1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
3 Copyright © 2013 Intel Corporation. All rights reserved.
7 #include <net/ethernet.h>
9 #include <net/if_arp.h>
12 #include <linux/filter.h>
13 #include <linux/if_infiniband.h>
14 #include <linux/if_packet.h>
16 #include "dhcp-internal.h"
18 #include "socket-util.h"
19 #include "unaligned.h"
21 static int _bind_raw_socket(
23 union sockaddr_union
*link
,
25 const struct hw_addr_data
*hw_addr
,
26 const struct hw_addr_data
*bcast_addr
,
36 assert(IN_SET(arp_type
, ARPHRD_ETHER
, ARPHRD_INFINIBAND
));
40 assert(hw_addr
->length
== ETH_ALEN
);
41 assert(bcast_addr
->length
== ETH_ALEN
);
43 case ARPHRD_INFINIBAND
:
44 assert(hw_addr
->length
== 0);
45 assert(bcast_addr
->length
== INFINIBAND_ALEN
);
51 struct sock_filter filter
[] = {
52 BPF_STMT(BPF_LD
+ BPF_W
+ BPF_LEN
, 0), /* A <- packet length */
53 BPF_JUMP(BPF_JMP
+ BPF_JGE
+ BPF_K
, sizeof(DHCPPacket
), 1, 0), /* packet >= DHCPPacket ? */
54 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
55 BPF_STMT(BPF_LD
+ BPF_B
+ BPF_ABS
, offsetof(DHCPPacket
, ip
.protocol
)), /* A <- IP protocol */
56 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, IPPROTO_UDP
, 1, 0), /* IP protocol == UDP ? */
57 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
58 BPF_STMT(BPF_LD
+ BPF_B
+ BPF_ABS
, offsetof(DHCPPacket
, ip
.frag_off
)), /* A <- Flags */
59 BPF_STMT(BPF_ALU
+ BPF_AND
+ BPF_K
, 0x20), /* A <- A & 0x20 (More Fragments bit) */
60 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, 0, 1, 0), /* A == 0 ? */
61 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
62 BPF_STMT(BPF_LD
+ BPF_H
+ BPF_ABS
, offsetof(DHCPPacket
, ip
.frag_off
)), /* A <- Flags + Fragment offset */
63 BPF_STMT(BPF_ALU
+ BPF_AND
+ BPF_K
, 0x1fff), /* A <- A & 0x1fff (Fragment offset) */
64 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, 0, 1, 0), /* A == 0 ? */
65 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
66 BPF_STMT(BPF_LD
+ BPF_H
+ BPF_ABS
, offsetof(DHCPPacket
, udp
.dest
)), /* A <- UDP destination port */
67 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, port
, 1, 0), /* UDP destination port == DHCP client port ? */
68 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
69 BPF_STMT(BPF_LD
+ BPF_B
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.op
)), /* A <- DHCP op */
70 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, BOOTREPLY
, 1, 0), /* op == BOOTREPLY ? */
71 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
72 BPF_STMT(BPF_LD
+ BPF_B
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.htype
)), /* A <- DHCP header type */
73 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, arp_type
, 1, 0), /* header type == arp_type ? */
74 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
75 BPF_STMT(BPF_LD
+ BPF_W
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.xid
)), /* A <- client identifier */
76 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, xid
, 1, 0), /* client identifier == xid ? */
77 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
78 BPF_STMT(BPF_LD
+ BPF_B
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.hlen
)), /* A <- MAC address length */
79 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, (uint8_t) hw_addr
->length
, 1, 0), /* address length == hw_addr->length ? */
80 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
82 /* We only support MAC address length to be either 0 or 6 (ETH_ALEN). Optionally
83 * compare chaddr for ETH_ALEN bytes. */
84 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, ETH_ALEN
, 0, 8), /* A (the MAC address length) == ETH_ALEN ? */
85 BPF_STMT(BPF_LDX
+ BPF_IMM
, unaligned_read_be32(hw_addr
->bytes
)), /* X <- 4 bytes of client's MAC */
86 BPF_STMT(BPF_LD
+ BPF_W
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.chaddr
)), /* A <- 4 bytes of MAC from dhcp.chaddr */
87 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_X
, 0, 1, 0), /* A == X ? */
88 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
89 BPF_STMT(BPF_LDX
+ BPF_IMM
, unaligned_read_be16(hw_addr
->bytes
+ 4)), /* X <- remainder of client's MAC */
90 BPF_STMT(BPF_LD
+ BPF_H
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.chaddr
) + 4), /* A <- remainder of MAC from dhcp.chaddr */
91 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_X
, 0, 1, 0), /* A == X ? */
92 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
94 BPF_STMT(BPF_LD
+ BPF_W
+ BPF_ABS
, offsetof(DHCPPacket
, dhcp
.magic
)), /* A <- DHCP magic cookie */
95 BPF_JUMP(BPF_JMP
+ BPF_JEQ
+ BPF_K
, DHCP_MAGIC_COOKIE
, 1, 0), /* cookie == DHCP magic cookie ? */
96 BPF_STMT(BPF_RET
+ BPF_K
, 0), /* ignore */
97 BPF_STMT(BPF_RET
+ BPF_K
, UINT32_MAX
), /* accept */
99 struct sock_fprog fprog
= {
100 .len
= ELEMENTSOF(filter
),
103 _cleanup_close_
int s
= -EBADF
;
106 s
= socket(AF_PACKET
, SOCK_DGRAM
| SOCK_CLOEXEC
| SOCK_NONBLOCK
, 0);
110 r
= setsockopt_int(s
, SOL_PACKET
, PACKET_AUXDATA
, true);
114 r
= setsockopt(s
, SOL_SOCKET
, SO_ATTACH_FILTER
, &fprog
, sizeof(fprog
));
118 if (so_priority_set
) {
119 r
= setsockopt_int(s
, SOL_SOCKET
, SO_PRIORITY
, so_priority
);
124 link
->ll
= (struct sockaddr_ll
) {
125 .sll_family
= AF_PACKET
,
126 .sll_protocol
= htobe16(ETH_P_IP
),
127 .sll_ifindex
= ifindex
,
128 .sll_hatype
= htobe16(arp_type
),
129 .sll_halen
= bcast_addr
->length
,
131 /* We may overflow link->ll. link->ll_buffer ensures we have enough space. */
132 memcpy(link
->ll
.sll_addr
, bcast_addr
->bytes
, bcast_addr
->length
);
134 r
= bind(s
, &link
->sa
, SOCKADDR_LL_LEN(link
->ll
));
141 int dhcp_network_bind_raw_socket(
143 union sockaddr_union
*link
,
145 const struct hw_addr_data
*hw_addr
,
146 const struct hw_addr_data
*bcast_addr
,
149 bool so_priority_set
,
152 static struct hw_addr_data default_eth_bcast
= {
154 .ether
= {{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }},
155 }, default_ib_bcast
= {
156 .length
= INFINIBAND_ALEN
,
158 0x00, 0xff, 0xff, 0xff, 0xff, 0x12, 0x40, 0x1b,
159 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
160 0xff, 0xff, 0xff, 0xff
170 return _bind_raw_socket(ifindex
, link
, xid
,
172 (bcast_addr
&& !hw_addr_is_null(bcast_addr
)) ? bcast_addr
: &default_eth_bcast
,
173 arp_type
, port
, so_priority_set
, so_priority
);
175 case ARPHRD_INFINIBAND
:
176 return _bind_raw_socket(ifindex
, link
, xid
,
178 (bcast_addr
&& !hw_addr_is_null(bcast_addr
)) ? bcast_addr
: &default_ib_bcast
,
179 arp_type
, port
, so_priority_set
, so_priority
);
185 int dhcp_network_bind_udp_socket(int ifindex
, be32_t address
, uint16_t port
, int ip_service_type
) {
186 union sockaddr_union src
= {
187 .in
.sin_family
= AF_INET
,
188 .in
.sin_port
= htobe16(port
),
189 .in
.sin_addr
.s_addr
= address
,
191 _cleanup_close_
int s
= -EBADF
;
194 s
= socket(AF_INET
, SOCK_DGRAM
| SOCK_CLOEXEC
| SOCK_NONBLOCK
, 0);
198 if (ip_service_type
>= 0)
199 r
= setsockopt_int(s
, IPPROTO_IP
, IP_TOS
, ip_service_type
);
201 r
= setsockopt_int(s
, IPPROTO_IP
, IP_TOS
, IPTOS_CLASS_CS6
);
205 r
= setsockopt_int(s
, SOL_SOCKET
, SO_REUSEADDR
, true);
210 r
= socket_bind_to_ifindex(s
, ifindex
);
215 if (port
== DHCP_PORT_SERVER
) {
216 r
= setsockopt_int(s
, SOL_SOCKET
, SO_BROADCAST
, true);
219 if (address
== INADDR_ANY
) {
220 /* IP_PKTINFO filter should not be applied when packets are
221 allowed to enter/leave through the interface other than
222 DHCP server sits on(BindToInterface option). */
223 r
= setsockopt_int(s
, IPPROTO_IP
, IP_PKTINFO
, true);
228 r
= setsockopt_int(s
, IPPROTO_IP
, IP_FREEBIND
, true);
233 if (bind(s
, &src
.sa
, sizeof(src
.in
)) < 0)
239 int dhcp_network_send_raw_socket(
241 const union sockaddr_union
*link
,
245 /* Do not add assert(s >= 0) here, as this is called in fuzz-dhcp-server, and in that case this
246 * function should fail with negative errno. */
252 if (sendto(s
, packet
, len
, 0, &link
->sa
, SOCKADDR_LL_LEN(link
->ll
)) < 0)
258 int dhcp_network_send_udp_socket(
265 union sockaddr_union dest
= {
266 .in
.sin_family
= AF_INET
,
267 .in
.sin_port
= htobe16(port
),
268 .in
.sin_addr
.s_addr
= address
,
275 if (sendto(s
, packet
, len
, 0, &dest
.sa
, sizeof(dest
.in
)) < 0)