/* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2013-2014 Intel Corporation. All rights reserved. * * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #if defined(ANDROID) #include #endif #include "lib/bluetooth.h" #include "lib/hci.h" #include "lib/mgmt.h" #include "monitor/mainloop.h" #include "src/shared/btsnoop.h" #define DEFAULT_SNOOP_FILE "/sdcard/btsnoop_hci.log" #define MAX_PACKET_SIZE (1486 + 4) static struct btsnoop *snoop = NULL; static uint8_t monitor_buf[MAX_PACKET_SIZE]; static int monitor_fd = -1; static void signal_callback(int signum, void *user_data) { switch (signum) { case SIGINT: case SIGTERM: mainloop_quit(); break; } } static uint32_t get_flags_from_opcode(uint16_t opcode) { switch (opcode) { case BTSNOOP_OPCODE_NEW_INDEX: case BTSNOOP_OPCODE_DEL_INDEX: break; case BTSNOOP_OPCODE_COMMAND_PKT: return 0x02; case BTSNOOP_OPCODE_EVENT_PKT: return 0x03; case BTSNOOP_OPCODE_ACL_TX_PKT: return 0x00; case BTSNOOP_OPCODE_ACL_RX_PKT: return 0x01; case BTSNOOP_OPCODE_SCO_TX_PKT: case BTSNOOP_OPCODE_SCO_RX_PKT: break; } return 0xff; } static void data_callback(int fd, uint32_t events, void *user_data) { unsigned char control[32]; struct mgmt_hdr hdr; struct msghdr msg; struct iovec iov[2]; if (events & (EPOLLERR | EPOLLHUP)) { mainloop_remove_fd(monitor_fd); return; } iov[0].iov_base = &hdr; iov[0].iov_len = MGMT_HDR_SIZE; iov[1].iov_base = monitor_buf; iov[1].iov_len = sizeof(monitor_buf); memset(&msg, 0, sizeof(msg)); msg.msg_iov = iov; msg.msg_iovlen = 2; msg.msg_control = control; msg.msg_controllen = sizeof(control); while (true) { struct cmsghdr *cmsg; struct timeval *tv = NULL; struct timeval ctv; uint16_t opcode, index, pktlen; uint32_t flags; ssize_t len; len = recvmsg(monitor_fd, &msg, MSG_DONTWAIT); if (len < 0) break; if (len < MGMT_HDR_SIZE) break; for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; cmsg = CMSG_NXTHDR(&msg, cmsg)) { if (cmsg->cmsg_level != SOL_SOCKET) continue; if (cmsg->cmsg_type == SCM_TIMESTAMP) { memcpy(&ctv, CMSG_DATA(cmsg), sizeof(ctv)); tv = &ctv; } } opcode = btohs(hdr.opcode); index = btohs(hdr.index); pktlen = btohs(hdr.len); if (index) continue; flags = get_flags_from_opcode(opcode); if (flags != 0xff) btsnoop_write(snoop, tv, flags, monitor_buf, pktlen); } } static int open_monitor(const char *path) { struct sockaddr_hci addr; int opt = 1; snoop = btsnoop_create(path, BTSNOOP_TYPE_HCI); if (!snoop) return -1; monitor_fd = socket(AF_BLUETOOTH, SOCK_RAW | SOCK_CLOEXEC, BTPROTO_HCI); if (monitor_fd < 0) goto failed; memset(&addr, 0, sizeof(addr)); addr.hci_family = AF_BLUETOOTH; addr.hci_dev = HCI_DEV_NONE; addr.hci_channel = HCI_CHANNEL_MONITOR; if (bind(monitor_fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) goto failed_close; if (setsockopt(monitor_fd, SOL_SOCKET, SO_TIMESTAMP, &opt, sizeof(opt)) < 0) goto failed_close; mainloop_add_fd(monitor_fd, EPOLLIN, data_callback, NULL, NULL); return 0; failed_close: close(monitor_fd); monitor_fd = -1; failed: btsnoop_unref(snoop); snoop = NULL; return -1; } static void close_monitor(void) { btsnoop_unref(snoop); snoop = NULL; close(monitor_fd); monitor_fd = -1; } static void set_capabilities(void) { #if defined(ANDROID) struct __user_cap_header_struct header; struct __user_cap_data_struct cap; header.version = _LINUX_CAPABILITY_VERSION; header.pid = 0; /* CAP_NET_RAW: for snooping * CAP_DAC_READ_SEARCH: override path search permissions */ cap.effective = cap.permitted = CAP_TO_MASK(CAP_NET_RAW) | CAP_TO_MASK(CAP_DAC_READ_SEARCH) ; cap.inheritable = 0; /* TODO: Move to cap_set_proc once bionic support it */ if (capset(&header, &cap) < 0) exit(EXIT_FAILURE); #endif } int main(int argc, char *argv[]) { const char *path; sigset_t mask; set_capabilities(); if (argc > 1) path = argv[1]; else path = DEFAULT_SNOOP_FILE; mainloop_init(); sigemptyset(&mask); sigaddset(&mask, SIGINT); sigaddset(&mask, SIGTERM); mainloop_set_signal(&mask, signal_callback, NULL, NULL); if (!strcmp(DEFAULT_SNOOP_FILE, path)) rename(DEFAULT_SNOOP_FILE, DEFAULT_SNOOP_FILE ".old"); if (open_monitor(path) < 0) { printf("Failed to start bluetoothd_snoop\n"); return EXIT_FAILURE; } mainloop_run(); close_monitor(); return EXIT_SUCCESS; }