2
0

ethsock.c 23 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #define WPCAP
  29. #include <pcap.h>
  30. #else
  31. #include <sys/ioctl.h>
  32. #include <ifaddrs.h>
  33. #include <unistd.h>
  34. #include <net/if.h>
  35. #include <pcap.h>
  36. #if defined(NMRPFLASH_LINUX)
  37. #define NMRPFLASH_AF_PACKET AF_PACKET
  38. #include <linux/if_packet.h>
  39. #include <netlink/route/addr.h>
  40. #include <netlink/route/neighbour.h>
  41. #else
  42. #define NMRPFLASH_AF_PACKET AF_LINK
  43. #include <net/if_types.h>
  44. #include <net/if_media.h>
  45. #endif
  46. #endif
  47. struct ethsock
  48. {
  49. const char *intf;
  50. pcap_t *pcap;
  51. #ifndef NMRPFLASH_WINDOWS
  52. int fd;
  53. #ifdef NMRPFLASH_LINUX
  54. bool stp;
  55. #endif
  56. #else
  57. HANDLE handle;
  58. DWORD index;
  59. #endif
  60. unsigned timeout;
  61. uint8_t hwaddr[6];
  62. };
  63. struct ethsock_arp_undo
  64. {
  65. uint32_t ipaddr;
  66. uint8_t hwaddr[6];
  67. };
  68. struct ethsock_ip_undo
  69. {
  70. uint32_t ip[2];
  71. };
  72. static int x_pcap_findalldevs(pcap_if_t **devs)
  73. {
  74. char errbuf[PCAP_ERRBUF_SIZE];
  75. if (pcap_findalldevs(devs, errbuf) != 0) {
  76. fprintf(stderr, "%s.\n", errbuf);
  77. return -1;
  78. }
  79. return 0;
  80. }
  81. #ifndef NMRPFLASH_LINUX
  82. static int systemf(const char *fmt, ...)
  83. {
  84. char cmd[1024];
  85. int ret;
  86. va_list va;
  87. va_start(va, fmt);
  88. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  89. if (ret >= sizeof(cmd) - 1) {
  90. return -1;
  91. }
  92. ret = system(cmd);
  93. va_end(va);
  94. return ret;
  95. }
  96. #endif
  97. #ifndef NMRPFLASH_WINDOWS
  98. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  99. {
  100. void *src;
  101. if (sa->sa_family != NMRPFLASH_AF_PACKET) {
  102. return false;
  103. }
  104. #ifndef NMRPFLASH_LINUX
  105. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  106. return false;
  107. }
  108. src = LLADDR((struct sockaddr_dl*)sa);
  109. #else
  110. src = ((struct sockaddr_ll*)sa)->sll_addr;
  111. #endif
  112. memcpy(hwaddr, src, 6);
  113. return true;
  114. }
  115. #ifdef NMRPFLASH_LINUX
  116. static int intf_sys_open(const char* intf, const char* file)
  117. {
  118. char name[256];
  119. snprintf(name, sizeof(name), "/sys/class/net/%s/%s", intf, file);
  120. return open(name, O_RDWR, 0644);
  121. }
  122. static bool intf_sys_read(const char* intf, const char* file, bool def)
  123. {
  124. char c;
  125. int fd;
  126. fd = intf_sys_open(intf, file);
  127. if (fd == -1) {
  128. return def;
  129. }
  130. c = 0;
  131. read(fd, &c, 1);
  132. close(fd);
  133. return c ? (c == '1') : def;
  134. }
  135. static bool intf_stp_enable(const char *intf, bool enabled)
  136. {
  137. int fd;
  138. ssize_t n;
  139. fd = intf_sys_open(intf, "bridge/stp_state");
  140. if (fd == -1) {
  141. return false;
  142. }
  143. n = write(fd, enabled ? "1\n" : "0\n", 2);
  144. close(fd);
  145. return n == 2;
  146. }
  147. static struct nl_addr *build_ip(uint32_t ip)
  148. {
  149. struct nl_addr *na = nl_addr_build(AF_INET, &ip, 4);
  150. if (!na) {
  151. xperror("nl_addr_build");
  152. }
  153. return na;
  154. }
  155. static struct nl_sock *xnl_socket_route()
  156. {
  157. int err;
  158. struct nl_sock *sk = nl_socket_alloc();
  159. if (sk) {
  160. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  161. return sk;
  162. }
  163. nl_socket_free(sk);
  164. nl_perror(err, "nl_connect");
  165. } else {
  166. xperror("nl_socket_alloc");
  167. }
  168. return NULL;
  169. }
  170. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  171. {
  172. struct rtnl_addr *ra = NULL;
  173. struct nl_sock *sk = NULL;
  174. struct nl_addr *na = NULL;
  175. int err = 1;
  176. if (!(sk = xnl_socket_route())) {
  177. return false;
  178. }
  179. if (!(ra = rtnl_addr_alloc())) {
  180. xperror("rtnl_addr_alloc");
  181. goto out;
  182. }
  183. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  184. if (!(na = build_ip(ipaddr))) {
  185. goto out;
  186. }
  187. nl_addr_set_prefixlen(na, bitcount(ipmask));
  188. rtnl_addr_set_local(ra, na);
  189. nl_addr_put(na);
  190. if (!(na = build_ip((ipaddr & ipmask) | ~ipmask))) {
  191. goto out;
  192. }
  193. rtnl_addr_set_broadcast(ra, na);
  194. nl_addr_put(na);
  195. if ((err = add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0) {
  196. if (add && err == -NLE_EXIST) {
  197. err = 0;
  198. } else if (add || verbosity > 1) {
  199. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  200. }
  201. }
  202. out:
  203. rtnl_addr_put(ra);
  204. nl_socket_free(sk);
  205. return !err;
  206. }
  207. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  208. {
  209. #if 0
  210. struct arpreq arp;
  211. memset(&arp, 0, sizeof(arp));
  212. arp.arp_ha.sa_family = ARPHRD_ETHER;
  213. memcpy(&arp.arp_ha.sa_data, hwaddr, 6);
  214. arp.arp_flags = ATF_PERM | ATF_COM;
  215. struct sockaddr_in *in = (struct sockaddr_in*)&req.arp_pa;
  216. in->sin_addr.s_addr = htonl(ipaddr);
  217. in->sin_family = AF_INET;
  218. int fd = socket(AF_INET, SOCK_DGRAM, 0);
  219. if (fd < 0) {
  220. perror("socket");
  221. return false;
  222. }
  223. bool ret = true;
  224. if (ioctl(fd, add ? SIOCSARP : SIOCDARP, &req) < 0) {
  225. perror(add ? "ioctl(SIOCSARP)" : "ioctl(SIOCDARP");
  226. ret = false;
  227. }
  228. close(fd);
  229. return ret;
  230. #else
  231. struct nl_sock *sk;
  232. struct rtnl_neigh *neigh;
  233. struct nl_addr *mac, *ip;
  234. int err = 1;
  235. sk = NULL;
  236. neigh = NULL;
  237. mac = ip = NULL;
  238. if (!(sk = xnl_socket_route())) {
  239. goto out;
  240. }
  241. if (!(neigh = rtnl_neigh_alloc())) {
  242. xperror("rtnl_neigh_alloc");
  243. goto out;
  244. }
  245. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  246. xperror("nl_addr_build");
  247. goto out;
  248. }
  249. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  250. xperror("nl_addr_build");
  251. goto out;
  252. }
  253. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  254. rtnl_neigh_set_dst(neigh, ip);
  255. err = rtnl_neigh_delete(sk, neigh, 0);
  256. if (add) {
  257. rtnl_neigh_set_lladdr(neigh, mac);
  258. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  259. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  260. }
  261. if (err && (add || verbosity > 1)) {
  262. nl_perror(err, add ? "rtnl_neigh_add" : "rtnl_neigh_delete");
  263. }
  264. out:
  265. nl_addr_put(ip);
  266. nl_addr_put(mac);
  267. rtnl_neigh_put(neigh);
  268. nl_socket_free(sk);
  269. return !err;
  270. #endif
  271. }
  272. #endif
  273. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  274. {
  275. struct ifaddrs *ifas, *ifa;
  276. bool found;
  277. if (getifaddrs(&ifas) != 0) {
  278. xperror("getifaddrs");
  279. return false;
  280. }
  281. found = false;
  282. if (bridge) {
  283. *bridge = false;
  284. }
  285. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  286. if (!strcmp(ifa->ifa_name, intf)) {
  287. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  288. #ifdef NMRPFLASH_BSD
  289. if (bridge) {
  290. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  291. }
  292. #endif
  293. found = true;
  294. break;
  295. }
  296. }
  297. }
  298. freeifaddrs(ifas);
  299. return found;
  300. }
  301. #else
  302. void win_perror2(const char *msg, DWORD err)
  303. {
  304. char *buf = NULL;
  305. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  306. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  307. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  308. (LPTSTR)&buf, 0, NULL);
  309. if (buf) {
  310. /* FormatMessageA terminates buf with CRLF! */
  311. fprintf(stderr, "%s: %s", msg, buf);
  312. LocalFree(buf);
  313. } else {
  314. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  315. }
  316. }
  317. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  318. {
  319. PIP_ADAPTER_INFO adapters, adapter;
  320. DWORD ret;
  321. ULONG bufLen = 0;
  322. bool found = false;
  323. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  324. win_perror2("GetAdaptersInfo", ret);
  325. return false;
  326. }
  327. adapters = malloc(bufLen);
  328. if (!adapters) {
  329. xperror("malloc");
  330. return false;
  331. }
  332. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  333. for (adapter = adapters; adapter; adapter = adapter->Next) {
  334. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  335. continue;
  336. }
  337. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  338. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  339. if (strstr(intf, adapter->AdapterName)) {
  340. if (adapter->AddressLength == 6) {
  341. memcpy(hwaddr, adapter->Address, 6);
  342. if (index) {
  343. *index = adapter->Index;
  344. }
  345. found = true;
  346. break;
  347. }
  348. }
  349. }
  350. } else {
  351. win_perror2("GetAdaptersInfo", ret);
  352. }
  353. free(adapters);
  354. return found;
  355. }
  356. static const char *intf_name_to_wpcap(const char *intf)
  357. {
  358. static char buf[128];
  359. if (intf[0] == '\\') {
  360. return intf;
  361. }
  362. do {
  363. NET_IFINDEX index;
  364. DWORD err;
  365. NET_LUID luid;
  366. GUID guid;
  367. if (sscanf(intf, "net%d", &index) != 1) {
  368. index = if_nametoindex(intf);
  369. if (!index) {
  370. break;
  371. }
  372. }
  373. err = ConvertInterfaceIndexToLuid(index, &luid);
  374. if (err != NO_ERROR) {
  375. if (verbosity) {
  376. win_perror2("ConvertInterfaceIndexToLuid", err);
  377. }
  378. break;
  379. }
  380. err = ConvertInterfaceLuidToGuid(&luid, &guid);
  381. if (err != NO_ERROR) {
  382. if (verbosity) {
  383. win_perror2("ConvertInterfaceLuidToGuid", err);
  384. }
  385. break;
  386. }
  387. snprintf(buf, sizeof(buf),
  388. "\\Device\\NPF_{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}",
  389. guid.Data1, guid.Data2, guid.Data3,
  390. guid.Data4[0], guid.Data4[1], guid.Data4[2],
  391. guid.Data4[3], guid.Data4[4], guid.Data4[5],
  392. guid.Data4[6], guid.Data4[7]);
  393. return buf;
  394. } while (false);
  395. fprintf(stderr, "Invalid interface name.\n");
  396. return NULL;
  397. }
  398. static const char *intf_get_pretty_name(const char *intf)
  399. {
  400. static char buf[512];
  401. char *guid;
  402. HKEY hkey;
  403. LONG err;
  404. DWORD len;
  405. guid = strstr(intf, "NPF_{");
  406. if (!guid) {
  407. return NULL;
  408. }
  409. guid += 4;
  410. snprintf(buf, sizeof(buf),
  411. "System\\CurrentControlSet\\Control\\Network\\"
  412. "{4D36E972-E325-11CE-BFC1-08002BE10318}\\"
  413. "%s\\Connection", guid);
  414. err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, buf, 0, KEY_READ, &hkey);
  415. if (err != ERROR_SUCCESS) {
  416. if (verbosity > 1) {
  417. win_perror2("RegOpenKeyExA", err);
  418. }
  419. return NULL;
  420. }
  421. len = sizeof(buf);
  422. err = RegQueryValueExA(hkey, "Name", NULL, NULL, (LPBYTE)buf, &len);
  423. if (err == ERROR_SUCCESS) {
  424. intf = buf;
  425. } else {
  426. if (verbosity > 1) {
  427. win_perror2("RegQueryValueExA", err);
  428. }
  429. intf = NULL;
  430. }
  431. RegCloseKey(hkey);
  432. return intf;
  433. }
  434. NET_IFINDEX intf_get_index(const char* intf)
  435. {
  436. const char* p;
  437. GUID guid;
  438. NET_LUID luid;
  439. DWORD err;
  440. NET_IFINDEX ret;
  441. int n;
  442. p = strstr(intf, "NPF_{");
  443. if (!p) {
  444. return 0;
  445. }
  446. sscanf(p + 5,
  447. "%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X%n",
  448. &guid.Data1, &guid.Data2, &guid.Data3,
  449. &guid.Data4[0], &guid.Data4[1], &guid.Data4[2],
  450. &guid.Data4[3], &guid.Data4[4], &guid.Data4[5],
  451. &guid.Data4[6], &guid.Data4[7], &n);
  452. if (n != 36) {
  453. return 0;
  454. }
  455. err = ConvertInterfaceGuidToLuid(&guid, &luid);
  456. if (err) {
  457. win_perror2("ConvertInterfaceGuidToLuid", err);
  458. return 0;
  459. }
  460. err = ConvertInterfaceLuidToIndex(&luid, &ret);
  461. if (err) {
  462. win_perror2("ConvertInterfaceLuidToIndex", err);
  463. return 0;
  464. }
  465. return ret;
  466. }
  467. #endif
  468. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  469. {
  470. return sock->hwaddr;
  471. }
  472. bool ethsock_is_unplugged(struct ethsock *sock)
  473. {
  474. #if defined(NMRPFLASH_LINUX)
  475. return !intf_sys_read(sock->intf, "carrier", true);
  476. #elif defined(NMRPFLASH_WINDOWS)
  477. MIB_IF_ROW2 row;
  478. DWORD err;
  479. memset(&row, 0, sizeof(row));
  480. row.InterfaceIndex = sock->index;
  481. err = GetIfEntry2(&row);
  482. if (err != NO_ERROR) {
  483. win_perror2("GetIfEntry2", err);
  484. return false;
  485. }
  486. return row.InterfaceAndOperStatusFlags.NotMediaConnected;
  487. #else
  488. return false;
  489. #endif
  490. }
  491. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  492. {
  493. char buf[PCAP_ERRBUF_SIZE];
  494. struct bpf_program fp;
  495. struct ethsock *sock;
  496. bool is_bridge = false;
  497. int err;
  498. #ifdef NMRPFLASH_WINDOWS
  499. intf = intf_name_to_wpcap(intf);
  500. if (!intf) {
  501. return NULL;
  502. }
  503. #endif
  504. sock = malloc(sizeof(struct ethsock));
  505. if (!sock) {
  506. xperror("malloc");
  507. return NULL;
  508. }
  509. buf[0] = '\0';
  510. sock->intf = intf;
  511. sock->pcap = pcap_open_live(sock->intf, BUFSIZ, 1, 1, buf);
  512. if (!sock->pcap) {
  513. fprintf(stderr, "%s.\n", buf);
  514. goto cleanup;
  515. }
  516. if (*buf) {
  517. fprintf(stderr, "Warning: %s.\n", buf);
  518. }
  519. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  520. fprintf(stderr, "%s is not an ethernet interface.\n",
  521. intf);
  522. goto cleanup;
  523. }
  524. #ifndef NMRPFLASH_WINDOWS
  525. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  526. #else
  527. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  528. #endif
  529. if (err) {
  530. fprintf(stderr, "Failed to get interface info.\n");
  531. goto cleanup;
  532. }
  533. #ifndef NMRPFLASH_WINDOWS
  534. sock->fd = pcap_get_selectable_fd(sock->pcap);
  535. if (sock->fd == -1) {
  536. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  537. goto cleanup;
  538. }
  539. #else
  540. sock->handle = pcap_getevent(sock->pcap);
  541. if (!sock->handle) {
  542. pcap_perror(sock->pcap, "pcap_getevent");
  543. goto cleanup;
  544. }
  545. err = pcap_setmintocopy(sock->pcap, 1);
  546. if (err) {
  547. pcap_perror(sock->pcap, "pcap_setmintocopy");
  548. goto cleanup;
  549. }
  550. #endif
  551. snprintf(buf, sizeof(buf), "ether proto 0x%04x and not ether src %s",
  552. protocol, mac_to_str(sock->hwaddr));
  553. err = pcap_compile(sock->pcap, &fp, buf, 0, 0);
  554. if (err) {
  555. pcap_perror(sock->pcap, "pcap_compile");
  556. goto cleanup;
  557. }
  558. err = pcap_setfilter(sock->pcap, &fp);
  559. pcap_freecode(&fp);
  560. if (err) {
  561. pcap_perror(sock->pcap, "pcap_setfilter");
  562. goto cleanup;
  563. }
  564. #ifdef NMRPFLASH_LINUX
  565. // nmrpflash does not work on bridge interfaces with STP enabled
  566. if ((sock->stp = intf_sys_read(intf, "bridge/stp_state", false))) {
  567. if (!intf_stp_enable(intf, false)) {
  568. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  569. }
  570. }
  571. #else
  572. if (is_bridge) {
  573. fprintf(stderr, "Warning: bridge interfaces are not fully "
  574. "supported on this platform.\n");
  575. }
  576. #endif
  577. return sock;
  578. cleanup:
  579. ethsock_close(sock);
  580. return NULL;
  581. }
  582. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  583. {
  584. struct pcap_pkthdr* hdr;
  585. const u_char *capbuf;
  586. int status;
  587. #ifdef NMRPFLASH_WINDOWS
  588. DWORD ret;
  589. if (sock->timeout) {
  590. ret = WaitForSingleObject(sock->handle, sock->timeout);
  591. if (ret == WAIT_TIMEOUT) {
  592. return 0;
  593. } else if (ret != WAIT_OBJECT_0) {
  594. win_perror2("WaitForSingleObject", ret);
  595. return -1;
  596. }
  597. }
  598. #else
  599. if (sock->timeout) {
  600. status = select_fd(sock->fd, sock->timeout);
  601. if (status < 0) {
  602. return -1;
  603. } else if (status == 0) {
  604. return 0;
  605. }
  606. }
  607. #endif
  608. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  609. switch (status) {
  610. case 1:
  611. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  612. return hdr->caplen;
  613. case 0:
  614. return 0;
  615. case -1:
  616. pcap_perror(sock->pcap, "pcap_next_ex");
  617. return -1;
  618. default:
  619. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  620. return -1;
  621. }
  622. }
  623. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  624. {
  625. #ifdef NMRPFLASH_WINDOWS
  626. if (pcap_sendpacket(sock->pcap, buf, len) == 0) {
  627. return 0;
  628. } else {
  629. pcap_perror(sock->pcap, "pcap_sendpacket");
  630. return -1;
  631. }
  632. #else
  633. if (pcap_inject(sock->pcap, buf, len) == len) {
  634. return 0;
  635. } else {
  636. pcap_perror(sock->pcap, "pcap_inject");
  637. return -1;
  638. }
  639. #endif
  640. }
  641. int ethsock_close(struct ethsock *sock)
  642. {
  643. if (!sock) {
  644. return 0;
  645. }
  646. #ifdef NMRPFLASH_LINUX
  647. if (sock->stp) {
  648. intf_stp_enable(sock->intf, true);
  649. }
  650. #endif
  651. if (sock->pcap) {
  652. pcap_close(sock->pcap);
  653. }
  654. free(sock);
  655. return 0;
  656. }
  657. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  658. {
  659. sock->timeout = msec;
  660. return 0;
  661. }
  662. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  663. {
  664. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  665. struct in_addr addr = { .s_addr = ipaddr };
  666. #elif defined(NMRPFLASH_WINDOWS)
  667. DWORD err;
  668. MIB_IPNETROW arp = {
  669. .dwIndex = sock->index,
  670. .dwPhysAddrLen = 6,
  671. .dwAddr = ipaddr,
  672. .dwType = MIB_IPNET_TYPE_STATIC
  673. };
  674. memcpy(arp.bPhysAddr, hwaddr, 6);
  675. #endif
  676. if (undo) {
  677. #if defined(NMRPFLASH_LINUX)
  678. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  679. return -1;
  680. }
  681. #elif defined(NMRPFLASH_WINDOWS)
  682. err = CreateIpNetEntry(&arp);
  683. if (err != NO_ERROR) {
  684. win_perror2("CreateIpNetEntry", err);
  685. return -1;
  686. }
  687. #else
  688. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  689. return -1;
  690. }
  691. #endif
  692. *undo = malloc(sizeof(struct ethsock_arp_undo));
  693. if (!*undo) {
  694. xperror("malloc");
  695. return -1;
  696. }
  697. (*undo)->ipaddr = ipaddr;
  698. memcpy((*undo)->hwaddr, hwaddr, 6);
  699. } else {
  700. #if defined(NMRPFLASH_LINUX)
  701. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  702. return -1;
  703. }
  704. #elif defined(NMRPFLASH_WINDOWS)
  705. return DeleteIpNetEntry(&arp) ? 0 : -1;
  706. #else
  707. return systemf("arp -d %s", inet_ntoa(addr));
  708. #endif
  709. }
  710. return 0;
  711. }
  712. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  713. {
  714. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  715. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  716. }
  717. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  718. {
  719. if (!*undo) {
  720. return 0;
  721. }
  722. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  723. free(*undo);
  724. *undo = NULL;
  725. return ret;
  726. }
  727. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  728. {
  729. #ifndef NMRPFLASH_WINDOWS
  730. pcap_addr_t *addr;
  731. int i;
  732. for (addr = dev->addresses; addr; addr = addr->next) {
  733. if (verbosity > 1) {
  734. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  735. addr->addr->sa_family);
  736. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  737. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  738. }
  739. printf("}\n");
  740. }
  741. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  742. return true;
  743. }
  744. }
  745. #endif
  746. return intf_get_info(dev->name, hwaddr, NULL);
  747. }
  748. int ethsock_list_all(void)
  749. {
  750. pcap_if_t *devs, *dev;
  751. pcap_addr_t *addr;
  752. uint8_t hwaddr[6];
  753. unsigned dev_num = 0, dev_ok = 0;
  754. #ifdef NMRPFLASH_WINDOWS
  755. char buf[IF_MAX_STRING_SIZE];
  756. const char *pretty;
  757. NET_IFINDEX index;
  758. #endif
  759. if (x_pcap_findalldevs(&devs) != 0) {
  760. return -1;
  761. }
  762. memset(hwaddr, 0, 6);
  763. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  764. if (dev->flags & PCAP_IF_LOOPBACK) {
  765. if (verbosity) {
  766. printf("%-15s (loopback device)\n", dev->name);
  767. }
  768. continue;
  769. }
  770. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  771. if (verbosity) {
  772. printf("%-15s (not an ethernet device)\n",
  773. dev->name);
  774. }
  775. continue;
  776. }
  777. #ifndef NMRPFLASH_WINDOWS
  778. printf("%-15s", dev->name);
  779. #else
  780. /* Call this here so *_perror() calls don't happen within a line */
  781. pretty = intf_get_pretty_name(dev->name);
  782. index = intf_get_index(dev->name);
  783. if (!verbosity && index) {
  784. printf("net%-2d", index);
  785. } else {
  786. printf("%-15s", dev->name);
  787. }
  788. #endif
  789. for (addr = dev->addresses; addr; addr = addr->next) {
  790. if (addr->addr->sa_family == AF_INET) {
  791. printf(" %-15s",
  792. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  793. break;
  794. }
  795. }
  796. if (!addr) {
  797. printf(" %-15s", "0.0.0.0");
  798. }
  799. printf(" %s", mac_to_str(hwaddr));
  800. #ifdef NMRPFLASH_WINDOWS
  801. if (pretty) {
  802. printf(" (%s)", pretty);
  803. } else if (dev->description) {
  804. printf(" (%s)", dev->description);
  805. }
  806. #endif
  807. printf("\n");
  808. ++dev_ok;
  809. }
  810. if (!dev_ok) {
  811. printf("No suitable network interfaces found.\n");
  812. }
  813. return 0;
  814. }
  815. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  816. void *arg)
  817. {
  818. struct ethsock_ip_callback_args args;
  819. pcap_if_t *devs, *dev;
  820. pcap_addr_t *addr;
  821. int status = 0;
  822. if (x_pcap_findalldevs(&devs) != 0) {
  823. return -1;
  824. }
  825. args.arg = arg;
  826. for (dev = devs; dev; dev = dev->next) {
  827. if (strcmp(sock->intf, dev->name)) {
  828. continue;
  829. }
  830. for (addr = dev->addresses; addr; addr = addr->next) {
  831. if (addr->addr->sa_family == AF_INET) {
  832. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  833. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  834. status = callback(&args);
  835. if (status <= 0) {
  836. break;
  837. }
  838. }
  839. }
  840. break;
  841. }
  842. pcap_freealldevs(devs);
  843. return status <= 0 ? status : 0;
  844. }
  845. static inline void set_addr(void *p, uint32_t addr)
  846. {
  847. struct sockaddr_in* sin = p;
  848. sin->sin_family = AF_INET;
  849. sin->sin_addr.s_addr = addr;
  850. #ifdef NMRPFLASH_BSD
  851. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  852. #endif
  853. }
  854. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  855. static bool intf_up(int fd, const char *intf, bool up)
  856. {
  857. struct ifreq ifr;
  858. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  859. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  860. if (up) {
  861. xperror("ioctl(SIOCGIFFLAGS)");
  862. }
  863. return false;
  864. }
  865. if (!up) {
  866. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  867. } else {
  868. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  869. }
  870. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  871. if (up) {
  872. xperror("ioctl(SIOCSIFFLAGS)");
  873. }
  874. return false;
  875. }
  876. return true;
  877. }
  878. #endif
  879. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  880. {
  881. int ret, fd;
  882. if (add && undo) {
  883. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  884. xperror("malloc");
  885. return -1;
  886. }
  887. (*undo)->ip[0] = ipaddr;
  888. (*undo)->ip[1] = ipmask;
  889. }
  890. ret = -1;
  891. fd = socket(AF_INET, SOCK_DGRAM, 0);
  892. if (fd < 0) {
  893. sock_perror("socket");
  894. goto out;
  895. }
  896. #ifndef NMRPFLASH_WINDOWS
  897. #ifdef NMRPFLASH_LINUX
  898. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  899. goto out;
  900. }
  901. #else // NMRPFLASH_OSX (or any other BSD)
  902. struct ifaliasreq ifra;
  903. memset(&ifra, 0, sizeof(ifra));
  904. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  905. set_addr(&ifra.ifra_addr, ipaddr);
  906. set_addr(&ifra.ifra_mask, ipmask);
  907. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  908. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  909. if (add) {
  910. xperror("ioctl(SIOCAIFADDR");
  911. }
  912. goto out;
  913. }
  914. if (add) {
  915. (*undo)->ip[0] = ipaddr;
  916. (*undo)->ip[1] = ipmask;
  917. intf_up(fd, ifra.ifra_name, true);
  918. }
  919. #endif
  920. #else // NMRPFLASH_WINDOWS
  921. MIB_UNICASTIPADDRESS_ROW row;
  922. memset(&row, 0, sizeof(row));
  923. row.InterfaceIndex = sock->index;
  924. set_addr(&row.Address.Ipv4, ipaddr);
  925. row.Address.si_family = AF_INET;
  926. if (add) {
  927. row.PrefixOrigin = IpPrefixOriginManual;
  928. row.SuffixOrigin = IpPrefixOriginManual;
  929. row.OnLinkPrefixLength = bitcount(ipmask);
  930. row.SkipAsSource = false;
  931. row.PreferredLifetime = 0xffffffff;
  932. row.ValidLifetime = 0xffffffff;
  933. }
  934. DWORD err;
  935. if (add) {
  936. err = CreateUnicastIpAddressEntry(&row);
  937. if (err != NO_ERROR && err != ERROR_OBJECT_ALREADY_EXISTS) {
  938. win_perror2("CreateUnicastIpAddressEntry", err);
  939. goto out;
  940. }
  941. time_t beg = time_monotonic();
  942. /* Wait until the new IP has actually been added */
  943. /*
  944. while (bind(fd, (struct sockaddr*)&row.Address.Ipv4, sizeof(row.Address.Ipv4)) != 0) {
  945. if ((time_monotonic() - beg) >= 5) {
  946. fprintf(stderr, "Failed to bind after 5 seconds: ");
  947. sock_perror("bind");
  948. DeleteUnicastIpAddressEntry(&row);
  949. goto out;
  950. }
  951. }
  952. */
  953. } else {
  954. err = DeleteUnicastIpAddressEntry(&row);
  955. if (err != NO_ERROR) {
  956. win_perror2("DeleteUnicastIpAddressEntry", err);
  957. goto out;
  958. }
  959. }
  960. #endif
  961. ret = 0;
  962. out:
  963. #ifndef NMRPFLASH_WINDOWS
  964. close(fd);
  965. #else
  966. closesocket(fd);
  967. #endif
  968. if (ret != 0 && undo) {
  969. free(*undo);
  970. *undo = NULL;
  971. }
  972. return ret;
  973. }
  974. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  975. {
  976. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  977. }
  978. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  979. {
  980. if (!*undo) {
  981. return 0;
  982. }
  983. int ret;
  984. if ((*undo)->ip[0] != INADDR_NONE) {
  985. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  986. } else {
  987. ret = 0;
  988. }
  989. free(*undo);
  990. *undo = NULL;
  991. return ret;
  992. }