ndbootd-bpf.c revision 1.2 1 1.2 fredette /* $NetBSD: ndbootd-bpf.c,v 1.2 2001/05/22 14:41:59 fredette Exp $ */
2 1.2 fredette
3 1.1 fredette /* ndbootd-bpf.c - the Sun Network Disk (nd) daemon BPF component: */
4 1.1 fredette
5 1.1 fredette /*
6 1.1 fredette * Copyright (c) 2001 Matthew Fredette. All rights reserved.
7 1.1 fredette *
8 1.1 fredette * Redistribution and use in source and binary forms, with or without
9 1.1 fredette * modification, are permitted provided that the following conditions
10 1.1 fredette * are met:
11 1.1 fredette * 1. Redistributions of source code must retain the above copyright
12 1.1 fredette * notice, this list of conditions and the following disclaimer.
13 1.1 fredette * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 fredette * notice, this list of conditions and the following disclaimer in the
15 1.1 fredette * documentation and/or other materials provided with the distribution.
16 1.1 fredette * 3. All advertising materials mentioning features or use of this software
17 1.1 fredette * must display the following acknowledgement:
18 1.1 fredette * This product includes software developed by Matthew Fredette.
19 1.1 fredette * 4. The name of Matthew Fredette may not be used to endorse or promote
20 1.1 fredette * products derived from this software without specific prior written
21 1.1 fredette * permission.
22 1.1 fredette *
23 1.1 fredette * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
24 1.1 fredette * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
25 1.1 fredette * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
26 1.1 fredette */
27 1.1 fredette
28 1.1 fredette /* <<Header: /data/home/fredette/project/THE-WEIGHT-CVS/ndbootd/config/ndbootd-bpf.c,v 1.3 2001/05/22 13:13:24 fredette Exp >> */
29 1.1 fredette
30 1.1 fredette /*
31 1.1 fredette * <<Log: ndbootd-bpf.c,v >>
32 1.1 fredette * Revision 1.3 2001/05/22 13:13:24 fredette
33 1.1 fredette * Ran indent(1) with NetBSD's KNF-approximating profile.
34 1.1 fredette *
35 1.1 fredette * Revision 1.2 2001/05/09 20:50:46 fredette
36 1.1 fredette * Removed an unnecessary comment.
37 1.1 fredette *
38 1.1 fredette * Revision 1.1 2001/01/29 15:12:13 fredette
39 1.1 fredette * Added.
40 1.1 fredette *
41 1.1 fredette */
42 1.1 fredette
43 1.1 fredette static const char _ndbootd_bpf_c_rcsid[] = "<<Id: ndbootd-bpf.c,v 1.3 2001/05/22 13:13:24 fredette Exp >>";
44 1.1 fredette
45 1.1 fredette /* includes: */
46 1.1 fredette #include <net/bpf.h>
47 1.1 fredette
48 1.1 fredette /* structures: */
49 1.1 fredette struct _ndbootd_interface_bpf {
50 1.1 fredette
51 1.1 fredette /* the size of the packet buffer for the interface: */
52 1.1 fredette size_t _ndbootd_interface_bpf_buffer_size;
53 1.1 fredette
54 1.1 fredette /* the packet buffer for the interface: */
55 1.1 fredette char *_ndbootd_interface_bpf_buffer;
56 1.1 fredette
57 1.1 fredette /* the next offset within the packet buffer, and the end of the data
58 1.1 fredette * in the packet buffer: */
59 1.1 fredette size_t _ndbootd_interface_bpf_buffer_offset;
60 1.1 fredette size_t _ndbootd_interface_bpf_buffer_end;
61 1.1 fredette };
62 1.1 fredette
63 1.1 fredette /* the BPF program to capture ND packets: */
64 1.1 fredette static struct bpf_insn ndboot_bpf_filter[] = {
65 1.1 fredette
66 1.1 fredette /* drop this packet if its ethertype isn't ETHERTYPE_IP: */
67 1.1 fredette BPF_STMT(BPF_LD + BPF_H + BPF_ABS, NDBOOTD_OFFSETOF(struct ether_header, ether_type)),
68 1.1 fredette BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETHERTYPE_IP, 0, 9),
69 1.1 fredette
70 1.1 fredette /* drop this packet if its IP protocol isn't IPPROTO_ND: */
71 1.1 fredette BPF_STMT(BPF_LD + BPF_B + BPF_ABS, sizeof(struct ether_header) + NDBOOTD_OFFSETOF(struct ip, ip_p)),
72 1.1 fredette BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, IPPROTO_ND, 0, 7),
73 1.1 fredette
74 1.1 fredette /* drop this packet if it's a fragment: */
75 1.1 fredette BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct ether_header) + NDBOOTD_OFFSETOF(struct ip, ip_off)),
76 1.1 fredette BPF_JUMP(BPF_JMP + BPF_JSET + BPF_K, 0x3fff, 5, 0),
77 1.1 fredette
78 1.1 fredette /* drop this packet if it is carrying data (we only want requests,
79 1.1 fredette * which have no data): */
80 1.1 fredette BPF_STMT(BPF_LD + BPF_H + BPF_ABS, sizeof(struct ether_header) + NDBOOTD_OFFSETOF(struct ip, ip_len)),
81 1.1 fredette BPF_STMT(BPF_LDX + BPF_B + BPF_MSH, sizeof(struct ether_header)),
82 1.1 fredette BPF_STMT(BPF_ALU + BPF_SUB + BPF_X, 0),
83 1.1 fredette BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, sizeof(struct ndboot_packet), 0, 1),
84 1.1 fredette
85 1.1 fredette /* accept this packet: */
86 1.1 fredette BPF_STMT(BPF_RET + BPF_K, (u_int) -1),
87 1.1 fredette
88 1.1 fredette /* drop this packet: */
89 1.1 fredette BPF_STMT(BPF_RET + BPF_K, 0),
90 1.1 fredette };
91 1.1 fredette
92 1.1 fredette /* this opens a raw socket using BPF. */
93 1.1 fredette int
94 1.1 fredette ndbootd_raw_open(struct ndbootd_interface * interface)
95 1.1 fredette {
96 1.1 fredette int network_fd;
97 1.1 fredette #define DEV_BPF_FORMAT "/dev/bpf%d"
98 1.1 fredette char dev_bpf_filename[sizeof(DEV_BPF_FORMAT) + (sizeof(int) * 3) + 1];
99 1.1 fredette int minor;
100 1.1 fredette int saved_errno;
101 1.1 fredette u_int bpf_opt;
102 1.1 fredette struct bpf_version version;
103 1.1 fredette u_int packet_buffer_size;
104 1.1 fredette struct bpf_program program;
105 1.1 fredette struct _ndbootd_interface_bpf *interface_bpf;
106 1.1 fredette
107 1.1 fredette /* loop trying to open a /dev/bpf device: */
108 1.1 fredette for (minor = 0;; minor++) {
109 1.1 fredette
110 1.1 fredette /* form the name of the next device to try, then try opening
111 1.1 fredette * it. if we succeed, we're done: */
112 1.1 fredette sprintf(dev_bpf_filename, DEV_BPF_FORMAT, minor);
113 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: trying %s", dev_bpf_filename));
114 1.1 fredette if ((network_fd = open(dev_bpf_filename, O_RDWR)) >= 0) {
115 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: opened %s", dev_bpf_filename));
116 1.1 fredette break;
117 1.1 fredette }
118 1.1 fredette /* we failed to open this device. if this device was simply
119 1.1 fredette * busy, loop: */
120 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to open %s: %s", dev_bpf_filename, strerror(errno)));
121 1.1 fredette if (errno == EBUSY) {
122 1.1 fredette continue;
123 1.1 fredette }
124 1.1 fredette /* otherwise, we have failed: */
125 1.1 fredette return (-1);
126 1.1 fredette }
127 1.1 fredette
128 1.1 fredette /* this macro helps in closing the BPF socket on error: */
129 1.1 fredette #define _NDBOOTD_RAW_OPEN_ERROR(x) saved_errno = errno; x; errno = saved_errno
130 1.1 fredette
131 1.1 fredette /* check the BPF version: */
132 1.1 fredette if (ioctl(network_fd, BIOCVERSION, &version) < 0) {
133 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to get the BPF version on %s: %s",
134 1.1 fredette dev_bpf_filename, strerror(errno)));
135 1.1 fredette _NDBOOTD_RAW_OPEN_ERROR(close(network_fd));
136 1.1 fredette return (-1);
137 1.1 fredette }
138 1.1 fredette if (version.bv_major != BPF_MAJOR_VERSION
139 1.1 fredette || version.bv_minor < BPF_MINOR_VERSION) {
140 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: kernel BPF version is %d.%d, my BPF version is %d.%d",
141 1.1 fredette version.bv_major, version.bv_minor,
142 1.1 fredette BPF_MAJOR_VERSION, BPF_MINOR_VERSION));
143 1.1 fredette close(network_fd);
144 1.1 fredette errno = ENXIO;
145 1.1 fredette return (-1);
146 1.1 fredette }
147 1.1 fredette /* put the BPF device into immediate mode: */
148 1.1 fredette bpf_opt = TRUE;
149 1.1 fredette if (ioctl(network_fd, BIOCIMMEDIATE, &bpf_opt) < 0) {
150 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to put %s into immediate mode: %s",
151 1.1 fredette dev_bpf_filename, strerror(errno)));
152 1.1 fredette _NDBOOTD_RAW_OPEN_ERROR(close(network_fd));
153 1.1 fredette return (-1);
154 1.1 fredette }
155 1.1 fredette /* tell the BPF device we're providing complete Ethernet headers: */
156 1.1 fredette bpf_opt = TRUE;
157 1.1 fredette if (ioctl(network_fd, BIOCSHDRCMPLT, &bpf_opt) < 0) {
158 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to put %s into complete-headers mode: %s",
159 1.1 fredette dev_bpf_filename, strerror(errno)));
160 1.1 fredette _NDBOOTD_RAW_OPEN_ERROR(close(network_fd));
161 1.1 fredette return (-1);
162 1.1 fredette }
163 1.1 fredette /* point the BPF device at the interface we're using: */
164 1.1 fredette if (ioctl(network_fd, BIOCSETIF, interface->ndbootd_interface_ifreq) < 0) {
165 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to point BPF socket at %s: %s",
166 1.1 fredette interface->ndbootd_interface_ifreq->ifr_name, strerror(errno)));
167 1.1 fredette saved_errno = errno;
168 1.1 fredette close(network_fd);
169 1.1 fredette errno = saved_errno;
170 1.1 fredette return (-1);
171 1.1 fredette }
172 1.1 fredette /* set the filter on the BPF device: */
173 1.1 fredette program.bf_len = sizeof(ndboot_bpf_filter) / sizeof(ndboot_bpf_filter[0]);
174 1.1 fredette program.bf_insns = ndboot_bpf_filter;
175 1.1 fredette if (ioctl(network_fd, BIOCSETF, &program) < 0) {
176 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to set the filter on %s: %s",
177 1.1 fredette dev_bpf_filename, strerror(errno)));
178 1.1 fredette _NDBOOTD_RAW_OPEN_ERROR(close(network_fd));
179 1.1 fredette return (-1);
180 1.1 fredette }
181 1.1 fredette /* get the BPF read buffer size: */
182 1.1 fredette if (ioctl(network_fd, BIOCGBLEN, &packet_buffer_size) < 0) {
183 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to read the buffer size for %s: %s",
184 1.1 fredette dev_bpf_filename, strerror(errno)));
185 1.1 fredette _NDBOOTD_RAW_OPEN_ERROR(close(network_fd));
186 1.1 fredette return (-1);
187 1.1 fredette }
188 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: buffer size for %s is %u",
189 1.1 fredette dev_bpf_filename, packet_buffer_size));
190 1.1 fredette
191 1.1 fredette /* allocate our private interface information and we're done: */
192 1.1 fredette interface->ndbootd_interface_fd = network_fd;
193 1.1 fredette interface_bpf = ndbootd_new0(struct _ndbootd_interface_bpf, 1);
194 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_size = packet_buffer_size;
195 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer = ndbootd_new(char, packet_buffer_size);
196 1.1 fredette interface->_ndbootd_interface_raw_private = interface_bpf;
197 1.1 fredette return (0);
198 1.1 fredette #undef _NDBOOTD_RAW_OPEN_ERROR
199 1.1 fredette }
200 1.1 fredette
201 1.1 fredette /* this reads a raw packet: */
202 1.1 fredette int
203 1.1 fredette ndbootd_raw_read(struct ndbootd_interface * interface, void *packet_buffer, size_t packet_buffer_size)
204 1.1 fredette {
205 1.1 fredette struct _ndbootd_interface_bpf *interface_bpf;
206 1.1 fredette ssize_t buffer_end;
207 1.1 fredette struct bpf_hdr the_bpf_header;
208 1.1 fredette fd_set fdset_read;
209 1.1 fredette
210 1.1 fredette /* recover our state: */
211 1.1 fredette interface_bpf = (struct _ndbootd_interface_bpf *) interface->_ndbootd_interface_raw_private;
212 1.1 fredette
213 1.1 fredette /* loop until we have something to return: */
214 1.1 fredette for (;;) {
215 1.1 fredette
216 1.1 fredette /* if the buffer is empty, fill it: */
217 1.1 fredette if (interface_bpf->_ndbootd_interface_bpf_buffer_offset
218 1.1 fredette >= interface_bpf->_ndbootd_interface_bpf_buffer_end) {
219 1.1 fredette
220 1.1 fredette /* select on the BPF socket: */
221 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: calling select"));
222 1.1 fredette FD_ZERO(&fdset_read);
223 1.1 fredette FD_SET(interface->ndbootd_interface_fd, &fdset_read);
224 1.1 fredette switch (select(interface->ndbootd_interface_fd + 1, &fdset_read, NULL, NULL, NULL)) {
225 1.1 fredette case 0:
226 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: select returned zero"));
227 1.1 fredette continue;
228 1.1 fredette case 1:
229 1.1 fredette break;
230 1.1 fredette default:
231 1.1 fredette if (errno == EINTR) {
232 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: select got EINTR"));
233 1.1 fredette continue;
234 1.1 fredette }
235 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: select failed: %s", strerror(errno)));
236 1.1 fredette return (-1);
237 1.1 fredette }
238 1.1 fredette assert(FD_ISSET(interface->ndbootd_interface_fd, &fdset_read));
239 1.1 fredette
240 1.1 fredette /* read the BPF socket: */
241 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: calling read"));
242 1.1 fredette buffer_end = read(interface->ndbootd_interface_fd,
243 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer,
244 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_size);
245 1.1 fredette if (buffer_end <= 0) {
246 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: failed to read packets: %s", strerror(errno)));
247 1.1 fredette return (-1);
248 1.1 fredette }
249 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: read %d bytes of packets", buffer_end));
250 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset = 0;
251 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_end = buffer_end;
252 1.1 fredette }
253 1.1 fredette /* if there's not enough for a BPF header, flush the buffer: */
254 1.1 fredette if ((interface_bpf->_ndbootd_interface_bpf_buffer_offset
255 1.1 fredette + sizeof(the_bpf_header))
256 1.1 fredette > interface_bpf->_ndbootd_interface_bpf_buffer_end) {
257 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: flushed garbage BPF header bytes"));
258 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_end = 0;
259 1.1 fredette continue;
260 1.1 fredette }
261 1.1 fredette /* get the BPF header and check it: */
262 1.1 fredette memcpy(&the_bpf_header,
263 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer
264 1.1 fredette + interface_bpf->_ndbootd_interface_bpf_buffer_offset,
265 1.1 fredette sizeof(the_bpf_header));
266 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset += the_bpf_header.bh_hdrlen;
267 1.1 fredette
268 1.1 fredette /* if we're missing some part of the packet: */
269 1.1 fredette if (the_bpf_header.bh_caplen != the_bpf_header.bh_datalen
270 1.1 fredette || ((interface_bpf->_ndbootd_interface_bpf_buffer_offset + the_bpf_header.bh_datalen)
271 1.1 fredette > interface_bpf->_ndbootd_interface_bpf_buffer_end)) {
272 1.1 fredette _NDBOOTD_DEBUG((fp, "bpf: flushed truncated BPF packet"));
273 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset += the_bpf_header.bh_datalen;
274 1.1 fredette continue;
275 1.1 fredette }
276 1.1 fredette /* silently ignore packets that don't even have Ethernet
277 1.1 fredette * headers, and those packets that we transmitted: */
278 1.1 fredette if (the_bpf_header.bh_datalen < sizeof(struct ether_header)
279 1.1 fredette || !memcmp(((struct ether_header *)
280 1.1 fredette (interface_bpf->_ndbootd_interface_bpf_buffer
281 1.1 fredette + interface_bpf->_ndbootd_interface_bpf_buffer_offset))->ether_shost,
282 1.1 fredette interface->ndbootd_interface_ether,
283 1.1 fredette ETHER_ADDR_LEN)) {
284 1.1 fredette /* silently ignore packets from us: */
285 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset += the_bpf_header.bh_datalen;
286 1.1 fredette continue;
287 1.1 fredette }
288 1.1 fredette /* if the caller hasn't provided a large enough buffer: */
289 1.1 fredette if (packet_buffer_size < the_bpf_header.bh_datalen) {
290 1.1 fredette errno = EIO;
291 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset += the_bpf_header.bh_datalen;
292 1.1 fredette return (-1);
293 1.1 fredette }
294 1.1 fredette /* return this captured packet to the user: */
295 1.1 fredette memcpy(packet_buffer,
296 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer
297 1.1 fredette + interface_bpf->_ndbootd_interface_bpf_buffer_offset,
298 1.1 fredette the_bpf_header.bh_datalen);
299 1.1 fredette interface_bpf->_ndbootd_interface_bpf_buffer_offset += the_bpf_header.bh_datalen;
300 1.1 fredette return (the_bpf_header.bh_datalen);
301 1.1 fredette }
302 1.1 fredette /* NOTREACHED */
303 1.1 fredette }
304 1.1 fredette
305 1.1 fredette /* this writes a raw packet: */
306 1.1 fredette int
307 1.1 fredette ndbootd_raw_write(struct ndbootd_interface * interface, void *packet_buffer, size_t packet_buffer_size)
308 1.1 fredette {
309 1.1 fredette return (write(interface->ndbootd_interface_fd, packet_buffer, packet_buffer_size));
310 1.1 fredette }
311