| /* |
| BlueZ - Bluetooth protocol stack for Linux |
| |
| Copyright (C) 2010 Nokia Corporation |
| Copyright (C) 2011-2012 Intel Corporation |
| |
| This program is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License version 2 as |
| published by the Free Software Foundation; |
| |
| THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
| OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. |
| IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY |
| CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES |
| WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| |
| ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, |
| COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS |
| SOFTWARE IS DISCLAIMED. |
| */ |
| |
| /* Bluetooth HCI Management interface */ |
| |
| #include <linux/module.h> |
| #include <asm/unaligned.h> |
| |
| #include <net/bluetooth/bluetooth.h> |
| #include <net/bluetooth/hci_core.h> |
| #include <net/bluetooth/hci_sock.h> |
| #include <net/bluetooth/l2cap.h> |
| #include <net/bluetooth/mgmt.h> |
| |
| #include "hci_request.h" |
| #include "smp.h" |
| #include "mgmt_util.h" |
| |
| #define MGMT_VERSION 1 |
| #define MGMT_REVISION 11 |
| |
| static const u16 mgmt_commands[] = { |
| MGMT_OP_READ_INDEX_LIST, |
| MGMT_OP_READ_INFO, |
| MGMT_OP_SET_POWERED, |
| MGMT_OP_SET_DISCOVERABLE, |
| MGMT_OP_SET_CONNECTABLE, |
| MGMT_OP_SET_FAST_CONNECTABLE, |
| MGMT_OP_SET_BONDABLE, |
| MGMT_OP_SET_LINK_SECURITY, |
| MGMT_OP_SET_SSP, |
| MGMT_OP_SET_HS, |
| MGMT_OP_SET_LE, |
| MGMT_OP_SET_DEV_CLASS, |
| MGMT_OP_SET_LOCAL_NAME, |
| MGMT_OP_ADD_UUID, |
| MGMT_OP_REMOVE_UUID, |
| MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_OP_LOAD_LONG_TERM_KEYS, |
| MGMT_OP_DISCONNECT, |
| MGMT_OP_GET_CONNECTIONS, |
| MGMT_OP_PIN_CODE_REPLY, |
| MGMT_OP_PIN_CODE_NEG_REPLY, |
| MGMT_OP_SET_IO_CAPABILITY, |
| MGMT_OP_PAIR_DEVICE, |
| MGMT_OP_CANCEL_PAIR_DEVICE, |
| MGMT_OP_UNPAIR_DEVICE, |
| MGMT_OP_USER_CONFIRM_REPLY, |
| MGMT_OP_USER_CONFIRM_NEG_REPLY, |
| MGMT_OP_USER_PASSKEY_REPLY, |
| MGMT_OP_USER_PASSKEY_NEG_REPLY, |
| MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, |
| MGMT_OP_REMOVE_REMOTE_OOB_DATA, |
| MGMT_OP_START_DISCOVERY, |
| MGMT_OP_STOP_DISCOVERY, |
| MGMT_OP_CONFIRM_NAME, |
| MGMT_OP_BLOCK_DEVICE, |
| MGMT_OP_UNBLOCK_DEVICE, |
| MGMT_OP_SET_DEVICE_ID, |
| MGMT_OP_SET_ADVERTISING, |
| MGMT_OP_SET_BREDR, |
| MGMT_OP_SET_STATIC_ADDRESS, |
| MGMT_OP_SET_SCAN_PARAMS, |
| MGMT_OP_SET_SECURE_CONN, |
| MGMT_OP_SET_DEBUG_KEYS, |
| MGMT_OP_SET_PRIVACY, |
| MGMT_OP_LOAD_IRKS, |
| MGMT_OP_GET_CONN_INFO, |
| MGMT_OP_GET_CLOCK_INFO, |
| MGMT_OP_ADD_DEVICE, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_OP_LOAD_CONN_PARAM, |
| MGMT_OP_READ_UNCONF_INDEX_LIST, |
| MGMT_OP_READ_CONFIG_INFO, |
| MGMT_OP_SET_EXTERNAL_CONFIG, |
| MGMT_OP_SET_PUBLIC_ADDRESS, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_OP_READ_LOCAL_OOB_EXT_DATA, |
| MGMT_OP_READ_EXT_INDEX_LIST, |
| MGMT_OP_READ_ADV_FEATURES, |
| MGMT_OP_ADD_ADVERTISING, |
| MGMT_OP_REMOVE_ADVERTISING, |
| MGMT_OP_GET_ADV_SIZE_INFO, |
| }; |
| |
| static const u16 mgmt_events[] = { |
| MGMT_EV_CONTROLLER_ERROR, |
| MGMT_EV_INDEX_ADDED, |
| MGMT_EV_INDEX_REMOVED, |
| MGMT_EV_NEW_SETTINGS, |
| MGMT_EV_CLASS_OF_DEV_CHANGED, |
| MGMT_EV_LOCAL_NAME_CHANGED, |
| MGMT_EV_NEW_LINK_KEY, |
| MGMT_EV_NEW_LONG_TERM_KEY, |
| MGMT_EV_DEVICE_CONNECTED, |
| MGMT_EV_DEVICE_DISCONNECTED, |
| MGMT_EV_CONNECT_FAILED, |
| MGMT_EV_PIN_CODE_REQUEST, |
| MGMT_EV_USER_CONFIRM_REQUEST, |
| MGMT_EV_USER_PASSKEY_REQUEST, |
| MGMT_EV_AUTH_FAILED, |
| MGMT_EV_DEVICE_FOUND, |
| MGMT_EV_DISCOVERING, |
| MGMT_EV_DEVICE_BLOCKED, |
| MGMT_EV_DEVICE_UNBLOCKED, |
| MGMT_EV_DEVICE_UNPAIRED, |
| MGMT_EV_PASSKEY_NOTIFY, |
| MGMT_EV_NEW_IRK, |
| MGMT_EV_NEW_CSRK, |
| MGMT_EV_DEVICE_ADDED, |
| MGMT_EV_DEVICE_REMOVED, |
| MGMT_EV_NEW_CONN_PARAM, |
| MGMT_EV_UNCONF_INDEX_ADDED, |
| MGMT_EV_UNCONF_INDEX_REMOVED, |
| MGMT_EV_NEW_CONFIG_OPTIONS, |
| MGMT_EV_EXT_INDEX_ADDED, |
| MGMT_EV_EXT_INDEX_REMOVED, |
| MGMT_EV_LOCAL_OOB_DATA_UPDATED, |
| MGMT_EV_ADVERTISING_ADDED, |
| MGMT_EV_ADVERTISING_REMOVED, |
| }; |
| |
| static const u16 mgmt_untrusted_commands[] = { |
| MGMT_OP_READ_INDEX_LIST, |
| MGMT_OP_READ_INFO, |
| MGMT_OP_READ_UNCONF_INDEX_LIST, |
| MGMT_OP_READ_CONFIG_INFO, |
| MGMT_OP_READ_EXT_INDEX_LIST, |
| }; |
| |
| static const u16 mgmt_untrusted_events[] = { |
| MGMT_EV_INDEX_ADDED, |
| MGMT_EV_INDEX_REMOVED, |
| MGMT_EV_NEW_SETTINGS, |
| MGMT_EV_CLASS_OF_DEV_CHANGED, |
| MGMT_EV_LOCAL_NAME_CHANGED, |
| MGMT_EV_UNCONF_INDEX_ADDED, |
| MGMT_EV_UNCONF_INDEX_REMOVED, |
| MGMT_EV_NEW_CONFIG_OPTIONS, |
| MGMT_EV_EXT_INDEX_ADDED, |
| MGMT_EV_EXT_INDEX_REMOVED, |
| }; |
| |
| #define CACHE_TIMEOUT msecs_to_jiffies(2 * 1000) |
| |
| #define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \ |
| "\x00\x00\x00\x00\x00\x00\x00\x00" |
| |
| /* HCI to MGMT error code conversion table */ |
| static u8 mgmt_status_table[] = { |
| MGMT_STATUS_SUCCESS, |
| MGMT_STATUS_UNKNOWN_COMMAND, /* Unknown Command */ |
| MGMT_STATUS_NOT_CONNECTED, /* No Connection */ |
| MGMT_STATUS_FAILED, /* Hardware Failure */ |
| MGMT_STATUS_CONNECT_FAILED, /* Page Timeout */ |
| MGMT_STATUS_AUTH_FAILED, /* Authentication Failed */ |
| MGMT_STATUS_AUTH_FAILED, /* PIN or Key Missing */ |
| MGMT_STATUS_NO_RESOURCES, /* Memory Full */ |
| MGMT_STATUS_TIMEOUT, /* Connection Timeout */ |
| MGMT_STATUS_NO_RESOURCES, /* Max Number of Connections */ |
| MGMT_STATUS_NO_RESOURCES, /* Max Number of SCO Connections */ |
| MGMT_STATUS_ALREADY_CONNECTED, /* ACL Connection Exists */ |
| MGMT_STATUS_BUSY, /* Command Disallowed */ |
| MGMT_STATUS_NO_RESOURCES, /* Rejected Limited Resources */ |
| MGMT_STATUS_REJECTED, /* Rejected Security */ |
| MGMT_STATUS_REJECTED, /* Rejected Personal */ |
| MGMT_STATUS_TIMEOUT, /* Host Timeout */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Feature */ |
| MGMT_STATUS_INVALID_PARAMS, /* Invalid Parameters */ |
| MGMT_STATUS_DISCONNECTED, /* OE User Ended Connection */ |
| MGMT_STATUS_NO_RESOURCES, /* OE Low Resources */ |
| MGMT_STATUS_DISCONNECTED, /* OE Power Off */ |
| MGMT_STATUS_DISCONNECTED, /* Connection Terminated */ |
| MGMT_STATUS_BUSY, /* Repeated Attempts */ |
| MGMT_STATUS_REJECTED, /* Pairing Not Allowed */ |
| MGMT_STATUS_FAILED, /* Unknown LMP PDU */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Unsupported Remote Feature */ |
| MGMT_STATUS_REJECTED, /* SCO Offset Rejected */ |
| MGMT_STATUS_REJECTED, /* SCO Interval Rejected */ |
| MGMT_STATUS_REJECTED, /* Air Mode Rejected */ |
| MGMT_STATUS_INVALID_PARAMS, /* Invalid LMP Parameters */ |
| MGMT_STATUS_FAILED, /* Unspecified Error */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Unsupported LMP Parameter Value */ |
| MGMT_STATUS_FAILED, /* Role Change Not Allowed */ |
| MGMT_STATUS_TIMEOUT, /* LMP Response Timeout */ |
| MGMT_STATUS_FAILED, /* LMP Error Transaction Collision */ |
| MGMT_STATUS_FAILED, /* LMP PDU Not Allowed */ |
| MGMT_STATUS_REJECTED, /* Encryption Mode Not Accepted */ |
| MGMT_STATUS_FAILED, /* Unit Link Key Used */ |
| MGMT_STATUS_NOT_SUPPORTED, /* QoS Not Supported */ |
| MGMT_STATUS_TIMEOUT, /* Instant Passed */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Pairing Not Supported */ |
| MGMT_STATUS_FAILED, /* Transaction Collision */ |
| MGMT_STATUS_INVALID_PARAMS, /* Unacceptable Parameter */ |
| MGMT_STATUS_REJECTED, /* QoS Rejected */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Classification Not Supported */ |
| MGMT_STATUS_REJECTED, /* Insufficient Security */ |
| MGMT_STATUS_INVALID_PARAMS, /* Parameter Out Of Range */ |
| MGMT_STATUS_BUSY, /* Role Switch Pending */ |
| MGMT_STATUS_FAILED, /* Slot Violation */ |
| MGMT_STATUS_FAILED, /* Role Switch Failed */ |
| MGMT_STATUS_INVALID_PARAMS, /* EIR Too Large */ |
| MGMT_STATUS_NOT_SUPPORTED, /* Simple Pairing Not Supported */ |
| MGMT_STATUS_BUSY, /* Host Busy Pairing */ |
| MGMT_STATUS_REJECTED, /* Rejected, No Suitable Channel */ |
| MGMT_STATUS_BUSY, /* Controller Busy */ |
| MGMT_STATUS_INVALID_PARAMS, /* Unsuitable Connection Interval */ |
| MGMT_STATUS_TIMEOUT, /* Directed Advertising Timeout */ |
| MGMT_STATUS_AUTH_FAILED, /* Terminated Due to MIC Failure */ |
| MGMT_STATUS_CONNECT_FAILED, /* Connection Establishment Failed */ |
| MGMT_STATUS_CONNECT_FAILED, /* MAC Connection Failed */ |
| }; |
| |
| static u8 mgmt_status(u8 hci_status) |
| { |
| if (hci_status < ARRAY_SIZE(mgmt_status_table)) |
| return mgmt_status_table[hci_status]; |
| |
| return MGMT_STATUS_FAILED; |
| } |
| |
| static int mgmt_index_event(u16 event, struct hci_dev *hdev, void *data, |
| u16 len, int flag) |
| { |
| return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, |
| flag, NULL); |
| } |
| |
| static int mgmt_limited_event(u16 event, struct hci_dev *hdev, void *data, |
| u16 len, int flag, struct sock *skip_sk) |
| { |
| return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, |
| flag, skip_sk); |
| } |
| |
| static int mgmt_generic_event(u16 event, struct hci_dev *hdev, void *data, |
| u16 len, struct sock *skip_sk) |
| { |
| return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, |
| HCI_MGMT_GENERIC_EVENTS, skip_sk); |
| } |
| |
| static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 len, |
| struct sock *skip_sk) |
| { |
| return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len, |
| HCI_SOCK_TRUSTED, skip_sk); |
| } |
| |
| static u8 le_addr_type(u8 mgmt_addr_type) |
| { |
| if (mgmt_addr_type == BDADDR_LE_PUBLIC) |
| return ADDR_LE_DEV_PUBLIC; |
| else |
| return ADDR_LE_DEV_RANDOM; |
| } |
| |
| static int read_version(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 data_len) |
| { |
| struct mgmt_rp_read_version rp; |
| |
| BT_DBG("sock %p", sk); |
| |
| rp.version = MGMT_VERSION; |
| rp.revision = cpu_to_le16(MGMT_REVISION); |
| |
| return mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, |
| &rp, sizeof(rp)); |
| } |
| |
| static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 data_len) |
| { |
| struct mgmt_rp_read_commands *rp; |
| u16 num_commands, num_events; |
| size_t rp_size; |
| int i, err; |
| |
| BT_DBG("sock %p", sk); |
| |
| if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) { |
| num_commands = ARRAY_SIZE(mgmt_commands); |
| num_events = ARRAY_SIZE(mgmt_events); |
| } else { |
| num_commands = ARRAY_SIZE(mgmt_untrusted_commands); |
| num_events = ARRAY_SIZE(mgmt_untrusted_events); |
| } |
| |
| rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16)); |
| |
| rp = kmalloc(rp_size, GFP_KERNEL); |
| if (!rp) |
| return -ENOMEM; |
| |
| rp->num_commands = cpu_to_le16(num_commands); |
| rp->num_events = cpu_to_le16(num_events); |
| |
| if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) { |
| __le16 *opcode = rp->opcodes; |
| |
| for (i = 0; i < num_commands; i++, opcode++) |
| put_unaligned_le16(mgmt_commands[i], opcode); |
| |
| for (i = 0; i < num_events; i++, opcode++) |
| put_unaligned_le16(mgmt_events[i], opcode); |
| } else { |
| __le16 *opcode = rp->opcodes; |
| |
| for (i = 0; i < num_commands; i++, opcode++) |
| put_unaligned_le16(mgmt_untrusted_commands[i], opcode); |
| |
| for (i = 0; i < num_events; i++, opcode++) |
| put_unaligned_le16(mgmt_untrusted_events[i], opcode); |
| } |
| |
| err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, |
| rp, rp_size); |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 data_len) |
| { |
| struct mgmt_rp_read_index_list *rp; |
| struct hci_dev *d; |
| size_t rp_len; |
| u16 count; |
| int err; |
| |
| BT_DBG("sock %p", sk); |
| |
| read_lock(&hci_dev_list_lock); |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (d->dev_type == HCI_BREDR && |
| !hci_dev_test_flag(d, HCI_UNCONFIGURED)) |
| count++; |
| } |
| |
| rp_len = sizeof(*rp) + (2 * count); |
| rp = kmalloc(rp_len, GFP_ATOMIC); |
| if (!rp) { |
| read_unlock(&hci_dev_list_lock); |
| return -ENOMEM; |
| } |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (hci_dev_test_flag(d, HCI_SETUP) || |
| hci_dev_test_flag(d, HCI_CONFIG) || |
| hci_dev_test_flag(d, HCI_USER_CHANNEL)) |
| continue; |
| |
| /* Devices marked as raw-only are neither configured |
| * nor unconfigured controllers. |
| */ |
| if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) |
| continue; |
| |
| if (d->dev_type == HCI_BREDR && |
| !hci_dev_test_flag(d, HCI_UNCONFIGURED)) { |
| rp->index[count++] = cpu_to_le16(d->id); |
| BT_DBG("Added hci%u", d->id); |
| } |
| } |
| |
| rp->num_controllers = cpu_to_le16(count); |
| rp_len = sizeof(*rp) + (2 * count); |
| |
| read_unlock(&hci_dev_list_lock); |
| |
| err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, |
| 0, rp, rp_len); |
| |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static int read_unconf_index_list(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_rp_read_unconf_index_list *rp; |
| struct hci_dev *d; |
| size_t rp_len; |
| u16 count; |
| int err; |
| |
| BT_DBG("sock %p", sk); |
| |
| read_lock(&hci_dev_list_lock); |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (d->dev_type == HCI_BREDR && |
| hci_dev_test_flag(d, HCI_UNCONFIGURED)) |
| count++; |
| } |
| |
| rp_len = sizeof(*rp) + (2 * count); |
| rp = kmalloc(rp_len, GFP_ATOMIC); |
| if (!rp) { |
| read_unlock(&hci_dev_list_lock); |
| return -ENOMEM; |
| } |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (hci_dev_test_flag(d, HCI_SETUP) || |
| hci_dev_test_flag(d, HCI_CONFIG) || |
| hci_dev_test_flag(d, HCI_USER_CHANNEL)) |
| continue; |
| |
| /* Devices marked as raw-only are neither configured |
| * nor unconfigured controllers. |
| */ |
| if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) |
| continue; |
| |
| if (d->dev_type == HCI_BREDR && |
| hci_dev_test_flag(d, HCI_UNCONFIGURED)) { |
| rp->index[count++] = cpu_to_le16(d->id); |
| BT_DBG("Added hci%u", d->id); |
| } |
| } |
| |
| rp->num_controllers = cpu_to_le16(count); |
| rp_len = sizeof(*rp) + (2 * count); |
| |
| read_unlock(&hci_dev_list_lock); |
| |
| err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, |
| MGMT_OP_READ_UNCONF_INDEX_LIST, 0, rp, rp_len); |
| |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static int read_ext_index_list(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_rp_read_ext_index_list *rp; |
| struct hci_dev *d; |
| size_t rp_len; |
| u16 count; |
| int err; |
| |
| BT_DBG("sock %p", sk); |
| |
| read_lock(&hci_dev_list_lock); |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (d->dev_type == HCI_BREDR || d->dev_type == HCI_AMP) |
| count++; |
| } |
| |
| rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count); |
| rp = kmalloc(rp_len, GFP_ATOMIC); |
| if (!rp) { |
| read_unlock(&hci_dev_list_lock); |
| return -ENOMEM; |
| } |
| |
| count = 0; |
| list_for_each_entry(d, &hci_dev_list, list) { |
| if (hci_dev_test_flag(d, HCI_SETUP) || |
| hci_dev_test_flag(d, HCI_CONFIG) || |
| hci_dev_test_flag(d, HCI_USER_CHANNEL)) |
| continue; |
| |
| /* Devices marked as raw-only are neither configured |
| * nor unconfigured controllers. |
| */ |
| if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks)) |
| continue; |
| |
| if (d->dev_type == HCI_BREDR) { |
| if (hci_dev_test_flag(d, HCI_UNCONFIGURED)) |
| rp->entry[count].type = 0x01; |
| else |
| rp->entry[count].type = 0x00; |
| } else if (d->dev_type == HCI_AMP) { |
| rp->entry[count].type = 0x02; |
| } else { |
| continue; |
| } |
| |
| rp->entry[count].bus = d->bus; |
| rp->entry[count++].index = cpu_to_le16(d->id); |
| BT_DBG("Added hci%u", d->id); |
| } |
| |
| rp->num_controllers = cpu_to_le16(count); |
| rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count); |
| |
| read_unlock(&hci_dev_list_lock); |
| |
| /* If this command is called at least once, then all the |
| * default index and unconfigured index events are disabled |
| * and from now on only extended index events are used. |
| */ |
| hci_sock_set_flag(sk, HCI_MGMT_EXT_INDEX_EVENTS); |
| hci_sock_clear_flag(sk, HCI_MGMT_INDEX_EVENTS); |
| hci_sock_clear_flag(sk, HCI_MGMT_UNCONF_INDEX_EVENTS); |
| |
| err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, |
| MGMT_OP_READ_EXT_INDEX_LIST, 0, rp, rp_len); |
| |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static bool is_configured(struct hci_dev *hdev) |
| { |
| if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) && |
| !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED)) |
| return false; |
| |
| if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) && |
| !bacmp(&hdev->public_addr, BDADDR_ANY)) |
| return false; |
| |
| return true; |
| } |
| |
| static __le32 get_missing_options(struct hci_dev *hdev) |
| { |
| u32 options = 0; |
| |
| if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) && |
| !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED)) |
| options |= MGMT_OPTION_EXTERNAL_CONFIG; |
| |
| if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) && |
| !bacmp(&hdev->public_addr, BDADDR_ANY)) |
| options |= MGMT_OPTION_PUBLIC_ADDRESS; |
| |
| return cpu_to_le32(options); |
| } |
| |
| static int new_options(struct hci_dev *hdev, struct sock *skip) |
| { |
| __le32 options = get_missing_options(hdev); |
| |
| return mgmt_generic_event(MGMT_EV_NEW_CONFIG_OPTIONS, hdev, &options, |
| sizeof(options), skip); |
| } |
| |
| static int send_options_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev) |
| { |
| __le32 options = get_missing_options(hdev); |
| |
| return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &options, |
| sizeof(options)); |
| } |
| |
| static int read_config_info(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_rp_read_config_info rp; |
| u32 options = 0; |
| |
| BT_DBG("sock %p %s", sk, hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| memset(&rp, 0, sizeof(rp)); |
| rp.manufacturer = cpu_to_le16(hdev->manufacturer); |
| |
| if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks)) |
| options |= MGMT_OPTION_EXTERNAL_CONFIG; |
| |
| if (hdev->set_bdaddr) |
| options |= MGMT_OPTION_PUBLIC_ADDRESS; |
| |
| rp.supported_options = cpu_to_le32(options); |
| rp.missing_options = get_missing_options(hdev); |
| |
| hci_dev_unlock(hdev); |
| |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_CONFIG_INFO, 0, |
| &rp, sizeof(rp)); |
| } |
| |
| static u32 get_supported_settings(struct hci_dev *hdev) |
| { |
| u32 settings = 0; |
| |
| settings |= MGMT_SETTING_POWERED; |
| settings |= MGMT_SETTING_BONDABLE; |
| settings |= MGMT_SETTING_DEBUG_KEYS; |
| settings |= MGMT_SETTING_CONNECTABLE; |
| settings |= MGMT_SETTING_DISCOVERABLE; |
| |
| if (lmp_bredr_capable(hdev)) { |
| if (hdev->hci_ver >= BLUETOOTH_VER_1_2) |
| settings |= MGMT_SETTING_FAST_CONNECTABLE; |
| settings |= MGMT_SETTING_BREDR; |
| settings |= MGMT_SETTING_LINK_SECURITY; |
| |
| if (lmp_ssp_capable(hdev)) { |
| settings |= MGMT_SETTING_SSP; |
| settings |= MGMT_SETTING_HS; |
| } |
| |
| if (lmp_sc_capable(hdev)) |
| settings |= MGMT_SETTING_SECURE_CONN; |
| } |
| |
| if (lmp_le_capable(hdev)) { |
| settings |= MGMT_SETTING_LE; |
| settings |= MGMT_SETTING_ADVERTISING; |
| settings |= MGMT_SETTING_SECURE_CONN; |
| settings |= MGMT_SETTING_PRIVACY; |
| settings |= MGMT_SETTING_STATIC_ADDRESS; |
| } |
| |
| if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) || |
| hdev->set_bdaddr) |
| settings |= MGMT_SETTING_CONFIGURATION; |
| |
| return settings; |
| } |
| |
| static u32 get_current_settings(struct hci_dev *hdev) |
| { |
| u32 settings = 0; |
| |
| if (hdev_is_powered(hdev)) |
| settings |= MGMT_SETTING_POWERED; |
| |
| if (hci_dev_test_flag(hdev, HCI_CONNECTABLE)) |
| settings |= MGMT_SETTING_CONNECTABLE; |
| |
| if (hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) |
| settings |= MGMT_SETTING_FAST_CONNECTABLE; |
| |
| if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) |
| settings |= MGMT_SETTING_DISCOVERABLE; |
| |
| if (hci_dev_test_flag(hdev, HCI_BONDABLE)) |
| settings |= MGMT_SETTING_BONDABLE; |
| |
| if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) |
| settings |= MGMT_SETTING_BREDR; |
| |
| if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) |
| settings |= MGMT_SETTING_LE; |
| |
| if (hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) |
| settings |= MGMT_SETTING_LINK_SECURITY; |
| |
| if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) |
| settings |= MGMT_SETTING_SSP; |
| |
| if (hci_dev_test_flag(hdev, HCI_HS_ENABLED)) |
| settings |= MGMT_SETTING_HS; |
| |
| if (hci_dev_test_flag(hdev, HCI_ADVERTISING)) |
| settings |= MGMT_SETTING_ADVERTISING; |
| |
| if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) |
| settings |= MGMT_SETTING_SECURE_CONN; |
| |
| if (hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS)) |
| settings |= MGMT_SETTING_DEBUG_KEYS; |
| |
| if (hci_dev_test_flag(hdev, HCI_PRIVACY)) |
| settings |= MGMT_SETTING_PRIVACY; |
| |
| /* The current setting for static address has two purposes. The |
| * first is to indicate if the static address will be used and |
| * the second is to indicate if it is actually set. |
| * |
| * This means if the static address is not configured, this flag |
| * will never be set. If the address is configured, then if the |
| * address is actually used decides if the flag is set or not. |
| * |
| * For single mode LE only controllers and dual-mode controllers |
| * with BR/EDR disabled, the existence of the static address will |
| * be evaluated. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) || |
| !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) || |
| !bacmp(&hdev->bdaddr, BDADDR_ANY)) { |
| if (bacmp(&hdev->static_addr, BDADDR_ANY)) |
| settings |= MGMT_SETTING_STATIC_ADDRESS; |
| } |
| |
| return settings; |
| } |
| |
| static struct mgmt_pending_cmd *pending_find(u16 opcode, struct hci_dev *hdev) |
| { |
| return mgmt_pending_find(HCI_CHANNEL_CONTROL, opcode, hdev); |
| } |
| |
| static struct mgmt_pending_cmd *pending_find_data(u16 opcode, |
| struct hci_dev *hdev, |
| const void *data) |
| { |
| return mgmt_pending_find_data(HCI_CHANNEL_CONTROL, opcode, hdev, data); |
| } |
| |
| u8 mgmt_get_adv_discov_flags(struct hci_dev *hdev) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| /* If there's a pending mgmt command the flags will not yet have |
| * their final values, so check for this first. |
| */ |
| cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev); |
| if (cmd) { |
| struct mgmt_mode *cp = cmd->param; |
| if (cp->val == 0x01) |
| return LE_AD_GENERAL; |
| else if (cp->val == 0x02) |
| return LE_AD_LIMITED; |
| } else { |
| if (hci_dev_test_flag(hdev, HCI_LIMITED_DISCOVERABLE)) |
| return LE_AD_LIMITED; |
| else if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) |
| return LE_AD_GENERAL; |
| } |
| |
| return 0; |
| } |
| |
| bool mgmt_get_connectable(struct hci_dev *hdev) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| /* If there's a pending mgmt command the flag will not yet have |
| * it's final value, so check for this first. |
| */ |
| cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev); |
| if (cmd) { |
| struct mgmt_mode *cp = cmd->param; |
| |
| return cp->val; |
| } |
| |
| return hci_dev_test_flag(hdev, HCI_CONNECTABLE); |
| } |
| |
| static void service_cache_off(struct work_struct *work) |
| { |
| struct hci_dev *hdev = container_of(work, struct hci_dev, |
| service_cache.work); |
| struct hci_request req; |
| |
| if (!hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) |
| return; |
| |
| hci_req_init(&req, hdev); |
| |
| hci_dev_lock(hdev); |
| |
| __hci_req_update_eir(&req); |
| __hci_req_update_class(&req); |
| |
| hci_dev_unlock(hdev); |
| |
| hci_req_run(&req, NULL); |
| } |
| |
| static void rpa_expired(struct work_struct *work) |
| { |
| struct hci_dev *hdev = container_of(work, struct hci_dev, |
| rpa_expired.work); |
| struct hci_request req; |
| |
| BT_DBG(""); |
| |
| hci_dev_set_flag(hdev, HCI_RPA_EXPIRED); |
| |
| if (!hci_dev_test_flag(hdev, HCI_ADVERTISING)) |
| return; |
| |
| /* The generation of a new RPA and programming it into the |
| * controller happens in the hci_req_enable_advertising() |
| * function. |
| */ |
| hci_req_init(&req, hdev); |
| __hci_req_enable_advertising(&req); |
| hci_req_run(&req, NULL); |
| } |
| |
| static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev) |
| { |
| if (hci_dev_test_and_set_flag(hdev, HCI_MGMT)) |
| return; |
| |
| INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off); |
| INIT_DELAYED_WORK(&hdev->rpa_expired, rpa_expired); |
| |
| /* Non-mgmt controlled devices get this bit set |
| * implicitly so that pairing works for them, however |
| * for mgmt we require user-space to explicitly enable |
| * it |
| */ |
| hci_dev_clear_flag(hdev, HCI_BONDABLE); |
| } |
| |
| static int read_controller_info(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_rp_read_info rp; |
| |
| BT_DBG("sock %p %s", sk, hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| memset(&rp, 0, sizeof(rp)); |
| |
| bacpy(&rp.bdaddr, &hdev->bdaddr); |
| |
| rp.version = hdev->hci_ver; |
| rp.manufacturer = cpu_to_le16(hdev->manufacturer); |
| |
| rp.supported_settings = cpu_to_le32(get_supported_settings(hdev)); |
| rp.current_settings = cpu_to_le32(get_current_settings(hdev)); |
| |
| memcpy(rp.dev_class, hdev->dev_class, 3); |
| |
| memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name)); |
| memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name)); |
| |
| hci_dev_unlock(hdev); |
| |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp, |
| sizeof(rp)); |
| } |
| |
| static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev) |
| { |
| __le32 settings = cpu_to_le32(get_current_settings(hdev)); |
| |
| return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &settings, |
| sizeof(settings)); |
| } |
| |
| static void clean_up_hci_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| BT_DBG("%s status 0x%02x", hdev->name, status); |
| |
| if (hci_conn_count(hdev) == 0) { |
| cancel_delayed_work(&hdev->power_off); |
| queue_work(hdev->req_workqueue, &hdev->power_off.work); |
| } |
| } |
| |
| void mgmt_advertising_added(struct sock *sk, struct hci_dev *hdev, u8 instance) |
| { |
| struct mgmt_ev_advertising_added ev; |
| |
| ev.instance = instance; |
| |
| mgmt_event(MGMT_EV_ADVERTISING_ADDED, hdev, &ev, sizeof(ev), sk); |
| } |
| |
| void mgmt_advertising_removed(struct sock *sk, struct hci_dev *hdev, |
| u8 instance) |
| { |
| struct mgmt_ev_advertising_removed ev; |
| |
| ev.instance = instance; |
| |
| mgmt_event(MGMT_EV_ADVERTISING_REMOVED, hdev, &ev, sizeof(ev), sk); |
| } |
| |
| static void cancel_adv_timeout(struct hci_dev *hdev) |
| { |
| if (hdev->adv_instance_timeout) { |
| hdev->adv_instance_timeout = 0; |
| cancel_delayed_work(&hdev->adv_instance_expire); |
| } |
| } |
| |
| static int clean_up_hci_state(struct hci_dev *hdev) |
| { |
| struct hci_request req; |
| struct hci_conn *conn; |
| bool discov_stopped; |
| int err; |
| |
| hci_req_init(&req, hdev); |
| |
| if (test_bit(HCI_ISCAN, &hdev->flags) || |
| test_bit(HCI_PSCAN, &hdev->flags)) { |
| u8 scan = 0x00; |
| hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan); |
| } |
| |
| hci_req_clear_adv_instance(hdev, NULL, 0x00, false); |
| |
| if (hci_dev_test_flag(hdev, HCI_LE_ADV)) |
| __hci_req_disable_advertising(&req); |
| |
| discov_stopped = hci_req_stop_discovery(&req); |
| |
| list_for_each_entry(conn, &hdev->conn_hash.list, list) { |
| /* 0x15 == Terminated due to Power Off */ |
| __hci_abort_conn(&req, conn, 0x15); |
| } |
| |
| err = hci_req_run(&req, clean_up_hci_complete); |
| if (!err && discov_stopped) |
| hci_discovery_set_state(hdev, DISCOVERY_STOPPING); |
| |
| return err; |
| } |
| |
| static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_find(MGMT_OP_SET_POWERED, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| if (!!cp->val == hdev_is_powered(hdev)) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| if (cp->val) { |
| queue_work(hdev->req_workqueue, &hdev->power_on); |
| err = 0; |
| } else { |
| /* Disconnect connections, stop scans, etc */ |
| err = clean_up_hci_state(hdev); |
| if (!err) |
| queue_delayed_work(hdev->req_workqueue, &hdev->power_off, |
| HCI_POWER_OFF_TIMEOUT); |
| |
| /* ENODATA means there were no HCI commands queued */ |
| if (err == -ENODATA) { |
| cancel_delayed_work(&hdev->power_off); |
| queue_work(hdev->req_workqueue, &hdev->power_off.work); |
| err = 0; |
| } |
| } |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int new_settings(struct hci_dev *hdev, struct sock *skip) |
| { |
| __le32 ev = cpu_to_le32(get_current_settings(hdev)); |
| |
| return mgmt_generic_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, |
| sizeof(ev), skip); |
| } |
| |
| int mgmt_new_settings(struct hci_dev *hdev) |
| { |
| return new_settings(hdev, NULL); |
| } |
| |
| struct cmd_lookup { |
| struct sock *sk; |
| struct hci_dev *hdev; |
| u8 mgmt_status; |
| }; |
| |
| static void settings_rsp(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| struct cmd_lookup *match = data; |
| |
| send_settings_rsp(cmd->sk, cmd->opcode, match->hdev); |
| |
| list_del(&cmd->list); |
| |
| if (match->sk == NULL) { |
| match->sk = cmd->sk; |
| sock_hold(match->sk); |
| } |
| |
| mgmt_pending_free(cmd); |
| } |
| |
| static void cmd_status_rsp(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| u8 *status = data; |
| |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, *status); |
| mgmt_pending_remove(cmd); |
| } |
| |
| static void cmd_complete_rsp(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| if (cmd->cmd_complete) { |
| u8 *status = data; |
| |
| cmd->cmd_complete(cmd, *status); |
| mgmt_pending_remove(cmd); |
| |
| return; |
| } |
| |
| cmd_status_rsp(cmd, data); |
| } |
| |
| static int generic_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) |
| { |
| return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, |
| cmd->param, cmd->param_len); |
| } |
| |
| static int addr_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) |
| { |
| return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, |
| cmd->param, sizeof(struct mgmt_addr_info)); |
| } |
| |
| static u8 mgmt_bredr_support(struct hci_dev *hdev) |
| { |
| if (!lmp_bredr_capable(hdev)) |
| return MGMT_STATUS_NOT_SUPPORTED; |
| else if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) |
| return MGMT_STATUS_REJECTED; |
| else |
| return MGMT_STATUS_SUCCESS; |
| } |
| |
| static u8 mgmt_le_support(struct hci_dev *hdev) |
| { |
| if (!lmp_le_capable(hdev)) |
| return MGMT_STATUS_NOT_SUPPORTED; |
| else if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) |
| return MGMT_STATUS_REJECTED; |
| else |
| return MGMT_STATUS_SUCCESS; |
| } |
| |
| void mgmt_set_discoverable_complete(struct hci_dev *hdev, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status 0x%02x", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); |
| hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); |
| goto remove_cmd; |
| } |
| |
| if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE) && |
| hdev->discov_timeout > 0) { |
| int to = msecs_to_jiffies(hdev->discov_timeout * 1000); |
| queue_delayed_work(hdev->req_workqueue, &hdev->discov_off, to); |
| } |
| |
| send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev); |
| new_settings(hdev, cmd->sk); |
| |
| remove_cmd: |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_set_discoverable *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| u16 timeout; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) && |
| !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| timeout = __le16_to_cpu(cp->timeout); |
| |
| /* Disabling discoverable requires that no timeout is set, |
| * and enabling limited discoverable requires a timeout. |
| */ |
| if ((cp->val == 0x00 && timeout > 0) || |
| (cp->val == 0x02 && timeout == 0)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev) && timeout > 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_NOT_POWERED); |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) || |
| pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| if (!hci_dev_test_flag(hdev, HCI_CONNECTABLE)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE, |
| MGMT_STATUS_REJECTED); |
| goto failed; |
| } |
| |
| if (!hdev_is_powered(hdev)) { |
| bool changed = false; |
| |
| /* Setting limited discoverable when powered off is |
| * not a valid operation since it requires a timeout |
| * and so no need to check HCI_LIMITED_DISCOVERABLE. |
| */ |
| if (!!cp->val != hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) { |
| hci_dev_change_flag(hdev, HCI_DISCOVERABLE); |
| changed = true; |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev); |
| if (err < 0) |
| goto failed; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto failed; |
| } |
| |
| /* If the current mode is the same, then just update the timeout |
| * value with the new value. And if only the timeout gets updated, |
| * then no need for any HCI transactions. |
| */ |
| if (!!cp->val == hci_dev_test_flag(hdev, HCI_DISCOVERABLE) && |
| (cp->val == 0x02) == hci_dev_test_flag(hdev, |
| HCI_LIMITED_DISCOVERABLE)) { |
| cancel_delayed_work(&hdev->discov_off); |
| hdev->discov_timeout = timeout; |
| |
| if (cp->val && hdev->discov_timeout > 0) { |
| int to = msecs_to_jiffies(hdev->discov_timeout * 1000); |
| queue_delayed_work(hdev->req_workqueue, |
| &hdev->discov_off, to); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| /* Cancel any potential discoverable timeout that might be |
| * still active and store new timeout value. The arming of |
| * the timeout happens in the complete handler. |
| */ |
| cancel_delayed_work(&hdev->discov_off); |
| hdev->discov_timeout = timeout; |
| |
| if (cp->val) |
| hci_dev_set_flag(hdev, HCI_DISCOVERABLE); |
| else |
| hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); |
| |
| /* Limited discoverable mode */ |
| if (cp->val == 0x02) |
| hci_dev_set_flag(hdev, HCI_LIMITED_DISCOVERABLE); |
| else |
| hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); |
| |
| queue_work(hdev->req_workqueue, &hdev->discoverable_update); |
| err = 0; |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| void mgmt_set_connectable_complete(struct hci_dev *hdev, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status 0x%02x", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); |
| goto remove_cmd; |
| } |
| |
| send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev); |
| new_settings(hdev, cmd->sk); |
| |
| remove_cmd: |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_connectable_update_settings(struct hci_dev *hdev, |
| struct sock *sk, u8 val) |
| { |
| bool changed = false; |
| int err; |
| |
| if (!!val != hci_dev_test_flag(hdev, HCI_CONNECTABLE)) |
| changed = true; |
| |
| if (val) { |
| hci_dev_set_flag(hdev, HCI_CONNECTABLE); |
| } else { |
| hci_dev_clear_flag(hdev, HCI_CONNECTABLE); |
| hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev); |
| if (err < 0) |
| return err; |
| |
| if (changed) { |
| hci_req_update_scan(hdev); |
| hci_update_background_scan(hdev); |
| return new_settings(hdev, sk); |
| } |
| |
| return 0; |
| } |
| |
| static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) && |
| !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = set_connectable_update_settings(hdev, sk, cp->val); |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) || |
| pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| if (cp->val) { |
| hci_dev_set_flag(hdev, HCI_CONNECTABLE); |
| } else { |
| if (hdev->discov_timeout > 0) |
| cancel_delayed_work(&hdev->discov_off); |
| |
| hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE); |
| hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); |
| hci_dev_clear_flag(hdev, HCI_CONNECTABLE); |
| } |
| |
| queue_work(hdev->req_workqueue, &hdev->connectable_update); |
| err = 0; |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_bondable(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| bool changed; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BONDABLE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->val) |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_BONDABLE); |
| else |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_BONDABLE); |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_BONDABLE, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| u8 val, status; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| status = mgmt_bredr_support(hdev); |
| if (status) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, |
| status); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| bool changed = false; |
| |
| if (!!cp->val != hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) { |
| hci_dev_change_flag(hdev, HCI_LINK_SECURITY); |
| changed = true; |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev); |
| if (err < 0) |
| goto failed; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| val = !!cp->val; |
| |
| if (test_bit(HCI_AUTH, &hdev->flags) == val) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val); |
| if (err < 0) { |
| mgmt_pending_remove(cmd); |
| goto failed; |
| } |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| u8 status; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| status = mgmt_bredr_support(hdev); |
| if (status) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status); |
| |
| if (!lmp_ssp_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| bool changed; |
| |
| if (cp->val) { |
| changed = !hci_dev_test_and_set_flag(hdev, |
| HCI_SSP_ENABLED); |
| } else { |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_SSP_ENABLED); |
| if (!changed) |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_HS_ENABLED); |
| else |
| hci_dev_clear_flag(hdev, HCI_HS_ENABLED); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev); |
| if (err < 0) |
| goto failed; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_SET_SSP, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| if (!!cp->val == hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| if (!cp->val && hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS)) |
| hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE, |
| sizeof(cp->val), &cp->val); |
| |
| err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val); |
| if (err < 0) { |
| mgmt_pending_remove(cmd); |
| goto failed; |
| } |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| bool changed; |
| u8 status; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| status = mgmt_bredr_support(hdev); |
| if (status) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status); |
| |
| if (!lmp_ssp_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (!hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_find(MGMT_OP_SET_SSP, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if (cp->val) { |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_HS_ENABLED); |
| } else { |
| if (hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, |
| MGMT_STATUS_REJECTED); |
| goto unlock; |
| } |
| |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_HS_ENABLED); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static void le_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| |
| hci_dev_lock(hdev); |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| |
| mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp, |
| &mgmt_err); |
| goto unlock; |
| } |
| |
| mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match); |
| |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| |
| /* Make sure the controller has a good default for |
| * advertising data. Restrict the update to when LE |
| * has actually been enabled. During power on, the |
| * update in powered_update_hci will take care of it. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) { |
| struct hci_request req; |
| |
| hci_req_init(&req, hdev); |
| __hci_req_update_adv_data(&req, HCI_ADV_CURRENT); |
| __hci_req_update_scan_rsp_data(&req, HCI_ADV_CURRENT); |
| hci_req_run(&req, NULL); |
| hci_update_background_scan(hdev); |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct hci_cp_write_le_host_supported hci_cp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| u8 val, enabled; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| /* Bluetooth single mode LE only controllers or dual-mode |
| * controllers configured as LE only devices, do not allow |
| * switching LE off. These have either LE enabled explicitly |
| * or BR/EDR has been previously switched off. |
| * |
| * When trying to enable an already enabled LE, then gracefully |
| * send a positive response. Trying to disable it however will |
| * result into rejection. |
| */ |
| if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { |
| if (cp->val == 0x01) |
| return send_settings_rsp(sk, MGMT_OP_SET_LE, hdev); |
| |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, |
| MGMT_STATUS_REJECTED); |
| } |
| |
| hci_dev_lock(hdev); |
| |
| val = !!cp->val; |
| enabled = lmp_host_le_capable(hdev); |
| |
| if (!val) |
| hci_req_clear_adv_instance(hdev, NULL, 0x00, true); |
| |
| if (!hdev_is_powered(hdev) || val == enabled) { |
| bool changed = false; |
| |
| if (val != hci_dev_test_flag(hdev, HCI_LE_ENABLED)) { |
| hci_dev_change_flag(hdev, HCI_LE_ENABLED); |
| changed = true; |
| } |
| |
| if (!val && hci_dev_test_flag(hdev, HCI_ADVERTISING)) { |
| hci_dev_clear_flag(hdev, HCI_ADVERTISING); |
| changed = true; |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto unlock; |
| } |
| |
| if (pending_find(MGMT_OP_SET_LE, hdev) || |
| pending_find(MGMT_OP_SET_ADVERTISING, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| memset(&hci_cp, 0, sizeof(hci_cp)); |
| |
| if (val) { |
| hci_cp.le = val; |
| hci_cp.simul = 0x00; |
| } else { |
| if (hci_dev_test_flag(hdev, HCI_LE_ADV)) |
| __hci_req_disable_advertising(&req); |
| } |
| |
| hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp), |
| &hci_cp); |
| |
| err = hci_req_run(&req, le_enable_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| /* This is a helper function to test for pending mgmt commands that can |
| * cause CoD or EIR HCI commands. We can only allow one such pending |
| * mgmt command at a time since otherwise we cannot easily track what |
| * the current values are, will be, and based on that calculate if a new |
| * HCI command needs to be sent and if yes with what value. |
| */ |
| static bool pending_eir_or_class(struct hci_dev *hdev) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| list_for_each_entry(cmd, &hdev->mgmt_pending, list) { |
| switch (cmd->opcode) { |
| case MGMT_OP_ADD_UUID: |
| case MGMT_OP_REMOVE_UUID: |
| case MGMT_OP_SET_DEV_CLASS: |
| case MGMT_OP_SET_POWERED: |
| return true; |
| } |
| } |
| |
| return false; |
| } |
| |
| static const u8 bluetooth_base_uuid[] = { |
| 0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80, |
| 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| }; |
| |
| static u8 get_uuid_size(const u8 *uuid) |
| { |
| u32 val; |
| |
| if (memcmp(uuid, bluetooth_base_uuid, 12)) |
| return 128; |
| |
| val = get_unaligned_le32(&uuid[12]); |
| if (val > 0xffff) |
| return 32; |
| |
| return 16; |
| } |
| |
| static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(mgmt_op, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, |
| mgmt_status(status), hdev->dev_class, 3); |
| |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static void add_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| BT_DBG("status 0x%02x", status); |
| |
| mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status); |
| } |
| |
| static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) |
| { |
| struct mgmt_cp_add_uuid *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| struct bt_uuid *uuid; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_eir_or_class(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| uuid = kmalloc(sizeof(*uuid), GFP_KERNEL); |
| if (!uuid) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| memcpy(uuid->uuid, cp->uuid, 16); |
| uuid->svc_hint = cp->svc_hint; |
| uuid->size = get_uuid_size(cp->uuid); |
| |
| list_add_tail(&uuid->list, &hdev->uuids); |
| |
| hci_req_init(&req, hdev); |
| |
| __hci_req_update_class(&req); |
| __hci_req_update_eir(&req); |
| |
| err = hci_req_run(&req, add_uuid_complete); |
| if (err < 0) { |
| if (err != -ENODATA) |
| goto failed; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0, |
| hdev->dev_class, 3); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| err = 0; |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static bool enable_service_cache(struct hci_dev *hdev) |
| { |
| if (!hdev_is_powered(hdev)) |
| return false; |
| |
| if (!hci_dev_test_and_set_flag(hdev, HCI_SERVICE_CACHE)) { |
| queue_delayed_work(hdev->workqueue, &hdev->service_cache, |
| CACHE_TIMEOUT); |
| return true; |
| } |
| |
| return false; |
| } |
| |
| static void remove_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| BT_DBG("status 0x%02x", status); |
| |
| mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status); |
| } |
| |
| static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_remove_uuid *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct bt_uuid *match, *tmp; |
| u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; |
| struct hci_request req; |
| int err, found; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_eir_or_class(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) { |
| hci_uuids_clear(hdev); |
| |
| if (enable_service_cache(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_UUID, |
| 0, hdev->dev_class, 3); |
| goto unlock; |
| } |
| |
| goto update_class; |
| } |
| |
| found = 0; |
| |
| list_for_each_entry_safe(match, tmp, &hdev->uuids, list) { |
| if (memcmp(match->uuid, cp->uuid, 16) != 0) |
| continue; |
| |
| list_del(&match->list); |
| kfree(match); |
| found++; |
| } |
| |
| if (found == 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| update_class: |
| hci_req_init(&req, hdev); |
| |
| __hci_req_update_class(&req); |
| __hci_req_update_eir(&req); |
| |
| err = hci_req_run(&req, remove_uuid_complete); |
| if (err < 0) { |
| if (err != -ENODATA) |
| goto unlock; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0, |
| hdev->dev_class, 3); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| err = 0; |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static void set_class_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| BT_DBG("status 0x%02x", status); |
| |
| mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status); |
| } |
| |
| static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_set_dev_class *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_bredr_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_eir_or_class(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| hdev->major_class = cp->major; |
| hdev->minor_class = cp->minor; |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0, |
| hdev->dev_class, 3); |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| if (hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) { |
| hci_dev_unlock(hdev); |
| cancel_delayed_work_sync(&hdev->service_cache); |
| hci_dev_lock(hdev); |
| __hci_req_update_eir(&req); |
| } |
| |
| __hci_req_update_class(&req); |
| |
| err = hci_req_run(&req, set_class_complete); |
| if (err < 0) { |
| if (err != -ENODATA) |
| goto unlock; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0, |
| hdev->dev_class, 3); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| err = 0; |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_load_link_keys *cp = data; |
| const u16 max_key_count = ((U16_MAX - sizeof(*cp)) / |
| sizeof(struct mgmt_link_key_info)); |
| u16 key_count, expected_len; |
| bool changed; |
| int i; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_bredr_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| key_count = __le16_to_cpu(cp->key_count); |
| if (key_count > max_key_count) { |
| BT_ERR("load_link_keys: too big key_count value %u", |
| key_count); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| expected_len = sizeof(*cp) + key_count * |
| sizeof(struct mgmt_link_key_info); |
| if (expected_len != len) { |
| BT_ERR("load_link_keys: expected %u bytes, got %u bytes", |
| expected_len, len); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys, |
| key_count); |
| |
| for (i = 0; i < key_count; i++) { |
| struct mgmt_link_key_info *key = &cp->keys[i]; |
| |
| if (key->addr.type != BDADDR_BREDR || key->type > 0x08) |
| return mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_LOAD_LINK_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| hci_dev_lock(hdev); |
| |
| hci_link_keys_clear(hdev); |
| |
| if (cp->debug_keys) |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS); |
| else |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_KEEP_DEBUG_KEYS); |
| |
| if (changed) |
| new_settings(hdev, NULL); |
| |
| for (i = 0; i < key_count; i++) { |
| struct mgmt_link_key_info *key = &cp->keys[i]; |
| |
| /* Always ignore debug keys and require a new pairing if |
| * the user wants to use them. |
| */ |
| if (key->type == HCI_LK_DEBUG_COMBINATION) |
| continue; |
| |
| hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val, |
| key->type, key->pin_len, NULL); |
| } |
| |
| mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0); |
| |
| hci_dev_unlock(hdev); |
| |
| return 0; |
| } |
| |
| static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 addr_type, struct sock *skip_sk) |
| { |
| struct mgmt_ev_device_unpaired ev; |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = addr_type; |
| |
| return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev), |
| skip_sk); |
| } |
| |
| static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_unpair_device *cp = data; |
| struct mgmt_rp_unpair_device rp; |
| struct hci_conn_params *params; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| u8 addr_type; |
| int err; |
| |
| memset(&rp, 0, sizeof(rp)); |
| bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); |
| rp.addr.type = cp->addr.type; |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| if (cp->disconnect != 0x00 && cp->disconnect != 0x01) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, |
| MGMT_STATUS_NOT_POWERED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (cp->addr.type == BDADDR_BREDR) { |
| /* If disconnection is requested, then look up the |
| * connection. If the remote device is connected, it |
| * will be later used to terminate the link. |
| * |
| * Setting it to NULL explicitly will cause no |
| * termination of the link. |
| */ |
| if (cp->disconnect) |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, |
| &cp->addr.bdaddr); |
| else |
| conn = NULL; |
| |
| err = hci_remove_link_key(hdev, &cp->addr.bdaddr); |
| if (err < 0) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_UNPAIR_DEVICE, |
| MGMT_STATUS_NOT_PAIRED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| goto done; |
| } |
| |
| /* LE address type */ |
| addr_type = le_addr_type(cp->addr.type); |
| |
| hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type); |
| |
| err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type); |
| if (err < 0) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, |
| MGMT_STATUS_NOT_PAIRED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, addr_type); |
| if (!conn) { |
| hci_conn_params_del(hdev, &cp->addr.bdaddr, addr_type); |
| goto done; |
| } |
| |
| /* Abort any ongoing SMP pairing */ |
| smp_cancel_pairing(conn); |
| |
| /* Defer clearing up the connection parameters until closing to |
| * give a chance of keeping them if a repairing happens. |
| */ |
| set_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags); |
| |
| /* Disable auto-connection parameters if present */ |
| params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, addr_type); |
| if (params) { |
| if (params->explicit_connect) |
| params->auto_connect = HCI_AUTO_CONN_EXPLICIT; |
| else |
| params->auto_connect = HCI_AUTO_CONN_DISABLED; |
| } |
| |
| /* If disconnection is not requested, then clear the connection |
| * variable so that the link is not terminated. |
| */ |
| if (!cp->disconnect) |
| conn = NULL; |
| |
| done: |
| /* If the connection variable is set, then termination of the |
| * link is requested. |
| */ |
| if (!conn) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0, |
| &rp, sizeof(rp)); |
| device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp, |
| sizeof(*cp)); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| cmd->cmd_complete = addr_cmd_complete; |
| |
| err = hci_abort_conn(conn, HCI_ERROR_REMOTE_USER_TERM); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_disconnect *cp = data; |
| struct mgmt_rp_disconnect rp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| int err; |
| |
| BT_DBG(""); |
| |
| memset(&rp, 0, sizeof(rp)); |
| bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); |
| rp.addr.type = cp->addr.type; |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!test_bit(HCI_UP, &hdev->flags)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, |
| MGMT_STATUS_NOT_POWERED, &rp, |
| sizeof(rp)); |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_DISCONNECT, hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, |
| MGMT_STATUS_BUSY, &rp, sizeof(rp)); |
| goto failed; |
| } |
| |
| if (cp->addr.type == BDADDR_BREDR) |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, |
| &cp->addr.bdaddr); |
| else |
| conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, |
| le_addr_type(cp->addr.type)); |
| |
| if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT, |
| MGMT_STATUS_NOT_CONNECTED, &rp, |
| sizeof(rp)); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| cmd->cmd_complete = generic_cmd_complete; |
| |
| err = hci_disconnect(conn, HCI_ERROR_REMOTE_USER_TERM); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static u8 link_to_bdaddr(u8 link_type, u8 addr_type) |
| { |
| switch (link_type) { |
| case LE_LINK: |
| switch (addr_type) { |
| case ADDR_LE_DEV_PUBLIC: |
| return BDADDR_LE_PUBLIC; |
| |
| default: |
| /* Fallback to LE Random address type */ |
| return BDADDR_LE_RANDOM; |
| } |
| |
| default: |
| /* Fallback to BR/EDR type */ |
| return BDADDR_BREDR; |
| } |
| } |
| |
| static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 data_len) |
| { |
| struct mgmt_rp_get_connections *rp; |
| struct hci_conn *c; |
| size_t rp_len; |
| int err; |
| u16 i; |
| |
| BT_DBG(""); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, |
| MGMT_STATUS_NOT_POWERED); |
| goto unlock; |
| } |
| |
| i = 0; |
| list_for_each_entry(c, &hdev->conn_hash.list, list) { |
| if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags)) |
| i++; |
| } |
| |
| rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info)); |
| rp = kmalloc(rp_len, GFP_KERNEL); |
| if (!rp) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| i = 0; |
| list_for_each_entry(c, &hdev->conn_hash.list, list) { |
| if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags)) |
| continue; |
| bacpy(&rp->addr[i].bdaddr, &c->dst); |
| rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type); |
| if (c->type == SCO_LINK || c->type == ESCO_LINK) |
| continue; |
| i++; |
| } |
| |
| rp->conn_count = cpu_to_le16(i); |
| |
| /* Recalculate length in case of filtered SCO connections, etc */ |
| rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info)); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp, |
| rp_len); |
| |
| kfree(rp); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev, |
| struct mgmt_cp_pin_code_neg_reply *cp) |
| { |
| struct mgmt_pending_cmd *cmd; |
| int err; |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp, |
| sizeof(*cp)); |
| if (!cmd) |
| return -ENOMEM; |
| |
| err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, |
| sizeof(cp->addr.bdaddr), &cp->addr.bdaddr); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| return err; |
| } |
| |
| static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct hci_conn *conn; |
| struct mgmt_cp_pin_code_reply *cp = data; |
| struct hci_cp_pin_code_reply reply; |
| struct mgmt_pending_cmd *cmd; |
| int err; |
| |
| BT_DBG(""); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, |
| MGMT_STATUS_NOT_POWERED); |
| goto failed; |
| } |
| |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr); |
| if (!conn) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, |
| MGMT_STATUS_NOT_CONNECTED); |
| goto failed; |
| } |
| |
| if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) { |
| struct mgmt_cp_pin_code_neg_reply ncp; |
| |
| memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr)); |
| |
| BT_ERR("PIN code is not 16 bytes long"); |
| |
| err = send_pin_code_neg_reply(sk, hdev, &ncp); |
| if (err >= 0) |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| cmd->cmd_complete = addr_cmd_complete; |
| |
| bacpy(&reply.bdaddr, &cp->addr.bdaddr); |
| reply.pin_len = cp->pin_len; |
| memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code)); |
| |
| err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_set_io_capability *cp = data; |
| |
| BT_DBG(""); |
| |
| if (cp->io_capability > SMP_IO_KEYBOARD_DISPLAY) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, |
| MGMT_STATUS_INVALID_PARAMS, NULL, 0); |
| |
| hci_dev_lock(hdev); |
| |
| hdev->io_capability = cp->io_capability; |
| |
| BT_DBG("%s IO capability set to 0x%02x", hdev->name, |
| hdev->io_capability); |
| |
| hci_dev_unlock(hdev); |
| |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, |
| NULL, 0); |
| } |
| |
| static struct mgmt_pending_cmd *find_pairing(struct hci_conn *conn) |
| { |
| struct hci_dev *hdev = conn->hdev; |
| struct mgmt_pending_cmd *cmd; |
| |
| list_for_each_entry(cmd, &hdev->mgmt_pending, list) { |
| if (cmd->opcode != MGMT_OP_PAIR_DEVICE) |
| continue; |
| |
| if (cmd->user_data != conn) |
| continue; |
| |
| return cmd; |
| } |
| |
| return NULL; |
| } |
| |
| static int pairing_complete(struct mgmt_pending_cmd *cmd, u8 status) |
| { |
| struct mgmt_rp_pair_device rp; |
| struct hci_conn *conn = cmd->user_data; |
| int err; |
| |
| bacpy(&rp.addr.bdaddr, &conn->dst); |
| rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type); |
| |
| err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, |
| status, &rp, sizeof(rp)); |
| |
| /* So we don't get further callbacks for this connection */ |
| conn->connect_cfm_cb = NULL; |
| conn->security_cfm_cb = NULL; |
| conn->disconn_cfm_cb = NULL; |
| |
| hci_conn_drop(conn); |
| |
| /* The device is paired so there is no need to remove |
| * its connection parameters anymore. |
| */ |
| clear_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags); |
| |
| hci_conn_put(conn); |
| |
| return err; |
| } |
| |
| void mgmt_smp_complete(struct hci_conn *conn, bool complete) |
| { |
| u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED; |
| struct mgmt_pending_cmd *cmd; |
| |
| cmd = find_pairing(conn); |
| if (cmd) { |
| cmd->cmd_complete(cmd, status); |
| mgmt_pending_remove(cmd); |
| } |
| } |
| |
| static void pairing_complete_cb(struct hci_conn *conn, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status %u", status); |
| |
| cmd = find_pairing(conn); |
| if (!cmd) { |
| BT_DBG("Unable to find a pending command"); |
| return; |
| } |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| static void le_pairing_complete_cb(struct hci_conn *conn, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status %u", status); |
| |
| if (!status) |
| return; |
| |
| cmd = find_pairing(conn); |
| if (!cmd) { |
| BT_DBG("Unable to find a pending command"); |
| return; |
| } |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_pair_device *cp = data; |
| struct mgmt_rp_pair_device rp; |
| struct mgmt_pending_cmd *cmd; |
| u8 sec_level, auth_type; |
| struct hci_conn *conn; |
| int err; |
| |
| BT_DBG(""); |
| |
| memset(&rp, 0, sizeof(rp)); |
| bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); |
| rp.addr.type = cp->addr.type; |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| if (cp->io_cap > SMP_IO_KEYBOARD_DISPLAY) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| MGMT_STATUS_NOT_POWERED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (hci_bdaddr_is_paired(hdev, &cp->addr.bdaddr, cp->addr.type)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| MGMT_STATUS_ALREADY_PAIRED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| sec_level = BT_SECURITY_MEDIUM; |
| auth_type = HCI_AT_DEDICATED_BONDING; |
| |
| if (cp->addr.type == BDADDR_BREDR) { |
| conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level, |
| auth_type); |
| } else { |
| u8 addr_type = le_addr_type(cp->addr.type); |
| struct hci_conn_params *p; |
| |
| /* When pairing a new device, it is expected to remember |
| * this device for future connections. Adding the connection |
| * parameter information ahead of time allows tracking |
| * of the slave preferred values and will speed up any |
| * further connection establishment. |
| * |
| * If connection parameters already exist, then they |
| * will be kept and this function does nothing. |
| */ |
| p = hci_conn_params_add(hdev, &cp->addr.bdaddr, addr_type); |
| |
| if (p->auto_connect == HCI_AUTO_CONN_EXPLICIT) |
| p->auto_connect = HCI_AUTO_CONN_DISABLED; |
| |
| conn = hci_connect_le_scan(hdev, &cp->addr.bdaddr, |
| addr_type, sec_level, |
| HCI_LE_CONN_TIMEOUT); |
| } |
| |
| if (IS_ERR(conn)) { |
| int status; |
| |
| if (PTR_ERR(conn) == -EBUSY) |
| status = MGMT_STATUS_BUSY; |
| else if (PTR_ERR(conn) == -EOPNOTSUPP) |
| status = MGMT_STATUS_NOT_SUPPORTED; |
| else if (PTR_ERR(conn) == -ECONNREFUSED) |
| status = MGMT_STATUS_REJECTED; |
| else |
| status = MGMT_STATUS_CONNECT_FAILED; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| status, &rp, sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (conn->connect_cfm_cb) { |
| hci_conn_drop(conn); |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE, |
| MGMT_STATUS_BUSY, &rp, sizeof(rp)); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| hci_conn_drop(conn); |
| goto unlock; |
| } |
| |
| cmd->cmd_complete = pairing_complete; |
| |
| /* For LE, just connecting isn't a proof that the pairing finished */ |
| if (cp->addr.type == BDADDR_BREDR) { |
| conn->connect_cfm_cb = pairing_complete_cb; |
| conn->security_cfm_cb = pairing_complete_cb; |
| conn->disconn_cfm_cb = pairing_complete_cb; |
| } else { |
| conn->connect_cfm_cb = le_pairing_complete_cb; |
| conn->security_cfm_cb = le_pairing_complete_cb; |
| conn->disconn_cfm_cb = le_pairing_complete_cb; |
| } |
| |
| conn->io_capability = cp->io_cap; |
| cmd->user_data = hci_conn_get(conn); |
| |
| if ((conn->state == BT_CONNECTED || conn->state == BT_CONFIG) && |
| hci_conn_security(conn, sec_level, auth_type, true)) { |
| cmd->cmd_complete(cmd, 0); |
| mgmt_pending_remove(cmd); |
| } |
| |
| err = 0; |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_addr_info *addr = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| int err; |
| |
| BT_DBG(""); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, |
| MGMT_STATUS_NOT_POWERED); |
| goto unlock; |
| } |
| |
| cmd = pending_find(MGMT_OP_PAIR_DEVICE, hdev); |
| if (!cmd) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| conn = cmd->user_data; |
| |
| if (bacmp(&addr->bdaddr, &conn->dst) != 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| cmd->cmd_complete(cmd, MGMT_STATUS_CANCELLED); |
| mgmt_pending_remove(cmd); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0, |
| addr, sizeof(*addr)); |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev, |
| struct mgmt_addr_info *addr, u16 mgmt_op, |
| u16 hci_op, __le32 passkey) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| int err; |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, |
| MGMT_STATUS_NOT_POWERED, addr, |
| sizeof(*addr)); |
| goto done; |
| } |
| |
| if (addr->type == BDADDR_BREDR) |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr); |
| else |
| conn = hci_conn_hash_lookup_le(hdev, &addr->bdaddr, |
| le_addr_type(addr->type)); |
| |
| if (!conn) { |
| err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, |
| MGMT_STATUS_NOT_CONNECTED, addr, |
| sizeof(*addr)); |
| goto done; |
| } |
| |
| if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) { |
| err = smp_user_confirm_reply(conn, mgmt_op, passkey); |
| if (!err) |
| err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, |
| MGMT_STATUS_SUCCESS, addr, |
| sizeof(*addr)); |
| else |
| err = mgmt_cmd_complete(sk, hdev->id, mgmt_op, |
| MGMT_STATUS_FAILED, addr, |
| sizeof(*addr)); |
| |
| goto done; |
| } |
| |
| cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr)); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto done; |
| } |
| |
| cmd->cmd_complete = addr_cmd_complete; |
| |
| /* Continue with pairing via HCI */ |
| if (hci_op == HCI_OP_USER_PASSKEY_REPLY) { |
| struct hci_cp_user_passkey_reply cp; |
| |
| bacpy(&cp.bdaddr, &addr->bdaddr); |
| cp.passkey = passkey; |
| err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp); |
| } else |
| err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr), |
| &addr->bdaddr); |
| |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| done: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_pin_code_neg_reply *cp = data; |
| |
| BT_DBG(""); |
| |
| return user_pairing_resp(sk, hdev, &cp->addr, |
| MGMT_OP_PIN_CODE_NEG_REPLY, |
| HCI_OP_PIN_CODE_NEG_REPLY, 0); |
| } |
| |
| static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_user_confirm_reply *cp = data; |
| |
| BT_DBG(""); |
| |
| if (len != sizeof(*cp)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| return user_pairing_resp(sk, hdev, &cp->addr, |
| MGMT_OP_USER_CONFIRM_REPLY, |
| HCI_OP_USER_CONFIRM_REPLY, 0); |
| } |
| |
| static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_user_confirm_neg_reply *cp = data; |
| |
| BT_DBG(""); |
| |
| return user_pairing_resp(sk, hdev, &cp->addr, |
| MGMT_OP_USER_CONFIRM_NEG_REPLY, |
| HCI_OP_USER_CONFIRM_NEG_REPLY, 0); |
| } |
| |
| static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_user_passkey_reply *cp = data; |
| |
| BT_DBG(""); |
| |
| return user_pairing_resp(sk, hdev, &cp->addr, |
| MGMT_OP_USER_PASSKEY_REPLY, |
| HCI_OP_USER_PASSKEY_REPLY, cp->passkey); |
| } |
| |
| static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_user_passkey_neg_reply *cp = data; |
| |
| BT_DBG(""); |
| |
| return user_pairing_resp(sk, hdev, &cp->addr, |
| MGMT_OP_USER_PASSKEY_NEG_REPLY, |
| HCI_OP_USER_PASSKEY_NEG_REPLY, 0); |
| } |
| |
| static void set_name_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| struct mgmt_cp_set_local_name *cp; |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status 0x%02x", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| cp = cmd->param; |
| |
| if (status) |
| mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, |
| mgmt_status(status)); |
| else |
| mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, |
| cp, sizeof(*cp)); |
| |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_set_local_name *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG(""); |
| |
| hci_dev_lock(hdev); |
| |
| /* If the old values are the same as the new ones just return a |
| * direct command complete event. |
| */ |
| if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) && |
| !memcmp(hdev->short_name, cp->short_name, |
| sizeof(hdev->short_name))) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, |
| data, len); |
| goto failed; |
| } |
| |
| memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name)); |
| |
| if (!hdev_is_powered(hdev)) { |
| memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name)); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, |
| data, len); |
| if (err < 0) |
| goto failed; |
| |
| err = mgmt_generic_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, |
| data, len, sk); |
| |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name)); |
| |
| hci_req_init(&req, hdev); |
| |
| if (lmp_bredr_capable(hdev)) { |
| __hci_req_update_name(&req); |
| __hci_req_update_eir(&req); |
| } |
| |
| /* The name is stored in the scan response data and so |
| * no need to udpate the advertising data here. |
| */ |
| if (lmp_le_capable(hdev)) |
| __hci_req_update_scan_rsp_data(&req, HCI_ADV_CURRENT); |
| |
| err = hci_req_run(&req, set_name_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static void read_local_oob_data_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode, struct sk_buff *skb) |
| { |
| struct mgmt_rp_read_local_oob_data mgmt_rp; |
| size_t rp_size = sizeof(mgmt_rp); |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("%s status %u", hdev->name, status); |
| |
| cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev); |
| if (!cmd) |
| return; |
| |
| if (status || !skb) { |
| mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, |
| status ? mgmt_status(status) : MGMT_STATUS_FAILED); |
| goto remove; |
| } |
| |
| memset(&mgmt_rp, 0, sizeof(mgmt_rp)); |
| |
| if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) { |
| struct hci_rp_read_local_oob_data *rp = (void *) skb->data; |
| |
| if (skb->len < sizeof(*rp)) { |
| mgmt_cmd_status(cmd->sk, hdev->id, |
| MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_FAILED); |
| goto remove; |
| } |
| |
| memcpy(mgmt_rp.hash192, rp->hash, sizeof(rp->hash)); |
| memcpy(mgmt_rp.rand192, rp->rand, sizeof(rp->rand)); |
| |
| rp_size -= sizeof(mgmt_rp.hash256) + sizeof(mgmt_rp.rand256); |
| } else { |
| struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data; |
| |
| if (skb->len < sizeof(*rp)) { |
| mgmt_cmd_status(cmd->sk, hdev->id, |
| MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_FAILED); |
| goto remove; |
| } |
| |
| memcpy(mgmt_rp.hash192, rp->hash192, sizeof(rp->hash192)); |
| memcpy(mgmt_rp.rand192, rp->rand192, sizeof(rp->rand192)); |
| |
| memcpy(mgmt_rp.hash256, rp->hash256, sizeof(rp->hash256)); |
| memcpy(mgmt_rp.rand256, rp->rand256, sizeof(rp->rand256)); |
| } |
| |
| mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_SUCCESS, &mgmt_rp, rp_size); |
| |
| remove: |
| mgmt_pending_remove(cmd); |
| } |
| |
| static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_NOT_POWERED); |
| goto unlock; |
| } |
| |
| if (!lmp_ssp_capable(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_NOT_SUPPORTED); |
| goto unlock; |
| } |
| |
| if (pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| if (bredr_sc_enabled(hdev)) |
| hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL); |
| else |
| hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL); |
| |
| err = hci_req_run_skb(&req, read_local_oob_data_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_addr_info *addr = data; |
| int err; |
| |
| BT_DBG("%s ", hdev->name); |
| |
| if (!bdaddr_type_is_valid(addr->type)) |
| return mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, |
| MGMT_STATUS_INVALID_PARAMS, |
| addr, sizeof(*addr)); |
| |
| hci_dev_lock(hdev); |
| |
| if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) { |
| struct mgmt_cp_add_remote_oob_data *cp = data; |
| u8 status; |
| |
| if (cp->addr.type != BDADDR_BREDR) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, |
| cp->addr.type, cp->hash, |
| cp->rand, NULL, NULL); |
| if (err < 0) |
| status = MGMT_STATUS_FAILED; |
| else |
| status = MGMT_STATUS_SUCCESS; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, status, |
| &cp->addr, sizeof(cp->addr)); |
| } else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) { |
| struct mgmt_cp_add_remote_oob_ext_data *cp = data; |
| u8 *rand192, *hash192, *rand256, *hash256; |
| u8 status; |
| |
| if (bdaddr_type_is_le(cp->addr.type)) { |
| /* Enforce zero-valued 192-bit parameters as |
| * long as legacy SMP OOB isn't implemented. |
| */ |
| if (memcmp(cp->rand192, ZERO_KEY, 16) || |
| memcmp(cp->hash192, ZERO_KEY, 16)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, |
| MGMT_STATUS_INVALID_PARAMS, |
| addr, sizeof(*addr)); |
| goto unlock; |
| } |
| |
| rand192 = NULL; |
| hash192 = NULL; |
| } else { |
| /* In case one of the P-192 values is set to zero, |
| * then just disable OOB data for P-192. |
| */ |
| if (!memcmp(cp->rand192, ZERO_KEY, 16) || |
| !memcmp(cp->hash192, ZERO_KEY, 16)) { |
| rand192 = NULL; |
| hash192 = NULL; |
| } else { |
| rand192 = cp->rand192; |
| hash192 = cp->hash192; |
| } |
| } |
| |
| /* In case one of the P-256 values is set to zero, then just |
| * disable OOB data for P-256. |
| */ |
| if (!memcmp(cp->rand256, ZERO_KEY, 16) || |
| !memcmp(cp->hash256, ZERO_KEY, 16)) { |
| rand256 = NULL; |
| hash256 = NULL; |
| } else { |
| rand256 = cp->rand256; |
| hash256 = cp->hash256; |
| } |
| |
| err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, |
| cp->addr.type, hash192, rand192, |
| hash256, rand256); |
| if (err < 0) |
| status = MGMT_STATUS_FAILED; |
| else |
| status = MGMT_STATUS_SUCCESS; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_REMOTE_OOB_DATA, |
| status, &cp->addr, sizeof(cp->addr)); |
| } else { |
| BT_ERR("add_remote_oob_data: invalid length of %u bytes", len); |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_remove_remote_oob_data *cp = data; |
| u8 status; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (cp->addr.type != BDADDR_BREDR) |
| return mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_REMOTE_OOB_DATA, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { |
| hci_remote_oob_data_clear(hdev); |
| status = MGMT_STATUS_SUCCESS; |
| goto done; |
| } |
| |
| err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr, cp->addr.type); |
| if (err < 0) |
| status = MGMT_STATUS_INVALID_PARAMS; |
| else |
| status = MGMT_STATUS_SUCCESS; |
| |
| done: |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA, |
| status, &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| void mgmt_start_discovery_complete(struct hci_dev *hdev, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status %d", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_START_DISCOVERY, hdev); |
| if (!cmd) |
| cmd = pending_find(MGMT_OP_START_SERVICE_DISCOVERY, hdev); |
| |
| if (cmd) { |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| hci_dev_unlock(hdev); |
| } |
| |
| static bool discovery_type_is_valid(struct hci_dev *hdev, uint8_t type, |
| uint8_t *mgmt_status) |
| { |
| switch (type) { |
| case DISCOV_TYPE_LE: |
| *mgmt_status = mgmt_le_support(hdev); |
| if (*mgmt_status) |
| return false; |
| break; |
| case DISCOV_TYPE_INTERLEAVED: |
| *mgmt_status = mgmt_le_support(hdev); |
| if (*mgmt_status) |
| return false; |
| /* Intentional fall-through */ |
| case DISCOV_TYPE_BREDR: |
| *mgmt_status = mgmt_bredr_support(hdev); |
| if (*mgmt_status) |
| return false; |
| break; |
| default: |
| *mgmt_status = MGMT_STATUS_INVALID_PARAMS; |
| return false; |
| } |
| |
| return true; |
| } |
| |
| static int start_discovery(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_start_discovery *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| u8 status; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_START_DISCOVERY, |
| MGMT_STATUS_NOT_POWERED, |
| &cp->type, sizeof(cp->type)); |
| goto failed; |
| } |
| |
| if (hdev->discovery.state != DISCOVERY_STOPPED || |
| hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_START_DISCOVERY, |
| MGMT_STATUS_BUSY, &cp->type, |
| sizeof(cp->type)); |
| goto failed; |
| } |
| |
| if (!discovery_type_is_valid(hdev, cp->type, &status)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_START_DISCOVERY, |
| status, &cp->type, sizeof(cp->type)); |
| goto failed; |
| } |
| |
| /* Clear the discovery filter first to free any previously |
| * allocated memory for the UUID list. |
| */ |
| hci_discovery_filter_clear(hdev); |
| |
| hdev->discovery.type = cp->type; |
| hdev->discovery.report_invalid_rssi = false; |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| cmd->cmd_complete = generic_cmd_complete; |
| |
| hci_discovery_set_state(hdev, DISCOVERY_STARTING); |
| queue_work(hdev->req_workqueue, &hdev->discov_update); |
| err = 0; |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int service_discovery_cmd_complete(struct mgmt_pending_cmd *cmd, |
| u8 status) |
| { |
| return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, |
| cmd->param, 1); |
| } |
| |
| static int start_service_discovery(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_start_service_discovery *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| const u16 max_uuid_count = ((U16_MAX - sizeof(*cp)) / 16); |
| u16 uuid_count, expected_len; |
| u8 status; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_STATUS_NOT_POWERED, |
| &cp->type, sizeof(cp->type)); |
| goto failed; |
| } |
| |
| if (hdev->discovery.state != DISCOVERY_STOPPED || |
| hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_STATUS_BUSY, &cp->type, |
| sizeof(cp->type)); |
| goto failed; |
| } |
| |
| uuid_count = __le16_to_cpu(cp->uuid_count); |
| if (uuid_count > max_uuid_count) { |
| BT_ERR("service_discovery: too big uuid_count value %u", |
| uuid_count); |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_STATUS_INVALID_PARAMS, &cp->type, |
| sizeof(cp->type)); |
| goto failed; |
| } |
| |
| expected_len = sizeof(*cp) + uuid_count * 16; |
| if (expected_len != len) { |
| BT_ERR("service_discovery: expected %u bytes, got %u bytes", |
| expected_len, len); |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_STATUS_INVALID_PARAMS, &cp->type, |
| sizeof(cp->type)); |
| goto failed; |
| } |
| |
| if (!discovery_type_is_valid(hdev, cp->type, &status)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| status, &cp->type, sizeof(cp->type)); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_START_SERVICE_DISCOVERY, |
| hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| cmd->cmd_complete = service_discovery_cmd_complete; |
| |
| /* Clear the discovery filter first to free any previously |
| * allocated memory for the UUID list. |
| */ |
| hci_discovery_filter_clear(hdev); |
| |
| hdev->discovery.result_filtering = true; |
| hdev->discovery.type = cp->type; |
| hdev->discovery.rssi = cp->rssi; |
| hdev->discovery.uuid_count = uuid_count; |
| |
| if (uuid_count > 0) { |
| hdev->discovery.uuids = kmemdup(cp->uuids, uuid_count * 16, |
| GFP_KERNEL); |
| if (!hdev->discovery.uuids) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_START_SERVICE_DISCOVERY, |
| MGMT_STATUS_FAILED, |
| &cp->type, sizeof(cp->type)); |
| mgmt_pending_remove(cmd); |
| goto failed; |
| } |
| } |
| |
| hci_discovery_set_state(hdev, DISCOVERY_STARTING); |
| queue_work(hdev->req_workqueue, &hdev->discov_update); |
| err = 0; |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| void mgmt_stop_discovery_complete(struct hci_dev *hdev, u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status %d", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_STOP_DISCOVERY, hdev); |
| if (cmd) { |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| hci_dev_unlock(hdev); |
| } |
| |
| static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_stop_discovery *mgmt_cp = data; |
| struct mgmt_pending_cmd *cmd; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hci_discovery_active(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY, |
| MGMT_STATUS_REJECTED, &mgmt_cp->type, |
| sizeof(mgmt_cp->type)); |
| goto unlock; |
| } |
| |
| if (hdev->discovery.type != mgmt_cp->type) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY, |
| MGMT_STATUS_INVALID_PARAMS, |
| &mgmt_cp->type, sizeof(mgmt_cp->type)); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| cmd->cmd_complete = generic_cmd_complete; |
| |
| hci_discovery_set_state(hdev, DISCOVERY_STOPPING); |
| queue_work(hdev->req_workqueue, &hdev->discov_update); |
| err = 0; |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_confirm_name *cp = data; |
| struct inquiry_entry *e; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hci_discovery_active(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, |
| MGMT_STATUS_FAILED, &cp->addr, |
| sizeof(cp->addr)); |
| goto failed; |
| } |
| |
| e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr); |
| if (!e) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, |
| MGMT_STATUS_INVALID_PARAMS, &cp->addr, |
| sizeof(cp->addr)); |
| goto failed; |
| } |
| |
| if (cp->name_known) { |
| e->name_state = NAME_KNOWN; |
| list_del(&e->list); |
| } else { |
| e->name_state = NAME_NEEDED; |
| hci_inquiry_cache_update_resolve(hdev, e); |
| } |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, |
| &cp->addr, sizeof(cp->addr)); |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int block_device(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_block_device *cp = data; |
| u8 status; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_lock(hdev); |
| |
| err = hci_bdaddr_list_add(&hdev->blacklist, &cp->addr.bdaddr, |
| cp->addr.type); |
| if (err < 0) { |
| status = MGMT_STATUS_FAILED; |
| goto done; |
| } |
| |
| mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &cp->addr, sizeof(cp->addr), |
| sk); |
| status = MGMT_STATUS_SUCCESS; |
| |
| done: |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_unblock_device *cp = data; |
| u8 status; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_lock(hdev); |
| |
| err = hci_bdaddr_list_del(&hdev->blacklist, &cp->addr.bdaddr, |
| cp->addr.type); |
| if (err < 0) { |
| status = MGMT_STATUS_INVALID_PARAMS; |
| goto done; |
| } |
| |
| mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &cp->addr, sizeof(cp->addr), |
| sk); |
| status = MGMT_STATUS_SUCCESS; |
| |
| done: |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_set_device_id *cp = data; |
| struct hci_request req; |
| int err; |
| __u16 source; |
| |
| BT_DBG("%s", hdev->name); |
| |
| source = __le16_to_cpu(cp->source); |
| |
| if (source > 0x0002) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| hdev->devid_source = source; |
| hdev->devid_vendor = __le16_to_cpu(cp->vendor); |
| hdev->devid_product = __le16_to_cpu(cp->product); |
| hdev->devid_version = __le16_to_cpu(cp->version); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, |
| NULL, 0); |
| |
| hci_req_init(&req, hdev); |
| __hci_req_update_eir(&req); |
| hci_req_run(&req, NULL); |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static void enable_advertising_instance(struct hci_dev *hdev, u8 status, |
| u16 opcode) |
| { |
| BT_DBG("status %d", status); |
| } |
| |
| static void set_advertising_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| struct hci_request req; |
| u8 instance; |
| struct adv_info *adv_instance; |
| int err; |
| |
| hci_dev_lock(hdev); |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| |
| mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, |
| cmd_status_rsp, &mgmt_err); |
| goto unlock; |
| } |
| |
| if (hci_dev_test_flag(hdev, HCI_LE_ADV)) |
| hci_dev_set_flag(hdev, HCI_ADVERTISING); |
| else |
| hci_dev_clear_flag(hdev, HCI_ADVERTISING); |
| |
| mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp, |
| &match); |
| |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| |
| /* If "Set Advertising" was just disabled and instance advertising was |
| * set up earlier, then re-enable multi-instance advertising. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_ADVERTISING) || |
| list_empty(&hdev->adv_instances)) |
| goto unlock; |
| |
| instance = hdev->cur_adv_instance; |
| if (!instance) { |
| adv_instance = list_first_entry_or_null(&hdev->adv_instances, |
| struct adv_info, list); |
| if (!adv_instance) |
| goto unlock; |
| |
| instance = adv_instance->instance; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| err = __hci_req_schedule_adv_instance(&req, instance, true); |
| |
| if (!err) |
| err = hci_req_run(&req, enable_advertising_instance); |
| |
| if (err) |
| BT_ERR("Failed to re-configure advertising"); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| u8 val, status; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| status = mgmt_le_support(hdev); |
| if (status) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, |
| status); |
| |
| if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| val = !!cp->val; |
| |
| /* The following conditions are ones which mean that we should |
| * not do any HCI communication but directly send a mgmt |
| * response to user space (after toggling the flag if |
| * necessary). |
| */ |
| if (!hdev_is_powered(hdev) || |
| (val == hci_dev_test_flag(hdev, HCI_ADVERTISING) && |
| (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_ADVERTISING_CONNECTABLE)) || |
| hci_conn_num(hdev, LE_LINK) > 0 || |
| (hci_dev_test_flag(hdev, HCI_LE_SCAN) && |
| hdev->le_scan_type == LE_SCAN_ACTIVE)) { |
| bool changed; |
| |
| if (cp->val) { |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_ADVERTISING); |
| if (cp->val == 0x02) |
| hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE); |
| else |
| hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); |
| } else { |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_ADVERTISING); |
| hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto unlock; |
| } |
| |
| if (pending_find(MGMT_OP_SET_ADVERTISING, hdev) || |
| pending_find(MGMT_OP_SET_LE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| if (cp->val == 0x02) |
| hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE); |
| else |
| hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE); |
| |
| cancel_adv_timeout(hdev); |
| |
| if (val) { |
| /* Switch to instance "0" for the Set Advertising setting. |
| * We cannot use update_[adv|scan_rsp]_data() here as the |
| * HCI_ADVERTISING flag is not yet set. |
| */ |
| __hci_req_update_adv_data(&req, 0x00); |
| __hci_req_update_scan_rsp_data(&req, 0x00); |
| __hci_req_enable_advertising(&req); |
| } else { |
| __hci_req_disable_advertising(&req); |
| } |
| |
| err = hci_req_run(&req, set_advertising_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_static_address(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_set_static_address *cp = data; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (hdev_is_powered(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, |
| MGMT_STATUS_REJECTED); |
| |
| if (bacmp(&cp->bdaddr, BDADDR_ANY)) { |
| if (!bacmp(&cp->bdaddr, BDADDR_NONE)) |
| return mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_SET_STATIC_ADDRESS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| /* Two most significant bits shall be set */ |
| if ((cp->bdaddr.b[5] & 0xc0) != 0xc0) |
| return mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_SET_STATIC_ADDRESS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| hci_dev_lock(hdev); |
| |
| bacpy(&hdev->static_addr, &cp->bdaddr); |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_STATIC_ADDRESS, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| err = new_settings(hdev, sk); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_scan_params(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_set_scan_params *cp = data; |
| __u16 interval, window; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| interval = __le16_to_cpu(cp->interval); |
| |
| if (interval < 0x0004 || interval > 0x4000) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| window = __le16_to_cpu(cp->window); |
| |
| if (window < 0x0004 || window > 0x4000) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| if (window > interval) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| hdev->le_scan_interval = interval; |
| hdev->le_scan_window = window; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0, |
| NULL, 0); |
| |
| /* If background scan is running, restart it so new parameters are |
| * loaded. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_LE_SCAN) && |
| hdev->discovery.state == DISCOVERY_STOPPED) { |
| struct hci_request req; |
| |
| hci_req_init(&req, hdev); |
| |
| hci_req_add_le_scan_disable(&req); |
| hci_req_add_le_passive_scan(&req); |
| |
| hci_req_run(&req, NULL); |
| } |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static void fast_connectable_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status 0x%02x", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| if (status) { |
| mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, |
| mgmt_status(status)); |
| } else { |
| struct mgmt_mode *cp = cmd->param; |
| |
| if (cp->val) |
| hci_dev_set_flag(hdev, HCI_FAST_CONNECTABLE); |
| else |
| hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE); |
| |
| send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev); |
| new_settings(hdev, cmd->sk); |
| } |
| |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) || |
| hdev->hci_ver < BLUETOOTH_VER_1_2) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if (!!cp->val == hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE, |
| hdev); |
| goto unlock; |
| } |
| |
| if (!hdev_is_powered(hdev)) { |
| hci_dev_change_flag(hdev, HCI_FAST_CONNECTABLE); |
| err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE, |
| hdev); |
| new_settings(hdev, sk); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev, |
| data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| __hci_req_write_fast_connectable(&req, cp->val); |
| |
| err = hci_req_run(&req, fast_connectable_complete); |
| if (err < 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, |
| MGMT_STATUS_FAILED); |
| mgmt_pending_remove(cmd); |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static void set_bredr_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| BT_DBG("status 0x%02x", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_BREDR, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| |
| /* We need to restore the flag if related HCI commands |
| * failed. |
| */ |
| hci_dev_clear_flag(hdev, HCI_BREDR_ENABLED); |
| |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err); |
| } else { |
| send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev); |
| new_settings(hdev, cmd->sk); |
| } |
| |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->val == hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev); |
| goto unlock; |
| } |
| |
| if (!hdev_is_powered(hdev)) { |
| if (!cp->val) { |
| hci_dev_clear_flag(hdev, HCI_DISCOVERABLE); |
| hci_dev_clear_flag(hdev, HCI_SSP_ENABLED); |
| hci_dev_clear_flag(hdev, HCI_LINK_SECURITY); |
| hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE); |
| hci_dev_clear_flag(hdev, HCI_HS_ENABLED); |
| } |
| |
| hci_dev_change_flag(hdev, HCI_BREDR_ENABLED); |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| err = new_settings(hdev, sk); |
| goto unlock; |
| } |
| |
| /* Reject disabling when powered on */ |
| if (!cp->val) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_REJECTED); |
| goto unlock; |
| } else { |
| /* When configuring a dual-mode controller to operate |
| * with LE only and using a static address, then switching |
| * BR/EDR back on is not allowed. |
| * |
| * Dual-mode controllers shall operate with the public |
| * address as its identity address for BR/EDR and LE. So |
| * reject the attempt to create an invalid configuration. |
| * |
| * The same restrictions applies when secure connections |
| * has been enabled. For BR/EDR this is a controller feature |
| * while for LE it is a host stack feature. This means that |
| * switching BR/EDR back on when secure connections has been |
| * enabled is not a supported transaction. |
| */ |
| if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && |
| (bacmp(&hdev->static_addr, BDADDR_ANY) || |
| hci_dev_test_flag(hdev, HCI_SC_ENABLED))) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_REJECTED); |
| goto unlock; |
| } |
| } |
| |
| if (pending_find(MGMT_OP_SET_BREDR, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| /* We need to flip the bit already here so that |
| * hci_req_update_adv_data generates the correct flags. |
| */ |
| hci_dev_set_flag(hdev, HCI_BREDR_ENABLED); |
| |
| hci_req_init(&req, hdev); |
| |
| __hci_req_write_fast_connectable(&req, false); |
| __hci_req_update_scan(&req); |
| |
| /* Since only the advertising data flags will change, there |
| * is no need to update the scan response data. |
| */ |
| __hci_req_update_adv_data(&req, HCI_ADV_CURRENT); |
| |
| err = hci_req_run(&req, set_bredr_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static void sc_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct mgmt_mode *cp; |
| |
| BT_DBG("%s status %u", hdev->name, status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_SET_SECURE_CONN, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| if (status) { |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, |
| mgmt_status(status)); |
| goto remove; |
| } |
| |
| cp = cmd->param; |
| |
| switch (cp->val) { |
| case 0x00: |
| hci_dev_clear_flag(hdev, HCI_SC_ENABLED); |
| hci_dev_clear_flag(hdev, HCI_SC_ONLY); |
| break; |
| case 0x01: |
| hci_dev_set_flag(hdev, HCI_SC_ENABLED); |
| hci_dev_clear_flag(hdev, HCI_SC_ONLY); |
| break; |
| case 0x02: |
| hci_dev_set_flag(hdev, HCI_SC_ENABLED); |
| hci_dev_set_flag(hdev, HCI_SC_ONLY); |
| break; |
| } |
| |
| send_settings_rsp(cmd->sk, MGMT_OP_SET_SECURE_CONN, hdev); |
| new_settings(hdev, cmd->sk); |
| |
| remove: |
| mgmt_pending_remove(cmd); |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int set_secure_conn(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| u8 val; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_sc_capable(hdev) && |
| !hci_dev_test_flag(hdev, HCI_LE_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && |
| lmp_sc_capable(hdev) && |
| !hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev) || !lmp_sc_capable(hdev) || |
| !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) { |
| bool changed; |
| |
| if (cp->val) { |
| changed = !hci_dev_test_and_set_flag(hdev, |
| HCI_SC_ENABLED); |
| if (cp->val == 0x02) |
| hci_dev_set_flag(hdev, HCI_SC_ONLY); |
| else |
| hci_dev_clear_flag(hdev, HCI_SC_ONLY); |
| } else { |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_SC_ENABLED); |
| hci_dev_clear_flag(hdev, HCI_SC_ONLY); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev); |
| if (err < 0) |
| goto failed; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| goto failed; |
| } |
| |
| if (pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN, |
| MGMT_STATUS_BUSY); |
| goto failed; |
| } |
| |
| val = !!cp->val; |
| |
| if (val == hci_dev_test_flag(hdev, HCI_SC_ENABLED) && |
| (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_SC_ONLY)) { |
| err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev); |
| goto failed; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto failed; |
| } |
| |
| hci_req_init(&req, hdev); |
| hci_req_add(&req, HCI_OP_WRITE_SC_SUPPORT, 1, &val); |
| err = hci_req_run(&req, sc_enable_complete); |
| if (err < 0) { |
| mgmt_pending_remove(cmd); |
| goto failed; |
| } |
| |
| failed: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_debug_keys(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_mode *cp = data; |
| bool changed, use_changed; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->val) |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS); |
| else |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_KEEP_DEBUG_KEYS); |
| |
| if (cp->val == 0x02) |
| use_changed = !hci_dev_test_and_set_flag(hdev, |
| HCI_USE_DEBUG_KEYS); |
| else |
| use_changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_USE_DEBUG_KEYS); |
| |
| if (hdev_is_powered(hdev) && use_changed && |
| hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { |
| u8 mode = (cp->val == 0x02) ? 0x01 : 0x00; |
| hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE, |
| sizeof(mode), &mode); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_privacy(struct sock *sk, struct hci_dev *hdev, void *cp_data, |
| u16 len) |
| { |
| struct mgmt_cp_set_privacy *cp = cp_data; |
| bool changed; |
| int err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| if (cp->privacy != 0x00 && cp->privacy != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| if (hdev_is_powered(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY, |
| MGMT_STATUS_REJECTED); |
| |
| hci_dev_lock(hdev); |
| |
| /* If user space supports this command it is also expected to |
| * handle IRKs. Therefore, set the HCI_RPA_RESOLVING flag. |
| */ |
| hci_dev_set_flag(hdev, HCI_RPA_RESOLVING); |
| |
| if (cp->privacy) { |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_PRIVACY); |
| memcpy(hdev->irk, cp->irk, sizeof(hdev->irk)); |
| hci_dev_set_flag(hdev, HCI_RPA_EXPIRED); |
| } else { |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_PRIVACY); |
| memset(hdev->irk, 0, sizeof(hdev->irk)); |
| hci_dev_clear_flag(hdev, HCI_RPA_EXPIRED); |
| } |
| |
| err = send_settings_rsp(sk, MGMT_OP_SET_PRIVACY, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (changed) |
| err = new_settings(hdev, sk); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static bool irk_is_valid(struct mgmt_irk_info *irk) |
| { |
| switch (irk->addr.type) { |
| case BDADDR_LE_PUBLIC: |
| return true; |
| |
| case BDADDR_LE_RANDOM: |
| /* Two most significant bits shall be set */ |
| if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0) |
| return false; |
| return true; |
| } |
| |
| return false; |
| } |
| |
| static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data, |
| u16 len) |
| { |
| struct mgmt_cp_load_irks *cp = cp_data; |
| const u16 max_irk_count = ((U16_MAX - sizeof(*cp)) / |
| sizeof(struct mgmt_irk_info)); |
| u16 irk_count, expected_len; |
| int i, err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| irk_count = __le16_to_cpu(cp->irk_count); |
| if (irk_count > max_irk_count) { |
| BT_ERR("load_irks: too big irk_count value %u", irk_count); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info); |
| if (expected_len != len) { |
| BT_ERR("load_irks: expected %u bytes, got %u bytes", |
| expected_len, len); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| BT_DBG("%s irk_count %u", hdev->name, irk_count); |
| |
| for (i = 0; i < irk_count; i++) { |
| struct mgmt_irk_info *key = &cp->irks[i]; |
| |
| if (!irk_is_valid(key)) |
| return mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_LOAD_IRKS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| hci_dev_lock(hdev); |
| |
| hci_smp_irks_clear(hdev); |
| |
| for (i = 0; i < irk_count; i++) { |
| struct mgmt_irk_info *irk = &cp->irks[i]; |
| |
| hci_add_irk(hdev, &irk->addr.bdaddr, |
| le_addr_type(irk->addr.type), irk->val, |
| BDADDR_ANY); |
| } |
| |
| hci_dev_set_flag(hdev, HCI_RPA_RESOLVING); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0); |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static bool ltk_is_valid(struct mgmt_ltk_info *key) |
| { |
| if (key->master != 0x00 && key->master != 0x01) |
| return false; |
| |
| switch (key->addr.type) { |
| case BDADDR_LE_PUBLIC: |
| return true; |
| |
| case BDADDR_LE_RANDOM: |
| /* Two most significant bits shall be set */ |
| if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0) |
| return false; |
| return true; |
| } |
| |
| return false; |
| } |
| |
| static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev, |
| void *cp_data, u16 len) |
| { |
| struct mgmt_cp_load_long_term_keys *cp = cp_data; |
| const u16 max_key_count = ((U16_MAX - sizeof(*cp)) / |
| sizeof(struct mgmt_ltk_info)); |
| u16 key_count, expected_len; |
| int i, err; |
| |
| BT_DBG("request for %s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| key_count = __le16_to_cpu(cp->key_count); |
| if (key_count > max_key_count) { |
| BT_ERR("load_ltks: too big key_count value %u", key_count); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| expected_len = sizeof(*cp) + key_count * |
| sizeof(struct mgmt_ltk_info); |
| if (expected_len != len) { |
| BT_ERR("load_keys: expected %u bytes, got %u bytes", |
| expected_len, len); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| BT_DBG("%s key_count %u", hdev->name, key_count); |
| |
| for (i = 0; i < key_count; i++) { |
| struct mgmt_ltk_info *key = &cp->keys[i]; |
| |
| if (!ltk_is_valid(key)) |
| return mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_LOAD_LONG_TERM_KEYS, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| hci_dev_lock(hdev); |
| |
| hci_smp_ltks_clear(hdev); |
| |
| for (i = 0; i < key_count; i++) { |
| struct mgmt_ltk_info *key = &cp->keys[i]; |
| u8 type, authenticated; |
| |
| switch (key->type) { |
| case MGMT_LTK_UNAUTHENTICATED: |
| authenticated = 0x00; |
| type = key->master ? SMP_LTK : SMP_LTK_SLAVE; |
| break; |
| case MGMT_LTK_AUTHENTICATED: |
| authenticated = 0x01; |
| type = key->master ? SMP_LTK : SMP_LTK_SLAVE; |
| break; |
| case MGMT_LTK_P256_UNAUTH: |
| authenticated = 0x00; |
| type = SMP_LTK_P256; |
| break; |
| case MGMT_LTK_P256_AUTH: |
| authenticated = 0x01; |
| type = SMP_LTK_P256; |
| break; |
| case MGMT_LTK_P256_DEBUG: |
| authenticated = 0x00; |
| type = SMP_LTK_P256_DEBUG; |
| default: |
| continue; |
| } |
| |
| hci_add_ltk(hdev, &key->addr.bdaddr, |
| le_addr_type(key->addr.type), type, authenticated, |
| key->val, key->enc_size, key->ediv, key->rand); |
| } |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0, |
| NULL, 0); |
| |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static int conn_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) |
| { |
| struct hci_conn *conn = cmd->user_data; |
| struct mgmt_rp_get_conn_info rp; |
| int err; |
| |
| memcpy(&rp.addr, cmd->param, sizeof(rp.addr)); |
| |
| if (status == MGMT_STATUS_SUCCESS) { |
| rp.rssi = conn->rssi; |
| rp.tx_power = conn->tx_power; |
| rp.max_tx_power = conn->max_tx_power; |
| } else { |
| rp.rssi = HCI_RSSI_INVALID; |
| rp.tx_power = HCI_TX_POWER_INVALID; |
| rp.max_tx_power = HCI_TX_POWER_INVALID; |
| } |
| |
| err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_GET_CONN_INFO, |
| status, &rp, sizeof(rp)); |
| |
| hci_conn_drop(conn); |
| hci_conn_put(conn); |
| |
| return err; |
| } |
| |
| static void conn_info_refresh_complete(struct hci_dev *hdev, u8 hci_status, |
| u16 opcode) |
| { |
| struct hci_cp_read_rssi *cp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| u16 handle; |
| u8 status; |
| |
| BT_DBG("status 0x%02x", hci_status); |
| |
| hci_dev_lock(hdev); |
| |
| /* Commands sent in request are either Read RSSI or Read Transmit Power |
| * Level so we check which one was last sent to retrieve connection |
| * handle. Both commands have handle as first parameter so it's safe to |
| * cast data on the same command struct. |
| * |
| * First command sent is always Read RSSI and we fail only if it fails. |
| * In other case we simply override error to indicate success as we |
| * already remembered if TX power value is actually valid. |
| */ |
| cp = hci_sent_cmd_data(hdev, HCI_OP_READ_RSSI); |
| if (!cp) { |
| cp = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER); |
| status = MGMT_STATUS_SUCCESS; |
| } else { |
| status = mgmt_status(hci_status); |
| } |
| |
| if (!cp) { |
| BT_ERR("invalid sent_cmd in conn_info response"); |
| goto unlock; |
| } |
| |
| handle = __le16_to_cpu(cp->handle); |
| conn = hci_conn_hash_lookup_handle(hdev, handle); |
| if (!conn) { |
| BT_ERR("unknown handle (%d) in conn_info response", handle); |
| goto unlock; |
| } |
| |
| cmd = pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn); |
| if (!cmd) |
| goto unlock; |
| |
| cmd->cmd_complete(cmd, status); |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int get_conn_info(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_get_conn_info *cp = data; |
| struct mgmt_rp_get_conn_info rp; |
| struct hci_conn *conn; |
| unsigned long conn_info_age; |
| int err = 0; |
| |
| BT_DBG("%s", hdev->name); |
| |
| memset(&rp, 0, sizeof(rp)); |
| bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); |
| rp.addr.type = cp->addr.type; |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, |
| MGMT_STATUS_NOT_POWERED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (cp->addr.type == BDADDR_BREDR) |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, |
| &cp->addr.bdaddr); |
| else |
| conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr); |
| |
| if (!conn || conn->state != BT_CONNECTED) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, |
| MGMT_STATUS_NOT_CONNECTED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, |
| MGMT_STATUS_BUSY, &rp, sizeof(rp)); |
| goto unlock; |
| } |
| |
| /* To avoid client trying to guess when to poll again for information we |
| * calculate conn info age as random value between min/max set in hdev. |
| */ |
| conn_info_age = hdev->conn_info_min_age + |
| prandom_u32_max(hdev->conn_info_max_age - |
| hdev->conn_info_min_age); |
| |
| /* Query controller to refresh cached values if they are too old or were |
| * never read. |
| */ |
| if (time_after(jiffies, conn->conn_info_timestamp + |
| msecs_to_jiffies(conn_info_age)) || |
| !conn->conn_info_timestamp) { |
| struct hci_request req; |
| struct hci_cp_read_tx_power req_txp_cp; |
| struct hci_cp_read_rssi req_rssi_cp; |
| struct mgmt_pending_cmd *cmd; |
| |
| hci_req_init(&req, hdev); |
| req_rssi_cp.handle = cpu_to_le16(conn->handle); |
| hci_req_add(&req, HCI_OP_READ_RSSI, sizeof(req_rssi_cp), |
| &req_rssi_cp); |
| |
| /* For LE links TX power does not change thus we don't need to |
| * query for it once value is known. |
| */ |
| if (!bdaddr_type_is_le(cp->addr.type) || |
| conn->tx_power == HCI_TX_POWER_INVALID) { |
| req_txp_cp.handle = cpu_to_le16(conn->handle); |
| req_txp_cp.type = 0x00; |
| hci_req_add(&req, HCI_OP_READ_TX_POWER, |
| sizeof(req_txp_cp), &req_txp_cp); |
| } |
| |
| /* Max TX power needs to be read only once per connection */ |
| if (conn->max_tx_power == HCI_TX_POWER_INVALID) { |
| req_txp_cp.handle = cpu_to_le16(conn->handle); |
| req_txp_cp.type = 0x01; |
| hci_req_add(&req, HCI_OP_READ_TX_POWER, |
| sizeof(req_txp_cp), &req_txp_cp); |
| } |
| |
| err = hci_req_run(&req, conn_info_refresh_complete); |
| if (err < 0) |
| goto unlock; |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_GET_CONN_INFO, hdev, |
| data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_conn_hold(conn); |
| cmd->user_data = hci_conn_get(conn); |
| cmd->cmd_complete = conn_info_cmd_complete; |
| |
| conn->conn_info_timestamp = jiffies; |
| } else { |
| /* Cache is valid, just reply with values cached in hci_conn */ |
| rp.rssi = conn->rssi; |
| rp.tx_power = conn->tx_power; |
| rp.max_tx_power = conn->max_tx_power; |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO, |
| MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int clock_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status) |
| { |
| struct hci_conn *conn = cmd->user_data; |
| struct mgmt_rp_get_clock_info rp; |
| struct hci_dev *hdev; |
| int err; |
| |
| memset(&rp, 0, sizeof(rp)); |
| memcpy(&rp.addr, &cmd->param, sizeof(rp.addr)); |
| |
| if (status) |
| goto complete; |
| |
| hdev = hci_dev_get(cmd->index); |
| if (hdev) { |
| rp.local_clock = cpu_to_le32(hdev->clock); |
| hci_dev_put(hdev); |
| } |
| |
| if (conn) { |
| rp.piconet_clock = cpu_to_le32(conn->clock); |
| rp.accuracy = cpu_to_le16(conn->clock_accuracy); |
| } |
| |
| complete: |
| err = mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, &rp, |
| sizeof(rp)); |
| |
| if (conn) { |
| hci_conn_drop(conn); |
| hci_conn_put(conn); |
| } |
| |
| return err; |
| } |
| |
| static void get_clock_info_complete(struct hci_dev *hdev, u8 status, u16 opcode) |
| { |
| struct hci_cp_read_clock *hci_cp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_conn *conn; |
| |
| BT_DBG("%s status %u", hdev->name, status); |
| |
| hci_dev_lock(hdev); |
| |
| hci_cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK); |
| if (!hci_cp) |
| goto unlock; |
| |
| if (hci_cp->which) { |
| u16 handle = __le16_to_cpu(hci_cp->handle); |
| conn = hci_conn_hash_lookup_handle(hdev, handle); |
| } else { |
| conn = NULL; |
| } |
| |
| cmd = pending_find_data(MGMT_OP_GET_CLOCK_INFO, hdev, conn); |
| if (!cmd) |
| goto unlock; |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int get_clock_info(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_get_clock_info *cp = data; |
| struct mgmt_rp_get_clock_info rp; |
| struct hci_cp_read_clock hci_cp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| struct hci_conn *conn; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| memset(&rp, 0, sizeof(rp)); |
| bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr); |
| rp.addr.type = cp->addr.type; |
| |
| if (cp->addr.type != BDADDR_BREDR) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO, |
| MGMT_STATUS_INVALID_PARAMS, |
| &rp, sizeof(rp)); |
| |
| hci_dev_lock(hdev); |
| |
| if (!hdev_is_powered(hdev)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO, |
| MGMT_STATUS_NOT_POWERED, &rp, |
| sizeof(rp)); |
| goto unlock; |
| } |
| |
| if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { |
| conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, |
| &cp->addr.bdaddr); |
| if (!conn || conn->state != BT_CONNECTED) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_GET_CLOCK_INFO, |
| MGMT_STATUS_NOT_CONNECTED, |
| &rp, sizeof(rp)); |
| goto unlock; |
| } |
| } else { |
| conn = NULL; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_GET_CLOCK_INFO, hdev, data, len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| cmd->cmd_complete = clock_info_cmd_complete; |
| |
| hci_req_init(&req, hdev); |
| |
| memset(&hci_cp, 0, sizeof(hci_cp)); |
| hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp); |
| |
| if (conn) { |
| hci_conn_hold(conn); |
| cmd->user_data = hci_conn_get(conn); |
| |
| hci_cp.handle = cpu_to_le16(conn->handle); |
| hci_cp.which = 0x01; /* Piconet clock */ |
| hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp); |
| } |
| |
| err = hci_req_run(&req, get_clock_info_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static bool is_connected(struct hci_dev *hdev, bdaddr_t *addr, u8 type) |
| { |
| struct hci_conn *conn; |
| |
| conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, addr); |
| if (!conn) |
| return false; |
| |
| if (conn->dst_type != type) |
| return false; |
| |
| if (conn->state != BT_CONNECTED) |
| return false; |
| |
| return true; |
| } |
| |
| /* This function requires the caller holds hdev->lock */ |
| static int hci_conn_params_set(struct hci_dev *hdev, bdaddr_t *addr, |
| u8 addr_type, u8 auto_connect) |
| { |
| struct hci_conn_params *params; |
| |
| params = hci_conn_params_add(hdev, addr, addr_type); |
| if (!params) |
| return -EIO; |
| |
| if (params->auto_connect == auto_connect) |
| return 0; |
| |
| list_del_init(¶ms->action); |
| |
| switch (auto_connect) { |
| case HCI_AUTO_CONN_DISABLED: |
| case HCI_AUTO_CONN_LINK_LOSS: |
| /* If auto connect is being disabled when we're trying to |
| * connect to device, keep connecting. |
| */ |
| if (params->explicit_connect) |
| list_add(¶ms->action, &hdev->pend_le_conns); |
| break; |
| case HCI_AUTO_CONN_REPORT: |
| if (params->explicit_connect) |
| list_add(¶ms->action, &hdev->pend_le_conns); |
| else |
| list_add(¶ms->action, &hdev->pend_le_reports); |
| break; |
| case HCI_AUTO_CONN_DIRECT: |
| case HCI_AUTO_CONN_ALWAYS: |
| if (!is_connected(hdev, addr, addr_type)) |
| list_add(¶ms->action, &hdev->pend_le_conns); |
| break; |
| } |
| |
| params->auto_connect = auto_connect; |
| |
| BT_DBG("addr %pMR (type %u) auto_connect %u", addr, addr_type, |
| auto_connect); |
| |
| return 0; |
| } |
| |
| static void device_added(struct sock *sk, struct hci_dev *hdev, |
| bdaddr_t *bdaddr, u8 type, u8 action) |
| { |
| struct mgmt_ev_device_added ev; |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = type; |
| ev.action = action; |
| |
| mgmt_event(MGMT_EV_DEVICE_ADDED, hdev, &ev, sizeof(ev), sk); |
| } |
| |
| static int add_device(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_add_device *cp = data; |
| u8 auto_conn, addr_type; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!bdaddr_type_is_valid(cp->addr.type) || |
| !bacmp(&cp->addr.bdaddr, BDADDR_ANY)) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| |
| if (cp->action != 0x00 && cp->action != 0x01 && cp->action != 0x02) |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->addr.type == BDADDR_BREDR) { |
| /* Only incoming connections action is supported for now */ |
| if (cp->action != 0x01) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| err = hci_bdaddr_list_add(&hdev->whitelist, &cp->addr.bdaddr, |
| cp->addr.type); |
| if (err) |
| goto unlock; |
| |
| hci_req_update_scan(hdev); |
| |
| goto added; |
| } |
| |
| addr_type = le_addr_type(cp->addr.type); |
| |
| if (cp->action == 0x02) |
| auto_conn = HCI_AUTO_CONN_ALWAYS; |
| else if (cp->action == 0x01) |
| auto_conn = HCI_AUTO_CONN_DIRECT; |
| else |
| auto_conn = HCI_AUTO_CONN_REPORT; |
| |
| /* Kernel internally uses conn_params with resolvable private |
| * address, but Add Device allows only identity addresses. |
| * Make sure it is enforced before calling |
| * hci_conn_params_lookup. |
| */ |
| if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| /* If the connection parameters don't exist for this device, |
| * they will be created and configured with defaults. |
| */ |
| if (hci_conn_params_set(hdev, &cp->addr.bdaddr, addr_type, |
| auto_conn) < 0) { |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_FAILED, &cp->addr, |
| sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| hci_update_background_scan(hdev); |
| |
| added: |
| device_added(sk, hdev, &cp->addr.bdaddr, cp->addr.type, cp->action); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE, |
| MGMT_STATUS_SUCCESS, &cp->addr, |
| sizeof(cp->addr)); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static void device_removed(struct sock *sk, struct hci_dev *hdev, |
| bdaddr_t *bdaddr, u8 type) |
| { |
| struct mgmt_ev_device_removed ev; |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = type; |
| |
| mgmt_event(MGMT_EV_DEVICE_REMOVED, hdev, &ev, sizeof(ev), sk); |
| } |
| |
| static int remove_device(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_remove_device *cp = data; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) { |
| struct hci_conn_params *params; |
| u8 addr_type; |
| |
| if (!bdaddr_type_is_valid(cp->addr.type)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| if (cp->addr.type == BDADDR_BREDR) { |
| err = hci_bdaddr_list_del(&hdev->whitelist, |
| &cp->addr.bdaddr, |
| cp->addr.type); |
| if (err) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, |
| sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| hci_req_update_scan(hdev); |
| |
| device_removed(sk, hdev, &cp->addr.bdaddr, |
| cp->addr.type); |
| goto complete; |
| } |
| |
| addr_type = le_addr_type(cp->addr.type); |
| |
| /* Kernel internally uses conn_params with resolvable private |
| * address, but Remove Device allows only identity addresses. |
| * Make sure it is enforced before calling |
| * hci_conn_params_lookup. |
| */ |
| if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, |
| addr_type); |
| if (!params) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| if (params->auto_connect == HCI_AUTO_CONN_DISABLED || |
| params->auto_connect == HCI_AUTO_CONN_EXPLICIT) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| list_del(¶ms->action); |
| list_del(¶ms->list); |
| kfree(params); |
| hci_update_background_scan(hdev); |
| |
| device_removed(sk, hdev, &cp->addr.bdaddr, cp->addr.type); |
| } else { |
| struct hci_conn_params *p, *tmp; |
| struct bdaddr_list *b, *btmp; |
| |
| if (cp->addr.type) { |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_INVALID_PARAMS, |
| &cp->addr, sizeof(cp->addr)); |
| goto unlock; |
| } |
| |
| list_for_each_entry_safe(b, btmp, &hdev->whitelist, list) { |
| device_removed(sk, hdev, &b->bdaddr, b->bdaddr_type); |
| list_del(&b->list); |
| kfree(b); |
| } |
| |
| hci_req_update_scan(hdev); |
| |
| list_for_each_entry_safe(p, tmp, &hdev->le_conn_params, list) { |
| if (p->auto_connect == HCI_AUTO_CONN_DISABLED) |
| continue; |
| device_removed(sk, hdev, &p->addr, p->addr_type); |
| if (p->explicit_connect) { |
| p->auto_connect = HCI_AUTO_CONN_EXPLICIT; |
| continue; |
| } |
| list_del(&p->action); |
| list_del(&p->list); |
| kfree(p); |
| } |
| |
| BT_DBG("All LE connection parameters were removed"); |
| |
| hci_update_background_scan(hdev); |
| } |
| |
| complete: |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_DEVICE, |
| MGMT_STATUS_SUCCESS, &cp->addr, |
| sizeof(cp->addr)); |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int load_conn_param(struct sock *sk, struct hci_dev *hdev, void *data, |
| u16 len) |
| { |
| struct mgmt_cp_load_conn_param *cp = data; |
| const u16 max_param_count = ((U16_MAX - sizeof(*cp)) / |
| sizeof(struct mgmt_conn_param)); |
| u16 param_count, expected_len; |
| int i; |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| param_count = __le16_to_cpu(cp->param_count); |
| if (param_count > max_param_count) { |
| BT_ERR("load_conn_param: too big param_count value %u", |
| param_count); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| expected_len = sizeof(*cp) + param_count * |
| sizeof(struct mgmt_conn_param); |
| if (expected_len != len) { |
| BT_ERR("load_conn_param: expected %u bytes, got %u bytes", |
| expected_len, len); |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, |
| MGMT_STATUS_INVALID_PARAMS); |
| } |
| |
| BT_DBG("%s param_count %u", hdev->name, param_count); |
| |
| hci_dev_lock(hdev); |
| |
| hci_conn_params_clear_disabled(hdev); |
| |
| for (i = 0; i < param_count; i++) { |
| struct mgmt_conn_param *param = &cp->params[i]; |
| struct hci_conn_params *hci_param; |
| u16 min, max, latency, timeout; |
| u8 addr_type; |
| |
| BT_DBG("Adding %pMR (type %u)", ¶m->addr.bdaddr, |
| param->addr.type); |
| |
| if (param->addr.type == BDADDR_LE_PUBLIC) { |
| addr_type = ADDR_LE_DEV_PUBLIC; |
| } else if (param->addr.type == BDADDR_LE_RANDOM) { |
| addr_type = ADDR_LE_DEV_RANDOM; |
| } else { |
| BT_ERR("Ignoring invalid connection parameters"); |
| continue; |
| } |
| |
| min = le16_to_cpu(param->min_interval); |
| max = le16_to_cpu(param->max_interval); |
| latency = le16_to_cpu(param->latency); |
| timeout = le16_to_cpu(param->timeout); |
| |
| BT_DBG("min 0x%04x max 0x%04x latency 0x%04x timeout 0x%04x", |
| min, max, latency, timeout); |
| |
| if (hci_check_conn_params(min, max, latency, timeout) < 0) { |
| BT_ERR("Ignoring invalid connection parameters"); |
| continue; |
| } |
| |
| hci_param = hci_conn_params_add(hdev, ¶m->addr.bdaddr, |
| addr_type); |
| if (!hci_param) { |
| BT_ERR("Failed to add connection parameters"); |
| continue; |
| } |
| |
| hci_param->conn_min_interval = min; |
| hci_param->conn_max_interval = max; |
| hci_param->conn_latency = latency; |
| hci_param->supervision_timeout = timeout; |
| } |
| |
| hci_dev_unlock(hdev); |
| |
| return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 0, |
| NULL, 0); |
| } |
| |
| static int set_external_config(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_set_external_config *cp = data; |
| bool changed; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (hdev_is_powered(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->config != 0x00 && cp->config != 0x01) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| if (!test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->config) |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_EXT_CONFIGURED); |
| else |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_EXT_CONFIGURED); |
| |
| err = send_options_rsp(sk, MGMT_OP_SET_EXTERNAL_CONFIG, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (!changed) |
| goto unlock; |
| |
| err = new_options(hdev, sk); |
| |
| if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED) == is_configured(hdev)) { |
| mgmt_index_removed(hdev); |
| |
| if (hci_dev_test_and_change_flag(hdev, HCI_UNCONFIGURED)) { |
| hci_dev_set_flag(hdev, HCI_CONFIG); |
| hci_dev_set_flag(hdev, HCI_AUTO_OFF); |
| |
| queue_work(hdev->req_workqueue, &hdev->power_on); |
| } else { |
| set_bit(HCI_RAW, &hdev->flags); |
| mgmt_index_added(hdev); |
| } |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static int set_public_address(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 len) |
| { |
| struct mgmt_cp_set_public_address *cp = data; |
| bool changed; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (hdev_is_powered(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, |
| MGMT_STATUS_REJECTED); |
| |
| if (!bacmp(&cp->bdaddr, BDADDR_ANY)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| if (!hdev->set_bdaddr) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS, |
| MGMT_STATUS_NOT_SUPPORTED); |
| |
| hci_dev_lock(hdev); |
| |
| changed = !!bacmp(&hdev->public_addr, &cp->bdaddr); |
| bacpy(&hdev->public_addr, &cp->bdaddr); |
| |
| err = send_options_rsp(sk, MGMT_OP_SET_PUBLIC_ADDRESS, hdev); |
| if (err < 0) |
| goto unlock; |
| |
| if (!changed) |
| goto unlock; |
| |
| if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) |
| err = new_options(hdev, sk); |
| |
| if (is_configured(hdev)) { |
| mgmt_index_removed(hdev); |
| |
| hci_dev_clear_flag(hdev, HCI_UNCONFIGURED); |
| |
| hci_dev_set_flag(hdev, HCI_CONFIG); |
| hci_dev_set_flag(hdev, HCI_AUTO_OFF); |
| |
| queue_work(hdev->req_workqueue, &hdev->power_on); |
| } |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| return err; |
| } |
| |
| static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data, |
| u8 data_len) |
| { |
| eir[eir_len++] = sizeof(type) + data_len; |
| eir[eir_len++] = type; |
| memcpy(&eir[eir_len], data, data_len); |
| eir_len += data_len; |
| |
| return eir_len; |
| } |
| |
| static void read_local_oob_ext_data_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode, struct sk_buff *skb) |
| { |
| const struct mgmt_cp_read_local_oob_ext_data *mgmt_cp; |
| struct mgmt_rp_read_local_oob_ext_data *mgmt_rp; |
| u8 *h192, *r192, *h256, *r256; |
| struct mgmt_pending_cmd *cmd; |
| u16 eir_len; |
| int err; |
| |
| BT_DBG("%s status %u", hdev->name, status); |
| |
| cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev); |
| if (!cmd) |
| return; |
| |
| mgmt_cp = cmd->param; |
| |
| if (status) { |
| status = mgmt_status(status); |
| eir_len = 0; |
| |
| h192 = NULL; |
| r192 = NULL; |
| h256 = NULL; |
| r256 = NULL; |
| } else if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) { |
| struct hci_rp_read_local_oob_data *rp; |
| |
| if (skb->len != sizeof(*rp)) { |
| status = MGMT_STATUS_FAILED; |
| eir_len = 0; |
| } else { |
| status = MGMT_STATUS_SUCCESS; |
| rp = (void *)skb->data; |
| |
| eir_len = 5 + 18 + 18; |
| h192 = rp->hash; |
| r192 = rp->rand; |
| h256 = NULL; |
| r256 = NULL; |
| } |
| } else { |
| struct hci_rp_read_local_oob_ext_data *rp; |
| |
| if (skb->len != sizeof(*rp)) { |
| status = MGMT_STATUS_FAILED; |
| eir_len = 0; |
| } else { |
| status = MGMT_STATUS_SUCCESS; |
| rp = (void *)skb->data; |
| |
| if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) { |
| eir_len = 5 + 18 + 18; |
| h192 = NULL; |
| r192 = NULL; |
| } else { |
| eir_len = 5 + 18 + 18 + 18 + 18; |
| h192 = rp->hash192; |
| r192 = rp->rand192; |
| } |
| |
| h256 = rp->hash256; |
| r256 = rp->rand256; |
| } |
| } |
| |
| mgmt_rp = kmalloc(sizeof(*mgmt_rp) + eir_len, GFP_KERNEL); |
| if (!mgmt_rp) |
| goto done; |
| |
| if (status) |
| goto send_rsp; |
| |
| eir_len = eir_append_data(mgmt_rp->eir, 0, EIR_CLASS_OF_DEV, |
| hdev->dev_class, 3); |
| |
| if (h192 && r192) { |
| eir_len = eir_append_data(mgmt_rp->eir, eir_len, |
| EIR_SSP_HASH_C192, h192, 16); |
| eir_len = eir_append_data(mgmt_rp->eir, eir_len, |
| EIR_SSP_RAND_R192, r192, 16); |
| } |
| |
| if (h256 && r256) { |
| eir_len = eir_append_data(mgmt_rp->eir, eir_len, |
| EIR_SSP_HASH_C256, h256, 16); |
| eir_len = eir_append_data(mgmt_rp->eir, eir_len, |
| EIR_SSP_RAND_R256, r256, 16); |
| } |
| |
| send_rsp: |
| mgmt_rp->type = mgmt_cp->type; |
| mgmt_rp->eir_len = cpu_to_le16(eir_len); |
| |
| err = mgmt_cmd_complete(cmd->sk, hdev->id, |
| MGMT_OP_READ_LOCAL_OOB_EXT_DATA, status, |
| mgmt_rp, sizeof(*mgmt_rp) + eir_len); |
| if (err < 0 || status) |
| goto done; |
| |
| hci_sock_set_flag(cmd->sk, HCI_MGMT_OOB_DATA_EVENTS); |
| |
| err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev, |
| mgmt_rp, sizeof(*mgmt_rp) + eir_len, |
| HCI_MGMT_OOB_DATA_EVENTS, cmd->sk); |
| done: |
| kfree(mgmt_rp); |
| mgmt_pending_remove(cmd); |
| } |
| |
| static int read_local_ssp_oob_req(struct hci_dev *hdev, struct sock *sk, |
| struct mgmt_cp_read_local_oob_ext_data *cp) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev, |
| cp, sizeof(*cp)); |
| if (!cmd) |
| return -ENOMEM; |
| |
| hci_req_init(&req, hdev); |
| |
| if (bredr_sc_enabled(hdev)) |
| hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL); |
| else |
| hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL); |
| |
| err = hci_req_run_skb(&req, read_local_oob_ext_data_complete); |
| if (err < 0) { |
| mgmt_pending_remove(cmd); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static int read_local_oob_ext_data(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_cp_read_local_oob_ext_data *cp = data; |
| struct mgmt_rp_read_local_oob_ext_data *rp; |
| size_t rp_len; |
| u16 eir_len; |
| u8 status, flags, role, addr[7], hash[16], rand[16]; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (hdev_is_powered(hdev)) { |
| switch (cp->type) { |
| case BIT(BDADDR_BREDR): |
| status = mgmt_bredr_support(hdev); |
| if (status) |
| eir_len = 0; |
| else |
| eir_len = 5; |
| break; |
| case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)): |
| status = mgmt_le_support(hdev); |
| if (status) |
| eir_len = 0; |
| else |
| eir_len = 9 + 3 + 18 + 18 + 3; |
| break; |
| default: |
| status = MGMT_STATUS_INVALID_PARAMS; |
| eir_len = 0; |
| break; |
| } |
| } else { |
| status = MGMT_STATUS_NOT_POWERED; |
| eir_len = 0; |
| } |
| |
| rp_len = sizeof(*rp) + eir_len; |
| rp = kmalloc(rp_len, GFP_ATOMIC); |
| if (!rp) |
| return -ENOMEM; |
| |
| if (status) |
| goto complete; |
| |
| hci_dev_lock(hdev); |
| |
| eir_len = 0; |
| switch (cp->type) { |
| case BIT(BDADDR_BREDR): |
| if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { |
| err = read_local_ssp_oob_req(hdev, sk, cp); |
| hci_dev_unlock(hdev); |
| if (!err) |
| goto done; |
| |
| status = MGMT_STATUS_FAILED; |
| goto complete; |
| } else { |
| eir_len = eir_append_data(rp->eir, eir_len, |
| EIR_CLASS_OF_DEV, |
| hdev->dev_class, 3); |
| } |
| break; |
| case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)): |
| if (hci_dev_test_flag(hdev, HCI_SC_ENABLED) && |
| smp_generate_oob(hdev, hash, rand) < 0) { |
| hci_dev_unlock(hdev); |
| status = MGMT_STATUS_FAILED; |
| goto complete; |
| } |
| |
| /* This should return the active RPA, but since the RPA |
| * is only programmed on demand, it is really hard to fill |
| * this in at the moment. For now disallow retrieving |
| * local out-of-band data when privacy is in use. |
| * |
| * Returning the identity address will not help here since |
| * pairing happens before the identity resolving key is |
| * known and thus the connection establishment happens |
| * based on the RPA and not the identity address. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_PRIVACY)) { |
| hci_dev_unlock(hdev); |
| status = MGMT_STATUS_REJECTED; |
| goto complete; |
| } |
| |
| if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) || |
| !bacmp(&hdev->bdaddr, BDADDR_ANY) || |
| (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) && |
| bacmp(&hdev->static_addr, BDADDR_ANY))) { |
| memcpy(addr, &hdev->static_addr, 6); |
| addr[6] = 0x01; |
| } else { |
| memcpy(addr, &hdev->bdaddr, 6); |
| addr[6] = 0x00; |
| } |
| |
| eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_BDADDR, |
| addr, sizeof(addr)); |
| |
| if (hci_dev_test_flag(hdev, HCI_ADVERTISING)) |
| role = 0x02; |
| else |
| role = 0x01; |
| |
| eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_ROLE, |
| &role, sizeof(role)); |
| |
| if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) { |
| eir_len = eir_append_data(rp->eir, eir_len, |
| EIR_LE_SC_CONFIRM, |
| hash, sizeof(hash)); |
| |
| eir_len = eir_append_data(rp->eir, eir_len, |
| EIR_LE_SC_RANDOM, |
| rand, sizeof(rand)); |
| } |
| |
| flags = mgmt_get_adv_discov_flags(hdev); |
| |
| if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) |
| flags |= LE_AD_NO_BREDR; |
| |
| eir_len = eir_append_data(rp->eir, eir_len, EIR_FLAGS, |
| &flags, sizeof(flags)); |
| break; |
| } |
| |
| hci_dev_unlock(hdev); |
| |
| hci_sock_set_flag(sk, HCI_MGMT_OOB_DATA_EVENTS); |
| |
| status = MGMT_STATUS_SUCCESS; |
| |
| complete: |
| rp->type = cp->type; |
| rp->eir_len = cpu_to_le16(eir_len); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, |
| status, rp, sizeof(*rp) + eir_len); |
| if (err < 0 || status) |
| goto done; |
| |
| err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev, |
| rp, sizeof(*rp) + eir_len, |
| HCI_MGMT_OOB_DATA_EVENTS, sk); |
| |
| done: |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static u32 get_supported_adv_flags(struct hci_dev *hdev) |
| { |
| u32 flags = 0; |
| |
| flags |= MGMT_ADV_FLAG_CONNECTABLE; |
| flags |= MGMT_ADV_FLAG_DISCOV; |
| flags |= MGMT_ADV_FLAG_LIMITED_DISCOV; |
| flags |= MGMT_ADV_FLAG_MANAGED_FLAGS; |
| |
| if (hdev->adv_tx_power != HCI_TX_POWER_INVALID) |
| flags |= MGMT_ADV_FLAG_TX_POWER; |
| |
| return flags; |
| } |
| |
| static int read_adv_features(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_rp_read_adv_features *rp; |
| size_t rp_len; |
| int err; |
| struct adv_info *adv_instance; |
| u32 supported_flags; |
| u8 *instance; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES, |
| MGMT_STATUS_REJECTED); |
| |
| hci_dev_lock(hdev); |
| |
| rp_len = sizeof(*rp) + hdev->adv_instance_cnt; |
| rp = kmalloc(rp_len, GFP_ATOMIC); |
| if (!rp) { |
| hci_dev_unlock(hdev); |
| return -ENOMEM; |
| } |
| |
| supported_flags = get_supported_adv_flags(hdev); |
| |
| rp->supported_flags = cpu_to_le32(supported_flags); |
| rp->max_adv_data_len = HCI_MAX_AD_LENGTH; |
| rp->max_scan_rsp_len = HCI_MAX_AD_LENGTH; |
| rp->max_instances = HCI_MAX_ADV_INSTANCES; |
| rp->num_instances = hdev->adv_instance_cnt; |
| |
| instance = rp->instance; |
| list_for_each_entry(adv_instance, &hdev->adv_instances, list) { |
| *instance = adv_instance->instance; |
| instance++; |
| } |
| |
| hci_dev_unlock(hdev); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES, |
| MGMT_STATUS_SUCCESS, rp, rp_len); |
| |
| kfree(rp); |
| |
| return err; |
| } |
| |
| static bool tlv_data_is_valid(struct hci_dev *hdev, u32 adv_flags, u8 *data, |
| u8 len, bool is_adv_data) |
| { |
| u8 max_len = HCI_MAX_AD_LENGTH; |
| int i, cur_len; |
| bool flags_managed = false; |
| bool tx_power_managed = false; |
| |
| if (is_adv_data) { |
| if (adv_flags & (MGMT_ADV_FLAG_DISCOV | |
| MGMT_ADV_FLAG_LIMITED_DISCOV | |
| MGMT_ADV_FLAG_MANAGED_FLAGS)) { |
| flags_managed = true; |
| max_len -= 3; |
| } |
| |
| if (adv_flags & MGMT_ADV_FLAG_TX_POWER) { |
| tx_power_managed = true; |
| max_len -= 3; |
| } |
| } |
| |
| if (len > max_len) |
| return false; |
| |
| /* Make sure that the data is correctly formatted. */ |
| for (i = 0, cur_len = 0; i < len; i += (cur_len + 1)) { |
| cur_len = data[i]; |
| |
| if (flags_managed && data[i + 1] == EIR_FLAGS) |
| return false; |
| |
| if (tx_power_managed && data[i + 1] == EIR_TX_POWER) |
| return false; |
| |
| /* If the current field length would exceed the total data |
| * length, then it's invalid. |
| */ |
| if (i + cur_len >= len) |
| return false; |
| } |
| |
| return true; |
| } |
| |
| static void add_advertising_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct mgmt_cp_add_advertising *cp; |
| struct mgmt_rp_add_advertising rp; |
| struct adv_info *adv_instance, *n; |
| u8 instance; |
| |
| BT_DBG("status %d", status); |
| |
| hci_dev_lock(hdev); |
| |
| cmd = pending_find(MGMT_OP_ADD_ADVERTISING, hdev); |
| |
| list_for_each_entry_safe(adv_instance, n, &hdev->adv_instances, list) { |
| if (!adv_instance->pending) |
| continue; |
| |
| if (!status) { |
| adv_instance->pending = false; |
| continue; |
| } |
| |
| instance = adv_instance->instance; |
| |
| if (hdev->cur_adv_instance == instance) |
| cancel_adv_timeout(hdev); |
| |
| hci_remove_adv_instance(hdev, instance); |
| mgmt_advertising_removed(cmd ? cmd->sk : NULL, hdev, instance); |
| } |
| |
| if (!cmd) |
| goto unlock; |
| |
| cp = cmd->param; |
| rp.instance = cp->instance; |
| |
| if (status) |
| mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, |
| mgmt_status(status)); |
| else |
| mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, |
| mgmt_status(status), &rp, sizeof(rp)); |
| |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int add_advertising(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_cp_add_advertising *cp = data; |
| struct mgmt_rp_add_advertising rp; |
| u32 flags; |
| u32 supported_flags; |
| u8 status; |
| u16 timeout, duration; |
| unsigned int prev_instance_cnt = hdev->adv_instance_cnt; |
| u8 schedule_instance = 0; |
| struct adv_info *next_instance; |
| int err; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| |
| BT_DBG("%s", hdev->name); |
| |
| status = mgmt_le_support(hdev); |
| if (status) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| status); |
| |
| if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| flags = __le32_to_cpu(cp->flags); |
| timeout = __le16_to_cpu(cp->timeout); |
| duration = __le16_to_cpu(cp->duration); |
| |
| /* The current implementation only supports a subset of the specified |
| * flags. |
| */ |
| supported_flags = get_supported_adv_flags(hdev); |
| if (flags & ~supported_flags) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| hci_dev_lock(hdev); |
| |
| if (timeout && !hdev_is_powered(hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_REJECTED); |
| goto unlock; |
| } |
| |
| if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) || |
| pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) || |
| pending_find(MGMT_OP_SET_LE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if (!tlv_data_is_valid(hdev, flags, cp->data, cp->adv_data_len, true) || |
| !tlv_data_is_valid(hdev, flags, cp->data + cp->adv_data_len, |
| cp->scan_rsp_len, false)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| err = hci_add_adv_instance(hdev, cp->instance, flags, |
| cp->adv_data_len, cp->data, |
| cp->scan_rsp_len, |
| cp->data + cp->adv_data_len, |
| timeout, duration); |
| if (err < 0) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_FAILED); |
| goto unlock; |
| } |
| |
| /* Only trigger an advertising added event if a new instance was |
| * actually added. |
| */ |
| if (hdev->adv_instance_cnt > prev_instance_cnt) |
| mgmt_advertising_added(sk, hdev, cp->instance); |
| |
| if (hdev->cur_adv_instance == cp->instance) { |
| /* If the currently advertised instance is being changed then |
| * cancel the current advertising and schedule the next |
| * instance. If there is only one instance then the overridden |
| * advertising data will be visible right away. |
| */ |
| cancel_adv_timeout(hdev); |
| |
| next_instance = hci_get_next_instance(hdev, cp->instance); |
| if (next_instance) |
| schedule_instance = next_instance->instance; |
| } else if (!hdev->adv_instance_timeout) { |
| /* Immediately advertise the new instance if no other |
| * instance is currently being advertised. |
| */ |
| schedule_instance = cp->instance; |
| } |
| |
| /* If the HCI_ADVERTISING flag is set or the device isn't powered or |
| * there is no instance to be advertised then we have no HCI |
| * communication to make. Simply return. |
| */ |
| if (!hdev_is_powered(hdev) || |
| hci_dev_test_flag(hdev, HCI_ADVERTISING) || |
| !schedule_instance) { |
| rp.instance = cp->instance; |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_ADVERTISING, |
| MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); |
| goto unlock; |
| } |
| |
| /* We're good to go, update advertising data, parameters, and start |
| * advertising. |
| */ |
| cmd = mgmt_pending_add(sk, MGMT_OP_ADD_ADVERTISING, hdev, data, |
| data_len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| err = __hci_req_schedule_adv_instance(&req, schedule_instance, true); |
| |
| if (!err) |
| err = hci_req_run(&req, add_advertising_complete); |
| |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static void remove_advertising_complete(struct hci_dev *hdev, u8 status, |
| u16 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct mgmt_cp_remove_advertising *cp; |
| struct mgmt_rp_remove_advertising rp; |
| |
| BT_DBG("status %d", status); |
| |
| hci_dev_lock(hdev); |
| |
| /* A failure status here only means that we failed to disable |
| * advertising. Otherwise, the advertising instance has been removed, |
| * so report success. |
| */ |
| cmd = pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev); |
| if (!cmd) |
| goto unlock; |
| |
| cp = cmd->param; |
| rp.instance = cp->instance; |
| |
| mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, MGMT_STATUS_SUCCESS, |
| &rp, sizeof(rp)); |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| } |
| |
| static int remove_advertising(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_cp_remove_advertising *cp = data; |
| struct mgmt_rp_remove_advertising rp; |
| struct mgmt_pending_cmd *cmd; |
| struct hci_request req; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| hci_dev_lock(hdev); |
| |
| if (cp->instance && !hci_find_adv_instance(hdev, cp->instance)) { |
| err = mgmt_cmd_status(sk, hdev->id, |
| MGMT_OP_REMOVE_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) || |
| pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) || |
| pending_find(MGMT_OP_SET_LE, hdev)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING, |
| MGMT_STATUS_BUSY); |
| goto unlock; |
| } |
| |
| if (list_empty(&hdev->adv_instances)) { |
| err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING, |
| MGMT_STATUS_INVALID_PARAMS); |
| goto unlock; |
| } |
| |
| hci_req_init(&req, hdev); |
| |
| hci_req_clear_adv_instance(hdev, &req, cp->instance, true); |
| |
| if (list_empty(&hdev->adv_instances)) |
| __hci_req_disable_advertising(&req); |
| |
| /* If no HCI commands have been collected so far or the HCI_ADVERTISING |
| * flag is set or the device isn't powered then we have no HCI |
| * communication to make. Simply return. |
| */ |
| if (skb_queue_empty(&req.cmd_q) || |
| !hdev_is_powered(hdev) || |
| hci_dev_test_flag(hdev, HCI_ADVERTISING)) { |
| rp.instance = cp->instance; |
| err = mgmt_cmd_complete(sk, hdev->id, |
| MGMT_OP_REMOVE_ADVERTISING, |
| MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); |
| goto unlock; |
| } |
| |
| cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_ADVERTISING, hdev, data, |
| data_len); |
| if (!cmd) { |
| err = -ENOMEM; |
| goto unlock; |
| } |
| |
| err = hci_req_run(&req, remove_advertising_complete); |
| if (err < 0) |
| mgmt_pending_remove(cmd); |
| |
| unlock: |
| hci_dev_unlock(hdev); |
| |
| return err; |
| } |
| |
| static u8 tlv_data_max_len(u32 adv_flags, bool is_adv_data) |
| { |
| u8 max_len = HCI_MAX_AD_LENGTH; |
| |
| if (is_adv_data) { |
| if (adv_flags & (MGMT_ADV_FLAG_DISCOV | |
| MGMT_ADV_FLAG_LIMITED_DISCOV | |
| MGMT_ADV_FLAG_MANAGED_FLAGS)) |
| max_len -= 3; |
| |
| if (adv_flags & MGMT_ADV_FLAG_TX_POWER) |
| max_len -= 3; |
| } |
| |
| return max_len; |
| } |
| |
| static int get_adv_size_info(struct sock *sk, struct hci_dev *hdev, |
| void *data, u16 data_len) |
| { |
| struct mgmt_cp_get_adv_size_info *cp = data; |
| struct mgmt_rp_get_adv_size_info rp; |
| u32 flags, supported_flags; |
| int err; |
| |
| BT_DBG("%s", hdev->name); |
| |
| if (!lmp_le_capable(hdev)) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, |
| MGMT_STATUS_REJECTED); |
| |
| if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| flags = __le32_to_cpu(cp->flags); |
| |
| /* The current implementation only supports a subset of the specified |
| * flags. |
| */ |
| supported_flags = get_supported_adv_flags(hdev); |
| if (flags & ~supported_flags) |
| return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, |
| MGMT_STATUS_INVALID_PARAMS); |
| |
| rp.instance = cp->instance; |
| rp.flags = cp->flags; |
| rp.max_adv_data_len = tlv_data_max_len(flags, true); |
| rp.max_scan_rsp_len = tlv_data_max_len(flags, false); |
| |
| err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO, |
| MGMT_STATUS_SUCCESS, &rp, sizeof(rp)); |
| |
| return err; |
| } |
| |
| static const struct hci_mgmt_handler mgmt_handlers[] = { |
| { NULL }, /* 0x0000 (no command) */ |
| { read_version, MGMT_READ_VERSION_SIZE, |
| HCI_MGMT_NO_HDEV | |
| HCI_MGMT_UNTRUSTED }, |
| { read_commands, MGMT_READ_COMMANDS_SIZE, |
| HCI_MGMT_NO_HDEV | |
| HCI_MGMT_UNTRUSTED }, |
| { read_index_list, MGMT_READ_INDEX_LIST_SIZE, |
| HCI_MGMT_NO_HDEV | |
| HCI_MGMT_UNTRUSTED }, |
| { read_controller_info, MGMT_READ_INFO_SIZE, |
| HCI_MGMT_UNTRUSTED }, |
| { set_powered, MGMT_SETTING_SIZE }, |
| { set_discoverable, MGMT_SET_DISCOVERABLE_SIZE }, |
| { set_connectable, MGMT_SETTING_SIZE }, |
| { set_fast_connectable, MGMT_SETTING_SIZE }, |
| { set_bondable, MGMT_SETTING_SIZE }, |
| { set_link_security, MGMT_SETTING_SIZE }, |
| { set_ssp, MGMT_SETTING_SIZE }, |
| { set_hs, MGMT_SETTING_SIZE }, |
| { set_le, MGMT_SETTING_SIZE }, |
| { set_dev_class, MGMT_SET_DEV_CLASS_SIZE }, |
| { set_local_name, MGMT_SET_LOCAL_NAME_SIZE }, |
| { add_uuid, MGMT_ADD_UUID_SIZE }, |
| { remove_uuid, MGMT_REMOVE_UUID_SIZE }, |
| { load_link_keys, MGMT_LOAD_LINK_KEYS_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { load_long_term_keys, MGMT_LOAD_LONG_TERM_KEYS_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { disconnect, MGMT_DISCONNECT_SIZE }, |
| { get_connections, MGMT_GET_CONNECTIONS_SIZE }, |
| { pin_code_reply, MGMT_PIN_CODE_REPLY_SIZE }, |
| { pin_code_neg_reply, MGMT_PIN_CODE_NEG_REPLY_SIZE }, |
| { set_io_capability, MGMT_SET_IO_CAPABILITY_SIZE }, |
| { pair_device, MGMT_PAIR_DEVICE_SIZE }, |
| { cancel_pair_device, MGMT_CANCEL_PAIR_DEVICE_SIZE }, |
| { unpair_device, MGMT_UNPAIR_DEVICE_SIZE }, |
| { user_confirm_reply, MGMT_USER_CONFIRM_REPLY_SIZE }, |
| { user_confirm_neg_reply, MGMT_USER_CONFIRM_NEG_REPLY_SIZE }, |
| { user_passkey_reply, MGMT_USER_PASSKEY_REPLY_SIZE }, |
| { user_passkey_neg_reply, MGMT_USER_PASSKEY_NEG_REPLY_SIZE }, |
| { read_local_oob_data, MGMT_READ_LOCAL_OOB_DATA_SIZE }, |
| { add_remote_oob_data, MGMT_ADD_REMOTE_OOB_DATA_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { remove_remote_oob_data, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE }, |
| { start_discovery, MGMT_START_DISCOVERY_SIZE }, |
| { stop_discovery, MGMT_STOP_DISCOVERY_SIZE }, |
| { confirm_name, MGMT_CONFIRM_NAME_SIZE }, |
| { block_device, MGMT_BLOCK_DEVICE_SIZE }, |
| { unblock_device, MGMT_UNBLOCK_DEVICE_SIZE }, |
| { set_device_id, MGMT_SET_DEVICE_ID_SIZE }, |
| { set_advertising, MGMT_SETTING_SIZE }, |
| { set_bredr, MGMT_SETTING_SIZE }, |
| { set_static_address, MGMT_SET_STATIC_ADDRESS_SIZE }, |
| { set_scan_params, MGMT_SET_SCAN_PARAMS_SIZE }, |
| { set_secure_conn, MGMT_SETTING_SIZE }, |
| { set_debug_keys, MGMT_SETTING_SIZE }, |
| { set_privacy, MGMT_SET_PRIVACY_SIZE }, |
| { load_irks, MGMT_LOAD_IRKS_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { get_conn_info, MGMT_GET_CONN_INFO_SIZE }, |
| { get_clock_info, MGMT_GET_CLOCK_INFO_SIZE }, |
| { add_device, MGMT_ADD_DEVICE_SIZE }, |
| { remove_device, MGMT_REMOVE_DEVICE_SIZE }, |
| { load_conn_param, MGMT_LOAD_CONN_PARAM_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { read_unconf_index_list, MGMT_READ_UNCONF_INDEX_LIST_SIZE, |
| HCI_MGMT_NO_HDEV | |
| HCI_MGMT_UNTRUSTED }, |
| { read_config_info, MGMT_READ_CONFIG_INFO_SIZE, |
| HCI_MGMT_UNCONFIGURED | |
| HCI_MGMT_UNTRUSTED }, |
| { set_external_config, MGMT_SET_EXTERNAL_CONFIG_SIZE, |
| HCI_MGMT_UNCONFIGURED }, |
| { set_public_address, MGMT_SET_PUBLIC_ADDRESS_SIZE, |
| HCI_MGMT_UNCONFIGURED }, |
| { start_service_discovery, MGMT_START_SERVICE_DISCOVERY_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { read_local_oob_ext_data, MGMT_READ_LOCAL_OOB_EXT_DATA_SIZE }, |
| { read_ext_index_list, MGMT_READ_EXT_INDEX_LIST_SIZE, |
| HCI_MGMT_NO_HDEV | |
| HCI_MGMT_UNTRUSTED }, |
| { read_adv_features, MGMT_READ_ADV_FEATURES_SIZE }, |
| { add_advertising, MGMT_ADD_ADVERTISING_SIZE, |
| HCI_MGMT_VAR_LEN }, |
| { remove_advertising, MGMT_REMOVE_ADVERTISING_SIZE }, |
| { get_adv_size_info, MGMT_GET_ADV_SIZE_INFO_SIZE }, |
| }; |
| |
| void mgmt_index_added(struct hci_dev *hdev) |
| { |
| struct mgmt_ev_ext_index ev; |
| |
| if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks)) |
| return; |
| |
| switch (hdev->dev_type) { |
| case HCI_BREDR: |
| if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) { |
| mgmt_index_event(MGMT_EV_UNCONF_INDEX_ADDED, hdev, |
| NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS); |
| ev.type = 0x01; |
| } else { |
| mgmt_index_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, |
| HCI_MGMT_INDEX_EVENTS); |
| ev.type = 0x00; |
| } |
| break; |
| case HCI_AMP: |
| ev.type = 0x02; |
| break; |
| default: |
| return; |
| } |
| |
| ev.bus = hdev->bus; |
| |
| mgmt_index_event(MGMT_EV_EXT_INDEX_ADDED, hdev, &ev, sizeof(ev), |
| HCI_MGMT_EXT_INDEX_EVENTS); |
| } |
| |
| void mgmt_index_removed(struct hci_dev *hdev) |
| { |
| struct mgmt_ev_ext_index ev; |
| u8 status = MGMT_STATUS_INVALID_INDEX; |
| |
| if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks)) |
| return; |
| |
| switch (hdev->dev_type) { |
| case HCI_BREDR: |
| mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status); |
| |
| if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) { |
| mgmt_index_event(MGMT_EV_UNCONF_INDEX_REMOVED, hdev, |
| NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS); |
| ev.type = 0x01; |
| } else { |
| mgmt_index_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, |
| HCI_MGMT_INDEX_EVENTS); |
| ev.type = 0x00; |
| } |
| break; |
| case HCI_AMP: |
| ev.type = 0x02; |
| break; |
| default: |
| return; |
| } |
| |
| ev.bus = hdev->bus; |
| |
| mgmt_index_event(MGMT_EV_EXT_INDEX_REMOVED, hdev, &ev, sizeof(ev), |
| HCI_MGMT_EXT_INDEX_EVENTS); |
| } |
| |
| /* This function requires the caller holds hdev->lock */ |
| static void restart_le_actions(struct hci_dev *hdev) |
| { |
| struct hci_conn_params *p; |
| |
| list_for_each_entry(p, &hdev->le_conn_params, list) { |
| /* Needed for AUTO_OFF case where might not "really" |
| * have been powered off. |
| */ |
| list_del_init(&p->action); |
| |
| switch (p->auto_connect) { |
| case HCI_AUTO_CONN_DIRECT: |
| case HCI_AUTO_CONN_ALWAYS: |
| list_add(&p->action, &hdev->pend_le_conns); |
| break; |
| case HCI_AUTO_CONN_REPORT: |
| list_add(&p->action, &hdev->pend_le_reports); |
| break; |
| default: |
| break; |
| } |
| } |
| } |
| |
| void mgmt_power_on(struct hci_dev *hdev, int err) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| |
| BT_DBG("err %d", err); |
| |
| hci_dev_lock(hdev); |
| |
| if (!err) { |
| restart_le_actions(hdev); |
| hci_update_background_scan(hdev); |
| } |
| |
| mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match); |
| |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| |
| hci_dev_unlock(hdev); |
| } |
| |
| void __mgmt_power_off(struct hci_dev *hdev) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| u8 status, zero_cod[] = { 0, 0, 0 }; |
| |
| mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match); |
| |
| /* If the power off is because of hdev unregistration let |
| * use the appropriate INVALID_INDEX status. Otherwise use |
| * NOT_POWERED. We cover both scenarios here since later in |
| * mgmt_index_removed() any hci_conn callbacks will have already |
| * been triggered, potentially causing misleading DISCONNECTED |
| * status responses. |
| */ |
| if (hci_dev_test_flag(hdev, HCI_UNREGISTER)) |
| status = MGMT_STATUS_INVALID_INDEX; |
| else |
| status = MGMT_STATUS_NOT_POWERED; |
| |
| mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status); |
| |
| if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0) |
| mgmt_generic_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, |
| zero_cod, sizeof(zero_cod), NULL); |
| |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| } |
| |
| void mgmt_set_powered_failed(struct hci_dev *hdev, int err) |
| { |
| struct mgmt_pending_cmd *cmd; |
| u8 status; |
| |
| cmd = pending_find(MGMT_OP_SET_POWERED, hdev); |
| if (!cmd) |
| return; |
| |
| if (err == -ERFKILL) |
| status = MGMT_STATUS_RFKILLED; |
| else |
| status = MGMT_STATUS_FAILED; |
| |
| mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status); |
| |
| mgmt_pending_remove(cmd); |
| } |
| |
| void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key, |
| bool persistent) |
| { |
| struct mgmt_ev_new_link_key ev; |
| |
| memset(&ev, 0, sizeof(ev)); |
| |
| ev.store_hint = persistent; |
| bacpy(&ev.key.addr.bdaddr, &key->bdaddr); |
| ev.key.addr.type = BDADDR_BREDR; |
| ev.key.type = key->type; |
| memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE); |
| ev.key.pin_len = key->pin_len; |
| |
| mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| static u8 mgmt_ltk_type(struct smp_ltk *ltk) |
| { |
| switch (ltk->type) { |
| case SMP_LTK: |
| case SMP_LTK_SLAVE: |
| if (ltk->authenticated) |
| return MGMT_LTK_AUTHENTICATED; |
| return MGMT_LTK_UNAUTHENTICATED; |
| case SMP_LTK_P256: |
| if (ltk->authenticated) |
| return MGMT_LTK_P256_AUTH; |
| return MGMT_LTK_P256_UNAUTH; |
| case SMP_LTK_P256_DEBUG: |
| return MGMT_LTK_P256_DEBUG; |
| } |
| |
| return MGMT_LTK_UNAUTHENTICATED; |
| } |
| |
| void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent) |
| { |
| struct mgmt_ev_new_long_term_key ev; |
| |
| memset(&ev, 0, sizeof(ev)); |
| |
| /* Devices using resolvable or non-resolvable random addresses |
| * without providing an identity resolving key don't require |
| * to store long term keys. Their addresses will change the |
| * next time around. |
| * |
| * Only when a remote device provides an identity address |
| * make sure the long term key is stored. If the remote |
| * identity is known, the long term keys are internally |
| * mapped to the identity address. So allow static random |
| * and public addresses here. |
| */ |
| if (key->bdaddr_type == ADDR_LE_DEV_RANDOM && |
| (key->bdaddr.b[5] & 0xc0) != 0xc0) |
| ev.store_hint = 0x00; |
| else |
| ev.store_hint = persistent; |
| |
| bacpy(&ev.key.addr.bdaddr, &key->bdaddr); |
| ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type); |
| ev.key.type = mgmt_ltk_type(key); |
| ev.key.enc_size = key->enc_size; |
| ev.key.ediv = key->ediv; |
| ev.key.rand = key->rand; |
| |
| if (key->type == SMP_LTK) |
| ev.key.master = 1; |
| |
| /* Make sure we copy only the significant bytes based on the |
| * encryption key size, and set the rest of the value to zeroes. |
| */ |
| memcpy(ev.key.val, key->val, key->enc_size); |
| memset(ev.key.val + key->enc_size, 0, |
| sizeof(ev.key.val) - key->enc_size); |
| |
| mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk, bool persistent) |
| { |
| struct mgmt_ev_new_irk ev; |
| |
| memset(&ev, 0, sizeof(ev)); |
| |
| ev.store_hint = persistent; |
| |
| bacpy(&ev.rpa, &irk->rpa); |
| bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr); |
| ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type); |
| memcpy(ev.irk.val, irk->val, sizeof(irk->val)); |
| |
| mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_new_csrk(struct hci_dev *hdev, struct smp_csrk *csrk, |
| bool persistent) |
| { |
| struct mgmt_ev_new_csrk ev; |
| |
| memset(&ev, 0, sizeof(ev)); |
| |
| /* Devices using resolvable or non-resolvable random addresses |
| * without providing an identity resolving key don't require |
| * to store signature resolving keys. Their addresses will change |
| * the next time around. |
| * |
| * Only when a remote device provides an identity address |
| * make sure the signature resolving key is stored. So allow |
| * static random and public addresses here. |
| */ |
| if (csrk->bdaddr_type == ADDR_LE_DEV_RANDOM && |
| (csrk->bdaddr.b[5] & 0xc0) != 0xc0) |
| ev.store_hint = 0x00; |
| else |
| ev.store_hint = persistent; |
| |
| bacpy(&ev.key.addr.bdaddr, &csrk->bdaddr); |
| ev.key.addr.type = link_to_bdaddr(LE_LINK, csrk->bdaddr_type); |
| ev.key.type = csrk->type; |
| memcpy(ev.key.val, csrk->val, sizeof(csrk->val)); |
| |
| mgmt_event(MGMT_EV_NEW_CSRK, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_new_conn_param(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 bdaddr_type, u8 store_hint, u16 min_interval, |
| u16 max_interval, u16 latency, u16 timeout) |
| { |
| struct mgmt_ev_new_conn_param ev; |
| |
| if (!hci_is_identity_address(bdaddr, bdaddr_type)) |
| return; |
| |
| memset(&ev, 0, sizeof(ev)); |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(LE_LINK, bdaddr_type); |
| ev.store_hint = store_hint; |
| ev.min_interval = cpu_to_le16(min_interval); |
| ev.max_interval = cpu_to_le16(max_interval); |
| ev.latency = cpu_to_le16(latency); |
| ev.timeout = cpu_to_le16(timeout); |
| |
| mgmt_event(MGMT_EV_NEW_CONN_PARAM, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_device_connected(struct hci_dev *hdev, struct hci_conn *conn, |
| u32 flags, u8 *name, u8 name_len) |
| { |
| char buf[512]; |
| struct mgmt_ev_device_connected *ev = (void *) buf; |
| u16 eir_len = 0; |
| |
| bacpy(&ev->addr.bdaddr, &conn->dst); |
| ev->addr.type = link_to_bdaddr(conn->type, conn->dst_type); |
| |
| ev->flags = __cpu_to_le32(flags); |
| |
| /* We must ensure that the EIR Data fields are ordered and |
| * unique. Keep it simple for now and avoid the problem by not |
| * adding any BR/EDR data to the LE adv. |
| */ |
| if (conn->le_adv_data_len > 0) { |
| memcpy(&ev->eir[eir_len], |
| conn->le_adv_data, conn->le_adv_data_len); |
| eir_len = conn->le_adv_data_len; |
| } else { |
| if (name_len > 0) |
| eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, |
| name, name_len); |
| |
| if (memcmp(conn->dev_class, "\0\0\0", 3) != 0) |
| eir_len = eir_append_data(ev->eir, eir_len, |
| EIR_CLASS_OF_DEV, |
| conn->dev_class, 3); |
| } |
| |
| ev->eir_len = cpu_to_le16(eir_len); |
| |
| mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf, |
| sizeof(*ev) + eir_len, NULL); |
| } |
| |
| static void disconnect_rsp(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| struct sock **sk = data; |
| |
| cmd->cmd_complete(cmd, 0); |
| |
| *sk = cmd->sk; |
| sock_hold(*sk); |
| |
| mgmt_pending_remove(cmd); |
| } |
| |
| static void unpair_device_rsp(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| struct hci_dev *hdev = data; |
| struct mgmt_cp_unpair_device *cp = cmd->param; |
| |
| device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk); |
| |
| cmd->cmd_complete(cmd, 0); |
| mgmt_pending_remove(cmd); |
| } |
| |
| bool mgmt_powering_down(struct hci_dev *hdev) |
| { |
| struct mgmt_pending_cmd *cmd; |
| struct mgmt_mode *cp; |
| |
| cmd = pending_find(MGMT_OP_SET_POWERED, hdev); |
| if (!cmd) |
| return false; |
| |
| cp = cmd->param; |
| if (!cp->val) |
| return true; |
| |
| return false; |
| } |
| |
| void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 reason, |
| bool mgmt_connected) |
| { |
| struct mgmt_ev_device_disconnected ev; |
| struct sock *sk = NULL; |
| |
| /* The connection is still in hci_conn_hash so test for 1 |
| * instead of 0 to know if this is the last one. |
| */ |
| if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) { |
| cancel_delayed_work(&hdev->power_off); |
| queue_work(hdev->req_workqueue, &hdev->power_off.work); |
| } |
| |
| if (!mgmt_connected) |
| return; |
| |
| if (link_type != ACL_LINK && link_type != LE_LINK) |
| return; |
| |
| mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk); |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(link_type, addr_type); |
| ev.reason = reason; |
| |
| mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk); |
| |
| if (sk) |
| sock_put(sk); |
| |
| mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp, |
| hdev); |
| } |
| |
| void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status) |
| { |
| u8 bdaddr_type = link_to_bdaddr(link_type, addr_type); |
| struct mgmt_cp_disconnect *cp; |
| struct mgmt_pending_cmd *cmd; |
| |
| mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp, |
| hdev); |
| |
| cmd = pending_find(MGMT_OP_DISCONNECT, hdev); |
| if (!cmd) |
| return; |
| |
| cp = cmd->param; |
| |
| if (bacmp(bdaddr, &cp->addr.bdaddr)) |
| return; |
| |
| if (cp->addr.type != bdaddr_type) |
| return; |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, |
| u8 addr_type, u8 status) |
| { |
| struct mgmt_ev_connect_failed ev; |
| |
| /* The connection is still in hci_conn_hash so test for 1 |
| * instead of 0 to know if this is the last one. |
| */ |
| if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) { |
| cancel_delayed_work(&hdev->power_off); |
| queue_work(hdev->req_workqueue, &hdev->power_off.work); |
| } |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(link_type, addr_type); |
| ev.status = mgmt_status(status); |
| |
| mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure) |
| { |
| struct mgmt_ev_pin_code_request ev; |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = BDADDR_BREDR; |
| ev.secure = secure; |
| |
| mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| cmd = pending_find(MGMT_OP_PIN_CODE_REPLY, hdev); |
| if (!cmd) |
| return; |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 status) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| cmd = pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev); |
| if (!cmd) |
| return; |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| } |
| |
| int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u32 value, |
| u8 confirm_hint) |
| { |
| struct mgmt_ev_user_confirm_request ev; |
| |
| BT_DBG("%s", hdev->name); |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(link_type, addr_type); |
| ev.confirm_hint = confirm_hint; |
| ev.value = cpu_to_le32(value); |
| |
| return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev), |
| NULL); |
| } |
| |
| int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type) |
| { |
| struct mgmt_ev_user_passkey_request ev; |
| |
| BT_DBG("%s", hdev->name); |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(link_type, addr_type); |
| |
| return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev), |
| NULL); |
| } |
| |
| static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status, |
| u8 opcode) |
| { |
| struct mgmt_pending_cmd *cmd; |
| |
| cmd = pending_find(opcode, hdev); |
| if (!cmd) |
| return -ENOENT; |
| |
| cmd->cmd_complete(cmd, mgmt_status(status)); |
| mgmt_pending_remove(cmd); |
| |
| return 0; |
| } |
| |
| int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status) |
| { |
| return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, |
| status, MGMT_OP_USER_CONFIRM_REPLY); |
| } |
| |
| int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status) |
| { |
| return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, |
| status, |
| MGMT_OP_USER_CONFIRM_NEG_REPLY); |
| } |
| |
| int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status) |
| { |
| return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, |
| status, MGMT_OP_USER_PASSKEY_REPLY); |
| } |
| |
| int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u8 status) |
| { |
| return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type, |
| status, |
| MGMT_OP_USER_PASSKEY_NEG_REPLY); |
| } |
| |
| int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr, |
| u8 link_type, u8 addr_type, u32 passkey, |
| u8 entered) |
| { |
| struct mgmt_ev_passkey_notify ev; |
| |
| BT_DBG("%s", hdev->name); |
| |
| bacpy(&ev.addr.bdaddr, bdaddr); |
| ev.addr.type = link_to_bdaddr(link_type, addr_type); |
| ev.passkey = __cpu_to_le32(passkey); |
| ev.entered = entered; |
| |
| return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| void mgmt_auth_failed(struct hci_conn *conn, u8 hci_status) |
| { |
| struct mgmt_ev_auth_failed ev; |
| struct mgmt_pending_cmd *cmd; |
| u8 status = mgmt_status(hci_status); |
| |
| bacpy(&ev.addr.bdaddr, &conn->dst); |
| ev.addr.type = link_to_bdaddr(conn->type, conn->dst_type); |
| ev.status = status; |
| |
| cmd = find_pairing(conn); |
| |
| mgmt_event(MGMT_EV_AUTH_FAILED, conn->hdev, &ev, sizeof(ev), |
| cmd ? cmd->sk : NULL); |
| |
| if (cmd) { |
| cmd->cmd_complete(cmd, status); |
| mgmt_pending_remove(cmd); |
| } |
| } |
| |
| void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| bool changed; |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, |
| cmd_status_rsp, &mgmt_err); |
| return; |
| } |
| |
| if (test_bit(HCI_AUTH, &hdev->flags)) |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_LINK_SECURITY); |
| else |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_LINK_SECURITY); |
| |
| mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp, |
| &match); |
| |
| if (changed) |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| } |
| |
| static void clear_eir(struct hci_request *req) |
| { |
| struct hci_dev *hdev = req->hdev; |
| struct hci_cp_write_eir cp; |
| |
| if (!lmp_ext_inq_capable(hdev)) |
| return; |
| |
| memset(hdev->eir, 0, sizeof(hdev->eir)); |
| |
| memset(&cp, 0, sizeof(cp)); |
| |
| hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp); |
| } |
| |
| void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status) |
| { |
| struct cmd_lookup match = { NULL, hdev }; |
| struct hci_request req; |
| bool changed = false; |
| |
| if (status) { |
| u8 mgmt_err = mgmt_status(status); |
| |
| if (enable && hci_dev_test_and_clear_flag(hdev, |
| HCI_SSP_ENABLED)) { |
| hci_dev_clear_flag(hdev, HCI_HS_ENABLED); |
| new_settings(hdev, NULL); |
| } |
| |
| mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp, |
| &mgmt_err); |
| return; |
| } |
| |
| if (enable) { |
| changed = !hci_dev_test_and_set_flag(hdev, HCI_SSP_ENABLED); |
| } else { |
| changed = hci_dev_test_and_clear_flag(hdev, HCI_SSP_ENABLED); |
| if (!changed) |
| changed = hci_dev_test_and_clear_flag(hdev, |
| HCI_HS_ENABLED); |
| else |
| hci_dev_clear_flag(hdev, HCI_HS_ENABLED); |
| } |
| |
| mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match); |
| |
| if (changed) |
| new_settings(hdev, match.sk); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| |
| hci_req_init(&req, hdev); |
| |
| if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) { |
| if (hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS)) |
| hci_req_add(&req, HCI_OP_WRITE_SSP_DEBUG_MODE, |
| sizeof(enable), &enable); |
| __hci_req_update_eir(&req); |
| } else { |
| clear_eir(&req); |
| } |
| |
| hci_req_run(&req, NULL); |
| } |
| |
| static void sk_lookup(struct mgmt_pending_cmd *cmd, void *data) |
| { |
| struct cmd_lookup *match = data; |
| |
| if (match->sk == NULL) { |
| match->sk = cmd->sk; |
| sock_hold(match->sk); |
| } |
| } |
| |
| void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class, |
| u8 status) |
| { |
| struct cmd_lookup match = { NULL, hdev, mgmt_status(status) }; |
| |
| mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match); |
| mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match); |
| mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match); |
| |
| if (!status) |
| mgmt_generic_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, |
| dev_class, 3, NULL); |
| |
| if (match.sk) |
| sock_put(match.sk); |
| } |
| |
| void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status) |
| { |
| struct mgmt_cp_set_local_name ev; |
| struct mgmt_pending_cmd *cmd; |
| |
| if (status) |
| return; |
| |
| memset(&ev, 0, sizeof(ev)); |
| memcpy(ev.name, name, HCI_MAX_NAME_LENGTH); |
| memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH); |
| |
| cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev); |
| if (!cmd) { |
| memcpy(hdev->dev_name, name, sizeof(hdev->dev_name)); |
| |
| /* If this is a HCI command related to powering on the |
| * HCI dev don't send any mgmt signals. |
| */ |
| if (pending_find(MGMT_OP_SET_POWERED, hdev)) |
| return; |
| } |
| |
| mgmt_generic_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev), |
| cmd ? cmd->sk : NULL); |
| } |
| |
| static inline bool has_uuid(u8 *uuid, u16 uuid_count, u8 (*uuids)[16]) |
| { |
| int i; |
| |
| for (i = 0; i < uuid_count; i++) { |
| if (!memcmp(uuid, uuids[i], 16)) |
| return true; |
| } |
| |
| return false; |
| } |
| |
| static bool eir_has_uuids(u8 *eir, u16 eir_len, u16 uuid_count, u8 (*uuids)[16]) |
| { |
| u16 parsed = 0; |
| |
| while (parsed < eir_len) { |
| u8 field_len = eir[0]; |
| u8 uuid[16]; |
| int i; |
| |
| if (field_len == 0) |
| break; |
| |
| if (eir_len - parsed < field_len + 1) |
| break; |
| |
| switch (eir[1]) { |
| case EIR_UUID16_ALL: |
| case EIR_UUID16_SOME: |
| for (i = 0; i + 3 <= field_len; i += 2) { |
| memcpy(uuid, bluetooth_base_uuid, 16); |
| uuid[13] = eir[i + 3]; |
| uuid[12] = eir[i + 2]; |
| if (has_uuid(uuid, uuid_count, uuids)) |
| return true; |
| } |
| break; |
| case EIR_UUID32_ALL: |
| case EIR_UUID32_SOME: |
| for (i = 0; i + 5 <= field_len; i += 4) { |
| memcpy(uuid, bluetooth_base_uuid, 16); |
| uuid[15] = eir[i + 5]; |
| uuid[14] = eir[i + 4]; |
| uuid[13] = eir[i + 3]; |
| uuid[12] = eir[i + 2]; |
| if (has_uuid(uuid, uuid_count, uuids)) |
| return true; |
| } |
| break; |
| case EIR_UUID128_ALL: |
| case EIR_UUID128_SOME: |
| for (i = 0; i + 17 <= field_len; i += 16) { |
| memcpy(uuid, eir + i + 2, 16); |
| if (has_uuid(uuid, uuid_count, uuids)) |
| return true; |
| } |
| break; |
| } |
| |
| parsed += field_len + 1; |
| eir += field_len + 1; |
| } |
| |
| return false; |
| } |
| |
| static void restart_le_scan(struct hci_dev *hdev) |
| { |
| /* If controller is not scanning we are done. */ |
| if (!hci_dev_test_flag(hdev, HCI_LE_SCAN)) |
| return; |
| |
| if (time_after(jiffies + DISCOV_LE_RESTART_DELAY, |
| hdev->discovery.scan_start + |
| hdev->discovery.scan_duration)) |
| return; |
| |
| queue_delayed_work(hdev->req_workqueue, &hdev->le_scan_restart, |
| DISCOV_LE_RESTART_DELAY); |
| } |
| |
| static bool is_filter_match(struct hci_dev *hdev, s8 rssi, u8 *eir, |
| u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len) |
| { |
| /* If a RSSI threshold has been specified, and |
| * HCI_QUIRK_STRICT_DUPLICATE_FILTER is not set, then all results with |
| * a RSSI smaller than the RSSI threshold will be dropped. If the quirk |
| * is set, let it through for further processing, as we might need to |
| * restart the scan. |
| * |
| * For BR/EDR devices (pre 1.2) providing no RSSI during inquiry, |
| * the results are also dropped. |
| */ |
| if (hdev->discovery.rssi != HCI_RSSI_INVALID && |
| (rssi == HCI_RSSI_INVALID || |
| (rssi < hdev->discovery.rssi && |
| !test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)))) |
| return false; |
| |
| if (hdev->discovery.uuid_count != 0) { |
| /* If a list of UUIDs is provided in filter, results with no |
| * matching UUID should be dropped. |
| */ |
| if (!eir_has_uuids(eir, eir_len, hdev->discovery.uuid_count, |
| hdev->discovery.uuids) && |
| !eir_has_uuids(scan_rsp, scan_rsp_len, |
| hdev->discovery.uuid_count, |
| hdev->discovery.uuids)) |
| return false; |
| } |
| |
| /* If duplicate filtering does not report RSSI changes, then restart |
| * scanning to ensure updated result with updated RSSI values. |
| */ |
| if (test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)) { |
| restart_le_scan(hdev); |
| |
| /* Validate RSSI value against the RSSI threshold once more. */ |
| if (hdev->discovery.rssi != HCI_RSSI_INVALID && |
| rssi < hdev->discovery.rssi) |
| return false; |
| } |
| |
| return true; |
| } |
| |
| void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, |
| u8 addr_type, u8 *dev_class, s8 rssi, u32 flags, |
| u8 *eir, u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len) |
| { |
| char buf[512]; |
| struct mgmt_ev_device_found *ev = (void *)buf; |
| size_t ev_size; |
| |
| /* Don't send events for a non-kernel initiated discovery. With |
| * LE one exception is if we have pend_le_reports > 0 in which |
| * case we're doing passive scanning and want these events. |
| */ |
| if (!hci_discovery_active(hdev)) { |
| if (link_type == ACL_LINK) |
| return; |
| if (link_type == LE_LINK && list_empty(&hdev->pend_le_reports)) |
| return; |
| } |
| |
| if (hdev->discovery.result_filtering) { |
| /* We are using service discovery */ |
| if (!is_filter_match(hdev, rssi, eir, eir_len, scan_rsp, |
| scan_rsp_len)) |
| return; |
| } |
| |
| /* Make sure that the buffer is big enough. The 5 extra bytes |
| * are for the potential CoD field. |
| */ |
| if (sizeof(*ev) + eir_len + scan_rsp_len + 5 > sizeof(buf)) |
| return; |
| |
| memset(buf, 0, sizeof(buf)); |
| |
| /* In case of device discovery with BR/EDR devices (pre 1.2), the |
| * RSSI value was reported as 0 when not available. This behavior |
| * is kept when using device discovery. This is required for full |
| * backwards compatibility with the API. |
| * |
| * However when using service discovery, the value 127 will be |
| * returned when the RSSI is not available. |
| */ |
| if (rssi == HCI_RSSI_INVALID && !hdev->discovery.report_invalid_rssi && |
| link_type == ACL_LINK) |
| rssi = 0; |
| |
| bacpy(&ev->addr.bdaddr, bdaddr); |
| ev->addr.type = link_to_bdaddr(link_type, addr_type); |
| ev->rssi = rssi; |
| ev->flags = cpu_to_le32(flags); |
| |
| if (eir_len > 0) |
| /* Copy EIR or advertising data into event */ |
| memcpy(ev->eir, eir, eir_len); |
| |
| if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV)) |
| eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV, |
| dev_class, 3); |
| |
| if (scan_rsp_len > 0) |
| /* Append scan response data to event */ |
| memcpy(ev->eir + eir_len, scan_rsp, scan_rsp_len); |
| |
| ev->eir_len = cpu_to_le16(eir_len + scan_rsp_len); |
| ev_size = sizeof(*ev) + eir_len + scan_rsp_len; |
| |
| mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL); |
| } |
| |
| void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type, |
| u8 addr_type, s8 rssi, u8 *name, u8 name_len) |
| { |
| struct mgmt_ev_device_found *ev; |
| char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2]; |
| u16 eir_len; |
| |
| ev = (struct mgmt_ev_device_found *) buf; |
| |
| memset(buf, 0, sizeof(buf)); |
| |
| bacpy(&ev->addr.bdaddr, bdaddr); |
| ev->addr.type = link_to_bdaddr(link_type, addr_type); |
| ev->rssi = rssi; |
| |
| eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name, |
| name_len); |
| |
| ev->eir_len = cpu_to_le16(eir_len); |
| |
| mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL); |
| } |
| |
| void mgmt_discovering(struct hci_dev *hdev, u8 discovering) |
| { |
| struct mgmt_ev_discovering ev; |
| |
| BT_DBG("%s discovering %u", hdev->name, discovering); |
| |
| memset(&ev, 0, sizeof(ev)); |
| ev.type = hdev->discovery.type; |
| ev.discovering = discovering; |
| |
| mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL); |
| } |
| |
| static struct hci_mgmt_chan chan = { |
| .channel = HCI_CHANNEL_CONTROL, |
| .handler_count = ARRAY_SIZE(mgmt_handlers), |
| .handlers = mgmt_handlers, |
| .hdev_init = mgmt_init_hdev, |
| }; |
| |
| int mgmt_init(void) |
| { |
| return hci_mgmt_chan_register(&chan); |
| } |
| |
| void mgmt_exit(void) |
| { |
| hci_mgmt_chan_unregister(&chan); |
| } |