ethsock.c 21 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087
  1. /**
  2. * nmrpflash - Netgear Unbrick Utility
  3. * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
  4. *
  5. * nmrpflash is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * nmrpflash is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with nmrpflash. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. #include <sys/types.h>
  20. #include <stdbool.h>
  21. #include <stdarg.h>
  22. #include <string.h>
  23. #include <stdlib.h>
  24. #include <stdio.h>
  25. #include <fcntl.h>
  26. #include "nmrpd.h"
  27. #if defined(NMRPFLASH_WINDOWS)
  28. #define NMRPFLASH_NETALIAS_PREFIX "net"
  29. #define WPCAP
  30. #include <pcap.h>
  31. #else
  32. #include <sys/ioctl.h>
  33. #include <ifaddrs.h>
  34. #include <unistd.h>
  35. #include <net/if.h>
  36. #include <pcap.h>
  37. #if defined(NMRPFLASH_LINUX)
  38. #define NMRPFLASH_AF_PACKET AF_PACKET
  39. #include <linux/if_packet.h>
  40. #include <netlink/route/addr.h>
  41. #include <netlink/route/neighbour.h>
  42. #else
  43. #define NMRPFLASH_AF_PACKET AF_LINK
  44. #include <net/if_types.h>
  45. #include <net/if_media.h>
  46. #endif
  47. #endif
  48. struct ethsock
  49. {
  50. const char *intf;
  51. pcap_t *pcap;
  52. #ifndef NMRPFLASH_WINDOWS
  53. int fd;
  54. #ifdef NMRPFLASH_LINUX
  55. bool stp;
  56. #endif
  57. #else
  58. HANDLE handle;
  59. DWORD index;
  60. #endif
  61. unsigned timeout;
  62. uint8_t hwaddr[6];
  63. };
  64. struct ethsock_arp_undo
  65. {
  66. uint32_t ipaddr;
  67. uint8_t hwaddr[6];
  68. };
  69. struct ethsock_ip_undo
  70. {
  71. #ifndef NMRPFLASH_WINDOWS
  72. uint32_t ip[2];
  73. #else
  74. ULONG context;
  75. #endif
  76. };
  77. const char *mac_to_str(uint8_t *mac)
  78. {
  79. static char buf[18];
  80. snprintf(buf, sizeof(buf), "%02x:%02x:%02x:%02x:%02x:%02x",
  81. mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
  82. return buf;
  83. }
  84. static int x_pcap_findalldevs(pcap_if_t **devs)
  85. {
  86. char errbuf[PCAP_ERRBUF_SIZE];
  87. if (pcap_findalldevs(devs, errbuf) != 0) {
  88. fprintf(stderr, "%s.\n", errbuf);
  89. return -1;
  90. }
  91. return 0;
  92. }
  93. static int systemf(const char *fmt, ...)
  94. {
  95. char cmd[1024];
  96. int ret;
  97. va_list va;
  98. va_start(va, fmt);
  99. ret = vsnprintf(cmd, sizeof(cmd) - 1, fmt, va);
  100. if (ret >= sizeof(cmd) - 1) {
  101. return -1;
  102. }
  103. ret = system(cmd);
  104. va_end(va);
  105. return ret;
  106. }
  107. #ifndef NMRPFLASH_WINDOWS
  108. static inline bool sockaddr_get_hwaddr(struct sockaddr *sa, uint8_t *hwaddr)
  109. {
  110. void *src;
  111. if (sa->sa_family != NMRPFLASH_AF_PACKET) {
  112. return false;
  113. }
  114. #ifndef NMRPFLASH_LINUX
  115. if (((struct sockaddr_dl*)sa)->sdl_type != IFT_ETHER) {
  116. return false;
  117. }
  118. src = LLADDR((struct sockaddr_dl*)sa);
  119. #else
  120. src = ((struct sockaddr_ll*)sa)->sll_addr;
  121. #endif
  122. memcpy(hwaddr, src, 6);
  123. return true;
  124. }
  125. #ifdef NMRPFLASH_LINUX
  126. static int bridge_stp_state(const char *intf)
  127. {
  128. char name[256];
  129. snprintf(name, sizeof(name), "/sys/class/net/%s/bridge/stp_state", intf);
  130. return open(name, O_RDWR, 0644);
  131. }
  132. static bool bridge_stp_enabled(const char *intf)
  133. {
  134. char c;
  135. int fd = bridge_stp_state(intf);
  136. if (fd == -1) {
  137. return false;
  138. }
  139. if (read(fd, &c, 1) != 1) {
  140. c = '0';
  141. }
  142. close(fd);
  143. return c == '1';
  144. }
  145. static bool bridge_stp(const char *intf, bool enabled)
  146. {
  147. bool ret;
  148. const char *s = enabled ? "1\n" : "0\n";
  149. int fd = bridge_stp_state(intf);
  150. if (fd == -1) {
  151. return false;
  152. }
  153. ret = (write(fd, s, 2) == 2);
  154. close(fd);
  155. return ret;
  156. }
  157. static bool xrtnl_addr_set(struct rtnl_addr *ra, uint32_t addr, int (*cb)(struct rtnl_addr*, struct nl_addr*))
  158. {
  159. int err;
  160. struct nl_addr *na = nl_addr_build(AF_INET, &addr, 4);
  161. if (!na) {
  162. xperror("nl_addr_build");
  163. return false;
  164. }
  165. if ((err = cb(ra, na)) != 0 && verbosity) {
  166. nl_perror(err, __func__);
  167. }
  168. nl_addr_put(na);
  169. return true;
  170. }
  171. static struct nl_sock *xnl_socket_route()
  172. {
  173. int err;
  174. struct nl_sock *sk = nl_socket_alloc();
  175. if (sk) {
  176. if (!(err = nl_connect(sk, NETLINK_ROUTE))) {
  177. return sk;
  178. }
  179. nl_socket_free(sk);
  180. nl_perror(err, "nl_connect");
  181. } else {
  182. xperror("nl_socket_alloc");
  183. }
  184. return NULL;
  185. }
  186. static bool intf_add_del_ip(const char *intf, uint32_t ipaddr, uint32_t ipmask, bool add)
  187. {
  188. struct rtnl_addr *ra = NULL;
  189. struct nl_sock *sk = NULL;
  190. int err = 1;
  191. if (!(sk = xnl_socket_route())) {
  192. return false;
  193. }
  194. if (!(ra = rtnl_addr_alloc())) {
  195. xperror("rtnl_addr_alloc");
  196. goto out;
  197. }
  198. rtnl_addr_set_ifindex(ra, if_nametoindex(intf));
  199. rtnl_addr_set_prefixlen(ra, bitcount(ipmask));
  200. if (!xrtnl_addr_set(ra, (ipaddr & ipmask) | ~ipmask, &rtnl_addr_set_broadcast)
  201. || !xrtnl_addr_set(ra, ipaddr, &rtnl_addr_set_local)) {
  202. goto out;
  203. }
  204. if ((err = add ? rtnl_addr_add(sk, ra, 0) : rtnl_addr_delete(sk, ra, 0)) < 0) {
  205. if (add && err == -NLE_EXIST) {
  206. err = 0;
  207. } else if (add || verbosity > 1) {
  208. nl_perror(err, add ? "rtnl_addr_add" : "rtnl_addr_delete");
  209. }
  210. }
  211. out:
  212. rtnl_addr_put(ra);
  213. nl_socket_free(sk);
  214. return !err;
  215. }
  216. static bool intf_add_del_arp(const char *intf, uint32_t ipaddr, uint8_t *hwaddr, bool add)
  217. {
  218. struct nl_sock *sk;
  219. struct rtnl_neigh *neigh;
  220. struct nl_addr *mac, *ip;
  221. int err = 1;
  222. sk = NULL;
  223. neigh = NULL;
  224. mac = ip = NULL;
  225. if (!(sk = xnl_socket_route())) {
  226. goto out;
  227. }
  228. if (!(neigh = rtnl_neigh_alloc())) {
  229. xperror("rtnl_neigh_alloc");
  230. goto out;
  231. }
  232. if (!(mac = nl_addr_build(AF_PACKET, hwaddr, 6))) {
  233. xperror("nl_addr_build");
  234. goto out;
  235. }
  236. if (!(ip = nl_addr_build(AF_INET, &ipaddr, 4))) {
  237. xperror("nl_addr_build");
  238. goto out;
  239. }
  240. rtnl_neigh_set_ifindex(neigh, if_nametoindex(intf));
  241. rtnl_neigh_set_dst(neigh, ip);
  242. err = rtnl_neigh_delete(sk, neigh, 0);
  243. if (add) {
  244. rtnl_neigh_set_lladdr(neigh, mac);
  245. rtnl_neigh_set_state(neigh, NUD_PERMANENT);
  246. err = rtnl_neigh_add(sk, neigh, NLM_F_CREATE);
  247. }
  248. if (err && (add || verbosity > 1)) {
  249. nl_perror(err, add ? "rtnl_neigh_add" : "rtnl_neigh_delete");
  250. }
  251. out:
  252. nl_addr_put(ip);
  253. nl_addr_put(mac);
  254. rtnl_neigh_put(neigh);
  255. nl_socket_free(sk);
  256. return !err;
  257. }
  258. #endif
  259. static bool intf_get_info(const char *intf, uint8_t *hwaddr, bool *bridge)
  260. {
  261. struct ifaddrs *ifas, *ifa;
  262. bool found;
  263. if (getifaddrs(&ifas) != 0) {
  264. xperror("getifaddrs");
  265. return false;
  266. }
  267. found = false;
  268. if (bridge) {
  269. *bridge = false;
  270. }
  271. for (ifa = ifas; ifa; ifa = ifa->ifa_next) {
  272. if (!strcmp(ifa->ifa_name, intf)) {
  273. if (sockaddr_get_hwaddr(ifa->ifa_addr, hwaddr)) {
  274. #ifdef NMRPFLASH_BSD
  275. if (bridge) {
  276. *bridge = ((struct if_data*) ifa->ifa_data)->ifi_type == IFT_BRIDGE;
  277. }
  278. #endif
  279. found = true;
  280. break;
  281. }
  282. }
  283. }
  284. freeifaddrs(ifas);
  285. return found;
  286. }
  287. #else
  288. void win_perror2(const char *msg, DWORD err)
  289. {
  290. char *buf = NULL;
  291. FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER |
  292. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  293. NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  294. (LPTSTR)&buf, 0, NULL);
  295. if (buf) {
  296. /* FormatMessageA terminates buf with CRLF! */
  297. fprintf(stderr, "%s: %s", msg, buf);
  298. LocalFree(buf);
  299. } else {
  300. fprintf(stderr, "%s: error %d\n", msg, (int)err);
  301. }
  302. }
  303. static bool intf_get_info(const char *intf, uint8_t *hwaddr, DWORD *index)
  304. {
  305. PIP_ADAPTER_INFO adapters, adapter;
  306. DWORD ret;
  307. ULONG i, bufLen = 0;
  308. bool found = false;
  309. if ((ret = GetAdaptersInfo(NULL, &bufLen)) != ERROR_BUFFER_OVERFLOW) {
  310. win_perror2("GetAdaptersInfo", ret);
  311. return false;
  312. }
  313. adapters = malloc(bufLen);
  314. if (!adapters) {
  315. xperror("malloc");
  316. return false;
  317. }
  318. if ((ret = GetAdaptersInfo(adapters, &bufLen) == NO_ERROR)) {
  319. for (adapter = adapters; adapter; adapter = adapter->Next) {
  320. if (adapter->Type != MIB_IF_TYPE_ETHERNET && adapter->Type != IF_TYPE_IEEE80211) {
  321. continue;
  322. }
  323. /* Interface names from WinPcap are "\Device\NPF_{GUID}", while
  324. * AdapterName from GetAdaptersInfo is just "{GUID}".*/
  325. if (strstr(intf, adapter->AdapterName)) {
  326. if (adapter->AddressLength == 6) {
  327. memcpy(hwaddr, adapter->Address, 6);
  328. if (index) {
  329. *index = adapter->Index;
  330. }
  331. found = true;
  332. break;
  333. }
  334. }
  335. }
  336. } else {
  337. win_perror2("GetAdaptersInfo", ret);
  338. }
  339. free(adapters);
  340. return found;
  341. }
  342. static const char *intf_alias_to_wpcap(const char *intf)
  343. {
  344. static char buf[128];
  345. pcap_if_t *devs, *dev;
  346. unsigned i = 0, dev_num = 0;
  347. if (intf[0] == '\\') {
  348. return intf;
  349. } else if (sscanf(intf, NMRPFLASH_NETALIAS_PREFIX "%u", &dev_num) != 1) {
  350. fprintf(stderr, "Invalid interface alias.\n");
  351. return NULL;
  352. }
  353. if (x_pcap_findalldevs(&devs) != 0) {
  354. return NULL;
  355. }
  356. for (dev = devs; dev; dev = dev->next, ++i) {
  357. if (i == dev_num) {
  358. if (verbosity) {
  359. printf("%s%u: %s\n", NMRPFLASH_NETALIAS_PREFIX, i, dev->name);
  360. }
  361. strncpy(buf, dev->name, sizeof(buf) - 1);
  362. buf[sizeof(buf) - 1] = '\0';
  363. break;
  364. }
  365. }
  366. pcap_freealldevs(devs);
  367. if (!dev) {
  368. fprintf(stderr, "Interface alias not found.\n");
  369. return NULL;
  370. }
  371. return buf;
  372. }
  373. static const char *intf_get_pretty_name(const char *intf)
  374. {
  375. static char buf[512];
  376. char *guid;
  377. HKEY hkey;
  378. LONG err;
  379. DWORD len;
  380. guid = strstr(intf, "NPF_{");
  381. if (!guid) {
  382. return NULL;
  383. }
  384. guid += 4;
  385. snprintf(buf, sizeof(buf),
  386. "System\\CurrentControlSet\\Control\\Network\\"
  387. "{4D36E972-E325-11CE-BFC1-08002BE10318}\\"
  388. "%s\\Connection", guid);
  389. err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, buf, 0, KEY_READ, &hkey);
  390. if (err != ERROR_SUCCESS) {
  391. if (verbosity > 1) {
  392. win_perror2("RegOpenKeyExA", err);
  393. }
  394. return NULL;
  395. }
  396. len = sizeof(buf);
  397. err = RegQueryValueExA(hkey, "Name", NULL, NULL, (LPBYTE)buf, &len);
  398. if (err == ERROR_SUCCESS) {
  399. intf = buf;
  400. } else {
  401. if (verbosity > 1) {
  402. win_perror2("RegQueryValueExA", err);
  403. }
  404. intf = NULL;
  405. }
  406. RegCloseKey(hkey);
  407. return intf;
  408. }
  409. #endif
  410. inline uint8_t *ethsock_get_hwaddr(struct ethsock *sock)
  411. {
  412. return sock->hwaddr;
  413. }
  414. struct ethsock *ethsock_create(const char *intf, uint16_t protocol)
  415. {
  416. char buf[PCAP_ERRBUF_SIZE];
  417. struct bpf_program fp;
  418. struct ethsock *sock;
  419. bool is_bridge;
  420. int err;
  421. #ifdef NMRPFLASH_WINDOWS
  422. intf = intf_alias_to_wpcap(intf);
  423. if (!intf) {
  424. return NULL;
  425. }
  426. #endif
  427. sock = malloc(sizeof(struct ethsock));
  428. if (!sock) {
  429. xperror("malloc");
  430. return NULL;
  431. }
  432. buf[0] = '\0';
  433. sock->intf = intf;
  434. sock->pcap = pcap_open_live(sock->intf, BUFSIZ, 1, 1, buf);
  435. if (!sock->pcap) {
  436. fprintf(stderr, "%s.\n", buf);
  437. goto cleanup;
  438. }
  439. if (*buf) {
  440. fprintf(stderr, "Warning: %s.\n", buf);
  441. }
  442. if (pcap_datalink(sock->pcap) != DLT_EN10MB) {
  443. fprintf(stderr, "%s is not an ethernet interface.\n",
  444. intf);
  445. goto cleanup;
  446. }
  447. #ifndef NMRPFLASH_WINDOWS
  448. err = !intf_get_info(intf, sock->hwaddr, &is_bridge);
  449. #else
  450. err = !intf_get_info(intf, sock->hwaddr, &sock->index);
  451. #endif
  452. if (err) {
  453. fprintf(stderr, "Failed to get interface info.\n");
  454. goto cleanup;
  455. }
  456. #ifndef NMRPFLASH_WINDOWS
  457. sock->fd = pcap_get_selectable_fd(sock->pcap);
  458. if (sock->fd == -1) {
  459. pcap_perror(sock->pcap, "pcap_get_selectable_fd");
  460. goto cleanup;
  461. }
  462. #else
  463. sock->handle = pcap_getevent(sock->pcap);
  464. if (!sock->handle) {
  465. pcap_perror(sock->pcap, "pcap_getevent");
  466. goto cleanup;
  467. }
  468. err = pcap_setmintocopy(sock->pcap, 1);
  469. if (err) {
  470. pcap_perror(sock->pcap, "pcap_setmintocopy");
  471. goto cleanup;
  472. }
  473. #endif
  474. snprintf(buf, sizeof(buf), "ether proto 0x%04x and not ether src %s",
  475. protocol, mac_to_str(sock->hwaddr));
  476. err = pcap_compile(sock->pcap, &fp, buf, 0, 0);
  477. if (err) {
  478. pcap_perror(sock->pcap, "pcap_compile");
  479. goto cleanup;
  480. }
  481. err = pcap_setfilter(sock->pcap, &fp);
  482. pcap_freecode(&fp);
  483. if (err) {
  484. pcap_perror(sock->pcap, "pcap_setfilter");
  485. goto cleanup;
  486. }
  487. #ifdef NMRPFLASH_LINUX
  488. // nmrpflash does not work on bridge interfaces with STP enabled
  489. if ((sock->stp = bridge_stp_enabled(intf))) {
  490. if (!bridge_stp(intf, false)) {
  491. fprintf(stderr, "Warning: failed to disable STP on %s.\n", intf);
  492. }
  493. }
  494. #else
  495. if (is_bridge) {
  496. fprintf(stderr, "Warning: bridge interfaces are not fully "
  497. "supported on this platform.\n");
  498. }
  499. #endif
  500. return sock;
  501. cleanup:
  502. ethsock_close(sock);
  503. return NULL;
  504. }
  505. int select_fd(int fd, unsigned timeout)
  506. {
  507. struct timeval tv;
  508. int status;
  509. fd_set fds;
  510. FD_ZERO(&fds);
  511. FD_SET(fd, &fds);
  512. tv.tv_sec = timeout / 1000;
  513. tv.tv_usec = 1000 * (timeout % 1000);
  514. status = select(fd + 1, &fds, NULL, NULL, &tv);
  515. if (status < 0) {
  516. sock_perror("select");
  517. }
  518. return status;
  519. }
  520. ssize_t ethsock_recv(struct ethsock *sock, void *buf, size_t len)
  521. {
  522. struct pcap_pkthdr* hdr;
  523. const u_char *capbuf;
  524. int status;
  525. #ifdef NMRPFLASH_WINDOWS
  526. DWORD ret;
  527. if (sock->timeout) {
  528. ret = WaitForSingleObject(sock->handle, sock->timeout);
  529. if (ret == WAIT_TIMEOUT) {
  530. return 0;
  531. } else if (ret != WAIT_OBJECT_0) {
  532. win_perror2("WaitForSingleObject", ret);
  533. return -1;
  534. }
  535. }
  536. #else
  537. if (sock->timeout) {
  538. status = select_fd(sock->fd, sock->timeout);
  539. if (status < 0) {
  540. return -1;
  541. } else if (status == 0) {
  542. return 0;
  543. }
  544. }
  545. #endif
  546. status = pcap_next_ex(sock->pcap, &hdr, &capbuf);
  547. switch (status) {
  548. case 1:
  549. memcpy(buf, capbuf, MIN(len, hdr->caplen));
  550. return hdr->caplen;
  551. case 0:
  552. return 0;
  553. case -1:
  554. pcap_perror(sock->pcap, "pcap_next_ex");
  555. return -1;
  556. default:
  557. fprintf(stderr, "pcap_next_ex: returned %d.\n", status);
  558. return -1;
  559. }
  560. }
  561. int ethsock_send(struct ethsock *sock, void *buf, size_t len)
  562. {
  563. #ifdef NMRPFLASH_WINDOWS
  564. if (pcap_sendpacket(sock->pcap, buf, len) == 0) {
  565. return 0;
  566. } else {
  567. pcap_perror(sock->pcap, "pcap_sendpacket");
  568. return -1;
  569. }
  570. #else
  571. if (pcap_inject(sock->pcap, buf, len) == len) {
  572. return 0;
  573. } else {
  574. pcap_perror(sock->pcap, "pcap_inject");
  575. return -1;
  576. }
  577. #endif
  578. }
  579. int ethsock_close(struct ethsock *sock)
  580. {
  581. if (!sock) {
  582. return 0;
  583. }
  584. #ifdef NMRPFLASH_LINUX
  585. if (sock->stp) {
  586. bridge_stp(sock->intf, true);
  587. }
  588. #endif
  589. if (sock->pcap) {
  590. pcap_close(sock->pcap);
  591. }
  592. free(sock);
  593. return 0;
  594. }
  595. inline int ethsock_set_timeout(struct ethsock *sock, unsigned msec)
  596. {
  597. sock->timeout = msec;
  598. return 0;
  599. }
  600. static int ethsock_arp(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  601. {
  602. #if defined(NMRPFLASH_UNIX) && !defined(NMRPFLASH_LINUX)
  603. struct in_addr addr = { .s_addr = ipaddr };
  604. #elif defined(NMRPFLASH_WINDOWS)
  605. DWORD err;
  606. MIB_IPNETROW arp = {
  607. .dwIndex = sock->index,
  608. .dwPhysAddrLen = 6,
  609. .dwAddr = ipaddr,
  610. .dwType = MIB_IPNET_TYPE_STATIC
  611. };
  612. memcpy(arp.bPhysAddr, hwaddr, 6);
  613. #endif
  614. if (undo) {
  615. #if defined(NMRPFLASH_LINUX)
  616. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, true)) {
  617. return -1;
  618. }
  619. #elif defined(NMRPFLASH_WINDOWS)
  620. err = CreateIpNetEntry(&arp);
  621. if (err != NO_ERROR) {
  622. win_perror2("CreateIpNetEntry", err);
  623. return -1;
  624. }
  625. #else
  626. if (systemf("arp -s %s %s", inet_ntoa(addr), mac_to_str(hwaddr)) != 0) {
  627. return -1;
  628. }
  629. #endif
  630. *undo = malloc(sizeof(struct ethsock_arp_undo));
  631. if (!*undo) {
  632. xperror("malloc");
  633. return -1;
  634. }
  635. (*undo)->ipaddr = ipaddr;
  636. memcpy((*undo)->hwaddr, hwaddr, 6);
  637. } else {
  638. #if defined(NMRPFLASH_LINUX)
  639. if (!intf_add_del_arp(sock->intf, ipaddr, hwaddr, false)) {
  640. return -1;
  641. }
  642. #elif defined(NMRPFLASH_WINDOWS)
  643. return DeleteIpNetEntry(&arp) ? 0 : -1;
  644. #else
  645. return systemf("arp -d %s", inet_ntoa(addr));
  646. #endif
  647. }
  648. return 0;
  649. }
  650. int ethsock_arp_add(struct ethsock *sock, uint8_t *hwaddr, uint32_t ipaddr, struct ethsock_arp_undo **undo)
  651. {
  652. ethsock_arp(sock, hwaddr, ipaddr, NULL);
  653. return undo ? ethsock_arp(sock, hwaddr, ipaddr, undo) : -1;
  654. }
  655. int ethsock_arp_del(struct ethsock *sock, struct ethsock_arp_undo **undo)
  656. {
  657. if (!*undo) {
  658. return 0;
  659. }
  660. int ret = ethsock_arp(sock, (*undo)->hwaddr, (*undo)->ipaddr, NULL);
  661. free(*undo);
  662. *undo = NULL;
  663. return ret;
  664. }
  665. static bool get_hwaddr_from_pcap(const pcap_if_t *dev, uint8_t *hwaddr)
  666. {
  667. #ifndef NMRPFLASH_WINDOWS
  668. pcap_addr_t *addr;
  669. int i;
  670. for (addr = dev->addresses; addr; addr = addr->next) {
  671. if (verbosity > 1) {
  672. printf("%s: sa_family=%d, sa_data={ ", dev->name,
  673. addr->addr->sa_family);
  674. for (i = 0; i != sizeof(addr->addr->sa_data); ++i) {
  675. printf("%02x ", addr->addr->sa_data[i] & 0xff);
  676. }
  677. printf("}\n");
  678. }
  679. if (sockaddr_get_hwaddr(addr->addr, hwaddr)) {
  680. return true;
  681. }
  682. }
  683. #endif
  684. return intf_get_info(dev->name, hwaddr, NULL);
  685. }
  686. int ethsock_list_all(void)
  687. {
  688. pcap_if_t *devs, *dev;
  689. pcap_addr_t *addr;
  690. uint8_t hwaddr[6];
  691. unsigned dev_num = 0, dev_ok = 0;
  692. #ifdef NMRPFLASH_WINDOWS
  693. const char *pretty;
  694. #endif
  695. if (x_pcap_findalldevs(&devs) != 0) {
  696. return -1;
  697. }
  698. memset(hwaddr, 0, 6);
  699. for (dev = devs; dev; dev = dev->next, ++dev_num) {
  700. if (dev->flags & PCAP_IF_LOOPBACK) {
  701. if (verbosity) {
  702. printf("%-15s (loopback device)\n", dev->name);
  703. }
  704. continue;
  705. }
  706. if (!get_hwaddr_from_pcap(dev, hwaddr)) {
  707. if (verbosity) {
  708. printf("%-15s (not an ethernet device)\n",
  709. dev->name);
  710. }
  711. continue;
  712. }
  713. #ifndef NMRPFLASH_WINDOWS
  714. printf("%-15s", dev->name);
  715. #else
  716. /* Call this here so *_perror() calls don't happen within a line */
  717. pretty = intf_get_pretty_name(dev->name);
  718. if (!verbosity) {
  719. printf("%s%-2u", NMRPFLASH_NETALIAS_PREFIX, dev_num);
  720. } else {
  721. printf("%s", dev->name);
  722. }
  723. #endif
  724. for (addr = dev->addresses; addr; addr = addr->next) {
  725. if (addr->addr->sa_family == AF_INET) {
  726. printf(" %-15s",
  727. inet_ntoa(((struct sockaddr_in*)addr->addr)->sin_addr));
  728. break;
  729. }
  730. }
  731. if (!addr) {
  732. printf(" %-15s", "0.0.0.0");
  733. }
  734. printf(" %s", mac_to_str(hwaddr));
  735. #ifdef NMRPFLASH_WINDOWS
  736. if (pretty) {
  737. printf(" (%s)", pretty);
  738. } else if (dev->description) {
  739. printf(" (%s)", dev->description);
  740. }
  741. #endif
  742. printf("\n");
  743. ++dev_ok;
  744. }
  745. if (!dev_ok) {
  746. printf("No suitable network interfaces found.\n");
  747. }
  748. return 0;
  749. }
  750. int ethsock_for_each_ip(struct ethsock *sock, ethsock_ip_callback_t callback,
  751. void *arg)
  752. {
  753. struct ethsock_ip_callback_args args;
  754. pcap_if_t *devs, *dev;
  755. pcap_addr_t *addr;
  756. int status = 0;
  757. if (x_pcap_findalldevs(&devs) != 0) {
  758. return -1;
  759. }
  760. args.arg = arg;
  761. for (dev = devs; dev; dev = dev->next) {
  762. if (strcmp(sock->intf, dev->name)) {
  763. continue;
  764. }
  765. for (addr = dev->addresses; addr; addr = addr->next) {
  766. if (addr->addr->sa_family == AF_INET) {
  767. args.ipaddr = &((struct sockaddr_in*)addr->addr)->sin_addr;
  768. args.ipmask = &((struct sockaddr_in*)addr->netmask)->sin_addr;
  769. status = callback(&args);
  770. if (status <= 0) {
  771. break;
  772. }
  773. }
  774. }
  775. break;
  776. }
  777. pcap_freealldevs(devs);
  778. return status <= 0 ? status : 0;
  779. }
  780. static inline void set_addr(void *p, uint32_t addr)
  781. {
  782. struct sockaddr_in* sin = p;
  783. sin->sin_family = AF_INET;
  784. sin->sin_addr.s_addr = addr;
  785. #ifdef NMRPFLASH_BSD
  786. ((struct sockaddr*)p)->sa_len = sizeof(struct sockaddr_in);
  787. #endif
  788. }
  789. #if !defined(NMRPFLASH_WINDOWS) && !defined(NMRPFLASH_LINUX)
  790. static bool intf_up(int fd, const char *intf, bool up)
  791. {
  792. struct ifreq ifr;
  793. strncpy(ifr.ifr_name, intf, IFNAMSIZ);
  794. if (ioctl(fd, SIOCGIFFLAGS, &ifr) != 0) {
  795. if (up) {
  796. xperror("ioctl(SIOCGIFFLAGS)");
  797. }
  798. return false;
  799. }
  800. if (!up) {
  801. ifr.ifr_flags &= ~(IFF_UP | IFF_RUNNING);
  802. } else {
  803. ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
  804. }
  805. if (ioctl(fd, SIOCSIFFLAGS, &ifr) != 0) {
  806. if (up) {
  807. xperror("ioctl(SIOCSIFFLAGS)");
  808. }
  809. return false;
  810. }
  811. return true;
  812. }
  813. #endif
  814. static int ethsock_ip_add_del(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo, bool add)
  815. {
  816. int ret, fd;
  817. if (add && undo) {
  818. if (!(*undo = malloc(sizeof(struct ethsock_ip_undo)))) {
  819. xperror("malloc");
  820. return -1;
  821. }
  822. memset(*undo, 0, sizeof(**undo));
  823. }
  824. ret = -1;
  825. fd = socket(AF_INET, SOCK_DGRAM, 0);
  826. if (fd < 0) {
  827. sock_perror("socket");
  828. goto out;
  829. }
  830. #ifndef NMRPFLASH_WINDOWS
  831. #ifdef NMRPFLASH_LINUX
  832. if (add) {
  833. (*undo)->ip[0] = ipaddr;
  834. (*undo)->ip[1] = ipmask;
  835. }
  836. if (!intf_add_del_ip(sock->intf, (*undo)->ip[0], (*undo)->ip[1], add)) {
  837. goto out;
  838. }
  839. #else // NMRPFLASH_OSX (or any other BSD)
  840. struct ifaliasreq ifra;
  841. memset(&ifra, 0, sizeof(ifra));
  842. strncpy(ifra.ifra_name, sock->intf, IFNAMSIZ);
  843. set_addr(&ifra.ifra_addr, ipaddr);
  844. set_addr(&ifra.ifra_mask, ipmask);
  845. //set_addr(&ifra.ifra_broadaddr, (ipaddr & ipmask) | ~ipmask);
  846. if (ioctl(fd, add ? SIOCAIFADDR : SIOCDIFADDR, &ifra) != 0) {
  847. if (add) {
  848. xperror("ioctl(SIOCAIFADDR");
  849. }
  850. goto out;
  851. }
  852. if (add) {
  853. (*undo)->ip[0] = ipaddr;
  854. (*undo)->ip[1] = ipmask;
  855. intf_up(fd, ifra.ifra_name, true);
  856. }
  857. #endif
  858. #else // NMRPFLASH_WINDOWS
  859. struct sockaddr_in sin;
  860. ULONG instance;
  861. (*undo)->context = 0;
  862. DWORD err = AddIPAddress(ipaddr, ipmask, sock->index, &(*undo)->context, &instance);
  863. if (err != NO_ERROR && err != ERROR_DUP_DOMAINNAME && err != ERROR_OBJECT_ALREADY_EXISTS) {
  864. win_perror2("AddIPAddress", err);
  865. goto out;
  866. }
  867. set_addr(&sin, ipaddr);
  868. time_t beg = time_monotonic();
  869. /* Wait until the new IP has actually been added */
  870. while (bind(fd, (struct sockaddr*)&sin, sizeof(sin)) != 0) {
  871. if ((time_monotonic() - beg) >= 5) {
  872. fprintf(stderr, "Failed to bind after 5 seconds: ");
  873. sock_perror("bind");
  874. DeleteIPAddress((*undo)->context);
  875. goto out;
  876. }
  877. }
  878. #endif
  879. ret = 0;
  880. out:
  881. #ifndef NMRPFLASH_WINDOWS
  882. close(fd);
  883. #else
  884. closesocket(fd);
  885. #endif
  886. if (ret != 0 && undo) {
  887. free(*undo);
  888. *undo = NULL;
  889. }
  890. return ret;
  891. }
  892. int ethsock_ip_add(struct ethsock *sock, uint32_t ipaddr, uint32_t ipmask, struct ethsock_ip_undo **undo)
  893. {
  894. return ethsock_ip_add_del(sock, ipaddr, ipmask, undo, true);
  895. }
  896. int ethsock_ip_del(struct ethsock *sock, struct ethsock_ip_undo **undo)
  897. {
  898. if (!*undo) {
  899. return 0;
  900. }
  901. int ret;
  902. #ifndef NMRPFLASH_WINDOWS
  903. if ((*undo)->ip[0] != INADDR_NONE) {
  904. ret = ethsock_ip_add_del(sock, (*undo)->ip[0], (*undo)->ip[1], undo, false);
  905. } else {
  906. ret = 0;
  907. }
  908. #else
  909. ret = DeleteIPAddress((*undo)->context) ? 0 : -1;
  910. #endif
  911. free(*undo);
  912. *undo = NULL;
  913. return ret;
  914. }