1 /* 2 * server.c 3 */ 4 5 /*- 6 * Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com> 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28 * SUCH DAMAGE. 29 * 30 * $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $ 31 * $FreeBSD$ 32 */ 33 34 #include <sys/queue.h> 35 #include <assert.h> 36 #include <bluetooth.h> 37 #include <dev/vkbd/vkbd_var.h> 38 #include <errno.h> 39 #include <fcntl.h> 40 #include <stdio.h> 41 #include <stdlib.h> 42 #include <string.h> 43 #include <syslog.h> 44 #include <unistd.h> 45 #include <usbhid.h> 46 #include "bthid_config.h" 47 #include "bthidd.h" 48 #include "kbd.h" 49 50 #undef max 51 #define max(x, y) (((x) > (y))? (x) : (y)) 52 53 static int32_t server_accept (bthid_server_p srv, int32_t fd); 54 static int32_t server_process(bthid_server_p srv, int32_t fd); 55 56 /* 57 * Initialize server 58 */ 59 60 int32_t 61 server_init(bthid_server_p srv) 62 { 63 struct sockaddr_l2cap l2addr; 64 65 assert(srv != NULL); 66 67 srv->ctrl = srv->intr = -1; 68 FD_ZERO(&srv->rfdset); 69 FD_ZERO(&srv->wfdset); 70 LIST_INIT(&srv->sessions); 71 72 /* Open /dev/consolectl */ 73 srv->cons = open("/dev/consolectl", O_RDWR); 74 if (srv->cons < 0) { 75 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)", 76 strerror(errno), errno); 77 return (-1); 78 } 79 80 /* Create control socket */ 81 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 82 if (srv->ctrl < 0) { 83 syslog(LOG_ERR, "Could not create control L2CAP socket. " \ 84 "%s (%d)", strerror(errno), errno); 85 close(srv->cons); 86 return (-1); 87 } 88 89 l2addr.l2cap_len = sizeof(l2addr); 90 l2addr.l2cap_family = AF_BLUETOOTH; 91 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr)); 92 l2addr.l2cap_psm = htole16(0x11); 93 94 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 95 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \ 96 "%s (%d)", strerror(errno), errno); 97 close(srv->ctrl); 98 close(srv->cons); 99 return (-1); 100 } 101 102 if (listen(srv->ctrl, 10) < 0) { 103 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \ 104 "%s (%d)", strerror(errno), errno); 105 close(srv->ctrl); 106 close(srv->cons); 107 return (-1); 108 } 109 110 /* Create intrrupt socket */ 111 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 112 if (srv->intr < 0) { 113 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \ 114 "%s (%d)", strerror(errno), errno); 115 close(srv->ctrl); 116 close(srv->cons); 117 return (-1); 118 } 119 120 l2addr.l2cap_psm = htole16(0x13); 121 122 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 123 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \ 124 "%s (%d)", strerror(errno), errno); 125 close(srv->intr); 126 close(srv->ctrl); 127 close(srv->cons); 128 return (-1); 129 } 130 131 if (listen(srv->intr, 10) < 0) { 132 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\ 133 "%s (%d)", strerror(errno), errno); 134 close(srv->intr); 135 close(srv->ctrl); 136 close(srv->cons); 137 return (-1); 138 } 139 140 FD_SET(srv->ctrl, &srv->rfdset); 141 FD_SET(srv->intr, &srv->rfdset); 142 srv->maxfd = max(srv->ctrl, srv->intr); 143 144 return (0); 145 } 146 147 /* 148 * Shutdown server 149 */ 150 151 void 152 server_shutdown(bthid_server_p srv) 153 { 154 assert(srv != NULL); 155 156 close(srv->cons); 157 close(srv->ctrl); 158 close(srv->intr); 159 160 while (!LIST_EMPTY(&srv->sessions)) 161 session_close(LIST_FIRST(&srv->sessions)); 162 163 memset(srv, 0, sizeof(*srv)); 164 } 165 166 /* 167 * Do one server iteration 168 */ 169 170 int32_t 171 server_do(bthid_server_p srv) 172 { 173 struct timeval tv; 174 fd_set rfdset, wfdset; 175 int32_t n, fd; 176 177 assert(srv != NULL); 178 179 tv.tv_sec = 1; 180 tv.tv_usec = 0; 181 182 /* Copy cached version of the fd sets and call select */ 183 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset)); 184 memcpy(&wfdset, &srv->wfdset, sizeof(wfdset)); 185 186 n = select(srv->maxfd + 1, &rfdset, &wfdset, NULL, &tv); 187 if (n < 0) { 188 if (errno == EINTR) 189 return (0); 190 191 syslog(LOG_ERR, "Could not select(%d, %p, %p). %s (%d)", 192 srv->maxfd + 1, &rfdset, &wfdset, strerror(errno), errno); 193 194 return (-1); 195 } 196 197 /* Process descriptors (if any) */ 198 for (fd = 0; fd < srv->maxfd + 1 && n > 0; fd ++) { 199 if (FD_ISSET(fd, &rfdset)) { 200 n --; 201 202 if (fd == srv->ctrl || fd == srv->intr) 203 server_accept(srv, fd); 204 else 205 server_process(srv, fd); 206 } else if (FD_ISSET(fd, &wfdset)) { 207 n --; 208 209 client_connect(srv, fd); 210 } 211 } 212 213 return (0); 214 } 215 216 /* 217 * Accept new connection 218 */ 219 220 static int32_t 221 server_accept(bthid_server_p srv, int32_t fd) 222 { 223 bthid_session_p s; 224 hid_device_p d; 225 struct sockaddr_l2cap l2addr; 226 int32_t new_fd; 227 socklen_t len; 228 229 len = sizeof(l2addr); 230 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) { 231 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)", 232 (fd == srv->ctrl)? "control" : "interrupt", 233 strerror(errno), errno); 234 return (-1); 235 } 236 237 /* Is device configured? */ 238 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) { 239 syslog(LOG_ERR, "Rejecting %s connection from %s. " \ 240 "Device not configured", 241 (fd == srv->ctrl)? "control" : "interrupt", 242 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 243 close(new_fd); 244 return (-1); 245 } 246 247 /* Check if we have session for the device */ 248 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) { 249 d->new_device = 0; /* reset new device flag */ 250 write_hids_file(); 251 252 /* Create new inbound session */ 253 if ((s = session_open(srv, d)) == NULL) { 254 syslog(LOG_CRIT, "Could not open inbound session " 255 "for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 256 close(new_fd); 257 return (-1); 258 } 259 } 260 261 /* Update descriptors */ 262 if (fd == srv->ctrl) { 263 assert(s->ctrl == -1); 264 s->ctrl = new_fd; 265 s->state = (s->intr == -1)? W4INTR : OPEN; 266 } else { 267 assert(s->intr == -1); 268 s->intr = new_fd; 269 s->state = (s->ctrl == -1)? W4CTRL : OPEN; 270 } 271 272 FD_SET(new_fd, &srv->rfdset); 273 if (new_fd > srv->maxfd) 274 srv->maxfd = new_fd; 275 276 syslog(LOG_NOTICE, "Accepted %s connection from %s", 277 (fd == srv->ctrl)? "control" : "interrupt", 278 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 279 280 /* Register session's vkbd descriptor (if needed) for read */ 281 if (s->state == OPEN && d->keyboard) { 282 assert(s->vkbd != -1); 283 284 FD_SET(s->vkbd, &srv->rfdset); 285 if (s->vkbd > srv->maxfd) 286 srv->maxfd = s->vkbd; 287 } 288 289 return (0); 290 } 291 292 /* 293 * Process data on the connection 294 */ 295 296 static int32_t 297 server_process(bthid_server_p srv, int32_t fd) 298 { 299 bthid_session_p s = session_by_fd(srv, fd); 300 int32_t len, to_read; 301 int32_t (*cb)(bthid_session_p, uint8_t *, int32_t); 302 union { 303 uint8_t b[1024]; 304 vkbd_status_t s; 305 } data; 306 307 if (s == NULL) 308 return (0); /* can happen on device disconnect */ 309 310 311 if (fd == s->ctrl) { 312 cb = hid_control; 313 to_read = sizeof(data.b); 314 } else if (fd == s->intr) { 315 cb = hid_interrupt; 316 to_read = sizeof(data.b); 317 } else { 318 assert(fd == s->vkbd); 319 320 cb = kbd_status_changed; 321 to_read = sizeof(data.s); 322 } 323 324 do { 325 len = read(fd, &data, to_read); 326 } while (len < 0 && errno == EINTR); 327 328 if (len < 0) { 329 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)", 330 bt_ntoa(&s->bdaddr, NULL), 331 (fd == s->ctrl)? "control" : "interrupt", 332 strerror(errno), errno); 333 session_close(s); 334 return (0); 335 } 336 337 if (len == 0) { 338 syslog(LOG_NOTICE, "Remote device %s has closed %s connection", 339 bt_ntoa(&s->bdaddr, NULL), 340 (fd == s->ctrl)? "control" : "interrupt"); 341 session_close(s); 342 return (0); 343 } 344 345 (*cb)(s, (uint8_t *) &data, len); 346 347 return (0); 348 } 349 350