/* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2002-2003 Maxim Krasnyansky * Copyright (C) 2002-2009 Marcel Holtmann * * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #ifdef HAVE_CONFIG_H #include #endif #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "sdp.h" #include "pand.h" #ifdef NEED_PPOLL #include "ppoll.h" #endif static uint16_t role = BNEP_SVC_PANU; /* Local role (ie service) */ static uint16_t service = BNEP_SVC_NAP; /* Remote service */ static int detach = 1; static int persist; static int use_sdp = 1; static int use_cache; static int link_mode = 0; static int cleanup; static int search_duration = 10; static struct { int valid; char dst[40]; bdaddr_t bdaddr; } cache; static char netdev[16] = "bnep%d"; static char *pidfile = NULL; static char *devupcmd = NULL; static char *devdowncmd = NULL; static bdaddr_t src_addr = *BDADDR_ANY; static int src_dev = -1; static volatile int terminate; static void do_kill(char *dst); enum { NONE, SHOW, LISTEN, CONNECT, KILL } modes; struct script_arg { char dev[20]; char dst[20]; int sk; int nsk; }; static void run_script(char *script, char *dev, char *dst, int sk, int nsk) { char *argv[4]; struct sigaction sa; if (!script) return; if (access(script, R_OK | X_OK)) return; if (fork()) return; if (sk >= 0) close(sk); if (nsk >= 0) close(nsk); memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_DFL; sigaction(SIGCHLD, &sa, NULL); sigaction(SIGPIPE, &sa, NULL); argv[0] = script; argv[1] = dev; argv[2] = dst; argv[3] = NULL; execv(script, argv); exit(1); } /* Wait for disconnect or error condition on the socket */ static int w4_hup(int sk, struct script_arg *down_cmd) { struct pollfd pf; sigset_t sigs; int n; sigfillset(&sigs); sigdelset(&sigs, SIGCHLD); sigdelset(&sigs, SIGPIPE); sigdelset(&sigs, SIGTERM); sigdelset(&sigs, SIGINT); sigdelset(&sigs, SIGHUP); while (!terminate) { pf.fd = sk; pf.events = POLLERR | POLLHUP; n = ppoll(&pf, 1, NULL, &sigs); if (n < 0) { if (errno == EINTR || errno == EAGAIN) continue; syslog(LOG_ERR, "Poll failed. %s(%d)", strerror(errno), errno); return 1; } if (n) { int err = 0; socklen_t olen = sizeof(err); getsockopt(sk, SOL_SOCKET, SO_ERROR, &err, &olen); syslog(LOG_INFO, "%s disconnected%s%s", netdev, err ? " : " : "", err ? strerror(err) : ""); if (down_cmd) run_script(devdowncmd, down_cmd->dev, down_cmd->dst, down_cmd->sk, down_cmd->nsk); close(sk); return 0; } } return 0; } static int do_listen(void) { struct l2cap_options l2o; struct sockaddr_l2 l2a; socklen_t olen; int sk, lm; if (use_sdp) bnep_sdp_register(&src_addr, role); /* Create L2CAP socket and bind it to PSM BNEP */ sk = socket(AF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP); if (sk < 0) { syslog(LOG_ERR, "Cannot create L2CAP socket. %s(%d)", strerror(errno), errno); return -1; } memset(&l2a, 0, sizeof(l2a)); l2a.l2_family = AF_BLUETOOTH; bacpy(&l2a.l2_bdaddr, &src_addr); l2a.l2_psm = htobs(BNEP_PSM); if (bind(sk, (struct sockaddr *) &l2a, sizeof(l2a))) { syslog(LOG_ERR, "Bind failed. %s(%d)", strerror(errno), errno); return -1; } /* Setup L2CAP options according to BNEP spec */ memset(&l2o, 0, sizeof(l2o)); olen = sizeof(l2o); if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen) < 0) { syslog(LOG_ERR, "Failed to get L2CAP options. %s(%d)", strerror(errno), errno); return -1; } l2o.imtu = l2o.omtu = BNEP_MTU; if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, sizeof(l2o)) < 0) { syslog(LOG_ERR, "Failed to set L2CAP options. %s(%d)", strerror(errno), errno); return -1; } /* Set link mode */ lm = link_mode; if (lm && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &lm, sizeof(lm)) < 0) { syslog(LOG_ERR, "Failed to set link mode. %s(%d)", strerror(errno), errno); return -1; } listen(sk, 10); while (!terminate) { socklen_t alen = sizeof(l2a); char devname[16]; int nsk; nsk = accept(sk, (struct sockaddr *) &l2a, &alen); if (nsk < 0) { syslog(LOG_ERR, "Accept failed. %s(%d)", strerror(errno), errno); continue; } switch (fork()) { case 0: break; case -1: syslog(LOG_ERR, "Fork failed. %s(%d)", strerror(errno), errno); default: close(nsk); continue; } strncpy(devname, netdev, 16); devname[15] = '\0'; if (!bnep_accept_connection(nsk, role, devname)) { char str[40]; struct script_arg down_cmd; ba2str(&l2a.l2_bdaddr, str); syslog(LOG_INFO, "New connection from %s at %s", str, devname); run_script(devupcmd, devname, str, sk, nsk); memset(&down_cmd, 0, sizeof(struct script_arg)); strncpy(down_cmd.dev, devname, strlen(devname) + 1); strncpy(down_cmd.dst, str, strlen(str) + 1); down_cmd.sk = sk; down_cmd.nsk = nsk; w4_hup(nsk, &down_cmd); } else { syslog(LOG_ERR, "Connection failed. %s(%d)", strerror(errno), errno); } close(nsk); exit(0); } if (use_sdp) bnep_sdp_unregister(); return 0; } /* Connect and initiate BNEP session * Returns: * -1 - critical error (exit persist mode) * 1 - non critical error * 0 - success */ static int create_connection(char *dst, bdaddr_t *bdaddr) { struct l2cap_options l2o; struct sockaddr_l2 l2a; socklen_t olen; int sk, r = 0; struct script_arg down_cmd; syslog(LOG_INFO, "Connecting to %s", dst); sk = socket(AF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP); if (sk < 0) { syslog(LOG_ERR, "Cannot create L2CAP socket. %s(%d)", strerror(errno), errno); return -1; } /* Setup L2CAP options according to BNEP spec */ memset(&l2o, 0, sizeof(l2o)); olen = sizeof(l2o); getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen); l2o.imtu = l2o.omtu = BNEP_MTU; setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, sizeof(l2o)); memset(&l2a, 0, sizeof(l2a)); l2a.l2_family = AF_BLUETOOTH; bacpy(&l2a.l2_bdaddr, &src_addr); if (bind(sk, (struct sockaddr *) &l2a, sizeof(l2a))) syslog(LOG_ERR, "Bind failed. %s(%d)", strerror(errno), errno); memset(&l2a, 0, sizeof(l2a)); l2a.l2_family = AF_BLUETOOTH; bacpy(&l2a.l2_bdaddr, bdaddr); l2a.l2_psm = htobs(BNEP_PSM); if (!connect(sk, (struct sockaddr *) &l2a, sizeof(l2a)) && !bnep_create_connection(sk, role, service, netdev)) { syslog(LOG_INFO, "%s connected", netdev); run_script(devupcmd, netdev, dst, sk, -1); if (persist || devdowncmd) { memset(&down_cmd, 0, sizeof(struct script_arg)); strncpy(down_cmd.dev, netdev, strlen(netdev) + 1); strncpy(down_cmd.dst, dst, strlen(dst) + 1); down_cmd.sk = sk; down_cmd.nsk = -1; w4_hup(sk, &down_cmd); if (terminate && cleanup) { syslog(LOG_INFO, "Disconnecting from %s.", dst); do_kill(dst); } } r = 0; } else { syslog(LOG_ERR, "Connect to %s failed. %s(%d)", dst, strerror(errno), errno); r = 1; } close(sk); if (use_cache) { if (!r) { /* Succesesful connection, validate cache */ strcpy(cache.dst, dst); bacpy(&cache.bdaddr, bdaddr); cache.valid = use_cache; } else cache.valid--; } return r; } /* Search and connect * Returns: * -1 - critical error (exit persist mode) * 1 - non critical error * 0 - success */ static int do_connect(void) { inquiry_info *ii; int reconnect = 0; int i, n, r = 0; do { if (reconnect) sleep(persist); reconnect = 1; if (cache.valid > 0) { /* Use cached bdaddr */ r = create_connection(cache.dst, &cache.bdaddr); if (r < 0) { terminate = 1; break; } continue; } syslog(LOG_INFO, "Inquiring"); /* FIXME: Should we use non general LAP here ? */ ii = NULL; n = hci_inquiry(src_dev, search_duration, 0, NULL, &ii, 0); if (n < 0) { syslog(LOG_ERR, "Inquiry failed. %s(%d)", strerror(errno), errno); continue; } for (i = 0; i < n; i++) { char dst[40]; ba2str(&ii[i].bdaddr, dst); if (use_sdp) { syslog(LOG_INFO, "Searching for %s on %s", bnep_svc2str(service), dst); if (bnep_sdp_search(&src_addr, &ii[i].bdaddr, service) <= 0) continue; } r = create_connection(dst, &ii[i].bdaddr); if (r < 0) { terminate = 1; break; } } bt_free(ii); } while (!terminate && persist); return r; } static void do_show(void) { bnep_show_connections(); } static void do_kill(char *dst) { if (dst) bnep_kill_connection((void *) strtoba(dst)); else bnep_kill_all_connections(); } static void sig_hup(int sig) { return; } static void sig_term(int sig) { terminate = 1; } static int write_pidfile(void) { int fd; FILE *f; pid_t pid; do { fd = open(pidfile, O_WRONLY|O_TRUNC|O_CREAT|O_EXCL, 0644); if (fd == -1) { /* Try to open the file for read. */ fd = open(pidfile, O_RDONLY); if (fd < 0) { syslog(LOG_ERR, "Could not read old pidfile: %s(%d)", strerror(errno), errno); return -1; } /* We're already running; send a SIGHUP (we presume that they * are calling ifup for a reason, so they probably want to * rescan) and then exit cleanly and let things go on in the * background. Muck with the filename so that we don't go * deleting the pid file for the already-running instance. */ f = fdopen(fd, "r"); if (!f) { syslog(LOG_ERR, "Could not fdopen old pidfile: %s(%d)", strerror(errno), errno); close(fd); return -1; } pid = 0; if (fscanf(f, "%d", &pid) != 1) pid = 0; fclose(f); if (pid) { /* Try to kill it. */ if (kill(pid, SIGHUP) == -1) { /* No such pid; remove the bogus pid file. */ syslog(LOG_INFO, "Removing stale pidfile"); unlink(pidfile); fd = -1; } else { /* Got it. Don't mess with the pid file on * our way out. */ syslog(LOG_INFO, "Signalling existing process %d and exiting\n", pid); pidfile = NULL; return -1; } } } } while(fd == -1); f = fdopen(fd, "w"); if (!f) { syslog(LOG_ERR, "Could not fdopen new pidfile: %s(%d)", strerror(errno), errno); close(fd); unlink(pidfile); return -1; } fprintf(f, "%d\n", getpid()); fclose(f); return 0; } static struct option main_lopts[] = { { "help", 0, 0, 'h' }, { "listen", 0, 0, 's' }, { "connect", 1, 0, 'c' }, { "search", 2, 0, 'Q' }, { "kill", 1, 0, 'k' }, { "killall", 0, 0, 'K' }, { "role", 1, 0, 'r' }, { "service", 1, 0, 'd' }, { "ethernet", 1, 0, 'e' }, { "device", 1, 0, 'i' }, { "nosdp", 0, 0, 'D' }, { "list", 0, 0, 'l' }, { "show", 0, 0, 'l' }, { "nodetach", 0, 0, 'n' }, { "persist", 2, 0, 'p' }, { "auth", 0, 0, 'A' }, { "encrypt", 0, 0, 'E' }, { "secure", 0, 0, 'S' }, { "master", 0, 0, 'M' }, { "cache", 0, 0, 'C' }, { "pidfile", 1, 0, 'P' }, { "devup", 1, 0, 'u' }, { "devdown", 1, 0, 'o' }, { "autozap", 0, 0, 'z' }, { 0, 0, 0, 0 } }; static const char *main_sopts = "hsc:k:Kr:d:e:i:lnp::DQ::AESMC::P:u:o:z"; static const char *main_help = "Bluetooth PAN daemon version %s\n" "Usage:\n" "\tpand \n" "Options:\n" "\t--show --list -l Show active PAN connections\n" "\t--listen -s Listen for PAN connections\n" "\t--connect -c Create PAN connection\n" "\t--autozap -z Disconnect automatically on exit\n" "\t--search -Q[duration] Search and connect\n" "\t--kill -k Kill PAN connection\n" "\t--killall -K Kill all PAN connections\n" "\t--role -r Local PAN role (PANU, NAP, GN)\n" "\t--service -d Remote PAN service (PANU, NAP, GN)\n" "\t--ethernet -e Network interface name\n" "\t--device -i Source bdaddr\n" "\t--nosdp -D Disable SDP\n" "\t--auth -A Enable authentication\n" "\t--encrypt -E Enable encryption\n" "\t--secure -S Secure connection\n" "\t--master -M Become the master of a piconet\n" "\t--nodetach -n Do not become a daemon\n" "\t--persist -p[interval] Persist mode\n" "\t--cache -C[valid] Cache addresses\n" "\t--pidfile -P Create PID file\n" "\t--devup -u