3
0

arpping.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128
  1. /* vi: set sw=4 ts=4: */
  2. /*
  3. * Mostly stolen from: dhcpcd - DHCP client daemon
  4. * by Yoichi Hariguchi <yoichi@fore.com>
  5. *
  6. * Licensed under GPLv2, see file LICENSE in this tarball for details.
  7. */
  8. #include <netinet/if_ether.h>
  9. #include <net/if_arp.h>
  10. #include "common.h"
  11. #include "dhcpd.h"
  12. struct arpMsg {
  13. /* Ethernet header */
  14. uint8_t h_dest[6]; /* 00 destination ether addr */
  15. uint8_t h_source[6]; /* 06 source ether addr */
  16. uint16_t h_proto; /* 0c packet type ID field */
  17. /* ARP packet */
  18. uint16_t htype; /* 0e hardware type (must be ARPHRD_ETHER) */
  19. uint16_t ptype; /* 10 protocol type (must be ETH_P_IP) */
  20. uint8_t hlen; /* 12 hardware address length (must be 6) */
  21. uint8_t plen; /* 13 protocol address length (must be 4) */
  22. uint16_t operation; /* 14 ARP opcode */
  23. uint8_t sHaddr[6]; /* 16 sender's hardware address */
  24. uint8_t sInaddr[4]; /* 1c sender's IP address */
  25. uint8_t tHaddr[6]; /* 20 target's hardware address */
  26. uint8_t tInaddr[4]; /* 26 target's IP address */
  27. uint8_t pad[18]; /* 2a pad for min. ethernet payload (60 bytes) */
  28. } PACKED;
  29. enum {
  30. ARP_MSG_SIZE = 0x2a
  31. };
  32. /* Returns 1 if no reply received */
  33. int FAST_FUNC arpping(uint32_t test_nip,
  34. const uint8_t *safe_mac,
  35. uint32_t from_ip,
  36. uint8_t *from_mac,
  37. const char *interface)
  38. {
  39. int timeout_ms;
  40. struct pollfd pfd[1];
  41. #define s (pfd[0].fd) /* socket */
  42. int rv = 1; /* "no reply received" yet */
  43. struct sockaddr addr; /* for interface name */
  44. struct arpMsg arp;
  45. s = socket(PF_PACKET, SOCK_PACKET, htons(ETH_P_ARP));
  46. if (s == -1) {
  47. bb_perror_msg(bb_msg_can_not_create_raw_socket);
  48. return -1;
  49. }
  50. if (setsockopt_broadcast(s) == -1) {
  51. bb_perror_msg("can't enable bcast on raw socket");
  52. goto ret;
  53. }
  54. /* send arp request */
  55. memset(&arp, 0, sizeof(arp));
  56. memset(arp.h_dest, 0xff, 6); /* MAC DA */
  57. memcpy(arp.h_source, from_mac, 6); /* MAC SA */
  58. arp.h_proto = htons(ETH_P_ARP); /* protocol type (Ethernet) */
  59. arp.htype = htons(ARPHRD_ETHER); /* hardware type */
  60. arp.ptype = htons(ETH_P_IP); /* protocol type (ARP message) */
  61. arp.hlen = 6; /* hardware address length */
  62. arp.plen = 4; /* protocol address length */
  63. arp.operation = htons(ARPOP_REQUEST); /* ARP op code */
  64. memcpy(arp.sHaddr, from_mac, 6); /* source hardware address */
  65. memcpy(arp.sInaddr, &from_ip, sizeof(from_ip)); /* source IP address */
  66. /* tHaddr is zero-filled */ /* target hardware address */
  67. memcpy(arp.tInaddr, &test_nip, sizeof(test_nip));/* target IP address */
  68. memset(&addr, 0, sizeof(addr));
  69. safe_strncpy(addr.sa_data, interface, sizeof(addr.sa_data));
  70. if (sendto(s, &arp, sizeof(arp), 0, &addr, sizeof(addr)) < 0) {
  71. // TODO: error message? caller didn't expect us to fail,
  72. // just returning 1 "no reply received" misleads it.
  73. goto ret;
  74. }
  75. /* wait for arp reply, and check it */
  76. timeout_ms = 2000;
  77. do {
  78. typedef uint32_t aliased_uint32_t FIX_ALIASING;
  79. int r;
  80. unsigned prevTime = monotonic_ms();
  81. pfd[0].events = POLLIN;
  82. r = safe_poll(pfd, 1, timeout_ms);
  83. if (r < 0)
  84. break;
  85. if (r) {
  86. r = safe_read(s, &arp, sizeof(arp));
  87. if (r < 0)
  88. break;
  89. //log3("sHaddr %02x:%02x:%02x:%02x:%02x:%02x",
  90. // arp.sHaddr[0], arp.sHaddr[1], arp.sHaddr[2],
  91. // arp.sHaddr[3], arp.sHaddr[4], arp.sHaddr[5]);
  92. if (r >= ARP_MSG_SIZE
  93. && arp.operation == htons(ARPOP_REPLY)
  94. /* don't check it: Linux doesn't return proper tHaddr (fixed in 2.6.24?) */
  95. /* && memcmp(arp.tHaddr, from_mac, 6) == 0 */
  96. && *(aliased_uint32_t*)arp.sInaddr == test_nip
  97. ) {
  98. /* if ARP source MAC matches safe_mac
  99. * (which is client's MAC), then it's not a conflict
  100. * (client simply already has this IP and replies to ARPs!)
  101. */
  102. if (!safe_mac || memcmp(safe_mac, arp.sHaddr, 6) != 0)
  103. rv = 0;
  104. //else log2("sHaddr == safe_mac");
  105. break;
  106. }
  107. }
  108. timeout_ms -= (unsigned)monotonic_ms() - prevTime;
  109. } while (timeout_ms > 0);
  110. ret:
  111. close(s);
  112. log1("%srp reply received for this address", rv ? "No a" : "A");
  113. return rv;
  114. }