ethsock.c 24 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #include <iphlpapi.h>
  29. #define WPCAP
  30. #include <pcap.h>
  31. #else
  32. #include <sys/ioctl.h>
  33. #include <ifaddrs.h>
  34. #include <unistd.h>
  35. #include <net/if.h>
  36. #include <pcap.h>
  37. #if defined(NMRPFLASH_LINUX)
  38. #define NMRPFLASH_AF_PACKET AF_PACKET
  39. #include <linux/if_packet.h>
  40. #include <netlink/route/addr.h>
  41. #include <netlink/route/neighbour.h>
  42. #else
  43. #define NMRPFLASH_AF_PACKET AF_LINK
  44. #include <net/if_types.h>
  45. #include <net/if_media.h>
  46. #endif
  47. #endif
  48. struct ethsock
  49. {
  50. const char *intf;
  51. pcap_t *pcap;
  52. #ifndef NMRPFLASH_WINDOWS
  53. int fd;
  54. #ifdef NMRPFLASH_LINUX
  55. bool stp;
  56. // managed by NetworkManager
  57. bool nm_managed;
  58. #endif
  59. #else
  60. HANDLE handle;
  61. DWORD index;
  62. #endif
  63. unsigned timeout;
  64. uint8_t hwaddr[6];
  65. };
  66. struct ethsock_arp_undo
  67. {
  68. uint32_t ipaddr;
  69. uint8_t hwaddr[6];
  70. };
  71. struct ethsock_ip_undo
  72. {
  73. uint32_t ip[2];
  74. };
  75. static int x_pcap_findalldevs(pcap_if_t **devs)
  76. {
  77. char errbuf[PCAP_ERRBUF_SIZE];
  78. if (pcap_findalldevs(devs, errbuf) != 0) {
  79. fprintf(stderr, "%s.\n", errbuf);
  80. return -1;
  81. }
  82. return 0;
  83. }
  84. static bool intf_get_pcap_flags(const char *intf, bpf_u_int32 *flags)
  85. {
  86. pcap_if_t *devs, *dev;
  87. if (x_pcap_findalldevs(&devs) == 0) {
  88. for (dev = devs; dev; dev = dev->next) {
  89. if (!strcmp(intf, dev->name)) {
  90. *flags = dev->flags;
  91. break;
  92. }
  93. }
  94. pcap_freealldevs(devs);
  95. return dev != NULL;
  96. }
  97. return false;
  98. }
  99. #ifndef NMRPFLASH_WINDOWS
  100. static int systemf(const char *fmt, ...)
  101. {
  102. char cmd[1024];
  103. int ret;
  104. va_list va;
  105. va_start(va, fmt);
  106. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  107. if (ret >= sizeof(cmd) - 1) {
  108. return -1;
  109. }
  110. ret = system(cmd);
  111. va_end(va);
  112. return ret;
  113. }
  114. #endif
  115. #ifndef NMRPFLASH_WINDOWS
  116. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  117. {
  118. void *src;
  119. if (!sa || sa->sa_family != NMRPFLASH_AF_PACKET) {
  120. return false;
  121. }
  122. #ifndef NMRPFLASH_LINUX
  123. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  124. return false;
  125. }
  126. src = LLADDR((struct sockaddr_dl*)sa);
  127. #else
  128. src = ((struct sockaddr_ll*)sa)->sll_addr;
  129. #endif
  130. memcpy(hwaddr, src, 6);
  131. return true;
  132. }
  133. #ifdef NMRPFLASH_LINUX
  134. static int intf_sys_open(const char* intf, const char* file)
  135. {
  136. char name[256];
  137. snprintf(name, sizeof(name), "/sys/class/net/%s/%s", intf, file);
  138. return open(name, O_RDWR, 0644);
  139. }
  140. static bool intf_sys_read(const char* intf, const char* file, bool def)
  141. {
  142. char c;
  143. int fd;
  144. fd = intf_sys_open(intf, file);
  145. if (fd == -1) {
  146. return def;
  147. }
  148. c = 0;
  149. read(fd, &c, 1);
  150. close(fd);
  151. return c ? (c == '1') : def;
  152. }
  153. static bool intf_stp_enable(const char *intf, bool enabled)
  154. {
  155. int fd;
  156. ssize_t n;
  157. fd = intf_sys_open(intf, "bridge/stp_state");
  158. if (fd == -1) {
  159. return false;
  160. }
  161. n = write(fd, enabled ? "1\n" : "0\n", 2);
  162. close(fd);
  163. return n == 2;
  164. }
  165. static struct nl_addr *build_ip(uint32_t ip)
  166. {
  167. struct nl_addr *na = nl_addr_build(AF_INET, &ip, 4);
  168. if (!na) {
  169. xperror("nl_addr_build");
  170. }
  171. return na;
  172. }
  173. static struct nl_sock *xnl_socket_route()
  174. {
  175. int err;
  176. struct nl_sock *sk = nl_socket_alloc();
  177. if (sk) {
  178. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  179. return sk;
  180. }
  181. nl_socket_free(sk);
  182. nl_perror(err, "nl_connect");
  183. } else {
  184. xperror("nl_socket_alloc");
  185. }
  186. return NULL;
  187. }
  188. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  189. {
  190. struct rtnl_addr *ra = NULL;
  191. struct nl_sock *sk = NULL;
  192. struct nl_addr *laddr = NULL;
  193. struct nl_addr *bcast = NULL;
  194. int err = 1;
  195. if (!(sk = xnl_socket_route())) {
  196. return false;
  197. }
  198. if (!(laddr = build_ip(ipaddr))) {
  199. goto out;
  200. }
  201. nl_addr_set_prefixlen(laddr, bitcount(ipmask));
  202. if (!(bcast = build_ip((ipaddr & ipmask) | ~ipmask))) {
  203. goto out;
  204. }
  205. if (!(ra = rtnl_addr_alloc())) {
  206. xperror("rtnl_addr_alloc");
  207. goto out;
  208. }
  209. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  210. rtnl_addr_set_local(ra, laddr);
  211. rtnl_addr_set_broadcast(ra, bcast);
  212. if ((err = ((add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0))) {
  213. if (add && err == -NLE_EXIST) {
  214. err = 0;
  215. } else if (add || verbosity > 1) {
  216. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  217. }
  218. }
  219. out:
  220. rtnl_addr_put(ra);
  221. nl_addr_put(laddr);
  222. nl_addr_put(bcast);
  223. nl_socket_free(sk);
  224. return !err;
  225. }
  226. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  227. {
  228. #if 0
  229. struct arpreq arp;
  230. memset(&arp, 0, sizeof(arp));
  231. arp.arp_ha.sa_family = ARPHRD_ETHER;
  232. memcpy(&arp.arp_ha.sa_data, hwaddr, 6);
  233. arp.arp_flags = ATF_PERM | ATF_COM;
  234. struct sockaddr_in *in = (struct sockaddr_in*)&req.arp_pa;
  235. in->sin_addr.s_addr = htonl(ipaddr);
  236. in->sin_family = AF_INET;
  237. int fd = socket(AF_INET, SOCK_DGRAM, 0);
  238. if (fd < 0) {
  239. perror("socket");
  240. return false;
  241. }
  242. bool ret = true;
  243. if (ioctl(fd, add ? SIOCSARP : SIOCDARP, &req) < 0) {
  244. perror(add ? "ioctl(SIOCSARP)" : "ioctl(SIOCDARP");
  245. ret = false;
  246. }
  247. close(fd);
  248. return ret;
  249. #else
  250. struct nl_sock *sk;
  251. struct rtnl_neigh *neigh;
  252. struct nl_addr *mac, *ip;
  253. int err = 1;
  254. sk = NULL;
  255. neigh = NULL;
  256. mac = ip = NULL;
  257. if (!(sk = xnl_socket_route())) {
  258. goto out;
  259. }
  260. if (!(neigh = rtnl_neigh_alloc())) {
  261. xperror("rtnl_neigh_alloc");
  262. goto out;
  263. }
  264. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  265. xperror("nl_addr_build");
  266. goto out;
  267. }
  268. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  269. xperror("nl_addr_build");
  270. goto out;
  271. }
  272. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  273. rtnl_neigh_set_dst(neigh, ip);
  274. err = rtnl_neigh_delete(sk, neigh, 0);
  275. if (add) {
  276. rtnl_neigh_set_lladdr(neigh, mac);
  277. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  278. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  279. }
  280. if (err && add) {
  281. nl_perror(err, "rtnl_neigh_add");
  282. }
  283. out:
  284. nl_addr_put(ip);
  285. nl_addr_put(mac);
  286. rtnl_neigh_put(neigh);
  287. nl_socket_free(sk);
  288. return !err;
  289. #endif
  290. }
  291. #endif
  292. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  293. {
  294. struct ifaddrs *ifas, *ifa;
  295. bool found;
  296. if (getifaddrs(&ifas) != 0) {
  297. xperror("getifaddrs");
  298. return false;
  299. }
  300. found = false;
  301. if (bridge) {
  302. *bridge = false;
  303. }
  304. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  305. if (!strcmp(ifa->ifa_name, intf)) {
  306. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  307. #ifdef NMRPFLASH_BSD
  308. if (bridge) {
  309. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  310. }
  311. #endif
  312. found = true;
  313. break;
  314. }
  315. }
  316. }
  317. freeifaddrs(ifas);
  318. return found;
  319. }
  320. #else
  321. void win_perror2(const char *msg, DWORD err)
  322. {
  323. char *buf = NULL;
  324. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  325. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  326. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  327. (LPTSTR)&buf, 0, NULL);
  328. if (buf) {
  329. /* FormatMessageA terminates buf with CRLF! */
  330. fprintf(stderr, "%s: %s", msg, buf);
  331. LocalFree(buf);
  332. } else {
  333. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  334. }
  335. }
  336. static bool intf_get_if_row(NET_IFINDEX index, MIB_IF_ROW2* row)
  337. {
  338. DWORD err;
  339. memset(row, 0, sizeof(*row));
  340. row->InterfaceIndex = index;
  341. err = GetIfEntry2(row);
  342. if (err != NO_ERROR) {
  343. if (verbosity > 1) {
  344. win_perror2("GetIfEntry2", err);
  345. }
  346. return false;
  347. }
  348. return true;
  349. }
  350. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  351. {
  352. PIP_ADAPTER_INFO adapters, adapter;
  353. DWORD ret;
  354. ULONG bufLen = 0;
  355. bool found = false;
  356. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  357. win_perror2("GetAdaptersInfo", ret);
  358. return false;
  359. }
  360. adapters = malloc(bufLen);
  361. if (!adapters) {
  362. xperror("malloc");
  363. return false;
  364. }
  365. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  366. for (adapter = adapters; adapter; adapter = adapter->Next) {
  367. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  368. continue;
  369. }
  370. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  371. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  372. if (strstr(intf, adapter->AdapterName)) {
  373. if (adapter->AddressLength == 6) {
  374. memcpy(hwaddr, adapter->Address, 6);
  375. if (index) {
  376. *index = adapter->Index;
  377. }
  378. found = true;
  379. break;
  380. }
  381. }
  382. }
  383. } else {
  384. win_perror2("GetAdaptersInfo", ret);
  385. }
  386. free(adapters);
  387. return found;
  388. }
  389. static const char *intf_name_to_wpcap(const char *intf)
  390. {
  391. static char buf[128];
  392. if (intf[0] == '\\') {
  393. return intf;
  394. }
  395. do {
  396. NET_IFINDEX index;
  397. DWORD err;
  398. NET_LUID luid;
  399. GUID guid;
  400. if (sscanf(intf, "net%lu", &index) != 1) {
  401. index = if_nametoindex(intf);
  402. if (!index) {
  403. break;
  404. }
  405. }
  406. err = ConvertInterfaceIndexToLuid(index, &luid);
  407. if (err != NO_ERROR) {
  408. if (verbosity) {
  409. win_perror2("ConvertInterfaceIndexToLuid", err);
  410. }
  411. break;
  412. }
  413. err = ConvertInterfaceLuidToGuid(&luid, &guid);
  414. if (err != NO_ERROR) {
  415. if (verbosity) {
  416. win_perror2("ConvertInterfaceLuidToGuid", err);
  417. }
  418. break;
  419. }
  420. snprintf(buf, sizeof(buf),
  421. "\\Device\\NPF_{%08lX-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}",
  422. guid.Data1, guid.Data2, guid.Data3,
  423. guid.Data4[0], guid.Data4[1], guid.Data4[2],
  424. guid.Data4[3], guid.Data4[4], guid.Data4[5],
  425. guid.Data4[6], guid.Data4[7]);
  426. return buf;
  427. } while (false);
  428. fprintf(stderr, "Invalid interface name.\n");
  429. return NULL;
  430. }
  431. NET_IFINDEX intf_get_index(const char* intf)
  432. {
  433. const char* p;
  434. GUID guid;
  435. NET_LUID luid;
  436. DWORD err;
  437. NET_IFINDEX ret;
  438. int n;
  439. p = strstr(intf, "NPF_{");
  440. if (!p) {
  441. return 0;
  442. }
  443. sscanf(p + 5,
  444. "%08lX-%04hX-%04hX-%02hhX%02hhX-%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%n",
  445. &guid.Data1, &guid.Data2, &guid.Data3,
  446. &guid.Data4[0], &guid.Data4[1], &guid.Data4[2],
  447. &guid.Data4[3], &guid.Data4[4], &guid.Data4[5],
  448. &guid.Data4[6], &guid.Data4[7], &n);
  449. if (n != 36) {
  450. return 0;
  451. }
  452. err = ConvertInterfaceGuidToLuid(&guid, &luid);
  453. if (err) {
  454. win_perror2("ConvertInterfaceGuidToLuid", err);
  455. return 0;
  456. }
  457. err = ConvertInterfaceLuidToIndex(&luid, &ret);
  458. if (err) {
  459. win_perror2("ConvertInterfaceLuidToIndex", err);
  460. return 0;
  461. }
  462. return ret;
  463. }
  464. #endif
  465. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  466. {
  467. return sock->hwaddr;
  468. }
  469. bool ethsock_is_wifi(struct ethsock *sock)
  470. {
  471. #ifdef PCAP_IF_WIRELESS
  472. bpf_u_int32 flags;
  473. if (!intf_get_pcap_flags(sock->intf, &flags)) {
  474. return false;
  475. }
  476. return flags & PCAP_IF_WIRELESS;
  477. #else
  478. #warning "libpcap version is < 1.9.0"
  479. return false;
  480. #endif
  481. }
  482. bool ethsock_is_unplugged(struct ethsock *sock)
  483. {
  484. bpf_u_int32 flags;
  485. if (!intf_get_pcap_flags(sock->intf, &flags)) {
  486. return false;
  487. }
  488. return flags & PCAP_IF_CONNECTION_STATUS_DISCONNECTED;
  489. }
  490. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  491. {
  492. char buf[PCAP_ERRBUF_SIZE];
  493. struct bpf_program fp;
  494. struct ethsock *sock;
  495. bool is_bridge = false;
  496. int err;
  497. int promisc;
  498. #ifdef NMRPFLASH_WINDOWS
  499. intf = intf_name_to_wpcap(intf);
  500. if (!intf) {
  501. return NULL;
  502. }
  503. #endif
  504. sock = malloc(sizeof(struct ethsock));
  505. if (!sock) {
  506. xperror("malloc");
  507. return NULL;
  508. }
  509. buf[0] = '\0';
  510. sock->intf = intf;
  511. promisc = true;
  512. do {
  513. sock->pcap = pcap_open_live(sock->intf, BUFSIZ, promisc, 1, buf);
  514. if (!sock->pcap) {
  515. if (!promisc) {
  516. fprintf(stderr, "Error: %s.\n", buf);
  517. goto cleanup;
  518. } else {
  519. fprintf(stderr, "Warning: failed to enable promiscous mode.\n");
  520. promisc = false;
  521. continue;
  522. }
  523. }
  524. } while (!sock->pcap);
  525. if (*buf) {
  526. fprintf(stderr, "Warning: %s.\n", buf);
  527. }
  528. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  529. fprintf(stderr, "%s is not an ethernet interface.\n",
  530. intf);
  531. goto cleanup;
  532. }
  533. #ifndef NMRPFLASH_WINDOWS
  534. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  535. #else
  536. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  537. #endif
  538. if (err) {
  539. fprintf(stderr, "Failed to get interface info.\n");
  540. goto cleanup;
  541. }
  542. #ifndef NMRPFLASH_WINDOWS
  543. sock->fd = pcap_get_selectable_fd(sock->pcap);
  544. if (sock->fd == -1) {
  545. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  546. goto cleanup;
  547. }
  548. #else
  549. sock->handle = pcap_getevent(sock->pcap);
  550. if (!sock->handle) {
  551. pcap_perror(sock->pcap, "pcap_getevent");
  552. goto cleanup;
  553. }
  554. err = pcap_setmintocopy(sock->pcap, 1);
  555. if (err) {
  556. pcap_perror(sock->pcap, "pcap_setmintocopy");
  557. goto cleanup;
  558. }
  559. #endif
  560. snprintf(buf, sizeof(buf), "ether proto 0x%04x and not ether src %s",
  561. protocol, mac_to_str(sock->hwaddr));
  562. err = pcap_compile(sock->pcap, &fp, buf, 0, 0);
  563. if (err) {
  564. pcap_perror(sock->pcap, "pcap_compile");
  565. goto cleanup;
  566. }
  567. err = pcap_setfilter(sock->pcap, &fp);
  568. pcap_freecode(&fp);
  569. if (err) {
  570. pcap_perror(sock->pcap, "pcap_setfilter");
  571. goto cleanup;
  572. }
  573. #ifdef NMRPFLASH_LINUX
  574. // nmrpflash does not work on bridge interfaces with STP enabled
  575. if ((sock->stp = intf_sys_read(intf, "bridge/stp_state", false))) {
  576. if (!intf_stp_enable(intf, false)) {
  577. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  578. }
  579. }
  580. err = system("nmcli -v > /dev/null");
  581. if (!err) {
  582. err = systemf("nmcli -f GENERAL.STATE device show %s | grep -q unmanaged", sock->intf);
  583. if (!err) {
  584. sock->nm_managed = false;
  585. } else {
  586. sock->nm_managed = true;
  587. err = systemf("nmcli device set ifname %s managed no", sock->intf);
  588. if (err) {
  589. printf("Warning: failed to temporarily disable NetworkManager\n");
  590. } else if (verbosity > 1) {
  591. printf("Temporarily disabling NetworkManager on interface.\n");
  592. }
  593. }
  594. } else {
  595. sock->nm_managed = false;
  596. }
  597. #else
  598. if (is_bridge) {
  599. fprintf(stderr, "Warning: bridge interfaces are not fully "
  600. "supported on this platform.\n");
  601. }
  602. #endif
  603. return sock;
  604. cleanup:
  605. ethsock_close(sock);
  606. return NULL;
  607. }
  608. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  609. {
  610. struct pcap_pkthdr* hdr;
  611. const u_char *capbuf;
  612. int status;
  613. #ifdef NMRPFLASH_WINDOWS
  614. DWORD ret;
  615. if (sock->timeout) {
  616. ret = WaitForSingleObject(sock->handle, sock->timeout);
  617. if (ret == WAIT_TIMEOUT) {
  618. return 0;
  619. } else if (ret != WAIT_OBJECT_0) {
  620. win_perror2("WaitForSingleObject", ret);
  621. return -1;
  622. }
  623. }
  624. #else
  625. if (sock->timeout) {
  626. status = select_fd(sock->fd, sock->timeout);
  627. if (status < 0) {
  628. return -1;
  629. } else if (status == 0) {
  630. return 0;
  631. }
  632. }
  633. #endif
  634. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  635. switch (status) {
  636. case 1:
  637. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  638. return hdr->caplen;
  639. case 0:
  640. return 0;
  641. case -1:
  642. pcap_perror(sock->pcap, "pcap_next_ex");
  643. return -1;
  644. default:
  645. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  646. return -1;
  647. }
  648. }
  649. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  650. {
  651. #ifdef NMRPFLASH_WINDOWS
  652. if (pcap_sendpacket(sock->pcap, buf, len) == 0) {
  653. return 0;
  654. } else {
  655. pcap_perror(sock->pcap, "pcap_sendpacket");
  656. return -1;
  657. }
  658. #else
  659. if (pcap_inject(sock->pcap, buf, len) == len) {
  660. return 0;
  661. } else {
  662. pcap_perror(sock->pcap, "pcap_inject");
  663. return -1;
  664. }
  665. #endif
  666. }
  667. int ethsock_close(struct ethsock *sock)
  668. {
  669. if (!sock) {
  670. return 0;
  671. }
  672. #ifdef NMRPFLASH_LINUX
  673. if (sock->stp) {
  674. intf_stp_enable(sock->intf, true);
  675. }
  676. if (sock->nm_managed) {
  677. systemf("nmcli device set ifname %s managed yes", sock->intf);
  678. }
  679. #endif
  680. if (sock->pcap) {
  681. pcap_close(sock->pcap);
  682. }
  683. free(sock);
  684. return 0;
  685. }
  686. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  687. {
  688. sock->timeout = msec;
  689. return 0;
  690. }
  691. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  692. {
  693. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  694. struct in_addr addr = { .s_addr = ipaddr };
  695. #elif defined(NMRPFLASH_WINDOWS)
  696. DWORD err;
  697. MIB_IPNETROW arp = {
  698. .dwIndex = sock->index,
  699. .dwPhysAddrLen = 6,
  700. .dwAddr = ipaddr,
  701. .dwType = MIB_IPNET_TYPE_STATIC
  702. };
  703. memcpy(arp.bPhysAddr, hwaddr, 6);
  704. #endif
  705. if (undo) {
  706. #if defined(NMRPFLASH_LINUX)
  707. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  708. return -1;
  709. }
  710. #elif defined(NMRPFLASH_WINDOWS)
  711. err = CreateIpNetEntry(&arp);
  712. if (err != NO_ERROR) {
  713. win_perror2("CreateIpNetEntry", err);
  714. return -1;
  715. }
  716. #else
  717. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  718. return -1;
  719. }
  720. #endif
  721. *undo = malloc(sizeof(struct ethsock_arp_undo));
  722. if (!*undo) {
  723. xperror("malloc");
  724. return -1;
  725. }
  726. (*undo)->ipaddr = ipaddr;
  727. memcpy((*undo)->hwaddr, hwaddr, 6);
  728. } else {
  729. #if defined(NMRPFLASH_LINUX)
  730. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  731. return -1;
  732. }
  733. #elif defined(NMRPFLASH_WINDOWS)
  734. return DeleteIpNetEntry(&arp) ? 0 : -1;
  735. #else
  736. return systemf("arp -d %s &> /dev/null", inet_ntoa(addr));
  737. #endif
  738. }
  739. return 0;
  740. }
  741. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  742. {
  743. // remove any previous ARP entry
  744. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  745. // add the new ARP entry
  746. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  747. }
  748. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  749. {
  750. if (!*undo) {
  751. return 0;
  752. }
  753. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  754. free(*undo);
  755. *undo = NULL;
  756. return ret;
  757. }
  758. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  759. {
  760. #ifndef NMRPFLASH_WINDOWS
  761. pcap_addr_t *addr;
  762. int i;
  763. for (addr = dev->addresses; addr; addr = addr->next) {
  764. if (verbosity > 1) {
  765. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  766. addr->addr->sa_family);
  767. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  768. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  769. }
  770. printf("}\n");
  771. }
  772. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  773. return true;
  774. }
  775. }
  776. #endif
  777. return intf_get_info(dev->name, hwaddr, NULL);
  778. }
  779. int ethsock_list_all(void)
  780. {
  781. pcap_if_t *devs, *dev;
  782. pcap_addr_t *addr;
  783. uint8_t hwaddr[6];
  784. unsigned dev_num = 0, dev_ok = 0;
  785. #ifdef NMRPFLASH_WINDOWS
  786. wchar_t *pretty = NULL;
  787. NET_IFINDEX index;
  788. MIB_IF_ROW2 row;
  789. #endif
  790. if (x_pcap_findalldevs(&devs) != 0) {
  791. return -1;
  792. }
  793. memset(hwaddr, 0, 6);
  794. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  795. if (dev->flags & PCAP_IF_LOOPBACK) {
  796. if (verbosity) {
  797. printf("%-15s (loopback device)\n", dev->name);
  798. }
  799. continue;
  800. }
  801. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  802. if (verbosity) {
  803. printf("%-15s (not an ethernet device)\n",
  804. dev->name);
  805. }
  806. continue;
  807. }
  808. #ifndef NMRPFLASH_WINDOWS
  809. printf("%-15s", dev->name);
  810. #else
  811. index = intf_get_index(dev->name);
  812. if (intf_get_if_row(index, &row)) {
  813. if (!row.InterfaceAndOperStatusFlags.HardwareInterface) {
  814. if (verbosity) {
  815. printf("%-15s (virtual interface)\n", dev->name);
  816. }
  817. continue;
  818. }
  819. if (row.Alias[0]) {
  820. pretty = row.Alias;
  821. }
  822. }
  823. if (!verbosity && index) {
  824. printf("net%-2lu", index);
  825. } else {
  826. printf("%-15s", dev->name);
  827. }
  828. #endif
  829. for (addr = dev->addresses; addr; addr = addr->next) {
  830. if (addr->addr->sa_family == AF_INET) {
  831. printf(" %-15s",
  832. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  833. break;
  834. }
  835. }
  836. if (!addr) {
  837. printf(" %-15s", "0.0.0.0");
  838. }
  839. printf(" %s", mac_to_str(hwaddr));
  840. #ifdef NMRPFLASH_WINDOWS
  841. if (pretty) {
  842. printf(" (%ls)", pretty);
  843. } else if (dev->description) {
  844. printf(" (%s)", dev->description);
  845. }
  846. #endif
  847. printf("\n");
  848. ++dev_ok;
  849. }
  850. if (!dev_ok) {
  851. printf("No suitable network interfaces found.\n");
  852. }
  853. return 0;
  854. }
  855. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  856. void *arg)
  857. {
  858. struct ethsock_ip_callback_args args;
  859. pcap_if_t *devs, *dev;
  860. pcap_addr_t *addr;
  861. int status = 0;
  862. if (x_pcap_findalldevs(&devs) != 0) {
  863. return -1;
  864. }
  865. args.arg = arg;
  866. for (dev = devs; dev; dev = dev->next) {
  867. if (strcmp(sock->intf, dev->name)) {
  868. continue;
  869. }
  870. for (addr = dev->addresses; addr; addr = addr->next) {
  871. if (addr->addr->sa_family == AF_INET) {
  872. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  873. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  874. status = callback(&args);
  875. if (status <= 0) {
  876. break;
  877. }
  878. }
  879. }
  880. break;
  881. }
  882. pcap_freealldevs(devs);
  883. return status <= 0 ? status : 0;
  884. }
  885. static inline void set_addr(void *p, uint32_t addr)
  886. {
  887. struct sockaddr_in* sin = p;
  888. sin->sin_family = AF_INET;
  889. sin->sin_addr.s_addr = addr;
  890. #ifdef NMRPFLASH_BSD
  891. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  892. #endif
  893. }
  894. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  895. static bool intf_up(int fd, const char *intf, bool up)
  896. {
  897. struct ifreq ifr;
  898. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  899. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  900. if (up) {
  901. xperror("ioctl(SIOCGIFFLAGS)");
  902. }
  903. return false;
  904. }
  905. if (!up) {
  906. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  907. } else {
  908. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  909. }
  910. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  911. if (up) {
  912. xperror("ioctl(SIOCSIFFLAGS)");
  913. }
  914. return false;
  915. }
  916. return true;
  917. }
  918. #endif
  919. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  920. {
  921. int ret, fd;
  922. if (add && undo) {
  923. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  924. xperror("malloc");
  925. return -1;
  926. }
  927. (*undo)->ip[0] = ipaddr;
  928. (*undo)->ip[1] = ipmask;
  929. }
  930. ret = -1;
  931. fd = socket(AF_INET, SOCK_DGRAM, 0);
  932. if (fd < 0) {
  933. sock_perror("socket");
  934. goto out;
  935. }
  936. #ifndef NMRPFLASH_WINDOWS
  937. #ifdef NMRPFLASH_LINUX
  938. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  939. goto out;
  940. }
  941. #else // NMRPFLASH_OSX (or any other BSD)
  942. struct ifaliasreq ifra;
  943. memset(&ifra, 0, sizeof(ifra));
  944. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  945. set_addr(&ifra.ifra_addr, ipaddr);
  946. set_addr(&ifra.ifra_mask, ipmask);
  947. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  948. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  949. if (add) {
  950. xperror("ioctl(SIOCAIFADDR");
  951. }
  952. goto out;
  953. }
  954. if (add) {
  955. (*undo)->ip[0] = ipaddr;
  956. (*undo)->ip[1] = ipmask;
  957. intf_up(fd, ifra.ifra_name, true);
  958. }
  959. #endif
  960. #else // NMRPFLASH_WINDOWS
  961. MIB_UNICASTIPADDRESS_ROW row;
  962. DWORD err;
  963. int i;
  964. memset(&row, 0, sizeof(row));
  965. row.InterfaceIndex = sock->index;
  966. set_addr(&row.Address.Ipv4, ipaddr);
  967. row.Address.si_family = AF_INET;
  968. if (add) {
  969. row.PrefixOrigin = IpPrefixOriginManual;
  970. row.SuffixOrigin = IpPrefixOriginManual;
  971. row.OnLinkPrefixLength = bitcount(ipmask);
  972. row.SkipAsSource = false;
  973. row.PreferredLifetime = 0xffffffff;
  974. row.ValidLifetime = 0xffffffff;
  975. }
  976. if (add) {
  977. err = CreateUnicastIpAddressEntry(&row);
  978. if (err != NO_ERROR && err != ERROR_OBJECT_ALREADY_EXISTS) {
  979. win_perror2("CreateUnicastIpAddressEntry", err);
  980. goto out;
  981. }
  982. if (err != ERROR_OBJECT_ALREADY_EXISTS) {
  983. /* Wait until the new IP has actually been added */
  984. for (i = 0; i < 20; ++i) {
  985. err = GetUnicastIpAddressEntry(&row);
  986. if (err != NO_ERROR) {
  987. win_perror2("GetUnicastIpAddressEntry", err);
  988. goto out;
  989. }
  990. if (row.DadState == IpDadStateTentative) {
  991. Sleep(500);
  992. } else {
  993. break;
  994. }
  995. }
  996. if (row.DadState == IpDadStateDeprecated) {
  997. fprintf(stderr, "Warning: IP address marked as deprecated.\n");
  998. } else if (row.DadState != IpDadStatePreferred) {
  999. fprintf(stderr, "Failed to add IP address (state=%d).\n", row.DadState);
  1000. goto out;
  1001. }
  1002. }
  1003. } else {
  1004. err = DeleteUnicastIpAddressEntry(&row);
  1005. if (err != NO_ERROR) {
  1006. win_perror2("DeleteUnicastIpAddressEntry", err);
  1007. goto out;
  1008. }
  1009. }
  1010. #endif
  1011. ret = 0;
  1012. out:
  1013. #ifndef NMRPFLASH_WINDOWS
  1014. close(fd);
  1015. #else
  1016. closesocket(fd);
  1017. #endif
  1018. if (ret != 0 && undo) {
  1019. free(*undo);
  1020. *undo = NULL;
  1021. }
  1022. return ret;
  1023. }
  1024. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  1025. {
  1026. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  1027. }
  1028. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  1029. {
  1030. if (!*undo) {
  1031. return 0;
  1032. }
  1033. int ret;
  1034. if ((*undo)->ip[0] != INADDR_NONE) {
  1035. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  1036. } else {
  1037. ret = 0;
  1038. }
  1039. free(*undo);
  1040. *undo = NULL;
  1041. return ret;
  1042. }