bnep.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. *
  4. * BlueZ - Bluetooth protocol stack for Linux
  5. *
  6. * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
  7. *
  8. *
  9. */
  10. #ifdef HAVE_CONFIG_H
  11. #include <config.h>
  12. #endif
  13. #define _GNU_SOURCE
  14. #include <stdio.h>
  15. #include <errno.h>
  16. #include <unistd.h>
  17. #include <stdlib.h>
  18. #include <sys/param.h>
  19. #include <sys/ioctl.h>
  20. #include <sys/socket.h>
  21. #include <sys/wait.h>
  22. #include <net/if.h>
  23. #include <linux/sockios.h>
  24. #include <glib.h>
  25. #include "lib/bluetooth.h"
  26. #include "lib/l2cap.h"
  27. #include "lib/bnep.h"
  28. #include "lib/uuid.h"
  29. #include "src/log.h"
  30. #include "src/shared/timeout.h"
  31. #include "src/shared/util.h"
  32. #include "btio/btio.h"
  33. #include "bnep.h"
  34. #define CON_SETUP_RETRIES 3
  35. #define CON_SETUP_TO 9
  36. static int ctl;
  37. struct __service_16 {
  38. uint16_t dst;
  39. uint16_t src;
  40. } __attribute__ ((packed));
  41. struct bnep {
  42. GIOChannel *io;
  43. uint16_t src;
  44. uint16_t dst;
  45. bdaddr_t dst_addr;
  46. char iface[16];
  47. guint attempts;
  48. unsigned int setup_to;
  49. guint watch;
  50. bnep_connect_cb conn_cb;
  51. void *conn_data;
  52. bnep_disconnect_cb disconn_cb;
  53. void *disconn_data;
  54. };
  55. int bnep_init(void)
  56. {
  57. ctl = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_BNEP);
  58. if (ctl < 0) {
  59. int err = -errno;
  60. if (err == -EPROTONOSUPPORT)
  61. warn("kernel lacks bnep-protocol support");
  62. else
  63. error("bnep: Failed to open control socket: %s (%d)",
  64. strerror(-err), -err);
  65. return err;
  66. }
  67. return 0;
  68. }
  69. int bnep_cleanup(void)
  70. {
  71. close(ctl);
  72. return 0;
  73. }
  74. static int bnep_conndel(const bdaddr_t *dst)
  75. {
  76. struct bnep_conndel_req req;
  77. memset(&req, 0, sizeof(req));
  78. baswap((bdaddr_t *)&req.dst, dst);
  79. req.flags = 0;
  80. if (ioctl(ctl, BNEPCONNDEL, &req) < 0) {
  81. int err = -errno;
  82. error("bnep: Failed to kill connection: %s (%d)",
  83. strerror(-err), -err);
  84. return err;
  85. }
  86. return 0;
  87. }
  88. static int bnep_connadd(int sk, uint16_t role, char *dev)
  89. {
  90. struct bnep_connadd_req req;
  91. memset(&req, 0, sizeof(req));
  92. strncpy(req.device, dev, 16);
  93. req.device[15] = '\0';
  94. req.sock = sk;
  95. req.role = role;
  96. req.flags = (1 << BNEP_SETUP_RESPONSE);
  97. if (ioctl(ctl, BNEPCONNADD, &req) < 0) {
  98. int err = -errno;
  99. error("bnep: Failed to add device %s: %s(%d)",
  100. dev, strerror(-err), -err);
  101. return err;
  102. }
  103. strncpy(dev, req.device, 16);
  104. return 0;
  105. }
  106. static uint32_t bnep_getsuppfeat(void)
  107. {
  108. uint32_t feat;
  109. if (ioctl(ctl, BNEPGETSUPPFEAT, &feat) < 0)
  110. feat = 0;
  111. DBG("supported features: 0x%x", feat);
  112. return feat;
  113. }
  114. static int bnep_if_up(const char *devname)
  115. {
  116. struct ifreq ifr;
  117. int sk, err = 0;
  118. sk = socket(AF_INET, SOCK_DGRAM, 0);
  119. memset(&ifr, 0, sizeof(ifr));
  120. strncpy(ifr.ifr_name, devname, IF_NAMESIZE - 1);
  121. ifr.ifr_flags |= IFF_UP;
  122. ifr.ifr_flags |= IFF_MULTICAST;
  123. if (ioctl(sk, SIOCSIFFLAGS, (void *) &ifr) < 0) {
  124. err = -errno;
  125. error("bnep: Could not bring up %s: %s(%d)",
  126. devname, strerror(-err), -err);
  127. }
  128. close(sk);
  129. return err;
  130. }
  131. static int bnep_if_down(const char *devname)
  132. {
  133. struct ifreq ifr;
  134. int sk, err = 0;
  135. sk = socket(AF_INET, SOCK_DGRAM, 0);
  136. memset(&ifr, 0, sizeof(ifr));
  137. strncpy(ifr.ifr_name, devname, IF_NAMESIZE - 1);
  138. ifr.ifr_flags &= ~IFF_UP;
  139. /* Bring down the interface */
  140. if (ioctl(sk, SIOCSIFFLAGS, (void *) &ifr) < 0) {
  141. err = -errno;
  142. error("bnep: Could not bring down %s: %s(%d)",
  143. devname, strerror(-err), -err);
  144. }
  145. close(sk);
  146. return err;
  147. }
  148. static gboolean bnep_watchdog_cb(GIOChannel *chan, GIOCondition cond,
  149. gpointer data)
  150. {
  151. struct bnep *session = data;
  152. if (session->disconn_cb)
  153. session->disconn_cb(session->disconn_data);
  154. return FALSE;
  155. }
  156. static gboolean bnep_setup_cb(GIOChannel *chan, GIOCondition cond,
  157. gpointer data)
  158. {
  159. struct bnep *session = data;
  160. struct bnep_control_rsp *rsp;
  161. struct timeval timeo;
  162. char pkt[BNEP_MTU];
  163. ssize_t r;
  164. int sk;
  165. if (cond & G_IO_NVAL)
  166. return FALSE;
  167. if (session->setup_to > 0) {
  168. timeout_remove(session->setup_to);
  169. session->setup_to = 0;
  170. }
  171. if (cond & (G_IO_HUP | G_IO_ERR)) {
  172. error("bnep: Hangup or error on l2cap server socket");
  173. goto failed;
  174. }
  175. sk = g_io_channel_unix_get_fd(chan);
  176. memset(pkt, 0, BNEP_MTU);
  177. r = read(sk, pkt, sizeof(pkt) - 1);
  178. if (r < 0) {
  179. error("bnep: IO Channel read error");
  180. goto failed;
  181. }
  182. if (r == 0) {
  183. error("bnep: No packet received on l2cap socket");
  184. goto failed;
  185. }
  186. errno = EPROTO;
  187. if ((size_t) r < sizeof(*rsp)) {
  188. error("bnep: Packet received is not bnep type");
  189. goto failed;
  190. }
  191. rsp = (void *) pkt;
  192. if (rsp->type != BNEP_CONTROL) {
  193. error("bnep: Packet received is not bnep type");
  194. goto failed;
  195. }
  196. if (rsp->ctrl != BNEP_SETUP_CONN_RSP)
  197. return TRUE;
  198. r = ntohs(rsp->resp);
  199. if (r != BNEP_SUCCESS) {
  200. error("bnep: failed");
  201. goto failed;
  202. }
  203. memset(&timeo, 0, sizeof(timeo));
  204. timeo.tv_sec = 0;
  205. if (setsockopt(sk, SOL_SOCKET, SO_RCVTIMEO, &timeo,
  206. sizeof(timeo)) < 0) {
  207. error("bnep: Set setsockopt failed: %s", strerror(errno));
  208. goto failed;
  209. };
  210. sk = g_io_channel_unix_get_fd(session->io);
  211. if (bnep_connadd(sk, session->src, session->iface) < 0)
  212. goto failed;
  213. if (bnep_if_up(session->iface) < 0) {
  214. bnep_conndel(&session->dst_addr);
  215. goto failed;
  216. }
  217. session->watch = g_io_add_watch(session->io,
  218. G_IO_ERR | G_IO_HUP | G_IO_NVAL,
  219. (GIOFunc) bnep_watchdog_cb, session);
  220. g_io_channel_unref(session->io);
  221. session->io = NULL;
  222. session->conn_cb(session->iface, 0, session->conn_data);
  223. return FALSE;
  224. failed:
  225. session->conn_cb(NULL, -EIO, session->conn_data);
  226. return FALSE;
  227. }
  228. static int bnep_setup_conn_req(struct bnep *session)
  229. {
  230. struct bnep_setup_conn_req *req;
  231. struct __service_16 *s;
  232. unsigned char pkt[BNEP_MTU];
  233. int fd;
  234. /* Send request */
  235. req = (void *) pkt;
  236. req->type = BNEP_CONTROL;
  237. req->ctrl = BNEP_SETUP_CONN_REQ;
  238. req->uuid_size = 2; /* 16bit UUID */
  239. s = (void *) req->service;
  240. s->src = htons(session->src);
  241. s->dst = htons(session->dst);
  242. fd = g_io_channel_unix_get_fd(session->io);
  243. if (write(fd, pkt, sizeof(*req) + sizeof(*s)) < 0) {
  244. error("bnep: connection req send failed: %s", strerror(errno));
  245. return -errno;
  246. }
  247. session->attempts++;
  248. return 0;
  249. }
  250. static bool bnep_conn_req_to(gpointer user_data)
  251. {
  252. struct bnep *session = user_data;
  253. if (session->attempts == CON_SETUP_RETRIES) {
  254. error("bnep: Too many bnep connection attempts");
  255. } else {
  256. error("bnep: connection setup TO, retrying...");
  257. if (bnep_setup_conn_req(session) == 0)
  258. return TRUE;
  259. }
  260. session->conn_cb(NULL, -ETIMEDOUT, session->conn_data);
  261. return FALSE;
  262. }
  263. struct bnep *bnep_new(int sk, uint16_t local_role, uint16_t remote_role,
  264. char *iface)
  265. {
  266. struct bnep *session;
  267. int dup_fd;
  268. dup_fd = dup(sk);
  269. if (dup_fd < 0)
  270. return NULL;
  271. session = g_new0(struct bnep, 1);
  272. session->io = g_io_channel_unix_new(dup_fd);
  273. session->src = local_role;
  274. session->dst = remote_role;
  275. strncpy(session->iface, iface, 16);
  276. session->iface[15] = '\0';
  277. g_io_channel_set_close_on_unref(session->io, TRUE);
  278. session->watch = g_io_add_watch(session->io,
  279. G_IO_IN | G_IO_ERR | G_IO_HUP | G_IO_NVAL,
  280. (GIOFunc) bnep_setup_cb, session);
  281. return session;
  282. }
  283. void bnep_free(struct bnep *session)
  284. {
  285. if (!session)
  286. return;
  287. if (session->io) {
  288. g_io_channel_shutdown(session->io, FALSE, NULL);
  289. g_io_channel_unref(session->io);
  290. session->io = NULL;
  291. }
  292. if (session->watch > 0) {
  293. g_source_remove(session->watch);
  294. session->watch = 0;
  295. }
  296. g_free(session);
  297. }
  298. int bnep_connect(struct bnep *session, bnep_connect_cb conn_cb,
  299. bnep_disconnect_cb disconn_cb,
  300. void *conn_data, void *disconn_data)
  301. {
  302. GError *gerr = NULL;
  303. int err;
  304. if (!session || !conn_cb || !disconn_cb)
  305. return -EINVAL;
  306. session->attempts = 0;
  307. session->conn_cb = conn_cb;
  308. session->disconn_cb = disconn_cb;
  309. session->conn_data = conn_data;
  310. session->disconn_data = disconn_data;
  311. bt_io_get(session->io, &gerr, BT_IO_OPT_DEST_BDADDR, &session->dst_addr,
  312. BT_IO_OPT_INVALID);
  313. if (gerr) {
  314. error("bnep: connect failed: %s", gerr->message);
  315. g_error_free(gerr);
  316. return -EINVAL;
  317. }
  318. err = bnep_setup_conn_req(session);
  319. if (err < 0)
  320. return err;
  321. session->setup_to = timeout_add_seconds(CON_SETUP_TO,
  322. bnep_conn_req_to, session,
  323. NULL);
  324. return 0;
  325. }
  326. void bnep_disconnect(struct bnep *session)
  327. {
  328. if (!session)
  329. return;
  330. if (session->watch > 0) {
  331. g_source_remove(session->watch);
  332. session->watch = 0;
  333. }
  334. if (session->io) {
  335. g_io_channel_unref(session->io);
  336. session->io = NULL;
  337. }
  338. bnep_if_down(session->iface);
  339. bnep_conndel(&session->dst_addr);
  340. }
  341. static int bnep_add_to_bridge(const char *devname, const char *bridge)
  342. {
  343. int ifindex;
  344. struct ifreq ifr;
  345. int sk, err = 0;
  346. if (!devname || !bridge)
  347. return -EINVAL;
  348. ifindex = if_nametoindex(devname);
  349. sk = socket(AF_INET, SOCK_STREAM, 0);
  350. if (sk < 0)
  351. return -1;
  352. memset(&ifr, 0, sizeof(ifr));
  353. strncpy(ifr.ifr_name, bridge, IFNAMSIZ - 1);
  354. ifr.ifr_ifindex = ifindex;
  355. if (ioctl(sk, SIOCBRADDIF, &ifr) < 0) {
  356. err = -errno;
  357. error("bnep: Can't add %s to the bridge %s: %s(%d)",
  358. devname, bridge, strerror(-err), -err);
  359. } else {
  360. info("bnep: bridge %s: interface %s added", bridge, devname);
  361. }
  362. close(sk);
  363. return err;
  364. }
  365. static int bnep_del_from_bridge(const char *devname, const char *bridge)
  366. {
  367. int ifindex;
  368. struct ifreq ifr;
  369. int sk, err = 0;
  370. if (!devname || !bridge)
  371. return -EINVAL;
  372. ifindex = if_nametoindex(devname);
  373. sk = socket(AF_INET, SOCK_STREAM, 0);
  374. if (sk < 0)
  375. return -1;
  376. memset(&ifr, 0, sizeof(ifr));
  377. strncpy(ifr.ifr_name, bridge, IFNAMSIZ - 1);
  378. ifr.ifr_ifindex = ifindex;
  379. if (ioctl(sk, SIOCBRDELIF, &ifr) < 0) {
  380. err = -errno;
  381. error("bnep: Can't delete %s from the bridge %s: %s(%d)",
  382. devname, bridge, strerror(-err), -err);
  383. } else {
  384. info("bnep: bridge %s: interface %s removed", bridge, devname);
  385. }
  386. close(sk);
  387. return err;
  388. }
  389. static ssize_t bnep_send_ctrl_rsp(int sk, uint8_t ctrl, uint16_t resp)
  390. {
  391. ssize_t sent;
  392. switch (ctrl) {
  393. case BNEP_CMD_NOT_UNDERSTOOD: {
  394. struct bnep_ctrl_cmd_not_understood_cmd rsp;
  395. rsp.type = BNEP_CONTROL;
  396. rsp.ctrl = ctrl;
  397. rsp.unkn_ctrl = (uint8_t) resp;
  398. sent = send(sk, &rsp, sizeof(rsp), 0);
  399. break;
  400. }
  401. case BNEP_FILTER_MULT_ADDR_RSP:
  402. case BNEP_FILTER_NET_TYPE_RSP:
  403. case BNEP_SETUP_CONN_RSP: {
  404. struct bnep_control_rsp rsp;
  405. rsp.type = BNEP_CONTROL;
  406. rsp.ctrl = ctrl;
  407. rsp.resp = htons(resp);
  408. sent = send(sk, &rsp, sizeof(rsp), 0);
  409. break;
  410. }
  411. default:
  412. error("bnep: wrong response type");
  413. sent = -1;
  414. break;
  415. }
  416. return sent;
  417. }
  418. static uint16_t bnep_setup_decode(int sk, struct bnep_setup_conn_req *req,
  419. uint16_t *dst)
  420. {
  421. const uint8_t bt_base[] = { 0x00, 0x00, 0x10, 0x00, 0x80, 0x00,
  422. 0x00, 0x80, 0x5F, 0x9B, 0x34, 0xFB };
  423. uint16_t src;
  424. uint8_t *dest, *source;
  425. uint32_t val;
  426. if (((req->type != BNEP_CONTROL) &&
  427. (req->type != (BNEP_CONTROL | BNEP_EXT_HEADER))) ||
  428. req->ctrl != BNEP_SETUP_CONN_REQ)
  429. return BNEP_CONN_NOT_ALLOWED;
  430. dest = req->service;
  431. source = req->service + req->uuid_size;
  432. switch (req->uuid_size) {
  433. case 2: /* UUID16 */
  434. *dst = get_be16(dest);
  435. src = get_be16(source);
  436. break;
  437. case 16: /* UUID128 */
  438. /* Check that the bytes in the UUID, except the service ID
  439. * itself, are correct. The service ID is checked in
  440. * bnep_setup_chk(). */
  441. if (memcmp(&dest[4], bt_base, sizeof(bt_base)) != 0)
  442. return BNEP_CONN_INVALID_DST;
  443. if (memcmp(&source[4], bt_base, sizeof(bt_base)) != 0)
  444. return BNEP_CONN_INVALID_SRC;
  445. /* fall through */
  446. case 4: /* UUID32 */
  447. val = get_be32(dest);
  448. if (val > 0xffff)
  449. return BNEP_CONN_INVALID_DST;
  450. *dst = val;
  451. val = get_be32(source);
  452. if (val > 0xffff)
  453. return BNEP_CONN_INVALID_SRC;
  454. src = val;
  455. break;
  456. default:
  457. return BNEP_CONN_INVALID_SVC;
  458. }
  459. /* Allowed PAN Profile scenarios */
  460. switch (*dst) {
  461. case BNEP_SVC_NAP:
  462. case BNEP_SVC_GN:
  463. if (src == BNEP_SVC_PANU)
  464. return BNEP_SUCCESS;
  465. return BNEP_CONN_INVALID_SRC;
  466. case BNEP_SVC_PANU:
  467. if (src == BNEP_SVC_PANU || src == BNEP_SVC_GN ||
  468. src == BNEP_SVC_NAP)
  469. return BNEP_SUCCESS;
  470. return BNEP_CONN_INVALID_SRC;
  471. }
  472. return BNEP_CONN_INVALID_DST;
  473. }
  474. static int bnep_server_add_legacy(int sk, uint16_t dst, char *bridge,
  475. char *iface, const bdaddr_t *addr,
  476. uint8_t *setup_data, int len)
  477. {
  478. int err, n;
  479. uint16_t rsp;
  480. n = read(sk, setup_data, len);
  481. if (n != len) {
  482. err = -EIO;
  483. rsp = BNEP_CONN_NOT_ALLOWED;
  484. goto reply;
  485. }
  486. err = bnep_connadd(sk, dst, iface);
  487. if (err < 0) {
  488. rsp = BNEP_CONN_NOT_ALLOWED;
  489. goto reply;
  490. }
  491. err = bnep_add_to_bridge(iface, bridge);
  492. if (err < 0) {
  493. bnep_conndel(addr);
  494. rsp = BNEP_CONN_NOT_ALLOWED;
  495. goto reply;
  496. }
  497. err = bnep_if_up(iface);
  498. if (err < 0) {
  499. bnep_del_from_bridge(iface, bridge);
  500. bnep_conndel(addr);
  501. rsp = BNEP_CONN_NOT_ALLOWED;
  502. goto reply;
  503. }
  504. rsp = BNEP_SUCCESS;
  505. reply:
  506. if (bnep_send_ctrl_rsp(sk, BNEP_SETUP_CONN_RSP, rsp) < 0) {
  507. err = -errno;
  508. error("bnep: send ctrl rsp error: %s (%d)", strerror(-err),
  509. -err);
  510. }
  511. return err;
  512. }
  513. int bnep_server_add(int sk, char *bridge, char *iface, const bdaddr_t *addr,
  514. uint8_t *setup_data, int len)
  515. {
  516. int err;
  517. uint32_t feat;
  518. uint16_t rsp, dst;
  519. struct bnep_setup_conn_req *req = (void *) setup_data;
  520. /* Highest known Control command ID
  521. * is BNEP_FILTER_MULT_ADDR_RSP = 0x06 */
  522. if (req->type == BNEP_CONTROL &&
  523. req->ctrl > BNEP_FILTER_MULT_ADDR_RSP) {
  524. error("bnep: cmd not understood");
  525. err = bnep_send_ctrl_rsp(sk, BNEP_CMD_NOT_UNDERSTOOD,
  526. req->ctrl);
  527. if (err < 0)
  528. error("send not understood ctrl rsp error: %s (%d)",
  529. strerror(errno), errno);
  530. return err;
  531. }
  532. /* Processing BNEP_SETUP_CONNECTION_REQUEST_MSG */
  533. rsp = bnep_setup_decode(sk, req, &dst);
  534. if (rsp != BNEP_SUCCESS) {
  535. err = -rsp;
  536. error("bnep: error while decoding setup connection request: %d",
  537. rsp);
  538. goto failed;
  539. }
  540. feat = bnep_getsuppfeat();
  541. /*
  542. * Take out setup data if kernel doesn't support handling it, especially
  543. * setup request. If kernel would have set session flags, they should
  544. * be checked and handled respectively.
  545. */
  546. if (!feat || !(feat & (1 << BNEP_SETUP_RESPONSE)))
  547. return bnep_server_add_legacy(sk, dst, bridge, iface, addr,
  548. setup_data, len);
  549. err = bnep_connadd(sk, dst, iface);
  550. if (err < 0) {
  551. rsp = BNEP_CONN_NOT_ALLOWED;
  552. goto failed;
  553. }
  554. err = bnep_add_to_bridge(iface, bridge);
  555. if (err < 0)
  556. goto failed_conn;
  557. err = bnep_if_up(iface);
  558. if (err < 0)
  559. goto failed_bridge;
  560. return 0;
  561. failed_bridge:
  562. bnep_del_from_bridge(iface, bridge);
  563. failed_conn:
  564. bnep_conndel(addr);
  565. return err;
  566. failed:
  567. if (bnep_send_ctrl_rsp(sk, BNEP_SETUP_CONN_RSP, rsp) < 0) {
  568. err = -errno;
  569. error("bnep: send ctrl rsp error: %s (%d)", strerror(-err),
  570. -err);
  571. }
  572. return err;
  573. }
  574. void bnep_server_delete(char *bridge, char *iface, const bdaddr_t *addr)
  575. {
  576. if (!bridge || !iface || !addr)
  577. return;
  578. bnep_del_from_bridge(iface, bridge);
  579. bnep_if_down(iface);
  580. bnep_conndel(addr);
  581. }