x_snoop.c 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. /*
  2. * Generic Snooping for Proxy ARP
  3. * Copyright (c) 2014, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "hostapd.h"
  11. #include "sta_info.h"
  12. #include "ap_drv_ops.h"
  13. #include "x_snoop.h"
  14. int x_snoop_init(struct hostapd_data *hapd)
  15. {
  16. struct hostapd_bss_config *conf = hapd->conf;
  17. if (!conf->isolate) {
  18. wpa_printf(MSG_DEBUG,
  19. "x_snoop: ap_isolate must be enabled for x_snoop");
  20. return -1;
  21. }
  22. if (conf->bridge[0] == '\0') {
  23. wpa_printf(MSG_DEBUG,
  24. "x_snoop: Bridge must be configured for x_snoop");
  25. return -1;
  26. }
  27. if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE,
  28. 1)) {
  29. wpa_printf(MSG_DEBUG,
  30. "x_snoop: Failed to enable hairpin_mode on the bridge port");
  31. return -1;
  32. }
  33. if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 1)) {
  34. wpa_printf(MSG_DEBUG,
  35. "x_snoop: Failed to enable proxyarp on the bridge port");
  36. return -1;
  37. }
  38. if (hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT,
  39. 1)) {
  40. wpa_printf(MSG_DEBUG,
  41. "x_snoop: Failed to enable accepting gratuitous ARP on the bridge");
  42. return -1;
  43. }
  44. #ifdef CONFIG_IPV6
  45. if (hostapd_drv_br_set_net_param(hapd, DRV_BR_MULTICAST_SNOOPING, 1)) {
  46. wpa_printf(MSG_DEBUG,
  47. "x_snoop: Failed to enable multicast snooping on the bridge");
  48. return -1;
  49. }
  50. #endif /* CONFIG_IPV6 */
  51. return 0;
  52. }
  53. struct l2_packet_data *
  54. x_snoop_get_l2_packet(struct hostapd_data *hapd,
  55. void (*handler)(void *ctx, const u8 *src_addr,
  56. const u8 *buf, size_t len),
  57. enum l2_packet_filter_type type)
  58. {
  59. struct hostapd_bss_config *conf = hapd->conf;
  60. struct l2_packet_data *l2;
  61. l2 = l2_packet_init(conf->bridge, NULL, ETH_P_ALL, handler, hapd, 1);
  62. if (l2 == NULL) {
  63. wpa_printf(MSG_DEBUG,
  64. "x_snoop: Failed to initialize L2 packet processing %s",
  65. strerror(errno));
  66. return NULL;
  67. }
  68. if (l2_packet_set_packet_filter(l2, type)) {
  69. wpa_printf(MSG_DEBUG,
  70. "x_snoop: Failed to set L2 packet filter for type: %d",
  71. type);
  72. l2_packet_deinit(l2);
  73. return NULL;
  74. }
  75. return l2;
  76. }
  77. void x_snoop_mcast_to_ucast_convert_send(struct hostapd_data *hapd,
  78. struct sta_info *sta, u8 *buf,
  79. size_t len)
  80. {
  81. int res;
  82. u8 addr[ETH_ALEN];
  83. u8 *dst_addr = buf;
  84. if (!(dst_addr[0] & 0x01))
  85. return;
  86. wpa_printf(MSG_EXCESSIVE, "x_snoop: Multicast-to-unicast conversion "
  87. MACSTR " -> " MACSTR " (len %u)",
  88. MAC2STR(dst_addr), MAC2STR(sta->addr), (unsigned int) len);
  89. /* save the multicast destination address for restoring it later */
  90. os_memcpy(addr, buf, ETH_ALEN);
  91. os_memcpy(buf, sta->addr, ETH_ALEN);
  92. res = l2_packet_send(hapd->sock_dhcp, NULL, 0, buf, len);
  93. if (res < 0) {
  94. wpa_printf(MSG_DEBUG,
  95. "x_snoop: Failed to send mcast to ucast converted packet to "
  96. MACSTR, MAC2STR(sta->addr));
  97. }
  98. /* restore the multicast destination address */
  99. os_memcpy(buf, addr, ETH_ALEN);
  100. }
  101. void x_snoop_deinit(struct hostapd_data *hapd)
  102. {
  103. hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT, 0);
  104. hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 0);
  105. hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE, 0);
  106. }