uvmac/src/UTIL/BPFILTER.h

366 lines
9.0 KiB
C

/*
UTIL/BPFILTER.h
Copyright (C) 2012 Michael Fort, Paul C. Pratt
You can redistribute this file and/or modify it under the terms
of version 2 of the GNU General Public License as published by
the Free Software Foundation. You should have received a copy
of the license along with this file; see the file COPYING.
This file is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
license for more details.
*/
/*
Berkeley Packet Filter for localtalk emulation
*/
/* BPF and devices */
static unsigned char device_address[6] = {
0
};
static unsigned int device_buffer_size = 0;
static int fd = -1; /* BPF file descriptor */
static struct bpf_version bpf_version;
static struct bpf_program bpf_program;
static struct bpf_insn insns[] =
{
/* Program for BPF to filter out non-LTOE packets */
BPF_STMT(BPF_LD + BPF_H + BPF_ABS, 12),
BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, 0x809B, 0, 1),
BPF_STMT(BPF_RET + BPF_K, 65535),
BPF_STMT(BPF_RET + BPF_K, 0),
};
uint8_t * LT_TxBuffer = NULL;
/* Transmit state */
uint16_t LT_TxBuffSz = 0;
/*
Transmit buffer that is reused from tx packet to tx packet.
The 's' byte represents the source mac address (ours) and we don't
have to initialize it because the MAC device will automatically
fill it in for us. The four 'p' bytes represent the process number
of this Mini vMac application. It helps differentiate packets
between two applications running on the same machine. It is not
used at this time. There is a small chance two applications could
get the same LLAP/SDLC address to start with and would not work
correctly (1 in 254). The 'S' bytes are the size of the LLAP packet
since it can be smaller than the minimum sized Ethernet frame.
The process number is replaced at initialization. The size is
updated just before sending to BPF. All LLAP data is inserted
starting at byte 20.
*/
static unsigned char tx_buffer[20 + LT_TxBfMxSz] =
"\xFF\xFF\xFF\xFF\xFF\xFFssssss\x80\x9BppppSS";
/* Receive state */
uint8_t * LT_RxBuffer = NULL;
/* When data pending, this is used */
uint32_t LT_RxBuffSz = 0;
/* When data pending, this is used */
/* Macro used by only the get_sockaddrs function for readability. */
#define ROUNDUP(a, size) \
(((a) & ((size) - 1)) ? (1 + ((a) | ((size) - 1))) : (a))
/*
Utility function needed for walking the addresses of the
kernel route lookup
*/
static void get_sockaddrs(int addrs, struct sockaddr* sa,
struct sockaddr** rti_info)
{
int loop;
int incr;
for (loop = 0; loop < RTAX_MAX; loop++) {
if (addrs & (1 << loop)) {
rti_info[loop] = sa;
incr = sa->sa_len ? ROUNDUP(sa->sa_len, sizeof(uint32_t))
: sizeof(uint32_t);
sa = (struct sockaddr*)((unsigned long int)sa + incr);
} else {
rti_info[loop] = NULL;
}
}
}
/*
This ugly function does a lot of steps to prepare the BPF
for our use.
1. Find the ethernet interface that the default route uses.
2. Determine the maximum number of BPF devices can exist.
3. Search for a usable BPF device and open it.
4. Set the BPF device to use our ethernet interface.
5. Get the proper buffer size to use with the BPF device.
6. Set some useful modes of operation on the BPF device.
7. Install a program on the device that filters out non-LTOE
packets.
*/
static int get_ethernet(void)
{
int result;
int size;
struct rt_msghdr* message;
struct sockaddr_in* addrs;
struct sockaddr* sa_list[RTAX_MAX];
int loop;
char filename[64];
struct ifreq ifreq;
int enable = 1;
struct kinfo_proc kp;
size_t len = sizeof(kp);
int max = 4;
char device[32];
/* Get a socket to routed for IPv4 */
fd = socket(PF_ROUTE, SOCK_RAW, AF_INET);
if (fd == -1) {
return false;
}
/* Allocate a message */
size = sizeof(struct rt_msghdr) + 16 * sizeof(struct sockaddr_in);
message = (struct rt_msghdr*)malloc(size);
if (! message) {
close(fd);
return false;
}
memset(message, 0, size);
addrs = (struct sockaddr_in*)(message + 1);
/* Fill in the request */
message->rtm_msglen = size;
message->rtm_version = RTM_VERSION;
message->rtm_type = RTM_GET;
message->rtm_addrs
= RTA_DST | RTA_GATEWAY | RTA_NETMASK | RTA_IFP | RTA_IFA;
addrs->sin_len = sizeof(struct sockaddr_in);
addrs->sin_family = AF_INET;
addrs->sin_addr.s_addr = 0; /* 0.0.0.0 is default route */
/* Send the message to the kernel */
result = write(fd, message, size);
if (result < 0) {
close(fd);
free(message);
return false;
}
/* Read the result from the kernel */
result = read(fd, message, size);
if (result < 0) {
close(fd);
free(message);
return false;
}
/* Close the route socket */
close(fd);
/* Get pointer to the result then parse it */
struct sockaddr* sa = (struct sockaddr*)
((unsigned long int)message + sizeof(struct rt_msghdr));
get_sockaddrs(message->rtm_addrs, sa, sa_list);
/* Must have a LINK (Ethernet) */
if ((! sa_list[RTAX_IFP])
|| (sa_list[RTAX_IFP]->sa_family != AF_LINK))
{
return false;
}
int namelen = ((struct sockaddr_dl*)sa_list[RTAX_IFP])->sdl_nlen;
#if 0
int addrlen = ((struct sockaddr_dl*)sa_list[RTAX_IFP])->sdl_alen;
#endif
strncpy(device,
&((struct sockaddr_dl*)sa_list[RTAX_IFP])->sdl_data[0],
namelen);
device[namelen] = 0;
memcpy(device_address,
&((struct sockaddr_dl*)sa_list[RTAX_IFP])->sdl_data[namelen],
6);
memcpy(&(tx_buffer[6]),
&((struct sockaddr_dl*)sa_list[RTAX_IFP])->sdl_data[namelen],
6);
result = sysctlbyname("debug.bpf_maxdevices", &kp, &len, NULL, 0);
if (result == -1) {
return false;
}
max = *((int *)&kp);
for (loop = 0; loop < max; loop++) {
sprintf(filename, "/dev/bpf%d", loop);
fd = open(filename, O_RDWR | O_NONBLOCK | O_EXLOCK);
if (fd >= 0) {
/* sprintf(buffer, "using %s\n", filename); */
break;
}
}
if (fd <= 0) {
return false;
}
memset(&ifreq, 0, sizeof(struct ifreq));
strncpy(ifreq.ifr_name, device, IFNAMSIZ);
result = ioctl(fd, BIOCSETIF, &ifreq);
if (result) {
return false;
}
result = ioctl(fd, BIOCGBLEN, &device_buffer_size);
if (result) {
return false;
}
result = ioctl(fd, BIOCPROMISC, &enable);
if (result) {
return false;
}
result = ioctl(fd, BIOCSSEESENT, &enable);
if (result) {
return false;
}
result = ioctl(fd, BIOCSHDRCMPLT, &enable);
if (result) {
return false;
}
result = ioctl(fd, BIOCIMMEDIATE, &enable);
if (result) {
return false;
}
result = ioctl(fd, BIOCVERSION, &bpf_version);
if (result) {
return false;
}
bpf_program.bf_len = 4;
bpf_program.bf_insns = insns;
result = ioctl(fd, BIOCSETF, &bpf_program);
if (result) {
return false;
}
return true;
}
static unsigned char *RxBuffer = NULL;
/*
External function needed at startup to initialize the LocalTalk
functionality.
*/
static int InitLocalTalk(void)
{
/* Perform a lot of stuff to get access to the Ethernet */
get_ethernet();
/*
Save the process id in the transmit buffer as it may be used
later to uniquely identify the sender to identify collisions
in dynamic llap node address assignment.
*/
*((uint32_t*)(&tx_buffer[14])) = htonl(getpid());
LT_TxBuffer = (uint8_t *)&tx_buffer[20];
RxBuffer = malloc(device_buffer_size);
if (NULL == RxBuffer) {
return false;
}
/* Initialized properly */
return true;
}
GLOBALOSGLUPROC LT_TransmitPacket(void)
{
int count;
/*
Write the length in the packet. This is needed because
Ethernet has a minimum 60 bytes length, which the MAC chip
will enforce on TX. Without the size, a simple 3 byte LLAP
packet would look like a (60 - 14 =) 46 byte LLAP packet.
*/
*((uint16_t*)(&tx_buffer[18])) = htons(LT_TxBuffSz);
/* Send the packet to Ethernet */
count = write(fd, tx_buffer, 20 + LT_TxBuffSz);
(void)count; /* unused */
}
static unsigned char* NextPacket = NULL;
static unsigned char* EndPackets = NULL;
static void LocalTalkTick0(void)
{
/* Get a single buffer worth of packets from BPF */
unsigned char* device_buffer = RxBuffer;
int bytes = read(fd, device_buffer, device_buffer_size);
if (bytes > 0) {
/* Maybe multiple packets in this buffer */
#if 0
dbglog_WriteNote("SCC founds packets from BPF");
#endif
NextPacket = device_buffer;
EndPackets = device_buffer + bytes;
}
}
GLOBALOSGLUPROC LT_ReceivePacket(void)
{
label_retry:
if (NextPacket == NULL) {
LocalTalkTick0();
if (NextPacket != NULL) {
goto label_retry;
}
} else if (NextPacket >= EndPackets) {
#if 0
dbglog_WriteNote("SCC finished set of packets from BPF");
#endif
NextPacket = NULL;
goto label_retry;
} else {
unsigned char* packet = NextPacket;
/* Get pointer to BPF header */
struct bpf_hdr* header = (struct bpf_hdr *)packet;
/* Advance to next packet in buffer */
NextPacket += BPF_WORDALIGN(header->bh_hdrlen
+ header->bh_caplen);
/* Get clean references to data */
int ethernet_length = header->bh_caplen - 14;
int llap_length = htons(*((uint16_t*)(packet
+ header->bh_hdrlen + 18)));
unsigned char* start = packet + header->bh_hdrlen + 20;
if (llap_length <= ethernet_length) {
/* Start the receiver */
LT_RxBuffer = (uint8_t *)start;
LT_RxBuffSz = llap_length;
} else {
goto label_retry;
}
}
}