net_user.c 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. /*
  2. * Copyright (C) 2001, 2002 Jeff Dike (jdike@karaya.com)
  3. * Licensed under the GPL
  4. */
  5. #include <stddef.h>
  6. #include <stdarg.h>
  7. #include <unistd.h>
  8. #include <stdio.h>
  9. #include <errno.h>
  10. #include <stdlib.h>
  11. #include <string.h>
  12. #include <sys/socket.h>
  13. #include <sys/wait.h>
  14. #include <sys/time.h>
  15. #include "user.h"
  16. #include "user_util.h"
  17. #include "kern_util.h"
  18. #include "net_user.h"
  19. #include "os.h"
  20. int tap_open_common(void *dev, char *gate_addr)
  21. {
  22. int tap_addr[4];
  23. if(gate_addr == NULL)
  24. return 0;
  25. if(sscanf(gate_addr, "%d.%d.%d.%d", &tap_addr[0],
  26. &tap_addr[1], &tap_addr[2], &tap_addr[3]) != 4){
  27. printk("Invalid tap IP address - '%s'\n", gate_addr);
  28. return -EINVAL;
  29. }
  30. return 0;
  31. }
  32. void tap_check_ips(char *gate_addr, unsigned char *eth_addr)
  33. {
  34. int tap_addr[4];
  35. if((gate_addr != NULL) &&
  36. (sscanf(gate_addr, "%d.%d.%d.%d", &tap_addr[0],
  37. &tap_addr[1], &tap_addr[2], &tap_addr[3]) == 4) &&
  38. (eth_addr[0] == tap_addr[0]) &&
  39. (eth_addr[1] == tap_addr[1]) &&
  40. (eth_addr[2] == tap_addr[2]) &&
  41. (eth_addr[3] == tap_addr[3])){
  42. printk("The tap IP address and the UML eth IP address"
  43. " must be different\n");
  44. }
  45. }
  46. /* Do reliable error handling as this fails frequently enough. */
  47. void read_output(int fd, char *output, int len)
  48. {
  49. int remain, ret, expected;
  50. char c;
  51. char *str;
  52. if(output == NULL){
  53. output = &c;
  54. len = sizeof(c);
  55. }
  56. *output = '\0';
  57. ret = os_read_file(fd, &remain, sizeof(remain));
  58. if (ret != sizeof(remain)) {
  59. expected = sizeof(remain);
  60. str = "length";
  61. goto err;
  62. }
  63. while(remain != 0){
  64. expected = (remain < len) ? remain : len;
  65. ret = os_read_file(fd, output, expected);
  66. if (ret != expected) {
  67. str = "data";
  68. goto err;
  69. }
  70. remain -= ret;
  71. }
  72. return;
  73. err:
  74. if (ret < 0)
  75. printk("read_output - read of %s failed, errno = %d\n", str, -ret);
  76. else
  77. printk("read_output - read of %s failed, read only %d of %d bytes\n", str, ret, expected);
  78. }
  79. int net_read(int fd, void *buf, int len)
  80. {
  81. int n;
  82. n = os_read_file(fd, buf, len);
  83. if(n == -EAGAIN)
  84. return 0;
  85. else if(n == 0)
  86. return -ENOTCONN;
  87. return n;
  88. }
  89. int net_recvfrom(int fd, void *buf, int len)
  90. {
  91. int n;
  92. CATCH_EINTR(n = recvfrom(fd, buf, len, 0, NULL, NULL));
  93. if(n < 0){
  94. if(errno == EAGAIN)
  95. return 0;
  96. return -errno;
  97. }
  98. else if(n == 0)
  99. return -ENOTCONN;
  100. return n;
  101. }
  102. int net_write(int fd, void *buf, int len)
  103. {
  104. int n;
  105. n = os_write_file(fd, buf, len);
  106. if(n == -EAGAIN)
  107. return 0;
  108. else if(n == 0)
  109. return -ENOTCONN;
  110. return n;
  111. }
  112. int net_send(int fd, void *buf, int len)
  113. {
  114. int n;
  115. CATCH_EINTR(n = send(fd, buf, len, 0));
  116. if(n < 0){
  117. if(errno == EAGAIN)
  118. return 0;
  119. return -errno;
  120. }
  121. else if(n == 0)
  122. return -ENOTCONN;
  123. return n;
  124. }
  125. int net_sendto(int fd, void *buf, int len, void *to, int sock_len)
  126. {
  127. int n;
  128. CATCH_EINTR(n = sendto(fd, buf, len, 0, (struct sockaddr *) to,
  129. sock_len));
  130. if(n < 0){
  131. if(errno == EAGAIN)
  132. return 0;
  133. return -errno;
  134. }
  135. else if(n == 0)
  136. return -ENOTCONN;
  137. return n;
  138. }
  139. struct change_pre_exec_data {
  140. int close_me;
  141. int stdout;
  142. };
  143. static void change_pre_exec(void *arg)
  144. {
  145. struct change_pre_exec_data *data = arg;
  146. os_close_file(data->close_me);
  147. dup2(data->stdout, 1);
  148. }
  149. static int change_tramp(char **argv, char *output, int output_len)
  150. {
  151. int pid, fds[2], err;
  152. struct change_pre_exec_data pe_data;
  153. err = os_pipe(fds, 1, 0);
  154. if(err < 0){
  155. printk("change_tramp - pipe failed, err = %d\n", -err);
  156. return err;
  157. }
  158. pe_data.close_me = fds[0];
  159. pe_data.stdout = fds[1];
  160. pid = run_helper(change_pre_exec, &pe_data, argv, NULL);
  161. if (pid > 0) /* Avoid hang as we won't get data in failure case. */
  162. read_output(fds[0], output, output_len);
  163. os_close_file(fds[0]);
  164. os_close_file(fds[1]);
  165. if (pid > 0)
  166. CATCH_EINTR(err = waitpid(pid, NULL, 0));
  167. return pid;
  168. }
  169. static void change(char *dev, char *what, unsigned char *addr,
  170. unsigned char *netmask)
  171. {
  172. char addr_buf[sizeof("255.255.255.255\0")];
  173. char netmask_buf[sizeof("255.255.255.255\0")];
  174. char version[sizeof("nnnnn\0")];
  175. char *argv[] = { "uml_net", version, what, dev, addr_buf,
  176. netmask_buf, NULL };
  177. char *output;
  178. int output_len, pid;
  179. sprintf(version, "%d", UML_NET_VERSION);
  180. sprintf(addr_buf, "%d.%d.%d.%d", addr[0], addr[1], addr[2], addr[3]);
  181. sprintf(netmask_buf, "%d.%d.%d.%d", netmask[0], netmask[1],
  182. netmask[2], netmask[3]);
  183. output_len = page_size();
  184. output = um_kmalloc(output_len);
  185. if(output == NULL)
  186. printk("change : failed to allocate output buffer\n");
  187. pid = change_tramp(argv, output, output_len);
  188. if(pid < 0) return;
  189. if(output != NULL){
  190. printk("%s", output);
  191. kfree(output);
  192. }
  193. }
  194. void open_addr(unsigned char *addr, unsigned char *netmask, void *arg)
  195. {
  196. change(arg, "add", addr, netmask);
  197. }
  198. void close_addr(unsigned char *addr, unsigned char *netmask, void *arg)
  199. {
  200. change(arg, "del", addr, netmask);
  201. }
  202. char *split_if_spec(char *str, ...)
  203. {
  204. char **arg, *end;
  205. va_list ap;
  206. va_start(ap, str);
  207. while((arg = va_arg(ap, char **)) != NULL){
  208. if(*str == '\0')
  209. return NULL;
  210. end = strchr(str, ',');
  211. if(end != str)
  212. *arg = str;
  213. if(end == NULL)
  214. return NULL;
  215. *end++ = '\0';
  216. str = end;
  217. }
  218. va_end(ap);
  219. return str;
  220. }
  221. void random_mac(unsigned char *addr)
  222. {
  223. struct timeval tv;
  224. long n;
  225. unsigned int seed;
  226. gettimeofday(&tv, NULL);
  227. /* Assume that 20 bits of microseconds and 12 bits of the pid are
  228. * reasonably unpredictable.
  229. */
  230. seed = tv.tv_usec | (os_getpid() << 20);
  231. srandom(seed);
  232. /* Don't care about endianness here - switching endianness
  233. * just rearranges what are hopefully random numbers.
  234. *
  235. * Assume that RAND_MAX > 65536, so random is called twice and
  236. * we use 16 bits of the result.
  237. */
  238. n = random();
  239. addr[2] = (n >> 8) & 255;
  240. addr[3] = n % 255;
  241. n = random();
  242. addr[4] = (n >> 8) & 255;
  243. addr[5] = n % 255;
  244. }