3
0

arpping.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. /* vi: set sw=4 ts=4: */
  2. /*
  3. * Mostly stolen from: dhcpcd - DHCP client daemon
  4. * by Yoichi Hariguchi <yoichi@fore.com>
  5. *
  6. * Licensed under GPLv2, see file LICENSE in this source tree.
  7. */
  8. #include <netinet/if_ether.h>
  9. #include <net/if_arp.h>
  10. #include "common.h"
  11. struct arpMsg {
  12. /* Ethernet header */
  13. uint8_t h_dest[6]; /* 00 destination ether addr */
  14. uint8_t h_source[6]; /* 06 source ether addr */
  15. uint16_t h_proto; /* 0c packet type ID field */
  16. /* ARP packet */
  17. uint16_t htype; /* 0e hardware type (must be ARPHRD_ETHER) */
  18. uint16_t ptype; /* 10 protocol type (must be ETH_P_IP) */
  19. uint8_t hlen; /* 12 hardware address length (must be 6) */
  20. uint8_t plen; /* 13 protocol address length (must be 4) */
  21. uint16_t operation; /* 14 ARP opcode */
  22. uint8_t sHaddr[6]; /* 16 sender's hardware address */
  23. uint8_t sInaddr[4]; /* 1c sender's IP address */
  24. uint8_t tHaddr[6]; /* 20 target's hardware address */
  25. uint8_t tInaddr[4]; /* 26 target's IP address */
  26. uint8_t pad[18]; /* 2a pad for min. ethernet payload (60 bytes) */
  27. } PACKED;
  28. enum {
  29. ARP_MSG_SIZE = 0x2a
  30. };
  31. /* Returns 1 if no reply received */
  32. int FAST_FUNC arpping(uint32_t test_nip,
  33. const uint8_t *safe_mac,
  34. uint32_t from_ip,
  35. uint8_t *from_mac,
  36. const char *interface,
  37. unsigned timeo)
  38. {
  39. int timeout_ms;
  40. struct pollfd pfd[1];
  41. #define s (pfd[0].fd) /* socket */
  42. int rv = 1; /* "no reply received" yet */
  43. struct sockaddr addr; /* for interface name */
  44. struct arpMsg arp;
  45. if (!timeo)
  46. return 1;
  47. s = socket(PF_PACKET, SOCK_PACKET, htons(ETH_P_ARP));
  48. if (s == -1) {
  49. bb_simple_perror_msg(bb_msg_can_not_create_raw_socket);
  50. return -1;
  51. }
  52. if (setsockopt_broadcast(s) == -1) {
  53. bb_simple_perror_msg("can't enable bcast on raw socket");
  54. goto ret;
  55. }
  56. /* send arp request */
  57. memset(&arp, 0, sizeof(arp));
  58. memset(arp.h_dest, 0xff, 6); /* MAC DA */
  59. memcpy(arp.h_source, from_mac, 6); /* MAC SA */
  60. arp.h_proto = htons(ETH_P_ARP); /* protocol type (Ethernet) */
  61. arp.htype = htons(ARPHRD_ETHER); /* hardware type */
  62. arp.ptype = htons(ETH_P_IP); /* protocol type (ARP message) */
  63. arp.hlen = 6; /* hardware address length */
  64. arp.plen = 4; /* protocol address length */
  65. arp.operation = htons(ARPOP_REQUEST); /* ARP op code */
  66. memcpy(arp.sHaddr, from_mac, 6); /* source hardware address */
  67. memcpy(arp.sInaddr, &from_ip, sizeof(from_ip)); /* source IP address */
  68. /* tHaddr is zero-filled */ /* target hardware address */
  69. memcpy(arp.tInaddr, &test_nip, sizeof(test_nip));/* target IP address */
  70. memset(&addr, 0, sizeof(addr));
  71. safe_strncpy(addr.sa_data, interface, sizeof(addr.sa_data));
  72. if (sendto(s, &arp, sizeof(arp), 0, &addr, sizeof(addr)) < 0) {
  73. // TODO: error message? caller didn't expect us to fail,
  74. // just returning 1 "no reply received" misleads it.
  75. goto ret;
  76. }
  77. /* wait for arp reply, and check it */
  78. timeout_ms = (int)timeo;
  79. do {
  80. typedef uint32_t aliased_uint32_t FIX_ALIASING;
  81. int r;
  82. unsigned prevTime = monotonic_ms();
  83. pfd[0].events = POLLIN;
  84. r = safe_poll(pfd, 1, timeout_ms);
  85. if (r < 0)
  86. break;
  87. if (r) {
  88. r = safe_read(s, &arp, sizeof(arp));
  89. if (r < 0)
  90. break;
  91. //log3("sHaddr %02x:%02x:%02x:%02x:%02x:%02x",
  92. // arp.sHaddr[0], arp.sHaddr[1], arp.sHaddr[2],
  93. // arp.sHaddr[3], arp.sHaddr[4], arp.sHaddr[5]);
  94. if (r >= ARP_MSG_SIZE
  95. && arp.operation == htons(ARPOP_REPLY)
  96. /* don't check it: Linux doesn't return proper tHaddr (fixed in 2.6.24?) */
  97. /* && memcmp(arp.tHaddr, from_mac, 6) == 0 */
  98. && *(aliased_uint32_t*)arp.sInaddr == test_nip
  99. ) {
  100. /* if ARP source MAC matches safe_mac
  101. * (which is client's MAC), then it's not a conflict
  102. * (client simply already has this IP and replies to ARPs!)
  103. */
  104. if (!safe_mac || memcmp(safe_mac, arp.sHaddr, 6) != 0)
  105. rv = 0;
  106. //else log2("sHaddr == safe_mac");
  107. break;
  108. }
  109. }
  110. timeout_ms -= (unsigned)monotonic_ms() - prevTime + 1;
  111. /* We used to check "timeout_ms > 0", but
  112. * this is more under/overflow-resistant
  113. * (people did see overflows here when system time jumps):
  114. */
  115. } while ((unsigned)timeout_ms <= timeo);
  116. ret:
  117. close(s);
  118. log1("%srp reply received for this address", rv ? "no a" : "A");
  119. return rv;
  120. }