| /* |
| * |
| * BlueZ - Bluetooth protocol stack for Linux |
| * |
| * Copyright (C) 2013-2014 Intel Corporation. All rights reserved. |
| * |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include <stdio.h> |
| #include <ctype.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #if defined(ANDROID) |
| #include <sys/capability.h> |
| #endif |
| |
| #include "lib/bluetooth.h" |
| #include "lib/hci.h" |
| #include "lib/mgmt.h" |
| |
| #include "monitor/mainloop.h" |
| #include "src/shared/btsnoop.h" |
| |
| #define DEFAULT_SNOOP_FILE "/sdcard/btsnoop_hci.log" |
| |
| #define MAX_PACKET_SIZE (1486 + 4) |
| |
| static struct btsnoop *snoop = NULL; |
| static uint8_t monitor_buf[MAX_PACKET_SIZE]; |
| static int monitor_fd = -1; |
| |
| static void signal_callback(int signum, void *user_data) |
| { |
| switch (signum) { |
| case SIGINT: |
| case SIGTERM: |
| mainloop_quit(); |
| break; |
| } |
| } |
| |
| static uint32_t get_flags_from_opcode(uint16_t opcode) |
| { |
| switch (opcode) { |
| case BTSNOOP_OPCODE_NEW_INDEX: |
| case BTSNOOP_OPCODE_DEL_INDEX: |
| break; |
| case BTSNOOP_OPCODE_COMMAND_PKT: |
| return 0x02; |
| case BTSNOOP_OPCODE_EVENT_PKT: |
| return 0x03; |
| case BTSNOOP_OPCODE_ACL_TX_PKT: |
| return 0x00; |
| case BTSNOOP_OPCODE_ACL_RX_PKT: |
| return 0x01; |
| case BTSNOOP_OPCODE_SCO_TX_PKT: |
| case BTSNOOP_OPCODE_SCO_RX_PKT: |
| break; |
| } |
| |
| return 0xff; |
| } |
| |
| static void data_callback(int fd, uint32_t events, void *user_data) |
| { |
| unsigned char control[32]; |
| struct mgmt_hdr hdr; |
| struct msghdr msg; |
| struct iovec iov[2]; |
| |
| if (events & (EPOLLERR | EPOLLHUP)) { |
| mainloop_remove_fd(monitor_fd); |
| return; |
| } |
| |
| iov[0].iov_base = &hdr; |
| iov[0].iov_len = MGMT_HDR_SIZE; |
| iov[1].iov_base = monitor_buf; |
| iov[1].iov_len = sizeof(monitor_buf); |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.msg_iov = iov; |
| msg.msg_iovlen = 2; |
| msg.msg_control = control; |
| msg.msg_controllen = sizeof(control); |
| |
| while (true) { |
| struct cmsghdr *cmsg; |
| struct timeval *tv = NULL; |
| struct timeval ctv; |
| uint16_t opcode, index, pktlen; |
| uint32_t flags; |
| ssize_t len; |
| |
| len = recvmsg(monitor_fd, &msg, MSG_DONTWAIT); |
| if (len < 0) |
| break; |
| |
| if (len < MGMT_HDR_SIZE) |
| break; |
| |
| for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; |
| cmsg = CMSG_NXTHDR(&msg, cmsg)) { |
| if (cmsg->cmsg_level != SOL_SOCKET) |
| continue; |
| |
| if (cmsg->cmsg_type == SCM_TIMESTAMP) { |
| memcpy(&ctv, CMSG_DATA(cmsg), sizeof(ctv)); |
| tv = &ctv; |
| } |
| } |
| |
| opcode = btohs(hdr.opcode); |
| index = btohs(hdr.index); |
| pktlen = btohs(hdr.len); |
| |
| if (index) |
| continue; |
| |
| flags = get_flags_from_opcode(opcode); |
| if (flags != 0xff) |
| btsnoop_write(snoop, tv, flags, monitor_buf, pktlen); |
| } |
| } |
| |
| static int open_monitor(const char *path) |
| { |
| struct sockaddr_hci addr; |
| int opt = 1; |
| |
| snoop = btsnoop_create(path, BTSNOOP_TYPE_HCI); |
| if (!snoop) |
| return -1; |
| |
| monitor_fd = socket(AF_BLUETOOTH, SOCK_RAW | SOCK_CLOEXEC, BTPROTO_HCI); |
| if (monitor_fd < 0) |
| goto failed; |
| |
| memset(&addr, 0, sizeof(addr)); |
| addr.hci_family = AF_BLUETOOTH; |
| addr.hci_dev = HCI_DEV_NONE; |
| addr.hci_channel = HCI_CHANNEL_MONITOR; |
| |
| if (bind(monitor_fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) |
| goto failed_close; |
| |
| if (setsockopt(monitor_fd, SOL_SOCKET, SO_TIMESTAMP, &opt, sizeof(opt)) |
| < 0) |
| goto failed_close; |
| |
| mainloop_add_fd(monitor_fd, EPOLLIN, data_callback, NULL, NULL); |
| |
| return 0; |
| |
| failed_close: |
| close(monitor_fd); |
| monitor_fd = -1; |
| |
| failed: |
| btsnoop_unref(snoop); |
| snoop = NULL; |
| |
| return -1; |
| } |
| |
| static void close_monitor(void) |
| { |
| btsnoop_unref(snoop); |
| snoop = NULL; |
| |
| close(monitor_fd); |
| monitor_fd = -1; |
| } |
| |
| static void set_capabilities(void) |
| { |
| #if defined(ANDROID) |
| struct __user_cap_header_struct header; |
| struct __user_cap_data_struct cap; |
| |
| header.version = _LINUX_CAPABILITY_VERSION; |
| header.pid = 0; |
| |
| /* |
| * CAP_NET_RAW: for snooping |
| * CAP_DAC_READ_SEARCH: override path search permissions |
| */ |
| cap.effective = cap.permitted = |
| CAP_TO_MASK(CAP_NET_RAW) | |
| CAP_TO_MASK(CAP_DAC_READ_SEARCH); |
| cap.inheritable = 0; |
| |
| /* TODO: Move to cap_set_proc once bionic support it */ |
| if (capset(&header, &cap) < 0) |
| exit(EXIT_FAILURE); |
| #endif |
| } |
| |
| int main(int argc, char *argv[]) |
| { |
| const char *path; |
| sigset_t mask; |
| |
| set_capabilities(); |
| |
| if (argc > 1) |
| path = argv[1]; |
| else |
| path = DEFAULT_SNOOP_FILE; |
| |
| mainloop_init(); |
| |
| sigemptyset(&mask); |
| sigaddset(&mask, SIGINT); |
| sigaddset(&mask, SIGTERM); |
| |
| mainloop_set_signal(&mask, signal_callback, NULL, NULL); |
| |
| if (!strcmp(DEFAULT_SNOOP_FILE, path)) |
| rename(DEFAULT_SNOOP_FILE, DEFAULT_SNOOP_FILE ".old"); |
| |
| if (open_monitor(path) < 0) { |
| printf("Failed to start bluetoothd_snoop\n"); |
| return EXIT_FAILURE; |
| } |
| |
| mainloop_run(); |
| |
| close_monitor(); |
| |
| return EXIT_SUCCESS; |
| } |