]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd-network/lldp-network.c
ci: re-enable uefi secure boot
[thirdparty/systemd.git] / src / libsystemd-network / lldp-network.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
ad1ad5c8
SS
2
3#include <linux/filter.h>
ad1ad5c8 4
3ffd4af2 5#include "fd-util.h"
3ffd4af2 6#include "lldp-network.h"
3ffd4af2 7#include "socket-util.h"
ad1ad5c8
SS
8
9int lldp_network_bind_raw_socket(int ifindex) {
35897745
LP
10 static const struct sock_filter filter[] = {
11 BPF_STMT(BPF_LD + BPF_W + BPF_ABS, offsetof(struct ethhdr, h_dest)), /* A <- 4 bytes of destination MAC */
ad1ad5c8
SS
12 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0180c200, 1, 0), /* A != 01:80:c2:00 */
13 BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */
35897745 14 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct ethhdr, h_dest) + 4), /* A <- remaining 2 bytes of destination MAC */
ad1ad5c8
SS
15 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0000, 3, 0), /* A != 00:00 */
16 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0003, 2, 0), /* A != 00:03 */
17 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x000e, 1, 0), /* A != 00:0e */
18 BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */
35897745 19 BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct ethhdr, h_proto)), /* A <- protocol */
92b64168 20 BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETH_P_LLDP, 1, 0), /* A != ETH_P_LLDP */
ad1ad5c8 21 BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */
f5fbe71d 22 BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept packet */
ad1ad5c8 23 };
35897745 24 static const struct sock_fprog fprog = {
ad1ad5c8 25 .len = ELEMENTSOF(filter),
35897745 26 .filter = (struct sock_filter*) filter,
ad1ad5c8 27 };
6f844e3a
MK
28 struct packet_mreq mreq = {
29 .mr_ifindex = ifindex,
30 .mr_type = PACKET_MR_MULTICAST,
31 .mr_alen = ETH_ALEN,
32 .mr_address = { 0x01, 0x80, 0xC2, 0x00, 0x00, 0x00 }
33 };
ad1ad5c8
SS
34 union sockaddr_union saddrll = {
35 .ll.sll_family = AF_PACKET,
36 .ll.sll_ifindex = ifindex,
37 };
254d1313 38 _cleanup_close_ int fd = -EBADF;
ad1ad5c8
SS
39
40 assert(ifindex > 0);
41
40eb1b0a 42 fd = socket(AF_PACKET, SOCK_RAW|SOCK_CLOEXEC|SOCK_NONBLOCK,
92b64168 43 htobe16(ETH_P_LLDP));
35897745 44 if (fd < 0)
ad1ad5c8
SS
45 return -errno;
46
36f1955d 47 if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &fprog, sizeof(fprog)) < 0)
ad1ad5c8
SS
48 return -errno;
49
e9ea4313 50 /* customer bridge */
36f1955d 51 if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
6f844e3a
MK
52 return -errno;
53
e9ea4313 54 /* non TPMR bridge */
6f844e3a 55 mreq.mr_address[ETH_ALEN - 1] = 0x03;
36f1955d 56 if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
6f844e3a
MK
57 return -errno;
58
e9ea4313 59 /* nearest bridge */
6f844e3a 60 mreq.mr_address[ETH_ALEN - 1] = 0x0E;
36f1955d 61 if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
6f844e3a
MK
62 return -errno;
63
36f1955d 64 if (bind(fd, &saddrll.sa, sizeof(saddrll.ll)) < 0)
ad1ad5c8
SS
65 return -errno;
66
c10d6bdb 67 return TAKE_FD(fd);
ad1ad5c8 68}