2 * nmrp-flash - Netgear Unbrick Utility
3 * Copyright (C) 2016 Joseph Lehner <joseph.c.lehner@gmail.com>
5 * nmrp-flash is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation, either version 3 of the License, or
8 * (at your option) any later version.
10 * nmrp-flash is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with nmrp-flash. If not, see <http://www.gnu.org/licenses/>.
21 #include <netinet/ether.h>
22 #include <linux/if_packet.h>
23 #include <arpa/inet.h>
24 #include <sys/socket.h>
25 #include <sys/ioctl.h>
35 #define NMRP_HDR_LEN 6
36 #define NMRP_OPT_LEN 4
37 #define NMRP_MIN_PKT_LEN (sizeof(struct ether_header) + NMRP_HDR_LEN)
39 #define ETH_P_NMRP 0x0912
41 #define PACKED __attribute__((__packed__))
42 #define MAX_LOOP_RECV 1024
51 NMRP_C_KEEP_ALIVE_REQ = 6,
52 NMRP_C_KEEP_ALIVE_ACK = 7,
53 NMRP_C_TFTP_UL_REQ = 16
57 NMRP_O_MAGIC_NO = 0x0001,
58 NMRP_O_DEV_IP = 0x0002,
59 NMRP_O_DEV_REGION = 0x0004,
60 NMRP_O_FW_UP = 0x0101,
61 NMRP_O_ST_UP = 0x0102,
62 NMRP_O_FILE_NAME = 0x0181
82 struct nmrp_opt opts[2];
87 struct ether_header eh;
91 static void msg_update_len(struct nmrp_msg *msg)
94 msg->len = NMRP_HDR_LEN;
95 for (; i != msg->num_opts; ++i) {
96 msg->len += msg->opts[i].len;
100 static void msg_dump(struct nmrp_msg *msg, int dump_opts)
102 struct nmrp_opt *opt;
103 int remain_len, len, i;
105 fprintf(stderr, "res=0x%04x, code=0x%02x, id=0x%02x, len=%u",
106 msg->reserved, msg->code, msg->id, msg->len);
108 remain_len = msg->len - NMRP_HDR_LEN;
109 fprintf(stderr, "%s\n", remain_len ? "" : " (no opts)");
114 while (remain_len > 0) {
116 fprintf(stderr, " opt type=%u, len=%u", opt->type, len);
117 for (i = 0; i != len - NMRP_OPT_LEN; ++i) {
119 fprintf(stderr, "\n ");
122 fprintf(stderr, "%02x ", ((char*)&opt->val)[i] & 0xff);
124 fprintf(stderr, "\n");
126 opt = (struct nmrp_opt*)(((char*)opt) + len);
131 static void msg_hton(struct nmrp_msg *msg)
135 msg->reserved = htons(msg->reserved);
136 msg->len = htons(msg->len);
138 for (; i != msg->num_opts; ++i) {
139 msg->opts[i].len = htons(msg->opts[i].len);
140 msg->opts[i].type = htons(msg->opts[i].type);
144 static void msg_hdr_ntoh(struct nmrp_msg *msg)
146 msg->reserved = ntohs(msg->reserved);
147 msg->len = ntohs(msg->len);
150 static int msg_ntoh(struct nmrp_msg *msg)
152 struct nmrp_opt *opt = msg->opts;
156 remaining = msg->len - NMRP_HDR_LEN;
158 while (remaining > 0) {
159 if (remaining < NMRP_OPT_LEN) {
160 fprintf(stderr, "Malformed message.\n");
165 opt->type = ntohs(opt->type);
166 opt->len = ntohs(opt->len);
168 remaining -= opt->len;
173 fprintf(stderr, "Trailing data in message.\n");
181 static int intf_get_info(int sock, const char *name, int *index,
186 memset(&ifr, 0, sizeof(ifr));
187 strncpy(ifr.ifr_name, name, IFNAMSIZ - 1);
189 if (ioctl(sock, SIOCGIFINDEX, &ifr) < 0) {
190 perror("ioctl(SIOCGIFINDEX)");
193 *index = ifr.ifr_ifindex;
195 if (ioctl(sock, SIOCGIFHWADDR, &ifr) < 0) {
196 perror("ioctl(SIOCGIFHWADDR)");
199 memcpy(hwaddr, ifr.ifr_hwaddr.sa_data, ETH_ALEN);
204 static int pkt_send(int sock, struct sockaddr_ll *addr, struct nmrp_pkt *pkt)
206 size_t len = ntohs(pkt->msg.len) + sizeof(pkt->eh);
207 return sendto(sock, pkt, len, 0, (struct sockaddr*)addr, sizeof(*addr));
210 static int pkt_recv(int sock, struct nmrp_pkt *pkt)
212 struct sockaddr_ll from;
216 memset(pkt, 0, sizeof(*pkt));
217 bytes = recvfrom(sock, pkt, NMRP_MIN_PKT_LEN, MSG_PEEK,
218 (struct sockaddr*)&from, &addrlen);
221 if (errno == EAGAIN) {
224 perror("recvfrom(pkt)");
226 } else if (ntohs(pkt->eh.ether_type) != ETH_P_NMRP) {
228 } else if (bytes < NMRP_MIN_PKT_LEN) {
229 fprintf(stderr, "Short packet (%zi bytes)\n", bytes);
233 msg_hdr_ntoh(&pkt->msg);
234 len = pkt->msg.len + sizeof(pkt->eh);
236 bytes = recvfrom(sock, pkt, len, MSG_DONTWAIT, NULL, NULL);
238 perror("recvfrom(msg)");
240 } else if (bytes != len) {
241 fprintf(stderr, "Unexpected message length (%zi bytes).\n", len);
244 if (msg_ntoh(&pkt->msg) != 0) {
253 static int sock_bind_to_intf(int sock, const char *name)
257 strncpy(ifr.ifr_name, name, IFNAMSIZ - 1);
258 if (setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr)) < 0) {
259 perror("setsockopt(SO_BINDTODEVICE)");
266 static int mac_parse(const char *str, uint8_t *hwaddr)
271 sscanf(str, "%02x:%02x:%02x:%02x:%02x:%02x%n",
272 data, data + 1, data + 2, data + 3, data + 4, data + 5, &i);
274 if (i == strlen(str)) {
275 for (i = 0; i != 6; ++i) {
280 hwaddr[i] = data[i] & 0xff;
290 static const char *spinner = "\\|/-";
292 int nmrp_do(struct nmrpd_args *args)
294 struct nmrp_pkt tx, rx;
295 struct sockaddr_ll addr;
296 uint8_t src[ETH_ALEN], dest[ETH_ALEN];
297 struct in_addr ipaddr, ipmask;
299 int i, sock, err, ulreqs, expect;
301 if (args->op != NMRP_UPLOAD_FW) {
302 fprintf(stderr, "Operation not implemented.\n");
306 if (!mac_parse(args->mac, dest)) {
307 fprintf(stderr, "Invalid MAC address '%s'.\n", args->mac);
311 if (!inet_aton(args->ipaddr, &ipaddr)) {
312 fprintf(stderr, "Invalid IP address '%s'.\n", args->ipaddr);
316 if (!inet_aton(args->ipmask, &ipmask)) {
317 fprintf(stderr, "Invalid subnet mask '%s'.\n", args->ipmask);
321 if (access(args->filename, R_OK) == -1) {
322 fprintf(stderr, "Error accessing file '%s'.\n", args->filename);
328 sock = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_NMRP));
334 if (intf_get_info(sock, args->intf, &addr.sll_ifindex, src)) {
338 if (sock_bind_to_intf(sock, args->intf)) {
342 if (sock_set_rx_timeout(sock, args->rx_timeout)) {
346 addr.sll_family = AF_PACKET;
347 addr.sll_protocol = htons(ETH_P_NMRP);
348 addr.sll_halen = ETH_ALEN;
349 memcpy(addr.sll_addr, dest, ETH_ALEN);
351 memcpy(tx.eh.ether_shost, src, ETH_ALEN);
352 memcpy(tx.eh.ether_dhost, dest, ETH_ALEN);
353 tx.eh.ether_type = htons(ETH_P_NMRP);
356 tx.msg.code = NMRP_C_ADVERTISE;
359 tx.msg.opts[0].type = NMRP_O_MAGIC_NO;
360 tx.msg.opts[0].len = NMRP_OPT_LEN + 4;
361 tx.msg.opts[0].val.magic[0] = 'N';
362 tx.msg.opts[0].val.magic[1] = 'T';
363 tx.msg.opts[0].val.magic[2] = 'G';
364 tx.msg.opts[0].val.magic[3] = 'R';
366 msg_update_len(&tx.msg);
373 printf("\rAdvertising NMRP server on %s ... %c", args->intf,
378 if (pkt_send(sock, &addr, &tx) < 0) {
383 err = pkt_recv(sock, &rx);
384 if (err == 0 && memcmp(rx.eh.ether_dhost, src, ETH_ALEN) == 0) {
386 } else if (err == 1) {
390 if ((time(NULL) - beg) >= 60) {
391 printf("\nNo response after 60 seconds. Bailing out.\n");
399 expect = NMRP_C_CONF_REQ;
403 if (expect != NMRP_C_NONE && rx.msg.code != expect) {
404 fprintf(stderr, "Received code 0x%02x while waiting for 0x%02x!\n",
405 rx.msg.code, expect);
408 tx.msg.code = NMRP_C_NONE;
416 switch (rx.msg.code) {
417 case NMRP_C_ADVERTISE:
418 printf("Received NMRP advertisement from "
419 "%02x:%02x:%02x:%02x:%02x:%02x.\n",
420 rx.eh.ether_shost[0], rx.eh.ether_shost[1],
421 rx.eh.ether_shost[2], rx.eh.ether_shost[3],
422 rx.eh.ether_shost[4], rx.eh.ether_shost[5]);
425 case NMRP_C_CONF_REQ:
426 tx.msg.code = NMRP_C_CONF_ACK;
429 tx.msg.opts[0].type = NMRP_O_DEV_IP;
430 tx.msg.opts[0].len = NMRP_OPT_LEN + 2 * IP_LEN;
432 memcpy(tx.msg.opts[0].val.ip.addr, &ipaddr, IP_LEN);
433 memcpy(tx.msg.opts[0].val.ip.mask, &ipmask, IP_LEN);
435 tx.msg.opts[1].type = NMRP_O_FW_UP;
436 tx.msg.opts[1].len = NMRP_OPT_LEN;
438 expect = NMRP_C_TFTP_UL_REQ;
440 printf("Configuration request received from "
441 "%02x:%02x:%02x:%02x:%02x:%02x.\n",
442 rx.eh.ether_shost[0], rx.eh.ether_shost[1],
443 rx.eh.ether_shost[2], rx.eh.ether_shost[3],
444 rx.eh.ether_shost[4], rx.eh.ether_shost[5]);
446 memcpy(tx.eh.ether_dhost, rx.eh.ether_shost, ETH_ALEN);
447 memcpy(addr.sll_addr, rx.eh.ether_shost, ETH_ALEN);
449 printf("Sending configuration: ip %s, mask %s.\n",
450 args->ipaddr, args->ipmask);
453 case NMRP_C_TFTP_UL_REQ:
455 fprintf(stderr, "Device re-requested file upload %d "
456 "times; aborting.\n", ulreqs);
457 tx.msg.code = NMRP_C_CLOSE_REQ;
461 if (!args->tftpcmd) {
462 printf("Uploading %s ... ", args->filename);
464 err = tftp_put(args);
466 printf("Running %s ... ", args->tftpcmd);
468 err = system(args->tftpcmd);
472 printf("OK\nWaiting for remote to respond.\n");
473 sock_set_rx_timeout(sock, args->ul_timeout);
474 expect = NMRP_C_CLOSE_REQ;
481 case NMRP_C_KEEP_ALIVE_REQ:
482 tx.msg.code = NMRP_C_KEEP_ALIVE_ACK;
484 case NMRP_C_CLOSE_REQ:
485 tx.msg.code = NMRP_C_CLOSE_ACK;
487 case NMRP_C_CLOSE_ACK:
491 fprintf(stderr, "Unknown message code 0x%02x!\n",
493 msg_dump(&rx.msg, 0);
496 if (tx.msg.code != NMRP_C_NONE) {
497 msg_update_len(&tx.msg);
500 if (pkt_send(sock, &addr, &tx) < 0) {
506 if (rx.msg.code == NMRP_C_CLOSE_REQ) {
507 printf("Remote finished. Closing connection.\n");
511 err = pkt_recv(sock, &rx);
514 fprintf(stderr, "Timeout while waiting for 0x%02x.\n", expect);
519 sock_set_rx_timeout(sock, args->rx_timeout);