Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2264273rwi; Tue, 11 Oct 2022 06:54:29 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4nzs3mqyRmi4jWDXQWxQyphSCXZIOGMdiC7JqhcReLvFSWe08gakli/11xzydCpyRU36U6 X-Received: by 2002:a05:6402:440a:b0:459:e2eb:9023 with SMTP id y10-20020a056402440a00b00459e2eb9023mr22426620eda.287.1665496469607; Tue, 11 Oct 2022 06:54:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665496469; cv=none; d=google.com; s=arc-20160816; b=KXUbxilUa4TGnt0zbVK28naGazEA0341BBpFRzZF3uHW65dWbJDFn3arjes7a9gelL lvMOX8oba28ZENJQ1/BptgovngMOtQvd/uqU/R09/F1qeRglKCMYbQtSBfTWQ9eB9LfG Ji8wz6Z/eCXFYLJ+2RiUuwznniaBGDwPPaOpbrqGWtz4hDMIbkSNEfjwkKNz22r7OLvM 7fvnen3/cqignVfaMlzJ3gIFzxAds4y6JJFwpQvi2OXh7WeMwejQYp1tcBPuKQ57HmjV dlgRlVtSH+IrND4ptWDwNHN07YkuSmWAtLvBER0r7iYseEU3GxWoonWLzXEGgaaakEv7 4bnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Vii5in6Qu8sePEoC0NWPzcIfVl1q0EITKHJMYpX9Ft0=; b=LdqRDTtztbAmogZxWet2ZWkOQUpyFNNBZzxv4tU4fRfY9mRRzuMgi7/iQLtRKUvBH6 keYPTbWv33AeVDssPK8g/s19smqvLNdriLAsxa9Cv40nrngBZQZfpqSizIA3h81qoIlk 7zyza2z8ctJh0yrkusoMEwRwNcbyKhwMzqmM20aBpLumoZDvwUVMvhDIpCwNeOysuqTI m+mYJJk/+hmc+uAcuvaZ7twImiivz258l42qNX9sNIv/iE4js6EiXjI4UBKualwmy+G5 C9BAlsnWZrSMl7UTEfiS0ZeEzKvwBnZiGJi4xpuFtYoaLc8A3Qlu3C4UZKZPAMDo72mF xcvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dr6-20020a170907720600b00780f0b45416si11841092ejc.622.2022.10.11.06.53.27; Tue, 11 Oct 2022 06:54:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229564AbiJKNoB (ORCPT + 99 others); Tue, 11 Oct 2022 09:44:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229547AbiJKNoA (ORCPT ); Tue, 11 Oct 2022 09:44:00 -0400 Received: from voyager.loytec.com (voyager.loytec.com [88.198.4.4]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 103C26BCFA for ; Tue, 11 Oct 2022 06:43:58 -0700 (PDT) Received: from 212-17-98-152.static.upcbusiness.at ([212.17.98.152] helo=lexx.office.loytec.com) by voyager.loytec.com with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1oiFY3-0002Ik-4V for linux-bluetooth@vger.kernel.org; Tue, 11 Oct 2022 15:43:55 +0200 Received: from loytec-dev-vm.delta.corp ([10.101.25.21]) by lexx.office.loytec.com (8.15.2/8.15.2/Some OS 1.2.3-4.5) with ESMTP id 29BDhqLq2086133; Tue, 11 Oct 2022 15:43:52 +0200 From: Isak Westin To: linux-bluetooth@vger.kernel.org Cc: Isak Westin Subject: [PATCH BlueZ v2] mesh: Keep canceled SAR data for at least 10 sec Date: Tue, 11 Oct 2022 15:43:15 +0200 Message-Id: <20221011134315.1836-1-isak.westin@loytec.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 212.17.98.152 X-SA-Exim-Mail-From: isak.westin@loytec.com X-SA-Exim-Scanned: No (on voyager.loytec.com); SAEximRunCond expanded to false X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org When a SAR transmission has been completed or canceled, the recipent should store the block authentication values for at least 10 seconds and ignore new segments with the same values during this period. See MshPRFv1.0.1 section 3.5.3.4. --- mesh/net.c | 31 ++++++++++++++++++++++++++----- 1 file changed, 26 insertions(+), 5 deletions(-) diff --git a/mesh/net.c b/mesh/net.c index 3f42d962c..cbac0e02c 100644 --- a/mesh/net.c +++ b/mesh/net.c @@ -46,6 +46,7 @@ #define SEG_TO 2 #define MSG_TO 60 +#define SAR_DEL 10 #define DEFAULT_TRANSMIT_COUNT 1 #define DEFAULT_TRANSMIT_INTERVAL 100 @@ -166,6 +167,7 @@ struct mesh_sar { bool segmented; bool frnd; bool frnd_cred; + bool delete; uint8_t ttl; uint8_t last_seg; uint8_t key_aid; @@ -1492,14 +1494,27 @@ static void inseg_to(struct l_timeout *seg_timeout, void *user_data) static void inmsg_to(struct l_timeout *msg_timeout, void *user_data) { struct mesh_net *net = user_data; - struct mesh_sar *sar = l_queue_remove_if(net->sar_in, + struct mesh_sar *sar = l_queue_find(net->sar_in, match_msg_timeout, msg_timeout); - l_timeout_remove(msg_timeout); - if (!sar) + if (!sar) { + l_timeout_remove(msg_timeout); return; + } - sar->msg_timeout = NULL; + if (!sar->delete) { + /* + * Incomplete timer expired, cancel SAR and start + * delete timer + */ + l_timeout_remove(sar->seg_timeout); + sar->seg_timeout = NULL; + sar->delete = true; + l_timeout_modify(sar->msg_timeout, SAR_DEL); + return; + } + + l_queue_remove(net->sar_in, sar); mesh_sar_free(sar); } @@ -1963,7 +1978,9 @@ static bool seg_rxed(struct mesh_net *net, bool frnd, uint32_t iv_index, /* Re-Send ACK for full msg */ send_net_ack(net, sar_in, expected); return true; - } + } else if (sar_in->delete) + /* Ignore canceled */ + return false; } else { uint16_t len = MAX_SEG_TO_LEN(segN); @@ -2013,6 +2030,10 @@ static bool seg_rxed(struct mesh_net *net, bool frnd, uint32_t iv_index, /* Kill Inter-Seg timeout */ l_timeout_remove(sar_in->seg_timeout); sar_in->seg_timeout = NULL; + + /* Start delete timer */ + sar_in->delete = true; + l_timeout_modify(sar_in->msg_timeout, SAR_DEL); return true; } -- 2.20.1