]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
ad1ad5c8 SS |
2 | |
3 | #include <linux/filter.h> | |
ad1ad5c8 | 4 | |
3ffd4af2 | 5 | #include "fd-util.h" |
3ffd4af2 | 6 | #include "lldp-network.h" |
3ffd4af2 | 7 | #include "socket-util.h" |
ad1ad5c8 SS |
8 | |
9 | int lldp_network_bind_raw_socket(int ifindex) { | |
35897745 LP |
10 | static const struct sock_filter filter[] = { |
11 | BPF_STMT(BPF_LD + BPF_W + BPF_ABS, offsetof(struct ethhdr, h_dest)), /* A <- 4 bytes of destination MAC */ | |
ad1ad5c8 SS |
12 | BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0180c200, 1, 0), /* A != 01:80:c2:00 */ |
13 | BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */ | |
35897745 | 14 | BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct ethhdr, h_dest) + 4), /* A <- remaining 2 bytes of destination MAC */ |
ad1ad5c8 SS |
15 | BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0000, 3, 0), /* A != 00:00 */ |
16 | BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x0003, 2, 0), /* A != 00:03 */ | |
17 | BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x000e, 1, 0), /* A != 00:0e */ | |
18 | BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */ | |
35897745 | 19 | BPF_STMT(BPF_LD + BPF_H + BPF_ABS, offsetof(struct ethhdr, h_proto)), /* A <- protocol */ |
92b64168 | 20 | BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, ETH_P_LLDP, 1, 0), /* A != ETH_P_LLDP */ |
ad1ad5c8 | 21 | BPF_STMT(BPF_RET + BPF_K, 0), /* drop packet */ |
f5fbe71d | 22 | BPF_STMT(BPF_RET + BPF_K, UINT32_MAX), /* accept packet */ |
ad1ad5c8 | 23 | }; |
35897745 | 24 | static const struct sock_fprog fprog = { |
ad1ad5c8 | 25 | .len = ELEMENTSOF(filter), |
35897745 | 26 | .filter = (struct sock_filter*) filter, |
ad1ad5c8 | 27 | }; |
6f844e3a MK |
28 | struct packet_mreq mreq = { |
29 | .mr_ifindex = ifindex, | |
30 | .mr_type = PACKET_MR_MULTICAST, | |
31 | .mr_alen = ETH_ALEN, | |
32 | .mr_address = { 0x01, 0x80, 0xC2, 0x00, 0x00, 0x00 } | |
33 | }; | |
ad1ad5c8 SS |
34 | union sockaddr_union saddrll = { |
35 | .ll.sll_family = AF_PACKET, | |
36 | .ll.sll_ifindex = ifindex, | |
37 | }; | |
254d1313 | 38 | _cleanup_close_ int fd = -EBADF; |
ad1ad5c8 SS |
39 | |
40 | assert(ifindex > 0); | |
41 | ||
40eb1b0a | 42 | fd = socket(AF_PACKET, SOCK_RAW|SOCK_CLOEXEC|SOCK_NONBLOCK, |
92b64168 | 43 | htobe16(ETH_P_LLDP)); |
35897745 | 44 | if (fd < 0) |
ad1ad5c8 SS |
45 | return -errno; |
46 | ||
36f1955d | 47 | if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_FILTER, &fprog, sizeof(fprog)) < 0) |
ad1ad5c8 SS |
48 | return -errno; |
49 | ||
e9ea4313 | 50 | /* customer bridge */ |
36f1955d | 51 | if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0) |
6f844e3a MK |
52 | return -errno; |
53 | ||
e9ea4313 | 54 | /* non TPMR bridge */ |
6f844e3a | 55 | mreq.mr_address[ETH_ALEN - 1] = 0x03; |
36f1955d | 56 | if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0) |
6f844e3a MK |
57 | return -errno; |
58 | ||
e9ea4313 | 59 | /* nearest bridge */ |
6f844e3a | 60 | mreq.mr_address[ETH_ALEN - 1] = 0x0E; |
36f1955d | 61 | if (setsockopt(fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0) |
6f844e3a MK |
62 | return -errno; |
63 | ||
36f1955d | 64 | if (bind(fd, &saddrll.sa, sizeof(saddrll.ll)) < 0) |
ad1ad5c8 SS |
65 | return -errno; |
66 | ||
c10d6bdb | 67 | return TAKE_FD(fd); |
ad1ad5c8 | 68 | } |