diff options
Diffstat (limited to 'common/socket.c')
-rw-r--r-- | common/socket.c | 1128 |
1 files changed, 1128 insertions, 0 deletions
diff --git a/common/socket.c b/common/socket.c new file mode 100644 index 0000000..a48404b --- /dev/null +++ b/common/socket.c @@ -0,0 +1,1128 @@ +/* socket.c + + BSD socket interface code... */ + +/* + * Copyright (c) 2004-2011 by Internet Systems Consortium, Inc. ("ISC") + * Copyright (c) 1995-2003 by Internet Software Consortium + * + * Permission to use, copy, modify, and distribute this software for any + * purpose with or without fee is hereby granted, provided that the above + * copyright notice and this permission notice appear in all copies. + * + * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES + * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF + * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR + * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES + * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN + * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT + * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. + * + * Internet Systems Consortium, Inc. + * 950 Charter Street + * Redwood City, CA 94063 + * <info@isc.org> + * https://www.isc.org/ + * + * This software has been written for Internet Systems Consortium + * by Ted Lemon in cooperation with Vixie Enterprises and Nominum, Inc. + * To learn more about Internet Systems Consortium, see + * ``https://www.isc.org/''. To learn more about Vixie Enterprises, + * see ``http://www.vix.com''. To learn more about Nominum, Inc., see + * ``http://www.nominum.com''. + */ + +/* SO_BINDTODEVICE support added by Elliot Poger (poger@leland.stanford.edu). + * This sockopt allows a socket to be bound to a particular interface, + * thus enabling the use of DHCPD on a multihomed host. + * If SO_BINDTODEVICE is defined in your system header files, the use of + * this sockopt will be automatically enabled. + * I have implemented it under Linux; other systems should be doable also. + */ + +#include "dhcpd.h" +#include <errno.h> +#include <sys/ioctl.h> +#include <sys/uio.h> +#include <sys/uio.h> + +#if defined(sun) && defined(USE_V4_PKTINFO) +#include <sys/sysmacros.h> +#include <net/if.h> +#include <sys/sockio.h> +#include <net/if_dl.h> +#endif + +#ifdef USE_SOCKET_FALLBACK +# if !defined (USE_SOCKET_SEND) +# define if_register_send if_register_fallback +# define send_packet send_fallback +# define if_reinitialize_send if_reinitialize_fallback +# endif +#endif + +#if defined(DHCPv6) +/* + * XXX: this is gross. we need to go back and overhaul the API for socket + * handling. + */ +static unsigned int global_v6_socket_references = 0; +static int global_v6_socket = -1; + +static void if_register_multicast(struct interface_info *info); +#endif + +/* + * We can use a single socket for AF_INET (similar to AF_INET6) on all + * interfaces configured for DHCP if the system has support for IP_PKTINFO + * and IP_RECVPKTINFO (for example Solaris 11). + */ +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) +static unsigned int global_v4_socket_references = 0; +static int global_v4_socket = -1; +#endif + +/* + * If we can't bind() to a specific interface, then we can only have + * a single socket. This variable insures that we don't try to listen + * on two sockets. + */ +#if !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK) +static int once = 0; +#endif /* !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK) */ + +/* Reinitializes the specified interface after an address change. This + is not required for packet-filter APIs. */ + +#if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK) +void if_reinitialize_send (info) + struct interface_info *info; +{ +#if 0 +#ifndef USE_SOCKET_RECEIVE + once = 0; + close (info -> wfdesc); +#endif + if_register_send (info); +#endif +} +#endif + +#ifdef USE_SOCKET_RECEIVE +void if_reinitialize_receive (info) + struct interface_info *info; +{ +#if 0 + once = 0; + close (info -> rfdesc); + if_register_receive (info); +#endif +} +#endif + +#if defined (USE_SOCKET_SEND) || \ + defined (USE_SOCKET_RECEIVE) || \ + defined (USE_SOCKET_FALLBACK) +/* Generic interface registration routine... */ +int +if_register_socket(struct interface_info *info, int family, + int *do_multicast) +{ + struct sockaddr_storage name; + int name_len; + int sock; + int flag; + int domain; +#ifdef DHCPv6 + struct sockaddr_in6 *addr6; +#endif + struct sockaddr_in *addr; + + /* INSIST((family == AF_INET) || (family == AF_INET6)); */ + +#if !defined(SO_BINDTODEVICE) && !defined(USE_FALLBACK) + /* Make sure only one interface is registered. */ + if (once) { + log_fatal ("The standard socket API can only support %s", + "hosts with a single network interface."); + } + once = 1; +#endif + + /* + * Set up the address we're going to bind to, depending on the + * address family. + */ + memset(&name, 0, sizeof(name)); + switch (family) { +#ifdef DHCPv6 + case AF_INET6: + addr6 = (struct sockaddr_in6 *)&name; + addr6->sin6_family = AF_INET6; + addr6->sin6_port = local_port; + /* XXX: What will happen to multicasts if this is nonzero? */ + memcpy(&addr6->sin6_addr, + &local_address6, + sizeof(addr6->sin6_addr)); +#ifdef HAVE_SA_LEN + addr6->sin6_len = sizeof(*addr6); +#endif + name_len = sizeof(*addr6); + domain = PF_INET6; + if ((info->flags & INTERFACE_STREAMS) == INTERFACE_UPSTREAM) { + *do_multicast = 0; + } + break; +#endif /* DHCPv6 */ + + case AF_INET: + default: + addr = (struct sockaddr_in *)&name; + addr->sin_family = AF_INET; + addr->sin_port = local_port; + memcpy(&addr->sin_addr, + &local_address, + sizeof(addr->sin_addr)); +#ifdef HAVE_SA_LEN + addr->sin_len = sizeof(*addr); +#endif + name_len = sizeof(*addr); + domain = PF_INET; + break; + } + + /* Make a socket... */ + sock = socket(domain, SOCK_DGRAM, IPPROTO_UDP); + if (sock < 0) { + log_fatal("Can't create dhcp socket: %m"); + } + + /* Set the REUSEADDR option so that we don't fail to start if + we're being restarted. */ + flag = 1; + if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, + (char *)&flag, sizeof(flag)) < 0) { + log_fatal("Can't set SO_REUSEADDR option on dhcp socket: %m"); + } + + /* Set the BROADCAST option so that we can broadcast DHCP responses. + We shouldn't do this for fallback devices, and we can detect that + a device is a fallback because it has no ifp structure. */ + if (info->ifp && + (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, + (char *)&flag, sizeof(flag)) < 0)) { + log_fatal("Can't set SO_BROADCAST option on dhcp socket: %m"); + } + +#if defined(DHCPv6) && defined(SO_REUSEPORT) + /* + * We only set SO_REUSEPORT on AF_INET6 sockets, so that multiple + * daemons can bind to their own sockets and get data for their + * respective interfaces. This does not (and should not) affect + * DHCPv4 sockets; we can't yet support BSD sockets well, much + * less multiple sockets. + */ + if (local_family == AF_INET6) { + flag = 1; + if (setsockopt(sock, SOL_SOCKET, SO_REUSEPORT, + (char *)&flag, sizeof(flag)) < 0) { + log_fatal("Can't set SO_REUSEPORT option on dhcp " + "socket: %m"); + } + } +#endif + + /* Bind the socket to this interface's IP address. */ + if (bind(sock, (struct sockaddr *)&name, name_len) < 0) { + log_error("Can't bind to dhcp address: %m"); + log_error("Please make sure there is no other dhcp server"); + log_error("running and that there's no entry for dhcp or"); + log_error("bootp in /etc/inetd.conf. Also make sure you"); + log_error("are not running HP JetAdmin software, which"); + log_fatal("includes a bootp server."); + } + +#if defined(SO_BINDTODEVICE) + /* Bind this socket to this interface. */ + if ((local_family != AF_INET6) && (info->ifp != NULL) && + setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, + (char *)(info -> ifp), sizeof(*(info -> ifp))) < 0) { + log_fatal("setsockopt: SO_BINDTODEVICE: %m"); + } +#endif + + /* IP_BROADCAST_IF instructs the kernel which interface to send + * IP packets whose destination address is 255.255.255.255. These + * will be treated as subnet broadcasts on the interface identified + * by ip address (info -> primary_address). This is only known to + * be defined in SCO system headers, and may not be defined in all + * releases. + */ +#if defined(SCO) && defined(IP_BROADCAST_IF) + if (info->address_count && + setsockopt(sock, IPPROTO_IP, IP_BROADCAST_IF, &info->addresses[0], + sizeof(info->addresses[0])) < 0) + log_fatal("Can't set IP_BROADCAST_IF on dhcp socket: %m"); +#endif + +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) + /* + * If we turn on IP_RECVPKTINFO we will be able to receive + * the interface index information of the received packet. + */ + if (family == AF_INET) { + int on = 1; + if (setsockopt(sock, IPPROTO_IP, IP_RECVPKTINFO, + &on, sizeof(on)) != 0) { + log_fatal("setsockopt: IPV_RECVPKTINFO: %m"); + } + } +#endif + +#ifdef DHCPv6 + /* + * If we turn on IPV6_PKTINFO, we will be able to receive + * additional information, such as the destination IP address. + * We need this to spot unicast packets. + */ + if (family == AF_INET6) { + int on = 1; +#ifdef IPV6_RECVPKTINFO + /* RFC3542 */ + if (setsockopt(sock, IPPROTO_IPV6, IPV6_RECVPKTINFO, + &on, sizeof(on)) != 0) { + log_fatal("setsockopt: IPV6_RECVPKTINFO: %m"); + } +#else + /* RFC2292 */ + if (setsockopt(sock, IPPROTO_IPV6, IPV6_PKTINFO, + &on, sizeof(on)) != 0) { + log_fatal("setsockopt: IPV6_PKTINFO: %m"); + } +#endif + } + + if ((family == AF_INET6) && + ((info->flags & INTERFACE_UPSTREAM) != 0)) { + int hop_limit = 32; + if (setsockopt(sock, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, + &hop_limit, sizeof(int)) < 0) { + log_fatal("setsockopt: IPV6_MULTICAST_HOPS: %m"); + } + } +#endif /* DHCPv6 */ + + return sock; +} +#endif /* USE_SOCKET_SEND || USE_SOCKET_RECEIVE || USE_SOCKET_FALLBACK */ + +#if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK) +void if_register_send (info) + struct interface_info *info; +{ +#ifndef USE_SOCKET_RECEIVE + info->wfdesc = if_register_socket(info, AF_INET, 0); + /* If this is a normal IPv4 address, get the hardware address. */ + if (strcmp(info->name, "fallback") != 0) + get_hw_addr(info->name, &info->hw_address); +#if defined (USE_SOCKET_FALLBACK) + /* Fallback only registers for send, but may need to receive as + well. */ + info->rfdesc = info->wfdesc; +#endif +#else + info->wfdesc = info->rfdesc; +#endif + if (!quiet_interface_discovery) + log_info ("Sending on Socket/%s%s%s", + info->name, + (info->shared_network ? "/" : ""), + (info->shared_network ? + info->shared_network->name : "")); +} + +#if defined (USE_SOCKET_SEND) +void if_deregister_send (info) + struct interface_info *info; +{ +#ifndef USE_SOCKET_RECEIVE + close (info -> wfdesc); +#endif + info -> wfdesc = -1; + + if (!quiet_interface_discovery) + log_info ("Disabling output on Socket/%s%s%s", + info -> name, + (info -> shared_network ? "/" : ""), + (info -> shared_network ? + info -> shared_network -> name : "")); +} +#endif /* USE_SOCKET_SEND */ +#endif /* USE_SOCKET_SEND || USE_SOCKET_FALLBACK */ + +#ifdef USE_SOCKET_RECEIVE +void if_register_receive (info) + struct interface_info *info; +{ + +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) + if (global_v4_socket_references == 0) { + global_v4_socket = if_register_socket(info, AF_INET, 0); + if (global_v4_socket < 0) { + /* + * if_register_socket() fatally logs if it fails to + * create a socket, this is just a sanity check. + */ + log_fatal("Failed to create AF_INET socket %s:%d", + MDL); + } + } + + info->rfdesc = global_v4_socket; + global_v4_socket_references++; +#else + /* If we're using the socket API for sending and receiving, + we don't need to register this interface twice. */ + info->rfdesc = if_register_socket(info, AF_INET, 0); +#endif /* IP_PKTINFO... */ + /* If this is a normal IPv4 address, get the hardware address. */ + if (strcmp(info->name, "fallback") != 0) + get_hw_addr(info->name, &info->hw_address); + + if (!quiet_interface_discovery) + log_info ("Listening on Socket/%s%s%s", + info->name, + (info->shared_network ? "/" : ""), + (info->shared_network ? + info->shared_network->name : "")); +} + +void if_deregister_receive (info) + struct interface_info *info; +{ +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) + /* Dereference the global v4 socket. */ + if ((info->rfdesc == global_v4_socket) && + (info->wfdesc == global_v4_socket) && + (global_v4_socket_references > 0)) { + global_v4_socket_references--; + info->rfdesc = -1; + } else { + log_fatal("Impossible condition at %s:%d", MDL); + } + + if (global_v4_socket_references == 0) { + close(global_v4_socket); + global_v4_socket = -1; + } +#else + close(info->rfdesc); + info->rfdesc = -1; +#endif /* IP_PKTINFO... */ + if (!quiet_interface_discovery) + log_info ("Disabling input on Socket/%s%s%s", + info -> name, + (info -> shared_network ? "/" : ""), + (info -> shared_network ? + info -> shared_network -> name : "")); +} +#endif /* USE_SOCKET_RECEIVE */ + + +#ifdef DHCPv6 +/* + * This function joins the interface to DHCPv6 multicast groups so we will + * receive multicast messages. + */ +static void +if_register_multicast(struct interface_info *info) { + int sock = info->rfdesc; + struct ipv6_mreq mreq; + + if (inet_pton(AF_INET6, All_DHCP_Relay_Agents_and_Servers, + &mreq.ipv6mr_multiaddr) <= 0) { + log_fatal("inet_pton: unable to convert '%s'", + All_DHCP_Relay_Agents_and_Servers); + } + mreq.ipv6mr_interface = if_nametoindex(info->name); + if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP, + &mreq, sizeof(mreq)) < 0) { + log_fatal("setsockopt: IPV6_JOIN_GROUP: %m"); + } + + /* + * The relay agent code sets the streams so you know which way + * is up and down. But a relay agent shouldn't join to the + * Server address, or else you get fun loops. So up or down + * doesn't matter, we're just using that config to sense this is + * a relay agent. + */ + if ((info->flags & INTERFACE_STREAMS) == 0) { + if (inet_pton(AF_INET6, All_DHCP_Servers, + &mreq.ipv6mr_multiaddr) <= 0) { + log_fatal("inet_pton: unable to convert '%s'", + All_DHCP_Servers); + } + mreq.ipv6mr_interface = if_nametoindex(info->name); + if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP, + &mreq, sizeof(mreq)) < 0) { + log_fatal("setsockopt: IPV6_JOIN_GROUP: %m"); + } + } +} + +void +if_register6(struct interface_info *info, int do_multicast) { + /* Bounce do_multicast to a stack variable because we may change it. */ + int req_multi = do_multicast; + + if (global_v6_socket_references == 0) { + global_v6_socket = if_register_socket(info, AF_INET6, + &req_multi); + if (global_v6_socket < 0) { + /* + * if_register_socket() fatally logs if it fails to + * create a socket, this is just a sanity check. + */ + log_fatal("Impossible condition at %s:%d", MDL); + } else { + log_info("Bound to *:%d", ntohs(local_port)); + } + } + + info->rfdesc = global_v6_socket; + info->wfdesc = global_v6_socket; + global_v6_socket_references++; + + if (req_multi) + if_register_multicast(info); + + get_hw_addr(info->name, &info->hw_address); + + if (!quiet_interface_discovery) { + if (info->shared_network != NULL) { + log_info("Listening on Socket/%d/%s/%s", + global_v6_socket, info->name, + info->shared_network->name); + log_info("Sending on Socket/%d/%s/%s", + global_v6_socket, info->name, + info->shared_network->name); + } else { + log_info("Listening on Socket/%s", info->name); + log_info("Sending on Socket/%s", info->name); + } + } +} + +void +if_deregister6(struct interface_info *info) { + /* Dereference the global v6 socket. */ + if ((info->rfdesc == global_v6_socket) && + (info->wfdesc == global_v6_socket) && + (global_v6_socket_references > 0)) { + global_v6_socket_references--; + info->rfdesc = -1; + info->wfdesc = -1; + } else { + log_fatal("Impossible condition at %s:%d", MDL); + } + + if (!quiet_interface_discovery) { + if (info->shared_network != NULL) { + log_info("Disabling input on Socket/%s/%s", info->name, + info->shared_network->name); + log_info("Disabling output on Socket/%s/%s", info->name, + info->shared_network->name); + } else { + log_info("Disabling input on Socket/%s", info->name); + log_info("Disabling output on Socket/%s", info->name); + } + } + + if (global_v6_socket_references == 0) { + close(global_v6_socket); + global_v6_socket = -1; + + log_info("Unbound from *:%d", ntohs(local_port)); + } +} +#endif /* DHCPv6 */ + +#if defined (USE_SOCKET_SEND) || defined (USE_SOCKET_FALLBACK) +ssize_t send_packet (interface, packet, raw, len, from, to, hto) + struct interface_info *interface; + struct packet *packet; + struct dhcp_packet *raw; + size_t len; + struct in_addr from; + struct sockaddr_in *to; + struct hardware *hto; +{ + int result; +#ifdef IGNORE_HOSTUNREACH + int retry = 0; + do { +#endif +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) + struct in_pktinfo pktinfo; + + if (interface->ifp != NULL) { + memset(&pktinfo, 0, sizeof (pktinfo)); + pktinfo.ipi_ifindex = interface->ifp->ifr_index; + if (setsockopt(interface->wfdesc, IPPROTO_IP, + IP_PKTINFO, (char *)&pktinfo, + sizeof(pktinfo)) < 0) + log_fatal("setsockopt: IP_PKTINFO: %m"); + } +#endif + result = sendto (interface -> wfdesc, (char *)raw, len, 0, + (struct sockaddr *)to, sizeof *to); +#ifdef IGNORE_HOSTUNREACH + } while (to -> sin_addr.s_addr == htonl (INADDR_BROADCAST) && + result < 0 && + (errno == EHOSTUNREACH || + errno == ECONNREFUSED) && + retry++ < 10); +#endif + if (result < 0) { + log_error ("send_packet: %m"); + if (errno == ENETUNREACH) + log_error ("send_packet: please consult README file%s", + " regarding broadcast address."); + } + return result; +} + +#endif /* USE_SOCKET_SEND || USE_SOCKET_FALLBACK */ + +#ifdef DHCPv6 +/* + * Solaris 9 is missing the CMSG_LEN and CMSG_SPACE macros, so we will + * synthesize them (based on the BIND 9 technique). + */ + +#ifndef CMSG_LEN +static size_t CMSG_LEN(size_t len) { + size_t hdrlen; + /* + * Cast NULL so that any pointer arithmetic performed by CMSG_DATA + * is correct. + */ + hdrlen = (size_t)CMSG_DATA(((struct cmsghdr *)NULL)); + return hdrlen + len; +} +#endif /* !CMSG_LEN */ + +#ifndef CMSG_SPACE +static size_t CMSG_SPACE(size_t len) { + struct msghdr msg; + struct cmsghdr *cmsgp; + + /* + * XXX: The buffer length is an ad-hoc value, but should be enough + * in a practical sense. + */ + union { + struct cmsghdr cmsg_sizer; + u_int8_t pktinfo_sizer[sizeof(struct cmsghdr) + 1024]; + } dummybuf; + + memset(&msg, 0, sizeof(msg)); + msg.msg_control = &dummybuf; + msg.msg_controllen = sizeof(dummybuf); + + cmsgp = (struct cmsghdr *)&dummybuf; + cmsgp->cmsg_len = CMSG_LEN(len); + + cmsgp = CMSG_NXTHDR(&msg, cmsgp); + if (cmsgp != NULL) { + return (char *)cmsgp - (char *)msg.msg_control; + } else { + return 0; + } +} +#endif /* !CMSG_SPACE */ + +#endif /* DHCPv6 */ + +#if defined(DHCPv6) || \ + (defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && \ + defined(USE_V4_PKTINFO)) +/* + * For both send_packet6() and receive_packet6() we need to allocate + * space for the cmsg header information. We do this once and reuse + * the buffer. We also need the control buf for send_packet() and + * receive_packet() when we use a single socket and IP_PKTINFO to + * send the packet out the correct interface. + */ +static void *control_buf = NULL; +static size_t control_buf_len = 0; + +static void +allocate_cmsg_cbuf(void) { + control_buf_len = CMSG_SPACE(sizeof(struct in6_pktinfo)); + control_buf = dmalloc(control_buf_len, MDL); + return; +} +#endif /* DHCPv6, IP_PKTINFO ... */ + +#ifdef DHCPv6 +/* + * For both send_packet6() and receive_packet6() we need to use the + * sendmsg()/recvmsg() functions rather than the simpler send()/recv() + * functions. + * + * In the case of send_packet6(), we need to do this in order to insure + * that the reply packet leaves on the same interface that it arrived + * on. + * + * In the case of receive_packet6(), we need to do this in order to + * get the IP address the packet was sent to. This is used to identify + * whether a packet is multicast or unicast. + * + * Helpful man pages: recvmsg, readv (talks about the iovec stuff), cmsg. + * + * Also see the sections in RFC 3542 about IPV6_PKTINFO. + */ + +/* Send an IPv6 packet */ +ssize_t send_packet6(struct interface_info *interface, + const unsigned char *raw, size_t len, + struct sockaddr_in6 *to) { + struct msghdr m; + struct iovec v; + int result; + struct in6_pktinfo *pktinfo; + struct cmsghdr *cmsg; + + /* + * If necessary allocate space for the control message header. + * The space is common between send and receive. + */ + + if (control_buf == NULL) { + allocate_cmsg_cbuf(); + if (control_buf == NULL) { + log_error("send_packet6: unable to allocate cmsg header"); + return(ENOMEM); + } + } + memset(control_buf, 0, control_buf_len); + + /* + * Initialize our message header structure. + */ + memset(&m, 0, sizeof(m)); + + /* + * Set the target address we're sending to. + */ + m.msg_name = to; + m.msg_namelen = sizeof(*to); + + /* + * Set the data buffer we're sending. (Using this wacky + * "scatter-gather" stuff... we only have a single chunk + * of data to send, so we declare a single vector entry.) + */ + v.iov_base = (char *)raw; + v.iov_len = len; + m.msg_iov = &v; + m.msg_iovlen = 1; + + /* + * Setting the interface is a bit more involved. + * + * We have to create a "control message", and set that to + * define the IPv6 packet information. We could set the + * source address if we wanted, but we can safely let the + * kernel decide what that should be. + */ + m.msg_control = control_buf; + m.msg_controllen = control_buf_len; + cmsg = CMSG_FIRSTHDR(&m); + cmsg->cmsg_level = IPPROTO_IPV6; + cmsg->cmsg_type = IPV6_PKTINFO; + cmsg->cmsg_len = CMSG_LEN(sizeof(*pktinfo)); + pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg); + memset(pktinfo, 0, sizeof(*pktinfo)); + pktinfo->ipi6_ifindex = if_nametoindex(interface->name); + m.msg_controllen = cmsg->cmsg_len; + + result = sendmsg(interface->wfdesc, &m, 0); + if (result < 0) { + log_error("send_packet6: %m"); + } + return result; +} +#endif /* DHCPv6 */ + +#ifdef USE_SOCKET_RECEIVE +ssize_t receive_packet (interface, buf, len, from, hfrom) + struct interface_info *interface; + unsigned char *buf; + size_t len; + struct sockaddr_in *from; + struct hardware *hfrom; +{ +#if !defined(USE_V4_PKTINFO) + SOCKLEN_T flen = sizeof *from; +#endif + int result; + + /* + * The normal Berkeley socket interface doesn't give us any way + * to know what hardware interface we received the message on, + * but we should at least make sure the structure is emptied. + */ + memset(hfrom, 0, sizeof(*hfrom)); + +#ifdef IGNORE_HOSTUNREACH + int retry = 0; + do { +#endif + +#if defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && defined(USE_V4_PKTINFO) + struct msghdr m; + struct iovec v; + struct cmsghdr *cmsg; + struct in_pktinfo *pktinfo; + unsigned int ifindex; + int found_pktinfo; + + /* + * If necessary allocate space for the control message header. + * The space is common between send and receive. + */ + if (control_buf == NULL) { + allocate_cmsg_cbuf(); + if (control_buf == NULL) { + log_error("receive_packet: unable to allocate cmsg " + "header"); + return(ENOMEM); + } + } + memset(control_buf, 0, control_buf_len); + + /* + * Initialize our message header structure. + */ + memset(&m, 0, sizeof(m)); + + /* + * Point so we can get the from address. + */ + m.msg_name = from; + m.msg_namelen = sizeof(*from); + + /* + * Set the data buffer we're receiving. (Using this wacky + * "scatter-gather" stuff... but we that doesn't really make + * sense for us, so we use a single vector entry.) + */ + v.iov_base = buf; + v.iov_len = len; + m.msg_iov = &v; + m.msg_iovlen = 1; + + /* + * Getting the interface is a bit more involved. + * + * We set up some space for a "control message". We have + * previously asked the kernel to give us packet + * information (when we initialized the interface), so we + * should get the destination address from that. + */ + m.msg_control = control_buf; + m.msg_controllen = control_buf_len; + + result = recvmsg(interface->rfdesc, &m, 0); + + if (result >= 0) { + /* + * If we did read successfully, then we need to loop + * through the control messages we received and + * find the one with our destination address. + * + * We also keep a flag to see if we found it. If we + * didn't, then we consider this to be an error. + */ + found_pktinfo = 0; + cmsg = CMSG_FIRSTHDR(&m); + while (cmsg != NULL) { + if ((cmsg->cmsg_level == IPPROTO_IP) && + (cmsg->cmsg_type == IP_PKTINFO)) { + pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg); + ifindex = pktinfo->ipi_ifindex; + /* + * We pass the ifindex back to the caller + * using the unused hfrom parameter avoiding + * interface changes between sockets and + * the discover code. + */ + memcpy(hfrom->hbuf, &ifindex, sizeof(ifindex)); + found_pktinfo = 1; + } + cmsg = CMSG_NXTHDR(&m, cmsg); + } + if (!found_pktinfo) { + result = -1; + errno = EIO; + } + } +#else + result = recvfrom (interface -> rfdesc, (char *)buf, len, 0, + (struct sockaddr *)from, &flen); +#endif /* IP_PKTINFO ... */ +#ifdef IGNORE_HOSTUNREACH + } while (result < 0 && + (errno == EHOSTUNREACH || + errno == ECONNREFUSED) && + retry++ < 10); +#endif + return result; +} + +#endif /* USE_SOCKET_RECEIVE */ + +#ifdef DHCPv6 +ssize_t +receive_packet6(struct interface_info *interface, + unsigned char *buf, size_t len, + struct sockaddr_in6 *from, struct in6_addr *to_addr, + unsigned int *if_idx) +{ + struct msghdr m; + struct iovec v; + int result; + struct cmsghdr *cmsg; + struct in6_pktinfo *pktinfo; + int found_pktinfo; + + /* + * If necessary allocate space for the control message header. + * The space is common between send and receive. + */ + if (control_buf == NULL) { + allocate_cmsg_cbuf(); + if (control_buf == NULL) { + log_error("receive_packet6: unable to allocate cmsg " + "header"); + return(ENOMEM); + } + } + memset(control_buf, 0, control_buf_len); + + /* + * Initialize our message header structure. + */ + memset(&m, 0, sizeof(m)); + + /* + * Point so we can get the from address. + */ + m.msg_name = from; + m.msg_namelen = sizeof(*from); + + /* + * Set the data buffer we're receiving. (Using this wacky + * "scatter-gather" stuff... but we that doesn't really make + * sense for us, so we use a single vector entry.) + */ + v.iov_base = buf; + v.iov_len = len; + m.msg_iov = &v; + m.msg_iovlen = 1; + + /* + * Getting the interface is a bit more involved. + * + * We set up some space for a "control message". We have + * previously asked the kernel to give us packet + * information (when we initialized the interface), so we + * should get the destination address from that. + */ + m.msg_control = control_buf; + m.msg_controllen = control_buf_len; + + result = recvmsg(interface->rfdesc, &m, 0); + + if (result >= 0) { + /* + * If we did read successfully, then we need to loop + * through the control messages we received and + * find the one with our destination address. + * + * We also keep a flag to see if we found it. If we + * didn't, then we consider this to be an error. + */ + found_pktinfo = 0; + cmsg = CMSG_FIRSTHDR(&m); + while (cmsg != NULL) { + if ((cmsg->cmsg_level == IPPROTO_IPV6) && + (cmsg->cmsg_type == IPV6_PKTINFO)) { + pktinfo = (struct in6_pktinfo *)CMSG_DATA(cmsg); + *to_addr = pktinfo->ipi6_addr; + *if_idx = pktinfo->ipi6_ifindex; + found_pktinfo = 1; + } + cmsg = CMSG_NXTHDR(&m, cmsg); + } + if (!found_pktinfo) { + result = -1; + errno = EIO; + } + } + + return result; +} +#endif /* DHCPv6 */ + +#if defined (USE_SOCKET_FALLBACK) +/* This just reads in a packet and silently discards it. */ + +isc_result_t fallback_discard (object) + omapi_object_t *object; +{ + char buf [1540]; + struct sockaddr_in from; + SOCKLEN_T flen = sizeof from; + int status; + struct interface_info *interface; + + if (object -> type != dhcp_type_interface) + return DHCP_R_INVALIDARG; + interface = (struct interface_info *)object; + + status = recvfrom (interface -> wfdesc, buf, sizeof buf, 0, + (struct sockaddr *)&from, &flen); +#if defined (DEBUG) + /* Only report fallback discard errors if we're debugging. */ + if (status < 0) { + log_error ("fallback_discard: %m"); + return ISC_R_UNEXPECTED; + } +#endif + return ISC_R_SUCCESS; +} +#endif /* USE_SOCKET_FALLBACK */ + +#if defined (USE_SOCKET_SEND) +int can_unicast_without_arp (ip) + struct interface_info *ip; +{ + return 0; +} + +int can_receive_unicast_unconfigured (ip) + struct interface_info *ip; +{ +#if defined (SOCKET_CAN_RECEIVE_UNICAST_UNCONFIGURED) + return 1; +#else + return 0; +#endif +} + +int supports_multiple_interfaces (ip) + struct interface_info *ip; +{ +#if defined(SO_BINDTODEVICE) || \ + (defined(IP_PKTINFO) && defined(IP_RECVPKTINFO) && \ + defined(USE_V4_PKTINFO)) + return(1); +#else + return(0); +#endif +} + +/* If we have SO_BINDTODEVICE, set up a fallback interface; otherwise, + do not. */ + +void maybe_setup_fallback () +{ +#if defined (USE_SOCKET_FALLBACK) + isc_result_t status; + struct interface_info *fbi = (struct interface_info *)0; + if (setup_fallback (&fbi, MDL)) { + fbi -> wfdesc = if_register_socket (fbi, AF_INET, 0); + fbi -> rfdesc = fbi -> wfdesc; + log_info ("Sending on Socket/%s%s%s", + fbi -> name, + (fbi -> shared_network ? "/" : ""), + (fbi -> shared_network ? + fbi -> shared_network -> name : "")); + + status = omapi_register_io_object ((omapi_object_t *)fbi, + if_readsocket, 0, + fallback_discard, 0, 0); + if (status != ISC_R_SUCCESS) + log_fatal ("Can't register I/O handle for %s: %s", + fbi -> name, isc_result_totext (status)); + interface_dereference (&fbi, MDL); + } +#endif +} + + +#if defined(sun) && defined(USE_V4_PKTINFO) +/* This code assumes the existence of SIOCGLIFHWADDR */ +void +get_hw_addr(const char *name, struct hardware *hw) { + struct sockaddr_dl *dladdrp; + int rv, sock, i; + struct lifreq lifr; + + memset(&lifr, 0, sizeof (lifr)); + (void) strlcpy(lifr.lifr_name, name, sizeof (lifr.lifr_name)); + /* + * Check if the interface is a virtual or IPMP interface - in those + * cases it has no hw address, so generate a random one. + */ + if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0 || + ioctl(sock, SIOCGLIFFLAGS, &lifr) < 0) { + if (sock != -1) + (void) close(sock); + +#ifdef DHCPv6 + /* + * If approrpriate try this with an IPv6 socket + */ + if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) >= 0 && + ioctl(sock, SIOCGLIFFLAGS, &lifr) >= 0) { + goto flag_check; + } + if (sock != -1) + (void) close(sock); +#endif + log_fatal("Couldn't get interface flags for %s: %m", name); + + } + + flag_check: + if (lifr.lifr_flags & (IFF_VIRTUAL|IFF_IPMP)) { + hw->hlen = sizeof (hw->hbuf); + srandom((long)gethrtime()); + + for (i = 0; i < hw->hlen; ++i) { + hw->hbuf[i] = random() % 256; + } + + if (sock != -1) + (void) close(sock); + return; + } + + if (ioctl(sock, SIOCGLIFHWADDR, &lifr) < 0) + log_fatal("Couldn't get interface hardware address for %s: %m", + name); + dladdrp = (struct sockaddr_dl *)&lifr.lifr_addr; + hw->hlen = dladdrp->sdl_alen; + memcpy(hw->hbuf, LLADDR(dladdrp), hw->hlen); + + if (sock != -1) + (void) close(sock); +} +#endif /* defined(sun) */ + +#endif /* USE_SOCKET_SEND */ |