Bluetooth: validate BLE connection interval updates [Linux 4.9.187]

This Linux kernel change "Bluetooth: validate BLE connection interval updates" is included in the Linux 4.9.187 release. This change is authored by csonsino <csonsino [at]> on Wed Jun 12 15:00:52 2019 -0600. The commit for this change in Linux stable tree is 427d80d (patch) which is from upstream commit c49a868. The same Linux upstream change may have been applied to various maintained Linux releases and you can find all Linux releases containing changes from upstream c49a868.

Bluetooth: validate BLE connection interval updates

[ Upstream commit c49a8682fc5d298d44e8d911f4fa14690ea9485e ]

Problem: The Linux Bluetooth stack yields complete control over the BLE
connection interval to the remote device.

The Linux Bluetooth stack provides access to the BLE connection interval
min and max values through /sys/kernel/debug/bluetooth/hci0/
conn_min_interval and /sys/kernel/debug/bluetooth/hci0/conn_max_interval.
These values are used for initial BLE connections, but the remote device
has the ability to request a connection parameter update. In the event
that the remote side requests to change the connection interval, the Linux
kernel currently only validates that the desired value is within the
acceptable range in the Bluetooth specification (6 - 3200, corresponding to
7.5ms - 4000ms). There is currently no validation that the desired value
requested by the remote device is within the min/max limits specified in
the conn_min_interval/conn_max_interval configurations. This essentially
leads to Linux yielding complete control over the connection interval to
the remote device.

The proposed patch adds a verification step to the connection parameter
update mechanism, ensuring that the desired value is within the min/max
bounds of the current connection. If the desired value is outside of the
current connection min/max values, then the connection parameter update
request is rejected and the negative response is returned to the remote
device. Recall that the initial connection is established using the local
conn_min_interval/conn_max_interval values, so this allows the Linux
administrator to retain control over the BLE connection interval.

The one downside that I see is that the current default Linux values for
conn_min_interval and conn_max_interval typically correspond to 30ms and
50ms respectively. If this change were accepted, then it is feasible that
some devices would no longer be able to negotiate to their desired
connection interval values. This might be remedied by setting the default
Linux conn_min_interval and conn_max_interval values to the widest
supported range (6 - 3200 / 7.5ms - 4000ms). This could lead to the same
behavior as the current implementation, where the remote device could
request to change the connection interval value to any value that is
permitted by the Bluetooth specification, and Linux would accept the
desired value.

Signed-off-by: Carey Sonsino <>
Signed-off-by: Marcel Holtmann <>
Signed-off-by: Sasha Levin <>

There are 14 lines of Linux source code added/deleted in this change. Code changes to Linux kernel are as follows.

 net/bluetooth/hci_event.c  | 5 +++++
 net/bluetooth/l2cap_core.c | 9 ++++++++-
 2 files changed, 13 insertions(+), 1 deletion(-)

diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c
index 6f78489..163a239 100644
--- a/net/bluetooth/hci_event.c
+++ b/net/bluetooth/hci_event.c
@@ -5089,6 +5089,11 @@ static void hci_le_remote_conn_param_req_evt(struct hci_dev *hdev,
        return send_conn_param_neg_reply(hdev, handle,

+   if (min < hcon->le_conn_min_interval ||
+       max > hcon->le_conn_max_interval)
+       return send_conn_param_neg_reply(hdev, handle,
+                        HCI_ERROR_INVALID_LL_PARAMS);
    if (hci_check_conn_params(min, max, latency, timeout))
        return send_conn_param_neg_reply(hdev, handle,
diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
index 48d23ab..4912e80 100644
--- a/net/bluetooth/l2cap_core.c
+++ b/net/bluetooth/l2cap_core.c
@@ -5277,7 +5277,14 @@ static inline int l2cap_conn_param_update_req(struct l2cap_conn *conn,

    memset(&rsp, 0, sizeof(rsp));

-   err = hci_check_conn_params(min, max, latency, to_multiplier);
+   if (min < hcon->le_conn_min_interval ||
+       max > hcon->le_conn_max_interval) {
+       BT_DBG("requested connection interval exceeds current bounds.");
+       err = -EINVAL;
+   } else {
+       err = hci_check_conn_params(min, max, latency, to_multiplier);
+   }
    if (err)
        rsp.result = cpu_to_le16(L2CAP_CONN_PARAM_REJECTED);

Leave a Reply

Your email address will not be published. Required fields are marked *