Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp125450ybd; Fri, 28 Jun 2019 16:02:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqz53lIoxT+tLnPySF5ZACS0F6o8LnFaQtkXYs8CPet0INkeIPArw7NeYXJeHD2X3k3tmNzi X-Received: by 2002:a17:90a:8d0d:: with SMTP id c13mr15381492pjo.137.1561762951788; Fri, 28 Jun 2019 16:02:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561762951; cv=none; d=google.com; s=arc-20160816; b=IWQU+rHPMpS6ODc5kRBEeE7wppbgrXmuTf7NucSVEWdmboQj42IEmKr1RmsRzTBOM4 eSSNXqU/I+QPjmUnUYpshund/CBN7YVFH6SJiGpVGQiU35Rw/55BcrnnDBu0whIUH4RI b+owVX0aXxXwR/pBwfkYANGvgZJGCWy7SYp5ahACO5Ho3tYeyHbmjvPR4tCB1VUGkbnP WDOZUrYN4g4U7itLuyjbcUQW3PkRP3qSxWRh6TBS5picaIycR+pUD+hTPUBOKGDy9WG4 GfOHnxRTK7V4IjV7xl2PbBn+bm3MHXh+cuj+qPCTwa/2HdAF+kbkVFZe2s39L3I2Vqh+ Flnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=m6RCqufOym9+acGOrFf5UZ7jDpFsbWZHrkXTKsZFWus=; b=DC3AUDh/nx/TEDAgFOCeGbrE59ENLMTa5/kQ7l5csSXRNR9M40A25+siKAALRTi2to 6oH1L2xWNv9GdYw8jOh1IWkPqe9763iKhWGeZ6AjOORD6rAoMYVd+x8+drpBwbhrN9jj 6Ijl7nyJxOF8O6bSgPhYNki9U4/NAbzlV/y70xfKkLDTR8GRHhsJWLg6F7tXIO/SagsW WPRHvJCrs7cey5KWliEKR4TWyEAcr0O2MbCQ1vHigNwbELzTPGHbIfVntUyv6MYAOArK 3D/8hHhLj/b70vJ1pRw6OjSSHgPlJia02joS/DhHE1obS2YXre5M4vWOIdsQZz6kJrPS woNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p5si3139127pls.163.2019.06.28.16.02.12; Fri, 28 Jun 2019 16:02:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726672AbfF1XBq (ORCPT + 99 others); Fri, 28 Jun 2019 19:01:46 -0400 Received: from mga06.intel.com ([134.134.136.31]:53753 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727022AbfF1XBp (ORCPT ); Fri, 28 Jun 2019 19:01:45 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Jun 2019 16:01:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,429,1557212400"; d="scan'208";a="314271653" Received: from ingas-nuc1.sea.intel.com ([10.252.196.161]) by orsmga004.jf.intel.com with ESMTP; 28 Jun 2019 16:01:44 -0700 From: Inga Stotland To: linux-bluetooth@vger.kernel.org Cc: brian.gix@intel.com, Inga Stotland Subject: [PATCH BlueZ 2/4 v3] mesh: Fix virtual address processing Date: Fri, 28 Jun 2019 16:01:40 -0700 Message-Id: <20190628230142.16367-3-inga.stotland@intel.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190628230142.16367-1-inga.stotland@intel.com> References: <20190628230142.16367-1-inga.stotland@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org This tightens up the accounting for locally stored virtual addresses. Alos, use meaningful variable names to identify components of a mesh virtual address. --- mesh/model.c | 173 +++++++++++++++++++++++---------------------------- mesh/model.h | 6 +- 2 files changed, 78 insertions(+), 101 deletions(-) diff --git a/mesh/model.c b/mesh/model.c index 9fd3aac6c..30932cff2 100644 --- a/mesh/model.c +++ b/mesh/model.c @@ -55,10 +55,10 @@ struct mesh_model { }; struct mesh_virtual { - uint32_t id; /*Identifier of internally stored addr, min val 0x10000 */ - uint16_t ota; + uint32_t id; /* Internal ID of a stored virtual addr, min val 0x10000 */ uint16_t ref_cnt; - uint8_t addr[16]; + uint16_t addr; /* 16-bit virtual address, used in messages */ + uint8_t label[16]; /* 128 bit label UUID */ }; /* These struct is used to pass lots of params to l_queue_foreach */ @@ -128,12 +128,12 @@ static bool find_virt_by_id(const void *a, const void *b) return virt->id == id; } -static bool find_virt_by_addr(const void *a, const void *b) +static bool find_virt_by_label(const void *a, const void *b) { const struct mesh_virtual *virt = a; - const uint8_t *addr = b; + const uint8_t *label = b; - return memcmp(virt->addr, addr, 16) == 0; + return memcmp(virt->label, label, 16) == 0; } static bool match_model_id(const void *a, const void *b) @@ -324,7 +324,7 @@ static void forward_model(void *a, void *b) * Map Virtual addresses to a usable namespace that * prevents us for forwarding a false positive * (multiple Virtual Addresses that map to the same - * u16 OTA addr) + * 16-bit virtual address identifier) */ fwd->has_dst = true; dst = virt->id; @@ -381,12 +381,12 @@ static int virt_packet_decrypt(struct mesh_net *net, const uint8_t *data, struct mesh_virtual *virt = v->data; int decrypt_idx; - if (virt->ota != dst) + if (virt->addr != dst) continue; decrypt_idx = appkey_packet_decrypt(net, szmict, seq, iv_idx, src, dst, - virt->addr, 16, key_id, + virt->label, 16, key_id, data, size, out); if (decrypt_idx >= 0) { @@ -430,7 +430,7 @@ static void cmplt(uint16_t remote, uint8_t status, static bool msg_send(struct mesh_node *node, bool credential, uint16_t src, uint32_t dst, uint8_t key_id, const uint8_t *key, - uint8_t *aad, uint8_t ttl, const void *msg, uint16_t msg_len) + uint8_t *label, uint8_t ttl, const void *msg, uint16_t msg_len) { bool ret = false; uint32_t iv_index, seq_num; @@ -452,7 +452,7 @@ static bool msg_send(struct mesh_node *node, bool credential, uint16_t src, iv_index = mesh_net_get_iv_index(net); seq_num = mesh_net_get_seq_num(net); - if (!mesh_crypto_payload_encrypt(aad, msg, out, msg_len, src, dst, + if (!mesh_crypto_payload_encrypt(label, msg, out, msg_len, src, dst, key_id, seq_num, iv_index, szmic, key)) { l_error("Failed to Encrypt Payload"); goto done; @@ -568,12 +568,37 @@ static int update_binding(struct mesh_node *node, uint16_t addr, uint32_t id, } +static struct mesh_virtual *add_virtual(const uint8_t *v) +{ + struct mesh_virtual *virt = l_queue_find(mesh_virtuals, + find_virt_by_label, v); + + if (virt) { + virt->ref_cnt++; + return virt; + } + + virt = l_new(struct mesh_virtual, 1); + + if (!mesh_crypto_virtual_addr(v, &virt->addr)) { + l_free(virt); + return NULL; + } + + memcpy(virt->label, v, 16); + virt->ref_cnt++; + virt->id = virt_id_next++; + l_queue_push_head(mesh_virtuals, virt); + + return virt; +} + static int set_pub(struct mesh_model *mod, const uint8_t *mod_addr, uint16_t idx, bool cred_flag, uint8_t ttl, uint8_t period, uint8_t retransmit, bool b_virt, uint16_t *dst) { - struct mesh_virtual *virt; + struct mesh_virtual *virt = NULL; uint16_t grp; if (dst) { @@ -583,35 +608,30 @@ static int set_pub(struct mesh_model *mod, const uint8_t *mod_addr, *dst = l_get_le16(mod_addr); } - if (b_virt && !mesh_crypto_virtual_addr(mod_addr, &grp)) - return MESH_STATUS_STORAGE_FAIL; + if (b_virt) { + virt = add_virtual(mod_addr); + if (!virt) + return MESH_STATUS_STORAGE_FAIL; + + } - /* If old publication was Virtual, remove it */ + /* If the old publication address is virtual, remove it from lists */ if (mod->pub && mod->pub->addr >= VIRTUAL_BASE) { - virt = l_queue_find(mod->virtuals, find_virt_by_id, + struct mesh_virtual *old_virt; + + old_virt = l_queue_find(mod->virtuals, find_virt_by_id, L_UINT_TO_PTR(mod->pub->addr)); - if (virt) { - l_queue_remove(mod->virtuals, virt); - unref_virt(virt); + if (old_virt) { + l_queue_remove(mod->virtuals, old_virt); + unref_virt(old_virt); } } mod->pub = l_new(struct mesh_model_pub, 1); if (b_virt) { - virt = l_queue_find(mesh_virtuals, find_virt_by_addr, mod_addr); - if (!virt) { - virt = l_new(struct mesh_virtual, 1); - virt->id = virt_id_next++; - virt->ota = grp; - memcpy(virt->addr, mod_addr, sizeof(virt->addr)); - l_queue_push_head(mesh_virtuals, virt); - } else { - grp = virt->ota; - } - - virt->ref_cnt++; l_queue_push_head(mod->virtuals, virt); + grp = virt->addr; mod->pub->addr = virt->id; } else { grp = l_get_le16(mod_addr); @@ -643,28 +663,15 @@ static int set_pub(struct mesh_model *mod, const uint8_t *mod_addr, static int add_sub(struct mesh_net *net, struct mesh_model *mod, const uint8_t *group, bool b_virt, uint16_t *dst) { - struct mesh_virtual *virt; + struct mesh_virtual *virt = NULL; uint16_t grp; if (b_virt) { - virt = l_queue_find(mesh_virtuals, find_virt_by_addr, group); - if (!virt) { - if (!mesh_crypto_virtual_addr(group, &grp)) - return MESH_STATUS_STORAGE_FAIL; - - virt = l_new(struct mesh_virtual, 1); - virt->id = virt_id_next++; - virt->ota = grp; - memcpy(virt->addr, group, sizeof(virt->addr)); - - if (!l_queue_push_head(mesh_virtuals, virt)) - return MESH_STATUS_STORAGE_FAIL; - } else { - grp = virt->ota; - } + virt = add_virtual(group); + if (!virt) + return MESH_STATUS_STORAGE_FAIL; - virt->ref_cnt++; - l_queue_push_head(mod->virtuals, virt); + grp = virt->addr; } else { grp = l_get_le16(group); } @@ -675,9 +682,16 @@ static int add_sub(struct mesh_net *net, struct mesh_model *mod, if (!mod->subs) mod->subs = l_queue_new(); - if (l_queue_find(mod->subs, simple_match, L_UINT_TO_PTR(grp))) - /* Group already exists */ + /* Check if this group already exists */ + if (l_queue_find(mod->subs, simple_match, L_UINT_TO_PTR(grp))) { + if (b_virt) + unref_virt(virt); + return MESH_STATUS_SUCCESS; + } + + if (b_virt) + l_queue_push_head(mod->virtuals, virt); l_queue_push_tail(mod->subs, L_UINT_TO_PTR(grp)); @@ -864,7 +878,7 @@ int mesh_model_publish(struct mesh_node *node, uint32_t mod_id, struct mesh_net *net = node_get_net(node); struct mesh_model *mod; uint32_t target; - uint8_t *aad = NULL; + uint8_t *label = NULL; uint16_t dst; uint8_t key_id; const uint8_t *key; @@ -896,18 +910,18 @@ int mesh_model_publish(struct mesh_node *node, uint32_t mod_id, target = mod->pub->addr; if (IS_UNASSIGNED(target)) - return false; + return MESH_ERROR_DOES_NOT_EXIST; if (target >= VIRTUAL_BASE) { - struct mesh_virtual *virt = l_queue_find(mesh_virtuals, - find_virt_by_id, - L_UINT_TO_PTR(target)); + struct mesh_virtual *virt; + virt = l_queue_find(mesh_virtuals, find_virt_by_id, + L_UINT_TO_PTR(target)); if (!virt) - return false; + return MESH_ERROR_NOT_FOUND; - aad = virt->addr; - dst = virt->ota; + label = virt->label; + dst = virt->addr; } else { dst = target; } @@ -924,7 +938,7 @@ int mesh_model_publish(struct mesh_node *node, uint32_t mod_id, l_debug("key_id %x", key_id); result = msg_send(node, mod->pub->credential != 0, src, - dst, key_id, key, aad, ttl, msg, msg_len); + dst, key_id, key, label, ttl, msg, msg_len); return result ? MESH_ERROR_NONE : MESH_ERROR_FAILED; @@ -1063,7 +1077,6 @@ struct mesh_model *mesh_model_vendor_new(uint8_t ele_idx, uint16_t vendor_id, /* Internal models only */ static void restore_model_state(struct mesh_model *mod) { - const struct mesh_model_ops *cbs; const struct l_queue_entry *b; @@ -1310,10 +1323,10 @@ int mesh_model_sub_del(struct mesh_node *node, uint16_t addr, uint32_t id, if (b_virt) { struct mesh_virtual *virt; - virt = l_queue_find(mod->virtuals, find_virt_by_addr, group); + virt = l_queue_find(mod->virtuals, find_virt_by_label, group); if (virt) { l_queue_remove(mod->virtuals, virt); - grp = virt->ota; + grp = virt->addr; unref_virt(virt); } else { if (!mesh_crypto_virtual_addr(group, &grp)) @@ -1505,39 +1518,6 @@ bool mesh_model_opcode_get(const uint8_t *buf, uint16_t size, return true; } -void mesh_model_add_virtual(struct mesh_node *node, const uint8_t *v) -{ - struct mesh_virtual *virt = l_queue_find(mesh_virtuals, - find_virt_by_addr, v); - - if (virt) { - virt->ref_cnt++; - return; - } - - virt = l_new(struct mesh_virtual, 1); - - if (!mesh_crypto_virtual_addr(v, &virt->ota)) { - l_free(virt); - return; /* Storage Failure */ - } - - memcpy(virt->addr, v, 16); - virt->ref_cnt++; - virt->id = virt_id_next++; - l_queue_push_head(mesh_virtuals, virt); -} - -void mesh_model_del_virtual(struct mesh_node *node, uint32_t va24) -{ - struct mesh_virtual *virt = l_queue_remove_if(mesh_virtuals, - find_virt_by_id, - L_UINT_TO_PTR(va24)); - - if (virt) - unref_virt(virt); -} - void model_build_config(void *model, void *msg_builder) { struct l_dbus_message_builder *builder = msg_builder; @@ -1588,4 +1568,5 @@ void mesh_model_init(void) void mesh_model_cleanup(void) { l_queue_destroy(mesh_virtuals, l_free); + mesh_virtuals = NULL; } diff --git a/mesh/model.h b/mesh/model.h index 6094eaf59..f0f97ee0b 100644 --- a/mesh/model.h +++ b/mesh/model.h @@ -24,7 +24,7 @@ struct mesh_model; #define MAX_BINDINGS 10 #define MAX_GRP_PER_MOD 10 -#define VIRTUAL_BASE 0x10000 +#define VIRTUAL_BASE 0x10000 #define MESH_MAX_ACCESS_PAYLOAD 380 @@ -124,14 +124,10 @@ bool mesh_model_rx(struct mesh_node *node, bool szmict, uint32_t seq0, uint32_t seq, uint32_t iv_index, uint8_t ttl, uint16_t src, uint16_t dst, uint8_t key_id, const uint8_t *data, uint16_t size); - void mesh_model_app_key_generate_new(struct mesh_node *node, uint16_t net_idx); void mesh_model_app_key_delete(struct mesh_node *node, struct l_queue *models, uint16_t idx); struct l_queue *mesh_model_get_appkeys(struct mesh_node *node); -void mesh_model_add_virtual(struct mesh_node *node, const uint8_t *v); -void mesh_model_del_virtual(struct mesh_node *node, uint32_t va24); -void mesh_model_list_virtual(struct mesh_node *node); uint16_t mesh_model_opcode_set(uint32_t opcode, uint8_t *buf); bool mesh_model_opcode_get(const uint8_t *buf, uint16_t size, uint32_t *opcode, uint16_t *n); -- 2.21.0