1
2
3
4
5
6
7
8
9
10#include <asm/eth-raw-os.h>
11#include <errno.h>
12#include <fcntl.h>
13#include <net/if.h>
14#include <netinet/in.h>
15#include <netinet/ip.h>
16#include <netinet/udp.h>
17#include <stdio.h>
18#include <stdlib.h>
19#include <string.h>
20#include <sys/types.h>
21#include <sys/ioctl.h>
22#include <sys/socket.h>
23#include <unistd.h>
24
25#include <arpa/inet.h>
26#include <linux/if_ether.h>
27#include <linux/if_packet.h>
28
29static int _raw_packet_start(const char *ifname, unsigned char *ethmac,
30 struct eth_sandbox_raw_priv *priv)
31{
32 struct sockaddr_ll *device;
33 struct packet_mreq mr;
34 int ret;
35 int flags;
36
37
38 priv->device = malloc(sizeof(struct sockaddr_ll));
39 if (priv->device == NULL)
40 return -ENOMEM;
41 device = priv->device;
42 memset(device, 0, sizeof(struct sockaddr_ll));
43 device->sll_ifindex = if_nametoindex(ifname);
44 device->sll_family = AF_PACKET;
45 memcpy(device->sll_addr, ethmac, 6);
46 device->sll_halen = htons(6);
47
48
49 priv->sd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
50 if (priv->sd < 0) {
51 printf("Failed to open socket: %d %s\n", errno,
52 strerror(errno));
53 return -errno;
54 }
55
56 ret = setsockopt(priv->sd, SOL_SOCKET, SO_BINDTODEVICE, ifname,
57 strlen(ifname) + 1);
58 if (ret < 0) {
59 printf("Failed to bind to '%s': %d %s\n", ifname, errno,
60 strerror(errno));
61 return -errno;
62 }
63
64
65 flags = fcntl(priv->sd, F_GETFL, 0);
66 fcntl(priv->sd, F_SETFL, flags | O_NONBLOCK);
67
68
69 mr.mr_ifindex = device->sll_ifindex;
70 mr.mr_type = PACKET_MR_PROMISC;
71 ret = setsockopt(priv->sd, SOL_PACKET, PACKET_ADD_MEMBERSHIP,
72 &mr, sizeof(mr));
73 if (ret < 0) {
74 struct ifreq ifr;
75
76 printf("Failed to set promiscuous mode: %d %s\n"
77 "Falling back to the old \"flags\" way...\n",
78 errno, strerror(errno));
79 if (strlen(ifname) >= IFNAMSIZ) {
80 printf("Interface name %s is too long.\n", ifname);
81 return -EINVAL;
82 }
83 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
84 if (ioctl(priv->sd, SIOCGIFFLAGS, &ifr) < 0) {
85 printf("Failed to read flags: %d %s\n", errno,
86 strerror(errno));
87 return -errno;
88 }
89 ifr.ifr_flags |= IFF_PROMISC;
90 if (ioctl(priv->sd, SIOCSIFFLAGS, &ifr) < 0) {
91 printf("Failed to write flags: %d %s\n", errno,
92 strerror(errno));
93 return -errno;
94 }
95 }
96 return 0;
97}
98
99static int _local_inet_start(struct eth_sandbox_raw_priv *priv)
100{
101 struct sockaddr_in *device;
102 int ret;
103 int flags;
104 int one = 1;
105
106
107 priv->device = malloc(sizeof(struct sockaddr_in));
108 if (priv->device == NULL)
109 return -ENOMEM;
110 device = priv->device;
111 memset(device, 0, sizeof(struct sockaddr_in));
112 device->sin_family = AF_INET;
113 device->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
114
115
116
117
118
119
120
121 priv->sd = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
122 if (priv->sd < 0) {
123 printf("Failed to open socket: %d %s\n", errno,
124 strerror(errno));
125 return -errno;
126 }
127
128
129 flags = fcntl(priv->sd, F_GETFL, 0);
130 fcntl(priv->sd, F_SETFL, flags | O_NONBLOCK);
131
132
133 ret = setsockopt(priv->sd, IPPROTO_IP, IP_HDRINCL, &one,
134 sizeof(one));
135 if (ret < 0) {
136 printf("Failed to set header include option: %d %s\n", errno,
137 strerror(errno));
138 return -errno;
139 }
140 priv->local_bind_sd = -1;
141 priv->local_bind_udp_port = 0;
142 return 0;
143}
144
145int sandbox_eth_raw_os_start(const char *ifname, unsigned char *ethmac,
146 struct eth_sandbox_raw_priv *priv)
147{
148 if (priv->local)
149 return _local_inet_start(priv);
150 else
151 return _raw_packet_start(ifname, ethmac, priv);
152}
153
154int sandbox_eth_raw_os_send(void *packet, int length,
155 struct eth_sandbox_raw_priv *priv)
156{
157 int retval;
158 struct udphdr *udph = packet + sizeof(struct iphdr);
159
160 if (!priv->sd || !priv->device)
161 return -EINVAL;
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176 if (priv->local && (priv->local_bind_sd == -1 ||
177 priv->local_bind_udp_port != udph->source)) {
178 struct iphdr *iph = packet;
179 struct sockaddr_in addr;
180
181 if (priv->local_bind_sd != -1)
182 close(priv->local_bind_sd);
183
184
185 priv->local_bind_sd = socket(AF_INET, SOCK_DGRAM, 0);
186 if (priv->local_bind_sd < 0) {
187 printf("Failed to open bind sd: %d %s\n", errno,
188 strerror(errno));
189 return -errno;
190 }
191 priv->local_bind_udp_port = udph->source;
192
193
194
195
196
197
198 addr.sin_family = AF_INET;
199 addr.sin_port = udph->source;
200 addr.sin_addr.s_addr = iph->saddr;
201 retval = bind(priv->local_bind_sd, (struct sockaddr *)&addr,
202 sizeof(addr));
203 if (retval < 0)
204 printf("Failed to bind: %d %s\n", errno,
205 strerror(errno));
206 }
207
208 retval = sendto(priv->sd, packet, length, 0,
209 (struct sockaddr *)priv->device,
210 sizeof(struct sockaddr_ll));
211 if (retval < 0) {
212 printf("Failed to send packet: %d %s\n", errno,
213 strerror(errno));
214 return -errno;
215 }
216 return retval;
217}
218
219int sandbox_eth_raw_os_recv(void *packet, int *length,
220 const struct eth_sandbox_raw_priv *priv)
221{
222 int retval;
223 int saddr_size;
224
225 if (!priv->sd || !priv->device)
226 return -EINVAL;
227 saddr_size = sizeof(struct sockaddr);
228 retval = recvfrom(priv->sd, packet, 1536, 0,
229 (struct sockaddr *)priv->device,
230 (socklen_t *)&saddr_size);
231 *length = 0;
232 if (retval >= 0) {
233 *length = retval;
234 return 0;
235 }
236
237 if (errno == EAGAIN)
238 return 0;
239 return -errno;
240}
241
242void sandbox_eth_raw_os_stop(struct eth_sandbox_raw_priv *priv)
243{
244 free(priv->device);
245 priv->device = NULL;
246 close(priv->sd);
247 priv->sd = -1;
248 if (priv->local) {
249 if (priv->local_bind_sd != -1)
250 close(priv->local_bind_sd);
251 priv->local_bind_sd = -1;
252 priv->local_bind_udp_port = 0;
253 }
254}
255