sendpacket.c 46 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556
  1. /* $Id$ */
  2. /*
  3. * Copyright (c) 2001-2010 Aaron Turner <aturner at synfin dot net>
  4. * Copyright (c) 2013-2022 Fred Klassen <tcpreplay at appneta dot com> - AppNeta
  5. *
  6. * The Tcpreplay Suite of tools is free software: you can redistribute it
  7. * and/or modify it under the terms of the GNU General Public License as
  8. * published by the Free Software Foundation, either version 3 of the
  9. * License, or with the authors permission any later version.
  10. *
  11. * The Tcpreplay Suite is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with the Tcpreplay Suite. If not, see <http://www.gnu.org/licenses/>.
  18. */
  19. /* sendpacket.[ch] is my attempt to write a universal packet injection
  20. * API for BPF, libpcap, libdnet, and Linux's PF_PACKET. I got sick
  21. * and tired dealing with libnet bugs and its lack of active maintenance,
  22. * but unfortunately, libpcap frame injection support is relatively new
  23. * and not everyone uses Linux, so I decided to support all four as
  24. * best as possible. If your platform/OS/hardware supports an additional
  25. * injection method, then by all means add it here (and send me a patch).
  26. *
  27. * Anyways, long story short, for now the order of preference is:
  28. * 0. pcap_dump
  29. * 1. TX_RING
  30. * 2. PF_PACKET
  31. * 3. BPF
  32. * 4. libdnet
  33. * 5. pcap_inject()
  34. * 6. pcap_sendpacket()
  35. *
  36. * Right now, one big problem with the pcap_* methods is that libpcap
  37. * doesn't provide a reliable method of getting the MAC address of
  38. * an interface (required for tcpbridge).
  39. * You can use PF_PACKET or BPF to get that, but if your system supports
  40. * those, might as well inject directly without going through another
  41. * level of indirection.
  42. *
  43. * Please note that some of this code was copied from Libnet 1.1.3
  44. */
  45. #include "sendpacket.h"
  46. #include "defines.h"
  47. #include "config.h"
  48. #include "common.h"
  49. #include <errno.h>
  50. #include <stdarg.h>
  51. #include <stdio.h>
  52. #include <string.h>
  53. #include <sys/file.h>
  54. #include <sys/ioctl.h>
  55. #include <sys/socket.h>
  56. #include <sys/time.h>
  57. #include <sys/types.h>
  58. #ifdef FORCE_INJECT_TX_RING
  59. /* TX_RING uses PF_PACKET API so don't undef it here */
  60. #undef HAVE_LIBDNET
  61. #undef HAVE_PCAP_INJECT
  62. #undef HAVE_PCAP_SENDPACKET
  63. #undef HAVE_BPF
  64. #undef HAVE_LIBXDP
  65. #endif
  66. #ifdef FORCE_INJECT_PF_PACKET
  67. #undef HAVE_TX_RING
  68. #undef HAVE_LIBDNET
  69. #undef HAVE_PCAP_INJECT
  70. #undef HAVE_PCAP_SENDPACKET
  71. #undef HAVE_BPF
  72. #undef HAVE_LIBXDP
  73. #endif
  74. #ifdef FORCE_INJECT_LIBDNET
  75. #undef HAVE_TX_RING
  76. #undef HAVE_PF_PACKET
  77. #undef HAVE_PCAP_INJECT
  78. #undef HAVE_PCAP_SENDPACKET
  79. #undef HAVE_BPF
  80. #undef HAVE_LIBXDP
  81. #endif
  82. #ifdef FORCE_INJECT_BPF
  83. #undef HAVE_TX_RING
  84. #undef HAVE_LIBDNET
  85. #undef HAVE_PCAP_INJECT
  86. #undef HAVE_PCAP_SENDPACKET
  87. #undef HAVE_PF_PACKET
  88. #undef HAVE_LIBXDP
  89. #endif
  90. #ifdef FORCE_INJECT_PCAP_INJECT
  91. #undef HAVE_TX_RING
  92. #undef HAVE_LIBDNET
  93. #undef HAVE_PCAP_SENDPACKET
  94. #undef HAVE_BPF
  95. #undef HAVE_PF_PACKET
  96. #undef HAVE_LIBXDP
  97. #endif
  98. #ifdef FORCE_INJECT_PCAP_SENDPACKET
  99. #undef HAVE_TX_RING
  100. #undef HAVE_LIBDNET
  101. #undef HAVE_PCAP_INJECT
  102. #undef HAVE_BPF
  103. #undef HAVE_PF_PACKET
  104. #undef HAVE_LIBXDP
  105. #endif
  106. #ifdef FORCE_INJECT_LIBXDP
  107. #undef HAVE_TX_RING
  108. #undef HAVE_LIBDNET
  109. #undef HAVE_PF_PACKET
  110. #undef HAVE_PCAP_INJECT
  111. #undef HAVE_PCAP_SENDPACKET
  112. #undef HAVE_BPF
  113. #endif
  114. #if (defined HAVE_WINPCAP && defined HAVE_PCAP_INJECT)
  115. #undef HAVE_PCAP_INJECT /* configure returns true for some odd reason */
  116. #endif
  117. #if !defined HAVE_PCAP_INJECT && !defined HAVE_PCAP_SENDPACKET && !defined HAVE_LIBDNET && !defined HAVE_PF_PACKET && \
  118. !defined HAVE_BPF && !defined TX_RING && !defined HAVE_LIBXDP
  119. #error You need pcap_inject() or pcap_sendpacket() from libpcap, libdnet, Linux's PF_PACKET/TX_RING/AF_XDP with libxdp or *BSD's BPF
  120. #endif
  121. #ifdef HAVE_SYS_PARAM_H
  122. #include <sys/param.h>
  123. #endif
  124. #ifdef HAVE_NET_ROUTE_H
  125. #include <net/route.h>
  126. #endif
  127. #include <stdlib.h>
  128. #include <unistd.h>
  129. #ifdef HAVE_PF_PACKET
  130. #undef INJECT_METHOD
  131. /* give priority to TX_RING */
  132. #ifndef HAVE_TX_RING
  133. #define INJECT_METHOD "PF_PACKET send()"
  134. #else
  135. #define INJECT_METHOD "PF_PACKET / TX_RING"
  136. #endif
  137. #include <fcntl.h>
  138. #include <net/if.h>
  139. #include <net/if_arp.h>
  140. #include <netinet/in.h>
  141. #include <netpacket/packet.h>
  142. #include <sys/utsname.h>
  143. #ifdef HAVE_TX_RING
  144. #include "txring.h"
  145. #endif
  146. static sendpacket_t *sendpacket_open_pf(const char *, char *);
  147. static struct tcpr_ether_addr *sendpacket_get_hwaddr_pf(sendpacket_t *);
  148. static int get_iface_index(int fd, const char *device, char *);
  149. #endif /* HAVE_PF_PACKET */
  150. #ifdef HAVE_TUNTAP
  151. #ifdef HAVE_LINUX
  152. #include <linux/if_tun.h>
  153. #include <net/if.h>
  154. #elif defined(HAVE_FREEBSD)
  155. #define TUNTAP_DEVICE_PREFIX "/dev/"
  156. #endif
  157. static sendpacket_t *sendpacket_open_tuntap(const char *, char *);
  158. #endif
  159. #if defined HAVE_BPF && !defined INJECT_METHOD
  160. #undef INJECT_METHOD
  161. #define INJECT_METHOD "bpf send()"
  162. #include <net/bpf.h>
  163. #include <net/if.h>
  164. #include <net/if_dl.h> // used for get_hwaddr_bpf()
  165. #include <net/route.h>
  166. #include <sys/sysctl.h>
  167. #include <sys/uio.h>
  168. static sendpacket_t *sendpacket_open_bpf(const char *, char *) _U_;
  169. static struct tcpr_ether_addr *sendpacket_get_hwaddr_bpf(sendpacket_t *) _U_;
  170. #endif /* HAVE_BPF */
  171. #if defined HAVE_LIBDNET && !defined INJECT_METHOD
  172. #undef INJECT_METHOD
  173. #define INJECT_METHOD "libdnet eth_send()"
  174. /* need to undef these which are pulled in via defines.h, prior to importing dnet.h */
  175. #undef icmp_id
  176. #undef icmp_seq
  177. #undef icmp_data
  178. #undef icmp_mask
  179. #ifdef HAVE_DNET_H
  180. #include <dnet.h>
  181. #endif
  182. #ifdef HAVE_DUMBNET_H
  183. #include <dumbnet.h>
  184. #endif
  185. static sendpacket_t *sendpacket_open_libdnet(const char *, char *) _U_;
  186. static struct tcpr_ether_addr *sendpacket_get_hwaddr_libdnet(sendpacket_t *) _U_;
  187. #endif /* HAVE_LIBDNET */
  188. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET) && \
  189. !(defined HAVE_PF_PACKET || defined BPF || defined HAVE_LIBDNET)
  190. static sendpacket_t *sendpacket_open_pcap(const char *, char *) _U_;
  191. static struct tcpr_ether_addr *sendpacket_get_hwaddr_pcap(sendpacket_t *) _U_;
  192. #endif /* HAVE_PCAP_INJECT || HAVE_PACKET_SENDPACKET */
  193. #if defined HAVE_PCAP_INJECT && !defined INJECT_METHOD
  194. #undef INJECT_METHOD
  195. #define INJECT_METHOD "pcap_inject()"
  196. #elif defined HAVE_PCAP_SENDPACKET && !defined INJECT_METHOD
  197. #undef INJECT_METHOD
  198. #define INJECT_METHOD "pcap_sendpacket()"
  199. #endif
  200. #ifdef HAVE_LIBXDP
  201. #include <sys/mman.h>
  202. static sendpacket_t *sendpacket_open_xsk(const char *, char *) _U_;
  203. static struct tcpr_ether_addr *sendpacket_get_hwaddr_libxdp(sendpacket_t *);
  204. #endif
  205. #if defined HAVE_LIBXDP && !defined INJECT_METHOD
  206. #undef INJECT_METHOD
  207. #define INJECT_METHOD "xsk_ring_prod_submit()"
  208. #endif
  209. static sendpacket_t *sendpacket_open_pcap_dump(const char *, char *) _U_;
  210. static void sendpacket_seterr(sendpacket_t *sp, const char *fmt, ...);
  211. static sendpacket_t *sendpacket_open_khial(const char *, char *) _U_;
  212. static struct tcpr_ether_addr *sendpacket_get_hwaddr_khial(sendpacket_t *) _U_;
  213. /**
  214. * returns number of bytes sent on success or -1 on error
  215. * Note: it is theoretically possible to get a return code >0 and < len
  216. * which for most people would be considered an error (the packet wasn't fully sent)
  217. * so you may want to test for recode != len too.
  218. *
  219. * Most socket API's have two interesting errors: ENOBUFS & EAGAIN. ENOBUFS
  220. * is usually due to the kernel buffers being full. EAGAIN happens when you
  221. * try to send traffic faster then the PHY allows.
  222. */
  223. int
  224. sendpacket(sendpacket_t *sp, const u_char *data, size_t len, struct pcap_pkthdr *pkthdr)
  225. {
  226. int retcode = 0, val;
  227. static u_char buffer[10000]; /* 10K bytes, enough for jumbo frames + pkthdr
  228. * larger than page size so made static to
  229. * prevent page misses on stack
  230. */
  231. static const size_t buffer_payload_size = sizeof(buffer) + sizeof(struct pcap_pkthdr);
  232. assert(sp);
  233. #ifndef HAVE_LIBXDP
  234. // In case of XDP packet processing we are storing data in sp->packet_processing->xdp_descs
  235. assert(data);
  236. #endif
  237. if (len == 0)
  238. return -1;
  239. TRY_SEND_AGAIN:
  240. sp->attempt++;
  241. switch (sp->handle_type) {
  242. case SP_TYPE_KHIAL:
  243. memcpy(buffer, pkthdr, sizeof(struct pcap_pkthdr));
  244. memcpy(buffer + sizeof(struct pcap_pkthdr), data, min(len, buffer_payload_size));
  245. /* tell the kernel module which direction the traffic is going */
  246. if (sp->cache_dir == TCPR_DIR_C2S) { /* aka PRIMARY */
  247. val = KHIAL_DIRECTION_RX;
  248. if (ioctl(sp->handle.fd, KHIAL_SET_DIRECTION, (void *)&val) < 0) {
  249. sendpacket_seterr(sp, "Error setting direction on %s: %s (%d)", sp->device, strerror(errno), errno);
  250. return -1;
  251. }
  252. } else if (sp->cache_dir == TCPR_DIR_S2C) {
  253. val = KHIAL_DIRECTION_TX;
  254. if (ioctl(sp->handle.fd, KHIAL_SET_DIRECTION, (void *)&val) < 0) {
  255. sendpacket_seterr(sp, "Error setting direction on %s: %s (%d)", sp->device, strerror(errno), errno);
  256. return -1;
  257. }
  258. }
  259. /* write the pkthdr + packet data all at once */
  260. retcode = (int)write(sp->handle.fd, (void *)buffer, sizeof(struct pcap_pkthdr) + len);
  261. retcode -= sizeof(struct pcap_pkthdr); /* only record packet bytes we sent, not pcap data too */
  262. if (retcode < 0 && !sp->abort) {
  263. switch (errno) {
  264. case EAGAIN:
  265. sp->retry_eagain++;
  266. goto TRY_SEND_AGAIN;
  267. case ENOBUFS:
  268. sp->retry_enobufs++;
  269. goto TRY_SEND_AGAIN;
  270. default:
  271. sendpacket_seterr(sp,
  272. "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  273. "khial",
  274. sp->sent + sp->failed + 1,
  275. strerror(errno),
  276. errno);
  277. }
  278. break;
  279. }
  280. break;
  281. case SP_TYPE_TUNTAP:
  282. retcode = (int)write(sp->handle.fd, (void *)data, len);
  283. break;
  284. /* Linux PF_PACKET and TX_RING */
  285. case SP_TYPE_PF_PACKET:
  286. case SP_TYPE_TX_RING:
  287. #if defined HAVE_PF_PACKET
  288. #ifdef HAVE_TX_RING
  289. retcode = (int)txring_put(sp->tx_ring, data, len);
  290. #else
  291. retcode = (int)send(sp->handle.fd, (void *)data, len, 0);
  292. #endif
  293. /* out of buffers, or hit max PHY speed, silently retry
  294. * as long as we're not told to abort
  295. */
  296. if (retcode < 0 && !sp->abort) {
  297. switch (errno) {
  298. case EAGAIN:
  299. sp->retry_eagain++;
  300. goto TRY_SEND_AGAIN;
  301. case ENOBUFS:
  302. sp->retry_enobufs++;
  303. goto TRY_SEND_AGAIN;
  304. default:
  305. sendpacket_seterr(sp,
  306. "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  307. INJECT_METHOD,
  308. sp->sent + sp->failed + 1,
  309. strerror(errno),
  310. errno);
  311. }
  312. }
  313. #endif /* HAVE_PF_PACKET */
  314. break;
  315. /* BPF */
  316. case SP_TYPE_BPF:
  317. #if defined HAVE_BPF
  318. retcode = write(sp->handle.fd, (void *)data, len);
  319. /* out of buffers, or hit max PHY speed, silently retry */
  320. if (retcode < 0 && !sp->abort) {
  321. switch (errno) {
  322. case EAGAIN:
  323. sp->retry_eagain++;
  324. goto TRY_SEND_AGAIN;
  325. break;
  326. case ENOBUFS:
  327. sp->retry_enobufs++;
  328. goto TRY_SEND_AGAIN;
  329. break;
  330. default:
  331. sendpacket_seterr(sp,
  332. "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  333. INJECT_METHOD,
  334. sp->sent + sp->failed + 1,
  335. strerror(errno),
  336. errno);
  337. }
  338. }
  339. #endif
  340. break;
  341. /* Libdnet */
  342. case SP_TYPE_LIBDNET:
  343. #if defined HAVE_LIBDNET
  344. retcode = eth_send(sp->handle.ldnet, (void *)data, (size_t)len);
  345. /* out of buffers, or hit max PHY speed, silently retry */
  346. if (retcode < 0 && !sp->abort) {
  347. switch (errno) {
  348. case EAGAIN:
  349. sp->retry_eagain++;
  350. goto TRY_SEND_AGAIN;
  351. break;
  352. case ENOBUFS:
  353. sp->retry_enobufs++;
  354. goto TRY_SEND_AGAIN;
  355. break;
  356. default:
  357. sendpacket_seterr(sp,
  358. "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  359. INJECT_METHOD,
  360. sp->sent + sp->failed + 1,
  361. strerror(errno),
  362. errno);
  363. }
  364. }
  365. #endif
  366. break;
  367. case SP_TYPE_LIBPCAP:
  368. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  369. #if defined HAVE_PCAP_INJECT
  370. /*
  371. * pcap methods don't seem to support ENOBUFS, so we just straight fail
  372. * is there a better way???
  373. */
  374. retcode = pcap_inject(sp->handle.pcap, (void *)data, len);
  375. #elif defined HAVE_PCAP_SENDPACKET
  376. retcode = pcap_sendpacket(sp->handle.pcap, data, (int)len);
  377. #endif
  378. /* out of buffers, or hit max PHY speed, silently retry */
  379. if (retcode < 0 && !sp->abort) {
  380. switch (errno) {
  381. case EAGAIN:
  382. sp->retry_eagain++;
  383. goto TRY_SEND_AGAIN;
  384. case ENOBUFS:
  385. sp->retry_enobufs++;
  386. goto TRY_SEND_AGAIN;
  387. default:
  388. sendpacket_seterr(sp,
  389. "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  390. INJECT_METHOD,
  391. sp->sent + sp->failed + 1,
  392. pcap_geterr(sp->handle.pcap),
  393. errno);
  394. }
  395. }
  396. #if defined HAVE_PCAP_SENDPACKET
  397. /*
  398. * pcap_sendpacket returns 0 on success, not the packet length!
  399. * hence, we have to fix retcode to be more standard on success
  400. */
  401. if (retcode == 0)
  402. retcode = (int)len;
  403. #endif /* HAVE_PCAP_SENDPACKET */
  404. #endif /* HAVE_PCAP_INJECT || HAVE_PCAP_SENDPACKET */
  405. break;
  406. case SP_TYPE_LIBPCAP_DUMP:
  407. pcap_dump((u_char *)sp->handle.dump.dump, pkthdr, data);
  408. retcode = len;
  409. break;
  410. case SP_TYPE_NETMAP:
  411. #ifdef HAVE_NETMAP
  412. retcode = sendpacket_send_netmap(sp, data, len);
  413. if (retcode == -1) {
  414. sendpacket_seterr(sp, "interface hung!!");
  415. } else if (retcode == -2) {
  416. /* this indicates that a retry was requested - this is not a failure */
  417. sp->retry_eagain++;
  418. retcode = 0;
  419. #ifdef HAVE_SCHED_H
  420. /* yield the CPU so other apps remain responsive */
  421. sched_yield();
  422. #endif
  423. goto TRY_SEND_AGAIN;
  424. }
  425. #endif /* HAVE_NETMAP */
  426. break;
  427. case SP_TYPE_LIBXDP:
  428. #ifdef HAVE_LIBXDP
  429. retcode = len;
  430. xsk_ring_prod__submit(&(sp->xsk_info->tx), sp->pckt_count); // submit all packets at once
  431. sp->xsk_info->ring_stats.tx_npkts += sp->pckt_count;
  432. sp->xsk_info->outstanding_tx += sp->pckt_count;
  433. while (sp->xsk_info->outstanding_tx != 0) {
  434. complete_tx_only(sp);
  435. }
  436. sp->sent += sp->pckt_count;
  437. #endif
  438. break;
  439. default:
  440. errx(-1, "Unsupported sp->handle_type = %d", sp->handle_type);
  441. } /* end case */
  442. if (retcode < 0) {
  443. sp->failed++;
  444. } else if (sp->abort) {
  445. sendpacket_seterr(sp, "User abort");
  446. } else if (retcode != (int)len) {
  447. sendpacket_seterr(sp, "Only able to write %d bytes out of %lu bytes total", retcode, len);
  448. sp->trunc_packets++;
  449. } else {
  450. #ifndef HAVE_LIBXDP
  451. sp->bytes_sent += len;
  452. sp->sent++;
  453. #else
  454. if (sp->handle_type != SP_TYPE_LIBXDP) {
  455. sp->bytes_sent += len;
  456. sp->sent++;
  457. }
  458. #endif
  459. }
  460. return retcode;
  461. }
  462. /**
  463. * Open the given network device name and returns a sendpacket_t struct
  464. * pass the error buffer (in case there's a problem) and the direction
  465. * that this interface represents
  466. */
  467. sendpacket_t *
  468. sendpacket_open(const char *device,
  469. char *errbuf,
  470. tcpr_dir_t direction,
  471. sendpacket_type_t sendpacket_type _U_,
  472. void *arg _U_)
  473. {
  474. sendpacket_t *sp;
  475. struct stat sdata;
  476. assert(device);
  477. assert(errbuf);
  478. errbuf[0] = '\0';
  479. if (sendpacket_type == SP_TYPE_LIBPCAP_DUMP) {
  480. sp = sendpacket_open_pcap_dump(device, errbuf);
  481. } else {
  482. /* khial is universal */
  483. if (stat(device, &sdata) == 0) {
  484. if (((sdata.st_mode & S_IFMT) == S_IFCHR)) {
  485. sp = sendpacket_open_khial(device, errbuf);
  486. } else {
  487. switch (sdata.st_mode & S_IFMT) {
  488. case S_IFBLK:
  489. errx(-1, "\"%s\" is a block device and is not a valid Tcpreplay device", device);
  490. case S_IFDIR:
  491. errx(-1, "\"%s\" is a directory and is not a valid Tcpreplay device", device);
  492. case S_IFIFO:
  493. errx(-1, "\"%s\" is a FIFO and is not a valid Tcpreplay device", device);
  494. case S_IFLNK:
  495. errx(-1, "\"%s\" is a symbolic link and is not a valid Tcpreplay device", device);
  496. case S_IFREG:
  497. errx(-1, "\"%s\" is a file and is not a valid Tcpreplay device", device);
  498. default:
  499. errx(-1, "\"%s\" is not a valid Tcpreplay device", device);
  500. }
  501. }
  502. #ifdef HAVE_TUNTAP
  503. } else if (strncmp(device, "tap", 3) == 0) {
  504. sp = sendpacket_open_tuntap(device, errbuf);
  505. #endif
  506. } else {
  507. #ifdef HAVE_NETMAP
  508. if (sendpacket_type == SP_TYPE_NETMAP)
  509. sp = (sendpacket_t *)sendpacket_open_netmap(device, errbuf, arg);
  510. else
  511. #endif
  512. #ifdef HAVE_LIBXDP
  513. if (sendpacket_type == SP_TYPE_LIBXDP)
  514. sp = sendpacket_open_xsk(device, errbuf);
  515. else
  516. #endif
  517. #if defined HAVE_PF_PACKET
  518. sp = sendpacket_open_pf(device, errbuf);
  519. #elif defined HAVE_BPF
  520. sp = sendpacket_open_bpf(device, errbuf);
  521. #elif defined HAVE_LIBDNET
  522. sp = sendpacket_open_libdnet(device, errbuf);
  523. #elif (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  524. sp = sendpacket_open_pcap(device, errbuf);
  525. #else
  526. #error "No defined packet injection method for sendpacket_open()"
  527. #endif
  528. }
  529. }
  530. if (sp) {
  531. sp->open = 1;
  532. sp->cache_dir = direction;
  533. } else {
  534. errx(-1, "failed to open device %s: %s", device, errbuf);
  535. }
  536. return sp;
  537. }
  538. /**
  539. * Get packet stats for the given sendpacket_t
  540. */
  541. size_t
  542. sendpacket_getstat(sendpacket_t *sp, char *buf, size_t buf_size)
  543. {
  544. size_t offset;
  545. assert(sp);
  546. assert(buf);
  547. memset(buf, 0, buf_size);
  548. offset = snprintf(buf,
  549. buf_size,
  550. "Statistics for network device: %s\n"
  551. "\tSuccessful packets: " COUNTER_SPEC "\n"
  552. "\tFailed packets: " COUNTER_SPEC "\n"
  553. "\tTruncated packets: " COUNTER_SPEC "\n"
  554. "\tRetried packets (ENOBUFS): " COUNTER_SPEC "\n"
  555. "\tRetried packets (EAGAIN): " COUNTER_SPEC "\n",
  556. sp->device,
  557. sp->sent,
  558. sp->failed,
  559. sp->trunc_packets,
  560. sp->retry_enobufs,
  561. sp->retry_eagain);
  562. if (sp->flow_packets && offset > 0) {
  563. offset += snprintf(&buf[offset],
  564. buf_size - offset,
  565. "\tFlows total: " COUNTER_SPEC "\n"
  566. "\tFlows unique: " COUNTER_SPEC "\n"
  567. "\tFlows expired: " COUNTER_SPEC "\n"
  568. "\tFlow packets: " COUNTER_SPEC "\n"
  569. "\tNon-flow packets: " COUNTER_SPEC "\n"
  570. "\tInvalid flow packets: " COUNTER_SPEC "\n",
  571. sp->flows,
  572. sp->flows_expired,
  573. sp->flows_expired,
  574. sp->flow_packets,
  575. sp->flow_non_flow_packets,
  576. sp->flows_invalid_packets);
  577. }
  578. return offset;
  579. }
  580. /**
  581. * close the given sendpacket
  582. */
  583. void
  584. sendpacket_close(sendpacket_t *sp)
  585. {
  586. assert(sp);
  587. switch (sp->handle_type) {
  588. case SP_TYPE_KHIAL:
  589. close(sp->handle.fd);
  590. break;
  591. case SP_TYPE_BPF:
  592. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  593. close(sp->handle.fd);
  594. #endif
  595. break;
  596. case SP_TYPE_PF_PACKET:
  597. case SP_TYPE_TX_RING:
  598. #ifdef HAVE_PF_PACKET
  599. close(sp->handle.fd);
  600. #endif
  601. break;
  602. case SP_TYPE_LIBPCAP:
  603. #ifdef HAVE_LIBPCAP
  604. pcap_close(sp->handle.pcap);
  605. #endif
  606. break;
  607. case SP_TYPE_LIBPCAP_DUMP:
  608. pcap_dump_close(sp->handle.dump.dump);
  609. pcap_close(sp->handle.dump.pcap);
  610. break;
  611. case SP_TYPE_LIBDNET:
  612. #ifdef HAVE_LIBDNET
  613. eth_close(sp->handle.ldnet);
  614. #endif
  615. break;
  616. case SP_TYPE_LIBNET:
  617. err(-1, "Libnet is no longer supported!");
  618. case SP_TYPE_NETMAP:
  619. #ifdef HAVE_NETMAP
  620. sendpacket_close_netmap(sp);
  621. #endif /* HAVE_NETMAP */
  622. break;
  623. case SP_TYPE_TUNTAP:
  624. #ifdef HAVE_TUNTAP
  625. close(sp->handle.fd);
  626. #endif
  627. break;
  628. case SP_TYPE_LIBXDP:
  629. #ifdef HAVE_LIBXDP
  630. close(sp->handle.fd);
  631. xsk_socket__delete(sp->xsk_info->xsk);
  632. safe_free(sp->xsk_info);
  633. xsk_umem__delete(sp->umem_info->umem);
  634. safe_free(sp->umem_info->buffer);
  635. safe_free(sp->umem_info);
  636. #endif
  637. break;
  638. case SP_TYPE_NONE:
  639. err(-1, "no injector selected!");
  640. }
  641. safe_free(sp);
  642. }
  643. /**
  644. * returns the Layer 2 address of the interface current
  645. * open. on error, return NULL
  646. */
  647. struct tcpr_ether_addr *
  648. sendpacket_get_hwaddr(sendpacket_t *sp)
  649. {
  650. struct tcpr_ether_addr *addr;
  651. assert(sp);
  652. /* if we already have our MAC address stored, just return it */
  653. if (memcmp(&sp->ether, "\x00\x00\x00\x00\x00\x00", ETHER_ADDR_LEN) != 0)
  654. return &sp->ether;
  655. if (sp->handle_type == SP_TYPE_KHIAL) {
  656. addr = sendpacket_get_hwaddr_khial(sp);
  657. } else if (sp->handle_type == SP_TYPE_LIBPCAP_DUMP) {
  658. sendpacket_seterr(sp, "Error: sendpacket_get_hwaddr() not yet supported for pcap dump");
  659. return NULL;
  660. } else {
  661. #if defined HAVE_PF_PACKET
  662. addr = sendpacket_get_hwaddr_pf(sp);
  663. #elif defined HAVE_LIBXDP
  664. addr = sendpacket_get_hwaddr_libxdp(sp);
  665. #elif defined HAVE_BPF
  666. addr = sendpacket_get_hwaddr_bpf(sp);
  667. #elif defined HAVE_LIBDNET
  668. addr = sendpacket_get_hwaddr_libdnet(sp);
  669. #elif (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  670. addr = sendpacket_get_hwaddr_pcap(sp);
  671. #endif
  672. }
  673. return addr;
  674. }
  675. /**
  676. * returns the error string
  677. */
  678. char *
  679. sendpacket_geterr(sendpacket_t *sp)
  680. {
  681. assert(sp);
  682. return sp->errbuf;
  683. }
  684. /**
  685. * Set's the error string
  686. */
  687. static void
  688. sendpacket_seterr(sendpacket_t *sp, const char *fmt, ...)
  689. {
  690. va_list ap;
  691. assert(sp);
  692. va_start(ap, fmt);
  693. if (fmt != NULL)
  694. (void)vsnprintf(sp->errbuf, SENDPACKET_ERRBUF_SIZE, fmt, ap);
  695. va_end(ap);
  696. sp->errbuf[(SENDPACKET_ERRBUF_SIZE - 1)] = '\0'; // be safe
  697. }
  698. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET) && \
  699. !(defined HAVE_PF_PACKET || defined BPF || defined HAVE_LIBDNET)
  700. /**
  701. * Inner sendpacket_open() method for using libpcap
  702. */
  703. static sendpacket_t *
  704. sendpacket_open_pcap(const char *device, char *errbuf)
  705. {
  706. pcap_t *pcap;
  707. sendpacket_t *sp;
  708. #ifdef BIOCSHDRCMPLT
  709. u_int spoof_eth_src = 1;
  710. int fd;
  711. #endif
  712. assert(device);
  713. assert(errbuf);
  714. dbg(1, "sendpacket: using Libpcap");
  715. /* open_pcap_live automatically fills out our errbuf for us */
  716. if ((pcap = pcap_open_live(device, 0, 0, 0, errbuf)) == NULL)
  717. return NULL;
  718. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  719. strlcpy(sp->device, device, sizeof(sp->device));
  720. sp->handle.pcap = pcap;
  721. #ifdef BIOCSHDRCMPLT
  722. /*
  723. * Only systems using BPF on the backend need this...
  724. * other systems don't have ioctl and will get compile errors.
  725. */
  726. fd = pcap_get_selectable_fd(pcap);
  727. if (ioctl(fd, BIOCSHDRCMPLT, &spoof_eth_src) == -1)
  728. errx(-1, "Unable to enable source MAC spoof support: %s", strerror(errno));
  729. #endif
  730. sp->handle_type = SP_TYPE_LIBPCAP;
  731. return sp;
  732. }
  733. /**
  734. * Get the hardware MAC address for the given interface using libpcap
  735. */
  736. static struct tcpr_ether_addr *
  737. sendpacket_get_hwaddr_pcap(sendpacket_t *sp)
  738. {
  739. assert(sp);
  740. sendpacket_seterr(sp, "Error: sendpacket_get_hwaddr() not yet supported for pcap injection");
  741. return NULL;
  742. }
  743. #endif /* HAVE_PCAP_INJECT || HAVE_PCAP_SENDPACKET */
  744. /**
  745. * Inner sendpacket_open() method for using libpcap
  746. */
  747. static sendpacket_t *
  748. sendpacket_open_pcap_dump(const char *device, char *errbuf)
  749. {
  750. pcap_t *pcap;
  751. pcap_dumper_t* dump;
  752. sendpacket_t *sp;
  753. assert(device);
  754. assert(errbuf);
  755. dbg(1, "sendpacket: using Libpcap");
  756. pcap = pcap_open_dead(DLT_EN10MB, MAX_SNAPLEN);
  757. if ((dump = pcap_dump_open(pcap, device)) == NULL){
  758. char* err_msg = pcap_geterr(pcap);
  759. strlcpy(errbuf, err_msg, PCAP_ERRBUF_SIZE);
  760. pcap_close(pcap);
  761. return NULL;
  762. }
  763. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  764. strlcpy(sp->device, device, sizeof(sp->device));
  765. sp->handle.dump.pcap = pcap;
  766. sp->handle.dump.dump = dump;
  767. sp->handle_type = SP_TYPE_LIBPCAP_DUMP;
  768. return sp;
  769. }
  770. #if defined HAVE_LIBDNET && !defined HAVE_PF_PACKET && !defined HAVE_BPF
  771. /**
  772. * Inner sendpacket_open() method for using libdnet
  773. */
  774. static sendpacket_t *
  775. sendpacket_open_libdnet(const char *device, char *errbuf)
  776. {
  777. eth_t *ldnet;
  778. sendpacket_t *sp;
  779. assert(device);
  780. assert(errbuf);
  781. dbg(1, "sendpacket: using Libdnet");
  782. if ((ldnet = eth_open(device)) == NULL)
  783. return NULL;
  784. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  785. strlcpy(sp->device, device, sizeof(sp->device));
  786. sp->handle.ldnet = ldnet;
  787. sp->handle_type = SP_TYPE_LIBDNET;
  788. return sp;
  789. }
  790. /**
  791. * Get the hardware MAC address for the given interface using libdnet
  792. */
  793. static struct tcpr_ether_addr *
  794. sendpacket_get_hwaddr_libdnet(sendpacket_t *sp)
  795. {
  796. struct tcpr_ether_addr *addr = NULL;
  797. int ret;
  798. assert(sp);
  799. ret = eth_get(sp->handle.ldnet, (eth_addr_t *)addr);
  800. if (addr == NULL || ret < 0) {
  801. sendpacket_seterr(sp, "Error getting hwaddr via libdnet: %s", strerror(errno));
  802. return NULL;
  803. }
  804. memcpy(&sp->ether, addr, sizeof(struct tcpr_ether_addr));
  805. return (&sp->ether);
  806. }
  807. #endif /* HAVE_LIBDNET */
  808. #if defined HAVE_TUNTAP
  809. /**
  810. * Inner sendpacket_open() method for tuntap devices
  811. */
  812. static sendpacket_t *
  813. sendpacket_open_tuntap(const char *device, char *errbuf)
  814. {
  815. sendpacket_t *sp;
  816. struct ifreq ifr;
  817. int tapfd;
  818. assert(device);
  819. assert(errbuf);
  820. #if defined HAVE_LINUX
  821. if ((tapfd = open("/dev/net/tun", O_RDWR)) < 0) {
  822. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open /dev/net/tun control file: %s", strerror(errno));
  823. return NULL;
  824. }
  825. memset(&ifr, 0, sizeof(ifr));
  826. ifr.ifr_flags = (IFF_TAP | IFF_NO_PI);
  827. strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name) - 1);
  828. if (ioctl(tapfd, TUNSETIFF, (void *)&ifr) < 0) {
  829. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to create tuntap interface: %s", device);
  830. close(tapfd);
  831. return NULL;
  832. }
  833. #elif defined(HAVE_FREEBSD)
  834. if (*device == '/') {
  835. if ((tapfd = open(device, O_RDWR)) < 0) {
  836. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open device %s: %s", device, strerror(errno));
  837. return NULL;
  838. }
  839. } else {
  840. /* full path needed */
  841. char *path;
  842. int prefix_length = strlen(TUNTAP_DEVICE_PREFIX);
  843. if ((path = malloc(strlen(device) + prefix_length + 1)) == NULL) {
  844. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Malloc error: %s", strerror(errno));
  845. return NULL;
  846. }
  847. snprintf(path, strlen(device) + prefix_length + 1, "%s%s", TUNTAP_DEVICE_PREFIX, device);
  848. if ((tapfd = open(path, O_RDWR)) < 0) {
  849. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open device %s: %s", path, strerror(errno));
  850. free(path);
  851. return NULL;
  852. }
  853. free(path);
  854. }
  855. #endif
  856. /* prep & return our sp handle */
  857. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  858. strlcpy(sp->device, device, sizeof(sp->device));
  859. sp->handle.fd = tapfd;
  860. sp->handle_type = SP_TYPE_TUNTAP;
  861. return sp;
  862. }
  863. #endif
  864. #if defined HAVE_PF_PACKET
  865. /**
  866. * Inner sendpacket_open() method for using Linux's PF_PACKET or TX_RING
  867. */
  868. static sendpacket_t *
  869. sendpacket_open_pf(const char *device, char *errbuf)
  870. {
  871. int mysocket;
  872. sendpacket_t *sp;
  873. struct ifreq ifr;
  874. struct sockaddr_ll sa;
  875. int err;
  876. socklen_t errlen = sizeof(err);
  877. unsigned int UNUSED(mtu) = 1500;
  878. #ifdef SO_BROADCAST
  879. int n = 1;
  880. #endif
  881. assert(device);
  882. assert(errbuf);
  883. #if defined TX_RING
  884. dbg(1, "sendpacket: using TX_RING");
  885. #else
  886. dbg(1, "sendpacket: using PF_PACKET");
  887. #endif
  888. memset(&sa, 0, sizeof(sa));
  889. /* open our socket */
  890. if ((mysocket = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL))) < 0) {
  891. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "socket: %s", strerror(errno));
  892. return NULL;
  893. }
  894. /* get the interface id for the device */
  895. if ((sa.sll_ifindex = get_iface_index(mysocket, device, errbuf)) < 0) {
  896. close(mysocket);
  897. return NULL;
  898. }
  899. /* bind socket to our interface id */
  900. sa.sll_family = AF_PACKET;
  901. sa.sll_protocol = htons(ETH_P_ALL);
  902. if (bind(mysocket, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
  903. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "bind error: %s", strerror(errno));
  904. close(mysocket);
  905. return NULL;
  906. }
  907. /* check for errors, network down, etc... */
  908. if (getsockopt(mysocket, SOL_SOCKET, SO_ERROR, &err, &errlen) < 0) {
  909. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening %s: %s", device, strerror(errno));
  910. close(mysocket);
  911. return NULL;
  912. }
  913. if (err > 0) {
  914. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening %s: %s", device, strerror(err));
  915. close(mysocket);
  916. return NULL;
  917. }
  918. /* get hardware type for our interface */
  919. memset(&ifr, 0, sizeof(ifr));
  920. strlcpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
  921. if (ioctl(mysocket, SIOCGIFHWADDR, &ifr) < 0) {
  922. close(mysocket);
  923. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Error getting hardware type: %s", strerror(errno));
  924. return NULL;
  925. }
  926. /* make sure it's not loopback (PF_PACKET doesn't support it) */
  927. if (ifr.ifr_hwaddr.sa_family != ARPHRD_ETHER)
  928. warnx("Unsupported physical layer type 0x%04x on %s. Maybe it works, maybe it won't."
  929. " See tickets #123/318",
  930. ifr.ifr_hwaddr.sa_family,
  931. device);
  932. #ifdef SO_BROADCAST
  933. /*
  934. * man 7 socket
  935. *
  936. * Set or get the broadcast flag. When enabled, datagram sockets
  937. * receive packets sent to a broadcast address and they are allowed
  938. * to send packets to a broadcast address. This option has no
  939. * effect on stream-oriented sockets.
  940. */
  941. if (setsockopt(mysocket, SOL_SOCKET, SO_BROADCAST, &n, sizeof(n)) == -1) {
  942. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "SO_BROADCAST: %s", strerror(errno));
  943. close(mysocket);
  944. return NULL;
  945. }
  946. #endif /* SO_BROADCAST */
  947. /* prep & return our sp handle */
  948. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  949. strlcpy(sp->device, device, sizeof(sp->device));
  950. sp->handle.fd = mysocket;
  951. #ifdef HAVE_TX_RING
  952. /* Look up for MTU */
  953. memset(&ifr, 0, sizeof(ifr));
  954. strlcpy(ifr.ifr_name, sp->device, sizeof(ifr.ifr_name));
  955. if (ioctl(mysocket, SIOCGIFMTU, &ifr) < 0) {
  956. close(mysocket);
  957. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Error getting MTU: %s", strerror(errno));
  958. return NULL;
  959. }
  960. mtu = ifr.ifr_ifru.ifru_mtu;
  961. /* Init TX ring for sp->handle.fd socket */
  962. if ((sp->tx_ring = txring_init(sp->handle.fd, mtu)) == 0) {
  963. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "txring_init: %s", strerror(errno));
  964. close(mysocket);
  965. return NULL;
  966. }
  967. sp->handle_type = SP_TYPE_TX_RING;
  968. #else
  969. sp->handle_type = SP_TYPE_PF_PACKET;
  970. #endif
  971. return sp;
  972. }
  973. /**
  974. * get the interface index (necessary for sending packets w/ PF_PACKET)
  975. */
  976. static int
  977. get_iface_index(int fd, const char *device, char *errbuf)
  978. {
  979. struct ifreq ifr;
  980. memset(&ifr, 0, sizeof(ifr));
  981. strlcpy(ifr.ifr_name, (const char *)device, sizeof(ifr.ifr_name));
  982. if (ioctl(fd, SIOCGIFINDEX, &ifr) == -1) {
  983. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "ioctl: %s", strerror(errno));
  984. return (-1);
  985. }
  986. return ifr.ifr_ifindex;
  987. }
  988. /**
  989. * gets the hardware address via Linux's PF packet interface
  990. */
  991. static struct tcpr_ether_addr *
  992. sendpacket_get_hwaddr_pf(sendpacket_t *sp)
  993. {
  994. struct ifreq ifr;
  995. int fd;
  996. assert(sp);
  997. if (!sp->open) {
  998. sendpacket_seterr(sp, "Unable to get hardware address on un-opened sendpacket handle");
  999. return NULL;
  1000. }
  1001. /* create dummy socket for ioctl */
  1002. if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
  1003. sendpacket_seterr(sp, "Unable to open dummy socket for get_hwaddr: %s", strerror(errno));
  1004. return NULL;
  1005. }
  1006. memset(&ifr, 0, sizeof(ifr));
  1007. strlcpy(ifr.ifr_name, sp->device, sizeof(ifr.ifr_name));
  1008. if (ioctl(fd, SIOCGIFHWADDR, (int8_t *)&ifr) < 0) {
  1009. close(fd);
  1010. sendpacket_seterr(sp, "Error getting hardware address: %s", strerror(errno));
  1011. return NULL;
  1012. }
  1013. memcpy(&sp->ether, &ifr.ifr_hwaddr.sa_data, ETHER_ADDR_LEN);
  1014. close(fd);
  1015. return (&sp->ether);
  1016. }
  1017. #endif /* HAVE_PF_PACKET */
  1018. #if defined HAVE_BPF
  1019. /**
  1020. * Inner sendpacket_open() method for using BSD's BPF interface
  1021. */
  1022. static sendpacket_t *
  1023. sendpacket_open_bpf(const char *device, char *errbuf)
  1024. {
  1025. sendpacket_t *sp;
  1026. char bpf_dev[16];
  1027. int dev, mysocket;
  1028. struct ifreq ifr;
  1029. struct bpf_version bv;
  1030. u_int v;
  1031. #if defined(BIOCGHDRCMPLT) && defined(BIOCSHDRCMPLT)
  1032. u_int spoof_eth_src = 1;
  1033. #endif
  1034. assert(device);
  1035. assert(errbuf);
  1036. memset(&ifr, '\0', sizeof(struct ifreq));
  1037. dbg(1, "sendpacket_open_bpf: using BPF");
  1038. /* open socket */
  1039. mysocket = -1;
  1040. for (dev = 0; dev < 512; dev++) {
  1041. memset(bpf_dev, '\0', sizeof(bpf_dev));
  1042. snprintf(bpf_dev, sizeof(bpf_dev), "/dev/bpf%d", dev);
  1043. dbgx(3, "sendpacket_open_bpf: attempting to open %s", bpf_dev);
  1044. if (!access(bpf_dev, F_OK) && (mysocket = open(bpf_dev, O_RDWR, 0)) > 0) {
  1045. dbg(3, "Success!");
  1046. break;
  1047. }
  1048. dbgx(4, "failed with error %s", strerror(errno));
  1049. }
  1050. /* error?? */
  1051. if (mysocket < 0) {
  1052. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to open /dev/bpfX: %s", strerror(errno));
  1053. errbuf[SENDPACKET_ERRBUF_SIZE - 1] = '\0';
  1054. return NULL;
  1055. }
  1056. /* get BPF version */
  1057. if (ioctl(mysocket, BIOCVERSION, (caddr_t)&bv) < 0) {
  1058. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to get bpf version: %s", strerror(errno));
  1059. return NULL;
  1060. }
  1061. if (bv.bv_major != BPF_MAJOR_VERSION || bv.bv_minor != BPF_MINOR_VERSION) {
  1062. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Kernel's bpf version is out of date.");
  1063. return NULL;
  1064. }
  1065. /* attach to device */
  1066. strlcpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
  1067. if (ioctl(mysocket, BIOCSETIF, (caddr_t)&ifr) < 0) {
  1068. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to bind %s to %s: %s", bpf_dev, device, strerror(errno));
  1069. return NULL;
  1070. }
  1071. /* get datalink type */
  1072. if (ioctl(mysocket, BIOCGDLT, (caddr_t)&v) < 0) {
  1073. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to get datalink type: %s", strerror(errno));
  1074. return NULL;
  1075. }
  1076. /*
  1077. * NetBSD and FreeBSD BPF have an ioctl for enabling/disabling
  1078. * automatic filling of the link level source address.
  1079. */
  1080. #if defined(BIOCGHDRCMPLT) && defined(BIOCSHDRCMPLT)
  1081. if (ioctl(mysocket, BIOCSHDRCMPLT, &spoof_eth_src) == -1) {
  1082. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to enable spoofing src MAC: %s", strerror(errno));
  1083. return NULL;
  1084. }
  1085. #endif
  1086. /* allocate our sp handle, and return it */
  1087. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  1088. strlcpy(sp->device, device, sizeof(sp->device));
  1089. sp->handle.fd = mysocket;
  1090. sp->handle_type = SP_TYPE_BPF;
  1091. return sp;
  1092. }
  1093. /**
  1094. * Get the interface hardware MAC address when using BPF
  1095. */
  1096. static struct tcpr_ether_addr *
  1097. sendpacket_get_hwaddr_bpf(sendpacket_t *sp)
  1098. {
  1099. int mib[6];
  1100. size_t len;
  1101. int8_t *buf, *next, *end;
  1102. struct if_msghdr *ifm;
  1103. struct sockaddr_dl *sdl;
  1104. assert(sp);
  1105. mib[0] = CTL_NET;
  1106. mib[1] = AF_ROUTE;
  1107. mib[2] = 0;
  1108. mib[3] = AF_LINK;
  1109. mib[4] = NET_RT_IFLIST;
  1110. mib[5] = 0;
  1111. if (sysctl(mib, 6, NULL, &len, NULL, 0) == -1) {
  1112. sendpacket_seterr(sp, "%s(): sysctl(): %s", __func__, strerror(errno));
  1113. return NULL;
  1114. }
  1115. buf = (int8_t *)safe_malloc(len);
  1116. if (sysctl(mib, 6, buf, &len, NULL, 0) == -1) {
  1117. sendpacket_seterr(sp, "%s(): sysctl(): %s", __func__, strerror(errno));
  1118. safe_free(buf);
  1119. return NULL;
  1120. }
  1121. end = buf + len;
  1122. for (next = buf; next < end; next += ifm->ifm_msglen) {
  1123. ifm = (struct if_msghdr *)next;
  1124. if (ifm->ifm_type == RTM_IFINFO) {
  1125. sdl = (struct sockaddr_dl *)(ifm + 1);
  1126. if (strncmp(&sdl->sdl_data[0], sp->device, sdl->sdl_len) == 0) {
  1127. memcpy(&sp->ether, LLADDR(sdl), ETHER_ADDR_LEN);
  1128. break;
  1129. }
  1130. }
  1131. }
  1132. safe_free(buf);
  1133. return (&sp->ether);
  1134. }
  1135. #endif /* HAVE_BPF */
  1136. /**
  1137. * Get the DLT type of the opened sendpacket
  1138. * Return -1 if we can't figure it out, else return the DLT_ value
  1139. */
  1140. int
  1141. sendpacket_get_dlt(sendpacket_t *sp)
  1142. {
  1143. int dlt = DLT_EN10MB;
  1144. switch (sp->handle_type) {
  1145. case SP_TYPE_KHIAL:
  1146. case SP_TYPE_NETMAP:
  1147. case SP_TYPE_TUNTAP:
  1148. case SP_TYPE_LIBXDP:
  1149. case SP_TYPE_LIBPCAP_DUMP:
  1150. /* always EN10MB */
  1151. return dlt;
  1152. default:;
  1153. }
  1154. #if defined HAVE_BPF
  1155. if ((ioctl(sp->handle.fd, BIOCGDLT, &dlt)) < 0) {
  1156. warnx("Unable to get DLT value for BPF device (%s): %s", sp->device, strerror(errno));
  1157. return (-1);
  1158. }
  1159. #elif defined HAVE_PF_PACKET || defined HAVE_LIBDNET
  1160. /* use libpcap to get dlt */
  1161. pcap_t *pcap;
  1162. char errbuf[PCAP_ERRBUF_SIZE];
  1163. if ((pcap = pcap_open_live(sp->device, 65535, 0, 0, errbuf)) == NULL) {
  1164. warnx("Unable to get DLT value for %s: %s", sp->device, errbuf);
  1165. return (-1);
  1166. }
  1167. dlt = pcap_datalink(pcap);
  1168. pcap_close(pcap);
  1169. #elif defined HAVE_PCAP_SENDPACKET || defined HAVE_PCAP_INJECT
  1170. dlt = pcap_datalink(sp->handle.pcap);
  1171. #endif
  1172. return dlt;
  1173. }
  1174. /**
  1175. * \brief Returns a string of the name of the injection method being used
  1176. */
  1177. const char *
  1178. sendpacket_get_method(sendpacket_t *sp)
  1179. {
  1180. if (sp == NULL) {
  1181. return INJECT_METHOD;
  1182. } else if (sp->handle_type == SP_TYPE_KHIAL) {
  1183. return "khial";
  1184. } else if (sp->handle_type == SP_TYPE_NETMAP) {
  1185. return "netmap";
  1186. } else {
  1187. return INJECT_METHOD;
  1188. }
  1189. }
  1190. /**
  1191. * Opens a character device for injecting packets directly into
  1192. * your kernel via a custom driver
  1193. */
  1194. static sendpacket_t *
  1195. sendpacket_open_khial(const char *device, char *errbuf)
  1196. {
  1197. int mysocket;
  1198. sendpacket_t *sp;
  1199. assert(device);
  1200. assert(errbuf);
  1201. if ((mysocket = open(device, O_WRONLY | O_EXCL)) < 0) {
  1202. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening khial device: %s", strerror(errno));
  1203. return NULL;
  1204. }
  1205. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  1206. strlcpy(sp->device, device, sizeof(sp->device));
  1207. sp->handle.fd = mysocket;
  1208. sp->handle_type = SP_TYPE_KHIAL;
  1209. return sp;
  1210. }
  1211. /**
  1212. * Get the hardware MAC address for the given interface using khial
  1213. */
  1214. static struct tcpr_ether_addr *
  1215. sendpacket_get_hwaddr_khial(sendpacket_t *sp)
  1216. {
  1217. assert(sp);
  1218. sendpacket_seterr(sp, "Error: sendpacket_get_hwaddr() not yet supported for character devices");
  1219. return NULL;
  1220. }
  1221. /**
  1222. * \brief Cause the currently running sendpacket() call to stop
  1223. */
  1224. void
  1225. sendpacket_abort(sendpacket_t *sp)
  1226. {
  1227. assert(sp);
  1228. sp->abort = true;
  1229. }
  1230. #ifdef HAVE_LIBXDP
  1231. static struct xsk_socket_info *
  1232. xsk_configure_socket(struct xsk_umem_info *umem, struct xsk_socket_config *cfg, int queue_id, const char *device)
  1233. {
  1234. struct xsk_socket_info *xsk;
  1235. struct xsk_ring_cons *rxr = NULL;
  1236. int ret;
  1237. xsk = (struct xsk_socket_info *)safe_malloc(sizeof(struct xsk_socket_info));
  1238. xsk->umem = umem;
  1239. ret = xsk_socket__create(&xsk->xsk, device, queue_id, umem->umem, rxr, &xsk->tx, cfg);
  1240. if (ret) {
  1241. return NULL;
  1242. }
  1243. memset(&xsk->app_stats, 0, sizeof(xsk->app_stats));
  1244. return xsk;
  1245. }
  1246. static sendpacket_t *
  1247. sendpacket_open_xsk(const char *device, char *errbuf)
  1248. {
  1249. sendpacket_t *sp;
  1250. assert(device);
  1251. assert(errbuf);
  1252. int nb_of_frames = 4096;
  1253. int frame_size = 4096;
  1254. int nb_of_completion_queue_desc = 4096;
  1255. int nb_of_fill_queue_desc = 4096;
  1256. struct xsk_umem_info *umem_info =
  1257. create_umem_area(nb_of_frames, frame_size, nb_of_completion_queue_desc, nb_of_fill_queue_desc);
  1258. if (umem_info == NULL) {
  1259. return NULL;
  1260. }
  1261. int nb_of_tx_queue_desc = 4096;
  1262. int nb_of_rx_queue_desc = 4096;
  1263. u_int32_t queue_id = 0;
  1264. struct xsk_socket_info *xsk_info =
  1265. create_xsk_socket(umem_info, nb_of_tx_queue_desc, nb_of_rx_queue_desc, device, queue_id, errbuf);
  1266. if (xsk_info == NULL) {
  1267. safe_free(umem_info->buffer);
  1268. safe_free(umem_info);
  1269. return NULL;
  1270. }
  1271. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  1272. strlcpy(sp->device, device, sizeof(sp->device));
  1273. sp->handle.fd = xsk_info->xsk->fd;
  1274. sp->handle_type = SP_TYPE_LIBXDP;
  1275. sp->xsk_info = xsk_info;
  1276. sp->umem_info = umem_info;
  1277. sp->frame_size = frame_size;
  1278. sp->tx_size = nb_of_tx_queue_desc;
  1279. return sp;
  1280. }
  1281. struct xsk_umem_info *
  1282. create_umem_area(int nb_of_frames, int frame_size, int nb_of_completion_queue_descs, int nb_of_fill_queue_descs)
  1283. {
  1284. int umem_size = nb_of_frames * frame_size;
  1285. struct xsk_umem_info *umem;
  1286. void *umem_area = NULL;
  1287. struct xsk_umem_config cfg = {/* We recommend that you set the fill ring size >= HW RX ring size +
  1288. * AF_XDP RX ring size. Make sure you fill up the fill ring
  1289. * with buffers at regular intervals, and you will with this setting
  1290. * avoid allocation failures in the driver. These are usually quite
  1291. * expensive since drivers have not been written to assume that
  1292. * allocation failures are common. For regular sockets, kernel
  1293. * allocated memory is used that only runs out in OOM situations
  1294. * that should be rare.
  1295. */
  1296. .fill_size = nb_of_fill_queue_descs * 2,
  1297. .comp_size = nb_of_completion_queue_descs,
  1298. .frame_size = frame_size,
  1299. .frame_headroom = 0,
  1300. .flags = XDP_UMEM_UNALIGNED_CHUNK_FLAG};
  1301. umem = (struct xsk_umem_info *)safe_malloc(sizeof(struct xsk_umem_info));
  1302. if (posix_memalign(&umem_area,
  1303. getpagesize(), /* PAGE_SIZE aligned */
  1304. umem_size)) {
  1305. fprintf(stderr, "ERROR: Can't allocate buffer memory \"%s\"\n", strerror(errno));
  1306. exit(EXIT_FAILURE);
  1307. }
  1308. int ret = xsk_umem__create(&umem->umem, umem_area, umem_size, &umem->fq, &umem->cq, &cfg);
  1309. umem->buffer = umem_area;
  1310. if (ret != 0) {
  1311. return NULL;
  1312. }
  1313. return umem;
  1314. }
  1315. struct xsk_socket_info *
  1316. create_xsk_socket(struct xsk_umem_info *umem_info,
  1317. int nb_of_tx_queue_desc,
  1318. int nb_of_rx_queue_desc,
  1319. const char *device,
  1320. u_int32_t queue_id,
  1321. char *errbuf)
  1322. {
  1323. struct xsk_socket_info *xsk_info;
  1324. struct xsk_socket_config *socket_config = (struct xsk_socket_config *)safe_malloc(sizeof(struct xsk_socket_config));
  1325. socket_config->rx_size = nb_of_rx_queue_desc;
  1326. socket_config->tx_size = nb_of_tx_queue_desc;
  1327. socket_config->libbpf_flags = XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD;
  1328. socket_config->bind_flags = 0; // XDP_FLAGS_SKB_MODE (1U << 1) or XDP_FLAGS_DRV_MODE (1U << 2)
  1329. xsk_info = xsk_configure_socket(umem_info, socket_config, queue_id, device);
  1330. safe_free(socket_config);
  1331. if (xsk_info == NULL) {
  1332. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "AF_XDP socket configuration is not successful: %s", strerror(errno));
  1333. return NULL;
  1334. }
  1335. return xsk_info;
  1336. }
  1337. /*
  1338. * gets the hardware address via Linux's PF packet interface
  1339. */
  1340. static _U_ struct tcpr_ether_addr *
  1341. sendpacket_get_hwaddr_libxdp(sendpacket_t *sp)
  1342. {
  1343. struct ifreq ifr;
  1344. int fd;
  1345. assert(sp);
  1346. if (!sp->open) {
  1347. sendpacket_seterr(sp, "Unable to get hardware address on un-opened sendpacket handle");
  1348. return NULL;
  1349. }
  1350. /* create dummy socket for ioctl */
  1351. if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
  1352. sendpacket_seterr(sp, "Unable to open dummy socket for get_hwaddr: %s", strerror(errno));
  1353. return NULL;
  1354. }
  1355. memset(&ifr, 0, sizeof(ifr));
  1356. strlcpy(ifr.ifr_name, sp->device, sizeof(ifr.ifr_name));
  1357. if (ioctl(fd, SIOCGIFHWADDR, (int8_t *)&ifr) < 0) {
  1358. close(fd);
  1359. sendpacket_seterr(sp, "Error getting hardware address: %s", strerror(errno));
  1360. return NULL;
  1361. }
  1362. memcpy(&sp->ether, &ifr.ifr_hwaddr.sa_data, ETHER_ADDR_LEN);
  1363. close(fd);
  1364. return (&sp->ether);
  1365. }
  1366. #endif /* HAVE_LIBXDP */