blob: 029f4de239f0797e582a02e9459c713afed04fd0 [file] [log] [blame]
/*
* Generic Snooping for Proxy ARP
* Copyright (c) 2014, Qualcomm Atheros, Inc.
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#include "utils/includes.h"
#include "utils/common.h"
#include "hostapd.h"
#include "sta_info.h"
#include "ap_drv_ops.h"
#include "x_snoop.h"
int x_snoop_init(struct hostapd_data *hapd)
{
struct hostapd_bss_config *conf = hapd->conf;
if (!conf->isolate) {
wpa_printf(MSG_DEBUG,
"x_snoop: ap_isolate must be enabled for x_snoop");
return -1;
}
if (conf->bridge[0] == '\0') {
wpa_printf(MSG_DEBUG,
"x_snoop: Bridge must be configured for x_snoop");
return -1;
}
hapd->x_snoop_initialized = true;
if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE,
1)) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to enable hairpin_mode on the bridge port");
return -1;
}
if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 1)) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to enable proxyarp on the bridge port");
return -1;
}
if (hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT,
1)) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to enable accepting gratuitous ARP on the bridge");
return -1;
}
#ifdef CONFIG_IPV6
if (hostapd_drv_br_set_net_param(hapd, DRV_BR_MULTICAST_SNOOPING, 1)) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to enable multicast snooping on the bridge");
return -1;
}
#endif /* CONFIG_IPV6 */
return 0;
}
struct l2_packet_data *
x_snoop_get_l2_packet(struct hostapd_data *hapd,
void (*handler)(void *ctx, const u8 *src_addr,
const u8 *buf, size_t len),
enum l2_packet_filter_type type)
{
struct hostapd_bss_config *conf = hapd->conf;
struct l2_packet_data *l2;
l2 = l2_packet_init(conf->bridge, NULL, ETH_P_ALL, handler, hapd, 1);
if (l2 == NULL) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to initialize L2 packet processing %s",
strerror(errno));
return NULL;
}
if (l2_packet_set_packet_filter(l2, type)) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to set L2 packet filter for type: %d",
type);
l2_packet_deinit(l2);
return NULL;
}
return l2;
}
void x_snoop_mcast_to_ucast_convert_send(struct hostapd_data *hapd,
struct sta_info *sta, u8 *buf,
size_t len)
{
int res;
u8 addr[ETH_ALEN];
u8 *dst_addr = buf;
if (!(dst_addr[0] & 0x01))
return;
wpa_printf(MSG_EXCESSIVE, "x_snoop: Multicast-to-unicast conversion "
MACSTR " -> " MACSTR " (len %u)",
MAC2STR(dst_addr), MAC2STR(sta->addr), (unsigned int) len);
/* save the multicast destination address for restoring it later */
os_memcpy(addr, buf, ETH_ALEN);
os_memcpy(buf, sta->addr, ETH_ALEN);
res = l2_packet_send(hapd->sock_dhcp, NULL, 0, buf, len);
if (res < 0) {
wpa_printf(MSG_DEBUG,
"x_snoop: Failed to send mcast to ucast converted packet to "
MACSTR, MAC2STR(sta->addr));
}
/* restore the multicast destination address */
os_memcpy(buf, addr, ETH_ALEN);
}
void x_snoop_deinit(struct hostapd_data *hapd)
{
if (!hapd->x_snoop_initialized)
return;
hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT, 0);
hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 0);
hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE, 0);
hapd->x_snoop_initialized = false;
}