ethsock.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #include <iphlpapi.h>
  29. #ifndef ERROR_NDIS_MEDIA_DISCONNECTED
  30. #define ERROR_NDIS_MEDIA_DISCONNECTED 0x8034001f
  31. #endif
  32. #define WPCAP
  33. #include <pcap.h>
  34. #else
  35. #include <sys/ioctl.h>
  36. #include <ifaddrs.h>
  37. #include <unistd.h>
  38. #include <net/if.h>
  39. #include <pcap.h>
  40. #if defined(NMRPFLASH_LINUX)
  41. #define NMRPFLASH_AF_PACKET AF_PACKET
  42. #include <linux/if_packet.h>
  43. #include <netlink/route/addr.h>
  44. #include <netlink/route/neighbour.h>
  45. #else
  46. #define NMRPFLASH_AF_PACKET AF_LINK
  47. #include <net/if_types.h>
  48. #include <net/if_media.h>
  49. #endif
  50. #endif
  51. struct ethsock
  52. {
  53. const char *intf;
  54. pcap_t *pcap;
  55. #ifndef NMRPFLASH_WINDOWS
  56. int fd;
  57. #ifdef NMRPFLASH_LINUX
  58. bool stp;
  59. // managed by NetworkManager
  60. bool nm_managed;
  61. #endif
  62. #else
  63. HANDLE handle;
  64. DWORD index;
  65. #endif
  66. unsigned timeout;
  67. uint8_t hwaddr[6];
  68. };
  69. struct ethsock_arp_undo
  70. {
  71. uint32_t ipaddr;
  72. uint8_t hwaddr[6];
  73. };
  74. struct ethsock_ip_undo
  75. {
  76. uint32_t ip[2];
  77. };
  78. static int x_pcap_findalldevs(pcap_if_t **devs)
  79. {
  80. char errbuf[PCAP_ERRBUF_SIZE];
  81. if (pcap_findalldevs(devs, errbuf) != 0) {
  82. fprintf(stderr, "%s.\n", errbuf);
  83. return -1;
  84. }
  85. return 0;
  86. }
  87. static bool intf_get_pcap_flags(const char *intf, bpf_u_int32 *flags)
  88. {
  89. pcap_if_t *devs, *dev;
  90. if (x_pcap_findalldevs(&devs) == 0) {
  91. for (dev = devs; dev; dev = dev->next) {
  92. if (!strcmp(intf, dev->name)) {
  93. *flags = dev->flags;
  94. break;
  95. }
  96. }
  97. pcap_freealldevs(devs);
  98. return dev != NULL;
  99. }
  100. return false;
  101. }
  102. #ifndef NMRPFLASH_WINDOWS
  103. static int systemf(const char *fmt, ...)
  104. {
  105. char cmd[1024];
  106. int ret;
  107. va_list va;
  108. va_start(va, fmt);
  109. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  110. if (ret >= sizeof(cmd) - 1) {
  111. return -1;
  112. }
  113. ret = system(cmd);
  114. va_end(va);
  115. return ret;
  116. }
  117. #endif
  118. #ifndef NMRPFLASH_WINDOWS
  119. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  120. {
  121. void *src;
  122. if (!sa || sa->sa_family != NMRPFLASH_AF_PACKET) {
  123. return false;
  124. }
  125. #ifndef NMRPFLASH_LINUX
  126. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  127. return false;
  128. }
  129. src = LLADDR((struct sockaddr_dl*)sa);
  130. #else
  131. src = ((struct sockaddr_ll*)sa)->sll_addr;
  132. #endif
  133. memcpy(hwaddr, src, 6);
  134. return true;
  135. }
  136. #ifdef NMRPFLASH_LINUX
  137. static int intf_sys_open(const char* intf, const char* file)
  138. {
  139. char name[256];
  140. snprintf(name, sizeof(name), "/sys/class/net/%s/%s", intf, file);
  141. return open(name, O_RDWR, 0644);
  142. }
  143. static bool intf_sys_read(const char* intf, const char* file, bool def)
  144. {
  145. char c;
  146. int fd;
  147. fd = intf_sys_open(intf, file);
  148. if (fd == -1) {
  149. return def;
  150. }
  151. c = 0;
  152. read(fd, &c, 1);
  153. close(fd);
  154. return c ? (c == '1') : def;
  155. }
  156. static bool intf_stp_enable(const char *intf, bool enabled)
  157. {
  158. int fd;
  159. ssize_t n;
  160. fd = intf_sys_open(intf, "bridge/stp_state");
  161. if (fd == -1) {
  162. return false;
  163. }
  164. n = write(fd, enabled ? "1\n" : "0\n", 2);
  165. close(fd);
  166. return n == 2;
  167. }
  168. static struct nl_addr *build_ip(uint32_t ip)
  169. {
  170. struct nl_addr *na = nl_addr_build(AF_INET, &ip, 4);
  171. if (!na) {
  172. xperror("nl_addr_build");
  173. }
  174. return na;
  175. }
  176. static struct nl_sock *xnl_socket_route()
  177. {
  178. int err;
  179. struct nl_sock *sk = nl_socket_alloc();
  180. if (sk) {
  181. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  182. return sk;
  183. }
  184. nl_socket_free(sk);
  185. nl_perror(err, "nl_connect");
  186. } else {
  187. xperror("nl_socket_alloc");
  188. }
  189. return NULL;
  190. }
  191. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  192. {
  193. struct rtnl_addr *ra = NULL;
  194. struct nl_sock *sk = NULL;
  195. struct nl_addr *laddr = NULL;
  196. struct nl_addr *bcast = NULL;
  197. int err = 1;
  198. if (!(sk = xnl_socket_route())) {
  199. return false;
  200. }
  201. if (!(laddr = build_ip(ipaddr))) {
  202. goto out;
  203. }
  204. nl_addr_set_prefixlen(laddr, bitcount(ipmask));
  205. if (!(bcast = build_ip((ipaddr & ipmask) | ~ipmask))) {
  206. goto out;
  207. }
  208. if (!(ra = rtnl_addr_alloc())) {
  209. xperror("rtnl_addr_alloc");
  210. goto out;
  211. }
  212. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  213. rtnl_addr_set_local(ra, laddr);
  214. rtnl_addr_set_broadcast(ra, bcast);
  215. if ((err = ((add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0))) {
  216. if (add && err == -NLE_EXIST) {
  217. err = 0;
  218. } else if (add || verbosity > 1) {
  219. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  220. }
  221. }
  222. out:
  223. rtnl_addr_put(ra);
  224. nl_addr_put(laddr);
  225. nl_addr_put(bcast);
  226. nl_socket_free(sk);
  227. return !err;
  228. }
  229. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  230. {
  231. #if 0
  232. struct arpreq arp;
  233. memset(&arp, 0, sizeof(arp));
  234. arp.arp_ha.sa_family = ARPHRD_ETHER;
  235. memcpy(&arp.arp_ha.sa_data, hwaddr, 6);
  236. arp.arp_flags = ATF_PERM | ATF_COM;
  237. struct sockaddr_in *in = (struct sockaddr_in*)&req.arp_pa;
  238. in->sin_addr.s_addr = htonl(ipaddr);
  239. in->sin_family = AF_INET;
  240. int fd = socket(AF_INET, SOCK_DGRAM, 0);
  241. if (fd < 0) {
  242. perror("socket");
  243. return false;
  244. }
  245. bool ret = true;
  246. if (ioctl(fd, add ? SIOCSARP : SIOCDARP, &req) < 0) {
  247. perror(add ? "ioctl(SIOCSARP)" : "ioctl(SIOCDARP");
  248. ret = false;
  249. }
  250. close(fd);
  251. return ret;
  252. #else
  253. struct nl_sock *sk;
  254. struct rtnl_neigh *neigh;
  255. struct nl_addr *mac, *ip;
  256. int err = 1;
  257. sk = NULL;
  258. neigh = NULL;
  259. mac = ip = NULL;
  260. if (!(sk = xnl_socket_route())) {
  261. goto out;
  262. }
  263. if (!(neigh = rtnl_neigh_alloc())) {
  264. xperror("rtnl_neigh_alloc");
  265. goto out;
  266. }
  267. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  268. xperror("nl_addr_build");
  269. goto out;
  270. }
  271. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  272. xperror("nl_addr_build");
  273. goto out;
  274. }
  275. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  276. rtnl_neigh_set_dst(neigh, ip);
  277. err = rtnl_neigh_delete(sk, neigh, 0);
  278. if (add) {
  279. rtnl_neigh_set_lladdr(neigh, mac);
  280. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  281. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  282. }
  283. if (err && add) {
  284. nl_perror(err, "rtnl_neigh_add");
  285. }
  286. out:
  287. nl_addr_put(ip);
  288. nl_addr_put(mac);
  289. rtnl_neigh_put(neigh);
  290. nl_socket_free(sk);
  291. return !err;
  292. #endif
  293. }
  294. #endif
  295. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  296. {
  297. struct ifaddrs *ifas, *ifa;
  298. bool found;
  299. if (getifaddrs(&ifas) != 0) {
  300. xperror("getifaddrs");
  301. return false;
  302. }
  303. found = false;
  304. if (bridge) {
  305. *bridge = false;
  306. }
  307. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  308. if (!strcmp(ifa->ifa_name, intf)) {
  309. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  310. #ifdef NMRPFLASH_BSD
  311. if (bridge) {
  312. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  313. }
  314. #endif
  315. found = true;
  316. break;
  317. }
  318. }
  319. }
  320. freeifaddrs(ifas);
  321. return found;
  322. }
  323. #else
  324. void win_perror2(const char *msg, DWORD err)
  325. {
  326. char *buf = NULL;
  327. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  328. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  329. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  330. (LPTSTR)&buf, 0, NULL);
  331. if (buf) {
  332. /* FormatMessageA terminates buf with CRLF! */
  333. fprintf(stderr, "%s: %s", msg, buf);
  334. LocalFree(buf);
  335. } else {
  336. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  337. }
  338. }
  339. static bool intf_get_if_row(NET_IFINDEX index, MIB_IF_ROW2* row)
  340. {
  341. DWORD err;
  342. memset(row, 0, sizeof(*row));
  343. row->InterfaceIndex = index;
  344. err = GetIfEntry2(row);
  345. if (err != NO_ERROR) {
  346. if (verbosity > 1) {
  347. win_perror2("GetIfEntry2", err);
  348. }
  349. return false;
  350. }
  351. return true;
  352. }
  353. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  354. {
  355. PIP_ADAPTER_INFO adapters, adapter;
  356. DWORD ret;
  357. ULONG bufLen = 0;
  358. bool found = false;
  359. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  360. win_perror2("GetAdaptersInfo", ret);
  361. return false;
  362. }
  363. adapters = malloc(bufLen);
  364. if (!adapters) {
  365. xperror("malloc");
  366. return false;
  367. }
  368. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  369. for (adapter = adapters; adapter; adapter = adapter->Next) {
  370. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  371. continue;
  372. }
  373. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  374. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  375. if (strstr(intf, adapter->AdapterName)) {
  376. if (adapter->AddressLength == 6) {
  377. memcpy(hwaddr, adapter->Address, 6);
  378. if (index) {
  379. *index = adapter->Index;
  380. }
  381. found = true;
  382. break;
  383. }
  384. }
  385. }
  386. } else {
  387. win_perror2("GetAdaptersInfo", ret);
  388. }
  389. free(adapters);
  390. return found;
  391. }
  392. static const char *intf_name_to_wpcap(const char *intf)
  393. {
  394. static char buf[128];
  395. if (intf[0] == '\\') {
  396. return intf;
  397. }
  398. do {
  399. NET_IFINDEX index;
  400. DWORD err;
  401. NET_LUID luid;
  402. GUID guid;
  403. if (sscanf(intf, "net%lu", &index) != 1) {
  404. index = if_nametoindex(intf);
  405. if (!index) {
  406. break;
  407. }
  408. }
  409. err = ConvertInterfaceIndexToLuid(index, &luid);
  410. if (err != NO_ERROR) {
  411. if (verbosity) {
  412. win_perror2("ConvertInterfaceIndexToLuid", err);
  413. }
  414. break;
  415. }
  416. err = ConvertInterfaceLuidToGuid(&luid, &guid);
  417. if (err != NO_ERROR) {
  418. if (verbosity) {
  419. win_perror2("ConvertInterfaceLuidToGuid", err);
  420. }
  421. break;
  422. }
  423. snprintf(buf, sizeof(buf),
  424. "\\Device\\NPF_{%08lX-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}",
  425. guid.Data1, guid.Data2, guid.Data3,
  426. guid.Data4[0], guid.Data4[1], guid.Data4[2],
  427. guid.Data4[3], guid.Data4[4], guid.Data4[5],
  428. guid.Data4[6], guid.Data4[7]);
  429. return buf;
  430. } while (false);
  431. fprintf(stderr, "Invalid interface name.\n");
  432. return NULL;
  433. }
  434. NET_IFINDEX intf_get_index(const char* intf)
  435. {
  436. const char* p;
  437. GUID guid;
  438. NET_LUID luid;
  439. DWORD err;
  440. NET_IFINDEX ret;
  441. int n;
  442. p = strstr(intf, "NPF_{");
  443. if (!p) {
  444. return 0;
  445. }
  446. sscanf(p + 5,
  447. "%08lX-%04hX-%04hX-%02hhX%02hhX-%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%n",
  448. &guid.Data1, &guid.Data2, &guid.Data3,
  449. &guid.Data4[0], &guid.Data4[1], &guid.Data4[2],
  450. &guid.Data4[3], &guid.Data4[4], &guid.Data4[5],
  451. &guid.Data4[6], &guid.Data4[7], &n);
  452. if (n != 36) {
  453. return 0;
  454. }
  455. err = ConvertInterfaceGuidToLuid(&guid, &luid);
  456. if (err) {
  457. win_perror2("ConvertInterfaceGuidToLuid", err);
  458. return 0;
  459. }
  460. err = ConvertInterfaceLuidToIndex(&luid, &ret);
  461. if (err) {
  462. win_perror2("ConvertInterfaceLuidToIndex", err);
  463. return 0;
  464. }
  465. return ret;
  466. }
  467. #endif
  468. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  469. {
  470. return sock->hwaddr;
  471. }
  472. bool ethsock_is_wifi(struct ethsock *sock)
  473. {
  474. #ifdef PCAP_IF_WIRELESS
  475. bpf_u_int32 flags;
  476. if (!intf_get_pcap_flags(sock->intf, &flags)) {
  477. return false;
  478. }
  479. return flags & PCAP_IF_WIRELESS;
  480. #else
  481. #warning "libpcap version is < 1.9.0"
  482. return false;
  483. #endif
  484. }
  485. bool ethsock_is_unplugged(struct ethsock *sock)
  486. {
  487. #ifdef PCAP_IF_CONNECTION_STATUS
  488. bpf_u_int32 flags;
  489. if (!intf_get_pcap_flags(sock->intf, &flags)) {
  490. return false;
  491. }
  492. return (flags & PCAP_IF_CONNECTION_STATUS)
  493. == PCAP_IF_CONNECTION_STATUS_DISCONNECTED;
  494. #else
  495. #warning "libpcap version is < 1.9.0"
  496. return false;
  497. #endif
  498. }
  499. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  500. {
  501. char buf[PCAP_ERRBUF_SIZE];
  502. struct bpf_program fp;
  503. struct ethsock *sock;
  504. bool is_bridge = false;
  505. int err;
  506. #ifdef NMRPFLASH_WINDOWS
  507. intf = intf_name_to_wpcap(intf);
  508. if (!intf) {
  509. return NULL;
  510. }
  511. #endif
  512. sock = malloc(sizeof(struct ethsock));
  513. if (!sock) {
  514. xperror("malloc");
  515. return NULL;
  516. }
  517. buf[0] = '\0';
  518. sock->intf = intf;
  519. sock->pcap = pcap_create(sock->intf, buf);
  520. if (!sock->pcap) {
  521. fprintf(stderr, "pcap_create: %s\n", buf);
  522. }
  523. if (*buf) {
  524. fprintf(stderr, "Warning: %s.\n", buf);
  525. }
  526. err = pcap_set_snaplen(sock->pcap, BUFSIZ);
  527. if (err) {
  528. pcap_perror(sock->pcap, "pcap_set_snaplen");
  529. goto cleanup;
  530. }
  531. err = pcap_set_promisc(sock->pcap, 1);
  532. if (err) {
  533. pcap_perror(sock->pcap, "pcap_set_promisc");
  534. goto cleanup;
  535. }
  536. err = pcap_set_timeout(sock->pcap, 200);
  537. if (err) {
  538. pcap_perror(sock->pcap, "pcap_set_timeout");
  539. goto cleanup;
  540. }
  541. err = pcap_set_immediate_mode(sock->pcap, 1);
  542. if (err) {
  543. pcap_perror(sock->pcap, "pcap_set_immediate_mode");
  544. goto cleanup;
  545. }
  546. err = pcap_activate(sock->pcap);
  547. if (err < 0) {
  548. pcap_perror(sock->pcap, "pcap_activate");
  549. goto cleanup;
  550. } else if (err > 0) {
  551. fprintf(stderr, "Warning: %s.\n", pcap_geterr(sock->pcap));
  552. }
  553. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  554. fprintf(stderr, "%s is not an ethernet interface.\n",
  555. intf);
  556. goto cleanup;
  557. }
  558. #ifndef NMRPFLASH_WINDOWS
  559. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  560. #else
  561. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  562. #endif
  563. if (err) {
  564. fprintf(stderr, "Failed to get interface info.\n");
  565. goto cleanup;
  566. }
  567. #ifdef NMRPFLASH_WINDOWS
  568. err = pcap_setmintocopy(sock->pcap, 0);
  569. if (err) {
  570. pcap_perror(sock->pcap, "pcap_setmintocopy");
  571. goto cleanup;
  572. }
  573. sock->handle = pcap_getevent(sock->pcap);
  574. if (!sock->handle) {
  575. pcap_perror(sock->pcap, "pcap_getevent");
  576. goto cleanup;
  577. }
  578. #else
  579. sock->fd = pcap_get_selectable_fd(sock->pcap);
  580. if (sock->fd == -1) {
  581. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  582. goto cleanup;
  583. }
  584. #endif
  585. snprintf(buf, sizeof(buf), "ether proto 0x%04x and not ether src %s",
  586. protocol, mac_to_str(sock->hwaddr));
  587. err = pcap_compile(sock->pcap, &fp, buf, 0, 0);
  588. if (err) {
  589. pcap_perror(sock->pcap, "pcap_compile");
  590. goto cleanup;
  591. }
  592. err = pcap_setfilter(sock->pcap, &fp);
  593. pcap_freecode(&fp);
  594. if (err) {
  595. pcap_perror(sock->pcap, "pcap_setfilter");
  596. goto cleanup;
  597. }
  598. #ifdef NMRPFLASH_LINUX
  599. // nmrpflash does not work on bridge interfaces with STP enabled
  600. if ((sock->stp = intf_sys_read(intf, "bridge/stp_state", false))) {
  601. if (!intf_stp_enable(intf, false)) {
  602. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  603. }
  604. }
  605. err = system("nmcli -v > /dev/null");
  606. if (!err) {
  607. err = systemf("nmcli -f GENERAL.STATE device show %s | grep -q unmanaged", sock->intf);
  608. if (!err) {
  609. sock->nm_managed = false;
  610. } else {
  611. sock->nm_managed = true;
  612. err = systemf("nmcli device set ifname %s managed no", sock->intf);
  613. if (err) {
  614. printf("Warning: failed to temporarily disable NetworkManager\n");
  615. } else if (verbosity > 1) {
  616. printf("Temporarily disabling NetworkManager on interface.\n");
  617. }
  618. }
  619. } else {
  620. sock->nm_managed = false;
  621. }
  622. #else
  623. if (is_bridge) {
  624. fprintf(stderr, "Warning: bridge interfaces are not fully "
  625. "supported on this platform.\n");
  626. }
  627. #endif
  628. return sock;
  629. cleanup:
  630. ethsock_close(sock);
  631. return NULL;
  632. }
  633. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  634. {
  635. struct pcap_pkthdr* hdr;
  636. const u_char *capbuf;
  637. int status;
  638. #ifdef NMRPFLASH_WINDOWS
  639. DWORD ret;
  640. if (sock->timeout) {
  641. ret = WaitForSingleObject(sock->handle, sock->timeout);
  642. if (ret == WAIT_TIMEOUT) {
  643. return 0;
  644. } else if (ret != WAIT_OBJECT_0) {
  645. win_perror2("WaitForSingleObject", ret);
  646. return -1;
  647. }
  648. }
  649. #else
  650. if (sock->timeout) {
  651. status = select_fd(sock->fd, sock->timeout);
  652. if (status < 0) {
  653. return -1;
  654. } else if (status == 0) {
  655. return 0;
  656. }
  657. }
  658. #endif
  659. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  660. switch (status) {
  661. case 1:
  662. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  663. return hdr->caplen;
  664. case 0:
  665. return 0;
  666. case -1:
  667. pcap_perror(sock->pcap, "pcap_next_ex");
  668. return -1;
  669. default:
  670. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  671. return -1;
  672. }
  673. }
  674. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  675. {
  676. if (pcap_inject(sock->pcap, buf, len) != len) {
  677. #ifdef NMRPFLASH_WINDOWS
  678. // Npcap's pcap_inject fails in many cases where neither
  679. // Linux or macOS report an error. For now, we simply
  680. // ignore errors if unplugged (and let all other through
  681. // as well, just printing a debug line).
  682. if (!ethsock_is_unplugged(sock) && verbosity > 1) {
  683. pcap_perror(sock->pcap, "pcap_inject");
  684. }
  685. return 0;
  686. #endif
  687. pcap_perror(sock->pcap, "pcap_inject");
  688. return -1;
  689. }
  690. return 0;
  691. }
  692. int ethsock_close(struct ethsock *sock)
  693. {
  694. if (!sock) {
  695. return 0;
  696. }
  697. #ifdef NMRPFLASH_LINUX
  698. if (sock->stp) {
  699. intf_stp_enable(sock->intf, true);
  700. }
  701. if (sock->nm_managed) {
  702. systemf("nmcli device set ifname %s managed yes", sock->intf);
  703. }
  704. #endif
  705. if (sock->pcap) {
  706. pcap_close(sock->pcap);
  707. }
  708. free(sock);
  709. return 0;
  710. }
  711. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  712. {
  713. sock->timeout = msec;
  714. return 0;
  715. }
  716. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  717. {
  718. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  719. struct in_addr addr = { .s_addr = ipaddr };
  720. #elif defined(NMRPFLASH_WINDOWS)
  721. DWORD err;
  722. MIB_IPNETROW arp = {
  723. .dwIndex = sock->index,
  724. .dwPhysAddrLen = 6,
  725. .dwAddr = ipaddr,
  726. .dwType = MIB_IPNET_TYPE_STATIC
  727. };
  728. memcpy(arp.bPhysAddr, hwaddr, 6);
  729. #endif
  730. if (undo) {
  731. #if defined(NMRPFLASH_LINUX)
  732. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  733. return -1;
  734. }
  735. #elif defined(NMRPFLASH_WINDOWS)
  736. err = CreateIpNetEntry(&arp);
  737. if (err != NO_ERROR) {
  738. win_perror2("CreateIpNetEntry", err);
  739. return -1;
  740. }
  741. #else
  742. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  743. return -1;
  744. }
  745. #endif
  746. *undo = malloc(sizeof(struct ethsock_arp_undo));
  747. if (!*undo) {
  748. xperror("malloc");
  749. return -1;
  750. }
  751. (*undo)->ipaddr = ipaddr;
  752. memcpy((*undo)->hwaddr, hwaddr, 6);
  753. } else {
  754. #if defined(NMRPFLASH_LINUX)
  755. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  756. return -1;
  757. }
  758. #elif defined(NMRPFLASH_WINDOWS)
  759. return DeleteIpNetEntry(&arp) ? 0 : -1;
  760. #else
  761. return systemf("arp -d %s &> /dev/null", inet_ntoa(addr));
  762. #endif
  763. }
  764. return 0;
  765. }
  766. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  767. {
  768. // remove any previous ARP entry
  769. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  770. // add the new ARP entry
  771. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  772. }
  773. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  774. {
  775. if (!*undo) {
  776. return 0;
  777. }
  778. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  779. free(*undo);
  780. *undo = NULL;
  781. return ret;
  782. }
  783. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  784. {
  785. #ifndef NMRPFLASH_WINDOWS
  786. pcap_addr_t *addr;
  787. int i;
  788. for (addr = dev->addresses; addr; addr = addr->next) {
  789. if (verbosity > 1) {
  790. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  791. addr->addr->sa_family);
  792. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  793. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  794. }
  795. printf("}\n");
  796. }
  797. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  798. return true;
  799. }
  800. }
  801. #endif
  802. return intf_get_info(dev->name, hwaddr, NULL);
  803. }
  804. int ethsock_list_all(void)
  805. {
  806. pcap_if_t *devs, *dev;
  807. pcap_addr_t *addr;
  808. uint8_t hwaddr[6];
  809. unsigned dev_num = 0, dev_ok = 0;
  810. #ifdef NMRPFLASH_WINDOWS
  811. wchar_t *pretty = NULL;
  812. NET_IFINDEX index;
  813. MIB_IF_ROW2 row;
  814. #endif
  815. if (x_pcap_findalldevs(&devs) != 0) {
  816. return -1;
  817. }
  818. memset(hwaddr, 0, 6);
  819. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  820. if (dev->flags & PCAP_IF_LOOPBACK) {
  821. if (verbosity) {
  822. printf("%-15s (loopback device)\n", dev->name);
  823. }
  824. continue;
  825. }
  826. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  827. if (verbosity) {
  828. printf("%-15s (not an ethernet device)\n",
  829. dev->name);
  830. }
  831. continue;
  832. }
  833. #ifndef NMRPFLASH_WINDOWS
  834. printf("%-15s", dev->name);
  835. #else
  836. index = intf_get_index(dev->name);
  837. if (intf_get_if_row(index, &row)) {
  838. if (!row.InterfaceAndOperStatusFlags.HardwareInterface) {
  839. if (verbosity) {
  840. printf("%-15s (virtual interface)\n", dev->name);
  841. }
  842. continue;
  843. }
  844. if (row.Alias[0]) {
  845. pretty = row.Alias;
  846. }
  847. }
  848. if (!verbosity && index) {
  849. printf("net%-2lu", index);
  850. } else {
  851. printf("%-15s", dev->name);
  852. }
  853. #endif
  854. for (addr = dev->addresses; addr; addr = addr->next) {
  855. if (addr->addr->sa_family == AF_INET) {
  856. printf(" %-15s",
  857. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  858. break;
  859. }
  860. }
  861. if (!addr) {
  862. printf(" %-15s", "0.0.0.0");
  863. }
  864. printf(" %s", mac_to_str(hwaddr));
  865. #ifdef NMRPFLASH_WINDOWS
  866. if (pretty) {
  867. printf(" (%ls)", pretty);
  868. } else if (dev->description) {
  869. printf(" (%s)", dev->description);
  870. }
  871. #endif
  872. printf("\n");
  873. ++dev_ok;
  874. }
  875. if (!dev_ok) {
  876. printf("No suitable network interfaces found.\n");
  877. }
  878. return 0;
  879. }
  880. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  881. void *arg)
  882. {
  883. struct ethsock_ip_callback_args args;
  884. pcap_if_t *devs, *dev;
  885. pcap_addr_t *addr;
  886. int status = 0;
  887. if (x_pcap_findalldevs(&devs) != 0) {
  888. return -1;
  889. }
  890. args.arg = arg;
  891. for (dev = devs; dev; dev = dev->next) {
  892. if (strcmp(sock->intf, dev->name)) {
  893. continue;
  894. }
  895. for (addr = dev->addresses; addr; addr = addr->next) {
  896. if (addr->addr->sa_family == AF_INET) {
  897. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  898. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  899. status = callback(&args);
  900. if (status <= 0) {
  901. break;
  902. }
  903. }
  904. }
  905. break;
  906. }
  907. pcap_freealldevs(devs);
  908. return status <= 0 ? status : 0;
  909. }
  910. static inline void set_addr(void *p, uint32_t addr)
  911. {
  912. struct sockaddr_in* sin = p;
  913. sin->sin_family = AF_INET;
  914. sin->sin_addr.s_addr = addr;
  915. #ifdef NMRPFLASH_BSD
  916. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  917. #endif
  918. }
  919. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  920. static bool intf_up(int fd, const char *intf, bool up)
  921. {
  922. struct ifreq ifr;
  923. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  924. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  925. if (up) {
  926. xperror("ioctl(SIOCGIFFLAGS)");
  927. }
  928. return false;
  929. }
  930. if (!up) {
  931. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  932. } else {
  933. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  934. }
  935. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  936. if (up) {
  937. xperror("ioctl(SIOCSIFFLAGS)");
  938. }
  939. return false;
  940. }
  941. return true;
  942. }
  943. #endif
  944. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  945. {
  946. int ret, fd;
  947. if (add && undo) {
  948. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  949. xperror("malloc");
  950. return -1;
  951. }
  952. (*undo)->ip[0] = ipaddr;
  953. (*undo)->ip[1] = ipmask;
  954. }
  955. ret = -1;
  956. fd = socket(AF_INET, SOCK_DGRAM, 0);
  957. if (fd < 0) {
  958. sock_perror("socket");
  959. goto out;
  960. }
  961. #ifndef NMRPFLASH_WINDOWS
  962. #ifdef NMRPFLASH_LINUX
  963. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  964. goto out;
  965. }
  966. #else // NMRPFLASH_OSX (or any other BSD)
  967. struct ifaliasreq ifra;
  968. memset(&ifra, 0, sizeof(ifra));
  969. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  970. set_addr(&ifra.ifra_addr, ipaddr);
  971. set_addr(&ifra.ifra_mask, ipmask);
  972. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  973. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  974. if (add) {
  975. xperror("ioctl(SIOCAIFADDR");
  976. }
  977. goto out;
  978. }
  979. if (add) {
  980. (*undo)->ip[0] = ipaddr;
  981. (*undo)->ip[1] = ipmask;
  982. intf_up(fd, ifra.ifra_name, true);
  983. }
  984. #endif
  985. #else // NMRPFLASH_WINDOWS
  986. MIB_UNICASTIPADDRESS_ROW row;
  987. DWORD err;
  988. int i;
  989. memset(&row, 0, sizeof(row));
  990. row.InterfaceIndex = sock->index;
  991. set_addr(&row.Address.Ipv4, ipaddr);
  992. row.Address.si_family = AF_INET;
  993. if (add) {
  994. row.PrefixOrigin = IpPrefixOriginManual;
  995. row.SuffixOrigin = IpPrefixOriginManual;
  996. row.OnLinkPrefixLength = bitcount(ipmask);
  997. row.SkipAsSource = false;
  998. row.PreferredLifetime = 0xffffffff;
  999. row.ValidLifetime = 0xffffffff;
  1000. }
  1001. if (add) {
  1002. err = CreateUnicastIpAddressEntry(&row);
  1003. if (err != NO_ERROR && err != ERROR_OBJECT_ALREADY_EXISTS) {
  1004. win_perror2("CreateUnicastIpAddressEntry", err);
  1005. goto out;
  1006. }
  1007. if (err != ERROR_OBJECT_ALREADY_EXISTS) {
  1008. /* Wait until the new IP has actually been added */
  1009. for (i = 0; i < 20; ++i) {
  1010. err = GetUnicastIpAddressEntry(&row);
  1011. if (err != NO_ERROR) {
  1012. win_perror2("GetUnicastIpAddressEntry", err);
  1013. goto out;
  1014. }
  1015. if (row.DadState == IpDadStateTentative) {
  1016. Sleep(500);
  1017. } else {
  1018. break;
  1019. }
  1020. }
  1021. if (row.DadState == IpDadStateDeprecated) {
  1022. fprintf(stderr, "Warning: IP address marked as deprecated.\n");
  1023. } else if (row.DadState == IpDadStateTentative) {
  1024. fprintf(stderr, "Warning: IP address marked as tentative.\n");
  1025. } else if (row.DadState != IpDadStatePreferred) {
  1026. fprintf(stderr, "Failed to add IP address (state=%d).\n", row.DadState);
  1027. goto out;
  1028. }
  1029. }
  1030. } else {
  1031. err = DeleteUnicastIpAddressEntry(&row);
  1032. if (err != NO_ERROR) {
  1033. win_perror2("DeleteUnicastIpAddressEntry", err);
  1034. goto out;
  1035. }
  1036. }
  1037. #endif
  1038. ret = 0;
  1039. out:
  1040. #ifndef NMRPFLASH_WINDOWS
  1041. close(fd);
  1042. #else
  1043. closesocket(fd);
  1044. #endif
  1045. if (ret != 0 && undo) {
  1046. free(*undo);
  1047. *undo = NULL;
  1048. }
  1049. return ret;
  1050. }
  1051. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  1052. {
  1053. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  1054. }
  1055. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  1056. {
  1057. if (!*undo) {
  1058. return 0;
  1059. }
  1060. int ret;
  1061. if ((*undo)->ip[0] != INADDR_NONE) {
  1062. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  1063. } else {
  1064. ret = 0;
  1065. }
  1066. free(*undo);
  1067. *undo = NULL;
  1068. return ret;
  1069. }