zephyr/subsys/bluetooth/host/l2cap.c

1705 lines
40 KiB
C
Raw Normal View History

/* l2cap.c - L2CAP handling */
/*
* Copyright (c) 2015-2016 Intel Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <zephyr.h>
#include <string.h>
#include <errno.h>
#include <atomic.h>
#include <misc/byteorder.h>
#include <misc/util.h>
#include <bluetooth/log.h>
#include <bluetooth/hci.h>
#include <bluetooth/bluetooth.h>
#include <bluetooth/conn.h>
#include <bluetooth/hci_driver.h>
#include "hci_core.h"
#include "conn_internal.h"
#include "l2cap_internal.h"
#if !defined(CONFIG_BLUETOOTH_DEBUG_L2CAP)
#undef BT_DBG
#define BT_DBG(fmt, ...)
#endif
#define LE_CHAN_RTX(_w) CONTAINER_OF(_w, struct bt_l2cap_le_chan, chan.rtx_work)
#define L2CAP_LE_MIN_MTU 23
#define L2CAP_LE_MAX_CREDITS (CONFIG_BLUETOOTH_ACL_IN_COUNT - 1)
#define L2CAP_LE_CREDITS_THRESHOLD (L2CAP_LE_MAX_CREDITS / 2)
#define L2CAP_LE_CID_DYN_START 0x0040
#define L2CAP_LE_CID_DYN_END 0x007f
#define L2CAP_LE_CID_IS_DYN(_cid) \
(_cid >= L2CAP_LE_CID_DYN_START && _cid <= L2CAP_LE_CID_DYN_END)
#define L2CAP_LE_PSM_START 0x0001
#define L2CAP_LE_PSM_END 0x00ff
#define L2CAP_CONN_TIMEOUT K_SECONDS(40)
#define L2CAP_DISC_TIMEOUT K_SECONDS(1)
/* Size of MTU is based on the maximum amount of data the buffer can hold
* excluding ACL and driver headers.
*/
#define BT_L2CAP_MAX_LE_MPS CONFIG_BLUETOOTH_L2CAP_IN_MTU
/* For now use MPS - SDU length to disable segmentation */
#define BT_L2CAP_MAX_LE_MTU (BT_L2CAP_MAX_LE_MPS - 2)
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
#define l2cap_lookup_ident(conn, ident) __l2cap_lookup_ident(conn, ident, false)
#define l2cap_remove_ident(conn, ident) __l2cap_lookup_ident(conn, ident, true)
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
/* Wrapper macros making action on channel's list assigned to connection */
#define l2cap_lookup_chan(conn, chan) \
__l2cap_chan(conn, chan, BT_L2CAP_CHAN_LOOKUP)
#define l2cap_detach_chan(conn, chan) \
__l2cap_chan(conn, chan, BT_L2CAP_CHAN_DETACH)
static struct bt_l2cap_fixed_chan *le_channels;
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static struct bt_l2cap_server *servers;
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
/* Pool for outgoing LE signaling packets, MTU is 23 */
static struct k_fifo le_sig;
static NET_BUF_POOL(le_sig_pool, CONFIG_BLUETOOTH_MAX_CONN,
2016-04-09 11:29:50 +03:00
BT_L2CAP_BUF_SIZE(L2CAP_LE_MIN_MTU), &le_sig, NULL,
BT_BUF_USER_DATA_MIN);
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
/* Pool for outgoing LE data packets, MTU is 23 */
static struct k_fifo le_data;
static NET_BUF_POOL(le_data_pool, CONFIG_BLUETOOTH_MAX_CONN,
BT_L2CAP_BUF_SIZE(BT_L2CAP_MAX_LE_MPS), &le_data, NULL,
2016-04-09 11:29:50 +03:00
BT_BUF_USER_DATA_MIN);
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
/* L2CAP signalling channel specific context */
struct bt_l2cap {
/* The channel this context is associated with */
struct bt_l2cap_le_chan chan;
};
static struct bt_l2cap bt_l2cap_pool[CONFIG_BLUETOOTH_MAX_CONN];
static uint8_t get_ident(void)
{
static uint8_t ident;
ident++;
/* handle integer overflow (0 is not valid) */
if (!ident) {
ident++;
}
return ident;
}
void bt_l2cap_le_fixed_chan_register(struct bt_l2cap_fixed_chan *chan)
{
BT_DBG("CID 0x%04x", chan->cid);
chan->_next = le_channels;
le_channels = chan;
}
static struct bt_l2cap_le_chan *l2cap_chan_alloc_cid(struct bt_conn *conn,
struct bt_l2cap_chan *chan)
{
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
uint16_t cid;
/*
* No action needed if there's already a CID allocated, e.g. in
* the case of a fixed channel.
*/
if (ch && ch->rx.cid > 0) {
return ch;
}
for (cid = L2CAP_LE_CID_DYN_START; cid <= L2CAP_LE_CID_DYN_END; cid++) {
if (ch && !bt_l2cap_le_lookup_rx_cid(conn, cid)) {
ch->rx.cid = cid;
return ch;
}
}
return NULL;
}
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static struct bt_l2cap_le_chan *
__l2cap_lookup_ident(struct bt_conn *conn, uint16_t ident, bool remove)
{
struct bt_l2cap_chan *chan, *prev;
for (chan = conn->channels, prev = NULL; chan;
prev = chan, chan = chan->_next) {
if (chan->ident != ident) {
continue;
}
if (!remove) {
return BT_L2CAP_LE_CHAN(chan);
}
if (!prev) {
conn->channels = chan->_next;
} else {
prev->_next = chan->_next;
}
return BT_L2CAP_LE_CHAN(chan);
}
return NULL;
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
static struct bt_l2cap_le_chan *__l2cap_chan(struct bt_conn *conn,
struct bt_l2cap_chan *ch,
enum l2cap_conn_list_action action)
{
struct bt_l2cap_chan *chan, *prev;
for (chan = conn->channels, prev = NULL; chan;
prev = chan, chan = chan->_next) {
if (chan != ch) {
continue;
}
switch (action) {
case BT_L2CAP_CHAN_DETACH:
if (!prev) {
conn->channels = chan->_next;
} else {
prev->_next = chan->_next;
}
return BT_L2CAP_LE_CHAN(chan);
case BT_L2CAP_CHAN_LOOKUP:
default:
return BT_L2CAP_LE_CHAN(chan);
}
}
return NULL;
}
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
#if defined(CONFIG_BLUETOOTH_DEBUG_L2CAP)
const char *bt_l2cap_chan_state_str(bt_l2cap_chan_state_t state)
{
switch (state) {
case BT_L2CAP_DISCONNECTED:
return "disconnected";
case BT_L2CAP_CONNECT:
return "connect";
case BT_L2CAP_CONFIG:
return "config";
case BT_L2CAP_CONNECTED:
return "connected";
case BT_L2CAP_DISCONNECT:
return "disconnect";
default:
return "unknown";
}
}
void bt_l2cap_chan_set_state_debug(struct bt_l2cap_chan *chan,
bt_l2cap_chan_state_t state,
const char *func, int line)
{
BT_DBG("chan %p psm 0x%04x %s -> %s", chan, chan->psm,
bt_l2cap_chan_state_str(chan->state),
bt_l2cap_chan_state_str(state));
/* check transitions validness */
switch (state) {
case BT_L2CAP_DISCONNECTED:
/* regardless of old state always allows this state */
break;
case BT_L2CAP_CONNECT:
if (chan->state != BT_L2CAP_DISCONNECTED) {
BT_WARN("%s()%d: invalid transition", func, line);
}
break;
case BT_L2CAP_CONFIG:
if (chan->state != BT_L2CAP_CONNECT) {
BT_WARN("%s()%d: invalid transition", func, line);
}
break;
case BT_L2CAP_CONNECTED:
if (chan->state != BT_L2CAP_CONFIG &&
chan->state != BT_L2CAP_CONNECT) {
BT_WARN("%s()%d: invalid transition", func, line);
}
break;
case BT_L2CAP_DISCONNECT:
if (chan->state != BT_L2CAP_CONFIG &&
chan->state != BT_L2CAP_CONNECTED) {
BT_WARN("%s()%d: invalid transition", func, line);
}
break;
default:
BT_ERR("%s()%d: unknown (%u) state was set", func, line, state);
return;
}
chan->state = state;
}
#else
void bt_l2cap_chan_set_state(struct bt_l2cap_chan *chan,
bt_l2cap_chan_state_t state)
{
chan->state = state;
}
#endif /* CONFIG_BLUETOOTH_DEBUG_L2CAP */
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
void bt_l2cap_chan_del(struct bt_l2cap_chan *chan)
{
BT_DBG("conn %p chan %p", chan->conn, chan);
if (!chan->conn) {
goto destroy;
}
if (chan->ops && chan->ops->disconnected) {
chan->ops->disconnected(chan);
}
chan->conn = NULL;
destroy:
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
/* Reset internal members of common channel */
bt_l2cap_chan_set_state(chan, BT_L2CAP_DISCONNECTED);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
chan->psm = 0;
#endif
if (chan->destroy) {
chan->destroy(chan);
}
}
static void l2cap_rtx_timeout(struct k_work *work)
{
struct bt_l2cap_le_chan *chan = LE_CHAN_RTX(work);
BT_ERR("chan %p timeout", chan);
l2cap_detach_chan(chan->chan.conn, &chan->chan);
bt_l2cap_chan_del(&chan->chan);
}
void bt_l2cap_chan_add(struct bt_conn *conn, struct bt_l2cap_chan *chan,
bt_l2cap_chan_destroy_t destroy)
{
/* Attach channel to the connection */
chan->_next = conn->channels;
conn->channels = chan;
chan->conn = conn;
chan->destroy = destroy;
BT_DBG("conn %p chan %p", conn, chan);
}
static bool l2cap_chan_add(struct bt_conn *conn, struct bt_l2cap_chan *chan,
bt_l2cap_chan_destroy_t destroy)
{
struct bt_l2cap_le_chan *ch = l2cap_chan_alloc_cid(conn, chan);
if (!ch) {
BT_ERR("Unable to allocate L2CAP CID");
return false;
}
k_delayed_work_init(&chan->rtx_work, l2cap_rtx_timeout);
bt_l2cap_chan_add(conn, chan, destroy);
return true;
}
void bt_l2cap_connected(struct bt_conn *conn)
{
struct bt_l2cap_fixed_chan *fchan;
struct bt_l2cap_chan *chan;
#if defined(CONFIG_BLUETOOTH_BREDR)
if (conn->type == BT_CONN_TYPE_BR) {
bt_l2cap_br_connected(conn);
return;
}
#endif /* CONFIG_BLUETOOTH_BREDR */
fchan = le_channels;
for (; fchan; fchan = fchan->_next) {
struct bt_l2cap_le_chan *ch;
if (fchan->accept(conn, &chan) < 0) {
continue;
}
ch = BT_L2CAP_LE_CHAN(chan);
/* Fill up remaining fixed channel context attached in
* fchan->accept()
*/
ch->rx.cid = fchan->cid;
ch->tx.cid = fchan->cid;
if (!l2cap_chan_add(conn, chan, NULL)) {
return;
}
if (chan->ops->connected) {
chan->ops->connected(chan);
}
}
}
void bt_l2cap_disconnected(struct bt_conn *conn)
{
struct bt_l2cap_chan *chan;
for (chan = conn->channels; chan;) {
struct bt_l2cap_chan *next;
/* prefetch since disconnected callback may cleanup */
next = chan->_next;
bt_l2cap_chan_del(chan);
chan = next;
}
conn->channels = NULL;
}
static struct net_buf *l2cap_create_le_sig_pdu(uint8_t code, uint8_t ident,
uint16_t len)
{
struct net_buf *buf;
struct bt_l2cap_sig_hdr *hdr;
buf = bt_l2cap_create_pdu(&le_sig, 0);
if (!buf) {
return NULL;
}
hdr = net_buf_add(buf, sizeof(*hdr));
hdr->code = code;
hdr->ident = ident;
hdr->len = sys_cpu_to_le16(len);
return buf;
}
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static void l2cap_chan_send_req(struct bt_l2cap_le_chan *chan,
struct net_buf *buf, int32_t timeout)
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
{
/* BLUETOOTH SPECIFICATION Version 4.2 [Vol 3, Part A] page 126:
*
* The value of this timer is implementation-dependent but the minimum
* initial value is 1 second and the maximum initial value is 60
* seconds. One RTX timer shall exist for each outstanding signaling
* request, including each Echo Request. The timer disappears on the
* final expiration, when the response is received, or the physical
* link is lost.
*/
if (timeout) {
k_delayed_work_submit(&chan->chan.rtx_work, timeout);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
} else {
k_delayed_work_cancel(&chan->chan.rtx_work);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
}
bt_l2cap_send(chan->chan.conn, BT_L2CAP_CID_LE_SIG, buf);
}
static int l2cap_le_conn_req(struct bt_l2cap_le_chan *ch)
{
struct net_buf *buf;
struct bt_l2cap_le_conn_req *req;
ch->chan.ident = get_ident();
buf = l2cap_create_le_sig_pdu(BT_L2CAP_LE_CONN_REQ, ch->chan.ident,
sizeof(*req));
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
if (!buf) {
ch->chan.ident = 0;
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
BT_ERR("Unable to send L2CAP connection request");
return -ENOMEM;
}
req = net_buf_add(buf, sizeof(*req));
req->psm = sys_cpu_to_le16(ch->chan.psm);
req->scid = sys_cpu_to_le16(ch->rx.cid);
req->mtu = sys_cpu_to_le16(ch->rx.mtu);
req->mps = sys_cpu_to_le16(ch->rx.mps);
req->credits = sys_cpu_to_le16(L2CAP_LE_MAX_CREDITS);
l2cap_chan_send_req(ch, buf, L2CAP_CONN_TIMEOUT);
return 0;
}
static void l2cap_le_encrypt_change(struct bt_l2cap_chan *chan, uint8_t status)
{
/* Skip channels already connected or with a pending request */
if (chan->state != BT_L2CAP_CONNECT || chan->ident) {
return;
}
if (status) {
l2cap_detach_chan(chan->conn, chan);
bt_l2cap_chan_del(chan);
return;
}
/* Retry to connect */
l2cap_le_conn_req(BT_L2CAP_LE_CHAN(chan));
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
void bt_l2cap_encrypt_change(struct bt_conn *conn, uint8_t hci_status)
{
struct bt_l2cap_chan *chan;
#if defined(CONFIG_BLUETOOTH_BREDR)
if (conn->type == BT_CONN_TYPE_BR) {
l2cap_br_encrypt_change(conn, hci_status);
return;
}
#endif /* CONFIG_BLUETOOTH_BREDR */
for (chan = conn->channels; chan; chan = chan->_next) {
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
l2cap_le_encrypt_change(chan, hci_status);
#endif
if (chan->ops->encrypt_change) {
chan->ops->encrypt_change(chan, hci_status);
}
}
}
struct net_buf *bt_l2cap_create_pdu(struct k_fifo *fifo, size_t reserve)
{
return bt_conn_create_pdu(fifo, sizeof(struct bt_l2cap_hdr) + reserve);
}
void bt_l2cap_send(struct bt_conn *conn, uint16_t cid, struct net_buf *buf)
{
struct bt_l2cap_hdr *hdr;
hdr = net_buf_push(buf, sizeof(*hdr));
hdr->len = sys_cpu_to_le16(buf->len - sizeof(*hdr));
hdr->cid = sys_cpu_to_le16(cid);
bt_conn_send(conn, buf);
}
static void l2cap_send_reject(struct bt_conn *conn, uint8_t ident,
uint16_t reason, void *data, uint8_t data_len)
{
struct bt_l2cap_cmd_reject *rej;
struct net_buf *buf;
buf = l2cap_create_le_sig_pdu(BT_L2CAP_CMD_REJECT, ident,
sizeof(*rej) + data_len);
if (!buf) {
return;
}
rej = net_buf_add(buf, sizeof(*rej));
rej->reason = sys_cpu_to_le16(reason);
if (data) {
memcpy(net_buf_add(buf, data_len), data, data_len);
}
bt_l2cap_send(conn, BT_L2CAP_CID_LE_SIG, buf);
}
static void le_conn_param_rsp(struct bt_l2cap *l2cap, struct net_buf *buf)
{
struct bt_l2cap_conn_param_rsp *rsp = (void *)buf->data;
if (buf->len < sizeof(*rsp)) {
BT_ERR("Too small LE conn param rsp");
return;
}
BT_DBG("LE conn param rsp result %u", sys_le16_to_cpu(rsp->result));
}
#if defined(CONFIG_BLUETOOTH_CENTRAL)
static void le_conn_param_update_req(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
const struct bt_le_conn_param *param;
Bluetooth: Refactor LE Connection Params validator Move le_validate_conn_params() interface to internal HCI header to be commonly shared between HCI and L2CAP layers. Refactor the interface and its users and rename related to Connection Parameters Update procedure values used for validation. < ACL Data TX: Handle 42 flags 0x00 dlen 16 [hci1] 2832.387859 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 @ Device Connected: 00:AA:01:00:00:23 (1) flags 0x0000 < HCI Command: LE Read Remote Used Features (0x08|0x0016) plen 2 [hci0] 2832.389374 Handle: 42 > ACL Data RX: Handle 42 flags 0x02 dlen 16 [hci0] 2832.389437 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 > HCI Event: Number of Completed Packets (0x13) plen 5 [hci1] 2832.389440 Num handles: 1 Handle: 42 Count: 1 > HCI Event: Command Status (0x0f) plen 4 [hci0] 2832.389443 LE Read Remote Used Features (0x08|0x0016) ncmd 1 Status: Success (0x00) > HCI Event: LE Meta Event (0x3e) plen 12 [hci0] 2832.389444 LE Read Remote Used Features (0x04) Status: Success (0x00) Handle: 42 Features: 0x03 0x00 0x00 0x00 0x00 0x00 0x00 0x00 LE Encryption Connection Parameter Request Procedure < ACL Data TX: Handle 42 flags 0x00 dlen 10 [hci0] 2832.393154 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) > ACL Data RX: Handle 42 flags 0x02 dlen 10 [hci1] 2832.393181 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) Rejected due to Timeout multiplier: 0. Change-Id: Idaf4f452f560ff71d9637ec5d793154190e94b35 Signed-off-by: Arkadiusz Lichwa <arkadiusz.lichwa@tieto.com> Signed-off-by: Mariusz Skamra <mariusz.skamra@tieto.com>
2015-07-29 13:45:33 +03:00
uint16_t min, max, latency, timeout;
bool params_valid;
struct bt_l2cap_conn_param_rsp *rsp;
struct bt_l2cap_conn_param_req *req = (void *)buf->data;
if (buf->len < sizeof(*req)) {
BT_ERR("Too small LE conn update param req");
return;
}
if (conn->role != BT_HCI_ROLE_MASTER) {
l2cap_send_reject(conn, ident, BT_L2CAP_REJ_NOT_UNDERSTOOD,
NULL, 0);
return;
}
min = sys_le16_to_cpu(req->min_interval);
max = sys_le16_to_cpu(req->max_interval);
latency = sys_le16_to_cpu(req->latency);
timeout = sys_le16_to_cpu(req->timeout);
param = BT_LE_CONN_PARAM(min, max, latency, timeout);
BT_DBG("min 0x%4.4x max 0x%4.4x latency: 0x%4.4x timeout: 0x%4.4x",
min, max, latency, timeout);
buf = l2cap_create_le_sig_pdu(BT_L2CAP_CONN_PARAM_RSP, ident,
sizeof(*rsp));
if (!buf) {
return;
}
Bluetooth: Refactor LE Connection Params validator Move le_validate_conn_params() interface to internal HCI header to be commonly shared between HCI and L2CAP layers. Refactor the interface and its users and rename related to Connection Parameters Update procedure values used for validation. < ACL Data TX: Handle 42 flags 0x00 dlen 16 [hci1] 2832.387859 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 @ Device Connected: 00:AA:01:00:00:23 (1) flags 0x0000 < HCI Command: LE Read Remote Used Features (0x08|0x0016) plen 2 [hci0] 2832.389374 Handle: 42 > ACL Data RX: Handle 42 flags 0x02 dlen 16 [hci0] 2832.389437 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 > HCI Event: Number of Completed Packets (0x13) plen 5 [hci1] 2832.389440 Num handles: 1 Handle: 42 Count: 1 > HCI Event: Command Status (0x0f) plen 4 [hci0] 2832.389443 LE Read Remote Used Features (0x08|0x0016) ncmd 1 Status: Success (0x00) > HCI Event: LE Meta Event (0x3e) plen 12 [hci0] 2832.389444 LE Read Remote Used Features (0x04) Status: Success (0x00) Handle: 42 Features: 0x03 0x00 0x00 0x00 0x00 0x00 0x00 0x00 LE Encryption Connection Parameter Request Procedure < ACL Data TX: Handle 42 flags 0x00 dlen 10 [hci0] 2832.393154 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) > ACL Data RX: Handle 42 flags 0x02 dlen 10 [hci1] 2832.393181 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) Rejected due to Timeout multiplier: 0. Change-Id: Idaf4f452f560ff71d9637ec5d793154190e94b35 Signed-off-by: Arkadiusz Lichwa <arkadiusz.lichwa@tieto.com> Signed-off-by: Mariusz Skamra <mariusz.skamra@tieto.com>
2015-07-29 13:45:33 +03:00
params_valid = bt_le_conn_params_valid(min, max, latency, timeout);
rsp = net_buf_add(buf, sizeof(*rsp));
Bluetooth: Refactor LE Connection Params validator Move le_validate_conn_params() interface to internal HCI header to be commonly shared between HCI and L2CAP layers. Refactor the interface and its users and rename related to Connection Parameters Update procedure values used for validation. < ACL Data TX: Handle 42 flags 0x00 dlen 16 [hci1] 2832.387859 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 @ Device Connected: 00:AA:01:00:00:23 (1) flags 0x0000 < HCI Command: LE Read Remote Used Features (0x08|0x0016) plen 2 [hci0] 2832.389374 Handle: 42 > ACL Data RX: Handle 42 flags 0x02 dlen 16 [hci0] 2832.389437 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 > HCI Event: Number of Completed Packets (0x13) plen 5 [hci1] 2832.389440 Num handles: 1 Handle: 42 Count: 1 > HCI Event: Command Status (0x0f) plen 4 [hci0] 2832.389443 LE Read Remote Used Features (0x08|0x0016) ncmd 1 Status: Success (0x00) > HCI Event: LE Meta Event (0x3e) plen 12 [hci0] 2832.389444 LE Read Remote Used Features (0x04) Status: Success (0x00) Handle: 42 Features: 0x03 0x00 0x00 0x00 0x00 0x00 0x00 0x00 LE Encryption Connection Parameter Request Procedure < ACL Data TX: Handle 42 flags 0x00 dlen 10 [hci0] 2832.393154 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) > ACL Data RX: Handle 42 flags 0x02 dlen 10 [hci1] 2832.393181 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) Rejected due to Timeout multiplier: 0. Change-Id: Idaf4f452f560ff71d9637ec5d793154190e94b35 Signed-off-by: Arkadiusz Lichwa <arkadiusz.lichwa@tieto.com> Signed-off-by: Mariusz Skamra <mariusz.skamra@tieto.com>
2015-07-29 13:45:33 +03:00
if (params_valid) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_CONN_PARAM_ACCEPTED);
} else {
rsp->result = sys_cpu_to_le16(BT_L2CAP_CONN_PARAM_REJECTED);
}
bt_l2cap_send(conn, BT_L2CAP_CID_LE_SIG, buf);
Bluetooth: Refactor LE Connection Params validator Move le_validate_conn_params() interface to internal HCI header to be commonly shared between HCI and L2CAP layers. Refactor the interface and its users and rename related to Connection Parameters Update procedure values used for validation. < ACL Data TX: Handle 42 flags 0x00 dlen 16 [hci1] 2832.387859 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 @ Device Connected: 00:AA:01:00:00:23 (1) flags 0x0000 < HCI Command: LE Read Remote Used Features (0x08|0x0016) plen 2 [hci0] 2832.389374 Handle: 42 > ACL Data RX: Handle 42 flags 0x02 dlen 16 [hci0] 2832.389437 LE L2CAP: Connection Parameter Update Request (0x12) ident 1 len 8 Min interval: 40 Max interval: 56 Slave latency: 0 Timeout multiplier: 0 > HCI Event: Number of Completed Packets (0x13) plen 5 [hci1] 2832.389440 Num handles: 1 Handle: 42 Count: 1 > HCI Event: Command Status (0x0f) plen 4 [hci0] 2832.389443 LE Read Remote Used Features (0x08|0x0016) ncmd 1 Status: Success (0x00) > HCI Event: LE Meta Event (0x3e) plen 12 [hci0] 2832.389444 LE Read Remote Used Features (0x04) Status: Success (0x00) Handle: 42 Features: 0x03 0x00 0x00 0x00 0x00 0x00 0x00 0x00 LE Encryption Connection Parameter Request Procedure < ACL Data TX: Handle 42 flags 0x00 dlen 10 [hci0] 2832.393154 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) > ACL Data RX: Handle 42 flags 0x02 dlen 10 [hci1] 2832.393181 LE L2CAP: Connection Parameter Update Response (0x13) ident 1 len 2 Result: Connection Parameters rejected (0x0001) Rejected due to Timeout multiplier: 0. Change-Id: Idaf4f452f560ff71d9637ec5d793154190e94b35 Signed-off-by: Arkadiusz Lichwa <arkadiusz.lichwa@tieto.com> Signed-off-by: Mariusz Skamra <mariusz.skamra@tieto.com>
2015-07-29 13:45:33 +03:00
if (params_valid) {
bt_conn_le_conn_update(conn, param);
}
}
#endif /* CONFIG_BLUETOOTH_CENTRAL */
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static struct bt_l2cap_server *l2cap_server_lookup_psm(uint16_t psm)
{
struct bt_l2cap_server *server;
for (server = servers; server; server = server->_next) {
if (server->psm == psm) {
return server;
}
}
return NULL;
}
int bt_l2cap_server_register(struct bt_l2cap_server *server)
{
if (server->psm < L2CAP_LE_PSM_START ||
server->psm > L2CAP_LE_PSM_END || !server->accept) {
return -EINVAL;
}
if (server->sec_level > BT_SECURITY_FIPS) {
return -EINVAL;
} else if (server->sec_level < BT_SECURITY_LOW) {
/* Level 0 is only applicable for BR/EDR */
server->sec_level = BT_SECURITY_LOW;
}
/* Check if given PSM is already in use */
if (l2cap_server_lookup_psm(server->psm)) {
BT_DBG("PSM already registered");
return -EADDRINUSE;
}
BT_DBG("PSM 0x%04x", server->psm);
server->_next = servers;
servers = server;
return 0;
}
static void l2cap_chan_rx_init(struct bt_l2cap_le_chan *chan)
{
BT_DBG("chan %p", chan);
/* Use existing MTU if defined */
if (!chan->rx.mtu) {
chan->rx.mtu = BT_L2CAP_MAX_LE_MTU;
}
chan->rx.mps = BT_L2CAP_MAX_LE_MPS;
k_sem_init(&chan->rx.credits, 0, UINT_MAX);
}
static void l2cap_chan_tx_init(struct bt_l2cap_le_chan *chan)
{
BT_DBG("chan %p", chan);
memset(&chan->tx, 0, sizeof(chan->tx));
k_sem_init(&chan->tx.credits, 0, UINT_MAX);
}
static void l2cap_chan_tx_give_credits(struct bt_l2cap_le_chan *chan,
uint16_t credits)
{
BT_DBG("chan %p credits %u", chan, credits);
while (credits--) {
k_sem_give(&chan->tx.credits);
}
}
static void l2cap_chan_rx_give_credits(struct bt_l2cap_le_chan *chan,
uint16_t credits)
{
BT_DBG("chan %p credits %u", chan, credits);
while (credits--) {
k_sem_give(&chan->rx.credits);
}
}
static void l2cap_chan_destroy(struct bt_l2cap_chan *chan)
{
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
BT_DBG("chan %p cid 0x%04x", ch, ch->rx.cid);
/* Cancel ongoing work */
k_delayed_work_cancel(&chan->rtx_work);
/* There could be a writer waiting for credits so return a dummy credit
* to wake it up.
*/
l2cap_chan_tx_give_credits(ch, 1);
/* Destroy segmented SDU if it exists */
if (ch->_sdu) {
net_buf_unref(ch->_sdu);
ch->_sdu = NULL;
ch->_sdu_len = 0;
}
}
static void le_conn_req(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_chan *chan;
struct bt_l2cap_server *server;
struct bt_l2cap_le_conn_req *req = (void *)buf->data;
struct bt_l2cap_le_conn_rsp *rsp;
uint16_t psm, scid, mtu, mps, credits;
if (buf->len < sizeof(*req)) {
BT_ERR("Too small LE conn req packet size");
return;
}
psm = sys_le16_to_cpu(req->psm);
scid = sys_le16_to_cpu(req->scid);
mtu = sys_le16_to_cpu(req->mtu);
mps = sys_le16_to_cpu(req->mps);
credits = sys_le16_to_cpu(req->credits);
BT_DBG("psm 0x%02x scid 0x%04x mtu %u mps %u credits %u", psm, scid,
mtu, mps, credits);
if (mtu < L2CAP_LE_MIN_MTU || mps < L2CAP_LE_MIN_MTU) {
BT_ERR("Invalid LE-Conn Req params");
return;
}
buf = l2cap_create_le_sig_pdu(BT_L2CAP_LE_CONN_RSP, ident,
sizeof(*rsp));
if (!buf) {
return;
}
rsp = net_buf_add(buf, sizeof(*rsp));
memset(rsp, 0, sizeof(*rsp));
/* Check if there is a server registered */
server = l2cap_server_lookup_psm(psm);
if (!server) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_PSM_NOT_SUPP);
goto rsp;
}
/* Check if connection has minimum required security level */
if (conn->sec_level < server->sec_level) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_AUTHENTICATION);
goto rsp;
}
if (!L2CAP_LE_CID_IS_DYN(scid)) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_INVALID_SCID);
goto rsp;
}
chan = bt_l2cap_le_lookup_tx_cid(conn, scid);
if (chan) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_SCID_IN_USE);
goto rsp;
}
/* Request server to accept the new connection and allocate the
* channel.
*
* TODO: Handle different errors, it may be required to respond async.
*/
if (server->accept(conn, &chan) < 0) {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_NO_RESOURCES);
goto rsp;
}
chan->required_sec_level = server->sec_level;
if (l2cap_chan_add(conn, chan, l2cap_chan_destroy)) {
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
/* Init TX parameters */
l2cap_chan_tx_init(ch);
ch->tx.cid = scid;
ch->tx.mps = mps;
ch->tx.mtu = mtu;
l2cap_chan_tx_give_credits(ch, credits);
/* Init RX parameters */
l2cap_chan_rx_init(ch);
l2cap_chan_rx_give_credits(ch, L2CAP_LE_MAX_CREDITS);
/* Set channel PSM */
chan->psm = server->psm;
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
/* Update state */
bt_l2cap_chan_set_state(chan, BT_L2CAP_CONNECTED);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
if (chan->ops && chan->ops->connected) {
chan->ops->connected(chan);
}
/* Prepare response protocol data */
rsp->dcid = sys_cpu_to_le16(ch->rx.cid);
rsp->mps = sys_cpu_to_le16(ch->rx.mps);
rsp->mtu = sys_cpu_to_le16(ch->rx.mtu);
rsp->credits = sys_cpu_to_le16(L2CAP_LE_MAX_CREDITS);
rsp->result = BT_L2CAP_SUCCESS;
} else {
rsp->result = sys_cpu_to_le16(BT_L2CAP_ERR_NO_RESOURCES);
}
rsp:
bt_l2cap_send(conn, BT_L2CAP_CID_LE_SIG, buf);
}
static struct bt_l2cap_le_chan *l2cap_remove_tx_cid(struct bt_conn *conn,
uint16_t cid)
{
struct bt_l2cap_chan *chan, *prev;
Bluetooth: L2CAP: Protect fixed channels During connection fixed channels need to be operational all the time on the link. Remote malicious user can tailor control packet with proper CID using disconnection request or response that can cause fixed channel removal from connection context. > HCI Event: Number of Completed Packets (0x13) plen 5 [hci0] 16:34:56.157666 Num handles: 1 Handle: 77 Count: 1 > ACL Data RX: Handle 77 flags 0x02 dlen 12 [hci0] 16:34:56.161162 L2CAP: Disconnection Response (0x07) ident 236 len 4 Destination CID: 1 Source CID: 1605 > ACL Data RX: Handle 77 flags 0x02 dlen 12 [hci0] 16:34:56.164916 L2CAP: Disconnection Request (0x06) ident 237 len 4 Destination CID: 0 Source CID: 0 < HCI Command: Host Number of Completed Packets (0x03|0x0035) plen 5 [hci0] 16:34:56.166326 Num handles: 1 Handle: 77 Count: 1 < HCI Command: Host Number of Completed Packets (0x03|0x0035) plen 5 [hci0] 16:34:56.167380 Num handles: 1 Handle: 77 Count: 1 > ACL Data RX: Handle 77 flags 0x02 dlen 10 [hci0] 16:34:56.168660 L2CAP: Information Request (0x0a) ident 238 len 2 Type: Extended features supported (0x0002) < HCI Command: Host Number of Completed Packets (0x03|0x0035) plen 5 [hci0] 16:34:56.170475 Num handles: 1 Handle: 77 Count: 1 > ACL Data RX: Handle 77 flags 0x02 dlen 10 [hci0] 16:34:58.671203 L2CAP: Information Request (0x0a) ident 239 len 2 Type: Extended features supported (0x0002) < HCI Command: Host Number of Completed Packets (0x03|0x0035) plen 5 [hci0] 16:34:58.674439 Num handles: 1 Handle: 77 Count: 1 Change-Id: I3df3ec987c7abab8657349a2d5fe67831f528214 Signed-off-by: Arkadiusz Lichwa <arkadiusz.lichwa@tieto.com>
2016-10-12 22:02:28 +02:00
/* Protect fixed channels against accidental removal */
if (!L2CAP_LE_CID_IS_DYN(cid)) {
return NULL;
}
for (chan = conn->channels, prev = NULL; chan;
prev = chan, chan = chan->_next) {
/* get the app's l2cap object wherein this chan is contained */
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
if (ch->tx.cid != cid) {
continue;
}
if (!prev) {
conn->channels = chan->_next;
} else {
prev->_next = chan->_next;
}
return ch;
}
return NULL;
}
static void le_disconn_req(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_le_chan *chan;
struct bt_l2cap_disconn_req *req = (void *)buf->data;
struct bt_l2cap_disconn_rsp *rsp;
uint16_t scid;
if (buf->len < sizeof(*req)) {
BT_ERR("Too small LE conn req packet size");
return;
}
scid = sys_le16_to_cpu(req->scid);
BT_DBG("scid 0x%04x dcid 0x%04x", scid, sys_le16_to_cpu(req->dcid));
chan = l2cap_remove_tx_cid(conn, scid);
if (!chan) {
struct bt_l2cap_cmd_reject_cid_data data;
data.scid = req->scid;
data.dcid = req->dcid;
l2cap_send_reject(conn, ident, BT_L2CAP_REJ_INVALID_CID, &data,
sizeof(data));
return;
}
buf = l2cap_create_le_sig_pdu(BT_L2CAP_DISCONN_RSP, ident,
sizeof(*rsp));
if (!buf) {
return;
}
rsp = net_buf_add(buf, sizeof(*rsp));
rsp->dcid = sys_cpu_to_le16(chan->rx.cid);
rsp->scid = sys_cpu_to_le16(chan->tx.cid);
bt_l2cap_chan_del(&chan->chan);
bt_l2cap_send(conn, BT_L2CAP_CID_LE_SIG, buf);
}
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
static int l2cap_change_security(struct bt_l2cap_le_chan *chan, uint16_t err)
{
switch (err) {
case BT_L2CAP_ERR_ENCRYPTION:
if (chan->chan.required_sec_level >= BT_SECURITY_MEDIUM) {
return -EALREADY;
}
chan->chan.required_sec_level = BT_SECURITY_MEDIUM;
break;
case BT_L2CAP_ERR_AUTHENTICATION:
if (chan->chan.required_sec_level < BT_SECURITY_MEDIUM) {
chan->chan.required_sec_level = BT_SECURITY_MEDIUM;
} else if (chan->chan.required_sec_level < BT_SECURITY_HIGH) {
chan->chan.required_sec_level = BT_SECURITY_HIGH;
} else if (chan->chan.required_sec_level < BT_SECURITY_FIPS) {
chan->chan.required_sec_level = BT_SECURITY_FIPS;
} else {
return -EALREADY;
}
break;
default:
return -EINVAL;
}
return bt_conn_security(chan->chan.conn, chan->chan.required_sec_level);
}
static void le_conn_rsp(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_le_chan *chan;
struct bt_l2cap_le_conn_rsp *rsp = (void *)buf->data;
uint16_t dcid, mtu, mps, credits, result;
if (buf->len < sizeof(*rsp)) {
BT_ERR("Too small LE conn rsp packet size");
return;
}
dcid = sys_le16_to_cpu(rsp->dcid);
mtu = sys_le16_to_cpu(rsp->mtu);
mps = sys_le16_to_cpu(rsp->mps);
credits = sys_le16_to_cpu(rsp->credits);
result = sys_le16_to_cpu(rsp->result);
BT_DBG("dcid 0x%04x mtu %u mps %u credits %u result 0x%04x", dcid,
mtu, mps, credits, result);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
/* Keep the channel in case of security errors */
if (result == BT_L2CAP_SUCCESS ||
result == BT_L2CAP_ERR_AUTHENTICATION ||
result == BT_L2CAP_ERR_ENCRYPTION) {
chan = l2cap_lookup_ident(conn, ident);
} else {
chan = l2cap_remove_ident(conn, ident);
}
if (!chan) {
BT_ERR("Cannot find channel for ident %u", ident);
return;
}
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
/* Cancel RTX work */
k_delayed_work_cancel(&chan->chan.rtx_work);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
/* Reset ident since it got a response */
chan->chan.ident = 0;
switch (result) {
case BT_L2CAP_SUCCESS:
chan->tx.cid = dcid;
chan->tx.mtu = mtu;
chan->tx.mps = mps;
/* Update state */
bt_l2cap_chan_set_state(&chan->chan, BT_L2CAP_CONNECTED);
if (chan->chan.ops && chan->chan.ops->connected) {
chan->chan.ops->connected(&chan->chan);
}
/* Give credits */
l2cap_chan_tx_give_credits(chan, credits);
l2cap_chan_rx_give_credits(chan, L2CAP_LE_MAX_CREDITS);
break;
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
case BT_L2CAP_ERR_AUTHENTICATION:
case BT_L2CAP_ERR_ENCRYPTION:
/* If security needs changing wait it to be completed */
if (l2cap_change_security(chan, result) == 0) {
return;
}
l2cap_detach_chan(conn, &chan->chan);
default:
bt_l2cap_chan_del(&chan->chan);
}
}
static void le_disconn_rsp(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_le_chan *chan;
struct bt_l2cap_disconn_rsp *rsp = (void *)buf->data;
uint16_t dcid;
if (buf->len < sizeof(*rsp)) {
BT_ERR("Too small LE disconn rsp packet size");
return;
}
dcid = sys_le16_to_cpu(rsp->dcid);
BT_DBG("dcid 0x%04x scid 0x%04x", dcid, sys_le16_to_cpu(rsp->scid));
chan = l2cap_remove_tx_cid(conn, dcid);
if (!chan) {
return;
}
bt_l2cap_chan_del(&chan->chan);
}
static void le_credits(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_chan *chan;
struct bt_l2cap_le_credits *ev = (void *)buf->data;
struct bt_l2cap_le_chan *ch;
uint16_t credits, cid;
if (buf->len < sizeof(*ev)) {
BT_ERR("Too small LE Credits packet size");
return;
}
cid = sys_le16_to_cpu(ev->cid);
credits = sys_le16_to_cpu(ev->credits);
BT_DBG("cid 0x%04x credits %u", cid, credits);
chan = bt_l2cap_le_lookup_tx_cid(conn, cid);
if (!chan) {
BT_ERR("Unable to find channel of LE Credits packet");
return;
}
ch = BT_L2CAP_LE_CHAN(chan);
if (k_sem_count_get(&ch->tx.credits) + credits > UINT16_MAX) {
BT_ERR("Credits overflow");
bt_l2cap_chan_disconnect(chan);
return;
}
l2cap_chan_tx_give_credits(ch, credits);
BT_DBG("chan %p total credits %u", ch,
k_sem_count_get(&ch->tx.credits));
}
static void reject_cmd(struct bt_l2cap *l2cap, uint8_t ident,
struct net_buf *buf)
{
struct bt_conn *conn = l2cap->chan.chan.conn;
struct bt_l2cap_le_chan *chan;
/* Check if there is a outstanding channel */
chan = l2cap_remove_ident(conn, ident);
if (!chan) {
return;
}
bt_l2cap_chan_del(&chan->chan);
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
static void l2cap_recv(struct bt_l2cap_chan *chan, struct net_buf *buf)
{
struct bt_l2cap *l2cap = CONTAINER_OF(chan, struct bt_l2cap, chan);
struct bt_l2cap_sig_hdr *hdr = (void *)buf->data;
uint16_t len;
if (buf->len < sizeof(*hdr)) {
BT_ERR("Too small L2CAP signaling PDU");
return;
}
len = sys_le16_to_cpu(hdr->len);
net_buf_pull(buf, sizeof(*hdr));
BT_DBG("Signaling code 0x%02x ident %u len %u", hdr->code,
hdr->ident, len);
if (buf->len != len) {
BT_ERR("L2CAP length mismatch (%u != %u)", buf->len, len);
return;
}
if (!hdr->ident) {
BT_ERR("Invalid ident value in L2CAP PDU");
return;
}
switch (hdr->code) {
case BT_L2CAP_CONN_PARAM_RSP:
le_conn_param_rsp(l2cap, buf);
break;
#if defined(CONFIG_BLUETOOTH_CENTRAL)
case BT_L2CAP_CONN_PARAM_REQ:
le_conn_param_update_req(l2cap, hdr->ident, buf);
break;
#endif /* CONFIG_BLUETOOTH_CENTRAL */
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
case BT_L2CAP_LE_CONN_REQ:
le_conn_req(l2cap, hdr->ident, buf);
break;
case BT_L2CAP_LE_CONN_RSP:
le_conn_rsp(l2cap, hdr->ident, buf);
break;
case BT_L2CAP_DISCONN_REQ:
le_disconn_req(l2cap, hdr->ident, buf);
break;
case BT_L2CAP_DISCONN_RSP:
le_disconn_rsp(l2cap, hdr->ident, buf);
break;
case BT_L2CAP_LE_CREDITS:
le_credits(l2cap, hdr->ident, buf);
break;
case BT_L2CAP_CMD_REJECT:
reject_cmd(l2cap, hdr->ident, buf);
break;
#else
case BT_L2CAP_CMD_REJECT:
/* Ignored */
break;
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
default:
BT_WARN("Unknown L2CAP PDU code 0x%02x", hdr->code);
l2cap_send_reject(chan->conn, hdr->ident,
BT_L2CAP_REJ_NOT_UNDERSTOOD, NULL, 0);
break;
}
}
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static void l2cap_chan_update_credits(struct bt_l2cap_le_chan *chan)
{
struct net_buf *buf;
struct bt_l2cap_le_credits *ev;
uint16_t credits;
/* Only give more credits if it went bellow the defined threshold */
if (k_sem_count_get(&chan->rx.credits) > L2CAP_LE_CREDITS_THRESHOLD) {
goto done;
}
/* Restore credits */
credits = L2CAP_LE_MAX_CREDITS - k_sem_count_get(&chan->rx.credits);
l2cap_chan_rx_give_credits(chan, credits);
buf = l2cap_create_le_sig_pdu(BT_L2CAP_LE_CREDITS, get_ident(),
sizeof(*ev));
if (!buf) {
BT_ERR("Unable to send credits");
return;
}
ev = net_buf_add(buf, sizeof(*ev));
ev->cid = sys_cpu_to_le16(chan->rx.cid);
ev->credits = sys_cpu_to_le16(credits);
bt_l2cap_send(chan->chan.conn, BT_L2CAP_CID_LE_SIG, buf);
done:
BT_DBG("chan %p credits %u", chan, k_sem_count_get(&chan->rx.credits));
}
static struct net_buf *l2cap_alloc_frag(struct bt_l2cap_le_chan *chan)
{
struct net_buf *frag = NULL;
frag = chan->chan.ops->alloc_buf(&chan->chan);
if (!frag) {
return NULL;
}
BT_DBG("frag %p tailroom %zu", frag, net_buf_tailroom(frag));
net_buf_frag_add(chan->_sdu, frag);
return frag;
}
static void l2cap_chan_le_recv_sdu(struct bt_l2cap_le_chan *chan,
struct net_buf *buf)
{
struct net_buf *frag;
uint16_t len;
BT_DBG("chan %p len %u sdu %zu", chan, buf->len,
net_buf_frags_len(chan->_sdu));
if (net_buf_frags_len(chan->_sdu) + buf->len > chan->_sdu_len) {
BT_ERR("SDU length mismatch");
bt_l2cap_chan_disconnect(&chan->chan);
return;
}
/* Jump to last fragment */
frag = net_buf_frag_last(chan->_sdu);
while (buf->len) {
/* Check if there is any space left in the current fragment */
if (!net_buf_tailroom(frag)) {
frag = l2cap_alloc_frag(chan);
if (!frag) {
BT_ERR("Unable to store SDU");
bt_l2cap_chan_disconnect(&chan->chan);
return;
}
}
len = min(net_buf_tailroom(frag), buf->len);
memcpy(net_buf_add(frag, len), buf->data, len);
net_buf_pull(buf, len);
BT_DBG("frag %p len %u", frag, frag->len);
}
if (net_buf_frags_len(chan->_sdu) == chan->_sdu_len) {
/* Receiving complete SDU, notify channel and reset SDU buf */
chan->chan.ops->recv(&chan->chan, chan->_sdu);
net_buf_unref(chan->_sdu);
chan->_sdu = NULL;
chan->_sdu_len = 0;
}
l2cap_chan_update_credits(chan);
}
static void l2cap_chan_le_recv(struct bt_l2cap_le_chan *chan,
struct net_buf *buf)
{
uint16_t sdu_len;
if (k_sem_take(&chan->rx.credits, K_NO_WAIT)) {
BT_ERR("No credits to receive packet");
bt_l2cap_chan_disconnect(&chan->chan);
return;
}
/* Check if segments already exist */
if (chan->_sdu) {
l2cap_chan_le_recv_sdu(chan, buf);
return;
}
sdu_len = net_buf_pull_le16(buf);
BT_DBG("chan %p len %u sdu_len %u", chan, buf->len, sdu_len);
if (sdu_len > chan->rx.mtu) {
BT_ERR("Invalid SDU length");
bt_l2cap_chan_disconnect(&chan->chan);
return;
}
/* Always allocate buffer from the channel if supported. */
if (chan->chan.ops && chan->chan.ops->alloc_buf) {
chan->_sdu = chan->chan.ops->alloc_buf(&chan->chan);
if (!chan->_sdu) {
BT_ERR("Unable to allocate buffer for SDU");
bt_l2cap_chan_disconnect(&chan->chan);
return;
}
chan->_sdu_len = sdu_len;
l2cap_chan_le_recv_sdu(chan, buf);
return;
}
chan->chan.ops->recv(&chan->chan, buf);
l2cap_chan_update_credits(chan);
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
static void l2cap_chan_recv(struct bt_l2cap_chan *chan, struct net_buf *buf)
{
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
if (L2CAP_LE_CID_IS_DYN(ch->rx.cid)) {
l2cap_chan_le_recv(ch, buf);
return;
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
BT_DBG("chan %p len %u", chan, buf->len);
chan->ops->recv(chan, buf);
}
void bt_l2cap_recv(struct bt_conn *conn, struct net_buf *buf)
{
struct bt_l2cap_hdr *hdr = (void *)buf->data;
struct bt_l2cap_chan *chan;
uint16_t cid;
#if defined(CONFIG_BLUETOOTH_BREDR)
if (conn->type == BT_CONN_TYPE_BR) {
bt_l2cap_br_recv(conn, buf);
return;
}
#endif /* CONFIG_BLUETOOTH_BREDR */
if (buf->len < sizeof(*hdr)) {
BT_ERR("Too small L2CAP PDU received");
net_buf_unref(buf);
return;
}
cid = sys_le16_to_cpu(hdr->cid);
net_buf_pull(buf, sizeof(*hdr));
BT_DBG("Packet for CID %u len %u", cid, buf->len);
chan = bt_l2cap_le_lookup_rx_cid(conn, cid);
if (!chan) {
BT_WARN("Ignoring data for unknown CID 0x%04x", cid);
net_buf_unref(buf);
return;
}
l2cap_chan_recv(chan, buf);
net_buf_unref(buf);
}
int bt_l2cap_update_conn_param(struct bt_conn *conn,
const struct bt_le_conn_param *param)
{
struct bt_l2cap_conn_param_req *req;
struct net_buf *buf;
buf = l2cap_create_le_sig_pdu(BT_L2CAP_CONN_PARAM_REQ, get_ident(),
sizeof(*req));
if (!buf) {
return -ENOBUFS;
}
req = net_buf_add(buf, sizeof(*req));
req->min_interval = sys_cpu_to_le16(param->interval_min);
req->max_interval = sys_cpu_to_le16(param->interval_max);
req->latency = sys_cpu_to_le16(param->latency);
req->timeout = sys_cpu_to_le16(param->timeout);
bt_l2cap_send(conn, BT_L2CAP_CID_LE_SIG, buf);
return 0;
}
static void l2cap_connected(struct bt_l2cap_chan *chan)
{
BT_DBG("ch %p cid 0x%04x", BT_L2CAP_LE_CHAN(chan),
BT_L2CAP_LE_CHAN(chan)->rx.cid);
}
static void l2cap_disconnected(struct bt_l2cap_chan *chan)
{
BT_DBG("ch %p cid 0x%04x", BT_L2CAP_LE_CHAN(chan),
BT_L2CAP_LE_CHAN(chan)->rx.cid);
}
static int l2cap_accept(struct bt_conn *conn, struct bt_l2cap_chan **chan)
{
int i;
static struct bt_l2cap_chan_ops ops = {
.connected = l2cap_connected,
.disconnected = l2cap_disconnected,
.recv = l2cap_recv,
};
BT_DBG("conn %p handle %u", conn, conn->handle);
for (i = 0; i < ARRAY_SIZE(bt_l2cap_pool); i++) {
struct bt_l2cap *l2cap = &bt_l2cap_pool[i];
if (l2cap->chan.chan.conn) {
continue;
}
l2cap->chan.chan.ops = &ops;
*chan = &l2cap->chan.chan;
return 0;
}
BT_ERR("No available L2CAP context for conn %p", conn);
return -ENOMEM;
}
void bt_l2cap_init(void)
{
static struct bt_l2cap_fixed_chan chan = {
.cid = BT_L2CAP_CID_LE_SIG,
.accept = l2cap_accept,
};
net_buf_pool_init(le_sig_pool);
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
net_buf_pool_init(le_data_pool);
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */
bt_l2cap_le_fixed_chan_register(&chan);
#if defined(CONFIG_BLUETOOTH_BREDR)
bt_l2cap_br_init();
#endif /* CONFIG_BLUETOOTH_BREDR */
}
struct bt_l2cap_chan *bt_l2cap_le_lookup_tx_cid(struct bt_conn *conn,
uint16_t cid)
{
struct bt_l2cap_chan *chan;
for (chan = conn->channels; chan; chan = chan->_next) {
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
if (ch->tx.cid == cid)
return chan;
}
return NULL;
}
struct bt_l2cap_chan *bt_l2cap_le_lookup_rx_cid(struct bt_conn *conn,
uint16_t cid)
{
struct bt_l2cap_chan *chan;
for (chan = conn->channels; chan; chan = chan->_next) {
struct bt_l2cap_le_chan *ch = BT_L2CAP_LE_CHAN(chan);
if (ch->rx.cid == cid) {
return chan;
}
}
return NULL;
}
#if defined(CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL)
static int l2cap_le_connect(struct bt_conn *conn, struct bt_l2cap_le_chan *ch,
uint16_t psm)
{
if (psm < L2CAP_LE_PSM_START || psm > L2CAP_LE_PSM_END) {
return -EINVAL;
}
l2cap_chan_tx_init(ch);
l2cap_chan_rx_init(ch);
if (!l2cap_chan_add(conn, &ch->chan, l2cap_chan_destroy)) {
return -ENOMEM;
}
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
ch->chan.psm = psm;
bt_l2cap_chan_set_state(&ch->chan, BT_L2CAP_CONNECT);
Bluetooth: L2CAP: Handle LE connection response security errors If there are security errors bump the security of the connection and retry: 7C:7A:91:18:82:5F (public)> l2cap-connect 0x0080 [bt] [DBG] bt_l2cap_chan_connect: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 psm 0x0080 [bt] [DBG] l2cap_chan_tx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] l2cap_chan_rx_init: (0x0011ae8c) chan 0x00119700 [bt] [DBG] bt_l2cap_chan_add: (0x0011ae8c) conn 0x0011b940 chan 0x00119700 L2CAP connection pending 7C:7A:91:18:82:5F (public)> [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 2 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0000 mtu 0 mps 0 credits 0 result 0x0005 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 7 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 7 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 65 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 65 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 6 len 17 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bf00 len 17 Security changed: 7C:7A:91:18:82:5F (public) level 2 [bt] [DBG] bt_l2cap_recv: (0x0011ced8) Packet for CID 5 len 14 [bt] [DBG] l2cap_chan_recv: (0x0011ced8) chan 0x0011bd00 len 14 [bt] [DBG] l2cap_recv: (0x0011ced8) Signaling code 0x15 ident 3 len 10 [bt] [DBG] le_conn_rsp: (0x0011ced8) dcid 0x0040 mtu 672 mps 230 credits 10 result 0x0000 Channel 0x00119700 connected Change-Id: I2402fd86cc6bdf41a537053325e0a1973c23377a Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
2016-11-02 13:20:11 +02:00
return l2cap_le_conn_req(ch);
}
int bt_l2cap_chan_connect(struct bt_conn *conn, struct bt_l2cap_chan *chan,
uint16_t psm)
{
BT_DBG("conn %p chan %p psm 0x%04x", conn, chan, psm);
if (!conn || conn->state != BT_CONN_CONNECTED) {
return -ENOTCONN;
}
if (!chan) {
return -EINVAL;
}
#if defined(CONFIG_BLUETOOTH_BREDR)
if (conn->type == BT_CONN_TYPE_BR) {
return bt_l2cap_br_chan_connect(conn, chan, psm);
}
#endif /* CONFIG_BLUETOOTH_BREDR */
if (chan->required_sec_level > BT_SECURITY_FIPS) {
return -EINVAL;
} else if (chan->required_sec_level == BT_SECURITY_NONE) {
chan->required_sec_level = BT_SECURITY_LOW;
}
return l2cap_le_connect(conn, BT_L2CAP_LE_CHAN(chan), psm);
}
int bt_l2cap_chan_disconnect(struct bt_l2cap_chan *chan)
{
struct bt_conn *conn = chan->conn;
struct net_buf *buf;
struct bt_l2cap_disconn_req *req;
struct bt_l2cap_le_chan *ch;
if (!conn) {
return -ENOTCONN;
}
#if defined(CONFIG_BLUETOOTH_BREDR)
if (conn->type == BT_CONN_TYPE_BR) {
return bt_l2cap_br_chan_disconnect(chan);
}
#endif /* CONFIG_BLUETOOTH_BREDR */
ch = BT_L2CAP_LE_CHAN(chan);
BT_DBG("chan %p scid 0x%04x dcid 0x%04x", chan, ch->rx.cid,
ch->tx.cid);
ch->chan.ident = get_ident();
buf = l2cap_create_le_sig_pdu(BT_L2CAP_DISCONN_REQ, ch->chan.ident,
sizeof(*req));
if (!buf) {
ch->chan.ident = 0;
BT_ERR("Unable to send L2CP disconnect request");
return -ENOMEM;
}
req = net_buf_add(buf, sizeof(*req));
req->dcid = sys_cpu_to_le16(ch->tx.cid);
req->scid = sys_cpu_to_le16(ch->rx.cid);
l2cap_chan_send_req(ch, buf, L2CAP_DISC_TIMEOUT);
bt_l2cap_chan_set_state(chan, BT_L2CAP_DISCONNECT);
return 0;
}
static struct net_buf *l2cap_chan_create_seg(struct bt_l2cap_le_chan *ch,
struct net_buf *buf,
size_t sdu_hdr_len)
{
struct net_buf *seg;
uint16_t headroom;
uint16_t len;
/* Segment if data (+ data headroom) is bigger than MPS */
if (buf->len + sdu_hdr_len > ch->tx.mps) {
goto segment;
}
/* Segment if there is no space in the user_data */
if (buf->user_data_size < BT_BUF_USER_DATA_MIN) {
BT_WARN("Too small buffer user_data_size %u",
buf->user_data_size);
goto segment;
}
headroom = sizeof(struct bt_hci_acl_hdr) +
sizeof(struct bt_l2cap_hdr) + sdu_hdr_len;
/* Check if original buffer has enough headroom and don't have any
* fragments.
*/
if (net_buf_headroom(buf) >= headroom && !buf->frags) {
if (sdu_hdr_len) {
/* Push SDU length if set */
net_buf_push_le16(buf, net_buf_frags_len(buf));
}
return net_buf_ref(buf);
}
segment:
seg = bt_l2cap_create_pdu(&le_data, 0);
if (!seg) {
return NULL;
}
if (sdu_hdr_len) {
net_buf_add_le16(seg, net_buf_frags_len(buf));
}
/* Don't send more that TX MPS including SDU length */
len = min(net_buf_tailroom(seg), ch->tx.mps - sdu_hdr_len);
/* Limit if original buffer is smaller than the segment */
len = min(buf->len, len);
memcpy(net_buf_add(seg, len), buf->data, len);
net_buf_pull(buf, len);
BT_DBG("ch %p seg %p len %u", ch, seg, seg->len);
return seg;
}
static int l2cap_chan_le_send(struct bt_l2cap_le_chan *ch, struct net_buf *buf,
uint16_t sdu_hdr_len)
{
int len;
/* Wait for credits */
k_sem_take(&ch->tx.credits, K_FOREVER);
buf = l2cap_chan_create_seg(ch, buf, sdu_hdr_len);
if (!buf) {
return -ENOMEM;
}
/* Channel may have been disconnected while waiting for credits */
if (!ch->chan.conn) {
net_buf_unref(buf);
return -ECONNRESET;
}
BT_DBG("ch %p cid 0x%04x len %u credits %u", ch, ch->tx.cid,
buf->len, k_sem_count_get(&ch->tx.credits));
len = buf->len;
bt_l2cap_send(ch->chan.conn, ch->tx.cid, buf);
return len;
}
static int l2cap_chan_le_send_sdu(struct bt_l2cap_le_chan *ch,
struct net_buf *buf)
{
int ret, sent, total_len;
struct net_buf *frag;
total_len = net_buf_frags_len(buf);
if (total_len > ch->tx.mtu) {
return -EMSGSIZE;
}
frag = buf;
if (!frag->len && frag->frags) {
frag = frag->frags;
}
/* Add SDU length for the first segment */
ret = l2cap_chan_le_send(ch, frag, BT_L2CAP_SDU_HDR_LEN);
if (ret < 0) {
return ret;
}
/* Send remaining segments */
for (sent = ret; sent < total_len; sent += ret) {
/* Proceed to next fragment */
if (!frag->len) {
frag = net_buf_frag_del(buf, frag);
}
ret = l2cap_chan_le_send(ch, frag, 0);
if (ret < 0) {
return ret;
}
}
BT_DBG("ch %p cid 0x%04x sent %u", ch, ch->tx.cid, sent);
net_buf_unref(buf);
return sent;
}
int bt_l2cap_chan_send(struct bt_l2cap_chan *chan, struct net_buf *buf)
{
int err;
if (!buf) {
return -EINVAL;
}
BT_DBG("chan %p buf %p len %u", chan, buf, buf->len);
if (!chan->conn || chan->conn->state != BT_CONN_CONNECTED) {
return -ENOTCONN;
}
#if defined(CONFIG_BLUETOOTH_BREDR)
if (chan->conn->type == BT_CONN_TYPE_BR) {
return bt_l2cap_br_chan_send(chan, buf);
}
#endif /* CONFIG_BLUETOOTH_BREDR */
err = l2cap_chan_le_send_sdu(BT_L2CAP_LE_CHAN(chan), buf);
if (err < 0) {
BT_ERR("failed to send message %d", err);
}
return err;
}
#endif /* CONFIG_BLUETOOTH_L2CAP_DYNAMIC_CHANNEL */