ethsock.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #define NMRPFLASH_NETALIAS_PREFIX "net"
  29. #define WPCAP
  30. #include <pcap.h>
  31. #else
  32. #include <sys/ioctl.h>
  33. #include <ifaddrs.h>
  34. #include <unistd.h>
  35. #include <net/if.h>
  36. #include <pcap.h>
  37. #if defined(NMRPFLASH_LINUX)
  38. #define NMRPFLASH_AF_PACKET AF_PACKET
  39. #include <linux/if_packet.h>
  40. #include <netlink/route/addr.h>
  41. #include <netlink/route/neighbour.h>
  42. #else
  43. #define NMRPFLASH_AF_PACKET AF_LINK
  44. #include <net/if_types.h>
  45. #include <net/if_media.h>
  46. #endif
  47. #endif
  48. struct ethsock
  49. {
  50. const char *intf;
  51. pcap_t *pcap;
  52. #ifndef NMRPFLASH_WINDOWS
  53. int fd;
  54. #ifdef NMRPFLASH_LINUX
  55. bool stp;
  56. #endif
  57. #else
  58. HANDLE handle;
  59. DWORD index;
  60. #endif
  61. unsigned timeout;
  62. uint8_t hwaddr[6];
  63. };
  64. struct ethsock_arp_undo
  65. {
  66. uint32_t ipaddr;
  67. uint8_t hwaddr[6];
  68. };
  69. struct ethsock_ip_undo
  70. {
  71. #ifndef NMRPFLASH_WINDOWS
  72. uint32_t ip[2];
  73. #else
  74. ULONG context;
  75. #endif
  76. };
  77. const char *mac_to_str(uint8_t *mac)
  78. {
  79. static char buf[18];
  80. snprintf(buf, sizeof(buf), "%02x:%02x:%02x:%02x:%02x:%02x",
  81. mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
  82. return buf;
  83. }
  84. static int x_pcap_findalldevs(pcap_if_t **devs)
  85. {
  86. char errbuf[PCAP_ERRBUF_SIZE];
  87. if (pcap_findalldevs(devs, errbuf) != 0) {
  88. fprintf(stderr, "%s.\n", errbuf);
  89. return -1;
  90. }
  91. return 0;
  92. }
  93. static int systemf(const char *fmt, ...)
  94. {
  95. char cmd[1024];
  96. int ret;
  97. va_list va;
  98. va_start(va, fmt);
  99. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  100. if (ret >= sizeof(cmd) - 1) {
  101. return -1;
  102. }
  103. ret = system(cmd);
  104. va_end(va);
  105. return ret;
  106. }
  107. #ifndef NMRPFLASH_WINDOWS
  108. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  109. {
  110. void *src;
  111. if (sa->sa_family != NMRPFLASH_AF_PACKET) {
  112. return false;
  113. }
  114. #ifndef NMRPFLASH_LINUX
  115. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  116. return false;
  117. }
  118. src = LLADDR((struct sockaddr_dl*)sa);
  119. #else
  120. src = ((struct sockaddr_ll*)sa)->sll_addr;
  121. #endif
  122. memcpy(hwaddr, src, 6);
  123. return true;
  124. }
  125. #ifdef NMRPFLASH_LINUX
  126. static int bridge_stp_state(const char *intf)
  127. {
  128. char name[256];
  129. snprintf(name, sizeof(name), "/sys/class/net/%s/bridge/stp_state", intf);
  130. return open(name, O_RDWR, 0644);
  131. }
  132. static bool bridge_stp_enabled(const char *intf)
  133. {
  134. char c;
  135. int fd = bridge_stp_state(intf);
  136. if (fd == -1) {
  137. return false;
  138. }
  139. if (read(fd, &c, 1) != 1) {
  140. c = '0';
  141. }
  142. close(fd);
  143. return c == '1';
  144. }
  145. static bool bridge_stp(const char *intf, bool enabled)
  146. {
  147. bool ret;
  148. const char *s = enabled ? "1\n" : "0\n";
  149. int fd = bridge_stp_state(intf);
  150. if (fd == -1) {
  151. return false;
  152. }
  153. ret = (write(fd, s, 2) == 2);
  154. close(fd);
  155. return ret;
  156. }
  157. static bool xrtnl_addr_set(struct rtnl_addr *ra, uint32_t addr, int (*cb)(struct rtnl_addr*, struct nl_addr*))
  158. {
  159. int err;
  160. struct nl_addr *na = nl_addr_build(AF_INET, &addr, 4);
  161. if (!na) {
  162. xperror("nl_addr_build");
  163. return false;
  164. }
  165. if ((err = cb(ra, na)) != 0 && verbosity) {
  166. nl_perror(err, __func__);
  167. }
  168. nl_addr_put(na);
  169. return true;
  170. }
  171. static struct nl_sock *xnl_socket_route()
  172. {
  173. int err;
  174. struct nl_sock *sk = nl_socket_alloc();
  175. if (sk) {
  176. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  177. return sk;
  178. }
  179. nl_socket_free(sk);
  180. nl_perror(err, "nl_connect");
  181. } else {
  182. xperror("nl_socket_alloc");
  183. }
  184. return NULL;
  185. }
  186. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  187. {
  188. struct rtnl_addr *ra = NULL;
  189. struct nl_sock *sk = NULL;
  190. int err = 1;
  191. if (!(sk = xnl_socket_route())) {
  192. return false;
  193. }
  194. if (!(ra = rtnl_addr_alloc())) {
  195. xperror("rtnl_addr_alloc");
  196. goto out;
  197. }
  198. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  199. rtnl_addr_set_prefixlen(ra, bitcount(ipmask));
  200. if (!xrtnl_addr_set(ra, (ipaddr & ipmask) | ~ipmask, &rtnl_addr_set_broadcast)
  201. || !xrtnl_addr_set(ra, ipaddr, &rtnl_addr_set_local)) {
  202. goto out;
  203. }
  204. if ((err = add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0) {
  205. if (add && err == -NLE_EXIST) {
  206. err = 0;
  207. } else if (add || verbosity > 1) {
  208. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  209. }
  210. }
  211. out:
  212. rtnl_addr_put(ra);
  213. nl_socket_free(sk);
  214. return !err;
  215. }
  216. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  217. {
  218. struct nl_sock *sk;
  219. struct rtnl_neigh *neigh;
  220. struct nl_addr *mac, *ip;
  221. int err = 1;
  222. sk = NULL;
  223. neigh = NULL;
  224. mac = ip = NULL;
  225. if (!(sk = xnl_socket_route())) {
  226. goto out;
  227. }
  228. if (!(neigh = rtnl_neigh_alloc())) {
  229. xperror("rtnl_neigh_alloc");
  230. goto out;
  231. }
  232. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  233. xperror("nl_addr_build");
  234. goto out;
  235. }
  236. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  237. xperror("nl_addr_build");
  238. goto out;
  239. }
  240. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  241. rtnl_neigh_set_dst(neigh, ip);
  242. err = rtnl_neigh_delete(sk, neigh, 0);
  243. if (add) {
  244. rtnl_neigh_set_lladdr(neigh, mac);
  245. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  246. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  247. }
  248. if (err && (add || verbosity > 1)) {
  249. nl_perror(err, add ? "rtnl_neigh_add" : "rtnl_neigh_delete");
  250. }
  251. out:
  252. nl_addr_put(ip);
  253. nl_addr_put(mac);
  254. rtnl_neigh_put(neigh);
  255. nl_socket_free(sk);
  256. return !err;
  257. }
  258. #endif
  259. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  260. {
  261. struct ifaddrs *ifas, *ifa;
  262. bool found;
  263. if (getifaddrs(&ifas) != 0) {
  264. xperror("getifaddrs");
  265. return false;
  266. }
  267. found = false;
  268. if (bridge) {
  269. *bridge = false;
  270. }
  271. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  272. if (!strcmp(ifa->ifa_name, intf)) {
  273. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  274. #ifdef NMRPFLASH_BSD
  275. if (bridge) {
  276. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  277. }
  278. #endif
  279. found = true;
  280. break;
  281. }
  282. }
  283. }
  284. freeifaddrs(ifas);
  285. return found;
  286. }
  287. #else
  288. void win_perror2(const char *msg, DWORD err)
  289. {
  290. char *buf = NULL;
  291. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  292. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  293. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  294. (LPTSTR)&buf, 0, NULL);
  295. if (buf) {
  296. /* FormatMessageA terminates buf with CRLF! */
  297. fprintf(stderr, "%s: %s", msg, buf);
  298. LocalFree(buf);
  299. } else {
  300. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  301. }
  302. }
  303. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  304. {
  305. PIP_ADAPTER_INFO adapters, adapter;
  306. DWORD ret;
  307. ULONG i, bufLen = 0;
  308. bool found = false;
  309. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  310. win_perror2("GetAdaptersInfo", ret);
  311. return false;
  312. }
  313. adapters = malloc(bufLen);
  314. if (!adapters) {
  315. xperror("malloc");
  316. return false;
  317. }
  318. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  319. for (adapter = adapters; adapter; adapter = adapter->Next) {
  320. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  321. continue;
  322. }
  323. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  324. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  325. if (strstr(intf, adapter->AdapterName)) {
  326. if (adapter->AddressLength == 6) {
  327. memcpy(hwaddr, adapter->Address, 6);
  328. if (index) {
  329. *index = adapter->Index;
  330. }
  331. found = true;
  332. break;
  333. }
  334. }
  335. }
  336. } else {
  337. win_perror2("GetAdaptersInfo", ret);
  338. }
  339. free(adapters);
  340. return found;
  341. }
  342. static const char *intf_alias_to_wpcap(const char *intf)
  343. {
  344. static char buf[128];
  345. pcap_if_t *devs, *dev;
  346. unsigned i = 0, dev_num = 0;
  347. if (intf[0] == '\\') {
  348. return intf;
  349. } else if (sscanf(intf, NMRPFLASH_NETALIAS_PREFIX "%u", &dev_num) != 1) {
  350. fprintf(stderr, "Invalid interface alias.\n");
  351. return NULL;
  352. }
  353. if (x_pcap_findalldevs(&devs) != 0) {
  354. return NULL;
  355. }
  356. for (dev = devs; dev; dev = dev->next, ++i) {
  357. if (i == dev_num) {
  358. if (verbosity) {
  359. printf("%s%u: %s\n", NMRPFLASH_NETALIAS_PREFIX, i, dev->name);
  360. }
  361. strncpy(buf, dev->name, sizeof(buf) - 1);
  362. buf[sizeof(buf) - 1] = '\0';
  363. break;
  364. }
  365. }
  366. pcap_freealldevs(devs);
  367. if (!dev) {
  368. fprintf(stderr, "Interface alias not found.\n");
  369. return NULL;
  370. }
  371. return buf;
  372. }
  373. static const char *intf_get_pretty_name(const char *intf)
  374. {
  375. static char buf[512];
  376. char *guid;
  377. HKEY hkey;
  378. LONG err;
  379. DWORD len;
  380. guid = strstr(intf, "NPF_{");
  381. if (!guid) {
  382. return NULL;
  383. }
  384. guid += 4;
  385. snprintf(buf, sizeof(buf),
  386. "System\\CurrentControlSet\\Control\\Network\\"
  387. "{4D36E972-E325-11CE-BFC1-08002BE10318}\\"
  388. "%s\\Connection", guid);
  389. err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, buf, 0, KEY_READ, &hkey);
  390. if (err != ERROR_SUCCESS) {
  391. if (verbosity > 1) {
  392. win_perror2("RegOpenKeyExA", err);
  393. }
  394. return NULL;
  395. }
  396. len = sizeof(buf);
  397. err = RegQueryValueExA(hkey, "Name", NULL, NULL, (LPBYTE)buf, &len);
  398. if (err == ERROR_SUCCESS) {
  399. intf = buf;
  400. } else {
  401. if (verbosity > 1) {
  402. win_perror2("RegQueryValueExA", err);
  403. }
  404. intf = NULL;
  405. }
  406. RegCloseKey(hkey);
  407. return intf;
  408. }
  409. #endif
  410. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  411. {
  412. return sock->hwaddr;
  413. }
  414. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  415. {
  416. char buf[PCAP_ERRBUF_SIZE];
  417. struct bpf_program bpf;
  418. struct ethsock *sock;
  419. bool is_bridge;
  420. int err;
  421. #ifdef NMRPFLASH_WINDOWS
  422. intf = intf_alias_to_wpcap(intf);
  423. if (!intf) {
  424. return NULL;
  425. }
  426. #endif
  427. sock = malloc(sizeof(struct ethsock));
  428. if (!sock) {
  429. xperror("malloc");
  430. return NULL;
  431. }
  432. buf[0] = '\0';
  433. sock->intf = intf;
  434. sock->pcap = pcap_open_live(sock->intf, BUFSIZ, 1, 1, buf);
  435. if (!sock->pcap) {
  436. fprintf(stderr, "%s.\n", buf);
  437. goto cleanup;
  438. }
  439. if (*buf) {
  440. fprintf(stderr, "Warning: %s.\n", buf);
  441. }
  442. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  443. fprintf(stderr, "%s is not an ethernet interface.\n",
  444. intf);
  445. goto cleanup;
  446. }
  447. #ifndef NMRPFLASH_WINDOWS
  448. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  449. #else
  450. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  451. #endif
  452. if (err) {
  453. fprintf(stderr, "Failed to get interface info.\n");
  454. goto cleanup;
  455. }
  456. #ifndef NMRPFLASH_WINDOWS
  457. sock->fd = pcap_get_selectable_fd(sock->pcap);
  458. if (sock->fd == -1) {
  459. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  460. goto cleanup;
  461. }
  462. #else
  463. sock->handle = pcap_getevent(sock->pcap);
  464. if (!sock->handle) {
  465. pcap_perror(sock->pcap, "pcap_getevent");
  466. goto cleanup;
  467. }
  468. err = pcap_setmintocopy(sock->pcap, 1);
  469. if (err) {
  470. pcap_perror(sock->pcap, "pcap_setmintocopy");
  471. goto cleanup;
  472. }
  473. #endif
  474. err = pcap_setdirection(sock->pcap, PCAP_D_IN);
  475. if (err) {
  476. pcap_perror(sock->pcap, "pcap_setdirection");
  477. goto cleanup;
  478. }
  479. snprintf(buf, sizeof(buf), "ether proto 0x%04x", protocol);
  480. err = pcap_compile(sock->pcap, &bpf, buf, 0, 0);
  481. if (err) {
  482. pcap_perror(sock->pcap, "pcap_compile");
  483. goto cleanup;
  484. }
  485. err = pcap_setfilter(sock->pcap, &bpf);
  486. pcap_freecode(&bpf);
  487. if (err) {
  488. pcap_perror(sock->pcap, "pcap_setfilter");
  489. goto cleanup;
  490. }
  491. #ifdef NMRPFLASH_LINUX
  492. // nmrpflash does not work on bridge interfaces with STP enabled
  493. if ((sock->stp = bridge_stp_enabled(intf))) {
  494. if (!bridge_stp(intf, false)) {
  495. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  496. }
  497. }
  498. #else
  499. if (is_bridge) {
  500. fprintf(stderr, "Warning: bridge interfaces are not fully "
  501. "supported on this platform.\n");
  502. }
  503. #endif
  504. return sock;
  505. cleanup:
  506. ethsock_close(sock);
  507. return NULL;
  508. }
  509. int select_fd(int fd, unsigned timeout)
  510. {
  511. struct timeval tv;
  512. int status;
  513. fd_set fds;
  514. FD_ZERO(&fds);
  515. FD_SET(fd, &fds);
  516. tv.tv_sec = timeout / 1000;
  517. tv.tv_usec = 1000 * (timeout % 1000);
  518. status = select(fd + 1, &fds, NULL, NULL, &tv);
  519. if (status < 0) {
  520. sock_perror("select");
  521. }
  522. return status;
  523. }
  524. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  525. {
  526. struct pcap_pkthdr* hdr;
  527. const u_char *capbuf;
  528. int status;
  529. #ifdef NMRPFLASH_WINDOWS
  530. DWORD ret;
  531. if (sock->timeout) {
  532. ret = WaitForSingleObject(sock->handle, sock->timeout);
  533. if (ret == WAIT_TIMEOUT) {
  534. return 0;
  535. } else if (ret != WAIT_OBJECT_0) {
  536. win_perror2("WaitForSingleObject", ret);
  537. return -1;
  538. }
  539. }
  540. #else
  541. if (sock->timeout) {
  542. status = select_fd(sock->fd, sock->timeout);
  543. if (status < 0) {
  544. return -1;
  545. } else if (status == 0) {
  546. return 0;
  547. }
  548. }
  549. #endif
  550. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  551. switch (status) {
  552. case 1:
  553. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  554. return hdr->caplen;
  555. case 0:
  556. return 0;
  557. case -1:
  558. pcap_perror(sock->pcap, "pcap_next_ex");
  559. return -1;
  560. default:
  561. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  562. return -1;
  563. }
  564. }
  565. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  566. {
  567. #ifdef NMRPFLASH_WINDOWS
  568. if (pcap_sendpacket(sock->pcap, buf, len) == 0) {
  569. return 0;
  570. } else {
  571. pcap_perror(sock->pcap, "pcap_sendpacket");
  572. return -1;
  573. }
  574. #else
  575. if (pcap_inject(sock->pcap, buf, len) == len) {
  576. return 0;
  577. } else {
  578. pcap_perror(sock->pcap, "pcap_inject");
  579. return -1;
  580. }
  581. #endif
  582. }
  583. int ethsock_close(struct ethsock *sock)
  584. {
  585. if (!sock) {
  586. return 0;
  587. }
  588. #ifdef NMRPFLASH_LINUX
  589. if (sock->stp) {
  590. bridge_stp(sock->intf, true);
  591. }
  592. #endif
  593. if (sock->pcap) {
  594. pcap_close(sock->pcap);
  595. }
  596. free(sock);
  597. return 0;
  598. }
  599. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  600. {
  601. sock->timeout = msec;
  602. return 0;
  603. }
  604. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  605. {
  606. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  607. struct in_addr addr = { .s_addr = ipaddr };
  608. #elif defined(NMRPFLASH_WINDOWS)
  609. DWORD err;
  610. MIB_IPNETROW arp = {
  611. .dwIndex = sock->index,
  612. .dwPhysAddrLen = 6,
  613. .dwAddr = ipaddr,
  614. .dwType = MIB_IPNET_TYPE_STATIC
  615. };
  616. memcpy(arp.bPhysAddr, hwaddr, 6);
  617. #endif
  618. if (undo) {
  619. #if defined(NMRPFLASH_LINUX)
  620. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  621. return -1;
  622. }
  623. #elif defined(NMRPFLASH_WINDOWS)
  624. err = CreateIpNetEntry(&arp);
  625. if (err != NO_ERROR) {
  626. win_perror2("CreateIpNetEntry", err);
  627. return -1;
  628. }
  629. #else
  630. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  631. return -1;
  632. }
  633. #endif
  634. *undo = malloc(sizeof(struct ethsock_arp_undo));
  635. if (!*undo) {
  636. xperror("malloc");
  637. return -1;
  638. }
  639. (*undo)->ipaddr = ipaddr;
  640. memcpy((*undo)->hwaddr, hwaddr, 6);
  641. } else {
  642. #if defined(NMRPFLASH_LINUX)
  643. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  644. return -1;
  645. }
  646. #elif defined(NMRPFLASH_WINDOWS)
  647. return DeleteIpNetEntry(&arp) ? 0 : -1;
  648. #else
  649. return systemf("arp -d %s", inet_ntoa(addr));
  650. #endif
  651. }
  652. return 0;
  653. }
  654. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  655. {
  656. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  657. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  658. }
  659. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  660. {
  661. if (!*undo) {
  662. return 0;
  663. }
  664. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  665. free(*undo);
  666. *undo = NULL;
  667. return ret;
  668. }
  669. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  670. {
  671. #ifndef NMRPFLASH_WINDOWS
  672. pcap_addr_t *addr;
  673. int i;
  674. for (addr = dev->addresses; addr; addr = addr->next) {
  675. if (verbosity > 1) {
  676. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  677. addr->addr->sa_family);
  678. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  679. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  680. }
  681. printf("}\n");
  682. }
  683. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  684. return true;
  685. }
  686. }
  687. #endif
  688. return intf_get_info(dev->name, hwaddr, NULL);
  689. }
  690. int ethsock_list_all(void)
  691. {
  692. pcap_if_t *devs, *dev;
  693. pcap_addr_t *addr;
  694. uint8_t hwaddr[6];
  695. unsigned dev_num = 0, dev_ok = 0;
  696. #ifdef NMRPFLASH_WINDOWS
  697. const char *pretty;
  698. #endif
  699. if (x_pcap_findalldevs(&devs) != 0) {
  700. return -1;
  701. }
  702. memset(hwaddr, 0, 6);
  703. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  704. if (dev->flags & PCAP_IF_LOOPBACK) {
  705. if (verbosity) {
  706. printf("%-15s (loopback device)\n", dev->name);
  707. }
  708. continue;
  709. }
  710. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  711. if (verbosity) {
  712. printf("%-15s (not an ethernet device)\n",
  713. dev->name);
  714. }
  715. continue;
  716. }
  717. #ifndef NMRPFLASH_WINDOWS
  718. printf("%-15s", dev->name);
  719. #else
  720. /* Call this here so *_perror() calls don't happen within a line */
  721. pretty = intf_get_pretty_name(dev->name);
  722. if (!verbosity) {
  723. printf("%s%-2u", NMRPFLASH_NETALIAS_PREFIX, dev_num);
  724. } else {
  725. printf("%s", dev->name);
  726. }
  727. #endif
  728. for (addr = dev->addresses; addr; addr = addr->next) {
  729. if (addr->addr->sa_family == AF_INET) {
  730. printf(" %-15s",
  731. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  732. break;
  733. }
  734. }
  735. if (!addr) {
  736. printf(" %-15s", "0.0.0.0");
  737. }
  738. printf(" %s", mac_to_str(hwaddr));
  739. #ifdef NMRPFLASH_WINDOWS
  740. if (pretty) {
  741. printf(" (%s)", pretty);
  742. } else if (dev->description) {
  743. printf(" (%s)", dev->description);
  744. }
  745. #endif
  746. printf("\n");
  747. ++dev_ok;
  748. }
  749. if (!dev_ok) {
  750. printf("No suitable network interfaces found.\n");
  751. }
  752. return 0;
  753. }
  754. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  755. void *arg)
  756. {
  757. struct ethsock_ip_callback_args args;
  758. pcap_if_t *devs, *dev;
  759. pcap_addr_t *addr;
  760. int status = 0;
  761. if (x_pcap_findalldevs(&devs) != 0) {
  762. return -1;
  763. }
  764. args.arg = arg;
  765. for (dev = devs; dev; dev = dev->next) {
  766. if (strcmp(sock->intf, dev->name)) {
  767. continue;
  768. }
  769. for (addr = dev->addresses; addr; addr = addr->next) {
  770. if (addr->addr->sa_family == AF_INET) {
  771. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  772. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  773. status = callback(&args);
  774. if (status <= 0) {
  775. break;
  776. }
  777. }
  778. }
  779. break;
  780. }
  781. pcap_freealldevs(devs);
  782. return status <= 0 ? status : 0;
  783. }
  784. static inline void set_addr(void *p, uint32_t addr)
  785. {
  786. struct sockaddr_in* sin = p;
  787. sin->sin_family = AF_INET;
  788. sin->sin_addr.s_addr = addr;
  789. #ifdef NMRPFLASH_BSD
  790. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  791. #endif
  792. }
  793. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  794. static bool intf_up(int fd, const char *intf, bool up)
  795. {
  796. struct ifreq ifr;
  797. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  798. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  799. if (up) {
  800. xperror("ioctl(SIOCGIFFLAGS)");
  801. }
  802. return false;
  803. }
  804. if (!up) {
  805. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  806. } else {
  807. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  808. }
  809. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  810. if (up) {
  811. xperror("ioctl(SIOCSIFFLAGS)");
  812. }
  813. return false;
  814. }
  815. return true;
  816. }
  817. #endif
  818. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  819. {
  820. int ret, fd;
  821. if (add && undo) {
  822. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  823. xperror("malloc");
  824. return -1;
  825. }
  826. memset(*undo, 0, sizeof(**undo));
  827. }
  828. ret = -1;
  829. fd = socket(AF_INET, SOCK_DGRAM, 0);
  830. if (fd < 0) {
  831. sock_perror("socket");
  832. goto out;
  833. }
  834. #ifndef NMRPFLASH_WINDOWS
  835. #ifdef NMRPFLASH_LINUX
  836. if (add) {
  837. (*undo)->ip[0] = ipaddr;
  838. (*undo)->ip[1] = ipmask;
  839. }
  840. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  841. goto out;
  842. }
  843. #else // NMRPFLASH_OSX (or any other BSD)
  844. struct ifaliasreq ifra;
  845. memset(&ifra, 0, sizeof(ifra));
  846. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  847. set_addr(&ifra.ifra_addr, ipaddr);
  848. set_addr(&ifra.ifra_mask, ipmask);
  849. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  850. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  851. if (add) {
  852. xperror("ioctl(SIOCAIFADDR");
  853. }
  854. goto out;
  855. }
  856. if (add) {
  857. (*undo)->ip[0] = ipaddr;
  858. (*undo)->ip[1] = ipmask;
  859. intf_up(fd, ifra.ifra_name, true);
  860. }
  861. #endif
  862. #else // NMRPFLASH_WINDOWS
  863. struct sockaddr_in sin;
  864. ULONG instance;
  865. (*undo)->context = 0;
  866. DWORD err = AddIPAddress(ipaddr, ipmask, sock->index, &(*undo)->context, &instance);
  867. if (err != NO_ERROR && err != ERROR_DUP_DOMAINNAME && err != ERROR_OBJECT_ALREADY_EXISTS) {
  868. win_perror2("AddIPAddress", err);
  869. goto out;
  870. }
  871. set_addr(&sin, ipaddr);
  872. time_t beg = time_monotonic();
  873. /* Wait until the new IP has actually been added */
  874. while (bind(fd, (struct sockaddr*)&sin, sizeof(sin)) != 0) {
  875. if ((time_monotonic() - beg) >= 5) {
  876. fprintf(stderr, "Failed to bind after 5 seconds: ");
  877. sock_perror("bind");
  878. DeleteIPAddress((*undo)->context);
  879. goto out;
  880. }
  881. }
  882. #endif
  883. ret = 0;
  884. out:
  885. #ifndef NMRPFLASH_WINDOWS
  886. close(fd);
  887. #else
  888. closesocket(fd);
  889. #endif
  890. if (ret != 0 && undo) {
  891. free(*undo);
  892. *undo = NULL;
  893. }
  894. return ret;
  895. }
  896. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  897. {
  898. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  899. }
  900. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  901. {
  902. if (!*undo) {
  903. return 0;
  904. }
  905. int ret;
  906. #ifndef NMRPFLASH_WINDOWS
  907. if ((*undo)->ip[0] != INADDR_NONE) {
  908. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  909. } else {
  910. ret = 0;
  911. }
  912. #else
  913. ret = DeleteIPAddress((*undo)->context) ? 0 : -1;
  914. #endif
  915. free(*undo);
  916. *undo = NULL;
  917. return ret;
  918. }