X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;ds=sidebyside;f=networking%2Fzcip.c;h=df4c0ec2def3cebf04070eba736b06f50be3f97e;hb=f09f4e015bffe6db5d7e63d47b23f22db4806736;hp=d8d9a2de12e59a5b88bc19186a024e14ced6d504;hpb=f3f33ebb0b325a0a5710cb39530449dd09c5ab70;p=oweals%2Fbusybox.git diff --git a/networking/zcip.c b/networking/zcip.c index d8d9a2de1..df4c0ec2d 100644 --- a/networking/zcip.c +++ b/networking/zcip.c @@ -39,7 +39,7 @@ struct arp_packet { struct ether_header eth; struct ether_arp arp; -} ATTRIBUTE_PACKED; +} PACKED; enum { /* 169.254.0.0 */ @@ -75,35 +75,40 @@ enum { }; struct globals { - char *intf; struct sockaddr saddr; + struct ether_addr eth_addr; }; #define G (*(struct globals*)&bb_common_bufsiz1) -#define intf (G.intf ) -#define saddr (G.saddr) +#define saddr (G.saddr ) +#define eth_addr (G.eth_addr) /** * Pick a random link local IP address on 169.254/16, except that * the first and last 256 addresses are reserved. */ -static void pick(struct in_addr *ip) +static uint32_t pick(void) { unsigned tmp; do { tmp = rand() & IN_CLASSB_HOST; } while (tmp > (IN_CLASSB_HOST - 0x0200)); - ip->s_addr = htonl((LINKLOCAL_ADDR + 0x0100) + tmp); + return htonl((LINKLOCAL_ADDR + 0x0100) + tmp); } /** * Broadcast an ARP packet. */ -static void arp(int op, - const struct ether_addr *source_eth, struct in_addr source_ip, +static void arp( + /* int op, - always ARPOP_REQUEST */ + /* const struct ether_addr *source_eth, - always ð_addr */ + struct in_addr source_ip, const struct ether_addr *target_eth, struct in_addr target_ip) { + enum { op = ARPOP_REQUEST }; +#define source_eth (ð_addr) + struct arp_packet p; memset(&p, 0, sizeof(p)); @@ -124,45 +129,51 @@ static void arp(int op, memcpy(&p.arp.arp_tpa, &target_ip, sizeof(p.arp.arp_tpa)); // send it + // Even though sock_fd is already bound to saddr, just send() + // won't work, because "socket is not connected" + // (and connect() won't fix that, "operation not supported"). + // Thus we sendto() to saddr. I wonder which sockaddr + // (from bind() or from sendto()?) kernel actually uses + // to determine iface to emit the packet from... xsendto(sock_fd, &p, sizeof(p), &saddr, sizeof(saddr)); - - // Currently all callers ignore errors, that's why returns are - // commented out... - //return 0; +#undef source_eth } /** - * Run a script. argv[2] is already NULL. + * Run a script. + * argv[0]:intf argv[1]:script_name argv[2]:junk argv[3]:NULL */ -static int run(char *argv[3], struct in_addr *ip) +static int run(char *argv[3], const char *param, struct in_addr *ip) { int status; char *addr = addr; /* for gcc */ const char *fmt = "%s %s %s" + 3; - VDBG("%s run %s %s\n", intf, argv[0], argv[1]); + argv[2] = (char*)param; + + VDBG("%s run %s %s\n", argv[0], argv[1], argv[2]); if (ip) { addr = inet_ntoa(*ip); - setenv("ip", addr, 1); + xsetenv("ip", addr); fmt -= 3; } - bb_info_msg(fmt, argv[1], intf, addr); + bb_info_msg(fmt, argv[2], argv[0], addr); - status = wait4pid(spawn(argv)); + status = wait4pid(spawn(argv + 1)); if (status < 0) { - bb_perror_msg("%s %s %s" + 3, argv[1], intf); + bb_perror_msg("%s %s %s" + 3, argv[2], argv[0]); return -errno; } if (status != 0) - bb_error_msg("script %s %s failed, exitcode=%d", argv[0], argv[1], status); + bb_error_msg("script %s %s failed, exitcode=%d", argv[1], argv[2], status); return status; } /** * Return milliseconds of random delay, up to "secs" seconds. */ -static unsigned ALWAYS_INLINE random_delay_ms(unsigned secs) +static ALWAYS_INLINE unsigned random_delay_ms(unsigned secs) { return rand() % (secs * 1000); } @@ -173,8 +184,7 @@ static unsigned ALWAYS_INLINE random_delay_ms(unsigned secs) int zcip_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; int zcip_main(int argc, char **argv) { - int state = PROBE; - struct ether_addr eth_addr; + int state; char *r_opt; unsigned opts; @@ -184,7 +194,6 @@ int zcip_main(int argc, char **argv) const struct ether_addr null_addr; struct in_addr ip; struct ifreq ifr; - char *script_av[3]; int timeout_ms; /* must be signed */ unsigned conflicts; unsigned nprobes; @@ -196,7 +205,6 @@ int zcip_main(int argc, char **argv) #define null_addr (L.null_addr ) #define ip (L.ip ) #define ifr (L.ifr ) -#define script_av (L.script_av ) #define timeout_ms (L.timeout_ms) #define conflicts (L.conflicts ) #define nprobes (L.nprobes ) @@ -215,7 +223,7 @@ int zcip_main(int argc, char **argv) #if !BB_MMU // on NOMMU reexec early (or else we will rerun things twice) if (!FOREGROUND) - bb_daemonize_or_rexec(DAEMON_CHDIR_ROOT, argv); + bb_daemonize_or_rexec(0 /*was: DAEMON_CHDIR_ROOT*/, argv); #endif // open an ARP socket // (need to do it before openlog to prevent openlog from taking @@ -234,29 +242,33 @@ int zcip_main(int argc, char **argv) } } argc -= optind; - argv += optind; + argv += optind - 1; + + /* Now: argv[0]:junk argv[1]:intf argv[2]:script argv[3]:NULL */ + /* We need to make space for script argument: */ + argv[0] = argv[1]; + argv[1] = argv[2]; + /* Now: argv[0]:intf argv[1]:script argv[2]:junk argv[3]:NULL */ +#define argv_intf (argv[0]) - intf = argv[0]; - script_av[0] = argv[1]; - setenv("interface", intf, 1); + xsetenv("interface", argv_intf); // initialize the interface (modprobe, ifup, etc) - script_av[1] = (char*)"init"; - if (run(script_av, NULL)) + if (run(argv, "init", NULL)) return EXIT_FAILURE; // initialize saddr // saddr is: { u16 sa_family; u8 sa_data[14]; } //memset(&saddr, 0, sizeof(saddr)); //TODO: are we leaving sa_family == 0 (AF_UNSPEC)?! - safe_strncpy(saddr.sa_data, intf, sizeof(saddr.sa_data)); + safe_strncpy(saddr.sa_data, argv_intf, sizeof(saddr.sa_data)); // bind to the interface's ARP socket xbind(sock_fd, &saddr, sizeof(saddr)); // get the interface's ethernet address //memset(&ifr, 0, sizeof(ifr)); - strncpy(ifr.ifr_name, intf, sizeof(ifr.ifr_name)); + strncpy_IFNAMSIZ(ifr.ifr_name, argv_intf); xioctl(sock_fd, SIOCGIFHWADDR, &ifr); memcpy(ð_addr, &ifr.ifr_hwaddr.sa_data, ETH_ALEN); @@ -268,11 +280,11 @@ int zcip_main(int argc, char **argv) // depending on when we detect conflicts. { uint32_t t; - memcpy(&t, (char*)ð_addr + 2, 4); + move_from_unaligned32(t, ((char *)ð_addr + 2)); srand(t); } if (ip.s_addr == 0) - pick(&ip); + ip.s_addr = pick(); // FIXME cases to handle: // - zcip already running! @@ -281,9 +293,9 @@ int zcip_main(int argc, char **argv) // daemonize now; don't delay system startup if (!FOREGROUND) { #if BB_MMU - bb_daemonize(DAEMON_CHDIR_ROOT); + bb_daemonize(0 /*was: DAEMON_CHDIR_ROOT*/); #endif - bb_info_msg("start, interface %s", intf); + bb_info_msg("start, interface %s", argv_intf); } // run the dynamic address negotiation protocol, @@ -294,6 +306,14 @@ int zcip_main(int argc, char **argv) // - arp announcements that we're claiming it // - use it // - defend it, within limits + // exit if: + // - address is successfully obtained and -q was given: + // run "