sendpacket.c 39 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335
  1. /* $Id$ */
  2. /*
  3. * Copyright (c) 2001-2010 Aaron Turner <aturner at synfin dot net>
  4. * Copyright (c) 2013-2022 Fred Klassen <tcpreplay at appneta dot com> - AppNeta
  5. *
  6. * The Tcpreplay Suite of tools is free software: you can redistribute it
  7. * and/or modify it under the terms of the GNU General Public License as
  8. * published by the Free Software Foundation, either version 3 of the
  9. * License, or with the authors permission any later version.
  10. *
  11. * The Tcpreplay Suite is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with the Tcpreplay Suite. If not, see <http://www.gnu.org/licenses/>.
  18. */
  19. /* sendpacket.[ch] is my attempt to write a universal packet injection
  20. * API for BPF, libpcap, libdnet, and Linux's PF_PACKET. I got sick
  21. * and tired dealing with libnet bugs and its lack of active maintenance,
  22. * but unfortunately, libpcap frame injection support is relatively new
  23. * and not everyone uses Linux, so I decided to support all four as
  24. * best as possible. If your platform/OS/hardware supports an additional
  25. * injection method, then by all means add it here (and send me a patch).
  26. *
  27. * Anyways, long story short, for now the order of preference is:
  28. * 1. TX_RING
  29. * 2. PF_PACKET
  30. * 3. BPF
  31. * 4. libdnet
  32. * 5. pcap_inject()
  33. * 6. pcap_sendpacket()
  34. *
  35. * Right now, one big problem with the pcap_* methods is that libpcap
  36. * doesn't provide a reliable method of getting the MAC address of
  37. * an interface (required for tcpbridge).
  38. * You can use PF_PACKET or BPF to get that, but if your system supports
  39. * those, might as well inject directly without going through another
  40. * level of indirection.
  41. *
  42. * Please note that some of this code was copied from Libnet 1.1.3
  43. */
  44. #include <string.h>
  45. #include <errno.h>
  46. #include <stdarg.h>
  47. #include <stdio.h>
  48. #include <sys/types.h>
  49. #include <sys/time.h>
  50. #include <sys/ioctl.h>
  51. #include <sys/file.h>
  52. #include <sys/socket.h>
  53. #include "config.h"
  54. #include "defines.h"
  55. #include "common.h"
  56. #include "sendpacket.h"
  57. #ifdef FORCE_INJECT_TX_RING
  58. /* TX_RING uses PF_PACKET API so don't undef it here */
  59. #undef HAVE_LIBDNET
  60. #undef HAVE_PCAP_INJECT
  61. #undef HAVE_PCAP_SENDPACKET
  62. #undef HAVE_BPF
  63. #endif
  64. #ifdef FORCE_INJECT_PF_PACKET
  65. #undef HAVE_TX_RING
  66. #undef HAVE_LIBDNET
  67. #undef HAVE_PCAP_INJECT
  68. #undef HAVE_PCAP_SENDPACKET
  69. #undef HAVE_BPF
  70. #endif
  71. #ifdef FORCE_INJECT_LIBDNET
  72. #undef HAVE_TX_RING
  73. #undef HAVE_PF_PACKET
  74. #undef HAVE_PCAP_INJECT
  75. #undef HAVE_PCAP_SENDPACKET
  76. #undef HAVE_BPF
  77. #endif
  78. #ifdef FORCE_INJECT_BPF
  79. #undef HAVE_TX_RING
  80. #undef HAVE_LIBDNET
  81. #undef HAVE_PCAP_INJECT
  82. #undef HAVE_PCAP_SENDPACKET
  83. #undef HAVE_PF_PACKET
  84. #endif
  85. #ifdef FORCE_INJECT_PCAP_INJECT
  86. #undef HAVE_TX_RING
  87. #undef HAVE_LIBDNET
  88. #undef HAVE_PCAP_SENDPACKET
  89. #undef HAVE_BPF
  90. #undef HAVE_PF_PACKET
  91. #endif
  92. #ifdef FORCE_INJECT_PCAP_SENDPACKET
  93. #undef HAVE_TX_RING
  94. #undef HAVE_LIBDNET
  95. #undef HAVE_PCAP_INJECT
  96. #undef HAVE_BPF
  97. #undef HAVE_PF_PACKET
  98. #endif
  99. #if (defined HAVE_WINPCAP && defined HAVE_PCAP_INJECT)
  100. #undef HAVE_PCAP_INJECT /* configure returns true for some odd reason */
  101. #endif
  102. #if !defined HAVE_PCAP_INJECT && !defined HAVE_PCAP_SENDPACKET && !defined HAVE_LIBDNET && !defined HAVE_PF_PACKET && !defined HAVE_BPF && !defined TX_RING
  103. #error You need pcap_inject() or pcap_sendpacket() from libpcap, libdnet, Linux's PF_PACKET/TX_RING or *BSD's BPF
  104. #endif
  105. #ifdef HAVE_SYS_PARAM_H
  106. #include <sys/param.h>
  107. #endif
  108. #ifdef HAVE_SYS_SYSCTL_H
  109. #include <sys/sysctl.h>
  110. #endif
  111. #ifdef HAVE_NET_ROUTE_H
  112. #include <net/route.h>
  113. #endif
  114. #include <stdlib.h>
  115. #include <unistd.h>
  116. #ifdef HAVE_PF_PACKET
  117. #undef INJECT_METHOD
  118. /* give priority to TX_RING */
  119. #ifndef HAVE_TX_RING
  120. #define INJECT_METHOD "PF_PACKET send()"
  121. #else
  122. #define INJECT_METHOD "PF_PACKET / TX_RING"
  123. #endif
  124. #include <fcntl.h>
  125. #include <sys/utsname.h>
  126. #include <net/if.h>
  127. #include <netinet/in.h>
  128. #include <net/if_arp.h>
  129. #include <netpacket/packet.h>
  130. #ifdef HAVE_TX_RING
  131. #include "txring.h"
  132. #endif
  133. static sendpacket_t *sendpacket_open_pf(const char *, char *);
  134. static struct tcpr_ether_addr *sendpacket_get_hwaddr_pf(sendpacket_t *);
  135. static int get_iface_index(int fd, const char *device, char *);
  136. #endif /* HAVE_PF_PACKET */
  137. #ifdef HAVE_TUNTAP
  138. #ifdef HAVE_LINUX
  139. #include <net/if.h>
  140. #include <linux/if_tun.h>
  141. #elif defined(HAVE_FREEBSD)
  142. #define TUNTAP_DEVICE_PREFIX "/dev/"
  143. #endif
  144. static sendpacket_t *sendpacket_open_tuntap(const char *, char *);
  145. #endif
  146. #if defined HAVE_BPF && ! defined INJECT_METHOD
  147. #undef INJECT_METHOD
  148. #define INJECT_METHOD "bpf send()"
  149. #include <net/bpf.h>
  150. #include <sys/sysctl.h>
  151. #include <net/route.h>
  152. #include <net/if.h>
  153. #include <sys/uio.h>
  154. #include <net/if_dl.h> // used for get_hwaddr_bpf()
  155. static sendpacket_t *sendpacket_open_bpf(const char *, char *) _U_;
  156. static struct tcpr_ether_addr *sendpacket_get_hwaddr_bpf(sendpacket_t *) _U_;
  157. #endif /* HAVE_BPF */
  158. #if defined HAVE_LIBDNET && ! defined INJECT_METHOD
  159. #undef INJECT_METHOD
  160. #define INJECT_METHOD "libdnet eth_send()"
  161. /* need to undef these which are pulled in via defines.h, prior to importing dnet.h */
  162. #undef icmp_id
  163. #undef icmp_seq
  164. #undef icmp_data
  165. #undef icmp_mask
  166. #ifdef HAVE_DNET_H
  167. #include <dnet.h>
  168. #endif
  169. #ifdef HAVE_DUMBNET_H
  170. #include <dumbnet.h>
  171. #endif
  172. static sendpacket_t *sendpacket_open_libdnet(const char *, char *) _U_;
  173. static struct tcpr_ether_addr *sendpacket_get_hwaddr_libdnet(sendpacket_t *) _U_;
  174. #endif /* HAVE_LIBDNET */
  175. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET) && !(defined HAVE_PF_PACKET || defined BPF || defined HAVE_LIBDNET)
  176. static sendpacket_t *sendpacket_open_pcap(const char *, char *) _U_;
  177. static struct tcpr_ether_addr *sendpacket_get_hwaddr_pcap(sendpacket_t *) _U_;
  178. #endif /* HAVE_PCAP_INJECT || HAVE_PACKET_SENDPACKET */
  179. #if defined HAVE_PCAP_INJECT && ! defined INJECT_METHOD
  180. #undef INJECT_METHOD
  181. #define INJECT_METHOD "pcap_inject()"
  182. #elif defined HAVE_PCAP_SENDPACKET && ! defined INJECT_METHOD
  183. #undef INJECT_METHOD
  184. #define INJECT_METHOD "pcap_sendpacket()"
  185. #endif
  186. static void sendpacket_seterr(sendpacket_t *sp, const char *fmt, ...);
  187. static sendpacket_t * sendpacket_open_khial(const char *, char *) _U_;
  188. static struct tcpr_ether_addr * sendpacket_get_hwaddr_khial(sendpacket_t *) _U_;
  189. /**
  190. * returns number of bytes sent on success or -1 on error
  191. * Note: it is theoretically possible to get a return code >0 and < len
  192. * which for most people would be considered an error (the packet wasn't fully sent)
  193. * so you may want to test for recode != len too.
  194. *
  195. * Most socket API's have two interesting errors: ENOBUFS & EAGAIN. ENOBUFS
  196. * is usually due to the kernel buffers being full. EAGAIN happens when you
  197. * try to send traffic faster then the PHY allows.
  198. */
  199. int
  200. sendpacket(sendpacket_t *sp, const u_char *data, size_t len, struct pcap_pkthdr *pkthdr)
  201. {
  202. int retcode = 0, val;
  203. static u_char buffer[10000]; /* 10K bytes, enough for jumbo frames + pkthdr
  204. * larger than page size so made static to
  205. * prevent page misses on stack
  206. */
  207. static const size_t buffer_payload_size = sizeof(buffer) + sizeof(struct pcap_pkthdr);
  208. assert(sp);
  209. assert(data);
  210. if (len == 0)
  211. return -1;
  212. TRY_SEND_AGAIN:
  213. sp->attempt ++;
  214. switch (sp->handle_type) {
  215. case SP_TYPE_KHIAL:
  216. memcpy(buffer, pkthdr, sizeof(struct pcap_pkthdr));
  217. memcpy(buffer + sizeof(struct pcap_pkthdr), data, min(len, buffer_payload_size));
  218. /* tell the kernel module which direction the traffic is going */
  219. if (sp->cache_dir == TCPR_DIR_C2S) { /* aka PRIMARY */
  220. val = KHIAL_DIRECTION_RX;
  221. if (ioctl(sp->handle.fd, KHIAL_SET_DIRECTION, (void *)&val) < 0) {
  222. sendpacket_seterr(sp, "Error setting direction on %s: %s (%d)",
  223. sp->device, strerror(errno), errno);
  224. return -1;
  225. }
  226. } else if (sp->cache_dir == TCPR_DIR_S2C) {
  227. val = KHIAL_DIRECTION_TX;
  228. if (ioctl(sp->handle.fd, KHIAL_SET_DIRECTION, (void *)&val) < 0) {
  229. sendpacket_seterr(sp, "Error setting direction on %s: %s (%d)",
  230. sp->device, strerror(errno), errno);
  231. return -1;
  232. }
  233. }
  234. /* write the pkthdr + packet data all at once */
  235. retcode = write(sp->handle.fd, (void *)buffer, sizeof(struct pcap_pkthdr) + len);
  236. retcode -= sizeof(struct pcap_pkthdr); /* only record packet bytes we sent, not pcap data too */
  237. if (retcode < 0 && !sp->abort) {
  238. switch(errno) {
  239. case EAGAIN:
  240. sp->retry_eagain ++;
  241. goto TRY_SEND_AGAIN;
  242. break;
  243. case ENOBUFS:
  244. sp->retry_enobufs ++;
  245. goto TRY_SEND_AGAIN;
  246. break;
  247. default:
  248. sendpacket_seterr(sp, "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  249. "khial", sp->sent + sp->failed + 1, strerror(errno), errno);
  250. }
  251. break;
  252. }
  253. break;
  254. case SP_TYPE_TUNTAP:
  255. retcode = write(sp->handle.fd, (void *)data, len);
  256. break;
  257. /* Linux PF_PACKET and TX_RING */
  258. case SP_TYPE_PF_PACKET:
  259. case SP_TYPE_TX_RING:
  260. #if defined HAVE_PF_PACKET
  261. #ifdef HAVE_TX_RING
  262. retcode = (int)txring_put(sp->tx_ring, data, len);
  263. #else
  264. retcode = (int)send(sp->handle.fd, (void *)data, len, 0);
  265. #endif
  266. /* out of buffers, or hit max PHY speed, silently retry
  267. * as long as we're not told to abort
  268. */
  269. if (retcode < 0 && !sp->abort) {
  270. switch (errno) {
  271. case EAGAIN:
  272. sp->retry_eagain ++;
  273. goto TRY_SEND_AGAIN;
  274. break;
  275. case ENOBUFS:
  276. sp->retry_enobufs ++;
  277. goto TRY_SEND_AGAIN;
  278. break;
  279. default:
  280. sendpacket_seterr(sp, "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  281. INJECT_METHOD, sp->sent + sp->failed + 1, strerror(errno), errno);
  282. }
  283. }
  284. #endif /* HAVE_PF_PACKET */
  285. break;
  286. /* BPF */
  287. case SP_TYPE_BPF:
  288. #if defined HAVE_BPF
  289. retcode = write(sp->handle.fd, (void *)data, len);
  290. /* out of buffers, or hit max PHY speed, silently retry */
  291. if (retcode < 0 && !sp->abort) {
  292. switch (errno) {
  293. case EAGAIN:
  294. sp->retry_eagain ++;
  295. goto TRY_SEND_AGAIN;
  296. break;
  297. case ENOBUFS:
  298. sp->retry_enobufs ++;
  299. goto TRY_SEND_AGAIN;
  300. break;
  301. default:
  302. sendpacket_seterr(sp, "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  303. INJECT_METHOD, sp->sent + sp->failed + 1, strerror(errno), errno);
  304. }
  305. }
  306. #endif
  307. break;
  308. /* Libdnet */
  309. case SP_TYPE_LIBDNET:
  310. #if defined HAVE_LIBDNET
  311. retcode = eth_send(sp->handle.ldnet, (void*)data, (size_t)len);
  312. /* out of buffers, or hit max PHY speed, silently retry */
  313. if (retcode < 0 && !sp->abort) {
  314. switch (errno) {
  315. case EAGAIN:
  316. sp->retry_eagain ++;
  317. goto TRY_SEND_AGAIN;
  318. break;
  319. case ENOBUFS:
  320. sp->retry_enobufs ++;
  321. goto TRY_SEND_AGAIN;
  322. break;
  323. default:
  324. sendpacket_seterr(sp, "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  325. INJECT_METHOD, sp->sent + sp->failed + 1, strerror(errno), errno);
  326. }
  327. }
  328. #endif
  329. break;
  330. case SP_TYPE_LIBPCAP:
  331. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  332. #if defined HAVE_PCAP_INJECT
  333. /*
  334. * pcap methods don't seem to support ENOBUFS, so we just straight fail
  335. * is there a better way???
  336. */
  337. retcode = pcap_inject(sp->handle.pcap, (void*)data, len);
  338. #elif defined HAVE_PCAP_SENDPACKET
  339. retcode = pcap_sendpacket(sp->handle.pcap, data, (int)len);
  340. #endif
  341. /* out of buffers, or hit max PHY speed, silently retry */
  342. if (retcode < 0 && !sp->abort) {
  343. switch (errno) {
  344. case EAGAIN:
  345. sp->retry_eagain ++;
  346. goto TRY_SEND_AGAIN;
  347. break;
  348. case ENOBUFS:
  349. sp->retry_enobufs ++;
  350. goto TRY_SEND_AGAIN;
  351. break;
  352. default:
  353. sendpacket_seterr(sp, "Error with %s [" COUNTER_SPEC "]: %s (errno = %d)",
  354. INJECT_METHOD, sp->sent + sp->failed + 1, pcap_geterr(sp->handle.pcap), errno);
  355. }
  356. }
  357. #if defined HAVE_PCAP_SENDPACKET
  358. /*
  359. * pcap_sendpacket returns 0 on success, not the packet length!
  360. * hence, we have to fix retcode to be more standard on success
  361. */
  362. if (retcode == 0)
  363. retcode = len;
  364. #endif /* HAVE_PCAP_SENDPACKET */
  365. #endif /* HAVE_PCAP_INJECT || HAVE_PCAP_SENDPACKET */
  366. break;
  367. case SP_TYPE_NETMAP:
  368. #ifdef HAVE_NETMAP
  369. retcode = sendpacket_send_netmap(sp, data, len);
  370. if (retcode == -1) {
  371. sendpacket_seterr(sp, "interface hung!!");
  372. } else if (retcode == -2) {
  373. /* this indicates that a retry was requested - this is not a failure */
  374. sp->retry_eagain ++;
  375. retcode = 0;
  376. #ifdef HAVE_SCHED_H
  377. /* yield the CPU so other apps remain responsive */
  378. sched_yield();
  379. #endif
  380. goto TRY_SEND_AGAIN;
  381. }
  382. #endif /* HAVE_NETMAP */
  383. break;
  384. default:
  385. errx(-1, "Unsupported sp->handle_type = %d", sp->handle_type);
  386. } /* end case */
  387. if (retcode < 0) {
  388. sp->failed ++;
  389. } else if (sp->abort) {
  390. sendpacket_seterr(sp, "User abort");
  391. } else if (retcode != (int)len) {
  392. sendpacket_seterr(sp, "Only able to write %d bytes out of %u bytes total",
  393. retcode, len);
  394. sp->trunc_packets ++;
  395. } else {
  396. sp->bytes_sent += len;
  397. sp->sent ++;
  398. }
  399. return retcode;
  400. }
  401. /**
  402. * Open the given network device name and returns a sendpacket_t struct
  403. * pass the error buffer (in case there's a problem) and the direction
  404. * that this interface represents
  405. */
  406. sendpacket_t *
  407. sendpacket_open(const char *device, char *errbuf, tcpr_dir_t direction,
  408. sendpacket_type_t sendpacket_type _U_, void *arg _U_)
  409. {
  410. #ifdef HAVE_TUNTAP
  411. char sys_dev_dir[128];
  412. bool device_exists;
  413. #endif
  414. sendpacket_t *sp;
  415. struct stat sdata;
  416. assert(device);
  417. assert(errbuf);
  418. errbuf[0] = '\0';
  419. #ifdef HAVE_TUNTAP
  420. snprintf(sys_dev_dir, sizeof(sys_dev_dir), "/sys/class/net/%s/", device);
  421. device_exists = access(sys_dev_dir, R_OK) == 0;
  422. #endif
  423. /* khial is universal */
  424. if (stat(device, &sdata) == 0) {
  425. if (((sdata.st_mode & S_IFMT) == S_IFCHR)) {
  426. sp = sendpacket_open_khial(device, errbuf);
  427. } else {
  428. switch (sdata.st_mode & S_IFMT) {
  429. case S_IFBLK:
  430. errx(-1, "\"%s\" is a block device and is not a valid Tcpreplay device",
  431. device);
  432. break;
  433. case S_IFDIR:
  434. errx(-1, "\"%s\" is a directory and is not a valid Tcpreplay device",
  435. device);
  436. break;
  437. case S_IFIFO:
  438. errx(-1, "\"%s\" is a FIFO and is not a valid Tcpreplay device",
  439. device);
  440. break;
  441. case S_IFLNK:
  442. errx(-1, "\"%s\" is a symbolic link and is not a valid Tcpreplay device",
  443. device);
  444. break;
  445. case S_IFREG:
  446. errx(-1, "\"%s\" is a file and is not a valid Tcpreplay device",
  447. device);
  448. break;
  449. default:
  450. errx(-1, "\"%s\" is not a valid Tcpreplay device",
  451. device);
  452. break;
  453. }
  454. }
  455. #ifdef HAVE_TUNTAP
  456. } else if (strncmp(device, "tap", 3) == 0 && !device_exists) {
  457. sp = sendpacket_open_tuntap(device, errbuf);
  458. #endif
  459. } else {
  460. #ifdef HAVE_NETMAP
  461. if (sendpacket_type == SP_TYPE_NETMAP)
  462. sp = (sendpacket_t*)sendpacket_open_netmap(device, errbuf, arg);
  463. else
  464. #endif
  465. #if defined HAVE_PF_PACKET
  466. sp = sendpacket_open_pf(device, errbuf);
  467. #elif defined HAVE_BPF
  468. sp = sendpacket_open_bpf(device, errbuf);
  469. #elif defined HAVE_LIBDNET
  470. sp = sendpacket_open_libdnet(device, errbuf);
  471. #elif (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  472. sp = sendpacket_open_pcap(device, errbuf);
  473. #else
  474. #error "No defined packet injection method for sendpacket_open()"
  475. #endif
  476. }
  477. if (sp) {
  478. sp->open = 1;
  479. sp->cache_dir = direction;
  480. } else {
  481. errx(-1, "failed to open device %s: %s", device, errbuf);
  482. }
  483. return sp;
  484. }
  485. /**
  486. * Get packet stats for the given sendpacket_t
  487. */
  488. size_t
  489. sendpacket_getstat(sendpacket_t *sp, char *buf, size_t buf_size)
  490. {
  491. size_t offset;
  492. assert(sp);
  493. assert(buf);
  494. memset(buf, 0, buf_size);
  495. offset = snprintf(buf, buf_size, "Statistics for network device: %s\n"
  496. "\tSuccessful packets: " COUNTER_SPEC "\n"
  497. "\tFailed packets: " COUNTER_SPEC "\n"
  498. "\tTruncated packets: " COUNTER_SPEC "\n"
  499. "\tRetried packets (ENOBUFS): " COUNTER_SPEC "\n"
  500. "\tRetried packets (EAGAIN): " COUNTER_SPEC "\n",
  501. sp->device, sp->sent, sp->failed, sp->trunc_packets,
  502. sp->retry_enobufs, sp->retry_eagain);
  503. if (sp->flow_packets && offset > 0) {
  504. offset += snprintf(&buf[offset], buf_size - offset,
  505. "\tFlows total: " COUNTER_SPEC "\n"
  506. "\tFlows unique: " COUNTER_SPEC "\n"
  507. "\tFlows expired: " COUNTER_SPEC "\n"
  508. "\tFlow packets: " COUNTER_SPEC "\n"
  509. "\tNon-flow packets: " COUNTER_SPEC "\n"
  510. "\tInvalid flow packets: " COUNTER_SPEC "\n",
  511. sp->flows, sp->flows_expired, sp->flows_expired, sp->flow_packets,
  512. sp->flow_non_flow_packets, sp->flows_invalid_packets);
  513. }
  514. return offset;
  515. }
  516. /**
  517. * close the given sendpacket
  518. */
  519. void
  520. sendpacket_close(sendpacket_t *sp)
  521. {
  522. assert(sp);
  523. switch(sp->handle_type) {
  524. case SP_TYPE_KHIAL:
  525. close(sp->handle.fd);
  526. break;
  527. case SP_TYPE_BPF:
  528. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  529. close(sp->handle.fd);
  530. #endif
  531. break;
  532. case SP_TYPE_PF_PACKET:
  533. case SP_TYPE_TX_RING:
  534. #ifdef HAVE_PF_PACKET
  535. close(sp->handle.fd);
  536. #endif
  537. break;
  538. case SP_TYPE_LIBPCAP:
  539. #ifdef HAVE_LIBPCAP
  540. pcap_close(sp->handle.pcap);
  541. #endif
  542. break;
  543. case SP_TYPE_LIBDNET:
  544. #ifdef HAVE_LIBDNET
  545. eth_close(sp->handle.ldnet);
  546. #endif
  547. break;
  548. case SP_TYPE_LIBNET:
  549. err(-1, "Libnet is no longer supported!");
  550. break;
  551. case SP_TYPE_NETMAP:
  552. #ifdef HAVE_NETMAP
  553. sendpacket_close_netmap(sp);
  554. #endif /* HAVE_NETMAP */
  555. break;
  556. case SP_TYPE_TUNTAP:
  557. #ifdef HAVE_TUNTAP
  558. close(sp->handle.fd);
  559. #endif
  560. break;
  561. case SP_TYPE_NONE:
  562. err(-1, "no injector selected!");
  563. break;
  564. }
  565. safe_free(sp);
  566. }
  567. /**
  568. * returns the Layer 2 address of the interface current
  569. * open. on error, return NULL
  570. */
  571. struct tcpr_ether_addr *
  572. sendpacket_get_hwaddr(sendpacket_t *sp)
  573. {
  574. struct tcpr_ether_addr *addr;
  575. assert(sp);
  576. /* if we already have our MAC address stored, just return it */
  577. if (memcmp(&sp->ether, "\x00\x00\x00\x00\x00\x00", ETHER_ADDR_LEN) != 0)
  578. return &sp->ether;
  579. if (sp->handle_type == SP_TYPE_KHIAL) {
  580. addr = sendpacket_get_hwaddr_khial(sp);
  581. } else {
  582. #if defined HAVE_PF_PACKET
  583. addr = sendpacket_get_hwaddr_pf(sp);
  584. #elif defined HAVE_BPF
  585. addr = sendpacket_get_hwaddr_bpf(sp);
  586. #elif defined HAVE_LIBDNET
  587. addr = sendpacket_get_hwaddr_libdnet(sp);
  588. #elif (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET)
  589. addr = sendpacket_get_hwaddr_pcap(sp);
  590. #endif
  591. }
  592. return addr;
  593. }
  594. /**
  595. * returns the error string
  596. */
  597. char *
  598. sendpacket_geterr(sendpacket_t *sp)
  599. {
  600. assert(sp);
  601. return sp->errbuf;
  602. }
  603. /**
  604. * Set's the error string
  605. */
  606. static void
  607. sendpacket_seterr(sendpacket_t *sp, const char *fmt, ...)
  608. {
  609. va_list ap;
  610. assert(sp);
  611. va_start(ap, fmt);
  612. if (fmt != NULL)
  613. (void)vsnprintf(sp->errbuf, SENDPACKET_ERRBUF_SIZE, fmt, ap);
  614. va_end(ap);
  615. sp->errbuf[(SENDPACKET_ERRBUF_SIZE-1)] = '\0'; // be safe
  616. }
  617. #if (defined HAVE_PCAP_INJECT || defined HAVE_PCAP_SENDPACKET) && !(defined HAVE_PF_PACKET || defined BPF || defined HAVE_LIBDNET)
  618. /**
  619. * Inner sendpacket_open() method for using libpcap
  620. */
  621. static sendpacket_t *
  622. sendpacket_open_pcap(const char *device, char *errbuf)
  623. {
  624. pcap_t *pcap;
  625. sendpacket_t *sp;
  626. #ifdef BIOCSHDRCMPLT
  627. u_int spoof_eth_src = 1;
  628. int fd;
  629. #endif
  630. assert(device);
  631. assert(errbuf);
  632. dbg(1, "sendpacket: using Libpcap");
  633. /* open_pcap_live automatically fills out our errbuf for us */
  634. if ((pcap = pcap_open_live(device, 0, 0, 0, errbuf)) == NULL)
  635. return NULL;
  636. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  637. strlcpy(sp->device, device, sizeof(sp->device));
  638. sp->handle.pcap = pcap;
  639. #ifdef BIOCSHDRCMPLT
  640. /*
  641. * Only systems using BPF on the backend need this...
  642. * other systems don't have ioctl and will get compile errors.
  643. */
  644. fd = pcap_get_selectable_fd(pcap);
  645. if (ioctl(fd, BIOCSHDRCMPLT, &spoof_eth_src) == -1)
  646. errx(-1, "Unable to enable source MAC spoof support: %s", strerror(errno));
  647. #endif
  648. sp->handle_type = SP_TYPE_LIBPCAP;
  649. return sp;
  650. }
  651. /**
  652. * Get the hardware MAC address for the given interface using libpcap
  653. */
  654. static struct tcpr_ether_addr *
  655. sendpacket_get_hwaddr_pcap(sendpacket_t *sp)
  656. {
  657. assert(sp);
  658. sendpacket_seterr(sp, "Error: sendpacket_get_hwaddr() not yet supported for pcap injection");
  659. return NULL;
  660. }
  661. #endif /* HAVE_PCAP_INJECT || HAVE_PCAP_SENDPACKET */
  662. #if defined HAVE_LIBDNET && !defined HAVE_PF_PACKET && !defined HAVE_BPF
  663. /**
  664. * Inner sendpacket_open() method for using libdnet
  665. */
  666. static sendpacket_t *
  667. sendpacket_open_libdnet(const char *device, char *errbuf)
  668. {
  669. eth_t *ldnet;
  670. sendpacket_t *sp;
  671. assert(device);
  672. assert(errbuf);
  673. dbg(1, "sendpacket: using Libdnet");
  674. if ((ldnet = eth_open(device)) == NULL)
  675. return NULL;
  676. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  677. strlcpy(sp->device, device, sizeof(sp->device));
  678. sp->handle.ldnet = ldnet;
  679. sp->handle_type = SP_TYPE_LIBDNET;
  680. return sp;
  681. }
  682. /**
  683. * Get the hardware MAC address for the given interface using libdnet
  684. */
  685. static struct tcpr_ether_addr *
  686. sendpacket_get_hwaddr_libdnet(sendpacket_t *sp)
  687. {
  688. struct tcpr_ether_addr *addr = NULL;
  689. int ret;
  690. assert(sp);
  691. ret = eth_get(sp->handle.ldnet, (eth_addr_t *)addr);
  692. if (addr == NULL || ret < 0) {
  693. sendpacket_seterr(sp, "Error getting hwaddr via libdnet: %s", strerror(errno));
  694. return NULL;
  695. }
  696. memcpy(&sp->ether, addr, sizeof(struct tcpr_ether_addr));
  697. return(&sp->ether);
  698. }
  699. #endif /* HAVE_LIBDNET */
  700. #if defined HAVE_TUNTAP
  701. /**
  702. * Inner sendpacket_open() method for tuntap devices
  703. */
  704. static sendpacket_t *
  705. sendpacket_open_tuntap(const char *device, char *errbuf)
  706. {
  707. sendpacket_t *sp;
  708. struct ifreq ifr;
  709. int tapfd;
  710. assert(device);
  711. assert(errbuf);
  712. #if defined HAVE_LINUX
  713. if ((tapfd = open("/dev/net/tun", O_RDWR)) < 0) {
  714. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open /dev/net/tun control file: %s", strerror(errno));
  715. return NULL;
  716. }
  717. memset(&ifr, 0, sizeof(ifr));
  718. ifr.ifr_flags = (IFF_TAP | IFF_NO_PI);
  719. strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name)-1);
  720. if (ioctl(tapfd, TUNSETIFF, (void *) &ifr) < 0) {
  721. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to create tuntap interface: %s", device);
  722. close(tapfd);
  723. return NULL;
  724. }
  725. #elif defined(HAVE_FREEBSD)
  726. if (*device == '/') {
  727. if ((tapfd = open(device, O_RDWR)) < 0) {
  728. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open device %s: %s", device, strerror(errno));
  729. return NULL;
  730. }
  731. } else {
  732. /* full path needed */
  733. char *path;
  734. int prefix_length = strlen(TUNTAP_DEVICE_PREFIX);
  735. if ((path = malloc(strlen(device) + prefix_length + 1)) == NULL) {
  736. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Malloc error: %s", strerror(errno));
  737. return NULL;
  738. }
  739. snprintf(path, strlen(device) + prefix_length + 1, "%s%s", TUNTAP_DEVICE_PREFIX, device);
  740. if ((tapfd = open(path, O_RDWR)) < 0) {
  741. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Could not open device %s: %s", path, strerror(errno));
  742. free(path);
  743. return NULL;
  744. }
  745. free(path);
  746. }
  747. #endif
  748. /* prep & return our sp handle */
  749. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  750. strlcpy(sp->device, device, sizeof(sp->device));
  751. sp->handle.fd = tapfd;
  752. sp->handle_type = SP_TYPE_TUNTAP;
  753. return sp;
  754. }
  755. #endif
  756. #if defined HAVE_PF_PACKET
  757. /**
  758. * Inner sendpacket_open() method for using Linux's PF_PACKET or TX_RING
  759. */
  760. static sendpacket_t *
  761. sendpacket_open_pf(const char *device, char *errbuf)
  762. {
  763. int mysocket;
  764. sendpacket_t *sp;
  765. struct ifreq ifr;
  766. struct sockaddr_ll sa;
  767. int err;
  768. socklen_t errlen = sizeof(err);
  769. unsigned int UNUSED(mtu) = 1500;
  770. #ifdef SO_BROADCAST
  771. int n = 1;
  772. #endif
  773. assert(device);
  774. assert(errbuf);
  775. #if defined TX_RING
  776. dbg(1, "sendpacket: using TX_RING");
  777. #else
  778. dbg(1, "sendpacket: using PF_PACKET");
  779. #endif
  780. memset(&sa, 0, sizeof(sa));
  781. /* open our socket */
  782. if ((mysocket = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL))) < 0) {
  783. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "socket: %s", strerror(errno));
  784. return NULL;
  785. }
  786. /* get the interface id for the device */
  787. if ((sa.sll_ifindex = get_iface_index(mysocket, device, errbuf)) < 0) {
  788. close(mysocket);
  789. return NULL;
  790. }
  791. /* bind socket to our interface id */
  792. sa.sll_family = AF_PACKET;
  793. sa.sll_protocol = htons(ETH_P_ALL);
  794. if (bind(mysocket, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
  795. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "bind error: %s", strerror(errno));
  796. close(mysocket);
  797. return NULL;
  798. }
  799. /* check for errors, network down, etc... */
  800. if (getsockopt(mysocket, SOL_SOCKET, SO_ERROR, &err, &errlen) < 0) {
  801. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening %s: %s", device,
  802. strerror(errno));
  803. close(mysocket);
  804. return NULL;
  805. }
  806. if (err > 0) {
  807. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening %s: %s", device,
  808. strerror(err));
  809. close(mysocket);
  810. return NULL;
  811. }
  812. /* get hardware type for our interface */
  813. memset(&ifr, 0, sizeof(ifr));
  814. strlcpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
  815. if (ioctl(mysocket, SIOCGIFHWADDR, &ifr) < 0) {
  816. close(mysocket);
  817. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Error getting hardware type: %s",
  818. strerror(errno));
  819. return NULL;
  820. }
  821. /* make sure it's not loopback (PF_PACKET doesn't support it) */
  822. if (ifr.ifr_hwaddr.sa_family != ARPHRD_ETHER)
  823. warnx("Unsupported physical layer type 0x%04x on %s. Maybe it works, maybe it won't."
  824. " See tickets #123/318", ifr.ifr_hwaddr.sa_family, device);
  825. #ifdef SO_BROADCAST
  826. /*
  827. * man 7 socket
  828. *
  829. * Set or get the broadcast flag. When enabled, datagram sockets
  830. * receive packets sent to a broadcast address and they are allowed
  831. * to send packets to a broadcast address. This option has no
  832. * effect on stream-oriented sockets.
  833. */
  834. if (setsockopt(mysocket, SOL_SOCKET, SO_BROADCAST, &n, sizeof(n)) == -1) {
  835. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE,
  836. "SO_BROADCAST: %s", strerror(errno));
  837. close(mysocket);
  838. return NULL;
  839. }
  840. #endif /* SO_BROADCAST */
  841. /* prep & return our sp handle */
  842. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  843. strlcpy(sp->device, device, sizeof(sp->device));
  844. sp->handle.fd = mysocket;
  845. #ifdef HAVE_TX_RING
  846. /* Look up for MTU */
  847. memset(&ifr, 0, sizeof(ifr));
  848. strlcpy(ifr.ifr_name, sp->device, sizeof(ifr.ifr_name));
  849. if (ioctl(mysocket, SIOCGIFMTU, &ifr) < 0) {
  850. close(mysocket);
  851. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Error getting MTU: %s", strerror(errno));
  852. return NULL;
  853. }
  854. mtu = ifr.ifr_ifru.ifru_mtu;
  855. /* Init TX ring for sp->handle.fd socket */
  856. if ((sp->tx_ring = txring_init(sp->handle.fd, mtu)) == 0) {
  857. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "txring_init: %s", strerror(errno));
  858. close(mysocket);
  859. return NULL;
  860. }
  861. sp->handle_type = SP_TYPE_TX_RING;
  862. #else
  863. sp->handle_type = SP_TYPE_PF_PACKET;
  864. #endif
  865. return sp;
  866. }
  867. /**
  868. * get the interface index (necessary for sending packets w/ PF_PACKET)
  869. */
  870. static int
  871. get_iface_index(int fd, const char *device, char *errbuf) {
  872. struct ifreq ifr;
  873. memset(&ifr, 0, sizeof(ifr));
  874. strlcpy(ifr.ifr_name, (const char *)device, sizeof(ifr.ifr_name));
  875. if (ioctl(fd, SIOCGIFINDEX, &ifr) == -1) {
  876. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "ioctl: %s", strerror(errno));
  877. return (-1);
  878. }
  879. return ifr.ifr_ifindex;
  880. }
  881. /**
  882. * gets the hardware address via Linux's PF packet interface
  883. */
  884. static struct tcpr_ether_addr *
  885. sendpacket_get_hwaddr_pf(sendpacket_t *sp)
  886. {
  887. struct ifreq ifr;
  888. int fd;
  889. assert(sp);
  890. if (!sp->open) {
  891. sendpacket_seterr(sp, "Unable to get hardware address on un-opened sendpacket handle");
  892. return NULL;
  893. }
  894. /* create dummy socket for ioctl */
  895. if ((fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
  896. sendpacket_seterr(sp, "Unable to open dummy socket for get_hwaddr: %s", strerror(errno));
  897. return NULL;
  898. }
  899. memset(&ifr, 0, sizeof(ifr));
  900. strlcpy(ifr.ifr_name, sp->device, sizeof(ifr.ifr_name));
  901. if (ioctl(fd, SIOCGIFHWADDR, (int8_t *)&ifr) < 0) {
  902. close(fd);
  903. sendpacket_seterr(sp, "Error getting hardware address: %s", strerror(errno));
  904. return NULL;
  905. }
  906. memcpy(&sp->ether, &ifr.ifr_hwaddr.sa_data, ETHER_ADDR_LEN);
  907. close(fd);
  908. return(&sp->ether);
  909. }
  910. #endif /* HAVE_PF_PACKET */
  911. #if defined HAVE_BPF
  912. /**
  913. * Inner sendpacket_open() method for using BSD's BPF interface
  914. */
  915. static sendpacket_t *
  916. sendpacket_open_bpf(const char *device, char *errbuf)
  917. {
  918. sendpacket_t *sp;
  919. char bpf_dev[16];
  920. int dev, mysocket, link_offset, link_type;
  921. struct ifreq ifr;
  922. struct bpf_version bv;
  923. u_int v;
  924. #if defined(BIOCGHDRCMPLT) && defined(BIOCSHDRCMPLT)
  925. u_int spoof_eth_src = 1;
  926. #endif
  927. assert(device);
  928. assert(errbuf);
  929. memset(&ifr, '\0', sizeof(struct ifreq));
  930. dbg(1, "sendpacket_open_bpf: using BPF");
  931. /* open socket */
  932. mysocket = -1;
  933. for (dev = 0; dev < 512; dev ++) {
  934. memset(bpf_dev, '\0', sizeof(bpf_dev));
  935. snprintf(bpf_dev, sizeof(bpf_dev), "/dev/bpf%d", dev);
  936. dbgx(3, "sendpacket_open_bpf: attempting to open %s", bpf_dev);
  937. if (!access(bpf_dev, F_OK) && (mysocket = open(bpf_dev, O_RDWR, 0)) > 0) {
  938. dbg(3, "Success!");
  939. break;
  940. }
  941. dbgx(4, "failed with error %s", strerror(errno));
  942. }
  943. /* error?? */
  944. if (mysocket < 0) {
  945. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE,
  946. "Unable to open /dev/bpfX: %s", strerror(errno));
  947. errbuf[SENDPACKET_ERRBUF_SIZE -1] = '\0';
  948. return NULL;
  949. }
  950. /* get BPF version */
  951. if (ioctl(mysocket, BIOCVERSION, (caddr_t)&bv) < 0) {
  952. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to get bpf version: %s", strerror(errno));
  953. return NULL;
  954. }
  955. if (bv.bv_major != BPF_MAJOR_VERSION || bv.bv_minor != BPF_MINOR_VERSION) {
  956. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Kernel's bpf version is out of date.");
  957. return NULL;
  958. }
  959. /* attach to device */
  960. strlcpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
  961. if (ioctl(mysocket, BIOCSETIF, (caddr_t)&ifr) < 0) {
  962. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to bind %s to %s: %s",
  963. bpf_dev, device, strerror(errno));
  964. return NULL;
  965. }
  966. /* get datalink type */
  967. if (ioctl(mysocket, BIOCGDLT, (caddr_t)&v) < 0) {
  968. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "Unable to get datalink type: %s",
  969. strerror(errno));
  970. return NULL;
  971. }
  972. /*
  973. * NetBSD and FreeBSD BPF have an ioctl for enabling/disabling
  974. * automatic filling of the link level source address.
  975. */
  976. #if defined(BIOCGHDRCMPLT) && defined(BIOCSHDRCMPLT)
  977. if (ioctl(mysocket, BIOCSHDRCMPLT, &spoof_eth_src) == -1) {
  978. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE,
  979. "Unable to enable spoofing src MAC: %s", strerror(errno));
  980. return NULL;
  981. }
  982. #endif
  983. /* assign link type and offset */
  984. switch (v) {
  985. case DLT_SLIP:
  986. link_offset = 0x10;
  987. break;
  988. case DLT_RAW:
  989. link_offset = 0x0;
  990. break;
  991. case DLT_PPP:
  992. link_offset = 0x04;
  993. break;
  994. case DLT_EN10MB:
  995. default: /* default to Ethernet */
  996. link_offset = 0xe;
  997. break;
  998. }
  999. #if _BSDI_VERSION - 0 > 199510
  1000. switch (v) {
  1001. case DLT_SLIP:
  1002. v = DLT_SLIP_BSDOS;
  1003. link_offset = 0x10;
  1004. break;
  1005. case DLT_PPP:
  1006. v = DLT_PPP_BSDOS;
  1007. link_offset = 0x04;
  1008. break;
  1009. }
  1010. #endif
  1011. link_type = v;
  1012. /* allocate our sp handle, and return it */
  1013. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  1014. strlcpy(sp->device, device, sizeof(sp->device));
  1015. sp->handle.fd = mysocket;
  1016. //sp->link_type = link_type;
  1017. //sp->link_offset = link_offset;
  1018. sp->handle_type = SP_TYPE_BPF;
  1019. return sp;
  1020. }
  1021. /**
  1022. * Get the interface hardware MAC address when using BPF
  1023. */
  1024. static struct tcpr_ether_addr *
  1025. sendpacket_get_hwaddr_bpf(sendpacket_t *sp)
  1026. {
  1027. int mib[6];
  1028. size_t len;
  1029. int8_t *buf, *next, *end;
  1030. struct if_msghdr *ifm;
  1031. struct sockaddr_dl *sdl;
  1032. assert(sp);
  1033. mib[0] = CTL_NET;
  1034. mib[1] = AF_ROUTE;
  1035. mib[2] = 0;
  1036. mib[3] = AF_LINK;
  1037. mib[4] = NET_RT_IFLIST;
  1038. mib[5] = 0;
  1039. if (sysctl(mib, 6, NULL, &len, NULL, 0) == -1) {
  1040. sendpacket_seterr(sp, "%s(): sysctl(): %s", __func__, strerror(errno));
  1041. return NULL;
  1042. }
  1043. buf = (int8_t *)safe_malloc(len);
  1044. if (sysctl(mib, 6, buf, &len, NULL, 0) == -1) {
  1045. sendpacket_seterr(sp, "%s(): sysctl(): %s", __func__, strerror(errno));
  1046. safe_free(buf);
  1047. return NULL;
  1048. }
  1049. end = buf + len;
  1050. for (next = buf; next < end; next += ifm->ifm_msglen) {
  1051. ifm = (struct if_msghdr *)next;
  1052. if (ifm->ifm_type == RTM_IFINFO) {
  1053. sdl = (struct sockaddr_dl *)(ifm + 1);
  1054. if (strncmp(&sdl->sdl_data[0], sp->device, sdl->sdl_len) == 0) {
  1055. memcpy(&sp->ether, LLADDR(sdl), ETHER_ADDR_LEN);
  1056. break;
  1057. }
  1058. }
  1059. }
  1060. safe_free(buf);
  1061. return(&sp->ether);
  1062. }
  1063. #endif /* HAVE_BPF */
  1064. /**
  1065. * Get the DLT type of the opened sendpacket
  1066. * Return -1 if we can't figure it out, else return the DLT_ value
  1067. */
  1068. int
  1069. sendpacket_get_dlt(sendpacket_t *sp)
  1070. {
  1071. int dlt = DLT_EN10MB;
  1072. if (sp->handle_type == SP_TYPE_KHIAL ||
  1073. sp->handle_type == SP_TYPE_NETMAP ||
  1074. sp->handle_type == SP_TYPE_TUNTAP) {
  1075. /* always EN10MB */
  1076. ;
  1077. } else {
  1078. #if defined HAVE_BPF
  1079. int rcode;
  1080. if ((rcode = ioctl(sp->handle.fd, BIOCGDLT, &dlt)) < 0) {
  1081. warnx("Unable to get DLT value for BPF device (%s): %s", sp->device, strerror(errno));
  1082. return(-1);
  1083. }
  1084. #elif defined HAVE_PF_PACKET || defined HAVE_LIBDNET
  1085. /* use libpcap to get dlt */
  1086. pcap_t *pcap;
  1087. char errbuf[PCAP_ERRBUF_SIZE];
  1088. if ((pcap = pcap_open_live(sp->device, 65535, 0, 0, errbuf)) == NULL) {
  1089. warnx("Unable to get DLT value for %s: %s", sp->device, errbuf);
  1090. return(-1);
  1091. }
  1092. dlt = pcap_datalink(pcap);
  1093. pcap_close(pcap);
  1094. #elif defined HAVE_PCAP_SENDPACKET || defined HAVE_PCAP_INJECT
  1095. dlt = pcap_datalink(sp->handle.pcap);
  1096. #endif
  1097. }
  1098. return dlt;
  1099. }
  1100. /**
  1101. * \brief Returns a string of the name of the injection method being used
  1102. */
  1103. const char *
  1104. sendpacket_get_method(sendpacket_t *sp)
  1105. {
  1106. if (sp == NULL) {
  1107. return INJECT_METHOD;
  1108. } else if (sp->handle_type == SP_TYPE_KHIAL) {
  1109. return "khial";
  1110. } else if (sp->handle_type == SP_TYPE_NETMAP) {
  1111. return "netmap";
  1112. } else {
  1113. return INJECT_METHOD;
  1114. }
  1115. }
  1116. /**
  1117. * Opens a character device for injecting packets directly into
  1118. * your kernel via a custom driver
  1119. */
  1120. static sendpacket_t *
  1121. sendpacket_open_khial(const char *device, char *errbuf)
  1122. {
  1123. int mysocket;
  1124. sendpacket_t *sp;
  1125. assert(device);
  1126. assert(errbuf);
  1127. if ((mysocket = open(device, O_WRONLY|O_EXCL)) < 0) {
  1128. snprintf(errbuf, SENDPACKET_ERRBUF_SIZE, "error opening khial device: %s", strerror(errno));
  1129. return NULL;
  1130. }
  1131. sp = (sendpacket_t *)safe_malloc(sizeof(sendpacket_t));
  1132. strlcpy(sp->device, device, sizeof(sp->device));
  1133. sp->handle.fd = mysocket;
  1134. sp->handle_type = SP_TYPE_KHIAL;
  1135. return sp;
  1136. }
  1137. /**
  1138. * Get the hardware MAC address for the given interface using khial
  1139. */
  1140. static struct tcpr_ether_addr *
  1141. sendpacket_get_hwaddr_khial(sendpacket_t *sp)
  1142. {
  1143. assert(sp);
  1144. sendpacket_seterr(sp, "Error: sendpacket_get_hwaddr() not yet supported for character devices");
  1145. return NULL;
  1146. }
  1147. /**
  1148. * \brief Cause the currently running sendpacket() call to stop
  1149. */
  1150. void
  1151. sendpacket_abort(sendpacket_t *sp)
  1152. {
  1153. assert(sp);
  1154. sp->abort = true;
  1155. }