blob: 79a0ac8a867463bf43eaab3cc21f03a57d98c427 [file] [log] [blame]
Denys Vlasenko9ba75042011-11-07 15:55:39 +01001/* vi: set sw=4 ts=4: */
2/*
3 * Copyright (C) 2011 Denys Vlasenko.
4 *
5 * Licensed under GPLv2, see file LICENSE in this source tree.
6 */
7#include "common.h"
8#include "d6_common.h"
9#include "dhcpd.h"
10#include <netinet/in.h>
11#include <netinet/if_ether.h>
12#include <netpacket/packet.h>
13
14#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 2
15void FAST_FUNC d6_dump_packet(struct d6_packet *packet)
16{
17 if (dhcp_verbose < 2)
18 return;
19
Denys Vlasenko8f2e99c2016-03-30 18:41:23 +020020 bb_error_msg(
21 "xid %x"
Denys Vlasenko9ba75042011-11-07 15:55:39 +010022 , packet->d6_xid32
23 );
24 //*bin2hex(buf, (void *) packet->chaddr, sizeof(packet->chaddr)) = '\0';
Denys Vlasenko76b680c2016-03-30 16:04:37 +020025 //bb_error_msg(" chaddr %s", buf);
Denys Vlasenko9ba75042011-11-07 15:55:39 +010026}
27#endif
28
29int FAST_FUNC d6_recv_kernel_packet(struct in6_addr *peer_ipv6
30 UNUSED_PARAM
31 , struct d6_packet *packet, int fd)
32{
33 int bytes;
34
35 memset(packet, 0, sizeof(*packet));
36 bytes = safe_read(fd, packet, sizeof(*packet));
37 if (bytes < 0) {
Denys Vlasenko8f2e99c2016-03-30 18:41:23 +020038 log1("packet read error, ignoring");
Denys Vlasenko9ba75042011-11-07 15:55:39 +010039 return bytes; /* returns -1 */
40 }
41
42 if (bytes < offsetof(struct d6_packet, d6_options)) {
Denys Vlasenko8f2e99c2016-03-30 18:41:23 +020043 bb_error_msg("packet with bad magic, ignoring");
Denys Vlasenko9ba75042011-11-07 15:55:39 +010044 return -2;
45 }
Denys Vlasenko8f2e99c2016-03-30 18:41:23 +020046 log1("received %s", "a packet");
Denys Vlasenko9ba75042011-11-07 15:55:39 +010047 d6_dump_packet(packet);
48
49 return bytes;
50}
51
52/* Construct a ipv6+udp header for a packet, send packet */
53int FAST_FUNC d6_send_raw_packet(
54 struct d6_packet *d6_pkt, unsigned d6_pkt_size,
55 struct in6_addr *src_ipv6, int source_port,
56 struct in6_addr *dst_ipv6, int dest_port, const uint8_t *dest_arp,
57 int ifindex)
58{
59 struct sockaddr_ll dest_sll;
60 struct ip6_udp_d6_packet packet;
61 int fd;
62 int result = -1;
63 const char *msg;
64
65 fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IPV6));
66 if (fd < 0) {
67 msg = "socket(%s)";
68 goto ret_msg;
69 }
70
71 memset(&dest_sll, 0, sizeof(dest_sll));
72 memset(&packet, 0, offsetof(struct ip6_udp_d6_packet, data));
73 packet.data = *d6_pkt; /* struct copy */
74
75 dest_sll.sll_family = AF_PACKET;
76 dest_sll.sll_protocol = htons(ETH_P_IPV6);
77 dest_sll.sll_ifindex = ifindex;
78 dest_sll.sll_halen = 6;
79 memcpy(dest_sll.sll_addr, dest_arp, 6);
80
81 if (bind(fd, (struct sockaddr *)&dest_sll, sizeof(dest_sll)) < 0) {
82 msg = "bind(%s)";
83 goto ret_close;
84 }
85
86 packet.ip6.ip6_vfc = (6 << 4); /* 4 bits version, top 4 bits of tclass */
87 if (src_ipv6)
88 packet.ip6.ip6_src = *src_ipv6; /* struct copy */
89 packet.ip6.ip6_dst = *dst_ipv6; /* struct copy */
90 packet.udp.source = htons(source_port);
91 packet.udp.dest = htons(dest_port);
92 /* size, excluding IP header: */
93 packet.udp.len = htons(sizeof(struct udphdr) + d6_pkt_size);
94 packet.ip6.ip6_plen = packet.udp.len;
Denys Vlasenko2b6a6b92011-11-07 18:22:06 +010095 /*
96 * Someone was smoking weed (at least) while inventing UDP checksumming:
97 * UDP checksum skips first four bytes of IPv6 header.
98 * 'next header' field should be summed as if it is one more byte
99 * to the right, therefore we write its value (IPPROTO_UDP)
100 * into ip6_hlim, and its 'real' location remains zero-filled for now.
Denys Vlasenko9ba75042011-11-07 15:55:39 +0100101 */
102 packet.ip6.ip6_hlim = IPPROTO_UDP;
Denys Vlasenko2b6a6b92011-11-07 18:22:06 +0100103 packet.udp.check = inet_cksum(
104 (uint16_t *)&packet + 2,
105 offsetof(struct ip6_udp_d6_packet, data) - 4 + d6_pkt_size
106 );
Denys Vlasenko9ba75042011-11-07 15:55:39 +0100107 /* fix 'hop limit' and 'next header' after UDP checksumming */
Denys Vlasenko2b6a6b92011-11-07 18:22:06 +0100108 packet.ip6.ip6_hlim = 1; /* observed Windows machines to use hlim=1 */
Denys Vlasenko9ba75042011-11-07 15:55:39 +0100109 packet.ip6.ip6_nxt = IPPROTO_UDP;
110
111 d6_dump_packet(d6_pkt);
112 result = sendto(fd, &packet, offsetof(struct ip6_udp_d6_packet, data) + d6_pkt_size,
113 /*flags:*/ 0,
114 (struct sockaddr *) &dest_sll, sizeof(dest_sll)
115 );
116 msg = "sendto";
117 ret_close:
118 close(fd);
119 if (result < 0) {
120 ret_msg:
121 bb_perror_msg(msg, "PACKET");
122 }
123 return result;
124}
125
126/* Let the kernel do all the work for packet generation */
127int FAST_FUNC d6_send_kernel_packet(
128 struct d6_packet *d6_pkt, unsigned d6_pkt_size,
129 struct in6_addr *src_ipv6, int source_port,
Denys Vlasenkoed898ed2017-03-27 22:32:44 +0200130 struct in6_addr *dst_ipv6, int dest_port,
131 int ifindex)
Denys Vlasenko9ba75042011-11-07 15:55:39 +0100132{
133 struct sockaddr_in6 sa;
134 int fd;
135 int result = -1;
136 const char *msg;
137
138 fd = socket(PF_INET6, SOCK_DGRAM, IPPROTO_UDP);
139 if (fd < 0) {
140 msg = "socket(%s)";
141 goto ret_msg;
142 }
143 setsockopt_reuseaddr(fd);
144
145 memset(&sa, 0, sizeof(sa));
146 sa.sin6_family = AF_INET6;
147 sa.sin6_port = htons(source_port);
148 sa.sin6_addr = *src_ipv6; /* struct copy */
149 if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) == -1) {
150 msg = "bind(%s)";
151 goto ret_close;
152 }
153
154 memset(&sa, 0, sizeof(sa));
155 sa.sin6_family = AF_INET6;
156 sa.sin6_port = htons(dest_port);
157 sa.sin6_addr = *dst_ipv6; /* struct copy */
Denys Vlasenkoed898ed2017-03-27 22:32:44 +0200158 sa.sin6_scope_id = ifindex;
Denys Vlasenko9ba75042011-11-07 15:55:39 +0100159 if (connect(fd, (struct sockaddr *)&sa, sizeof(sa)) == -1) {
160 msg = "connect";
161 goto ret_close;
162 }
163
164 d6_dump_packet(d6_pkt);
165 result = safe_write(fd, d6_pkt, d6_pkt_size);
166 msg = "write";
167 ret_close:
168 close(fd);
169 if (result < 0) {
170 ret_msg:
171 bb_perror_msg(msg, "UDP");
172 }
173 return result;
174}