summaryrefslogtreecommitdiffstats
path: root/src/direct_bt/SMPHandler.cpp
diff options
context:
space:
mode:
authorSven Gothel <[email protected]>2020-11-08 05:56:59 +0100
committerSven Gothel <[email protected]>2020-11-08 05:56:59 +0100
commit6f3e08562f4f990b579ff2540d25dac06beea15a (patch)
tree15b9eeeb47e8f8e0b6e21580ff3b01ab13e4d87a /src/direct_bt/SMPHandler.cpp
parent468adfb3c5819b4ef64d4877583cebd9588e5a4a (diff)
Adding tentative SMPHandler (WIP for non Linux/BlueZ platforms or when supported)
On our current target platform Linux/BlueZ, access to the existing SMP implementation via L2CAP (socket) is sadly prohibited. Linux/BlueZ currently only allows L2CAP sockets for LE devices for the ATT protocol, determined by L2CAP_CID_ATT. Therefor we have to use Linux/BlueZ manager control channel's API to access the SMP implementation. However, the SMPHandler and used SMPPDUMsg types may be used on other platforms. Hence implementation shall be completed for these later on.
Diffstat (limited to 'src/direct_bt/SMPHandler.cpp')
-rw-r--r--src/direct_bt/SMPHandler.cpp328
1 files changed, 328 insertions, 0 deletions
diff --git a/src/direct_bt/SMPHandler.cpp b/src/direct_bt/SMPHandler.cpp
new file mode 100644
index 00000000..86dab20d
--- /dev/null
+++ b/src/direct_bt/SMPHandler.cpp
@@ -0,0 +1,328 @@
+/*
+ * Author: Sven Gothel <[email protected]>
+ * Copyright (c) 2020 Gothel Software e.K.
+ * Copyright (c) 2020 ZAFENA AB
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining
+ * a copy of this software and associated documentation files (the
+ * "Software"), to deal in the Software without restriction, including
+ * without limitation the rights to use, copy, modify, merge, publish,
+ * distribute, sublicense, and/or sell copies of the Software, and to
+ * permit persons to whom the Software is furnished to do so, subject to
+ * the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be
+ * included in all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+ * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+ * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
+ * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
+ * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+ * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
+ * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+ */
+
+#include <cstring>
+#include <string>
+#include <memory>
+#include <cstdint>
+#include <vector>
+#include <cstdio>
+
+#include <algorithm>
+
+extern "C" {
+ #include <unistd.h>
+ #include <sys/socket.h>
+ #include <poll.h>
+ #include <signal.h>
+}
+
+// #define PERF_PRINT_ON 1
+// PERF2_PRINT_ON for read/write single values
+// #define PERF2_PRINT_ON 1
+// PERF3_PRINT_ON for disconnect
+// #define PERF3_PRINT_ON 1
+#include <jau/debug.hpp>
+
+#include <jau/basic_algos.hpp>
+
+#include "L2CAPIoctl.hpp"
+
+#include "SMPHandler.hpp"
+
+#include "DBTDevice.hpp"
+
+using namespace direct_bt;
+
+SMPEnv::SMPEnv() noexcept
+: exploding( jau::environment::getExplodingProperties("direct_bt.smp") ),
+ SMP_READ_COMMAND_REPLY_TIMEOUT( jau::environment::getInt32Property("direct_bt.smp.cmd.read.timeout", 500, 250 /* min */, INT32_MAX /* max */) ),
+ SMP_WRITE_COMMAND_REPLY_TIMEOUT( jau::environment::getInt32Property("direct_bt.smp.cmd.write.timeout", 500, 250 /* min */, INT32_MAX /* max */) ),
+ SMPPDU_RING_CAPACITY( jau::environment::getInt32Property("direct_bt.smp.ringsize", 128, 64 /* min */, 1024 /* max */) ),
+ DEBUG_DATA( jau::environment::getBooleanProperty("direct_bt.debug.smp.data", false) )
+{
+}
+
+#ifdef __linux__
+ // Linux/BlueZ prohibits access to the existing SMP implementation via L2CAP (socket).
+ bool SMPHandler::IS_SUPPORTED_BY_OS = false;
+#else
+ bool SMPHandler::IS_SUPPORTED_BY_OS = true;
+#endif
+
+std::shared_ptr<DBTDevice> SMPHandler::getDeviceChecked() const {
+ std::shared_ptr<DBTDevice> ref = wbr_device.lock();
+ if( nullptr == ref ) {
+ throw jau::IllegalStateException("SMPHandler's device already destructed: "+deviceString, E_FILE_LINE);
+ }
+ return ref;
+}
+
+bool SMPHandler::validateConnected() noexcept {
+ bool l2capIsConnected = l2cap.isConnected();
+ bool l2capHasIOError = l2cap.hasIOError();
+
+ if( has_ioerror || l2capHasIOError ) {
+ has_ioerror = true; // propagate l2capHasIOError -> has_ioerror
+ ERR_PRINT("IOError state: GattHandler %s, l2cap %s: %s",
+ getStateString().c_str(), l2cap.getStateString().c_str(), deviceString.c_str());
+ return false;
+ }
+
+ if( !is_connected || !l2capIsConnected ) {
+ ERR_PRINT("Disconnected state: GattHandler %s, l2cap %s: %s",
+ getStateString().c_str(), l2cap.getStateString().c_str(), deviceString.c_str());
+ return false;
+ }
+ return true;
+}
+
+void SMPHandler::l2capReaderThreadImpl() {
+ {
+ const std::lock_guard<std::mutex> lock(mtx_l2capReaderLifecycle); // RAII-style acquire and relinquish via destructor
+ l2capReaderShallStop = false;
+ l2capReaderRunning = true;
+ DBG_PRINT("SMPHandler::reader Started");
+ cv_l2capReaderInit.notify_all();
+ }
+ thread_local jau::call_on_release thread_cleanup([&]() {
+ DBG_PRINT("SMPHandler::l2capReaderThreadCleanup: l2capReaderRunning %d -> 0", l2capReaderRunning.load());
+ l2capReaderRunning = false;
+ });
+
+ while( !l2capReaderShallStop ) {
+ jau::snsize_t len;
+ if( !validateConnected() ) {
+ ERR_PRINT("SMPHandler::reader: Invalid IO state -> Stop");
+ l2capReaderShallStop = true;
+ break;
+ }
+
+ len = l2cap.read(rbuffer.get_wptr(), rbuffer.getSize());
+ if( 0 < len ) {
+ std::shared_ptr<const SMPPDUMsg> smpPDU = SMPPDUMsg::getSpecialized(rbuffer.get_ptr(), static_cast<jau::nsize_t>(len));
+ const SMPPDUMsg::Opcode opc = smpPDU->getOpcode();
+
+ if( SMPPDUMsg::Opcode::SECURITY_REQUEST == opc ) {
+ COND_PRINT(env.DEBUG_DATA, "SMPHandler-IO RECV (SEC_REQ) %s", smpPDU->toString().c_str());
+ jau::for_each_cow(smpSecurityReqCallbackList, [&](SMPSecurityReqCallback &cb) {
+ cb.invoke(smpPDU);
+ });
+ } else {
+ COND_PRINT(env.DEBUG_DATA, "SMPHandler-IO RECV (MSG) %s", smpPDU->toString().c_str());
+ if( smpPDURing.isFull() ) {
+ const jau::nsize_t dropCount = smpPDURing.capacity()/4;
+ smpPDURing.drop(dropCount);
+ WARN_PRINT("SMPHandler-IO RECV Drop (%u oldest elements of %u capacity, ring full)", dropCount, smpPDURing.capacity());
+ }
+ smpPDURing.putBlocking( smpPDU );
+ }
+ } else if( ETIMEDOUT != errno && !l2capReaderShallStop ) { // expected exits
+ IRQ_PRINT("SMPHandler::reader: l2cap read error -> Stop; l2cap.read %d", len);
+ l2capReaderShallStop = true;
+ has_ioerror = true;
+ }
+ }
+ {
+ const std::lock_guard<std::mutex> lock(mtx_l2capReaderLifecycle); // RAII-style acquire and relinquish via destructor
+ WORDY_PRINT("SMPHandler::reader: Ended. Ring has %u entries flushed", smpPDURing.getSize());
+ smpPDURing.clear();
+ l2capReaderRunning = false;
+ cv_l2capReaderInit.notify_all();
+ }
+ disconnect(true /* disconnectDevice */, has_ioerror);
+}
+
+SMPHandler::SMPHandler(const std::shared_ptr<DBTDevice> &device) noexcept
+: env(SMPEnv::get()),
+ wbr_device(device), deviceString(device->getAddressString()), rbuffer(number(Defaults::SMP_MTU_BUFFER_SZ)),
+ l2cap(*device, L2CAP_PSM_UNDEF, L2CAP_CID_SMP),
+ is_connected(true), has_ioerror(false),
+ smpPDURing(env.SMPPDU_RING_CAPACITY), l2capReaderShallStop(false),
+ l2capReaderThreadId(0), l2capReaderRunning(false),
+ mtu(number(Defaults::MIN_SMP_MTU))
+{
+ if( !validateConnected() ) {
+ ERR_PRINT("SMPHandler.ctor: L2CAP could not connect");
+ is_connected = false;
+ return;
+ }
+ DBG_PRINT("SMPHandler::ctor: Start Connect: GattHandler[%s], l2cap[%s]: %s",
+ getStateString().c_str(), l2cap.getStateString().c_str(), deviceString.c_str());
+
+ /**
+ * We utilize DBTManager's mgmthandler_sigaction SIGALRM handler,
+ * as we only can install one handler.
+ */
+ {
+ std::unique_lock<std::mutex> lock(mtx_l2capReaderLifecycle); // RAII-style acquire and relinquish via destructor
+
+ std::thread l2capReaderThread(&SMPHandler::l2capReaderThreadImpl, this); // @suppress("Invalid arguments")
+ l2capReaderThreadId = l2capReaderThread.native_handle();
+ // Avoid 'terminate called without an active exception'
+ // as l2capReaderThread may end due to I/O errors.
+ l2capReaderThread.detach();
+
+ while( false == l2capReaderRunning ) {
+ cv_l2capReaderInit.wait(lock);
+ }
+ }
+
+ // FIXME: Determine proper MTU usage: Defaults::MIN_SMP_MTU or Defaults::LE_SECURE_SMP_MTU (if enabled)
+ uint16_t mtu_ = number(Defaults::MIN_SMP_MTU);
+ mtu = std::min(number(Defaults::LE_SECURE_SMP_MTU), (int)mtu_);
+}
+
+SMPHandler::~SMPHandler() noexcept {
+ disconnect(false /* disconnectDevice */, false /* ioErrorCause */);
+ clearAllCallbacks();
+}
+
+bool SMPHandler::disconnect(const bool disconnectDevice, const bool ioErrorCause) noexcept {
+ PERF3_TS_T0();
+ // Interrupt SM's L2CAP::connect(..) and L2CAP::read(..), avoiding prolonged hang
+ // and pull all underlying l2cap read operations!
+ l2cap.disconnect();
+
+ // Avoid disconnect re-entry -> potential deadlock
+ bool expConn = true; // C++11, exp as value since C++20
+ if( !is_connected.compare_exchange_strong(expConn, false) ) {
+ // not connected
+ DBG_PRINT("SMPHandler::disconnect: Not connected: disconnectDevice %d, ioErrorCause %d: GattHandler[%s], l2cap[%s]: %s",
+ disconnectDevice, ioErrorCause, getStateString().c_str(), l2cap.getStateString().c_str(), deviceString.c_str());
+ clearAllCallbacks();
+ return false;
+ }
+ // Lock to avoid other threads using instance while disconnecting
+ const std::lock_guard<std::recursive_mutex> lock(mtx_command); // RAII-style acquire and relinquish via destructor
+ DBG_PRINT("SMPHandler::disconnect: Start: disconnectDevice %d, ioErrorCause %d: GattHandler[%s], l2cap[%s]: %s",
+ disconnectDevice, ioErrorCause, getStateString().c_str(), l2cap.getStateString().c_str(), deviceString.c_str());
+ clearAllCallbacks();
+
+ PERF3_TS_TD("SMPHandler::disconnect.1");
+ {
+ std::unique_lock<std::mutex> lockReader(mtx_l2capReaderLifecycle); // RAII-style acquire and relinquish via destructor
+ has_ioerror = false;
+
+ const pthread_t tid_self = pthread_self();
+ const pthread_t tid_l2capReader = l2capReaderThreadId;
+ l2capReaderThreadId = 0;
+ const bool is_l2capReader = tid_l2capReader == tid_self;
+ DBG_PRINT("SMPHandler.disconnect: l2capReader[running %d, shallStop %d, isReader %d, tid %p)",
+ l2capReaderRunning.load(), l2capReaderShallStop.load(), is_l2capReader, (void*)tid_l2capReader);
+ if( l2capReaderRunning ) {
+ l2capReaderShallStop = true;
+ if( !is_l2capReader && 0 != tid_l2capReader ) {
+ int kerr;
+ if( 0 != ( kerr = pthread_kill(tid_l2capReader, SIGALRM) ) ) {
+ ERR_PRINT("SMPHandler::disconnect: pthread_kill %p FAILED: %d", (void*)tid_l2capReader, kerr);
+ }
+ }
+ // Ensure the reader thread has ended, no runaway-thread using *this instance after destruction
+ while( true == l2capReaderRunning ) {
+ cv_l2capReaderInit.wait(lockReader);
+ }
+ }
+ }
+ PERF3_TS_TD("SMPHandler::disconnect.2");
+
+ if( disconnectDevice ) {
+ std::shared_ptr<DBTDevice> device = getDeviceUnchecked();
+ if( nullptr != device ) {
+ // Cleanup device resources, proper connection state
+ // Intentionally giving the POWER_OFF reason for the device in case of ioErrorCause!
+ const HCIStatusCode reason = ioErrorCause ?
+ HCIStatusCode::REMOTE_DEVICE_TERMINATED_CONNECTION_POWER_OFF :
+ HCIStatusCode::REMOTE_USER_TERMINATED_CONNECTION;
+ device->disconnect(reason);
+ }
+ }
+
+ PERF3_TS_TD("SMPHandler::disconnect.X");
+ DBG_PRINT("SMPHandler::disconnect: End: %s", deviceString.c_str());
+ return true;
+}
+
+void SMPHandler::send(const SMPPDUMsg & msg) {
+ if( !validateConnected() ) {
+ throw jau::IllegalStateException("SMPHandler::send: Invalid IO State: req "+msg.toString()+" to "+deviceString, E_FILE_LINE);
+ }
+ if( msg.pdu.getSize() > mtu ) {
+ throw jau::IllegalArgumentException("clientMaxMTU "+std::to_string(msg.pdu.getSize())+" > usedMTU "+std::to_string(mtu)+
+ " to "+deviceString, E_FILE_LINE);
+ }
+
+ // Thread safe l2cap.write(..) operation..
+ const ssize_t res = l2cap.write(msg.pdu.get_ptr(), msg.pdu.getSize());
+ if( 0 > res ) {
+ IRQ_PRINT("SMPHandler::send: l2cap write error -> disconnect: %s to %s", msg.toString().c_str(), deviceString.c_str());
+ has_ioerror = true;
+ disconnect(true /* disconnectDevice */, true /* ioErrorCause */); // state -> Disconnected
+ throw BluetoothException("SMPHandler::send: l2cap write error: req "+msg.toString()+" to "+deviceString, E_FILE_LINE);
+ }
+ if( static_cast<size_t>(res) != msg.pdu.getSize() ) {
+ ERR_PRINT("SMPHandler::send: l2cap write count error, %zd != %zu: %s -> disconnect: %s",
+ res, msg.pdu.getSize(), msg.toString().c_str(), deviceString.c_str());
+ has_ioerror = true;
+ disconnect(true /* disconnectDevice */, true /* ioErrorCause */); // state -> Disconnected
+ throw BluetoothException("SMPHandler::send: l2cap write count error, "+std::to_string(res)+" != "+std::to_string(res)
+ +": "+msg.toString()+" -> disconnect: "+deviceString, E_FILE_LINE);
+ }
+}
+
+std::shared_ptr<const SMPPDUMsg> SMPHandler::sendWithReply(const SMPPDUMsg & msg, const int timeout) {
+ send( msg );
+
+ // Ringbuffer read is thread safe
+ std::shared_ptr<const SMPPDUMsg> res = smpPDURing.getBlocking(timeout);
+ if( nullptr == res ) {
+ errno = ETIMEDOUT;
+ IRQ_PRINT("SMPHandler::sendWithReply: nullptr result (timeout %d): req %s to %s", timeout, msg.toString().c_str(), deviceString.c_str());
+ has_ioerror = true;
+ disconnect(true /* disconnectDevice */, true /* ioErrorCause */);
+ throw BluetoothException("SMPHandler::sendWithReply: nullptr result (timeout "+std::to_string(timeout)+"): req "+msg.toString()+" to "+deviceString, E_FILE_LINE);
+ }
+ return res;
+}
+
+/**
+ * SMPSecurityReqCallback handling
+ */
+
+static SMPSecurityReqCallbackList::equal_comparator _changedSMPSecurityReqCallbackEqComp =
+ [](const SMPSecurityReqCallback& a, const SMPSecurityReqCallback& b) -> bool { return a == b; };
+
+
+void SMPHandler::addSMPSecurityReqCallback(const SMPSecurityReqCallback & l) {
+ smpSecurityReqCallbackList.push_back(l);
+}
+int SMPHandler::removeSMPSecurityReqCallback(const SMPSecurityReqCallback & l) {
+ return smpSecurityReqCallbackList.erase_matching(l, true /* all_matching */, _changedSMPSecurityReqCallbackEqComp);
+}
+
+void SMPHandler::clearAllCallbacks() noexcept {
+ smpSecurityReqCallbackList.clear();
+}
+