1 /******************************************************************************
3 * Copyright (C) 2009-2012 Broadcom Corporation
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
17 ******************************************************************************/
19 /************************************************************************************
21 * Filename: btif_pan.c
23 * Description: PAN Profile Bluetooth Interface
26 ***********************************************************************************/
27 #include <hardware/bluetooth.h>
28 #include <hardware/bt_pan.h>
33 #include <sys/select.h>
35 #include <sys/ioctl.h>
36 #include <netinet/in.h>
42 #include <sys/socket.h>
45 #include <linux/sockios.h>
46 #include <sys/prctl.h>
47 #include <linux/if_tun.h>
48 #include <linux/if_ether.h>
50 #define LOG_TAG "bt_btif_pan"
51 #include "btif_common.h"
52 #include "btif_util.h"
54 #include "btcore/include/bdaddr.h"
55 #include "device/include/controller.h"
58 #include "bta_pan_api.h"
59 #include "btif_sock_thread.h"
60 #include "btif_sock_util.h"
61 #include "btif_pan_internal.h"
63 #include "osi/include/osi.h"
64 #include "osi/include/log.h"
66 #define FORWARD_IGNORE 1
67 #define FORWARD_SUCCESS 0
68 #define FORWARD_FAILURE (-1)
69 #define FORWARD_CONGEST (-2)
70 //#define PANU_DISABLED TRUE
72 #if (PAN_NAP_DISABLED == TRUE) && (PANU_DISABLED == TRUE)
73 #define BTPAN_LOCAL_ROLE BTPAN_ROLE_NONE
74 #elif PAN_NAP_DISABLED == TRUE
75 #define BTPAN_LOCAL_ROLE BTPAN_ROLE_PANU
76 #elif PANU_DISABLED == TRUE
77 #define BTPAN_LOCAL_ROLE BTPAN_ROLE_PANNAP
79 #define BTPAN_LOCAL_ROLE (BTPAN_ROLE_PANU | BTPAN_ROLE_PANNAP)
82 #define asrt(s) if (!(s)) BTIF_TRACE_ERROR("btif_pan: ## %s assert %s failed at line:%d ##",__FUNCTION__, #s, __LINE__)
84 #define MIN(x, y) (((x) < (y)) ? (x) : (y))
88 static bool jni_initialized;
89 static bool stack_initialized;
91 static bt_status_t btpan_jni_init(const btpan_callbacks_t* callbacks);
92 static void btpan_jni_cleanup();
93 static bt_status_t btpan_connect(const bt_bdaddr_t *bd_addr, int local_role, int remote_role);
94 static bt_status_t btpan_disconnect(const bt_bdaddr_t *bd_addr);
95 static bt_status_t btpan_enable(int local_role);
96 static int btpan_get_local_role(void);
98 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id);
99 static void btpan_cleanup_conn(btpan_conn_t* conn);
100 static void bta_pan_callback(tBTA_PAN_EVT event, tBTA_PAN *p_data);
101 static void btu_exec_tap_fd_read(void *p_param);
103 static btpan_interface_t pan_if = {
107 btpan_get_local_role,
113 btpan_interface_t *btif_pan_get_interface()
118 /*******************************************************************************
120 ** Function btif_pan_init
122 ** Description initializes the pan interface
124 ** Returns bt_status_t
126 *******************************************************************************/
129 BTIF_TRACE_DEBUG("jni_initialized = %d, btpan_cb.enabled:%d", jni_initialized, btpan_cb.enabled);
130 stack_initialized = true;
132 if (jni_initialized && !btpan_cb.enabled)
134 BTIF_TRACE_DEBUG("Enabling PAN....");
135 memset(&btpan_cb, 0, sizeof(btpan_cb));
136 btpan_cb.tap_fd = INVALID_FD;
138 for (int i = 0; i < MAX_PAN_CONNS; i++)
139 btpan_cleanup_conn(&btpan_cb.conns[i]);
140 BTA_PanEnable(bta_pan_callback);
141 btpan_cb.enabled = 1;
142 btpan_enable(BTPAN_LOCAL_ROLE);
146 static void pan_disable()
148 if (btpan_cb.enabled)
150 btpan_cb.enabled = 0;
152 if (btpan_cb.tap_fd != INVALID_FD)
154 btpan_tap_close(btpan_cb.tap_fd);
155 btpan_cb.tap_fd = INVALID_FD;
160 void btif_pan_cleanup()
162 if (!stack_initialized)
165 // Bluetooth is shuting down, invalidate all BTA PAN handles
166 for (int i = 0; i < MAX_PAN_CONNS; i++)
167 btpan_cleanup_conn(&btpan_cb.conns[i]);
170 stack_initialized = false;
173 static btpan_callbacks_t callback;
174 static bt_status_t btpan_jni_init(const btpan_callbacks_t* callbacks)
176 BTIF_TRACE_DEBUG("stack_initialized = %d, btpan_cb.enabled:%d", stack_initialized, btpan_cb.enabled);
177 callback = *callbacks;
178 jni_initialized = TRUE;
179 if (stack_initialized && !btpan_cb.enabled)
181 return BT_STATUS_SUCCESS;
184 static void btpan_jni_cleanup()
187 jni_initialized = false;
190 static inline int bta_role_to_btpan(int bta_pan_role)
193 BTIF_TRACE_DEBUG("bta_pan_role:0x%x", bta_pan_role);
194 if (bta_pan_role & PAN_ROLE_NAP_SERVER)
195 btpan_role |= BTPAN_ROLE_PANNAP;
196 if (bta_pan_role & PAN_ROLE_CLIENT)
197 btpan_role |= BTPAN_ROLE_PANU;
201 static inline int btpan_role_to_bta(int btpan_role)
203 int bta_pan_role = PAN_ROLE_INACTIVE;
204 BTIF_TRACE_DEBUG("btpan_role:0x%x", btpan_role);
205 if (btpan_role & BTPAN_ROLE_PANNAP)
206 bta_pan_role |= PAN_ROLE_NAP_SERVER;
207 if (btpan_role & BTPAN_ROLE_PANU)
208 bta_pan_role |= PAN_ROLE_CLIENT;
212 static volatile int btpan_dev_local_role;
213 static tBTA_PAN_ROLE_INFO bta_panu_info = {PANU_SERVICE_NAME, 0, PAN_SECURITY};
214 static tBTA_PAN_ROLE_INFO bta_pan_nap_info = {PAN_NAP_SERVICE_NAME, 1, PAN_SECURITY};
216 static bt_status_t btpan_enable(int local_role)
218 #if BTA_PAN_INCLUDED == TRUE
219 BTIF_TRACE_DEBUG("%s - local_role: %d", __func__, local_role);
220 int bta_pan_role = btpan_role_to_bta(local_role);
221 BTA_PanSetRole(bta_pan_role, &bta_panu_info, NULL, &bta_pan_nap_info);
222 btpan_dev_local_role = local_role;
223 return BT_STATUS_SUCCESS;
225 return BT_STATUS_FAIL;
229 static int btpan_get_local_role()
231 BTIF_TRACE_DEBUG("btpan_dev_local_role:%d", btpan_dev_local_role);
232 return btpan_dev_local_role;
235 static bt_status_t btpan_connect(const bt_bdaddr_t *bd_addr, int local_role, int remote_role)
237 BTIF_TRACE_DEBUG("local_role:%d, remote_role:%d", local_role, remote_role);
238 int bta_local_role = btpan_role_to_bta(local_role);
239 int bta_remote_role = btpan_role_to_bta(remote_role);
240 btpan_new_conn(-1, bd_addr->address, bta_local_role, bta_remote_role);
241 BTA_PanOpen((UINT8*)bd_addr->address, bta_local_role, bta_remote_role);
242 return BT_STATUS_SUCCESS;
245 static void btif_in_pan_generic_evt(UINT16 event, char *p_param)
247 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
249 case BTIF_PAN_CB_DISCONNECTING:
251 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
252 btpan_conn_t* conn = btpan_find_conn_addr(bd_addr->address);
253 int btpan_conn_local_role;
254 int btpan_remote_role;
257 btpan_conn_local_role = bta_role_to_btpan(conn->local_role);
258 btpan_remote_role = bta_role_to_btpan(conn->remote_role);
259 callback.connection_state_cb(BTPAN_STATE_DISCONNECTING, BT_STATUS_SUCCESS,
260 (const bt_bdaddr_t*)conn->peer, btpan_conn_local_role, btpan_remote_role);
265 BTIF_TRACE_WARNING("%s : Unknown event 0x%x", __FUNCTION__, event);
271 static bt_status_t btpan_disconnect(const bt_bdaddr_t *bd_addr)
273 btpan_conn_t* conn = btpan_find_conn_addr(bd_addr->address);
274 if (conn && conn->handle >= 0)
276 BTA_PanClose(conn->handle);
277 /* Inform the application that the disconnect has been initiated successfully */
278 btif_transfer_context(btif_in_pan_generic_evt, BTIF_PAN_CB_DISCONNECTING,
279 (char *)bd_addr, sizeof(bt_bdaddr_t), NULL);
280 return BT_STATUS_SUCCESS;
282 return BT_STATUS_FAIL;
285 static int pan_pth = -1;
286 void create_tap_read_thread(int tap_fd)
289 pan_pth = btsock_thread_create(btpan_tap_fd_signaled, NULL);
291 btsock_thread_add_fd(pan_pth, tap_fd, 0, SOCK_THREAD_FD_RD, 0);
294 void destroy_tap_read_thread(void)
298 btsock_thread_exit(pan_pth);
303 static int tap_if_up(const char *devname, const bt_bdaddr_t *addr)
308 sk = socket(AF_INET, SOCK_DGRAM, 0);
313 memset(&ifr, 0, sizeof(ifr));
314 strncpy(ifr.ifr_name, devname, IFNAMSIZ - 1);
315 err = ioctl(sk, SIOCGIFHWADDR, &ifr);
318 BTIF_TRACE_ERROR("Could not get network hardware for interface:%s, errno:%s", devname, strerror(errno));
323 strncpy(ifr.ifr_name, devname, IFNAMSIZ - 1);
324 memcpy(ifr.ifr_hwaddr.sa_data, addr->address, 6);
326 /* The IEEE has specified that the most significant bit of the most significant byte is used to
327 * determine a multicast address. If its a 1, that means multicast, 0 means unicast.
328 * Kernel returns an error if we try to set a multicast address for the tun-tap ethernet interface.
329 * Mask this bit to avoid any issue with auto generated address.
331 if (ifr.ifr_hwaddr.sa_data[0] & 0x01) {
332 BTIF_TRACE_WARNING("Not a unicast MAC address, force multicast bit flipping");
333 ifr.ifr_hwaddr.sa_data[0] &= ~0x01;
336 err = ioctl(sk, SIOCSIFHWADDR, (caddr_t)&ifr);
339 BTIF_TRACE_ERROR("Could not set bt address for interface:%s, errno:%s", devname, strerror(errno));
345 memset(&ifr, 0, sizeof(ifr));
346 strncpy(ifr.ifr_name, devname, IF_NAMESIZE - 1);
348 ifr.ifr_flags |= IFF_UP;
349 ifr.ifr_flags |= IFF_MULTICAST;
351 err = ioctl(sk, SIOCSIFFLAGS, (caddr_t) &ifr);
355 BTIF_TRACE_ERROR("Could not bring up network interface:%s, errno:%d", devname, errno);
360 BTIF_TRACE_DEBUG("network interface: %s is up", devname);
364 static int tap_if_down(const char *devname)
369 sk = socket(AF_INET, SOCK_DGRAM, 0);
373 memset(&ifr, 0, sizeof(ifr));
374 strncpy(ifr.ifr_name, devname, IF_NAMESIZE - 1);
376 ifr.ifr_flags &= ~IFF_UP;
378 ioctl(sk, SIOCSIFFLAGS, (caddr_t) &ifr);
385 void btpan_set_flow_control(BOOLEAN enable) {
386 if (btpan_cb.tap_fd == -1)
389 btpan_cb.flow = enable;
391 btsock_thread_add_fd(pan_pth, btpan_cb.tap_fd, 0, SOCK_THREAD_FD_RD, 0);
392 bta_dmexecutecallback(btu_exec_tap_fd_read, (void *)btpan_cb.tap_fd);
400 const char *clonedev = "/dev/tun";
402 /* open the clone device */
404 if ((fd = open(clonedev, O_RDWR)) < 0)
406 BTIF_TRACE_DEBUG("could not open %s, err:%d", clonedev, errno);
410 memset(&ifr, 0, sizeof(ifr));
411 ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
413 strncpy(ifr.ifr_name, TAP_IF_NAME, IFNAMSIZ);
415 /* try to create the device */
416 if ((err = ioctl(fd, TUNSETIFF, (void *) &ifr)) < 0)
418 BTIF_TRACE_DEBUG("ioctl error:%d, errno:%s", err, strerror(errno));
422 if (tap_if_up(TAP_IF_NAME, controller_get_interface()->get_address()) == 0)
424 int flags = fcntl(fd, F_GETFL, 0);
425 fcntl(fd, F_SETFL, flags | O_NONBLOCK);
428 BTIF_TRACE_ERROR("can not bring up tap interface:%s", TAP_IF_NAME);
433 int btpan_tap_send(int tap_fd, const BD_ADDR src, const BD_ADDR dst, UINT16 proto, const char* buf,
434 UINT16 len, BOOLEAN ext, BOOLEAN forward)
438 if (tap_fd != INVALID_FD)
441 memcpy(ð_hdr.h_dest, dst, ETH_ADDR_LEN);
442 memcpy(ð_hdr.h_src, src, ETH_ADDR_LEN);
443 eth_hdr.h_proto = htons(proto);
444 char packet[TAP_MAX_PKT_WRITE_LEN + sizeof(tETH_HDR)];
445 memcpy(packet, ð_hdr, sizeof(tETH_HDR));
446 if (len > TAP_MAX_PKT_WRITE_LEN)
448 LOG_ERROR("btpan_tap_send eth packet size:%d is exceeded limit!", len);
451 memcpy(packet + sizeof(tETH_HDR), buf, len);
453 /* Send data to network interface */
454 int ret = write(tap_fd, packet, len + sizeof(tETH_HDR));
455 BTIF_TRACE_DEBUG("ret:%d", ret);
462 int btpan_tap_close(int fd)
464 if (tap_if_down(TAP_IF_NAME) == 0)
467 btsock_thread_wakeup(pan_pth);
471 btpan_conn_t * btpan_find_conn_handle(UINT16 handle)
473 for (int i = 0; i < MAX_PAN_CONNS; i++)
475 if (btpan_cb.conns[i].handle == handle)
476 return &btpan_cb.conns[i];
481 btpan_conn_t* btpan_find_conn_addr(const BD_ADDR addr)
483 for (int i = 0; i < MAX_PAN_CONNS; i++)
485 if (memcmp(btpan_cb.conns[i].peer, addr, sizeof(BD_ADDR)) == 0)
486 return &btpan_cb.conns[i];
491 static void btpan_cleanup_conn(btpan_conn_t* conn)
497 memset(&conn->peer, 0, sizeof(conn->peer));
498 memset(&conn->eth_addr, 0, sizeof(conn->eth_addr));
499 conn->local_role = conn->remote_role = 0;
503 btpan_conn_t* btpan_new_conn(int handle, const BD_ADDR addr, int local_role, int remote_role)
505 for (int i = 0; i < MAX_PAN_CONNS; i++)
507 BTIF_TRACE_DEBUG("conns[%d]:%d", i, btpan_cb.conns[i].handle);
508 if (btpan_cb.conns[i].handle == -1)
510 BTIF_TRACE_DEBUG("handle:%d, local_role:%d, remote_role:%d", handle, local_role, remote_role);
512 btpan_cb.conns[i].handle = handle;
513 bdcpy(btpan_cb.conns[i].peer, addr);
514 btpan_cb.conns[i].local_role = local_role;
515 btpan_cb.conns[i].remote_role = remote_role;
516 return &btpan_cb.conns[i];
519 BTIF_TRACE_DEBUG("MAX_PAN_CONNS:%d exceeded, return NULL as failed", MAX_PAN_CONNS);
523 void btpan_close_handle(btpan_conn_t *p)
525 BTIF_TRACE_DEBUG("btpan_close_handle : close handle %d", p->handle);
529 memset(&p->peer, 0, 6);
532 static inline bool should_forward(tETH_HDR* hdr)
534 uint16_t proto = ntohs(hdr->h_proto);
535 if (proto == ETH_P_IP || proto == ETH_P_ARP || proto == ETH_P_IPV6)
537 BTIF_TRACE_DEBUG("unknown proto:%x", proto);
541 static int forward_bnep(tETH_HDR* eth_hdr, BT_HDR *hdr) {
542 int broadcast = eth_hdr->h_dest[0] & 1;
544 // Find the right connection to send this frame over.
545 for (int i = 0; i < MAX_PAN_CONNS; i++)
547 UINT16 handle = btpan_cb.conns[i].handle;
548 if (handle != (UINT16)-1 &&
549 (broadcast || memcmp(btpan_cb.conns[i].eth_addr, eth_hdr->h_dest, sizeof(BD_ADDR)) == 0
550 || memcmp(btpan_cb.conns[i].peer, eth_hdr->h_dest, sizeof(BD_ADDR)) == 0)) {
551 int result = PAN_WriteBuf(handle, eth_hdr->h_dest, eth_hdr->h_src, ntohs(eth_hdr->h_proto), hdr, 0);
553 case PAN_Q_SIZE_EXCEEDED:
554 return FORWARD_CONGEST;
556 return FORWARD_SUCCESS;
558 return FORWARD_FAILURE;
563 return FORWARD_IGNORE;
566 static void bta_pan_callback_transfer(UINT16 event, char *p_param)
568 tBTA_PAN *p_data = (tBTA_PAN *)p_param;
572 case BTA_PAN_ENABLE_EVT:
573 BTIF_TRACE_DEBUG("BTA_PAN_ENABLE_EVT");
575 case BTA_PAN_SET_ROLE_EVT:
577 int btpan_role = bta_role_to_btpan(p_data->set_role.role);
578 bt_status_t status = p_data->set_role.status == BTA_PAN_SUCCESS ? BT_STATUS_SUCCESS : BT_STATUS_FAIL;
579 btpan_control_state_t state = btpan_role == 0 ? BTPAN_STATE_DISABLED : BTPAN_STATE_ENABLED;
580 callback.control_state_cb(state, btpan_role, status, TAP_IF_NAME);
583 case BTA_PAN_OPENING_EVT:
587 bdaddr_to_string((bt_bdaddr_t *)p_data->opening.bd_addr, bds, sizeof(bds));
588 BTIF_TRACE_DEBUG("BTA_PAN_OPENING_EVT handle %d, addr: %s", p_data->opening.handle, bds);
589 conn = btpan_find_conn_addr(p_data->opening.bd_addr);
594 conn->handle = p_data->opening.handle;
595 int btpan_conn_local_role = bta_role_to_btpan(conn->local_role);
596 int btpan_remote_role = bta_role_to_btpan(conn->remote_role);
597 callback.connection_state_cb(BTPAN_STATE_CONNECTING, BT_STATUS_SUCCESS,
598 (const bt_bdaddr_t*)p_data->opening.bd_addr, btpan_conn_local_role, btpan_remote_role);
601 BTIF_TRACE_ERROR("connection not found");
604 case BTA_PAN_OPEN_EVT:
606 btpan_connection_state_t state;
608 btpan_conn_t *conn = btpan_find_conn_handle(p_data->open.handle);
610 LOG_VERBOSE("%s pan connection open status: %d", __func__, p_data->open.status);
611 if (p_data->open.status == BTA_PAN_SUCCESS)
613 state = BTPAN_STATE_CONNECTED;
614 status = BT_STATUS_SUCCESS;
618 state = BTPAN_STATE_DISCONNECTED;
619 status = BT_STATUS_FAIL;
620 btpan_cleanup_conn(conn);
622 /* debug("BTA_PAN_OPEN_EVT handle:%d, conn:%p", p_data->open.handle, conn); */
623 /* debug("conn bta local_role:%d, bta remote role:%d", conn->local_role, conn->remote_role); */
624 int btpan_conn_local_role = bta_role_to_btpan(p_data->open.local_role);
625 int btpan_remote_role = bta_role_to_btpan(p_data->open.peer_role);
626 callback.connection_state_cb(state, status, (const bt_bdaddr_t*)p_data->open.bd_addr,
627 btpan_conn_local_role, btpan_remote_role);
630 case BTA_PAN_CLOSE_EVT:
632 btpan_conn_t* conn = btpan_find_conn_handle(p_data->close.handle);
634 LOG_INFO("%s: event = BTA_PAN_CLOSE_EVT handle %d", __FUNCTION__, p_data->close.handle);
636 if (conn && conn->handle >= 0)
638 int btpan_conn_local_role = bta_role_to_btpan(conn->local_role);
639 int btpan_remote_role = bta_role_to_btpan(conn->remote_role);
640 callback.connection_state_cb(BTPAN_STATE_DISCONNECTED, 0, (const bt_bdaddr_t*)conn->peer,
641 btpan_conn_local_role, btpan_remote_role);
642 btpan_cleanup_conn(conn);
645 BTIF_TRACE_ERROR("pan handle not found (%d)", p_data->close.handle);
649 BTIF_TRACE_WARNING("Unknown pan event %d", event);
654 static void bta_pan_callback(tBTA_PAN_EVT event, tBTA_PAN *p_data)
656 btif_transfer_context(bta_pan_callback_transfer, event, (char*)p_data, sizeof(tBTA_PAN), NULL);
659 #define IS_EXCEPTION(e) ((e) & (POLLHUP | POLLRDHUP | POLLERR | POLLNVAL))
660 static void btu_exec_tap_fd_read(void *p_param) {
662 int fd = (int)p_param;
664 if (fd == INVALID_FD || fd != btpan_cb.tap_fd)
667 // Don't occupy BTU context too long, avoid GKI buffer overruns and
668 // give other profiles a chance to run by limiting the amount of memory
669 // PAN can use from the shared pool buffer.
670 for (int i = 0; i < PAN_POOL_MAX && btif_is_enabled() && btpan_cb.flow; i++) {
671 BT_HDR *buffer = (BT_HDR *)GKI_getpoolbuf(PAN_POOL_ID);
673 BTIF_TRACE_WARNING("%s unable to allocate buffer for packet.", __func__);
676 buffer->offset = PAN_MINIMUM_OFFSET;
677 buffer->len = GKI_get_buf_size(buffer) - sizeof(BT_HDR) - buffer->offset;
679 UINT8 *packet = (UINT8 *)buffer + sizeof(BT_HDR) + buffer->offset;
681 // If we don't have an undelivered packet left over, pull one from the TAP driver.
682 // We save it in the congest_packet right away in case we can't deliver it in this
684 if (!btpan_cb.congest_packet_size) {
685 ssize_t ret = read(fd, btpan_cb.congest_packet, sizeof(btpan_cb.congest_packet));
688 BTIF_TRACE_ERROR("%s unable to read from driver: %s", __func__, strerror(errno));
690 //add fd back to monitor thread to try it again later
691 btsock_thread_add_fd(pan_pth, fd, 0, SOCK_THREAD_FD_RD, 0);
694 BTIF_TRACE_WARNING("%s end of file reached.", __func__);
696 //add fd back to monitor thread to process the exception
697 btsock_thread_add_fd(pan_pth, fd, 0, SOCK_THREAD_FD_RD, 0);
700 btpan_cb.congest_packet_size = ret;
705 memcpy(packet, btpan_cb.congest_packet, MIN(btpan_cb.congest_packet_size, buffer->len));
706 buffer->len = MIN(btpan_cb.congest_packet_size, buffer->len);
708 if (buffer->len > sizeof(tETH_HDR) && should_forward((tETH_HDR *)packet)) {
709 // Extract the ethernet header from the buffer since the PAN_WriteBuf inside
710 // forward_bnep can't handle two pointers that point inside the same GKI buffer.
712 memcpy(&hdr, packet, sizeof(tETH_HDR));
714 // Skip the ethernet header.
715 buffer->len -= sizeof(tETH_HDR);
716 buffer->offset += sizeof(tETH_HDR);
717 if (forward_bnep(&hdr, buffer) != FORWARD_CONGEST)
718 btpan_cb.congest_packet_size = 0;
720 BTIF_TRACE_WARNING("%s dropping packet of length %d", __func__, buffer->len);
721 btpan_cb.congest_packet_size = 0;
725 // Bail out of the loop if reading from the TAP fd would block.
729 if (poll(&ufd, 1, 0) <= 0 || IS_EXCEPTION(ufd.revents))
732 //add fd back to monitor thread
733 btsock_thread_add_fd(pan_pth, fd, 0, SOCK_THREAD_FD_RD, 0);
736 static void btif_pan_close_all_conns() {
737 if (!stack_initialized)
740 for (int i = 0; i < MAX_PAN_CONNS; ++i)
742 if (btpan_cb.conns[i].handle != -1)
743 BTA_PanClose(btpan_cb.conns[i].handle);
747 static void btpan_tap_fd_signaled(int fd, int type, int flags, uint32_t user_id) {
748 assert(btpan_cb.tap_fd == INVALID_FD || btpan_cb.tap_fd == fd);
750 if (btpan_cb.tap_fd != fd) {
751 BTIF_TRACE_WARNING("%s Signaled on mismatched fds exp:%d act:%d\n",
752 __func__, btpan_cb.tap_fd, fd);
756 if (flags & SOCK_THREAD_FD_EXCEPTION) {
757 btpan_cb.tap_fd = INVALID_FD;
759 btif_pan_close_all_conns();
760 } else if (flags & SOCK_THREAD_FD_RD)
761 bta_dmexecutecallback(btu_exec_tap_fd_read, (void *)fd);