yuezonghe | 824eb0c | 2024-06-27 02:32:26 -0700 | [diff] [blame^] | 1 | /* vi: set sw=4 ts=4: */ |
| 2 | /* |
| 3 | * Packet ops |
| 4 | * |
| 5 | * Rewrite by Russ Dill <Russ.Dill@asu.edu> July 2001 |
| 6 | * |
| 7 | * Licensed under GPLv2, see file LICENSE in this source tree. |
| 8 | */ |
| 9 | #include "common.h" |
| 10 | #include "dhcpd.h" |
| 11 | #include <netinet/in.h> |
| 12 | #include <netinet/if_ether.h> |
| 13 | #include <netpacket/packet.h> |
| 14 | |
| 15 | void FAST_FUNC udhcp_init_header(struct dhcp_packet *packet, char type) |
| 16 | { |
| 17 | memset(packet, 0, sizeof(*packet)); |
| 18 | packet->op = BOOTREQUEST; /* if client to a server */ |
| 19 | switch (type) { |
| 20 | case DHCPOFFER: |
| 21 | case DHCPACK: |
| 22 | case DHCPNAK: |
| 23 | packet->op = BOOTREPLY; /* if server to client */ |
| 24 | } |
| 25 | packet->htype = 1; /* ethernet */ |
| 26 | packet->hlen = 6; |
| 27 | packet->cookie = htonl(DHCP_MAGIC); |
| 28 | if (DHCP_END != 0) |
| 29 | packet->options[0] = DHCP_END; |
| 30 | udhcp_add_simple_option(packet, DHCP_MESSAGE_TYPE, type); |
| 31 | } |
| 32 | |
| 33 | #if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 2 |
| 34 | void FAST_FUNC udhcp_dump_packet(struct dhcp_packet *packet) |
| 35 | { |
| 36 | char buf[sizeof(packet->chaddr)*2 + 1]; |
| 37 | |
| 38 | if (dhcp_verbose < 2) |
| 39 | return; |
| 40 | |
| 41 | bb_info_msg( |
| 42 | //" op %x" |
| 43 | //" htype %x" |
| 44 | " hlen %x" |
| 45 | //" hops %x" |
| 46 | " xid %x" |
| 47 | //" secs %x" |
| 48 | //" flags %x" |
| 49 | " ciaddr %x" |
| 50 | " yiaddr %x" |
| 51 | " siaddr %x" |
| 52 | " giaddr %x" |
| 53 | //" chaddr %s" |
| 54 | //" sname %s" |
| 55 | //" file %s" |
| 56 | //" cookie %x" |
| 57 | //" options %s" |
| 58 | //, packet->op |
| 59 | //, packet->htype |
| 60 | , packet->hlen |
| 61 | //, packet->hops |
| 62 | , packet->xid |
| 63 | //, packet->secs |
| 64 | //, packet->flags |
| 65 | , packet->ciaddr |
| 66 | , packet->yiaddr |
| 67 | , packet->siaddr_nip |
| 68 | , packet->gateway_nip |
| 69 | //, packet->chaddr[16] |
| 70 | //, packet->sname[64] |
| 71 | //, packet->file[128] |
| 72 | //, packet->cookie |
| 73 | //, packet->options[] |
| 74 | ); |
| 75 | *bin2hex(buf, (void *) packet->chaddr, sizeof(packet->chaddr)) = '\0'; |
| 76 | bb_info_msg(" chaddr %s", buf); |
| 77 | } |
| 78 | #endif |
| 79 | |
| 80 | /* Read a packet from socket fd, return -1 on read error, -2 on packet error */ |
| 81 | int FAST_FUNC udhcp_recv_kernel_packet(struct dhcp_packet *packet, int fd) |
| 82 | { |
| 83 | int bytes; |
| 84 | |
| 85 | memset(packet, 0, sizeof(*packet)); |
| 86 | bytes = safe_read(fd, packet, sizeof(*packet)); |
| 87 | if (bytes < 0) { |
| 88 | log1("Packet read error, ignoring"); |
| 89 | return bytes; /* returns -1 */ |
| 90 | } |
| 91 | |
| 92 | if (bytes < offsetof(struct dhcp_packet, options) |
| 93 | || packet->cookie != htonl(DHCP_MAGIC) |
| 94 | ) { |
| 95 | bb_info_msg("Packet with bad magic, ignoring"); |
| 96 | return -2; |
| 97 | } |
| 98 | log1("Received a packet"); |
| 99 | udhcp_dump_packet(packet); |
| 100 | |
| 101 | return bytes; |
| 102 | } |
| 103 | |
| 104 | /* Construct a ip/udp header for a packet, send packet */ |
| 105 | int FAST_FUNC udhcp_send_raw_packet(struct dhcp_packet *dhcp_pkt, |
| 106 | uint32_t source_nip, int source_port, |
| 107 | uint32_t dest_nip, int dest_port, const uint8_t *dest_arp, |
| 108 | int ifindex) |
| 109 | { |
| 110 | struct sockaddr_ll dest_sll; |
| 111 | struct ip_udp_dhcp_packet packet; |
| 112 | unsigned padding; |
| 113 | int fd; |
| 114 | int result = -1; |
| 115 | const char *msg; |
| 116 | |
| 117 | fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP)); |
| 118 | if (fd < 0) { |
| 119 | msg = "socket(%s)"; |
| 120 | goto ret_msg; |
| 121 | } |
| 122 | |
| 123 | memset(&dest_sll, 0, sizeof(dest_sll)); |
| 124 | memset(&packet, 0, offsetof(struct ip_udp_dhcp_packet, data)); |
| 125 | packet.data = *dhcp_pkt; /* struct copy */ |
| 126 | |
| 127 | dest_sll.sll_family = AF_PACKET; |
| 128 | dest_sll.sll_protocol = htons(ETH_P_IP); |
| 129 | dest_sll.sll_ifindex = ifindex; |
| 130 | dest_sll.sll_halen = 6; |
| 131 | memcpy(dest_sll.sll_addr, dest_arp, 6); |
| 132 | |
| 133 | if (bind(fd, (struct sockaddr *)&dest_sll, sizeof(dest_sll)) < 0) { |
| 134 | msg = "bind(%s)"; |
| 135 | goto ret_close; |
| 136 | } |
| 137 | |
| 138 | /* We were sending full-sized DHCP packets (zero padded), |
| 139 | * but some badly configured servers were seen dropping them. |
| 140 | * Apparently they drop all DHCP packets >576 *ethernet* octets big, |
| 141 | * whereas they may only drop packets >576 *IP* octets big |
| 142 | * (which for typical Ethernet II means 590 octets: 6+6+2 + 576). |
| 143 | * |
| 144 | * In order to work with those buggy servers, |
| 145 | * we truncate packets after end option byte. |
| 146 | */ |
| 147 | padding = DHCP_OPTIONS_BUFSIZE - 1 - udhcp_end_option(packet.data.options); |
| 148 | |
| 149 | packet.ip.protocol = IPPROTO_UDP; |
| 150 | packet.ip.saddr = source_nip; |
| 151 | packet.ip.daddr = dest_nip; |
| 152 | packet.udp.source = htons(source_port); |
| 153 | packet.udp.dest = htons(dest_port); |
| 154 | /* size, excluding IP header: */ |
| 155 | packet.udp.len = htons(UDP_DHCP_SIZE - padding); |
| 156 | /* for UDP checksumming, ip.len is set to UDP packet len */ |
| 157 | packet.ip.tot_len = packet.udp.len; |
| 158 | packet.udp.check = inet_cksum((uint16_t *)&packet, |
| 159 | IP_UDP_DHCP_SIZE - padding); |
| 160 | /* but for sending, it is set to IP packet len */ |
| 161 | packet.ip.tot_len = htons(IP_UDP_DHCP_SIZE - padding); |
| 162 | packet.ip.ihl = sizeof(packet.ip) >> 2; |
| 163 | packet.ip.version = IPVERSION; |
| 164 | packet.ip.ttl = IPDEFTTL; |
| 165 | packet.ip.check = inet_cksum((uint16_t *)&packet.ip, sizeof(packet.ip)); |
| 166 | |
| 167 | udhcp_dump_packet(dhcp_pkt); |
| 168 | result = sendto(fd, &packet, IP_UDP_DHCP_SIZE - padding, /*flags:*/ 0, |
| 169 | (struct sockaddr *) &dest_sll, sizeof(dest_sll)); |
| 170 | msg = "sendto"; |
| 171 | ret_close: |
| 172 | close(fd); |
| 173 | if (result < 0) { |
| 174 | ret_msg: |
| 175 | bb_perror_msg(msg, "PACKET"); |
| 176 | } |
| 177 | return result; |
| 178 | } |
| 179 | |
| 180 | /* Let the kernel do all the work for packet generation */ |
| 181 | int FAST_FUNC udhcp_send_kernel_packet(struct dhcp_packet *dhcp_pkt, |
| 182 | uint32_t source_nip, int source_port, |
| 183 | uint32_t dest_nip, int dest_port) |
| 184 | { |
| 185 | struct sockaddr_in sa; |
| 186 | unsigned padding; |
| 187 | int fd; |
| 188 | int result = -1; |
| 189 | const char *msg; |
| 190 | |
| 191 | fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); |
| 192 | if (fd < 0) { |
| 193 | msg = "socket(%s)"; |
| 194 | goto ret_msg; |
| 195 | } |
| 196 | setsockopt_reuseaddr(fd); |
| 197 | |
| 198 | memset(&sa, 0, sizeof(sa)); |
| 199 | sa.sin_family = AF_INET; |
| 200 | sa.sin_port = htons(source_port); |
| 201 | sa.sin_addr.s_addr = source_nip; |
| 202 | if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) == -1) { |
| 203 | msg = "bind(%s)"; |
| 204 | goto ret_close; |
| 205 | } |
| 206 | |
| 207 | memset(&sa, 0, sizeof(sa)); |
| 208 | sa.sin_family = AF_INET; |
| 209 | sa.sin_port = htons(dest_port); |
| 210 | sa.sin_addr.s_addr = dest_nip; |
| 211 | if (connect(fd, (struct sockaddr *)&sa, sizeof(sa)) == -1) { |
| 212 | msg = "connect"; |
| 213 | goto ret_close; |
| 214 | } |
| 215 | |
| 216 | udhcp_dump_packet(dhcp_pkt); |
| 217 | padding = DHCP_OPTIONS_BUFSIZE - 1 - udhcp_end_option(dhcp_pkt->options); |
| 218 | result = safe_write(fd, dhcp_pkt, DHCP_SIZE - padding); |
| 219 | msg = "write"; |
| 220 | ret_close: |
| 221 | close(fd); |
| 222 | if (result < 0) { |
| 223 | ret_msg: |
| 224 | bb_perror_msg(msg, "UDP"); |
| 225 | } |
| 226 | return result; |
| 227 | } |