 u8 status; 9018 9019 cmd = pending_find(MGMT_OP_SET_POWERED, hdev); 9020 if (!cmd) 9021 return; 9022 9023 if (err == -ERFKILL) 9024 status = MGMT_STATUS_RFKILLED; 9025 else 9026 status = MGMT_STATUS_FAILED; 9027 9028 mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status); 9029 9030 mgmt_pending_remove(cmd); 9031 } 9032 9033 void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key, 9034 bool persistent) 9035 { 9036 struct mgmt_ev_new_link_key ev; 9037 9038 memset(&ev, 0, sizeof(ev)); 9039 9040 ev.store_hint = persistent; 9041 bacpy(&ev.key.addr.bdaddr, &key->bdaddr); 9042 ev.key.addr.type = BDADDR_BREDR; 9043 ev.key.type = key->type; 9044 memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE); 9045 ev.key.pin_len = key->pin_len; 9046 9047 mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL); 9048 } 9049 9050 static u8 mgmt_ltk_type(struct smp_ltk *ltk) 9051 { 9052 switch (ltk->type) { 9053 case SMP_LTK: 9054 case SMP_LTK_RESPONDER: 9055 if (ltk->authenticated) 9056 return MGMT_LTK_AUTHENTICATED; 9057 return MGMT_LTK_UNAUTHENTICATED; 9058 case SMP_LTK_P256: 9059 if (ltk->authenticated) 9060 return MGMT_LTK_P256_AUTH; 9061 return MGMT_LTK_P256_UNAUTH; 9062 case SMP_LTK_P256_DEBUG: 9063 return MGMT_LTK_P256_DEBUG; 9064 } 9065 9066 return MGMT_LTK_UNAUTHENTICATED; 9067 } 9068 9069 void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent) 9070 { 9071 struct mgmt_ev_new_long_term_key ev; 9072 9073 memset(&ev, 0, sizeof(ev)); 9074 9075 /* Devices using resolvable or non-resolvable random addresses 9076 * without providing an identity resolving key don't require 9077 * to store long term keys. Their addresses will change the 9078 * next time around. 9079 * 9080 * Only when a remote device provides an identity address 9081 * make sure the long term key is stored. If the remote 9082 * identity is known, the long term keys are internally 9083 * mapped to the identity address. So allow static random 9084 * and public addresses here. 9085 */ 9086 if (key->bdaddr_type == ADDR_LE_DEV_RANDOM && 9087 (key->bdaddr.b[5] & 0xc0) != 0xc0) 9088 ev.store_hint = 0x00; 9089 else 9090 ev.store_hint = persistent; 9091 9092 bacpy(&ev.key.addr.bdaddr, &key->bdaddr); 9093 ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type); 9094 ev.key.type = mgmt_ltk_type(key); 9095 ev.key.enc_size = key->enc_size; 9096 ev.key.ediv = key->ediv; 9097 ev.key.rand = key->rand; 9098 9099 if (key->type == SMP_LTK) 9100 ev.key.initiator = 1; 9101 9102 /* Make sure we copy only the significant bytes based on the 9103 * encryption key size, and set the rest of the value to zeroes. 9104 */ 9105 memcpy(ev.key.val, key->val, key->enc_size); 9106 memset(ev.key.val + key->enc_size, 0, 9107 sizeof(ev.key.val) - key->enc_size); 9108 9109 mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL); 9110 } 9111 9112 void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk, bool persistent) 9113 { 9114 struct mgmt_ev_new_irk ev; 9115 9116 memset(&ev, 0, sizeof(ev)); 9117 9118 ev.store_hint = persistent; 9119 9120 bacpy(&ev.rpa, &irk->rpa); 9121 bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr); 9122 ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type); 9123 memcpy(ev.irk.val, irk->val, sizeof(irk->val)); 9124 9125 mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL); 9126 } 9127 9128 void mgmt_new_csrk(struct hci_dev *hdev, struct smp_csrk *csrk, 9129 bool persistent) 9130 { 9131 struct mgmt_ev_new_csrk ev; 9132 9133 memset(&ev, 0, sizeof(ev)); 9134 9135 /* Devices using resolvable or non-resolvable random addresses 9136 * without providing an identity resolving key don't require 9137 * to store signature resolving keys. Their addresses will change 9138 * the next time around. 9139 * 9140 * Only when a remote device provides an identity address 9141 * make sure the signature resolving key is stored. So allow 9142 * static random and public addresses here. 9143 */ 9144 if (csrk->bdaddr_type == ADDR_LE_DEV_RANDOM && 9145 (csrk->bdaddr.b[5] & 0xc0) != 0xc0) 9146 ev.store_hint = 0x00; 9147 else 9148 ev.store_hint = persistent; 9149 9150 bacpy(&ev.key.addr.bdaddr, &csrk->bdaddr); 9151 ev.key.addr.type = link_to_bdaddr(LE_LINK, csrk->bdaddr_type); 9152 ev.key.type = csrk->type; 9153 memcpy(ev.key.val, csrk->val, sizeof(csrk->val)); 9154 9155 mgmt_event(MGMT_EV_NEW_CSRK, hdev, &ev, sizeof(ev), NULL); 9156 } 9157 9158 void mgmt_new_conn_param(struct hci_dev *hdev, bdaddr_t *bdaddr, 9159 u8 bdaddr_type, u8 store_hint, u16 min_interval, 9160 u16 max_interval, u16 latency, u16 timeout) 9161 { 9162 struct mgmt_ev_new_conn_param ev; 9163 9164 if (!hci_is_identity_address(bdaddr, bdaddr_type)) 9165 return; 9166 9167 memset(&ev, 0, sizeof(ev)); 9168 bacpy(&ev.addr.bdaddr, bdaddr); 9169 ev.addr.type = link_to_bdaddr(LE_LINK, bdaddr_type); 9170 ev.store_hint = store_hint; 9171 ev.min_interval = cpu_to_le16(min_interval); 9172 ev.max_interval = cpu_to_le16(max_interval); 9173 ev.latency = cpu_to_le16(latency); 9174 ev.timeout = cpu_to_le16(timeout); 9175 9176 mgmt_event(MGMT_EV_NEW_CONN_PARAM, hdev, &ev, sizeof(ev), NULL); 9177 } 9178 9179 void mgmt_device_connected(struct hci_dev *hdev, struct hci_conn *conn, 9180 u8 *name, u8 name_len) 9181 { 9182 struct sk_buff *skb; 9183 struct mgmt_ev_device_connected *ev; 9184 u16 eir_len = 0; 9185 u32 flags = 0; 9186 9187 /* allocate buff for LE or BR/EDR adv */ 9188 if (conn->le_adv_data_len > 0) 9189 skb = mgmt_alloc_skb(hdev, MGMT_EV_DEVICE_CONNECTED, 9190 sizeof(*ev) + conn->le_adv_data_len); 9191 else 9192 skb = mgmt_alloc_skb(hdev, MGMT_EV_DEVICE_CONNECTED, 9193 sizeof(*ev) + (name ? eir_precalc_len(name_len) : 0) + 9194 eir_precalc_len(sizeof(conn->dev_class))); 9195 9196 ev = skb_put(skb, sizeof(*ev)); 9197 bacpy(&ev->addr.bdaddr, &conn->dst); 9198 ev->addr.type = link_to_bdaddr(conn->type, conn->dst_type); 9199 9200 if (conn->out) 9201 flags |= MGMT_DEV_FOUND_INITIATED_CONN; 9202 9203 ev->flags = __cpu_to_le32(flags); 9204 9205 /* We must ensure that the EIR Data fields are ordered and 9206 * unique. Keep it simple for now and avoid the problem by not 9207 * adding any BR/EDR data to the LE adv. 9208 */ 9209 if (conn->le_adv_data_len > 0) { 9210 skb_put_data(skb, conn->le_adv_data, conn->le_adv_data_len); 9211 eir_len = conn->le_adv_data_len; 9212 } else { 9213 if (name) 9214 eir_len += eir_skb_put_data(skb, EIR_NAME_COMPLETE, name, name_len); 9215 9216 if (memcmp(conn->dev_class, "\0\0\0", sizeof(conn->dev_class))) 9217 eir_len += eir_skb_put_data(skb, EIR_CLASS_OF_DEV, 9218 conn->dev_class, sizeof(conn->dev_class)); 9219 } 9220 9221 ev->eir_len = cpu_to_le16(eir_len); 9222 9223 mgmt_event_skb(skb, NULL); 9224 } 9225 9226 static void disconnect_rsp(struct mgmt_pending_cmd *cmd, void *data) 9227 { 9228 struct sock **sk = data; 9229 9230 cmd->cmd_complete(cmd, 0); 9231 9232 *sk = cmd->sk; 9233 sock_hold(*sk); 9234 9235 mgmt_pending_remove(cmd); 9236 } 9237 9238 static void unpair_device_rsp(struct mgmt_pending_cmd *cmd, void *data) 9239 { 9240 struct hci_dev *hdev = data; 9241 struct mgmt_cp_unpair_device *cp = cmd->param; 9242 9243 device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk); 9244 9245 cmd->cmd_complete(cmd, 0); 9246 mgmt_pending_remove(cmd); 9247 } 9248 9249 bool mgmt_powering_down(struct hci_dev *hdev) 9250 { 9251 struct mgmt_pending_cmd *cmd; 9252 struct mgmt_mode *cp; 9253 9254 cmd = pending_find(MGMT_OP_SET_POWERED, hdev); 9255 if (!cmd) 9256 return false; 9257 9258 cp = cmd->param; 9259 if (!cp->val) 9260 return true; 9261 9262 return false; 9263 } 9264 9265 void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr, 9266 u8 link_type, u8 addr_type, u8 reason, 9267 bool mgmt_connected) 9268 { 9269 struct mgmt_ev_device_disconnected ev; 9270 struct sock *sk = NULL; 9271 9272 /* The connection is still in hci_conn_hash so test for 1 9273 * instead of 0 to know if this is the last one. 9274 */ 9275 if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) { 9276 cancel_delayed_work(&hdev->power_off); 9277 queue_work(hdev->req_workqueue, &hdev->power_off.work); 9278 } 9279 9280 if (!mgmt_connected) 9281 return; 9282 9283 if (link_type != ACL_LINK && link_type != LE_LINK) 9284 return; 9285 9286 mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk); 9287 9288 bacpy(&ev.addr.bdaddr, bdaddr); 9289 ev.addr.type = link_to_bdaddr(link_type, addr_type); 9290 ev.reason = reason; 9291 9292 /* Report disconnects due to suspend */ 9293 if (hdev->suspended) 9294 ev.reason = MGMT_DEV_DISCONN_LOCAL_HOST_SUSPEND; 9295 9296 mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk); 9297 9298 if (sk) 9299 sock_put(sk); 9300 9301 mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp, 9302 hdev); 9303 } 9304 9305 void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, 9306 u8 link_type, u8 addr_type, u8 status) 9307 { 9308 u8 bdaddr_type = link_to_bdaddr(link_type, addr_type); 9309 struct mgmt_cp_disconnect *cp; 9310 struct mgmt_pending_cmd *cmd; 9311 9312 mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp, 9313 hdev); 9314 9315 cmd = pending_find(MGMT_OP_DISCONNECT, hdev); 9316 if (!cmd) 9317 return; 9318 9319 cp = cmd->param; 9320 9321 if (bacmp(bdaddr, &cp->addr.bdaddr)) 9322 return; 9323 9324 if (cp->addr.type != bdaddr_type) 9325 return; 9326 9327 cmd->cmd_complete(cmd, mgmt_status(status)); 9328 mgmt_pending_remove(cmd); 9329 } 9330 9331 void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, 9332 u8 addr_type, u8 status) 9333 { 9334 struct mgmt_ev_connect_failed ev; 9335 9336 /* The connection is still in hci_conn_hash so test for 1 9337 * instead of 0 to know if this is the last one. 9338 */ 9339 if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) { 9340 cancel_delayed_work(&hdev->power_off); 9341 queue_work(hdev->req_workqueue, &hdev->power_off.work); 9342 } 9343 9344 bacpy(&ev.addr.bdaddr, bdaddr); 9345 ev.addr.type = link_to_bdaddr(link_type, addr_type); 9346 ev.status = mgmt_status(status); 9347 9348 mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL); 9349 } 9350 9351 void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure) 9352 { 9353 struct mgmt_ev_pin_code_request ev; 9354 9355 bacpy(&ev.addr.bdaddr, bdaddr); 9356 ev.addr.type = BDADDR_BREDR; 9357 ev.secure = secure; 9358 9359 mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL); 9360 } 9361 9362 void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9363 u8 status) 9364 { 9365 struct mgmt_pending_cmd *cmd; 9366 9367 cmd = pending_find(MGMT_OP_PIN_CODE_REPLY, hdev); 9368 if (!cmd) 9369 return; 9370 9371 cmd->cmd_complete(cmd, mgmt_status(status)); 9372 mgmt_pending_remove(cmd); 9373 } 9374 9375 void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9376 u8 status) 9377 { 9378 struct mgmt_pending_cmd *cmd; 9379 9380 cmd = pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev); 9381 if (!cmd) 9382 return; 9383 9384 cmd->cmd_complete(cmd, mgmt_status(status)); 9385 mgmt_pending_remove(cmd); 9386 } 9387 9388 int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr, 9389 u8 link_type, u8 addr_type, u32 value, 9390 u8 confirm_hint) 9391 { 9392 struct mgmt_ev_user_confirm_request ev; 9393 9394 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 9395 9396 bacpy(&ev.addr.bdaddr, bdaddr); 9397 ev.addr.type = link_to_bdaddr(link_type, addr_type); 9398 ev.confirm_hint = confirm_hint; 9399 ev.value = cpu_to_le32(value); 9400 9401 return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev), 9402 NULL); 9403 } 9404 9405 int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr, 9406 u8 link_type, u8 addr_type) 9407 { 9408 struct mgmt_ev_user_passkey_request ev; 9409 9410 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 9411 9412 bacpy(&ev.addr.bdaddr, bdaddr); 9413 ev.addr.type = link_to_bdaddr(link_type, addr_type); 9414 9415 return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev), 9416 NULL); 9417 } 9418 9419 static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9420 u8 link_type, u8 addr_type, u8 status, 9421 u8 opcode) 9422 { 9423 struct mgmt_pending_cmd *cmd; 9424 9425 cmd = pending_find(opcode, hdev); 9426 if (!cmd) 9427 return -ENOENT; 9428 9429 cmd->cmd_complete(cmd, mgmt_status(status)); 9430 mgmt_pending_remove(cmd); 9431 9432 return 0; 9433 } 9434 9435 int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9436 u8 link_type, u8 addr_type, u8 status) 9437 { 9438 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, 9439 status, MGMT_OP_USER_CONFIRM_REPLY); 9440 } 9441 9442 int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9443 u8 link_type, u8 addr_type, u8 status) 9444 { 9445 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, 9446 status, 9447 MGMT_OP_USER_CONFIRM_NEG_REPLY); 9448 } 9449 9450 int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9451 u8 link_type, u8 addr_type, u8 status) 9452 { 9453 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, 9454 status, MGMT_OP_USER_PASSKEY_REPLY); 9455 } 9456 9457 int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, 9458 u8 link_type, u8 addr_type, u8 status) 9459 { 9460 return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, 9461 status, 9462 MGMT_OP_USER_PASSKEY_NEG_REPLY); 9463 } 9464 9465 int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr, 9466 u8 link_type, u8 addr_type, u32 passkey, 9467 u8 entered) 9468 { 9469 struct mgmt_ev_passkey_notify ev; 9470 9471 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 9472 9473 bacpy(&ev.addr.bdaddr, bdaddr); 9474 ev.addr.type = link_to_bdaddr(link_type, addr_type); 9475 ev.passkey = __cpu_to_le32(passkey); 9476 ev.entered = entered; 9477 9478 return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL); 9479 } 9480 9481 void mgmt_auth_failed(struct hci_conn *conn, u8 hci_status) 9482 { 9483 struct mgmt_ev_auth_failed ev; 9484 struct mgmt_pending_cmd *cmd; 9485 u8 status = mgmt_status(hci_status); 9486 9487 bacpy(&ev.addr.bdaddr, &conn->dst); 9488 ev.addr.type = link_to_bdaddr(conn->type, conn->dst_type); 9489 ev.status = status; 9490 9491 cmd = find_pairing(conn); 9492 9493 mgmt_event(MGMT_EV_AUTH_FAILED, conn->hdev, &ev, sizeof(ev), 9494 cmd ? cmd->sk : NULL); 9495 9496 if (cmd) { 9497 cmd->cmd_complete(cmd, status); 9498 mgmt_pending_remove(cmd); 9499 } 9500 } 9501 9502 void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status) 9503 { 9504 struct cmd_lookup match = { NULL, hdev }; 9505 bool changed; 9506 9507 if (status) { 9508 u8 mgmt_err = mgmt_status(status); 9509 mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, 9510 cmd_status_rsp, &mgmt_err); 9511 return; 9512 } 9513 9514 if (test_bit(HCI_AUTH, &hdev->flags)) 9515 changed = !hci_dev_test_and_set_flag(hdev, HCI_LINK_SECURITY); 9516 else 9517 changed = hci_dev_test_and_clear_flag(hdev, HCI_LINK_SECURITY); 9518 9519 mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp, 9520 &match); 9521 9522 if (changed) 9523 new_settings(hdev, match.sk); 9524 9525 if (match.sk) 9526 sock_put(match.sk); 9527 } 9528 9529 static void sk_lookup(struct mgmt_pending_cmd *cmd, void *data) 9530 { 9531 struct cmd_lookup *match = data; 9532 9533 if (match->sk == NULL) { 9534 match->sk = cmd->sk; 9535 sock_hold(match->sk); 9536 } 9537 } 9538 9539 void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class, 9540 u8 status) 9541 { 9542 struct cmd_lookup match = { NULL, hdev, mgmt_status(status) }; 9543 9544 mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match); 9545 mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match); 9546 mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match); 9547 9548 if (!status) { 9549 mgmt_limited_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class, 9550 3, HCI_MGMT_DEV_CLASS_EVENTS, NULL); 9551 ext_info_changed(hdev, NULL); 9552 } 9553 9554 if (match.sk) 9555 sock_put(match.sk); 9556 } 9557 9558 void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status) 9559 { 9560 struct mgmt_cp_set_local_name ev; 9561 struct mgmt_pending_cmd *cmd; 9562 9563 if (status) 9564 return; 9565 9566 memset(&ev, 0, sizeof(ev)); 9567 memcpy(ev.name, name, HCI_MAX_NAME_LENGTH); 9568 memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH); 9569 9570 cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev); 9571 if (!cmd) { 9572 memcpy(hdev->dev_name, name, sizeof(hdev->dev_name)); 9573 9574 /* If this is a HCI command related to powering on the 9575 * HCI dev don't send any mgmt signals. 9576 */ 9577 if (pending_find(MGMT_OP_SET_POWERED, hdev)) 9578 return; 9579 } 9580 9581 mgmt_limited_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev), 9582 HCI_MGMT_LOCAL_NAME_EVENTS, cmd ? cmd->sk : NULL); 9583 ext_info_changed(hdev, cmd ? cmd->sk : NULL); 9584 } 9585 9586 static inline bool has_uuid(u8 *uuid, u16 uuid_count, u8 (*uuids)[16]) 9587 { 9588 int i; 9589 9590 for (i = 0; i < uuid_count; i++) { 9591 if (!memcmp(uuid, uuids[i], 16)) 9592 return true; 9593 } 9594 9595 return false; 9596 } 9597 9598 static bool eir_has_uuids(u8 *eir, u16 eir_len, u16 uuid_count, u8 (*uuids)[16]) 9599 { 9600 u16 parsed = 0; 9601 9602 while (parsed < eir_len) { 9603 u8 field_len = eir[0]; 9604 u8 uuid[16]; 9605 int i; 9606 9607 if (field_len == 0) 9608 break; 9609 9610 if (eir_len - parsed < field_len + 1) 9611 break; 9612 9613 switch (eir[1]) { 9614 case EIR_UUID16_ALL: 9615 case EIR_UUID16_SOME: 9616 for (i = 0; i + 3 <= field_len; i += 2) { 9617 memcpy(uuid, bluetooth_base_uuid, 16); 9618 uuid[13] = eir[i + 3]; 9619 uuid[12] = eir[i + 2]; 9620 if (has_uuid(uuid, uuid_count, uuids)) 9621 return true; 9622 } 9623 break; 9624 case EIR_UUID32_ALL: 9625 case EIR_UUID32_SOME: 9626 for (i = 0; i + 5 <= field_len; i += 4) { 9627 memcpy(uuid, bluetooth_base_uuid, 16); 9628 uuid[15] = eir[i + 5]; 9629 uuid[14] = eir[i + 4]; 9630 uuid[13] = eir[i + 3]; 9631 uuid[12] = eir[i + 2]; 9632 if (has_uuid(uuid, uuid_count, uuids)) 9633 return true; 9634 } 9635 break; 9636 case EIR_UUID128_ALL: 9637 case EIR_UUID128_SOME: 9638 for (i = 0; i + 17 <= field_len; i += 16) { 9639 memcpy(uuid, eir + i + 2, 16); 9640 if (has_uuid(uuid, uuid_count, uuids)) 9641 return true; 9642 } 9643 break; 9644 } 9645 9646 parsed += field_len + 1; 9647 eir += field_len + 1; 9648 } 9649 9650 return false; 9651 } 9652 9653 static void restart_le_scan(struct hci_dev *hdev) 9654 { 9655 /* If controller is not scanning we are done. */ 9656 if (!hci_dev_test_flag(hdev, HCI_LE_SCAN)) 9657 return; 9658 9659 if (time_after(jiffies + DISCOV_LE_RESTART_DELAY, 9660 hdev->discovery.scan_start + 9661 hdev->discovery.scan_duration)) 9662 return; 9663 9664 queue_delayed_work(hdev->req_workqueue, &hdev->le_scan_restart, 9665 DISCOV_LE_RESTART_DELAY); 9666 } 9667 9668 static bool is_filter_match(struct hci_dev *hdev, s8 rssi, u8 *eir, 9669 u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len) 9670 { 9671 /* If a RSSI threshold has been specified, and 9672 * HCI_QUIRK_STRICT_DUPLICATE_FILTER is not set, then all results with 9673 * a RSSI smaller than the RSSI threshold will be dropped. If the quirk 9674 * is set, let it through for further processing, as we might need to 9675 * restart the scan. 9676 * 9677 * For BR/EDR devices (pre 1.2) providing no RSSI during inquiry, 9678 * the results are also dropped. 9679 */ 9680 if (hdev->discovery.rssi != HCI_RSSI_INVALID && 9681 (rssi == HCI_RSSI_INVALID || 9682 (rssi < hdev->discovery.rssi && 9683 !test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)))) 9684 return false; 9685 9686 if (hdev->discovery.uuid_count != 0) { 9687 /* If a list of UUIDs is provided in filter, results with no 9688 * matching UUID should be dropped. 9689 */ 9690 if (!eir_has_uuids(eir, eir_len, hdev->discovery.uuid_count, 9691 hdev->discovery.uuids) && 9692 !eir_has_uuids(scan_rsp, scan_rsp_len, 9693 hdev->discovery.uuid_count, 9694 hdev->discovery.uuids)) 9695 return false; 9696 } 9697 9698 /* If duplicate filtering does not report RSSI changes, then restart 9699 * scanning to ensure updated result with updated RSSI values. 9700 */ 9701 if (test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)) { 9702 restart_le_scan(hdev); 9703 9704 /* Validate RSSI value against the RSSI threshold once more. */ 9705 if (hdev->discovery.rssi != HCI_RSSI_INVALID && 9706 rssi < hdev->discovery.rssi) 9707 return false; 9708 } 9709 9710 return true; 9711 } 9712 9713 void mgmt_adv_monitor_device_lost(struct hci_dev *hdev, u16 handle, 9714 bdaddr_t *bdaddr, u8 addr_type) 9715 { 9716 struct mgmt_ev_adv_monitor_device_lost ev; 9717 9718 ev.monitor_handle = cpu_to_le16(handle); 9719 bacpy(&ev.addr.bdaddr, bdaddr); 9720 ev.addr.type = addr_type; 9721 9722 mgmt_event(MGMT_EV_ADV_MONITOR_DEVICE_LOST, hdev, &ev, sizeof(ev), 9723 NULL); 9724 } 9725 9726 static void mgmt_send_adv_monitor_device_found(struct hci_dev *hdev, 9727 struct sk_buff *skb, 9728 struct sock *skip_sk, 9729 u16 handle) 9730 { 9731 struct sk_buff *advmon_skb; 9732 size_t advmon_skb_len; 9733 __le16 *monitor_handle; 9734 9735 if (!skb) 9736 return; 9737 9738 advmon_skb_len = (sizeof(struct mgmt_ev_adv_monitor_device_found) - 9739 sizeof(struct mgmt_ev_device_found)) + skb->len; 9740 advmon_skb = mgmt_alloc_skb(hdev, MGMT_EV_ADV_MONITOR_DEVICE_FOUND, 9741 advmon_skb_len); 9742 if (!advmon_skb) 9743 return; 9744 9745 /* ADV_MONITOR_DEVICE_FOUND is similar to DEVICE_FOUND event except 9746 * that it also has 'monitor_handle'. Make a copy of DEVICE_FOUND and 9747 * store monitor_handle of the matched monitor. 9748 */ 9749 monitor_handle = skb_put(advmon_skb, sizeof(*monitor_handle)); 9750 *monitor_handle = cpu_to_le16(handle); 9751 skb_put_data(advmon_skb, skb->data, skb->len); 9752 9753 mgmt_event_skb(advmon_skb, skip_sk); 9754 } 9755 9756 static void mgmt_adv_monitor_device_found(struct hci_dev *hdev, 9757 bdaddr_t *bdaddr, bool report_device, 9758 struct sk_buff *skb, 9759 struct sock *skip_sk) 9760 { 9761 struct monitored_device *dev, *tmp; 9762 bool matched = false; 9763 bool notified = false; 9764 9765 /* We have received the Advertisement Report because: 9766 * 1. the kernel has initiated active discovery 9767 * 2. if not, we have pend_le_reports > 0 in which case we are doing 9768 * passive scanning 9769 * 3. if none of the above is true, we have one or more active 9770 * Advertisement Monitor 9771 * 9772 * For case 1 and 2, report all advertisements via MGMT_EV_DEVICE_FOUND 9773 * and report ONLY one advertisement per device for the matched Monitor 9774 * via MGMT_EV_ADV_MONITOR_DEVICE_FOUND event. 9775 * 9776 * For case 3, since we are not active scanning and all advertisements 9777 * received are due to a matched Advertisement Monitor, report all 9778 * advertisements ONLY via MGMT_EV_ADV_MONITOR_DEVICE_FOUND event. 9779 */ 9780 if (report_device && !hdev->advmon_pend_notify) { 9781 mgmt_event_skb(skb, skip_sk); 9782 return; 9783 } 9784 9785 hdev->advmon_pend_notify = false; 9786 9787 list_for_each_entry_safe(dev, tmp, &hdev->monitored_devices, list) { 9788 if (!bacmp(&dev->bdaddr, bdaddr)) { 9789 matched = true; 9790 9791 if (!dev->notified) { 9792 mgmt_send_adv_monitor_device_found(hdev, skb, 9793 skip_sk, 9794 dev->handle); 9795 notified = true; 9796 dev->notified = true; 9797 } 9798 } 9799 9800 if (!dev->notified) 9801 hdev->advmon_pend_notify = true; 9802 } 9803 9804 if (!report_device && 9805 ((matched && !notified) || !msft_monitor_supported(hdev))) { 9806 /* Handle 0 indicates that we are not active scanning and this 9807 * is a subsequent advertisement report for an already matched 9808 * Advertisement Monitor or the controller offloading support 9809 * is not available. 9810 */ 9811 mgmt_send_adv_monitor_device_found(hdev, skb, skip_sk, 0); 9812 } 9813 9814 if (report_device) 9815 mgmt_event_skb(skb, skip_sk); 9816 else 9817 kfree_skb(skb); 9818 } 9819 9820 void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, 9821 u8 addr_type, u8 *dev_class, s8 rssi, u32 flags, 9822 u8 *eir, u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len) 9823 { 9824 struct sk_buff *skb; 9825 struct mgmt_ev_device_found *ev; 9826 bool report_device = hci_discovery_active(hdev); 9827 9828 /* Don't send events for a non-kernel initiated discovery. With 9829 * LE one exception is if we have pend_le_reports > 0 in which 9830 * case we're doing passive scanning and want these events. 9831 */ 9832 if (!hci_discovery_active(hdev)) { 9833 if (link_type == ACL_LINK) 9834 return; 9835 if (link_type == LE_LINK && !list_empty(&hdev->pend_le_reports)) 9836 report_device = true; 9837 else if (!hci_is_adv_monitoring(hdev)) 9838 return; 9839 } 9840 9841 if (hdev->discovery.result_filtering) { 9842 /* We are using service discovery */ 9843 if (!is_filter_match(hdev, rssi, eir, eir_len, scan_rsp, 9844 scan_rsp_len)) 9845 return; 9846 } 9847 9848 if (hdev->discovery.limited) { 9849 /* Check for limited discoverable bit */ 9850 if (dev_class) { 9851 if (!(dev_class[1] & 0x20)) 9852 return; 9853 } else { 9854 u8 *flags = eir_get_data(eir, eir_len, EIR_FLAGS, NULL); 9855 if (!flags || !(flags[0] & LE_AD_LIMITED)) 9856 return; 9857 } 9858 } 9859 9860 /* Allocate skb. The 5 extra bytes are for the potential CoD field */ 9861 skb = mgmt_alloc_skb(hdev, MGMT_EV_DEVICE_FOUND, 9862 sizeof(*ev) + eir_len + scan_rsp_len + 5); 9863 if (!skb) 9864 return; 9865 9866 ev = skb_put(skb, sizeof(*ev)); 9867 9868 /* In case of device discovery with BR/EDR devices (pre 1.2), the 9869 * RSSI value was reported as 0 when not available. This behavior 9870 * is kept when using device discovery. This is required for full 9871 * backwards compatibility with the API. 9872 * 9873 * However when using service discovery, the value 127 will be 9874 * returned when the RSSI is not available. 9875 */ 9876 if (rssi == HCI_RSSI_INVALID && !hdev->discovery.report_invalid_rssi && 9877 link_type == ACL_LINK) 9878 rssi = 0; 9879 9880 bacpy(&ev->addr.bdaddr, bdaddr); 9881 ev->addr.type = link_to_bdaddr(link_type, addr_type); 9882 ev->rssi = rssi; 9883 ev->flags = cpu_to_le32(flags); 9884 9885 if (eir_len > 0) 9886 /* Copy EIR or advertising data into event */ 9887 skb_put_data(skb, eir, eir_len); 9888 9889 if (dev_class && !eir_get_data(eir, eir_len, EIR_CLASS_OF_DEV, NULL)) { 9890 u8 eir_cod[5]; 9891 9892 eir_len += eir_append_data(eir_cod, 0, EIR_CLASS_OF_DEV, 9893 dev_class, 3); 9894 skb_put_data(skb, eir_cod, sizeof(eir_cod)); 9895 } 9896 9897 if (scan_rsp_len > 0) 9898 /* Append scan response data to event */ 9899 skb_put_data(skb, scan_rsp, scan_rsp_len); 9900 9901 ev->eir_len = cpu_to_le16(eir_len + scan_rsp_len); 9902 9903 mgmt_adv_monitor_device_found(hdev, bdaddr, report_device, skb, NULL); 9904 } 9905 9906 void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, 9907 u8 addr_type, s8 rssi, u8 *name, u8 name_len) 9908 { 9909 struct sk_buff *skb; 9910 struct mgmt_ev_device_found *ev; 9911 u16 eir_len = 0; 9912 u32 flags = 0; 9913 9914 skb = mgmt_alloc_skb(hdev, MGMT_EV_DEVICE_FOUND, 9915 sizeof(*ev) + (name ? eir_precalc_len(name_len) : 0)); 9916 9917 ev = skb_put(skb, sizeof(*ev)); 9918 bacpy(&ev->addr.bdaddr, bdaddr); 9919 ev->addr.type = link_to_bdaddr(link_type, addr_type); 9920 ev->rssi = rssi; 9921 9922 if (name) 9923 eir_len += eir_skb_put_data(skb, EIR_NAME_COMPLETE, name, name_len); 9924 else 9925 flags = MGMT_DEV_FOUND_NAME_REQUEST_FAILED; 9926 9927 ev->eir_len = cpu_to_le16(eir_len); 9928 ev->flags = cpu_to_le32(flags); 9929 9930 mgmt_event_skb(skb, NULL); 9931 } 9932 9933 void mgmt_discovering(struct hci_dev *hdev, u8 discovering) 9934 { 9935 struct mgmt_ev_discovering ev; 9936 9937 bt_dev_dbg(hdev, "discovering %u", discovering); 9938 9939 memset(&ev, 0, sizeof(ev)); 9940 ev.type = hdev->discovery.type; 9941 ev.discovering = discovering; 9942 9943 mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL); 9944 } 9945 9946 void mgmt_suspending(struct hci_dev *hdev, u8 state) 9947 { 9948 struct mgmt_ev_controller_suspend ev; 9949 9950 ev.suspend_state = state; 9951 mgmt_event(MGMT_EV_CONTROLLER_SUSPEND, hdev, &ev, sizeof(ev), NULL); 9952 } 9953 9954 void mgmt_resuming(struct hci_dev *hdev, u8 reason, bdaddr_t *bdaddr, 9955 u8 addr_type) 9956 { 9957 struct mgmt_ev_controller_resume ev; 9958 9959 ev.wake_reason = reason; 9960 if (bdaddr) { 9961 bacpy(&ev.addr.bdaddr, bdaddr); 9962 ev.addr.type = addr_type; 9963 } else { 9964 memset(&ev.addr, 0, sizeof(ev.addr)); 9965 } 9966 9967 mgmt_event(MGMT_EV_CONTROLLER_RESUME, hdev, &ev, sizeof(ev), NULL); 9968 } 9969 9970 static struct hci_mgmt_chan chan = { 9971 .channel = HCI_CHANNEL_CONTROL, 9972 .handler_count = ARRAY_SIZE(mgmt_handlers), 9973 .handlers = mgmt_handlers, 9974 .hdev_init = mgmt_init_hdev, 9975 }; 9976 9977 int mgmt_init(void) 9978 { 9979 return hci_mgmt_chan_register(&chan); 9980 } 9981 9982 void mgmt_exit(void) 9983 { 9984 hci_mgmt_chan_unregister(&chan); 9985 } 9986