vlan_init.c 27 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196
  1. /*
  2. * hostapd / VLAN initialization
  3. * Copyright 2003, Instant802 Networks, Inc.
  4. * Copyright 2005-2006, Devicescape Software, Inc.
  5. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  6. *
  7. * This software may be distributed under the terms of the BSD license.
  8. * See README for more details.
  9. */
  10. #include "utils/includes.h"
  11. #include <net/if.h>
  12. #include <sys/ioctl.h>
  13. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  14. #include <linux/sockios.h>
  15. #include <linux/if_vlan.h>
  16. #include <linux/if_bridge.h>
  17. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  18. #include "utils/common.h"
  19. #include "hostapd.h"
  20. #include "ap_config.h"
  21. #include "ap_drv_ops.h"
  22. #include "wpa_auth.h"
  23. #include "vlan_init.h"
  24. #include "vlan_util.h"
  25. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  26. #include "drivers/priv_netlink.h"
  27. #include "utils/eloop.h"
  28. struct full_dynamic_vlan {
  29. int s; /* socket on which to listen for new/removed interfaces. */
  30. };
  31. #define DVLAN_CLEAN_BR 0x1
  32. #define DVLAN_CLEAN_VLAN 0x2
  33. #define DVLAN_CLEAN_VLAN_PORT 0x4
  34. struct dynamic_iface {
  35. char ifname[IFNAMSIZ + 1];
  36. int usage;
  37. int clean;
  38. struct dynamic_iface *next;
  39. };
  40. /* Increment ref counter for ifname and add clean flag.
  41. * If not in list, add it only if some flags are given.
  42. */
  43. static void dyn_iface_get(struct hostapd_data *hapd, const char *ifname,
  44. int clean)
  45. {
  46. struct dynamic_iface *next, **dynamic_ifaces;
  47. struct hapd_interfaces *interfaces;
  48. interfaces = hapd->iface->interfaces;
  49. dynamic_ifaces = &interfaces->vlan_priv;
  50. for (next = *dynamic_ifaces; next; next = next->next) {
  51. if (os_strcmp(ifname, next->ifname) == 0)
  52. break;
  53. }
  54. if (next) {
  55. next->usage++;
  56. next->clean |= clean;
  57. return;
  58. }
  59. if (!clean)
  60. return;
  61. next = os_zalloc(sizeof(*next));
  62. if (!next)
  63. return;
  64. os_strlcpy(next->ifname, ifname, sizeof(next->ifname));
  65. next->usage = 1;
  66. next->clean = clean;
  67. next->next = *dynamic_ifaces;
  68. *dynamic_ifaces = next;
  69. }
  70. /* Decrement reference counter for given ifname.
  71. * Return clean flag iff reference counter was decreased to zero, else zero
  72. */
  73. static int dyn_iface_put(struct hostapd_data *hapd, const char *ifname)
  74. {
  75. struct dynamic_iface *next, *prev = NULL, **dynamic_ifaces;
  76. struct hapd_interfaces *interfaces;
  77. int clean;
  78. interfaces = hapd->iface->interfaces;
  79. dynamic_ifaces = &interfaces->vlan_priv;
  80. for (next = *dynamic_ifaces; next; next = next->next) {
  81. if (os_strcmp(ifname, next->ifname) == 0)
  82. break;
  83. prev = next;
  84. }
  85. if (!next)
  86. return 0;
  87. next->usage--;
  88. if (next->usage)
  89. return 0;
  90. if (prev)
  91. prev->next = next->next;
  92. else
  93. *dynamic_ifaces = next->next;
  94. clean = next->clean;
  95. os_free(next);
  96. return clean;
  97. }
  98. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  99. static int ifconfig_helper(const char *if_name, int up)
  100. {
  101. int fd;
  102. struct ifreq ifr;
  103. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  104. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  105. "failed: %s", __func__, strerror(errno));
  106. return -1;
  107. }
  108. os_memset(&ifr, 0, sizeof(ifr));
  109. os_strlcpy(ifr.ifr_name, if_name, IFNAMSIZ);
  110. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  111. wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed "
  112. "for interface %s: %s",
  113. __func__, if_name, strerror(errno));
  114. close(fd);
  115. return -1;
  116. }
  117. if (up)
  118. ifr.ifr_flags |= IFF_UP;
  119. else
  120. ifr.ifr_flags &= ~IFF_UP;
  121. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  122. wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed "
  123. "for interface %s (up=%d): %s",
  124. __func__, if_name, up, strerror(errno));
  125. close(fd);
  126. return -1;
  127. }
  128. close(fd);
  129. return 0;
  130. }
  131. static int ifconfig_up(const char *if_name)
  132. {
  133. wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
  134. return ifconfig_helper(if_name, 1);
  135. }
  136. static int vlan_if_add(struct hostapd_data *hapd, struct hostapd_vlan *vlan,
  137. int existsok)
  138. {
  139. int ret, i;
  140. for (i = 0; i < NUM_WEP_KEYS; i++) {
  141. if (!hapd->conf->ssid.wep.key[i])
  142. continue;
  143. wpa_printf(MSG_ERROR,
  144. "VLAN: Refusing to set up VLAN iface %s with WEP",
  145. vlan->ifname);
  146. return -1;
  147. }
  148. if (!if_nametoindex(vlan->ifname))
  149. ret = hostapd_vlan_if_add(hapd, vlan->ifname);
  150. else if (!existsok)
  151. return -1;
  152. else
  153. ret = 0;
  154. if (ret)
  155. return ret;
  156. ifconfig_up(vlan->ifname); /* else wpa group will fail fatal */
  157. if (hapd->wpa_auth)
  158. ret = wpa_auth_ensure_group(hapd->wpa_auth, vlan->vlan_id);
  159. if (ret == 0)
  160. return ret;
  161. wpa_printf(MSG_ERROR, "WPA initialization for VLAN %d failed (%d)",
  162. vlan->vlan_id, ret);
  163. if (wpa_auth_release_group(hapd->wpa_auth, vlan->vlan_id))
  164. wpa_printf(MSG_ERROR, "WPA deinit of %s failed", vlan->ifname);
  165. /* group state machine setup failed */
  166. if (hostapd_vlan_if_remove(hapd, vlan->ifname))
  167. wpa_printf(MSG_ERROR, "Removal of %s failed", vlan->ifname);
  168. return ret;
  169. }
  170. static int vlan_if_remove(struct hostapd_data *hapd, struct hostapd_vlan *vlan)
  171. {
  172. int ret;
  173. ret = wpa_auth_release_group(hapd->wpa_auth, vlan->vlan_id);
  174. if (ret)
  175. wpa_printf(MSG_ERROR,
  176. "WPA deinitialization for VLAN %d failed (%d)",
  177. vlan->vlan_id, ret);
  178. return hostapd_vlan_if_remove(hapd, vlan->ifname);
  179. }
  180. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  181. static int ifconfig_down(const char *if_name)
  182. {
  183. wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
  184. return ifconfig_helper(if_name, 0);
  185. }
  186. /*
  187. * These are only available in recent linux headers (without the leading
  188. * underscore).
  189. */
  190. #define _GET_VLAN_REALDEV_NAME_CMD 8
  191. #define _GET_VLAN_VID_CMD 9
  192. /* This value should be 256 ONLY. If it is something else, then hostapd
  193. * might crash!, as this value has been hard-coded in 2.4.x kernel
  194. * bridging code.
  195. */
  196. #define MAX_BR_PORTS 256
  197. static int br_delif(const char *br_name, const char *if_name)
  198. {
  199. int fd;
  200. struct ifreq ifr;
  201. unsigned long args[2];
  202. int if_index;
  203. wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
  204. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  205. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  206. "failed: %s", __func__, strerror(errno));
  207. return -1;
  208. }
  209. if_index = if_nametoindex(if_name);
  210. if (if_index == 0) {
  211. wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining "
  212. "interface index for '%s'",
  213. __func__, if_name);
  214. close(fd);
  215. return -1;
  216. }
  217. args[0] = BRCTL_DEL_IF;
  218. args[1] = if_index;
  219. os_strlcpy(ifr.ifr_name, br_name, sizeof(ifr.ifr_name));
  220. ifr.ifr_data = (__caddr_t) args;
  221. if (ioctl(fd, SIOCDEVPRIVATE, &ifr) < 0 && errno != EINVAL) {
  222. /* No error if interface already removed. */
  223. wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE,"
  224. "BRCTL_DEL_IF] failed for br_name=%s if_name=%s: "
  225. "%s", __func__, br_name, if_name, strerror(errno));
  226. close(fd);
  227. return -1;
  228. }
  229. close(fd);
  230. return 0;
  231. }
  232. /*
  233. Add interface 'if_name' to the bridge 'br_name'
  234. returns -1 on error
  235. returns 1 if the interface is already part of the bridge
  236. returns 0 otherwise
  237. */
  238. static int br_addif(const char *br_name, const char *if_name)
  239. {
  240. int fd;
  241. struct ifreq ifr;
  242. unsigned long args[2];
  243. int if_index;
  244. wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name);
  245. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  246. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  247. "failed: %s", __func__, strerror(errno));
  248. return -1;
  249. }
  250. if_index = if_nametoindex(if_name);
  251. if (if_index == 0) {
  252. wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining "
  253. "interface index for '%s'",
  254. __func__, if_name);
  255. close(fd);
  256. return -1;
  257. }
  258. args[0] = BRCTL_ADD_IF;
  259. args[1] = if_index;
  260. os_strlcpy(ifr.ifr_name, br_name, sizeof(ifr.ifr_name));
  261. ifr.ifr_data = (__caddr_t) args;
  262. if (ioctl(fd, SIOCDEVPRIVATE, &ifr) < 0) {
  263. if (errno == EBUSY) {
  264. /* The interface is already added. */
  265. close(fd);
  266. return 1;
  267. }
  268. wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE,"
  269. "BRCTL_ADD_IF] failed for br_name=%s if_name=%s: "
  270. "%s", __func__, br_name, if_name, strerror(errno));
  271. close(fd);
  272. return -1;
  273. }
  274. close(fd);
  275. return 0;
  276. }
  277. static int br_delbr(const char *br_name)
  278. {
  279. int fd;
  280. unsigned long arg[2];
  281. wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name);
  282. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  283. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  284. "failed: %s", __func__, strerror(errno));
  285. return -1;
  286. }
  287. arg[0] = BRCTL_DEL_BRIDGE;
  288. arg[1] = (unsigned long) br_name;
  289. if (ioctl(fd, SIOCGIFBR, arg) < 0 && errno != ENXIO) {
  290. /* No error if bridge already removed. */
  291. wpa_printf(MSG_ERROR, "VLAN: %s: BRCTL_DEL_BRIDGE failed for "
  292. "%s: %s", __func__, br_name, strerror(errno));
  293. close(fd);
  294. return -1;
  295. }
  296. close(fd);
  297. return 0;
  298. }
  299. /*
  300. Add a bridge with the name 'br_name'.
  301. returns -1 on error
  302. returns 1 if the bridge already exists
  303. returns 0 otherwise
  304. */
  305. static int br_addbr(const char *br_name)
  306. {
  307. int fd;
  308. unsigned long arg[4];
  309. struct ifreq ifr;
  310. wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name);
  311. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  312. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  313. "failed: %s", __func__, strerror(errno));
  314. return -1;
  315. }
  316. arg[0] = BRCTL_ADD_BRIDGE;
  317. arg[1] = (unsigned long) br_name;
  318. if (ioctl(fd, SIOCGIFBR, arg) < 0) {
  319. if (errno == EEXIST) {
  320. /* The bridge is already added. */
  321. close(fd);
  322. return 1;
  323. } else {
  324. wpa_printf(MSG_ERROR, "VLAN: %s: BRCTL_ADD_BRIDGE "
  325. "failed for %s: %s",
  326. __func__, br_name, strerror(errno));
  327. close(fd);
  328. return -1;
  329. }
  330. }
  331. /* Decrease forwarding delay to avoid EAPOL timeouts. */
  332. os_memset(&ifr, 0, sizeof(ifr));
  333. os_strlcpy(ifr.ifr_name, br_name, IFNAMSIZ);
  334. arg[0] = BRCTL_SET_BRIDGE_FORWARD_DELAY;
  335. arg[1] = 1;
  336. arg[2] = 0;
  337. arg[3] = 0;
  338. ifr.ifr_data = (char *) &arg;
  339. if (ioctl(fd, SIOCDEVPRIVATE, &ifr) < 0) {
  340. wpa_printf(MSG_ERROR, "VLAN: %s: "
  341. "BRCTL_SET_BRIDGE_FORWARD_DELAY (1 sec) failed for "
  342. "%s: %s", __func__, br_name, strerror(errno));
  343. /* Continue anyway */
  344. }
  345. close(fd);
  346. return 0;
  347. }
  348. static int br_getnumports(const char *br_name)
  349. {
  350. int fd;
  351. int i;
  352. int port_cnt = 0;
  353. unsigned long arg[4];
  354. int ifindices[MAX_BR_PORTS];
  355. struct ifreq ifr;
  356. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  357. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  358. "failed: %s", __func__, strerror(errno));
  359. return -1;
  360. }
  361. arg[0] = BRCTL_GET_PORT_LIST;
  362. arg[1] = (unsigned long) ifindices;
  363. arg[2] = MAX_BR_PORTS;
  364. arg[3] = 0;
  365. os_memset(ifindices, 0, sizeof(ifindices));
  366. os_strlcpy(ifr.ifr_name, br_name, sizeof(ifr.ifr_name));
  367. ifr.ifr_data = (__caddr_t) arg;
  368. if (ioctl(fd, SIOCDEVPRIVATE, &ifr) < 0) {
  369. wpa_printf(MSG_ERROR, "VLAN: %s: BRCTL_GET_PORT_LIST "
  370. "failed for %s: %s",
  371. __func__, br_name, strerror(errno));
  372. close(fd);
  373. return -1;
  374. }
  375. for (i = 1; i < MAX_BR_PORTS; i++) {
  376. if (ifindices[i] > 0) {
  377. port_cnt++;
  378. }
  379. }
  380. close(fd);
  381. return port_cnt;
  382. }
  383. #ifndef CONFIG_VLAN_NETLINK
  384. int vlan_rem(const char *if_name)
  385. {
  386. int fd;
  387. struct vlan_ioctl_args if_request;
  388. wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name);
  389. if ((os_strlen(if_name) + 1) > sizeof(if_request.device1)) {
  390. wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
  391. if_name);
  392. return -1;
  393. }
  394. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  395. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  396. "failed: %s", __func__, strerror(errno));
  397. return -1;
  398. }
  399. os_memset(&if_request, 0, sizeof(if_request));
  400. os_strlcpy(if_request.device1, if_name, sizeof(if_request.device1));
  401. if_request.cmd = DEL_VLAN_CMD;
  402. if (ioctl(fd, SIOCSIFVLAN, &if_request) < 0) {
  403. wpa_printf(MSG_ERROR, "VLAN: %s: DEL_VLAN_CMD failed for %s: "
  404. "%s", __func__, if_name, strerror(errno));
  405. close(fd);
  406. return -1;
  407. }
  408. close(fd);
  409. return 0;
  410. }
  411. /*
  412. Add a vlan interface with VLAN ID 'vid' and tagged interface
  413. 'if_name'.
  414. returns -1 on error
  415. returns 1 if the interface already exists
  416. returns 0 otherwise
  417. */
  418. int vlan_add(const char *if_name, int vid, const char *vlan_if_name)
  419. {
  420. int fd;
  421. struct vlan_ioctl_args if_request;
  422. wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)",
  423. if_name, vid);
  424. ifconfig_up(if_name);
  425. if ((os_strlen(if_name) + 1) > sizeof(if_request.device1)) {
  426. wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
  427. if_name);
  428. return -1;
  429. }
  430. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  431. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  432. "failed: %s", __func__, strerror(errno));
  433. return -1;
  434. }
  435. os_memset(&if_request, 0, sizeof(if_request));
  436. /* Determine if a suitable vlan device already exists. */
  437. os_snprintf(if_request.device1, sizeof(if_request.device1), "vlan%d",
  438. vid);
  439. if_request.cmd = _GET_VLAN_VID_CMD;
  440. if (ioctl(fd, SIOCSIFVLAN, &if_request) == 0) {
  441. if (if_request.u.VID == vid) {
  442. if_request.cmd = _GET_VLAN_REALDEV_NAME_CMD;
  443. if (ioctl(fd, SIOCSIFVLAN, &if_request) == 0 &&
  444. os_strncmp(if_request.u.device2, if_name,
  445. sizeof(if_request.u.device2)) == 0) {
  446. close(fd);
  447. wpa_printf(MSG_DEBUG, "VLAN: vlan_add: "
  448. "if_name %s exists already",
  449. if_request.device1);
  450. return 1;
  451. }
  452. }
  453. }
  454. /* A suitable vlan device does not already exist, add one. */
  455. os_memset(&if_request, 0, sizeof(if_request));
  456. os_strlcpy(if_request.device1, if_name, sizeof(if_request.device1));
  457. if_request.u.VID = vid;
  458. if_request.cmd = ADD_VLAN_CMD;
  459. if (ioctl(fd, SIOCSIFVLAN, &if_request) < 0) {
  460. wpa_printf(MSG_ERROR, "VLAN: %s: ADD_VLAN_CMD failed for %s: "
  461. "%s",
  462. __func__, if_request.device1, strerror(errno));
  463. close(fd);
  464. return -1;
  465. }
  466. close(fd);
  467. return 0;
  468. }
  469. static int vlan_set_name_type(unsigned int name_type)
  470. {
  471. int fd;
  472. struct vlan_ioctl_args if_request;
  473. wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)",
  474. name_type);
  475. if ((fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  476. wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
  477. "failed: %s", __func__, strerror(errno));
  478. return -1;
  479. }
  480. os_memset(&if_request, 0, sizeof(if_request));
  481. if_request.u.name_type = name_type;
  482. if_request.cmd = SET_VLAN_NAME_TYPE_CMD;
  483. if (ioctl(fd, SIOCSIFVLAN, &if_request) < 0) {
  484. wpa_printf(MSG_ERROR, "VLAN: %s: SET_VLAN_NAME_TYPE_CMD "
  485. "name_type=%u failed: %s",
  486. __func__, name_type, strerror(errno));
  487. close(fd);
  488. return -1;
  489. }
  490. close(fd);
  491. return 0;
  492. }
  493. #endif /* CONFIG_VLAN_NETLINK */
  494. static void vlan_newlink_tagged(int vlan_naming, const char *tagged_interface,
  495. const char *br_name, int vid,
  496. struct hostapd_data *hapd)
  497. {
  498. char vlan_ifname[IFNAMSIZ];
  499. int clean;
  500. if (vlan_naming == DYNAMIC_VLAN_NAMING_WITH_DEVICE)
  501. os_snprintf(vlan_ifname, sizeof(vlan_ifname), "%s.%d",
  502. tagged_interface, vid);
  503. else
  504. os_snprintf(vlan_ifname, sizeof(vlan_ifname), "vlan%d", vid);
  505. clean = 0;
  506. ifconfig_up(tagged_interface);
  507. if (!vlan_add(tagged_interface, vid, vlan_ifname))
  508. clean |= DVLAN_CLEAN_VLAN;
  509. if (!br_addif(br_name, vlan_ifname))
  510. clean |= DVLAN_CLEAN_VLAN_PORT;
  511. dyn_iface_get(hapd, vlan_ifname, clean);
  512. ifconfig_up(vlan_ifname);
  513. }
  514. static void vlan_bridge_name(char *br_name, struct hostapd_data *hapd, int vid)
  515. {
  516. char *tagged_interface = hapd->conf->ssid.vlan_tagged_interface;
  517. if (hapd->conf->vlan_bridge[0]) {
  518. os_snprintf(br_name, IFNAMSIZ, "%s%d",
  519. hapd->conf->vlan_bridge, vid);
  520. } else if (tagged_interface) {
  521. os_snprintf(br_name, IFNAMSIZ, "br%s.%d",
  522. tagged_interface, vid);
  523. } else {
  524. os_snprintf(br_name, IFNAMSIZ, "brvlan%d", vid);
  525. }
  526. }
  527. static void vlan_get_bridge(const char *br_name, struct hostapd_data *hapd,
  528. int vid)
  529. {
  530. char *tagged_interface = hapd->conf->ssid.vlan_tagged_interface;
  531. int vlan_naming = hapd->conf->ssid.vlan_naming;
  532. dyn_iface_get(hapd, br_name, br_addbr(br_name) ? 0 : DVLAN_CLEAN_BR);
  533. ifconfig_up(br_name);
  534. if (tagged_interface)
  535. vlan_newlink_tagged(vlan_naming, tagged_interface, br_name,
  536. vid, hapd);
  537. }
  538. static void vlan_newlink(const char *ifname, struct hostapd_data *hapd)
  539. {
  540. char br_name[IFNAMSIZ];
  541. struct hostapd_vlan *vlan;
  542. int untagged, *tagged, i, notempty;
  543. wpa_printf(MSG_DEBUG, "VLAN: vlan_newlink(%s)", ifname);
  544. for (vlan = hapd->conf->vlan; vlan; vlan = vlan->next) {
  545. if (vlan->configured ||
  546. os_strcmp(ifname, vlan->ifname) != 0)
  547. continue;
  548. break;
  549. }
  550. if (!vlan)
  551. return;
  552. vlan->configured = 1;
  553. notempty = vlan->vlan_desc.notempty;
  554. untagged = vlan->vlan_desc.untagged;
  555. tagged = vlan->vlan_desc.tagged;
  556. if (!notempty) {
  557. /* Non-VLAN STA */
  558. if (hapd->conf->bridge[0] &&
  559. !br_addif(hapd->conf->bridge, ifname))
  560. vlan->clean |= DVLAN_CLEAN_WLAN_PORT;
  561. } else if (untagged > 0 && untagged <= MAX_VLAN_ID) {
  562. vlan_bridge_name(br_name, hapd, untagged);
  563. vlan_get_bridge(br_name, hapd, untagged);
  564. if (!br_addif(br_name, ifname))
  565. vlan->clean |= DVLAN_CLEAN_WLAN_PORT;
  566. }
  567. for (i = 0; i < MAX_NUM_TAGGED_VLAN && tagged[i]; i++) {
  568. if (tagged[i] == untagged ||
  569. tagged[i] <= 0 || tagged[i] > MAX_VLAN_ID ||
  570. (i > 0 && tagged[i] == tagged[i - 1]))
  571. continue;
  572. vlan_bridge_name(br_name, hapd, tagged[i]);
  573. vlan_get_bridge(br_name, hapd, tagged[i]);
  574. vlan_newlink_tagged(DYNAMIC_VLAN_NAMING_WITH_DEVICE,
  575. ifname, br_name, tagged[i], hapd);
  576. }
  577. ifconfig_up(ifname);
  578. }
  579. static void vlan_dellink_tagged(int vlan_naming, const char *tagged_interface,
  580. const char *br_name, int vid,
  581. struct hostapd_data *hapd)
  582. {
  583. char vlan_ifname[IFNAMSIZ];
  584. int clean;
  585. if (vlan_naming == DYNAMIC_VLAN_NAMING_WITH_DEVICE)
  586. os_snprintf(vlan_ifname, sizeof(vlan_ifname), "%s.%d",
  587. tagged_interface, vid);
  588. else
  589. os_snprintf(vlan_ifname, sizeof(vlan_ifname), "vlan%d", vid);
  590. clean = dyn_iface_put(hapd, vlan_ifname);
  591. if (clean & DVLAN_CLEAN_VLAN_PORT)
  592. br_delif(br_name, vlan_ifname);
  593. if (clean & DVLAN_CLEAN_VLAN) {
  594. ifconfig_down(vlan_ifname);
  595. vlan_rem(vlan_ifname);
  596. }
  597. }
  598. static void vlan_put_bridge(const char *br_name, struct hostapd_data *hapd,
  599. int vid)
  600. {
  601. int clean;
  602. char *tagged_interface = hapd->conf->ssid.vlan_tagged_interface;
  603. int vlan_naming = hapd->conf->ssid.vlan_naming;
  604. if (tagged_interface)
  605. vlan_dellink_tagged(vlan_naming, tagged_interface, br_name,
  606. vid, hapd);
  607. clean = dyn_iface_put(hapd, br_name);
  608. if ((clean & DVLAN_CLEAN_BR) && br_getnumports(br_name) == 0) {
  609. ifconfig_down(br_name);
  610. br_delbr(br_name);
  611. }
  612. }
  613. static void vlan_dellink(const char *ifname, struct hostapd_data *hapd)
  614. {
  615. struct hostapd_vlan *first, *prev, *vlan = hapd->conf->vlan;
  616. wpa_printf(MSG_DEBUG, "VLAN: vlan_dellink(%s)", ifname);
  617. first = prev = vlan;
  618. while (vlan) {
  619. if (os_strcmp(ifname, vlan->ifname) != 0) {
  620. prev = vlan;
  621. vlan = vlan->next;
  622. continue;
  623. }
  624. break;
  625. }
  626. if (!vlan)
  627. return;
  628. if (vlan->configured) {
  629. int notempty = vlan->vlan_desc.notempty;
  630. int untagged = vlan->vlan_desc.untagged;
  631. int *tagged = vlan->vlan_desc.tagged;
  632. char br_name[IFNAMSIZ];
  633. int i;
  634. for (i = 0; i < MAX_NUM_TAGGED_VLAN && tagged[i]; i++) {
  635. if (tagged[i] == untagged ||
  636. tagged[i] <= 0 || tagged[i] > MAX_VLAN_ID ||
  637. (i > 0 && tagged[i] == tagged[i - 1]))
  638. continue;
  639. vlan_bridge_name(br_name, hapd, tagged[i]);
  640. vlan_dellink_tagged(DYNAMIC_VLAN_NAMING_WITH_DEVICE,
  641. ifname, br_name, tagged[i], hapd);
  642. vlan_put_bridge(br_name, hapd, tagged[i]);
  643. }
  644. if (!notempty) {
  645. /* Non-VLAN STA */
  646. if (hapd->conf->bridge[0] &&
  647. (vlan->clean & DVLAN_CLEAN_WLAN_PORT))
  648. br_delif(hapd->conf->bridge, ifname);
  649. } else if (untagged > 0 && untagged <= MAX_VLAN_ID) {
  650. vlan_bridge_name(br_name, hapd, untagged);
  651. if (vlan->clean & DVLAN_CLEAN_WLAN_PORT)
  652. br_delif(br_name, vlan->ifname);
  653. vlan_put_bridge(br_name, hapd, untagged);
  654. }
  655. }
  656. /*
  657. * Ensure this VLAN interface is actually removed even if
  658. * NEWLINK message is only received later.
  659. */
  660. if (if_nametoindex(vlan->ifname) && vlan_if_remove(hapd, vlan))
  661. wpa_printf(MSG_ERROR,
  662. "VLAN: Could not remove VLAN iface: %s: %s",
  663. vlan->ifname, strerror(errno));
  664. if (vlan == first)
  665. hapd->conf->vlan = vlan->next;
  666. else
  667. prev->next = vlan->next;
  668. os_free(vlan);
  669. }
  670. static void
  671. vlan_read_ifnames(struct nlmsghdr *h, size_t len, int del,
  672. struct hostapd_data *hapd)
  673. {
  674. struct ifinfomsg *ifi;
  675. int attrlen, nlmsg_len, rta_len;
  676. struct rtattr *attr;
  677. char ifname[IFNAMSIZ + 1];
  678. if (len < sizeof(*ifi))
  679. return;
  680. ifi = NLMSG_DATA(h);
  681. nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
  682. attrlen = h->nlmsg_len - nlmsg_len;
  683. if (attrlen < 0)
  684. return;
  685. attr = (struct rtattr *) (((char *) ifi) + nlmsg_len);
  686. os_memset(ifname, 0, sizeof(ifname));
  687. rta_len = RTA_ALIGN(sizeof(struct rtattr));
  688. while (RTA_OK(attr, attrlen)) {
  689. if (attr->rta_type == IFLA_IFNAME) {
  690. int n = attr->rta_len - rta_len;
  691. if (n < 0)
  692. break;
  693. if ((size_t) n >= sizeof(ifname))
  694. n = sizeof(ifname) - 1;
  695. os_memcpy(ifname, ((char *) attr) + rta_len, n);
  696. }
  697. attr = RTA_NEXT(attr, attrlen);
  698. }
  699. if (!ifname[0])
  700. return;
  701. if (del && if_nametoindex(ifname)) {
  702. /* interface still exists, race condition ->
  703. * iface has just been recreated */
  704. return;
  705. }
  706. wpa_printf(MSG_DEBUG,
  707. "VLAN: RTM_%sLINK: ifi_index=%d ifname=%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
  708. del ? "DEL" : "NEW",
  709. ifi->ifi_index, ifname, ifi->ifi_family, ifi->ifi_flags,
  710. (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
  711. (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
  712. (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
  713. (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
  714. if (del)
  715. vlan_dellink(ifname, hapd);
  716. else
  717. vlan_newlink(ifname, hapd);
  718. }
  719. static void vlan_event_receive(int sock, void *eloop_ctx, void *sock_ctx)
  720. {
  721. char buf[8192];
  722. int left;
  723. struct sockaddr_nl from;
  724. socklen_t fromlen;
  725. struct nlmsghdr *h;
  726. struct hostapd_data *hapd = eloop_ctx;
  727. fromlen = sizeof(from);
  728. left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT,
  729. (struct sockaddr *) &from, &fromlen);
  730. if (left < 0) {
  731. if (errno != EINTR && errno != EAGAIN)
  732. wpa_printf(MSG_ERROR, "VLAN: %s: recvfrom failed: %s",
  733. __func__, strerror(errno));
  734. return;
  735. }
  736. h = (struct nlmsghdr *) buf;
  737. while (NLMSG_OK(h, left)) {
  738. int len, plen;
  739. len = h->nlmsg_len;
  740. plen = len - sizeof(*h);
  741. if (len > left || plen < 0) {
  742. wpa_printf(MSG_DEBUG, "VLAN: Malformed netlink "
  743. "message: len=%d left=%d plen=%d",
  744. len, left, plen);
  745. break;
  746. }
  747. switch (h->nlmsg_type) {
  748. case RTM_NEWLINK:
  749. vlan_read_ifnames(h, plen, 0, hapd);
  750. break;
  751. case RTM_DELLINK:
  752. vlan_read_ifnames(h, plen, 1, hapd);
  753. break;
  754. }
  755. h = NLMSG_NEXT(h, left);
  756. }
  757. if (left > 0) {
  758. wpa_printf(MSG_DEBUG, "VLAN: %s: %d extra bytes in the end of "
  759. "netlink message", __func__, left);
  760. }
  761. }
  762. static struct full_dynamic_vlan *
  763. full_dynamic_vlan_init(struct hostapd_data *hapd)
  764. {
  765. struct sockaddr_nl local;
  766. struct full_dynamic_vlan *priv;
  767. priv = os_zalloc(sizeof(*priv));
  768. if (priv == NULL)
  769. return NULL;
  770. #ifndef CONFIG_VLAN_NETLINK
  771. vlan_set_name_type(hapd->conf->ssid.vlan_naming ==
  772. DYNAMIC_VLAN_NAMING_WITH_DEVICE ?
  773. VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD :
  774. VLAN_NAME_TYPE_PLUS_VID_NO_PAD);
  775. #endif /* CONFIG_VLAN_NETLINK */
  776. priv->s = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  777. if (priv->s < 0) {
  778. wpa_printf(MSG_ERROR, "VLAN: %s: socket(PF_NETLINK,SOCK_RAW,"
  779. "NETLINK_ROUTE) failed: %s",
  780. __func__, strerror(errno));
  781. os_free(priv);
  782. return NULL;
  783. }
  784. os_memset(&local, 0, sizeof(local));
  785. local.nl_family = AF_NETLINK;
  786. local.nl_groups = RTMGRP_LINK;
  787. if (bind(priv->s, (struct sockaddr *) &local, sizeof(local)) < 0) {
  788. wpa_printf(MSG_ERROR, "VLAN: %s: bind(netlink) failed: %s",
  789. __func__, strerror(errno));
  790. close(priv->s);
  791. os_free(priv);
  792. return NULL;
  793. }
  794. if (eloop_register_read_sock(priv->s, vlan_event_receive, hapd, NULL))
  795. {
  796. close(priv->s);
  797. os_free(priv);
  798. return NULL;
  799. }
  800. return priv;
  801. }
  802. static void full_dynamic_vlan_deinit(struct full_dynamic_vlan *priv)
  803. {
  804. if (priv == NULL)
  805. return;
  806. eloop_unregister_read_sock(priv->s);
  807. close(priv->s);
  808. os_free(priv);
  809. }
  810. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  811. static int vlan_dynamic_add(struct hostapd_data *hapd,
  812. struct hostapd_vlan *vlan)
  813. {
  814. while (vlan) {
  815. if (vlan->vlan_id != VLAN_ID_WILDCARD) {
  816. if (vlan_if_add(hapd, vlan, 1)) {
  817. wpa_printf(MSG_ERROR,
  818. "VLAN: Could not add VLAN %s: %s",
  819. vlan->ifname, strerror(errno));
  820. return -1;
  821. }
  822. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  823. vlan_newlink(vlan->ifname, hapd);
  824. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  825. }
  826. vlan = vlan->next;
  827. }
  828. return 0;
  829. }
  830. static void vlan_dynamic_remove(struct hostapd_data *hapd,
  831. struct hostapd_vlan *vlan)
  832. {
  833. struct hostapd_vlan *next;
  834. while (vlan) {
  835. next = vlan->next;
  836. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  837. /* vlan_dellink() takes care of cleanup and interface removal */
  838. if (vlan->vlan_id != VLAN_ID_WILDCARD)
  839. vlan_dellink(vlan->ifname, hapd);
  840. #else /* CONFIG_FULL_DYNAMIC_VLAN */
  841. if (vlan->vlan_id != VLAN_ID_WILDCARD &&
  842. vlan_if_remove(hapd, vlan)) {
  843. wpa_printf(MSG_ERROR, "VLAN: Could not remove VLAN "
  844. "iface: %s: %s",
  845. vlan->ifname, strerror(errno));
  846. }
  847. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  848. vlan = next;
  849. }
  850. }
  851. int vlan_init(struct hostapd_data *hapd)
  852. {
  853. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  854. hapd->full_dynamic_vlan = full_dynamic_vlan_init(hapd);
  855. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  856. if ((hapd->conf->ssid.dynamic_vlan != DYNAMIC_VLAN_DISABLED ||
  857. hapd->conf->ssid.per_sta_vif) &&
  858. !hapd->conf->vlan) {
  859. /* dynamic vlans enabled but no (or empty) vlan_file given */
  860. struct hostapd_vlan *vlan;
  861. vlan = os_zalloc(sizeof(*vlan));
  862. if (vlan == NULL) {
  863. wpa_printf(MSG_ERROR, "Out of memory while assigning "
  864. "VLAN interfaces");
  865. return -1;
  866. }
  867. vlan->vlan_id = VLAN_ID_WILDCARD;
  868. os_snprintf(vlan->ifname, sizeof(vlan->ifname), "%s.#",
  869. hapd->conf->iface);
  870. vlan->next = hapd->conf->vlan;
  871. hapd->conf->vlan = vlan;
  872. }
  873. if (vlan_dynamic_add(hapd, hapd->conf->vlan))
  874. return -1;
  875. return 0;
  876. }
  877. void vlan_deinit(struct hostapd_data *hapd)
  878. {
  879. vlan_dynamic_remove(hapd, hapd->conf->vlan);
  880. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  881. full_dynamic_vlan_deinit(hapd->full_dynamic_vlan);
  882. hapd->full_dynamic_vlan = NULL;
  883. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  884. }
  885. struct hostapd_vlan * vlan_add_dynamic(struct hostapd_data *hapd,
  886. struct hostapd_vlan *vlan,
  887. int vlan_id,
  888. struct vlan_description *vlan_desc)
  889. {
  890. struct hostapd_vlan *n = NULL;
  891. char *ifname, *pos;
  892. if (vlan == NULL || vlan->vlan_id != VLAN_ID_WILDCARD)
  893. return NULL;
  894. wpa_printf(MSG_DEBUG, "VLAN: %s(vlan_id=%d ifname=%s)",
  895. __func__, vlan_id, vlan->ifname);
  896. ifname = os_strdup(vlan->ifname);
  897. if (ifname == NULL)
  898. return NULL;
  899. pos = os_strchr(ifname, '#');
  900. if (pos == NULL)
  901. goto free_ifname;
  902. *pos++ = '\0';
  903. n = os_zalloc(sizeof(*n));
  904. if (n == NULL)
  905. goto free_ifname;
  906. n->vlan_id = vlan_id;
  907. if (vlan_desc)
  908. n->vlan_desc = *vlan_desc;
  909. n->dynamic_vlan = 1;
  910. os_snprintf(n->ifname, sizeof(n->ifname), "%s%d%s", ifname, vlan_id,
  911. pos);
  912. n->next = hapd->conf->vlan;
  913. hapd->conf->vlan = n;
  914. /* hapd->conf->vlan needs this new VLAN here for WPA setup */
  915. if (vlan_if_add(hapd, n, 0)) {
  916. hapd->conf->vlan = n->next;
  917. os_free(n);
  918. n = NULL;
  919. goto free_ifname;
  920. }
  921. free_ifname:
  922. os_free(ifname);
  923. return n;
  924. }
  925. int vlan_remove_dynamic(struct hostapd_data *hapd, int vlan_id)
  926. {
  927. struct hostapd_vlan *vlan;
  928. if (vlan_id <= 0)
  929. return 1;
  930. wpa_printf(MSG_DEBUG, "VLAN: %s(ifname=%s vlan_id=%d)",
  931. __func__, hapd->conf->iface, vlan_id);
  932. vlan = hapd->conf->vlan;
  933. while (vlan) {
  934. if (vlan->vlan_id == vlan_id && vlan->dynamic_vlan > 0) {
  935. vlan->dynamic_vlan--;
  936. break;
  937. }
  938. vlan = vlan->next;
  939. }
  940. if (vlan == NULL)
  941. return 1;
  942. if (vlan->dynamic_vlan == 0) {
  943. vlan_if_remove(hapd, vlan);
  944. #ifdef CONFIG_FULL_DYNAMIC_VLAN
  945. vlan_dellink(vlan->ifname, hapd);
  946. #endif /* CONFIG_FULL_DYNAMIC_VLAN */
  947. }
  948. return 0;
  949. }