[821] | 1 | /* vi: set sw=4 ts=4: */
|
---|
| 2 | /*
|
---|
| 3 | * ether-wake.c - Send a magic packet to wake up sleeping machines.
|
---|
| 4 | *
|
---|
[2725] | 5 | * Licensed under GPLv2 or later, see file LICENSE in this source tree.
|
---|
[821] | 6 | *
|
---|
| 7 | * Author: Donald Becker, http://www.scyld.com/"; http://www.scyld.com/wakeonlan.html
|
---|
| 8 | * Busybox port: Christian Volkmann <haveaniceday@online.de>
|
---|
| 9 | * Used version of ether-wake.c: v1.09 11/12/2003 Donald Becker, http://www.scyld.com/";
|
---|
| 10 | */
|
---|
| 11 |
|
---|
| 12 | /* full usage according Donald Becker
|
---|
| 13 | * usage: ether-wake [-i <ifname>] [-p aa:bb:cc:dd[:ee:ff]] 00:11:22:33:44:55\n"
|
---|
| 14 | *
|
---|
| 15 | * This program generates and transmits a Wake-On-LAN (WOL)\n"
|
---|
| 16 | * \"Magic Packet\", used for restarting machines that have been\n"
|
---|
| 17 | * soft-powered-down (ACPI D3-warm state).\n"
|
---|
| 18 | * It currently generates the standard AMD Magic Packet format, with\n"
|
---|
| 19 | * an optional password appended.\n"
|
---|
| 20 | *
|
---|
| 21 | * The single required parameter is the Ethernet MAC (station) address\n"
|
---|
| 22 | * of the machine to wake or a host ID with known NSS 'ethers' entry.\n"
|
---|
| 23 | * The MAC address may be found with the 'arp' program while the target\n"
|
---|
| 24 | * machine is awake.\n"
|
---|
| 25 | *
|
---|
| 26 | * Options:\n"
|
---|
| 27 | * -b Send wake-up packet to the broadcast address.\n"
|
---|
| 28 | * -D Increase the debug level.\n"
|
---|
| 29 | * -i ifname Use interface IFNAME instead of the default 'eth0'.\n"
|
---|
| 30 | * -p <pw> Append the four or six byte password PW to the packet.\n"
|
---|
| 31 | * A password is only required for a few adapter types.\n"
|
---|
| 32 | * The password may be specified in ethernet hex format\n"
|
---|
| 33 | * or dotted decimal (Internet address)\n"
|
---|
| 34 | * -p 00:22:44:66:88:aa\n"
|
---|
| 35 | * -p 192.168.1.1\n";
|
---|
| 36 | *
|
---|
| 37 | *
|
---|
| 38 | * This program generates and transmits a Wake-On-LAN (WOL) "Magic Packet",
|
---|
| 39 | * used for restarting machines that have been soft-powered-down
|
---|
| 40 | * (ACPI D3-warm state). It currently generates the standard AMD Magic Packet
|
---|
| 41 | * format, with an optional password appended.
|
---|
| 42 | *
|
---|
| 43 | * This software may be used and distributed according to the terms
|
---|
| 44 | * of the GNU Public License, incorporated herein by reference.
|
---|
| 45 | * Contact the author for use under other terms.
|
---|
| 46 | *
|
---|
| 47 | * This source file was originally part of the network tricks package, and
|
---|
| 48 | * is now distributed to support the Scyld Beowulf system.
|
---|
| 49 | * Copyright 1999-2003 Donald Becker and Scyld Computing Corporation.
|
---|
| 50 | *
|
---|
| 51 | * The author may be reached as becker@scyld, or C/O
|
---|
[3232] | 52 | * Scyld Computing Corporation
|
---|
| 53 | * 914 Bay Ridge Road, Suite 220
|
---|
| 54 | * Annapolis MD 21403
|
---|
[821] | 55 | *
|
---|
| 56 | * Notes:
|
---|
| 57 | * On some systems dropping root capability allows the process to be
|
---|
| 58 | * dumped, traced or debugged.
|
---|
| 59 | * If someone traces this program, they get control of a raw socket.
|
---|
| 60 | * Linux handles this safely, but beware when porting this program.
|
---|
| 61 | *
|
---|
| 62 | * An alternative to needing 'root' is using a UDP broadcast socket, however
|
---|
| 63 | * doing so only works with adapters configured for unicast+broadcast Rx
|
---|
| 64 | * filter. That configuration consumes more power.
|
---|
| 65 | */
|
---|
| 66 |
|
---|
[3232] | 67 | //usage:#define ether_wake_trivial_usage
|
---|
| 68 | //usage: "[-b] [-i iface] [-p aa:bb:cc:dd[:ee:ff]] MAC"
|
---|
| 69 | //usage:#define ether_wake_full_usage "\n\n"
|
---|
| 70 | //usage: "Send a magic packet to wake up sleeping machines.\n"
|
---|
| 71 | //usage: "MAC must be a station address (00:11:22:33:44:55) or\n"
|
---|
| 72 | //usage: "a hostname with a known 'ethers' entry.\n"
|
---|
| 73 | //usage: "\n -b Send wake-up packet to the broadcast address"
|
---|
| 74 | //usage: "\n -i iface Interface to use (default eth0)"
|
---|
| 75 | //usage: "\n -p pass Append four or six byte password PW to the packet"
|
---|
[821] | 76 |
|
---|
[3232] | 77 | #include "libbb.h"
|
---|
[821] | 78 | #include <netpacket/packet.h>
|
---|
| 79 | #include <netinet/ether.h>
|
---|
| 80 | #include <linux/if.h>
|
---|
| 81 |
|
---|
| 82 | /* Note: PF_INET, SOCK_DGRAM, IPPROTO_UDP would allow SIOCGIFHWADDR to
|
---|
| 83 | * work as non-root, but we need SOCK_PACKET to specify the Ethernet
|
---|
| 84 | * destination address.
|
---|
| 85 | */
|
---|
| 86 | #ifdef PF_PACKET
|
---|
| 87 | # define whereto_t sockaddr_ll
|
---|
[1765] | 88 | # define make_socket() xsocket(PF_PACKET, SOCK_RAW, 0)
|
---|
[821] | 89 | #else
|
---|
| 90 | # define whereto_t sockaddr
|
---|
[1765] | 91 | # define make_socket() xsocket(AF_INET, SOCK_PACKET, SOCK_PACKET)
|
---|
[821] | 92 | #endif
|
---|
| 93 |
|
---|
| 94 | #ifdef DEBUG
|
---|
| 95 | # define bb_debug_msg(fmt, args...) fprintf(stderr, fmt, ## args)
|
---|
| 96 | void bb_debug_dump_packet(unsigned char *outpack, int pktsize)
|
---|
| 97 | {
|
---|
| 98 | int i;
|
---|
| 99 | printf("packet dump:\n");
|
---|
| 100 | for (i = 0; i < pktsize; ++i) {
|
---|
| 101 | printf("%2.2x ", outpack[i]);
|
---|
[2725] | 102 | if (i % 20 == 19) bb_putchar('\n');
|
---|
[821] | 103 | }
|
---|
| 104 | printf("\n\n");
|
---|
| 105 | }
|
---|
| 106 | #else
|
---|
[1765] | 107 | # define bb_debug_msg(fmt, args...) ((void)0)
|
---|
| 108 | # define bb_debug_dump_packet(outpack, pktsize) ((void)0)
|
---|
[821] | 109 | #endif
|
---|
| 110 |
|
---|
[1765] | 111 | /* Convert the host ID string to a MAC address.
|
---|
| 112 | * The string may be a:
|
---|
| 113 | * Host name
|
---|
| 114 | * IP address string
|
---|
| 115 | * MAC address string
|
---|
[3232] | 116 | */
|
---|
[1765] | 117 | static void get_dest_addr(const char *hostid, struct ether_addr *eaddr)
|
---|
| 118 | {
|
---|
| 119 | struct ether_addr *eap;
|
---|
[821] | 120 |
|
---|
[2725] | 121 | eap = ether_aton_r(hostid, eaddr);
|
---|
[1765] | 122 | if (eap) {
|
---|
[2725] | 123 | bb_debug_msg("The target station address is %s\n\n", ether_ntoa(eap));
|
---|
| 124 | #if !defined(__UCLIBC_MAJOR__) \
|
---|
| 125 | || __UCLIBC_MAJOR__ > 0 \
|
---|
| 126 | || __UCLIBC_MINOR__ > 9 \
|
---|
| 127 | || (__UCLIBC_MINOR__ == 9 && __UCLIBC_SUBLEVEL__ >= 30)
|
---|
[1765] | 128 | } else if (ether_hostton(hostid, eaddr) == 0) {
|
---|
| 129 | bb_debug_msg("Station address for hostname %s is %s\n\n", hostid, ether_ntoa(eaddr));
|
---|
| 130 | #endif
|
---|
[2725] | 131 | } else {
|
---|
[1765] | 132 | bb_show_usage();
|
---|
[2725] | 133 | }
|
---|
[1765] | 134 | }
|
---|
| 135 |
|
---|
| 136 | static int get_fill(unsigned char *pkt, struct ether_addr *eaddr, int broadcast)
|
---|
[821] | 137 | {
|
---|
[1765] | 138 | int i;
|
---|
| 139 | unsigned char *station_addr = eaddr->ether_addr_octet;
|
---|
| 140 |
|
---|
| 141 | memset(pkt, 0xff, 6);
|
---|
| 142 | if (!broadcast)
|
---|
| 143 | memcpy(pkt, station_addr, 6);
|
---|
| 144 | pkt += 6;
|
---|
| 145 |
|
---|
| 146 | memcpy(pkt, station_addr, 6); /* 6 */
|
---|
| 147 | pkt += 6;
|
---|
| 148 |
|
---|
| 149 | *pkt++ = 0x08; /* 12 */ /* Or 0x0806 for ARP, 0x8035 for RARP */
|
---|
| 150 | *pkt++ = 0x42; /* 13 */
|
---|
| 151 |
|
---|
| 152 | memset(pkt, 0xff, 6); /* 14 */
|
---|
| 153 |
|
---|
| 154 | for (i = 0; i < 16; ++i) {
|
---|
| 155 | pkt += 6;
|
---|
| 156 | memcpy(pkt, station_addr, 6); /* 20,26,32,... */
|
---|
| 157 | }
|
---|
| 158 |
|
---|
| 159 | return 20 + 16*6; /* length of packet */
|
---|
| 160 | }
|
---|
| 161 |
|
---|
| 162 | static int get_wol_pw(const char *ethoptarg, unsigned char *wol_passwd)
|
---|
| 163 | {
|
---|
| 164 | unsigned passwd[6];
|
---|
| 165 | int byte_cnt, i;
|
---|
| 166 |
|
---|
| 167 | /* handle MAC format */
|
---|
| 168 | byte_cnt = sscanf(ethoptarg, "%2x:%2x:%2x:%2x:%2x:%2x",
|
---|
| 169 | &passwd[0], &passwd[1], &passwd[2],
|
---|
| 170 | &passwd[3], &passwd[4], &passwd[5]);
|
---|
| 171 | /* handle IP format */
|
---|
| 172 | // FIXME: why < 4?? should it be < 6?
|
---|
| 173 | if (byte_cnt < 4)
|
---|
| 174 | byte_cnt = sscanf(ethoptarg, "%u.%u.%u.%u",
|
---|
| 175 | &passwd[0], &passwd[1], &passwd[2], &passwd[3]);
|
---|
| 176 | if (byte_cnt < 4) {
|
---|
[2725] | 177 | bb_error_msg("can't read Wake-On-LAN pass");
|
---|
[1765] | 178 | return 0;
|
---|
| 179 | }
|
---|
| 180 | // TODO: check invalid numbers >255??
|
---|
| 181 | for (i = 0; i < byte_cnt; ++i)
|
---|
| 182 | wol_passwd[i] = passwd[i];
|
---|
| 183 |
|
---|
| 184 | bb_debug_msg("password: %2.2x %2.2x %2.2x %2.2x (%d)\n\n",
|
---|
| 185 | wol_passwd[0], wol_passwd[1], wol_passwd[2], wol_passwd[3],
|
---|
| 186 | byte_cnt);
|
---|
| 187 |
|
---|
| 188 | return byte_cnt;
|
---|
| 189 | }
|
---|
| 190 |
|
---|
[2725] | 191 | int ether_wake_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
---|
| 192 | int ether_wake_main(int argc UNUSED_PARAM, char **argv)
|
---|
[1765] | 193 | {
|
---|
| 194 | const char *ifname = "eth0";
|
---|
| 195 | char *pass;
|
---|
| 196 | unsigned flags;
|
---|
[821] | 197 | unsigned char wol_passwd[6];
|
---|
| 198 | int wol_passwd_sz = 0;
|
---|
[2725] | 199 | int s; /* Raw socket */
|
---|
[821] | 200 | int pktsize;
|
---|
| 201 | unsigned char outpack[1000];
|
---|
| 202 |
|
---|
| 203 | struct ether_addr eaddr;
|
---|
[2725] | 204 | struct whereto_t whereto; /* who to wake up */
|
---|
[821] | 205 |
|
---|
| 206 | /* handle misc user options */
|
---|
[1765] | 207 | opt_complementary = "=1";
|
---|
| 208 | flags = getopt32(argv, "bi:p:", &ifname, &pass);
|
---|
| 209 | if (flags & 4) /* -p */
|
---|
[821] | 210 | wol_passwd_sz = get_wol_pw(pass, wol_passwd);
|
---|
[1765] | 211 | flags &= 1; /* we further interested only in -b [bcast] flag */
|
---|
[821] | 212 |
|
---|
| 213 | /* create the raw socket */
|
---|
| 214 | s = make_socket();
|
---|
| 215 |
|
---|
| 216 | /* now that we have a raw socket we can drop root */
|
---|
[1765] | 217 | /* xsetuid(getuid()); - but save on code size... */
|
---|
[821] | 218 |
|
---|
| 219 | /* look up the dest mac address */
|
---|
| 220 | get_dest_addr(argv[optind], &eaddr);
|
---|
| 221 |
|
---|
| 222 | /* fill out the header of the packet */
|
---|
[1765] | 223 | pktsize = get_fill(outpack, &eaddr, flags /* & 1 OPT_BROADCAST */);
|
---|
[821] | 224 |
|
---|
| 225 | bb_debug_dump_packet(outpack, pktsize);
|
---|
| 226 |
|
---|
| 227 | /* Fill in the source address, if possible. */
|
---|
| 228 | #ifdef __linux__
|
---|
| 229 | {
|
---|
| 230 | struct ifreq if_hwaddr;
|
---|
| 231 |
|
---|
[2725] | 232 | strncpy_IFNAMSIZ(if_hwaddr.ifr_name, ifname);
|
---|
[1765] | 233 | ioctl_or_perror_and_die(s, SIOCGIFHWADDR, &if_hwaddr, "SIOCGIFHWADDR on %s failed", ifname);
|
---|
[821] | 234 |
|
---|
| 235 | memcpy(outpack+6, if_hwaddr.ifr_hwaddr.sa_data, 6);
|
---|
| 236 |
|
---|
| 237 | # ifdef DEBUG
|
---|
| 238 | {
|
---|
| 239 | unsigned char *hwaddr = if_hwaddr.ifr_hwaddr.sa_data;
|
---|
| 240 | printf("The hardware address (SIOCGIFHWADDR) of %s is type %d "
|
---|
[3232] | 241 | "%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x\n\n", ifname,
|
---|
| 242 | if_hwaddr.ifr_hwaddr.sa_family, hwaddr[0], hwaddr[1],
|
---|
| 243 | hwaddr[2], hwaddr[3], hwaddr[4], hwaddr[5]);
|
---|
[821] | 244 | }
|
---|
| 245 | # endif
|
---|
| 246 | }
|
---|
| 247 | #endif /* __linux__ */
|
---|
| 248 |
|
---|
| 249 | bb_debug_dump_packet(outpack, pktsize);
|
---|
| 250 |
|
---|
| 251 | /* append the password if specified */
|
---|
| 252 | if (wol_passwd_sz > 0) {
|
---|
| 253 | memcpy(outpack+pktsize, wol_passwd, wol_passwd_sz);
|
---|
| 254 | pktsize += wol_passwd_sz;
|
---|
| 255 | }
|
---|
| 256 |
|
---|
| 257 | bb_debug_dump_packet(outpack, pktsize);
|
---|
| 258 |
|
---|
| 259 | /* This is necessary for broadcasts to work */
|
---|
[1765] | 260 | if (flags /* & 1 OPT_BROADCAST */) {
|
---|
| 261 | if (setsockopt_broadcast(s) != 0)
|
---|
[821] | 262 | bb_perror_msg("SO_BROADCAST");
|
---|
| 263 | }
|
---|
| 264 |
|
---|
| 265 | #if defined(PF_PACKET)
|
---|
| 266 | {
|
---|
| 267 | struct ifreq ifr;
|
---|
[2725] | 268 | strncpy_IFNAMSIZ(ifr.ifr_name, ifname);
|
---|
[1765] | 269 | xioctl(s, SIOCGIFINDEX, &ifr);
|
---|
[821] | 270 | memset(&whereto, 0, sizeof(whereto));
|
---|
| 271 | whereto.sll_family = AF_PACKET;
|
---|
| 272 | whereto.sll_ifindex = ifr.ifr_ifindex;
|
---|
| 273 | /* The manual page incorrectly claims the address must be filled.
|
---|
| 274 | We do so because the code may change to match the docs. */
|
---|
| 275 | whereto.sll_halen = ETH_ALEN;
|
---|
| 276 | memcpy(whereto.sll_addr, outpack, ETH_ALEN);
|
---|
| 277 | }
|
---|
| 278 | #else
|
---|
| 279 | whereto.sa_family = 0;
|
---|
| 280 | strcpy(whereto.sa_data, ifname);
|
---|
| 281 | #endif
|
---|
[1765] | 282 | xsendto(s, outpack, pktsize, (struct sockaddr *)&whereto, sizeof(whereto));
|
---|
| 283 | if (ENABLE_FEATURE_CLEAN_UP)
|
---|
| 284 | close(s);
|
---|
[821] | 285 | return EXIT_SUCCESS;
|
---|
| 286 | }
|
---|