blob: e59b96be5fb8b298f978d04b3bb96122ec7da11a [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0
Joe Hershbergera346ca72015-03-22 17:09:21 -05002/*
Joe Hershbergerac132702018-07-02 14:47:51 -05003 * Copyright (c) 2015-2018 National Instruments
4 * Copyright (c) 2015-2018 Joe Hershberger <joe.hershberger@ni.com>
Joe Hershbergera346ca72015-03-22 17:09:21 -05005 */
6
Heinrich Schuchardt8e723742022-01-21 18:01:23 +01007#define _GNU_SOURCE
8
Joe Hershbergera346ca72015-03-22 17:09:21 -05009#include <asm/eth-raw-os.h>
10#include <errno.h>
11#include <fcntl.h>
12#include <net/if.h>
13#include <netinet/in.h>
Joe Hershberger22f68522015-03-22 17:09:23 -050014#include <netinet/ip.h>
15#include <netinet/udp.h>
Simon Glassfc1f58a2018-11-15 18:44:06 -070016#include <stdbool.h>
Joe Hershbergera346ca72015-03-22 17:09:21 -050017#include <stdio.h>
18#include <stdlib.h>
19#include <string.h>
20#include <sys/types.h>
21#include <sys/ioctl.h>
22#include <sys/socket.h>
23#include <unistd.h>
24
Joe Hershberger22f68522015-03-22 17:09:23 -050025#include <arpa/inet.h>
Joe Hershbergera346ca72015-03-22 17:09:21 -050026#include <linux/if_ether.h>
27#include <linux/if_packet.h>
28
Simon Glassfc1f58a2018-11-15 18:44:06 -070029#include <os.h>
30
Joe Hershbergerf40a31e2018-07-02 14:47:54 -050031struct sandbox_eth_raw_if_nameindex *sandbox_eth_raw_if_nameindex(void)
32{
33 return (struct sandbox_eth_raw_if_nameindex *)if_nameindex();
34}
35
36void sandbox_eth_raw_if_freenameindex(struct sandbox_eth_raw_if_nameindex *ptr)
37{
38 if_freenameindex((struct if_nameindex *)ptr);
39}
40
Joe Hershbergerac132702018-07-02 14:47:51 -050041int sandbox_eth_raw_os_is_local(const char *ifname)
42{
43 int fd = socket(AF_INET, SOCK_DGRAM, 0);
44 struct ifreq ifr;
45 int ret = 0;
46
47 if (fd < 0)
48 return -errno;
49 memset(&ifr, 0, sizeof(ifr));
50 strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
51 ret = ioctl(fd, SIOCGIFFLAGS, &ifr);
52 if (ret < 0) {
53 ret = -errno;
54 goto out;
55 }
56 ret = !!(ifr.ifr_flags & IFF_LOOPBACK);
57out:
Heinrich Schuchardt6eec4b02020-10-27 20:29:21 +010058 os_close(fd);
Joe Hershbergerac132702018-07-02 14:47:51 -050059 return ret;
60}
61
Joe Hershbergerc9e2caf2018-07-02 14:47:52 -050062int sandbox_eth_raw_os_idx_to_name(struct eth_sandbox_raw_priv *priv)
63{
64 if (!if_indextoname(priv->host_ifindex, priv->host_ifname))
65 return -errno;
66 return 0;
67}
68
Joe Hershberger8c7988b2018-07-02 14:47:50 -050069static int _raw_packet_start(struct eth_sandbox_raw_priv *priv,
70 unsigned char *ethmac)
Joe Hershbergera346ca72015-03-22 17:09:21 -050071{
72 struct sockaddr_ll *device;
73 struct packet_mreq mr;
74 int ret;
75 int flags;
76
77 /* Prepare device struct */
Joe Hershberger50ed0ef2018-07-02 14:47:47 -050078 priv->local_bind_sd = -1;
Simon Glass0db1b432020-02-03 07:36:02 -070079 priv->device = malloc(sizeof(struct sockaddr_ll));
Joe Hershbergera346ca72015-03-22 17:09:21 -050080 if (priv->device == NULL)
81 return -ENOMEM;
82 device = priv->device;
83 memset(device, 0, sizeof(struct sockaddr_ll));
Joe Hershberger8c7988b2018-07-02 14:47:50 -050084 device->sll_ifindex = if_nametoindex(priv->host_ifname);
85 priv->host_ifindex = device->sll_ifindex;
Joe Hershbergera346ca72015-03-22 17:09:21 -050086 device->sll_family = AF_PACKET;
87 memcpy(device->sll_addr, ethmac, 6);
88 device->sll_halen = htons(6);
89
90 /* Open socket */
91 priv->sd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
92 if (priv->sd < 0) {
93 printf("Failed to open socket: %d %s\n", errno,
94 strerror(errno));
95 return -errno;
96 }
97 /* Bind to the specified interface */
Joe Hershberger8c7988b2018-07-02 14:47:50 -050098 ret = setsockopt(priv->sd, SOL_SOCKET, SO_BINDTODEVICE,
99 priv->host_ifname, strlen(priv->host_ifname) + 1);
Joe Hershbergera346ca72015-03-22 17:09:21 -0500100 if (ret < 0) {
Joe Hershberger8c7988b2018-07-02 14:47:50 -0500101 printf("Failed to bind to '%s': %d %s\n", priv->host_ifname,
102 errno, strerror(errno));
Joe Hershbergera346ca72015-03-22 17:09:21 -0500103 return -errno;
104 }
105
106 /* Make the socket non-blocking */
107 flags = fcntl(priv->sd, F_GETFL, 0);
108 fcntl(priv->sd, F_SETFL, flags | O_NONBLOCK);
109
110 /* Enable promiscuous mode to receive responses meant for us */
111 mr.mr_ifindex = device->sll_ifindex;
112 mr.mr_type = PACKET_MR_PROMISC;
113 ret = setsockopt(priv->sd, SOL_PACKET, PACKET_ADD_MEMBERSHIP,
114 &mr, sizeof(mr));
115 if (ret < 0) {
116 struct ifreq ifr;
117
118 printf("Failed to set promiscuous mode: %d %s\n"
119 "Falling back to the old \"flags\" way...\n",
120 errno, strerror(errno));
Joe Hershberger8c7988b2018-07-02 14:47:50 -0500121 if (strlen(priv->host_ifname) >= IFNAMSIZ) {
122 printf("Interface name %s is too long.\n",
123 priv->host_ifname);
Tom Riniab971e12015-12-07 22:26:34 -0500124 return -EINVAL;
125 }
Joe Hershberger8c7988b2018-07-02 14:47:50 -0500126 strncpy(ifr.ifr_name, priv->host_ifname, IFNAMSIZ);
Joe Hershbergera346ca72015-03-22 17:09:21 -0500127 if (ioctl(priv->sd, SIOCGIFFLAGS, &ifr) < 0) {
128 printf("Failed to read flags: %d %s\n", errno,
129 strerror(errno));
130 return -errno;
131 }
132 ifr.ifr_flags |= IFF_PROMISC;
133 if (ioctl(priv->sd, SIOCSIFFLAGS, &ifr) < 0) {
134 printf("Failed to write flags: %d %s\n", errno,
135 strerror(errno));
136 return -errno;
137 }
138 }
139 return 0;
140}
141
Joe Hershberger22f68522015-03-22 17:09:23 -0500142static int _local_inet_start(struct eth_sandbox_raw_priv *priv)
143{
144 struct sockaddr_in *device;
145 int ret;
146 int flags;
147 int one = 1;
148
149 /* Prepare device struct */
Joe Hershberger50ed0ef2018-07-02 14:47:47 -0500150 priv->local_bind_sd = -1;
151 priv->local_bind_udp_port = 0;
Simon Glass0db1b432020-02-03 07:36:02 -0700152 priv->device = malloc(sizeof(struct sockaddr_in));
Joe Hershberger22f68522015-03-22 17:09:23 -0500153 if (priv->device == NULL)
154 return -ENOMEM;
155 device = priv->device;
156 memset(device, 0, sizeof(struct sockaddr_in));
157 device->sin_family = AF_INET;
158 device->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
159
160 /**
161 * Open socket
162 * Since we specify UDP here, any incoming ICMP packets will
163 * not be received, so things like ping will not work on this
164 * localhost interface.
165 */
166 priv->sd = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
167 if (priv->sd < 0) {
168 printf("Failed to open socket: %d %s\n", errno,
169 strerror(errno));
170 return -errno;
171 }
172
173 /* Make the socket non-blocking */
174 flags = fcntl(priv->sd, F_GETFL, 0);
175 fcntl(priv->sd, F_SETFL, flags | O_NONBLOCK);
176
177 /* Include the UDP/IP headers on send and receive */
178 ret = setsockopt(priv->sd, IPPROTO_IP, IP_HDRINCL, &one,
179 sizeof(one));
180 if (ret < 0) {
181 printf("Failed to set header include option: %d %s\n", errno,
182 strerror(errno));
183 return -errno;
184 }
Joe Hershberger22f68522015-03-22 17:09:23 -0500185 return 0;
186}
187
Joe Hershberger8c7988b2018-07-02 14:47:50 -0500188int sandbox_eth_raw_os_start(struct eth_sandbox_raw_priv *priv,
189 unsigned char *ethmac)
Joe Hershberger22f68522015-03-22 17:09:23 -0500190{
191 if (priv->local)
192 return _local_inet_start(priv);
193 else
Joe Hershberger8c7988b2018-07-02 14:47:50 -0500194 return _raw_packet_start(priv, ethmac);
Joe Hershberger22f68522015-03-22 17:09:23 -0500195}
196
Joe Hershbergera346ca72015-03-22 17:09:21 -0500197int sandbox_eth_raw_os_send(void *packet, int length,
Joe Hershberger22f68522015-03-22 17:09:23 -0500198 struct eth_sandbox_raw_priv *priv)
Joe Hershbergera346ca72015-03-22 17:09:21 -0500199{
200 int retval;
Joe Hershberger22f68522015-03-22 17:09:23 -0500201 struct udphdr *udph = packet + sizeof(struct iphdr);
Joe Hershbergera346ca72015-03-22 17:09:21 -0500202
Joe Hershberger97367df2018-07-02 14:47:44 -0500203 if (priv->sd < 0 || !priv->device)
Joe Hershbergera346ca72015-03-22 17:09:21 -0500204 return -EINVAL;
205
Joe Hershberger22f68522015-03-22 17:09:23 -0500206 /*
207 * This block of code came about when testing tftp on the localhost
208 * interface. When using the RAW AF_INET API, the network stack is still
209 * in play responding to incoming traffic based on open "ports". Since
210 * it is raw (at the IP layer, no Ethernet) the network stack tells the
211 * TFTP server that the port it responded to is closed. This causes the
212 * TFTP transfer to be aborted. This block of code inspects the outgoing
213 * packet as formulated by the u-boot network stack to determine the
214 * source port (that the TFTP server will send packets back to) and
215 * opens a typical UDP socket on that port, thus preventing the network
216 * stack from sending that ICMP message claiming that the port has no
217 * bound socket.
218 */
219 if (priv->local && (priv->local_bind_sd == -1 ||
220 priv->local_bind_udp_port != udph->source)) {
221 struct iphdr *iph = packet;
222 struct sockaddr_in addr;
223
224 if (priv->local_bind_sd != -1)
Heinrich Schuchardt6eec4b02020-10-27 20:29:21 +0100225 os_close(priv->local_bind_sd);
Joe Hershberger22f68522015-03-22 17:09:23 -0500226
227 /* A normal UDP socket is required to bind */
228 priv->local_bind_sd = socket(AF_INET, SOCK_DGRAM, 0);
229 if (priv->local_bind_sd < 0) {
230 printf("Failed to open bind sd: %d %s\n", errno,
231 strerror(errno));
232 return -errno;
233 }
234 priv->local_bind_udp_port = udph->source;
235
236 /**
237 * Bind the UDP port that we intend to use as our source port
238 * so that the kernel will not send an ICMP port unreachable
239 * message to the server
240 */
241 addr.sin_family = AF_INET;
242 addr.sin_port = udph->source;
243 addr.sin_addr.s_addr = iph->saddr;
Tom Rini71229092015-11-28 08:04:40 -0500244 retval = bind(priv->local_bind_sd, (struct sockaddr *)&addr,
245 sizeof(addr));
Joe Hershberger22f68522015-03-22 17:09:23 -0500246 if (retval < 0)
247 printf("Failed to bind: %d %s\n", errno,
248 strerror(errno));
249 }
250
Joe Hershbergera346ca72015-03-22 17:09:21 -0500251 retval = sendto(priv->sd, packet, length, 0,
252 (struct sockaddr *)priv->device,
253 sizeof(struct sockaddr_ll));
254 if (retval < 0) {
255 printf("Failed to send packet: %d %s\n", errno,
256 strerror(errno));
257 return -errno;
258 }
259 return retval;
260}
261
262int sandbox_eth_raw_os_recv(void *packet, int *length,
263 const struct eth_sandbox_raw_priv *priv)
264{
265 int retval;
266 int saddr_size;
267
Joe Hershberger97367df2018-07-02 14:47:44 -0500268 if (priv->sd < 0 || !priv->device)
Joe Hershbergera346ca72015-03-22 17:09:21 -0500269 return -EINVAL;
270 saddr_size = sizeof(struct sockaddr);
271 retval = recvfrom(priv->sd, packet, 1536, 0,
272 (struct sockaddr *)priv->device,
273 (socklen_t *)&saddr_size);
274 *length = 0;
275 if (retval >= 0) {
276 *length = retval;
277 return 0;
278 }
279 /* The socket is non-blocking, so expect EAGAIN when there is no data */
280 if (errno == EAGAIN)
281 return 0;
282 return -errno;
283}
284
285void sandbox_eth_raw_os_stop(struct eth_sandbox_raw_priv *priv)
286{
Simon Glass0db1b432020-02-03 07:36:02 -0700287 free(priv->device);
Joe Hershbergera346ca72015-03-22 17:09:21 -0500288 priv->device = NULL;
Heinrich Schuchardt6eec4b02020-10-27 20:29:21 +0100289 os_close(priv->sd);
Joe Hershbergera346ca72015-03-22 17:09:21 -0500290 priv->sd = -1;
Joe Hershberger22f68522015-03-22 17:09:23 -0500291 if (priv->local) {
292 if (priv->local_bind_sd != -1)
Heinrich Schuchardt6eec4b02020-10-27 20:29:21 +0100293 os_close(priv->local_bind_sd);
Joe Hershberger22f68522015-03-22 17:09:23 -0500294 priv->local_bind_sd = -1;
295 priv->local_bind_udp_port = 0;
296 }
Joe Hershbergera346ca72015-03-22 17:09:21 -0500297}