wget: -O FILE is allowed to overwrite existing file (compat)
[oweals/busybox.git] / networking / arping.c
index b30cb535ea8e555e583e614b759b5ec717d181e4..a2c4c22472f598882eefb444d93459a11346e004 100644 (file)
@@ -1,74 +1,54 @@
+/* vi: set sw=4 ts=4: */
 /*
  * arping.c - Ping hosts by ARP requests/replies
  *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License
- * as published by the Free Software Foundation; either version
- * 2 of the License, or (at your option) any later version.
+ * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
  *
  * Author:     Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
  * Busybox port: Nick Fedchik <nick@fedchik.org.ua>
  */
 
-#include <sys/ioctl.h>
-#include <signal.h>
-#include <sys/time.h>
-
-#include <errno.h>
-#include <stdlib.h>
-#include <string.h>
-#include <unistd.h>
-
 #include <arpa/inet.h>
 #include <net/if.h>
 #include <netinet/ether.h>
 #include <netpacket/packet.h>
 
-#include "busybox.h"
+#include "libbb.h"
 
-#define APPLET_NAME "arping"
+/* We don't expect to see 1000+ seconds delay, unsigned is enough */
+#define MONOTONIC_US() ((unsigned)monotonic_us())
 
 static struct in_addr src;
 static struct in_addr dst;
 static struct sockaddr_ll me;
 static struct sockaddr_ll he;
-static struct timeval last;
-static int dad;
-static int unsolicited;
-static int advert;
-static int quiet;
-static int quit_on_reply = 0;
-static int count = -1;
-static int timeout;
-static int unicasting;
-static int s;
-static int broadcast_only;
-static int sent;
-static int brd_sent;
-static int received;
-static int brd_recv;
-static int req_recv;
-
-#define MS_TDIFF(tv1,tv2) ( ((tv1).tv_sec-(tv2).tv_sec)*1000 + \
-                          ((tv1).tv_usec-(tv2).tv_usec)/1000 )
-#if 0
-static void set_signal(int signo, void (*handler) (void))
-{
-       struct sigaction sa;
-
-       memset(&sa, 0, sizeof(sa));
-       sa.sa_handler = (void (*)(int)) handler;
-       sa.sa_flags = SA_RESTART;
-       sigaction(signo, &sa, NULL);
-}
-#endif
-
-static int send_pack(int sock, struct in_addr *src_addr,
-                                        struct in_addr *dst_addr, struct sockaddr_ll *ME,
-                                        struct sockaddr_ll *HE)
+static unsigned last;
+
+enum {
+       DAD = 1,
+       UNSOLICITED = 2,
+       ADVERT = 4,
+       QUIET = 8,
+       QUIT_ON_REPLY = 16,
+       BCAST_ONLY = 32,
+       UNICASTING = 64
+};
+
+static int sock;
+static unsigned count = UINT_MAX;
+static unsigned timeout_us;
+static unsigned sent;
+static unsigned brd_sent;
+static unsigned received;
+static unsigned brd_recv;
+static unsigned req_recv;
+
+static int send_pack(struct in_addr *src_addr,
+                       struct in_addr *dst_addr, struct sockaddr_ll *ME,
+                       struct sockaddr_ll *HE)
 {
        int err;
-       struct timeval now;
+       unsigned now;
        unsigned char buf[256];
        struct arphdr *ah = (struct arphdr *) buf;
        unsigned char *p = (unsigned char *) (ah + 1);
@@ -78,7 +58,7 @@ static int send_pack(int sock, struct in_addr *src_addr,
        ah->ar_pro = htons(ETH_P_IP);
        ah->ar_hln = ME->sll_halen;
        ah->ar_pln = 4;
-       ah->ar_op = advert ? htons(ARPOP_REPLY) : htons(ARPOP_REQUEST);
+       ah->ar_op = option_mask32 & ADVERT ? htons(ARPOP_REPLY) : htons(ARPOP_REQUEST);
 
        memcpy(p, &ME->sll_addr, ah->ar_hln);
        p += ME->sll_halen;
@@ -86,7 +66,7 @@ static int send_pack(int sock, struct in_addr *src_addr,
        memcpy(p, src_addr, 4);
        p += 4;
 
-       if (advert)
+       if (option_mask32 & ADVERT)
                memcpy(p, &ME->sll_addr, ah->ar_hln);
        else
                memcpy(p, &HE->sll_addr, ah->ar_hln);
@@ -95,57 +75,53 @@ static int send_pack(int sock, struct in_addr *src_addr,
        memcpy(p, dst_addr, 4);
        p += 4;
 
-       gettimeofday(&now, NULL);
+       now = MONOTONIC_US();
        err = sendto(sock, buf, p - buf, 0, (struct sockaddr *) HE, sizeof(*HE));
        if (err == p - buf) {
                last = now;
                sent++;
-               if (!unicasting)
+               if (!(option_mask32 & UNICASTING))
                        brd_sent++;
        }
        return err;
 }
 
+static void finish(void) ATTRIBUTE_NORETURN;
 static void finish(void)
 {
-       if (!quiet) {
-               printf("Sent %d probes (%d broadcast(s))\n", sent, brd_sent);
-               printf("Received %d repl%s", received, (received > 1) ? "ies" : "y");
-               if (brd_recv || req_recv) {
-                       printf(" (");
-                       if (req_recv)
-                               printf("%d request(s)", req_recv);
-                       if (brd_recv)
-                               printf("%s%d broadcast(s)", req_recv ? ", " : "", brd_recv);
-                       putchar(')');
-               }
-               putchar('\n');
-               fflush(stdout);
+       if (!(option_mask32 & QUIET)) {
+               printf("Sent %u probe(s) (%u broadcast(s))\n"
+                       "Received %u repl%s"
+                       " (%u request(s), %u broadcast(s))\n",
+                       sent, brd_sent,
+                       received, (received == 1) ? "ies" : "y",
+                       req_recv, brd_recv);
        }
-       if (dad)
+       if (option_mask32 & DAD)
                exit(!!received);
-       if (unsolicited)
+       if (option_mask32 & UNSOLICITED)
                exit(0);
        exit(!received);
 }
 
 static void catcher(void)
 {
-       struct timeval tv;
-       static struct timeval start;
+       static unsigned start;
 
-       gettimeofday(&tv, NULL);
+       unsigned now;
 
-       if (start.tv_sec == 0)
-               start = tv;
+       now = MONOTONIC_US();
+       if (start == 0)
+               start = now;
 
-       if (count-- == 0
-               || (timeout && MS_TDIFF(tv, start) > timeout * 1000 + 500))
+       if (count == 0 || (timeout_us && (now - start) > (timeout_us + 500000)))
                finish();
 
-       if (last.tv_sec == 0 || MS_TDIFF(tv, last) > 500) {
-               send_pack(s, &src, &dst, &me, &he);
-               if (count == 0 && unsolicited)
+       count--;
+
+       if (last == 0 || (now - last) > 500000) {
+               send_pack(&src, &dst, &me, &he);
+               if (count == 0 && (option_mask32 & UNSOLICITED))
                        finish();
        }
        alarm(1);
@@ -153,17 +129,14 @@ static void catcher(void)
 
 static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
 {
-       struct timeval tv;
        struct arphdr *ah = (struct arphdr *) buf;
        unsigned char *p = (unsigned char *) (ah + 1);
        struct in_addr src_ip, dst_ip;
 
-       gettimeofday(&tv, NULL);
-
        /* Filter out wild packets */
-       if (FROM->sll_pkttype != PACKET_HOST &&
-               FROM->sll_pkttype != PACKET_BROADCAST &&
-               FROM->sll_pkttype != PACKET_MULTICAST)
+       if (FROM->sll_pkttype != PACKET_HOST
+        && FROM->sll_pkttype != PACKET_BROADCAST
+        && FROM->sll_pkttype != PACKET_MULTICAST)
                return 0;
 
        /* Only these types are recognised */
@@ -171,9 +144,8 @@ static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
                return 0;
 
        /* ARPHRD check and this darned FDDI hack here :-( */
-       if (ah->ar_hrd != htons(FROM->sll_hatype) &&
-               (FROM->sll_hatype != ARPHRD_FDDI
-                || ah->ar_hrd != htons(ARPHRD_ETHER)))
+       if (ah->ar_hrd != htons(FROM->sll_hatype)
+        && (FROM->sll_hatype != ARPHRD_FDDI || ah->ar_hrd != htons(ARPHRD_ETHER)))
                return 0;
 
        /* Protocol must be IP. */
@@ -187,7 +159,7 @@ static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
                return 0;
        memcpy(&src_ip, p + ah->ar_hln, 4);
        memcpy(&dst_ip, p + ah->ar_hln + 4 + ah->ar_hln, 4);
-       if (!dad) {
+       if (!(option_mask32 & DAD)) {
                if (src_ip.s_addr != dst.s_addr)
                        return 0;
                if (src.s_addr != dst_ip.s_addr)
@@ -215,15 +187,14 @@ static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
                if (src.s_addr && src.s_addr != dst_ip.s_addr)
                        return 0;
        }
-       if (!quiet) {
+       if (!(option_mask32 & QUIET)) {
                int s_printed = 0;
 
-               printf("%s ",
-                          FROM->sll_pkttype == PACKET_HOST ? "Unicast" : "Broadcast");
-               printf("%s from ",
-                          ah->ar_op == htons(ARPOP_REPLY) ? "reply" : "request");
-               printf("%s ", inet_ntoa(src_ip));
-               printf("[%s]", ether_ntoa((struct ether_addr *) p));
+               printf("%scast re%s from %s [%s]",
+                       FROM->sll_pkttype == PACKET_HOST ? "Uni" : "Broad",
+                       ah->ar_op == htons(ARPOP_REPLY) ? "ply" : "quest",
+                       inet_ntoa(src_ip),
+                       ether_ntoa((struct ether_addr *) p));
                if (dst_ip.s_addr != src.s_addr) {
                        printf("for %s ", inet_ntoa(dst_ip));
                        s_printed = 1;
@@ -232,15 +203,11 @@ static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
                        if (!s_printed)
                                printf("for ");
                        printf("[%s]",
-                                  ether_ntoa((struct ether_addr *) p + ah->ar_hln + 4));
+                               ether_ntoa((struct ether_addr *) p + ah->ar_hln + 4));
                }
-               if (last.tv_sec) {
-                       long usecs = (tv.tv_sec - last.tv_sec) * 1000000 +
-                               tv.tv_usec - last.tv_usec;
-                       long msecs = (usecs + 500) / 1000;
 
-                       usecs -= msecs * 1000 - 500;
-                       printf(" %ld.%03ldms\n", msecs, usecs);
+               if (last) {
+                       printf(" %u.%03ums\n", last / 1000, last % 1000);
                } else {
                        printf(" UNSOLICITED?\n");
                }
@@ -251,215 +218,147 @@ static int recv_pack(unsigned char *buf, int len, struct sockaddr_ll *FROM)
                brd_recv++;
        if (ah->ar_op == htons(ARPOP_REQUEST))
                req_recv++;
-       if (quit_on_reply)
+       if (option_mask32 & QUIT_ON_REPLY)
                finish();
-       if (!broadcast_only) {
+       if (!(option_mask32 & BCAST_ONLY)) {
                memcpy(he.sll_addr, p, me.sll_halen);
-               unicasting = 1;
+               option_mask32 |= UNICASTING;
        }
        return 1;
 }
 
+int arping_main(int argc, char **argv);
 int arping_main(int argc, char **argv)
 {
-       int socket_errno;
-       int ch;
-       uid_t uid = getuid();
-       char *device = "eth0";
-       int ifindex = 0;
+       const char *device = "eth0";
+       int ifindex;
        char *source = NULL;
        char *target;
+       unsigned char *packet;
 
-       s = socket(PF_PACKET, SOCK_DGRAM, 0);
-       socket_errno = errno;
-
-       setuid(uid);
-
-       while ((ch = getopt(argc, argv, "h?bfDUAqc:w:s:I:")) != EOF) {
-               switch (ch) {
-               case 'b':
-                       broadcast_only = 1;
-                       break;
-               case 'D':
-                       dad++;
-                       quit_on_reply = 1;
-                       break;
-               case 'U':
-                       unsolicited++;
-                       break;
-               case 'A':
-                       advert++;
-                       unsolicited++;
-                       break;
-               case 'q':
-                       quiet++;
-                       break;
-               case 'c':
-                       count = atoi(optarg);
-                       break;
-               case 'w':
-                       timeout = atoi(optarg);
-                       break;
-               case 'I':
-                       if (optarg == NULL)
-                               bb_show_usage();
-                       if (bb_strlen(optarg) > IF_NAMESIZE) {
-                               bb_error_msg("Interface name `%s' must be less than %d", optarg,
-                                                 IF_NAMESIZE);
-                               exit(2);
-                       }
-                       device = optarg;
-                       break;
-               case 'f':
-                       quit_on_reply = 1;
-                       break;
-               case 's':
-                       source = optarg;
-                       break;
-               case 'h':
-               case '?':
-               default:
-                       bb_show_usage();
-               }
-       }
-       argc -= optind;
-       argv += optind;
-
-       if (argc != 1)
-               bb_show_usage();
+       sock = xsocket(PF_PACKET, SOCK_DGRAM, 0);
 
-       target = *argv;
+       // Drop suid root privileges
+       xsetuid(getuid());
 
+       {
+               unsigned opt;
+               char *str_count, *str_timeout;
 
-       if (s < 0) {
-               bb_error_msg("socket");
-               exit(socket_errno);
+               /* Dad also sets quit_on_reply.
+                * Advert also sets unsolicited.
+                */
+               opt_complementary = "=1:Df:AU";
+               opt = getopt32(argv, "DUAqfbc:w:I:s:",
+                               &str_count, &str_timeout, &device, &source);
+               if (opt & 0x40) /* -c: count */
+                       count = xatou(str_count);
+               if (opt & 0x80) /* -w: timeout */
+                       timeout_us = xatou_range(str_timeout, 0, INT_MAX/2000000) * 1000000;
+               //if (opt & 0x100) /* -I: interface */
+               if (strlen(device) >= IF_NAMESIZE) {
+                       bb_error_msg_and_die("interface name '%s' is too long",
+                                                       device);
+               }
+               //if (opt & 0x200) /* -s: source */
+               option_mask32 &= 0x3f; /* set respective flags */
        }
 
+       target = argv[optind];
+
+       xfunc_error_retval = 2;
+
        {
                struct ifreq ifr;
 
                memset(&ifr, 0, sizeof(ifr));
                strncpy(ifr.ifr_name, device, IFNAMSIZ - 1);
-               if (ioctl(s, SIOCGIFINDEX, &ifr) < 0) {
-                       bb_error_msg("Interface %s not found", device);
-                       exit(2);
-               }
+               ioctl_or_perror_and_die(sock, SIOCGIFINDEX, &ifr, "interface %s not found", device);
                ifindex = ifr.ifr_ifindex;
 
-               if (ioctl(s, SIOCGIFFLAGS, (char *) &ifr)) {
-                       bb_error_msg("SIOCGIFFLAGS");
-                       exit(2);
-               }
+               xioctl(sock, SIOCGIFFLAGS, (char *) &ifr);
+
                if (!(ifr.ifr_flags & IFF_UP)) {
-                       bb_error_msg("Interface %s is down", device);
-                       exit(2);
+                       bb_error_msg_and_die("interface %s is down", device);
                }
                if (ifr.ifr_flags & (IFF_NOARP | IFF_LOOPBACK)) {
-                       bb_error_msg("Interface %s is not ARPable", device);
-                       exit(dad ? 0 : 2);
+                       bb_error_msg("interface %s is not ARPable", device);
+                       return (option_mask32 & DAD ? 0 : 2);
                }
        }
 
        if (!inet_aton(target, &dst)) {
-               struct hostent *hp;
-
-               hp = gethostbyname2(target, AF_INET);
-               if (!hp) {
-                       bb_error_msg("invalid or unknown target %s", target);
-                       exit(2);
-               }
-               memcpy(&dst, hp->h_addr, 4);
+               len_and_sockaddr *lsa;
+               lsa = xhost_and_af2sockaddr(target, 0, AF_INET);
+               memcpy(&dst, &lsa->sin.sin_addr.s_addr, 4);
+               if (ENABLE_FEATURE_CLEAN_UP)
+                       free(lsa);
        }
 
        if (source && !inet_aton(source, &src)) {
-               bb_error_msg("invalid source address %s", source);
-               exit(2);
+               bb_error_msg_and_die("invalid source address %s", source);
        }
 
-       if (!dad && unsolicited && src.s_addr == 0)
+       if (!(option_mask32 & DAD) && (option_mask32 & UNSOLICITED) && src.s_addr == 0)
                src = dst;
 
-       if (!dad || src.s_addr) {
+       if (!(option_mask32 & DAD) || src.s_addr) {
                struct sockaddr_in saddr;
-               int probe_fd = socket(AF_INET, SOCK_DGRAM, 0);
+               int probe_fd = xsocket(AF_INET, SOCK_DGRAM, 0);
 
-               if (probe_fd < 0) {
-                       bb_error_msg("socket");
-                       exit(2);
-               }
                if (device) {
-                       if (setsockopt
-                               (probe_fd, SOL_SOCKET, SO_BINDTODEVICE, device,
-                                strlen(device) + 1) == -1)
-                               bb_error_msg("WARNING: interface %s is ignored", device);
+                       if (setsockopt(probe_fd, SOL_SOCKET, SO_BINDTODEVICE, device, strlen(device) + 1) == -1)
+                               bb_error_msg("warning: interface %s is ignored", device);
                }
                memset(&saddr, 0, sizeof(saddr));
                saddr.sin_family = AF_INET;
                if (src.s_addr) {
                        saddr.sin_addr = src;
-                       if (bind(probe_fd, (struct sockaddr *) &saddr, sizeof(saddr)) == -1) {
-                               bb_error_msg("bind");
-                               exit(2);
-                       }
-               } else if (!dad) {
-                       int on = 1;
+                       xbind(probe_fd, (struct sockaddr *) &saddr, sizeof(saddr));
+               } else if (!(option_mask32 & DAD)) {
                        socklen_t alen = sizeof(saddr);
 
                        saddr.sin_port = htons(1025);
                        saddr.sin_addr = dst;
 
-                       if (setsockopt
-                               (probe_fd, SOL_SOCKET, SO_DONTROUTE, (char *) &on,
-                                sizeof(on)) == -1)
-                               perror("WARNING: setsockopt(SO_DONTROUTE)");
-                       if (connect(probe_fd, (struct sockaddr *) &saddr, sizeof(saddr))
-                               == -1) {
-                               bb_error_msg("connect");
-                               exit(2);
-                       }
-                       if (getsockname(probe_fd, (struct sockaddr *) &saddr, &alen) ==
-                               -1) {
-                               bb_error_msg("getsockname");
-                               exit(2);
+                       if (setsockopt(probe_fd, SOL_SOCKET, SO_DONTROUTE, &const_int_1, sizeof(const_int_1)) == -1)
+                               bb_perror_msg("warning: setsockopt(SO_DONTROUTE)");
+                       xconnect(probe_fd, (struct sockaddr *) &saddr, sizeof(saddr));
+                       if (getsockname(probe_fd, (struct sockaddr *) &saddr, &alen) == -1) {
+                               bb_error_msg_and_die("getsockname");
                        }
                        src = saddr.sin_addr;
                }
                close(probe_fd);
-       };
+       }
 
        me.sll_family = AF_PACKET;
        me.sll_ifindex = ifindex;
        me.sll_protocol = htons(ETH_P_ARP);
-       if (bind(s, (struct sockaddr *) &me, sizeof(me)) == -1) {
-               bb_error_msg("bind");
-               exit(2);
-       }
+       xbind(sock, (struct sockaddr *) &me, sizeof(me));
 
        {
                socklen_t alen = sizeof(me);
 
-               if (getsockname(s, (struct sockaddr *) &me, &alen) == -1) {
-                       bb_error_msg("getsockname");
-                       exit(2);
+               if (getsockname(sock, (struct sockaddr *) &me, &alen) == -1) {
+                       bb_error_msg_and_die("getsockname");
                }
        }
        if (me.sll_halen == 0) {
-               bb_error_msg("Interface \"%s\" is not ARPable (no ll address)", device);
-               exit(dad ? 0 : 2);
+               bb_error_msg("interface \"%s\" is not ARPable (no ll address)", device);
+               return (option_mask32 & DAD ? 0 : 2);
        }
        he = me;
        memset(he.sll_addr, -1, he.sll_halen);
 
-       if (!quiet) {
-               printf("ARPING to %s", inet_ntoa(dst));
-               printf(" from %s via %s\n", inet_ntoa(src),
-                          device ? device : "unknown");
+       if (!(option_mask32 & QUIET)) {
+               printf("ARPING to %s from %s via %s\n",
+                       inet_ntoa(dst), inet_ntoa(src),
+                       device ? device : "unknown");
        }
 
-       if (!src.s_addr && !dad) {
-               bb_error_msg("no src address in the non-DAD mode");
-               exit(2);
+       if (!src.s_addr && !(option_mask32 & DAD)) {
+               bb_error_msg_and_die("no src address in the non-DAD mode");
        }
 
        {
@@ -477,16 +376,16 @@ int arping_main(int argc, char **argv)
 
        catcher();
 
+       packet = xmalloc(4096);
        while (1) {
                sigset_t sset, osset;
-               unsigned char packet[4096];
                struct sockaddr_ll from;
                socklen_t alen = sizeof(from);
                int cc;
 
-               if ((cc = recvfrom(s, packet, sizeof(packet), 0,
-                                                  (struct sockaddr *) &from, &alen)) < 0) {
-                       perror("recvfrom");
+               cc = recvfrom(sock, packet, 4096, 0, (struct sockaddr *) &from, &alen);
+               if (cc < 0) {
+                       bb_perror_msg("recvfrom");
                        continue;
                }
                sigemptyset(&sset);