ethsock.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #define NMRPFLASH_NETALIAS_PREFIX "net"
  29. #define WPCAP
  30. #include <pcap.h>
  31. #else
  32. #include <sys/ioctl.h>
  33. #include <ifaddrs.h>
  34. #include <unistd.h>
  35. #include <net/if.h>
  36. #include <pcap.h>
  37. #if defined(NMRPFLASH_LINUX)
  38. #define NMRPFLASH_AF_PACKET AF_PACKET
  39. #include <linux/if_packet.h>
  40. #include <netlink/route/addr.h>
  41. #include <netlink/route/neighbour.h>
  42. #else
  43. #define NMRPFLASH_AF_PACKET AF_LINK
  44. #include <net/if_types.h>
  45. #include <net/if_media.h>
  46. #endif
  47. #endif
  48. struct ethsock
  49. {
  50. const char *intf;
  51. pcap_t *pcap;
  52. #ifndef NMRPFLASH_WINDOWS
  53. int fd;
  54. #ifdef NMRPFLASH_LINUX
  55. bool stp;
  56. #endif
  57. #else
  58. HANDLE handle;
  59. DWORD index;
  60. #endif
  61. unsigned timeout;
  62. uint8_t hwaddr[6];
  63. };
  64. struct ethsock_arp_undo
  65. {
  66. uint32_t ipaddr;
  67. uint8_t hwaddr[6];
  68. };
  69. struct ethsock_ip_undo
  70. {
  71. #ifndef NMRPFLASH_WINDOWS
  72. uint32_t ip[2];
  73. #else
  74. ULONG context;
  75. #endif
  76. };
  77. const char *mac_to_str(uint8_t *mac)
  78. {
  79. static char buf[18];
  80. snprintf(buf, sizeof(buf), "%02x:%02x:%02x:%02x:%02x:%02x",
  81. mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
  82. return buf;
  83. }
  84. static int x_pcap_findalldevs(pcap_if_t **devs)
  85. {
  86. char errbuf[PCAP_ERRBUF_SIZE];
  87. if (pcap_findalldevs(devs, errbuf) != 0) {
  88. fprintf(stderr, "%s.\n", errbuf);
  89. return -1;
  90. }
  91. return 0;
  92. }
  93. #ifndef NMRPFLASH_LINUX
  94. static int systemf(const char *fmt, ...)
  95. {
  96. char cmd[1024];
  97. int ret;
  98. va_list va;
  99. va_start(va, fmt);
  100. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  101. if (ret >= sizeof(cmd) - 1) {
  102. return -1;
  103. }
  104. ret = system(cmd);
  105. va_end(va);
  106. return ret;
  107. }
  108. #endif
  109. #ifndef NMRPFLASH_WINDOWS
  110. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  111. {
  112. void *src;
  113. if (sa->sa_family != NMRPFLASH_AF_PACKET) {
  114. return false;
  115. }
  116. #ifndef NMRPFLASH_LINUX
  117. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  118. return false;
  119. }
  120. src = LLADDR((struct sockaddr_dl*)sa);
  121. #else
  122. src = ((struct sockaddr_ll*)sa)->sll_addr;
  123. #endif
  124. memcpy(hwaddr, src, 6);
  125. return true;
  126. }
  127. #ifdef NMRPFLASH_LINUX
  128. static int bridge_stp_state(const char *intf)
  129. {
  130. char name[256];
  131. snprintf(name, sizeof(name), "/sys/class/net/%s/bridge/stp_state", intf);
  132. return open(name, O_RDWR, 0644);
  133. }
  134. static bool bridge_stp_enabled(const char *intf)
  135. {
  136. char c;
  137. int fd = bridge_stp_state(intf);
  138. if (fd == -1) {
  139. return false;
  140. }
  141. if (read(fd, &c, 1) != 1) {
  142. c = '0';
  143. }
  144. close(fd);
  145. return c == '1';
  146. }
  147. static bool bridge_stp(const char *intf, bool enabled)
  148. {
  149. bool ret;
  150. const char *s = enabled ? "1\n" : "0\n";
  151. int fd = bridge_stp_state(intf);
  152. if (fd == -1) {
  153. return false;
  154. }
  155. ret = (write(fd, s, 2) == 2);
  156. close(fd);
  157. return ret;
  158. }
  159. static struct nl_addr *build_ip(uint32_t ip)
  160. {
  161. struct nl_addr *na = nl_addr_build(AF_INET, &ip, 4);
  162. if (!na) {
  163. xperror("nl_addr_build");
  164. }
  165. return na;
  166. }
  167. static struct nl_sock *xnl_socket_route()
  168. {
  169. int err;
  170. struct nl_sock *sk = nl_socket_alloc();
  171. if (sk) {
  172. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  173. return sk;
  174. }
  175. nl_socket_free(sk);
  176. nl_perror(err, "nl_connect");
  177. } else {
  178. xperror("nl_socket_alloc");
  179. }
  180. return NULL;
  181. }
  182. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  183. {
  184. struct rtnl_addr *ra = NULL;
  185. struct nl_sock *sk = NULL;
  186. struct nl_addr *na = NULL;
  187. int err = 1;
  188. if (!(sk = xnl_socket_route())) {
  189. return false;
  190. }
  191. if (!(ra = rtnl_addr_alloc())) {
  192. xperror("rtnl_addr_alloc");
  193. goto out;
  194. }
  195. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  196. if (!(na = build_ip(ipaddr))) {
  197. goto out;
  198. }
  199. nl_addr_set_prefixlen(na, bitcount(ipmask));
  200. rtnl_addr_set_local(ra, na);
  201. nl_addr_put(na);
  202. if (!(na = build_ip((ipaddr & ipmask) | ~ipmask))) {
  203. goto out;
  204. }
  205. rtnl_addr_set_broadcast(ra, na);
  206. nl_addr_put(na);
  207. if ((err = add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0) {
  208. if (add && err == -NLE_EXIST) {
  209. err = 0;
  210. } else if (add || verbosity > 1) {
  211. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  212. }
  213. }
  214. out:
  215. rtnl_addr_put(ra);
  216. nl_socket_free(sk);
  217. return !err;
  218. }
  219. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  220. {
  221. #if 0
  222. struct arpreq arp;
  223. memset(&arp, 0, sizeof(arp));
  224. arp.arp_ha.sa_family = ARPHRD_ETHER;
  225. memcpy(&arp.arp_ha.sa_data, hwaddr, 6);
  226. arp.arp_flags = ATF_PERM | ATF_COM;
  227. struct sockaddr_in *in = (struct sockaddr_in*)&req.arp_pa;
  228. in->sin_addr.s_addr = htonl(ipaddr);
  229. in->sin_family = AF_INET;
  230. int fd = socket(AF_INET, SOCK_DGRAM, 0);
  231. if (fd < 0) {
  232. perror("socket");
  233. return false;
  234. }
  235. bool ret = true;
  236. if (ioctl(fd, add ? SIOCSARP : SIOCDARP, &req) < 0) {
  237. perror(add ? "ioctl(SIOCSARP)" : "ioctl(SIOCDARP");
  238. ret = false;
  239. }
  240. close(fd);
  241. return ret;
  242. #else
  243. struct nl_sock *sk;
  244. struct rtnl_neigh *neigh;
  245. struct nl_addr *mac, *ip;
  246. int err = 1;
  247. sk = NULL;
  248. neigh = NULL;
  249. mac = ip = NULL;
  250. if (!(sk = xnl_socket_route())) {
  251. goto out;
  252. }
  253. if (!(neigh = rtnl_neigh_alloc())) {
  254. xperror("rtnl_neigh_alloc");
  255. goto out;
  256. }
  257. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  258. xperror("nl_addr_build");
  259. goto out;
  260. }
  261. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  262. xperror("nl_addr_build");
  263. goto out;
  264. }
  265. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  266. rtnl_neigh_set_dst(neigh, ip);
  267. err = rtnl_neigh_delete(sk, neigh, 0);
  268. if (add) {
  269. rtnl_neigh_set_lladdr(neigh, mac);
  270. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  271. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  272. }
  273. if (err && (add || verbosity > 1)) {
  274. nl_perror(err, add ? "rtnl_neigh_add" : "rtnl_neigh_delete");
  275. }
  276. out:
  277. nl_addr_put(ip);
  278. nl_addr_put(mac);
  279. rtnl_neigh_put(neigh);
  280. nl_socket_free(sk);
  281. return !err;
  282. #endif
  283. }
  284. #endif
  285. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  286. {
  287. struct ifaddrs *ifas, *ifa;
  288. bool found;
  289. if (getifaddrs(&ifas) != 0) {
  290. xperror("getifaddrs");
  291. return false;
  292. }
  293. found = false;
  294. if (bridge) {
  295. *bridge = false;
  296. }
  297. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  298. if (!strcmp(ifa->ifa_name, intf)) {
  299. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  300. #ifdef NMRPFLASH_BSD
  301. if (bridge) {
  302. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  303. }
  304. #endif
  305. found = true;
  306. break;
  307. }
  308. }
  309. }
  310. freeifaddrs(ifas);
  311. return found;
  312. }
  313. #else
  314. void win_perror2(const char *msg, DWORD err)
  315. {
  316. char *buf = NULL;
  317. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  318. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  319. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  320. (LPTSTR)&buf, 0, NULL);
  321. if (buf) {
  322. /* FormatMessageA terminates buf with CRLF! */
  323. fprintf(stderr, "%s: %s", msg, buf);
  324. LocalFree(buf);
  325. } else {
  326. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  327. }
  328. }
  329. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  330. {
  331. PIP_ADAPTER_INFO adapters, adapter;
  332. DWORD ret;
  333. ULONG i, bufLen = 0;
  334. bool found = false;
  335. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  336. win_perror2("GetAdaptersInfo", ret);
  337. return false;
  338. }
  339. adapters = malloc(bufLen);
  340. if (!adapters) {
  341. xperror("malloc");
  342. return false;
  343. }
  344. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  345. for (adapter = adapters; adapter; adapter = adapter->Next) {
  346. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  347. continue;
  348. }
  349. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  350. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  351. if (strstr(intf, adapter->AdapterName)) {
  352. if (adapter->AddressLength == 6) {
  353. memcpy(hwaddr, adapter->Address, 6);
  354. if (index) {
  355. *index = adapter->Index;
  356. }
  357. found = true;
  358. break;
  359. }
  360. }
  361. }
  362. } else {
  363. win_perror2("GetAdaptersInfo", ret);
  364. }
  365. free(adapters);
  366. return found;
  367. }
  368. static const char *intf_alias_to_wpcap(const char *intf)
  369. {
  370. static char buf[128];
  371. pcap_if_t *devs, *dev;
  372. unsigned i = 0, dev_num = 0;
  373. if (intf[0] == '\\') {
  374. return intf;
  375. } else if (sscanf(intf, NMRPFLASH_NETALIAS_PREFIX "%u", &dev_num) != 1) {
  376. fprintf(stderr, "Invalid interface alias.\n");
  377. return NULL;
  378. }
  379. if (x_pcap_findalldevs(&devs) != 0) {
  380. return NULL;
  381. }
  382. for (dev = devs; dev; dev = dev->next, ++i) {
  383. if (i == dev_num) {
  384. if (verbosity) {
  385. printf("%s%u: %s\n", NMRPFLASH_NETALIAS_PREFIX, i, dev->name);
  386. }
  387. strncpy(buf, dev->name, sizeof(buf) - 1);
  388. buf[sizeof(buf) - 1] = '\0';
  389. break;
  390. }
  391. }
  392. pcap_freealldevs(devs);
  393. if (!dev) {
  394. fprintf(stderr, "Interface alias not found.\n");
  395. return NULL;
  396. }
  397. return buf;
  398. }
  399. static const char *intf_get_pretty_name(const char *intf)
  400. {
  401. static char buf[512];
  402. char *guid;
  403. HKEY hkey;
  404. LONG err;
  405. DWORD len;
  406. guid = strstr(intf, "NPF_{");
  407. if (!guid) {
  408. return NULL;
  409. }
  410. guid += 4;
  411. snprintf(buf, sizeof(buf),
  412. "System\\CurrentControlSet\\Control\\Network\\"
  413. "{4D36E972-E325-11CE-BFC1-08002BE10318}\\"
  414. "%s\\Connection", guid);
  415. err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, buf, 0, KEY_READ, &hkey);
  416. if (err != ERROR_SUCCESS) {
  417. if (verbosity > 1) {
  418. win_perror2("RegOpenKeyExA", err);
  419. }
  420. return NULL;
  421. }
  422. len = sizeof(buf);
  423. err = RegQueryValueExA(hkey, "Name", NULL, NULL, (LPBYTE)buf, &len);
  424. if (err == ERROR_SUCCESS) {
  425. intf = buf;
  426. } else {
  427. if (verbosity > 1) {
  428. win_perror2("RegQueryValueExA", err);
  429. }
  430. intf = NULL;
  431. }
  432. RegCloseKey(hkey);
  433. return intf;
  434. }
  435. #endif
  436. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  437. {
  438. return sock->hwaddr;
  439. }
  440. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  441. {
  442. char buf[PCAP_ERRBUF_SIZE];
  443. struct bpf_program fp;
  444. struct ethsock *sock;
  445. bool is_bridge;
  446. int err;
  447. #ifdef NMRPFLASH_WINDOWS
  448. intf = intf_alias_to_wpcap(intf);
  449. if (!intf) {
  450. return NULL;
  451. }
  452. #endif
  453. sock = malloc(sizeof(struct ethsock));
  454. if (!sock) {
  455. xperror("malloc");
  456. return NULL;
  457. }
  458. buf[0] = '\0';
  459. sock->intf = intf;
  460. sock->pcap = pcap_open_live(sock->intf, BUFSIZ, 1, 1, buf);
  461. if (!sock->pcap) {
  462. fprintf(stderr, "%s.\n", buf);
  463. goto cleanup;
  464. }
  465. if (*buf) {
  466. fprintf(stderr, "Warning: %s.\n", buf);
  467. }
  468. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  469. fprintf(stderr, "%s is not an ethernet interface.\n",
  470. intf);
  471. goto cleanup;
  472. }
  473. #ifndef NMRPFLASH_WINDOWS
  474. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  475. #else
  476. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  477. #endif
  478. if (err) {
  479. fprintf(stderr, "Failed to get interface info.\n");
  480. goto cleanup;
  481. }
  482. #ifndef NMRPFLASH_WINDOWS
  483. sock->fd = pcap_get_selectable_fd(sock->pcap);
  484. if (sock->fd == -1) {
  485. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  486. goto cleanup;
  487. }
  488. #else
  489. sock->handle = pcap_getevent(sock->pcap);
  490. if (!sock->handle) {
  491. pcap_perror(sock->pcap, "pcap_getevent");
  492. goto cleanup;
  493. }
  494. err = pcap_setmintocopy(sock->pcap, 1);
  495. if (err) {
  496. pcap_perror(sock->pcap, "pcap_setmintocopy");
  497. goto cleanup;
  498. }
  499. #endif
  500. snprintf(buf, sizeof(buf), "ether proto 0x%04x and not ether src %s",
  501. protocol, mac_to_str(sock->hwaddr));
  502. err = pcap_compile(sock->pcap, &fp, buf, 0, 0);
  503. if (err) {
  504. pcap_perror(sock->pcap, "pcap_compile");
  505. goto cleanup;
  506. }
  507. err = pcap_setfilter(sock->pcap, &fp);
  508. pcap_freecode(&fp);
  509. if (err) {
  510. pcap_perror(sock->pcap, "pcap_setfilter");
  511. goto cleanup;
  512. }
  513. #ifdef NMRPFLASH_LINUX
  514. // nmrpflash does not work on bridge interfaces with STP enabled
  515. if ((sock->stp = bridge_stp_enabled(intf))) {
  516. if (!bridge_stp(intf, false)) {
  517. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  518. }
  519. }
  520. #else
  521. if (is_bridge) {
  522. fprintf(stderr, "Warning: bridge interfaces are not fully "
  523. "supported on this platform.\n");
  524. }
  525. #endif
  526. return sock;
  527. cleanup:
  528. ethsock_close(sock);
  529. return NULL;
  530. }
  531. int select_fd(int fd, unsigned timeout)
  532. {
  533. struct timeval tv;
  534. int status;
  535. fd_set fds;
  536. FD_ZERO(&fds);
  537. FD_SET(fd, &fds);
  538. tv.tv_sec = timeout / 1000000;
  539. tv.tv_usec = timeout % 1000000;
  540. status = select(fd + 1, &fds, NULL, NULL, &tv);
  541. if (status < 0) {
  542. sock_perror("select");
  543. }
  544. return status;
  545. }
  546. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  547. {
  548. struct pcap_pkthdr* hdr;
  549. const u_char *capbuf;
  550. int status;
  551. #ifdef NMRPFLASH_WINDOWS
  552. DWORD ret;
  553. if (sock->timeout) {
  554. ret = WaitForSingleObject(sock->handle, sock->timeout);
  555. if (ret == WAIT_TIMEOUT) {
  556. return 0;
  557. } else if (ret != WAIT_OBJECT_0) {
  558. win_perror2("WaitForSingleObject", ret);
  559. return -1;
  560. }
  561. }
  562. #else
  563. if (sock->timeout) {
  564. status = select_fd(sock->fd, sock->timeout);
  565. if (status < 0) {
  566. return -1;
  567. } else if (status == 0) {
  568. return 0;
  569. }
  570. }
  571. #endif
  572. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  573. switch (status) {
  574. case 1:
  575. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  576. return hdr->caplen;
  577. case 0:
  578. return 0;
  579. case -1:
  580. pcap_perror(sock->pcap, "pcap_next_ex");
  581. return -1;
  582. default:
  583. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  584. return -1;
  585. }
  586. }
  587. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  588. {
  589. #ifdef NMRPFLASH_WINDOWS
  590. if (pcap_sendpacket(sock->pcap, buf, len) == 0) {
  591. return 0;
  592. } else {
  593. pcap_perror(sock->pcap, "pcap_sendpacket");
  594. return -1;
  595. }
  596. #else
  597. if (pcap_inject(sock->pcap, buf, len) == len) {
  598. return 0;
  599. } else {
  600. pcap_perror(sock->pcap, "pcap_inject");
  601. return -1;
  602. }
  603. #endif
  604. }
  605. int ethsock_close(struct ethsock *sock)
  606. {
  607. if (!sock) {
  608. return 0;
  609. }
  610. #ifdef NMRPFLASH_LINUX
  611. if (sock->stp) {
  612. bridge_stp(sock->intf, true);
  613. }
  614. #endif
  615. if (sock->pcap) {
  616. pcap_close(sock->pcap);
  617. }
  618. free(sock);
  619. return 0;
  620. }
  621. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  622. {
  623. sock->timeout = msec;
  624. return 0;
  625. }
  626. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  627. {
  628. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  629. struct in_addr addr = { .s_addr = ipaddr };
  630. #elif defined(NMRPFLASH_WINDOWS)
  631. DWORD err;
  632. MIB_IPNETROW arp = {
  633. .dwIndex = sock->index,
  634. .dwPhysAddrLen = 6,
  635. .dwAddr = ipaddr,
  636. .dwType = MIB_IPNET_TYPE_STATIC
  637. };
  638. memcpy(arp.bPhysAddr, hwaddr, 6);
  639. #endif
  640. if (undo) {
  641. #if defined(NMRPFLASH_LINUX)
  642. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  643. return -1;
  644. }
  645. #elif defined(NMRPFLASH_WINDOWS)
  646. err = CreateIpNetEntry(&arp);
  647. if (err != NO_ERROR) {
  648. win_perror2("CreateIpNetEntry", err);
  649. return -1;
  650. }
  651. #else
  652. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  653. return -1;
  654. }
  655. #endif
  656. *undo = malloc(sizeof(struct ethsock_arp_undo));
  657. if (!*undo) {
  658. xperror("malloc");
  659. return -1;
  660. }
  661. (*undo)->ipaddr = ipaddr;
  662. memcpy((*undo)->hwaddr, hwaddr, 6);
  663. } else {
  664. #if defined(NMRPFLASH_LINUX)
  665. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  666. return -1;
  667. }
  668. #elif defined(NMRPFLASH_WINDOWS)
  669. return DeleteIpNetEntry(&arp) ? 0 : -1;
  670. #else
  671. return systemf("arp -d %s", inet_ntoa(addr));
  672. #endif
  673. }
  674. return 0;
  675. }
  676. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  677. {
  678. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  679. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  680. }
  681. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  682. {
  683. if (!*undo) {
  684. return 0;
  685. }
  686. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  687. free(*undo);
  688. *undo = NULL;
  689. return ret;
  690. }
  691. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  692. {
  693. #ifndef NMRPFLASH_WINDOWS
  694. pcap_addr_t *addr;
  695. int i;
  696. for (addr = dev->addresses; addr; addr = addr->next) {
  697. if (verbosity > 1) {
  698. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  699. addr->addr->sa_family);
  700. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  701. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  702. }
  703. printf("}\n");
  704. }
  705. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  706. return true;
  707. }
  708. }
  709. #endif
  710. return intf_get_info(dev->name, hwaddr, NULL);
  711. }
  712. int ethsock_list_all(void)
  713. {
  714. pcap_if_t *devs, *dev;
  715. pcap_addr_t *addr;
  716. uint8_t hwaddr[6];
  717. unsigned dev_num = 0, dev_ok = 0;
  718. #ifdef NMRPFLASH_WINDOWS
  719. const char *pretty;
  720. #endif
  721. if (x_pcap_findalldevs(&devs) != 0) {
  722. return -1;
  723. }
  724. memset(hwaddr, 0, 6);
  725. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  726. if (dev->flags & PCAP_IF_LOOPBACK) {
  727. if (verbosity) {
  728. printf("%-15s (loopback device)\n", dev->name);
  729. }
  730. continue;
  731. }
  732. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  733. if (verbosity) {
  734. printf("%-15s (not an ethernet device)\n",
  735. dev->name);
  736. }
  737. continue;
  738. }
  739. #ifndef NMRPFLASH_WINDOWS
  740. printf("%-15s", dev->name);
  741. #else
  742. /* Call this here so *_perror() calls don't happen within a line */
  743. pretty = intf_get_pretty_name(dev->name);
  744. if (!verbosity) {
  745. printf("%s%-2u", NMRPFLASH_NETALIAS_PREFIX, dev_num);
  746. } else {
  747. printf("%s", dev->name);
  748. }
  749. #endif
  750. for (addr = dev->addresses; addr; addr = addr->next) {
  751. if (addr->addr->sa_family == AF_INET) {
  752. printf(" %-15s",
  753. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  754. break;
  755. }
  756. }
  757. if (!addr) {
  758. printf(" %-15s", "0.0.0.0");
  759. }
  760. printf(" %s", mac_to_str(hwaddr));
  761. #ifdef NMRPFLASH_WINDOWS
  762. if (pretty) {
  763. printf(" (%s)", pretty);
  764. } else if (dev->description) {
  765. printf(" (%s)", dev->description);
  766. }
  767. #endif
  768. printf("\n");
  769. ++dev_ok;
  770. }
  771. if (!dev_ok) {
  772. printf("No suitable network interfaces found.\n");
  773. }
  774. return 0;
  775. }
  776. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  777. void *arg)
  778. {
  779. struct ethsock_ip_callback_args args;
  780. pcap_if_t *devs, *dev;
  781. pcap_addr_t *addr;
  782. int status = 0;
  783. if (x_pcap_findalldevs(&devs) != 0) {
  784. return -1;
  785. }
  786. args.arg = arg;
  787. for (dev = devs; dev; dev = dev->next) {
  788. if (strcmp(sock->intf, dev->name)) {
  789. continue;
  790. }
  791. for (addr = dev->addresses; addr; addr = addr->next) {
  792. if (addr->addr->sa_family == AF_INET) {
  793. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  794. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  795. status = callback(&args);
  796. if (status <= 0) {
  797. break;
  798. }
  799. }
  800. }
  801. break;
  802. }
  803. pcap_freealldevs(devs);
  804. return status <= 0 ? status : 0;
  805. }
  806. static inline void set_addr(void *p, uint32_t addr)
  807. {
  808. struct sockaddr_in* sin = p;
  809. sin->sin_family = AF_INET;
  810. sin->sin_addr.s_addr = addr;
  811. #ifdef NMRPFLASH_BSD
  812. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  813. #endif
  814. }
  815. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  816. static bool intf_up(int fd, const char *intf, bool up)
  817. {
  818. struct ifreq ifr;
  819. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  820. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  821. if (up) {
  822. xperror("ioctl(SIOCGIFFLAGS)");
  823. }
  824. return false;
  825. }
  826. if (!up) {
  827. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  828. } else {
  829. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  830. }
  831. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  832. if (up) {
  833. xperror("ioctl(SIOCSIFFLAGS)");
  834. }
  835. return false;
  836. }
  837. return true;
  838. }
  839. #endif
  840. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  841. {
  842. int ret, fd;
  843. if (add && undo) {
  844. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  845. xperror("malloc");
  846. return -1;
  847. }
  848. memset(*undo, 0, sizeof(**undo));
  849. }
  850. ret = -1;
  851. fd = socket(AF_INET, SOCK_DGRAM, 0);
  852. if (fd < 0) {
  853. sock_perror("socket");
  854. goto out;
  855. }
  856. #ifndef NMRPFLASH_WINDOWS
  857. #ifdef NMRPFLASH_LINUX
  858. if (add) {
  859. (*undo)->ip[0] = ipaddr;
  860. (*undo)->ip[1] = ipmask;
  861. }
  862. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  863. goto out;
  864. }
  865. #else // NMRPFLASH_OSX (or any other BSD)
  866. struct ifaliasreq ifra;
  867. memset(&ifra, 0, sizeof(ifra));
  868. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  869. set_addr(&ifra.ifra_addr, ipaddr);
  870. set_addr(&ifra.ifra_mask, ipmask);
  871. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  872. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  873. if (add) {
  874. xperror("ioctl(SIOCAIFADDR");
  875. }
  876. goto out;
  877. }
  878. if (add) {
  879. (*undo)->ip[0] = ipaddr;
  880. (*undo)->ip[1] = ipmask;
  881. intf_up(fd, ifra.ifra_name, true);
  882. }
  883. #endif
  884. #else // NMRPFLASH_WINDOWS
  885. struct sockaddr_in sin;
  886. ULONG instance;
  887. (*undo)->context = 0;
  888. DWORD err = AddIPAddress(ipaddr, ipmask, sock->index, &(*undo)->context, &instance);
  889. if (err != NO_ERROR && err != ERROR_DUP_DOMAINNAME && err != ERROR_OBJECT_ALREADY_EXISTS) {
  890. win_perror2("AddIPAddress", err);
  891. goto out;
  892. }
  893. set_addr(&sin, ipaddr);
  894. time_t beg = time_monotonic();
  895. /* Wait until the new IP has actually been added */
  896. while (bind(fd, (struct sockaddr*)&sin, sizeof(sin)) != 0) {
  897. if ((time_monotonic() - beg) >= 5) {
  898. fprintf(stderr, "Failed to bind after 5 seconds: ");
  899. sock_perror("bind");
  900. DeleteIPAddress((*undo)->context);
  901. goto out;
  902. }
  903. }
  904. #endif
  905. ret = 0;
  906. out:
  907. #ifndef NMRPFLASH_WINDOWS
  908. close(fd);
  909. #else
  910. closesocket(fd);
  911. #endif
  912. if (ret != 0 && undo) {
  913. free(*undo);
  914. *undo = NULL;
  915. }
  916. return ret;
  917. }
  918. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  919. {
  920. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  921. }
  922. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  923. {
  924. if (!*undo) {
  925. return 0;
  926. }
  927. int ret;
  928. #ifndef NMRPFLASH_WINDOWS
  929. if ((*undo)->ip[0] != INADDR_NONE) {
  930. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  931. } else {
  932. ret = 0;
  933. }
  934. #else
  935. ret = DeleteIPAddress((*undo)->context) ? 0 : -1;
  936. #endif
  937. free(*undo);
  938. *undo = NULL;
  939. return ret;
  940. }