/* dnsmasq is Copyright (c) 2000-2009 Simon Kelley This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 dated June, 1991, or (at your option) version 3 dated 29 June, 2007. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "dnsmasq.h" #if defined(HAVE_BSD_NETWORK) || defined(HAVE_SOLARIS_NETWORK) static struct iovec ifconf = { .iov_base = NULL, .iov_len = 0 }; static struct iovec ifreq = { .iov_base = NULL, .iov_len = 0 }; int iface_enumerate(void *parm, int (*ipv4_callback)(), int (*ipv6_callback)()) { char *ptr; struct ifreq *ifr; struct ifconf ifc; int fd, errsav, ret = 0; int lastlen = 0; size_t len = 0; if ((fd = socket(PF_INET, SOCK_DGRAM, 0)) == -1) return 0; while(1) { len += 10*sizeof(struct ifreq); if (!expand_buf(&ifconf, len)) goto err; ifc.ifc_len = len; ifc.ifc_buf = ifconf.iov_base; if (ioctl(fd, SIOCGIFCONF, &ifc) == -1) { if (errno != EINVAL || lastlen != 0) goto err; } else { if (ifc.ifc_len == lastlen) break; /* got a big enough buffer now */ lastlen = ifc.ifc_len; } } for (ptr = ifc.ifc_buf; ptr < (char *)(ifc.ifc_buf + ifc.ifc_len); ptr += len) { /* subsequent entries may not be aligned, so copy into an aligned buffer to avoid nasty complaints about unaligned accesses. */ len = sizeof(struct ifreq); #ifdef HAVE_SOCKADDR_SA_LEN ifr = (struct ifreq *)ptr; if (ifr->ifr_addr.sa_len > sizeof(ifr->ifr_ifru)) len = ifr->ifr_addr.sa_len + offsetof(struct ifreq, ifr_ifru); #endif if (!expand_buf(&ifreq, len)) goto err; ifr = (struct ifreq *)ifreq.iov_base; memcpy(ifr, ptr, len); if (ifr->ifr_addr.sa_family == AF_INET && ipv4_callback) { struct in_addr addr, netmask, broadcast; broadcast.s_addr = 0; addr = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr; if (ioctl(fd, SIOCGIFNETMASK, ifr) == -1) continue; netmask = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr; if (ioctl(fd, SIOCGIFBRDADDR, ifr) != -1) broadcast = ((struct sockaddr_in *) &ifr->ifr_addr)->sin_addr; if (!((*ipv4_callback)(addr, (int)if_nametoindex(ifr->ifr_name), netmask, broadcast, parm))) goto err; } #ifdef HAVE_IPV6 else if (ifr->ifr_addr.sa_family == AF_INET6 && ipv6_callback) { struct in6_addr *addr = &((struct sockaddr_in6 *)&ifr->ifr_addr)->sin6_addr; /* voodoo to clear interface field in address */ if (!(daemon->options & OPT_NOWILD) && IN6_IS_ADDR_LINKLOCAL(addr)) { addr->s6_addr[2] = 0; addr->s6_addr[3] = 0; } if (!((*ipv6_callback)(addr, (int)((struct sockaddr_in6 *)&ifr->ifr_addr)->sin6_scope_id, (int)if_nametoindex(ifr->ifr_name), parm))) goto err; } #endif } ret = 1; err: errsav = errno; close(fd); errno = errsav; return ret; } #endif #if defined(HAVE_BSD_NETWORK) && defined(HAVE_DHCP) #include void init_bpf(void) { int i = 0; while (1) { /* useful size which happens to be sufficient */ if (expand_buf(&ifreq, sizeof(struct ifreq))) { sprintf(ifreq.iov_base, "/dev/bpf%d", i++); if ((daemon->dhcp_raw_fd = open(ifreq.iov_base, O_RDWR, 0)) != -1) return; } if (errno != EBUSY) die(_("cannot create DHCP BPF socket: %s"), NULL, EC_BADNET); } } void send_via_bpf(struct dhcp_packet *mess, size_t len, struct in_addr iface_addr, struct ifreq *ifr) { /* Hairy stuff, packet either has to go to the net broadcast or the destination can't reply to ARP yet, but we do know the physical address. Build the packet by steam, and send directly, bypassing the kernel IP stack */ struct ether_header ether; struct ip ip; struct udphdr { u16 uh_sport; /* source port */ u16 uh_dport; /* destination port */ u16 uh_ulen; /* udp length */ u16 uh_sum; /* udp checksum */ } udp; u32 i, sum; struct iovec iov[4]; /* Only know how to do ethernet on *BSD */ if (mess->htype != ARPHRD_ETHER || mess->hlen != ETHER_ADDR_LEN) { my_syslog(MS_DHCP | LOG_WARNING, _("DHCP request for unsupported hardware type (%d) received on %s"), mess->htype, ifr->ifr_name); return; } ifr->ifr_addr.sa_family = AF_LINK; if (ioctl(daemon->dhcpfd, SIOCGIFADDR, ifr) < 0) return; memcpy(ether.ether_shost, LLADDR((struct sockaddr_dl *)&ifr->ifr_addr), ETHER_ADDR_LEN); ether.ether_type = htons(ETHERTYPE_IP); if (ntohs(mess->flags) & 0x8000) { memset(ether.ether_dhost, 255, ETHER_ADDR_LEN); ip.ip_dst.s_addr = INADDR_BROADCAST; } else { memcpy(ether.ether_dhost, mess->chaddr, ETHER_ADDR_LEN); ip.ip_dst.s_addr = mess->yiaddr.s_addr; } ip.ip_p = IPPROTO_UDP; ip.ip_src.s_addr = iface_addr.s_addr; ip.ip_len = htons(sizeof(struct ip) + sizeof(struct udphdr) + len) ; ip.ip_hl = sizeof(struct ip) / 4; ip.ip_v = IPVERSION; ip.ip_tos = 0; ip.ip_id = htons(0); ip.ip_off = htons(0x4000); /* don't fragment */ ip.ip_ttl = IPDEFTTL; ip.ip_sum = 0; for (sum = 0, i = 0; i < sizeof(struct ip) / 2; i++) sum += ((u16 *)&ip)[i]; while (sum>>16) sum = (sum & 0xffff) + (sum >> 16); ip.ip_sum = (sum == 0xffff) ? sum : ~sum; udp.uh_sport = htons(daemon->dhcp_server_port); udp.uh_dport = htons(daemon->dhcp_client_port); if (len & 1) ((char *)mess)[len] = 0; /* for checksum, in case length is odd. */ udp.uh_sum = 0; udp.uh_ulen = sum = htons(sizeof(struct udphdr) + len); sum += htons(IPPROTO_UDP); sum += ip.ip_src.s_addr & 0xffff; sum += (ip.ip_src.s_addr >> 16) & 0xffff; sum += ip.ip_dst.s_addr & 0xffff; sum += (ip.ip_dst.s_addr >> 16) & 0xffff; for (i = 0; i < sizeof(struct udphdr)/2; i++) sum += ((u16 *)&udp)[i]; for (i = 0; i < (len + 1) / 2; i++) sum += ((u16 *)mess)[i]; while (sum>>16) sum = (sum & 0xffff) + (sum >> 16); udp.uh_sum = (sum == 0xffff) ? sum : ~sum; ioctl(daemon->dhcp_raw_fd, BIOCSETIF, ifr); iov[0].iov_base = ðer; iov[0].iov_len = sizeof(ether); iov[1].iov_base = &ip; iov[1].iov_len = sizeof(ip); iov[2].iov_base = &udp; iov[2].iov_len = sizeof(udp); iov[3].iov_base = mess; iov[3].iov_len = len; while (writev(daemon->dhcp_raw_fd, iov, 4) == -1 && retry_send()); } #endif