Loading...
1/*
2 * Copyright (C) 2011 matt mooney <mfm@muteddisk.com>
3 * 2005-2007 Takahiro Hirofuchi
4 * Copyright (C) 2015-2016 Samsung Electronics
5 * Igor Kotrasinski <i.kotrasinsk@samsung.com>
6 * Krzysztof Opasiak <k.opasiak@samsung.com>
7 *
8 * This program is free software: you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation, either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>.
20 */
21
22#ifdef HAVE_CONFIG_H
23#include "../config.h"
24#endif
25
26#define _GNU_SOURCE
27#include <errno.h>
28#include <unistd.h>
29#include <netdb.h>
30#include <string.h>
31#include <stdlib.h>
32#include <sys/types.h>
33#include <sys/stat.h>
34#include <arpa/inet.h>
35#include <sys/socket.h>
36#include <netinet/in.h>
37
38#ifdef HAVE_LIBWRAP
39#include <tcpd.h>
40#endif
41
42#include <getopt.h>
43#include <signal.h>
44#include <poll.h>
45
46#include "usbip_host_driver.h"
47#include "usbip_host_common.h"
48#include "usbip_device_driver.h"
49#include "usbip_common.h"
50#include "usbip_network.h"
51#include "list.h"
52
53#undef PROGNAME
54#define PROGNAME "usbipd"
55#define MAXSOCKFD 20
56
57#define MAIN_LOOP_TIMEOUT 10
58
59#define DEFAULT_PID_FILE "/var/run/" PROGNAME ".pid"
60
61static const char usbip_version_string[] = PACKAGE_STRING;
62
63static const char usbipd_help_string[] =
64 "usage: usbipd [options]\n"
65 "\n"
66 " -4, --ipv4\n"
67 " Bind to IPv4. Default is both.\n"
68 "\n"
69 " -6, --ipv6\n"
70 " Bind to IPv6. Default is both.\n"
71 "\n"
72 " -e, --device\n"
73 " Run in device mode.\n"
74 " Rather than drive an attached device, create\n"
75 " a virtual UDC to bind gadgets to.\n"
76 "\n"
77 " -D, --daemon\n"
78 " Run as a daemon process.\n"
79 "\n"
80 " -d, --debug\n"
81 " Print debugging information.\n"
82 "\n"
83 " -PFILE, --pid FILE\n"
84 " Write process id to FILE.\n"
85 " If no FILE specified, use " DEFAULT_PID_FILE "\n"
86 "\n"
87 " -tPORT, --tcp-port PORT\n"
88 " Listen on TCP/IP port PORT.\n"
89 "\n"
90 " -h, --help\n"
91 " Print this help.\n"
92 "\n"
93 " -v, --version\n"
94 " Show version.\n";
95
96static struct usbip_host_driver *driver;
97
98static void usbipd_help(void)
99{
100 printf("%s\n", usbipd_help_string);
101}
102
103static int recv_request_import(int sockfd)
104{
105 struct op_import_request req;
106 struct usbip_exported_device *edev;
107 struct usbip_usb_device pdu_udev;
108 struct list_head *i;
109 int found = 0;
110 int error = 0;
111 int rc;
112
113 memset(&req, 0, sizeof(req));
114
115 rc = usbip_net_recv(sockfd, &req, sizeof(req));
116 if (rc < 0) {
117 dbg("usbip_net_recv failed: import request");
118 return -1;
119 }
120 PACK_OP_IMPORT_REQUEST(0, &req);
121
122 list_for_each(i, &driver->edev_list) {
123 edev = list_entry(i, struct usbip_exported_device, node);
124 if (!strncmp(req.busid, edev->udev.busid, SYSFS_BUS_ID_SIZE)) {
125 info("found requested device: %s", req.busid);
126 found = 1;
127 break;
128 }
129 }
130
131 if (found) {
132 /* should set TCP_NODELAY for usbip */
133 usbip_net_set_nodelay(sockfd);
134
135 /* export device needs a TCP/IP socket descriptor */
136 rc = usbip_export_device(edev, sockfd);
137 if (rc < 0)
138 error = 1;
139 } else {
140 info("requested device not found: %s", req.busid);
141 error = 1;
142 }
143
144 rc = usbip_net_send_op_common(sockfd, OP_REP_IMPORT,
145 (!error ? ST_OK : ST_NA));
146 if (rc < 0) {
147 dbg("usbip_net_send_op_common failed: %#0x", OP_REP_IMPORT);
148 return -1;
149 }
150
151 if (error) {
152 dbg("import request busid %s: failed", req.busid);
153 return -1;
154 }
155
156 memcpy(&pdu_udev, &edev->udev, sizeof(pdu_udev));
157 usbip_net_pack_usb_device(1, &pdu_udev);
158
159 rc = usbip_net_send(sockfd, &pdu_udev, sizeof(pdu_udev));
160 if (rc < 0) {
161 dbg("usbip_net_send failed: devinfo");
162 return -1;
163 }
164
165 dbg("import request busid %s: complete", req.busid);
166
167 return 0;
168}
169
170static int send_reply_devlist(int connfd)
171{
172 struct usbip_exported_device *edev;
173 struct usbip_usb_device pdu_udev;
174 struct usbip_usb_interface pdu_uinf;
175 struct op_devlist_reply reply;
176 struct list_head *j;
177 int rc, i;
178
179 reply.ndev = 0;
180 /* number of exported devices */
181 list_for_each(j, &driver->edev_list) {
182 reply.ndev += 1;
183 }
184 info("exportable devices: %d", reply.ndev);
185
186 rc = usbip_net_send_op_common(connfd, OP_REP_DEVLIST, ST_OK);
187 if (rc < 0) {
188 dbg("usbip_net_send_op_common failed: %#0x", OP_REP_DEVLIST);
189 return -1;
190 }
191 PACK_OP_DEVLIST_REPLY(1, &reply);
192
193 rc = usbip_net_send(connfd, &reply, sizeof(reply));
194 if (rc < 0) {
195 dbg("usbip_net_send failed: %#0x", OP_REP_DEVLIST);
196 return -1;
197 }
198
199 list_for_each(j, &driver->edev_list) {
200 edev = list_entry(j, struct usbip_exported_device, node);
201 dump_usb_device(&edev->udev);
202 memcpy(&pdu_udev, &edev->udev, sizeof(pdu_udev));
203 usbip_net_pack_usb_device(1, &pdu_udev);
204
205 rc = usbip_net_send(connfd, &pdu_udev, sizeof(pdu_udev));
206 if (rc < 0) {
207 dbg("usbip_net_send failed: pdu_udev");
208 return -1;
209 }
210
211 for (i = 0; i < edev->udev.bNumInterfaces; i++) {
212 dump_usb_interface(&edev->uinf[i]);
213 memcpy(&pdu_uinf, &edev->uinf[i], sizeof(pdu_uinf));
214 usbip_net_pack_usb_interface(1, &pdu_uinf);
215
216 rc = usbip_net_send(connfd, &pdu_uinf,
217 sizeof(pdu_uinf));
218 if (rc < 0) {
219 err("usbip_net_send failed: pdu_uinf");
220 return -1;
221 }
222 }
223 }
224
225 return 0;
226}
227
228static int recv_request_devlist(int connfd)
229{
230 struct op_devlist_request req;
231 int rc;
232
233 memset(&req, 0, sizeof(req));
234
235 rc = usbip_net_recv(connfd, &req, sizeof(req));
236 if (rc < 0) {
237 dbg("usbip_net_recv failed: devlist request");
238 return -1;
239 }
240
241 rc = send_reply_devlist(connfd);
242 if (rc < 0) {
243 dbg("send_reply_devlist failed");
244 return -1;
245 }
246
247 return 0;
248}
249
250static int recv_pdu(int connfd)
251{
252 uint16_t code = OP_UNSPEC;
253 int ret;
254
255 ret = usbip_net_recv_op_common(connfd, &code);
256 if (ret < 0) {
257 dbg("could not receive opcode: %#0x", code);
258 return -1;
259 }
260
261 ret = usbip_refresh_device_list(driver);
262 if (ret < 0) {
263 dbg("could not refresh device list: %d", ret);
264 return -1;
265 }
266
267 info("received request: %#0x(%d)", code, connfd);
268 switch (code) {
269 case OP_REQ_DEVLIST:
270 ret = recv_request_devlist(connfd);
271 break;
272 case OP_REQ_IMPORT:
273 ret = recv_request_import(connfd);
274 break;
275 case OP_REQ_DEVINFO:
276 case OP_REQ_CRYPKEY:
277 default:
278 err("received an unknown opcode: %#0x", code);
279 ret = -1;
280 }
281
282 if (ret == 0)
283 info("request %#0x(%d): complete", code, connfd);
284 else
285 info("request %#0x(%d): failed", code, connfd);
286
287 return ret;
288}
289
290#ifdef HAVE_LIBWRAP
291static int tcpd_auth(int connfd)
292{
293 struct request_info request;
294 int rc;
295
296 request_init(&request, RQ_DAEMON, PROGNAME, RQ_FILE, connfd, 0);
297 fromhost(&request);
298 rc = hosts_access(&request);
299 if (rc == 0)
300 return -1;
301
302 return 0;
303}
304#endif
305
306static int do_accept(int listenfd)
307{
308 int connfd;
309 struct sockaddr_storage ss;
310 socklen_t len = sizeof(ss);
311 char host[NI_MAXHOST], port[NI_MAXSERV];
312 int rc;
313
314 memset(&ss, 0, sizeof(ss));
315
316 connfd = accept(listenfd, (struct sockaddr *)&ss, &len);
317 if (connfd < 0) {
318 err("failed to accept connection");
319 return -1;
320 }
321
322 rc = getnameinfo((struct sockaddr *)&ss, len, host, sizeof(host),
323 port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV);
324 if (rc)
325 err("getnameinfo: %s", gai_strerror(rc));
326
327#ifdef HAVE_LIBWRAP
328 rc = tcpd_auth(connfd);
329 if (rc < 0) {
330 info("denied access from %s", host);
331 close(connfd);
332 return -1;
333 }
334#endif
335 info("connection from %s:%s", host, port);
336
337 return connfd;
338}
339
340int process_request(int listenfd)
341{
342 pid_t childpid;
343 int connfd;
344
345 connfd = do_accept(listenfd);
346 if (connfd < 0)
347 return -1;
348 childpid = fork();
349 if (childpid == 0) {
350 close(listenfd);
351 recv_pdu(connfd);
352 exit(0);
353 }
354 close(connfd);
355 return 0;
356}
357
358static void addrinfo_to_text(struct addrinfo *ai, char buf[],
359 const size_t buf_size)
360{
361 char hbuf[NI_MAXHOST];
362 char sbuf[NI_MAXSERV];
363 int rc;
364
365 buf[0] = '\0';
366
367 rc = getnameinfo(ai->ai_addr, ai->ai_addrlen, hbuf, sizeof(hbuf),
368 sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV);
369 if (rc)
370 err("getnameinfo: %s", gai_strerror(rc));
371
372 snprintf(buf, buf_size, "%s:%s", hbuf, sbuf);
373}
374
375static int listen_all_addrinfo(struct addrinfo *ai_head, int sockfdlist[],
376 int maxsockfd)
377{
378 struct addrinfo *ai;
379 int ret, nsockfd = 0;
380 const size_t ai_buf_size = NI_MAXHOST + NI_MAXSERV + 2;
381 char ai_buf[ai_buf_size];
382
383 for (ai = ai_head; ai && nsockfd < maxsockfd; ai = ai->ai_next) {
384 int sock;
385
386 addrinfo_to_text(ai, ai_buf, ai_buf_size);
387 dbg("opening %s", ai_buf);
388 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
389 if (sock < 0) {
390 err("socket: %s: %d (%s)",
391 ai_buf, errno, strerror(errno));
392 continue;
393 }
394
395 usbip_net_set_reuseaddr(sock);
396 usbip_net_set_nodelay(sock);
397 /* We use seperate sockets for IPv4 and IPv6
398 * (see do_standalone_mode()) */
399 usbip_net_set_v6only(sock);
400
401 ret = bind(sock, ai->ai_addr, ai->ai_addrlen);
402 if (ret < 0) {
403 err("bind: %s: %d (%s)",
404 ai_buf, errno, strerror(errno));
405 close(sock);
406 continue;
407 }
408
409 ret = listen(sock, SOMAXCONN);
410 if (ret < 0) {
411 err("listen: %s: %d (%s)",
412 ai_buf, errno, strerror(errno));
413 close(sock);
414 continue;
415 }
416
417 info("listening on %s", ai_buf);
418 sockfdlist[nsockfd++] = sock;
419 }
420
421 return nsockfd;
422}
423
424static struct addrinfo *do_getaddrinfo(char *host, int ai_family)
425{
426 struct addrinfo hints, *ai_head;
427 int rc;
428
429 memset(&hints, 0, sizeof(hints));
430 hints.ai_family = ai_family;
431 hints.ai_socktype = SOCK_STREAM;
432 hints.ai_flags = AI_PASSIVE;
433
434 rc = getaddrinfo(host, usbip_port_string, &hints, &ai_head);
435 if (rc) {
436 err("failed to get a network address %s: %s", usbip_port_string,
437 gai_strerror(rc));
438 return NULL;
439 }
440
441 return ai_head;
442}
443
444static void signal_handler(int i)
445{
446 dbg("received '%s' signal", strsignal(i));
447}
448
449static void set_signal(void)
450{
451 struct sigaction act;
452
453 memset(&act, 0, sizeof(act));
454 act.sa_handler = signal_handler;
455 sigemptyset(&act.sa_mask);
456 sigaction(SIGTERM, &act, NULL);
457 sigaction(SIGINT, &act, NULL);
458 act.sa_handler = SIG_IGN;
459 sigaction(SIGCLD, &act, NULL);
460}
461
462static const char *pid_file;
463
464static void write_pid_file(void)
465{
466 if (pid_file) {
467 dbg("creating pid file %s", pid_file);
468 FILE *fp;
469
470 fp = fopen(pid_file, "w");
471 if (!fp) {
472 err("pid_file: %s: %d (%s)",
473 pid_file, errno, strerror(errno));
474 return;
475 }
476 fprintf(fp, "%d\n", getpid());
477 fclose(fp);
478 }
479}
480
481static void remove_pid_file(void)
482{
483 if (pid_file) {
484 dbg("removing pid file %s", pid_file);
485 unlink(pid_file);
486 }
487}
488
489static int do_standalone_mode(int daemonize, int ipv4, int ipv6)
490{
491 struct addrinfo *ai_head;
492 int sockfdlist[MAXSOCKFD];
493 int nsockfd, family;
494 int i, terminate;
495 struct pollfd *fds;
496 struct timespec timeout;
497 sigset_t sigmask;
498
499 if (usbip_driver_open(driver))
500 return -1;
501
502 if (daemonize) {
503 if (daemon(0, 0) < 0) {
504 err("daemonizing failed: %s", strerror(errno));
505 usbip_driver_close(driver);
506 return -1;
507 }
508 umask(0);
509 usbip_use_syslog = 1;
510 }
511 set_signal();
512 write_pid_file();
513
514 info("starting " PROGNAME " (%s)", usbip_version_string);
515
516 /*
517 * To suppress warnings on systems with bindv6only disabled
518 * (default), we use seperate sockets for IPv6 and IPv4 and set
519 * IPV6_V6ONLY on the IPv6 sockets.
520 */
521 if (ipv4 && ipv6)
522 family = AF_UNSPEC;
523 else if (ipv4)
524 family = AF_INET;
525 else
526 family = AF_INET6;
527
528 ai_head = do_getaddrinfo(NULL, family);
529 if (!ai_head) {
530 usbip_driver_close(driver);
531 return -1;
532 }
533 nsockfd = listen_all_addrinfo(ai_head, sockfdlist,
534 sizeof(sockfdlist) / sizeof(*sockfdlist));
535 freeaddrinfo(ai_head);
536 if (nsockfd <= 0) {
537 err("failed to open a listening socket");
538 usbip_driver_close(driver);
539 return -1;
540 }
541
542 dbg("listening on %d address%s", nsockfd, (nsockfd == 1) ? "" : "es");
543
544 fds = calloc(nsockfd, sizeof(struct pollfd));
545 for (i = 0; i < nsockfd; i++) {
546 fds[i].fd = sockfdlist[i];
547 fds[i].events = POLLIN;
548 }
549 timeout.tv_sec = MAIN_LOOP_TIMEOUT;
550 timeout.tv_nsec = 0;
551
552 sigfillset(&sigmask);
553 sigdelset(&sigmask, SIGTERM);
554 sigdelset(&sigmask, SIGINT);
555
556 terminate = 0;
557 while (!terminate) {
558 int r;
559
560 r = ppoll(fds, nsockfd, &timeout, &sigmask);
561 if (r < 0) {
562 dbg("%s", strerror(errno));
563 terminate = 1;
564 } else if (r) {
565 for (i = 0; i < nsockfd; i++) {
566 if (fds[i].revents & POLLIN) {
567 dbg("read event on fd[%d]=%d",
568 i, sockfdlist[i]);
569 process_request(sockfdlist[i]);
570 }
571 }
572 } else {
573 dbg("heartbeat timeout on ppoll()");
574 }
575 }
576
577 info("shutting down " PROGNAME);
578 free(fds);
579 usbip_driver_close(driver);
580
581 return 0;
582}
583
584int main(int argc, char *argv[])
585{
586 static const struct option longopts[] = {
587 { "ipv4", no_argument, NULL, '4' },
588 { "ipv6", no_argument, NULL, '6' },
589 { "daemon", no_argument, NULL, 'D' },
590 { "daemon", no_argument, NULL, 'D' },
591 { "debug", no_argument, NULL, 'd' },
592 { "device", no_argument, NULL, 'e' },
593 { "pid", optional_argument, NULL, 'P' },
594 { "tcp-port", required_argument, NULL, 't' },
595 { "help", no_argument, NULL, 'h' },
596 { "version", no_argument, NULL, 'v' },
597 { NULL, 0, NULL, 0 }
598 };
599
600 enum {
601 cmd_standalone_mode = 1,
602 cmd_help,
603 cmd_version
604 } cmd;
605
606 int daemonize = 0;
607 int ipv4 = 0, ipv6 = 0;
608 int opt, rc = -1;
609
610 pid_file = NULL;
611
612 usbip_use_stderr = 1;
613 usbip_use_syslog = 0;
614
615 if (geteuid() != 0)
616 err("not running as root?");
617
618 cmd = cmd_standalone_mode;
619 driver = &host_driver;
620 for (;;) {
621 opt = getopt_long(argc, argv, "46DdeP::t:hv", longopts, NULL);
622
623 if (opt == -1)
624 break;
625
626 switch (opt) {
627 case '4':
628 ipv4 = 1;
629 break;
630 case '6':
631 ipv6 = 1;
632 break;
633 case 'D':
634 daemonize = 1;
635 break;
636 case 'd':
637 usbip_use_debug = 1;
638 break;
639 case 'h':
640 cmd = cmd_help;
641 break;
642 case 'P':
643 pid_file = optarg ? optarg : DEFAULT_PID_FILE;
644 break;
645 case 't':
646 usbip_setup_port_number(optarg);
647 break;
648 case 'v':
649 cmd = cmd_version;
650 break;
651 case 'e':
652 driver = &device_driver;
653 break;
654 case '?':
655 usbipd_help();
656 default:
657 goto err_out;
658 }
659 }
660
661 if (!ipv4 && !ipv6)
662 ipv4 = ipv6 = 1;
663
664 switch (cmd) {
665 case cmd_standalone_mode:
666 rc = do_standalone_mode(daemonize, ipv4, ipv6);
667 remove_pid_file();
668 break;
669 case cmd_version:
670 printf(PROGNAME " (%s)\n", usbip_version_string);
671 rc = 0;
672 break;
673 case cmd_help:
674 usbipd_help();
675 rc = 0;
676 break;
677 default:
678 usbipd_help();
679 goto err_out;
680 }
681
682err_out:
683 return (rc > -1 ? EXIT_SUCCESS : EXIT_FAILURE);
684}
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Copyright (C) 2011 matt mooney <mfm@muteddisk.com>
4 * 2005-2007 Takahiro Hirofuchi
5 * Copyright (C) 2015-2016 Samsung Electronics
6 * Igor Kotrasinski <i.kotrasinsk@samsung.com>
7 * Krzysztof Opasiak <k.opasiak@samsung.com>
8 */
9
10#ifdef HAVE_CONFIG_H
11#include "../config.h"
12#endif
13
14#define _GNU_SOURCE
15#include <errno.h>
16#include <unistd.h>
17#include <netdb.h>
18#include <string.h>
19#include <stdlib.h>
20#include <sys/types.h>
21#include <sys/stat.h>
22#include <arpa/inet.h>
23#include <sys/socket.h>
24#include <netinet/in.h>
25
26#ifdef HAVE_LIBWRAP
27#include <tcpd.h>
28#endif
29
30#include <getopt.h>
31#include <signal.h>
32#include <poll.h>
33
34#include "usbip_host_driver.h"
35#include "usbip_host_common.h"
36#include "usbip_device_driver.h"
37#include "usbip_common.h"
38#include "usbip_network.h"
39#include "list.h"
40
41#undef PROGNAME
42#define PROGNAME "usbipd"
43#define MAXSOCKFD 20
44
45#define MAIN_LOOP_TIMEOUT 10
46
47#define DEFAULT_PID_FILE "/var/run/" PROGNAME ".pid"
48
49static const char usbip_version_string[] = PACKAGE_STRING;
50
51static const char usbipd_help_string[] =
52 "usage: usbipd [options]\n"
53 "\n"
54 " -4, --ipv4\n"
55 " Bind to IPv4. Default is both.\n"
56 "\n"
57 " -6, --ipv6\n"
58 " Bind to IPv6. Default is both.\n"
59 "\n"
60 " -e, --device\n"
61 " Run in device mode.\n"
62 " Rather than drive an attached device, create\n"
63 " a virtual UDC to bind gadgets to.\n"
64 "\n"
65 " -D, --daemon\n"
66 " Run as a daemon process.\n"
67 "\n"
68 " -d, --debug\n"
69 " Print debugging information.\n"
70 "\n"
71 " -PFILE, --pid FILE\n"
72 " Write process id to FILE.\n"
73 " If no FILE specified, use " DEFAULT_PID_FILE "\n"
74 "\n"
75 " -tPORT, --tcp-port PORT\n"
76 " Listen on TCP/IP port PORT.\n"
77 "\n"
78 " -h, --help\n"
79 " Print this help.\n"
80 "\n"
81 " -v, --version\n"
82 " Show version.\n";
83
84static struct usbip_host_driver *driver;
85
86static void usbipd_help(void)
87{
88 printf("%s\n", usbipd_help_string);
89}
90
91static int recv_request_import(int sockfd)
92{
93 struct op_import_request req;
94 struct usbip_exported_device *edev;
95 struct usbip_usb_device pdu_udev;
96 struct list_head *i;
97 int found = 0;
98 int status = ST_OK;
99 int rc;
100
101 memset(&req, 0, sizeof(req));
102
103 rc = usbip_net_recv(sockfd, &req, sizeof(req));
104 if (rc < 0) {
105 dbg("usbip_net_recv failed: import request");
106 return -1;
107 }
108 PACK_OP_IMPORT_REQUEST(0, &req);
109
110 list_for_each(i, &driver->edev_list) {
111 edev = list_entry(i, struct usbip_exported_device, node);
112 if (!strncmp(req.busid, edev->udev.busid, SYSFS_BUS_ID_SIZE)) {
113 info("found requested device: %s", req.busid);
114 found = 1;
115 break;
116 }
117 }
118
119 if (found) {
120 /* should set TCP_NODELAY for usbip */
121 usbip_net_set_nodelay(sockfd);
122
123 /* export device needs a TCP/IP socket descriptor */
124 status = usbip_export_device(edev, sockfd);
125 if (status < 0)
126 status = ST_NA;
127 } else {
128 info("requested device not found: %s", req.busid);
129 status = ST_NODEV;
130 }
131
132 rc = usbip_net_send_op_common(sockfd, OP_REP_IMPORT, status);
133 if (rc < 0) {
134 dbg("usbip_net_send_op_common failed: %#0x", OP_REP_IMPORT);
135 return -1;
136 }
137
138 if (status) {
139 dbg("import request busid %s: failed", req.busid);
140 return -1;
141 }
142
143 memcpy(&pdu_udev, &edev->udev, sizeof(pdu_udev));
144 usbip_net_pack_usb_device(1, &pdu_udev);
145
146 rc = usbip_net_send(sockfd, &pdu_udev, sizeof(pdu_udev));
147 if (rc < 0) {
148 dbg("usbip_net_send failed: devinfo");
149 return -1;
150 }
151
152 dbg("import request busid %s: complete", req.busid);
153
154 return 0;
155}
156
157static int send_reply_devlist(int connfd)
158{
159 struct usbip_exported_device *edev;
160 struct usbip_usb_device pdu_udev;
161 struct usbip_usb_interface pdu_uinf;
162 struct op_devlist_reply reply;
163 struct list_head *j;
164 int rc, i;
165
166 /*
167 * Exclude devices that are already exported to a client from
168 * the exportable device list to avoid:
169 * - import requests for devices that are exported only to
170 * fail the request.
171 * - revealing devices that are imported by a client to
172 * another client.
173 */
174
175 reply.ndev = 0;
176 /* number of exported devices */
177 list_for_each(j, &driver->edev_list) {
178 edev = list_entry(j, struct usbip_exported_device, node);
179 if (edev->status != SDEV_ST_USED)
180 reply.ndev += 1;
181 }
182 info("exportable devices: %d", reply.ndev);
183
184 rc = usbip_net_send_op_common(connfd, OP_REP_DEVLIST, ST_OK);
185 if (rc < 0) {
186 dbg("usbip_net_send_op_common failed: %#0x", OP_REP_DEVLIST);
187 return -1;
188 }
189 PACK_OP_DEVLIST_REPLY(1, &reply);
190
191 rc = usbip_net_send(connfd, &reply, sizeof(reply));
192 if (rc < 0) {
193 dbg("usbip_net_send failed: %#0x", OP_REP_DEVLIST);
194 return -1;
195 }
196
197 list_for_each(j, &driver->edev_list) {
198 edev = list_entry(j, struct usbip_exported_device, node);
199 if (edev->status == SDEV_ST_USED)
200 continue;
201
202 dump_usb_device(&edev->udev);
203 memcpy(&pdu_udev, &edev->udev, sizeof(pdu_udev));
204 usbip_net_pack_usb_device(1, &pdu_udev);
205
206 rc = usbip_net_send(connfd, &pdu_udev, sizeof(pdu_udev));
207 if (rc < 0) {
208 dbg("usbip_net_send failed: pdu_udev");
209 return -1;
210 }
211
212 for (i = 0; i < edev->udev.bNumInterfaces; i++) {
213 dump_usb_interface(&edev->uinf[i]);
214 memcpy(&pdu_uinf, &edev->uinf[i], sizeof(pdu_uinf));
215 usbip_net_pack_usb_interface(1, &pdu_uinf);
216
217 rc = usbip_net_send(connfd, &pdu_uinf,
218 sizeof(pdu_uinf));
219 if (rc < 0) {
220 err("usbip_net_send failed: pdu_uinf");
221 return -1;
222 }
223 }
224 }
225
226 return 0;
227}
228
229static int recv_request_devlist(int connfd)
230{
231 struct op_devlist_request req;
232 int rc;
233
234 memset(&req, 0, sizeof(req));
235
236 rc = usbip_net_recv(connfd, &req, sizeof(req));
237 if (rc < 0) {
238 dbg("usbip_net_recv failed: devlist request");
239 return -1;
240 }
241
242 rc = send_reply_devlist(connfd);
243 if (rc < 0) {
244 dbg("send_reply_devlist failed");
245 return -1;
246 }
247
248 return 0;
249}
250
251static int recv_pdu(int connfd)
252{
253 uint16_t code = OP_UNSPEC;
254 int ret;
255 int status;
256
257 ret = usbip_net_recv_op_common(connfd, &code, &status);
258 if (ret < 0) {
259 dbg("could not receive opcode: %#0x", code);
260 return -1;
261 }
262
263 ret = usbip_refresh_device_list(driver);
264 if (ret < 0) {
265 dbg("could not refresh device list: %d", ret);
266 return -1;
267 }
268
269 info("received request: %#0x(%d)", code, connfd);
270 switch (code) {
271 case OP_REQ_DEVLIST:
272 ret = recv_request_devlist(connfd);
273 break;
274 case OP_REQ_IMPORT:
275 ret = recv_request_import(connfd);
276 break;
277 case OP_REQ_DEVINFO:
278 case OP_REQ_CRYPKEY:
279 default:
280 err("received an unknown opcode: %#0x", code);
281 ret = -1;
282 }
283
284 if (ret == 0)
285 info("request %#0x(%d): complete", code, connfd);
286 else
287 info("request %#0x(%d): failed", code, connfd);
288
289 return ret;
290}
291
292#ifdef HAVE_LIBWRAP
293static int tcpd_auth(int connfd)
294{
295 struct request_info request;
296 int rc;
297
298 request_init(&request, RQ_DAEMON, PROGNAME, RQ_FILE, connfd, 0);
299 fromhost(&request);
300 rc = hosts_access(&request);
301 if (rc == 0)
302 return -1;
303
304 return 0;
305}
306#endif
307
308static int do_accept(int listenfd)
309{
310 int connfd;
311 struct sockaddr_storage ss;
312 socklen_t len = sizeof(ss);
313 char host[NI_MAXHOST], port[NI_MAXSERV];
314 int rc;
315
316 memset(&ss, 0, sizeof(ss));
317
318 connfd = accept(listenfd, (struct sockaddr *)&ss, &len);
319 if (connfd < 0) {
320 err("failed to accept connection");
321 return -1;
322 }
323
324 rc = getnameinfo((struct sockaddr *)&ss, len, host, sizeof(host),
325 port, sizeof(port), NI_NUMERICHOST | NI_NUMERICSERV);
326 if (rc)
327 err("getnameinfo: %s", gai_strerror(rc));
328
329#ifdef HAVE_LIBWRAP
330 rc = tcpd_auth(connfd);
331 if (rc < 0) {
332 info("denied access from %s", host);
333 close(connfd);
334 return -1;
335 }
336#endif
337 info("connection from %s:%s", host, port);
338
339 return connfd;
340}
341
342int process_request(int listenfd)
343{
344 pid_t childpid;
345 int connfd;
346
347 connfd = do_accept(listenfd);
348 if (connfd < 0)
349 return -1;
350 childpid = fork();
351 if (childpid == 0) {
352 close(listenfd);
353 recv_pdu(connfd);
354 exit(0);
355 }
356 close(connfd);
357 return 0;
358}
359
360static void addrinfo_to_text(struct addrinfo *ai, char buf[],
361 const size_t buf_size)
362{
363 char hbuf[NI_MAXHOST];
364 char sbuf[NI_MAXSERV];
365 int rc;
366
367 buf[0] = '\0';
368
369 rc = getnameinfo(ai->ai_addr, ai->ai_addrlen, hbuf, sizeof(hbuf),
370 sbuf, sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV);
371 if (rc)
372 err("getnameinfo: %s", gai_strerror(rc));
373
374 snprintf(buf, buf_size, "%s:%s", hbuf, sbuf);
375}
376
377static int listen_all_addrinfo(struct addrinfo *ai_head, int sockfdlist[],
378 int maxsockfd)
379{
380 struct addrinfo *ai;
381 int ret, nsockfd = 0;
382 const size_t ai_buf_size = NI_MAXHOST + NI_MAXSERV + 2;
383 char ai_buf[ai_buf_size];
384
385 for (ai = ai_head; ai && nsockfd < maxsockfd; ai = ai->ai_next) {
386 int sock;
387
388 addrinfo_to_text(ai, ai_buf, ai_buf_size);
389 dbg("opening %s", ai_buf);
390 sock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
391 if (sock < 0) {
392 err("socket: %s: %d (%s)",
393 ai_buf, errno, strerror(errno));
394 continue;
395 }
396
397 usbip_net_set_reuseaddr(sock);
398 usbip_net_set_nodelay(sock);
399 /* We use seperate sockets for IPv4 and IPv6
400 * (see do_standalone_mode()) */
401 usbip_net_set_v6only(sock);
402
403 ret = bind(sock, ai->ai_addr, ai->ai_addrlen);
404 if (ret < 0) {
405 err("bind: %s: %d (%s)",
406 ai_buf, errno, strerror(errno));
407 close(sock);
408 continue;
409 }
410
411 ret = listen(sock, SOMAXCONN);
412 if (ret < 0) {
413 err("listen: %s: %d (%s)",
414 ai_buf, errno, strerror(errno));
415 close(sock);
416 continue;
417 }
418
419 info("listening on %s", ai_buf);
420 sockfdlist[nsockfd++] = sock;
421 }
422
423 return nsockfd;
424}
425
426static struct addrinfo *do_getaddrinfo(char *host, int ai_family)
427{
428 struct addrinfo hints, *ai_head;
429 int rc;
430
431 memset(&hints, 0, sizeof(hints));
432 hints.ai_family = ai_family;
433 hints.ai_socktype = SOCK_STREAM;
434 hints.ai_flags = AI_PASSIVE;
435
436 rc = getaddrinfo(host, usbip_port_string, &hints, &ai_head);
437 if (rc) {
438 err("failed to get a network address %s: %s", usbip_port_string,
439 gai_strerror(rc));
440 return NULL;
441 }
442
443 return ai_head;
444}
445
446static void signal_handler(int i)
447{
448 dbg("received '%s' signal", strsignal(i));
449}
450
451static void set_signal(void)
452{
453 struct sigaction act;
454
455 memset(&act, 0, sizeof(act));
456 act.sa_handler = signal_handler;
457 sigemptyset(&act.sa_mask);
458 sigaction(SIGTERM, &act, NULL);
459 sigaction(SIGINT, &act, NULL);
460 act.sa_handler = SIG_IGN;
461 sigaction(SIGCHLD, &act, NULL);
462}
463
464static const char *pid_file;
465
466static void write_pid_file(void)
467{
468 if (pid_file) {
469 dbg("creating pid file %s", pid_file);
470 FILE *fp;
471
472 fp = fopen(pid_file, "w");
473 if (!fp) {
474 err("pid_file: %s: %d (%s)",
475 pid_file, errno, strerror(errno));
476 return;
477 }
478 fprintf(fp, "%d\n", getpid());
479 fclose(fp);
480 }
481}
482
483static void remove_pid_file(void)
484{
485 if (pid_file) {
486 dbg("removing pid file %s", pid_file);
487 unlink(pid_file);
488 }
489}
490
491static int do_standalone_mode(int daemonize, int ipv4, int ipv6)
492{
493 struct addrinfo *ai_head;
494 int sockfdlist[MAXSOCKFD];
495 int nsockfd, family;
496 int i, terminate;
497 struct pollfd *fds;
498 struct timespec timeout;
499 sigset_t sigmask;
500
501 if (usbip_driver_open(driver))
502 return -1;
503
504 if (daemonize) {
505 if (daemon(0, 0) < 0) {
506 err("daemonizing failed: %s", strerror(errno));
507 usbip_driver_close(driver);
508 return -1;
509 }
510 umask(0);
511 usbip_use_syslog = 1;
512 }
513 set_signal();
514 write_pid_file();
515
516 info("starting " PROGNAME " (%s)", usbip_version_string);
517
518 /*
519 * To suppress warnings on systems with bindv6only disabled
520 * (default), we use seperate sockets for IPv6 and IPv4 and set
521 * IPV6_V6ONLY on the IPv6 sockets.
522 */
523 if (ipv4 && ipv6)
524 family = AF_UNSPEC;
525 else if (ipv4)
526 family = AF_INET;
527 else
528 family = AF_INET6;
529
530 ai_head = do_getaddrinfo(NULL, family);
531 if (!ai_head) {
532 usbip_driver_close(driver);
533 return -1;
534 }
535 nsockfd = listen_all_addrinfo(ai_head, sockfdlist,
536 sizeof(sockfdlist) / sizeof(*sockfdlist));
537 freeaddrinfo(ai_head);
538 if (nsockfd <= 0) {
539 err("failed to open a listening socket");
540 usbip_driver_close(driver);
541 return -1;
542 }
543
544 dbg("listening on %d address%s", nsockfd, (nsockfd == 1) ? "" : "es");
545
546 fds = calloc(nsockfd, sizeof(struct pollfd));
547 for (i = 0; i < nsockfd; i++) {
548 fds[i].fd = sockfdlist[i];
549 fds[i].events = POLLIN;
550 }
551 timeout.tv_sec = MAIN_LOOP_TIMEOUT;
552 timeout.tv_nsec = 0;
553
554 sigfillset(&sigmask);
555 sigdelset(&sigmask, SIGTERM);
556 sigdelset(&sigmask, SIGINT);
557
558 terminate = 0;
559 while (!terminate) {
560 int r;
561
562 r = ppoll(fds, nsockfd, &timeout, &sigmask);
563 if (r < 0) {
564 dbg("%s", strerror(errno));
565 terminate = 1;
566 } else if (r) {
567 for (i = 0; i < nsockfd; i++) {
568 if (fds[i].revents & POLLIN) {
569 dbg("read event on fd[%d]=%d",
570 i, sockfdlist[i]);
571 process_request(sockfdlist[i]);
572 }
573 }
574 } else {
575 dbg("heartbeat timeout on ppoll()");
576 }
577 }
578
579 info("shutting down " PROGNAME);
580 free(fds);
581 usbip_driver_close(driver);
582
583 return 0;
584}
585
586int main(int argc, char *argv[])
587{
588 static const struct option longopts[] = {
589 { "ipv4", no_argument, NULL, '4' },
590 { "ipv6", no_argument, NULL, '6' },
591 { "daemon", no_argument, NULL, 'D' },
592 { "daemon", no_argument, NULL, 'D' },
593 { "debug", no_argument, NULL, 'd' },
594 { "device", no_argument, NULL, 'e' },
595 { "pid", optional_argument, NULL, 'P' },
596 { "tcp-port", required_argument, NULL, 't' },
597 { "help", no_argument, NULL, 'h' },
598 { "version", no_argument, NULL, 'v' },
599 { NULL, 0, NULL, 0 }
600 };
601
602 enum {
603 cmd_standalone_mode = 1,
604 cmd_help,
605 cmd_version
606 } cmd;
607
608 int daemonize = 0;
609 int ipv4 = 0, ipv6 = 0;
610 int opt, rc = -1;
611
612 pid_file = NULL;
613
614 usbip_use_stderr = 1;
615 usbip_use_syslog = 0;
616
617 if (geteuid() != 0)
618 err("not running as root?");
619
620 cmd = cmd_standalone_mode;
621 driver = &host_driver;
622 for (;;) {
623 opt = getopt_long(argc, argv, "46DdeP::t:hv", longopts, NULL);
624
625 if (opt == -1)
626 break;
627
628 switch (opt) {
629 case '4':
630 ipv4 = 1;
631 break;
632 case '6':
633 ipv6 = 1;
634 break;
635 case 'D':
636 daemonize = 1;
637 break;
638 case 'd':
639 usbip_use_debug = 1;
640 break;
641 case 'h':
642 cmd = cmd_help;
643 break;
644 case 'P':
645 pid_file = optarg ? optarg : DEFAULT_PID_FILE;
646 break;
647 case 't':
648 usbip_setup_port_number(optarg);
649 break;
650 case 'v':
651 cmd = cmd_version;
652 break;
653 case 'e':
654 driver = &device_driver;
655 break;
656 case '?':
657 usbipd_help();
658 default:
659 goto err_out;
660 }
661 }
662
663 if (!ipv4 && !ipv6)
664 ipv4 = ipv6 = 1;
665
666 switch (cmd) {
667 case cmd_standalone_mode:
668 rc = do_standalone_mode(daemonize, ipv4, ipv6);
669 remove_pid_file();
670 break;
671 case cmd_version:
672 printf(PROGNAME " (%s)\n", usbip_version_string);
673 rc = 0;
674 break;
675 case cmd_help:
676 usbipd_help();
677 rc = 0;
678 break;
679 default:
680 usbipd_help();
681 goto err_out;
682 }
683
684err_out:
685 return (rc > -1 ? EXIT_SUCCESS : EXIT_FAILURE);
686}