456 lines
12 KiB
C
456 lines
12 KiB
C
/*
|
|
* Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
* distributions including binary code include the above copyright notice and
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
* features or use of this software display the following acknowledgement:
|
|
* ``This product includes software developed by the University of California,
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
* the University nor the names of its contributors may be used to endorse
|
|
* or promote products derived from this software without specific prior
|
|
* written permission.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
*/
|
|
|
|
#include "varattrs.h"
|
|
|
|
/*
|
|
* This doesn't actually test libpcap itself; it tests whether
|
|
* valgrind properly handles the APIs libpcap uses. If it doesn't,
|
|
* we end up getting patches submitted to "fix" references that
|
|
* valgrind claims are being made to uninitialized data, when, in
|
|
* fact, the OS isn't making any such references - or we get
|
|
* valgrind *not* detecting *actual* incorrect references.
|
|
*
|
|
* Both BPF and Linux socket filters aren't handled correctly
|
|
* by some versions of valgrind. See valgrind bug 318203 for
|
|
* Linux:
|
|
*
|
|
* https://bugs.kde.org/show_bug.cgi?id=318203
|
|
*
|
|
* and valgrind bug 312989 for macOS:
|
|
*
|
|
* https://bugs.kde.org/show_bug.cgi?id=312989
|
|
*
|
|
* The fixes for both of those are checked into the official valgrind
|
|
* repository.
|
|
*
|
|
* The unofficial FreeBSD port has similar issues to the official macOS
|
|
* port, for similar reasons.
|
|
*/
|
|
#ifndef lint
|
|
static const char copyright[] _U_ =
|
|
"@(#) Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000\n\
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
#endif
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <stdarg.h>
|
|
#include <limits.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include "pcap/funcattrs.h"
|
|
|
|
#if defined(__APPLE__) || defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__DragonFly__) || defined(_AIX) || defined(sun)
|
|
/* OS with BPF - use BPF */
|
|
#define USE_BPF
|
|
#elif defined(linux)
|
|
/* Linux - use socket filters */
|
|
#define USE_SOCKET_FILTERS
|
|
#else
|
|
#error "Unknown platform or platform that doesn't support Valgrind"
|
|
#endif
|
|
|
|
#if defined(USE_BPF)
|
|
|
|
#include <sys/ioctl.h>
|
|
#include <net/bpf.h>
|
|
|
|
/*
|
|
* Make "pcap.h" not include "pcap/bpf.h"; we are going to include the
|
|
* native OS version, as we're going to be doing our own ioctls to
|
|
* make sure that, in the uninitialized-data tests, the filters aren't
|
|
* checked by libpcap before being handed to BPF.
|
|
*/
|
|
#define PCAP_DONT_INCLUDE_PCAP_BPF_H
|
|
|
|
#elif defined(USE_SOCKET_FILTERS)
|
|
|
|
#include <sys/socket.h>
|
|
#include <linux/types.h>
|
|
#include <linux/filter.h>
|
|
|
|
#endif
|
|
|
|
/*
|
|
* Squelch a warning.
|
|
*
|
|
* We include system headers to be able to directly set the filter to
|
|
* a program with uninitialized content, to make sure what we're testing
|
|
* is Valgrind's checking of the system call to set the filter, and we
|
|
* also include <pcap.h> to open the device in the first place, and that
|
|
* means that we may get collisions between their definitions of
|
|
* BPF_STMT and BPF_JUMP - and do, in fact, get them on Linux (the
|
|
* definitons may be semantically the same, but that's not sufficient to
|
|
* avoid the warnings, as the preprocessor doesn't know that u_short is
|
|
* just unsigned short).
|
|
*
|
|
* So we undefine BPF_STMT and BPF_JUMP to avoid the warning.
|
|
*/
|
|
#undef BPF_STMT
|
|
#undef BPF_JUMP
|
|
#include <pcap.h>
|
|
|
|
static char *program_name;
|
|
|
|
/* Forwards */
|
|
static void PCAP_NORETURN usage(void);
|
|
static void PCAP_NORETURN error(const char *, ...) PCAP_PRINTFLIKE(1, 2);
|
|
static void warning(const char *, ...) PCAP_PRINTFLIKE(1, 2);
|
|
|
|
/*
|
|
* On Windows, we need to open the file in binary mode, so that
|
|
* we get all the bytes specified by the size we get from "fstat()".
|
|
* On UNIX, that's not necessary. O_BINARY is defined on Windows;
|
|
* we define it as 0 if it's not defined, so it does nothing.
|
|
*/
|
|
#ifndef O_BINARY
|
|
#define O_BINARY 0
|
|
#endif
|
|
|
|
static char *
|
|
read_infile(char *fname)
|
|
{
|
|
register int i, fd, cc;
|
|
register char *cp;
|
|
struct stat buf;
|
|
|
|
fd = open(fname, O_RDONLY|O_BINARY);
|
|
if (fd < 0)
|
|
error("can't open %s: %s", fname, pcap_strerror(errno));
|
|
|
|
if (fstat(fd, &buf) < 0)
|
|
error("can't stat %s: %s", fname, pcap_strerror(errno));
|
|
|
|
/*
|
|
* _read(), on Windows, has an unsigned int byte count and an
|
|
* int return value, so we can't handle a file bigger than
|
|
* INT_MAX - 1 bytes (and have no reason to do so; a filter *that*
|
|
* big will take forever to compile). (The -1 is for the '\0' at
|
|
* the end of the string.)
|
|
*/
|
|
if (buf.st_size > INT_MAX - 1)
|
|
error("%s is larger than %d bytes; that's too large", fname,
|
|
INT_MAX - 1);
|
|
cp = malloc((u_int)buf.st_size + 1);
|
|
if (cp == NULL)
|
|
error("malloc(%d) for %s: %s", (u_int)buf.st_size + 1,
|
|
fname, pcap_strerror(errno));
|
|
cc = (int)read(fd, cp, (u_int)buf.st_size);
|
|
if (cc < 0)
|
|
error("read %s: %s", fname, pcap_strerror(errno));
|
|
if (cc != buf.st_size)
|
|
error("short read %s (%d != %d)", fname, cc, (int)buf.st_size);
|
|
|
|
close(fd);
|
|
/* replace "# comment" with spaces */
|
|
for (i = 0; i < cc; i++) {
|
|
if (cp[i] == '#')
|
|
while (i < cc && cp[i] != '\n')
|
|
cp[i++] = ' ';
|
|
}
|
|
cp[cc] = '\0';
|
|
return (cp);
|
|
}
|
|
|
|
/* VARARGS */
|
|
static void
|
|
error(const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
(void)fprintf(stderr, "%s: ", program_name);
|
|
va_start(ap, fmt);
|
|
(void)vfprintf(stderr, fmt, ap);
|
|
va_end(ap);
|
|
if (*fmt) {
|
|
fmt += strlen(fmt);
|
|
if (fmt[-1] != '\n')
|
|
(void)fputc('\n', stderr);
|
|
}
|
|
exit(1);
|
|
/* NOTREACHED */
|
|
}
|
|
|
|
/* VARARGS */
|
|
static void
|
|
warning(const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
(void)fprintf(stderr, "%s: WARNING: ", program_name);
|
|
va_start(ap, fmt);
|
|
(void)vfprintf(stderr, fmt, ap);
|
|
va_end(ap);
|
|
if (*fmt) {
|
|
fmt += strlen(fmt);
|
|
if (fmt[-1] != '\n')
|
|
(void)fputc('\n', stderr);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Copy arg vector into a new buffer, concatenating arguments with spaces.
|
|
*/
|
|
static char *
|
|
copy_argv(register char **argv)
|
|
{
|
|
register char **p;
|
|
register size_t len = 0;
|
|
char *buf;
|
|
char *src, *dst;
|
|
|
|
p = argv;
|
|
if (*p == 0)
|
|
return 0;
|
|
|
|
while (*p)
|
|
len += strlen(*p++) + 1;
|
|
|
|
buf = (char *)malloc(len);
|
|
if (buf == NULL)
|
|
error("copy_argv: malloc");
|
|
|
|
p = argv;
|
|
dst = buf;
|
|
while ((src = *p++) != NULL) {
|
|
while ((*dst++ = *src++) != '\0')
|
|
;
|
|
dst[-1] = ' ';
|
|
}
|
|
dst[-1] = '\0';
|
|
|
|
return buf;
|
|
}
|
|
|
|
#define INSN_COUNT 17
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
char *cp, *device;
|
|
int op;
|
|
int dorfmon, useactivate;
|
|
char ebuf[PCAP_ERRBUF_SIZE];
|
|
char *infile;
|
|
const char *cmdbuf;
|
|
pcap_if_t *devlist;
|
|
pcap_t *pd;
|
|
int status = 0;
|
|
int pcap_fd;
|
|
#if defined(USE_BPF)
|
|
struct bpf_program bad_fcode;
|
|
struct bpf_insn uninitialized[INSN_COUNT];
|
|
#elif defined(USE_SOCKET_FILTERS)
|
|
struct sock_fprog bad_fcode;
|
|
struct sock_filter uninitialized[INSN_COUNT];
|
|
#endif
|
|
struct bpf_program fcode;
|
|
|
|
device = NULL;
|
|
dorfmon = 0;
|
|
useactivate = 0;
|
|
infile = NULL;
|
|
|
|
if ((cp = strrchr(argv[0], '/')) != NULL)
|
|
program_name = cp + 1;
|
|
else
|
|
program_name = argv[0];
|
|
|
|
opterr = 0;
|
|
while ((op = getopt(argc, argv, "aF:i:I")) != -1) {
|
|
switch (op) {
|
|
|
|
case 'a':
|
|
useactivate = 1;
|
|
break;
|
|
|
|
case 'F':
|
|
infile = optarg;
|
|
break;
|
|
|
|
case 'i':
|
|
device = optarg;
|
|
break;
|
|
|
|
case 'I':
|
|
dorfmon = 1;
|
|
useactivate = 1; /* required for rfmon */
|
|
break;
|
|
|
|
default:
|
|
usage();
|
|
/* NOTREACHED */
|
|
}
|
|
}
|
|
|
|
if (device == NULL) {
|
|
/*
|
|
* No interface specified; get whatever pcap_lookupdev()
|
|
* finds.
|
|
*/
|
|
if (pcap_findalldevs(&devlist, ebuf) == -1)
|
|
error("%s", ebuf);
|
|
if (devlist == NULL)
|
|
error("no interfaces available for capture");
|
|
device = strdup(devlist->name);
|
|
pcap_freealldevs(devlist);
|
|
}
|
|
|
|
if (infile != NULL) {
|
|
/*
|
|
* Filter specified with "-F" and a file containing
|
|
* a filter.
|
|
*/
|
|
cmdbuf = read_infile(infile);
|
|
} else {
|
|
if (optind < argc) {
|
|
/*
|
|
* Filter specified with arguments on the
|
|
* command line.
|
|
*/
|
|
cmdbuf = copy_argv(&argv[optind+1]);
|
|
} else {
|
|
/*
|
|
* No filter specified; use an empty string, which
|
|
* compiles to an "accept all" filter.
|
|
*/
|
|
cmdbuf = "";
|
|
}
|
|
}
|
|
|
|
if (useactivate) {
|
|
pd = pcap_create(device, ebuf);
|
|
if (pd == NULL)
|
|
error("%s: pcap_create() failed: %s", device, ebuf);
|
|
status = pcap_set_snaplen(pd, 65535);
|
|
if (status != 0)
|
|
error("%s: pcap_set_snaplen failed: %s",
|
|
device, pcap_statustostr(status));
|
|
status = pcap_set_promisc(pd, 1);
|
|
if (status != 0)
|
|
error("%s: pcap_set_promisc failed: %s",
|
|
device, pcap_statustostr(status));
|
|
if (dorfmon) {
|
|
status = pcap_set_rfmon(pd, 1);
|
|
if (status != 0)
|
|
error("%s: pcap_set_rfmon failed: %s",
|
|
device, pcap_statustostr(status));
|
|
}
|
|
status = pcap_set_timeout(pd, 1000);
|
|
if (status != 0)
|
|
error("%s: pcap_set_timeout failed: %s",
|
|
device, pcap_statustostr(status));
|
|
status = pcap_activate(pd);
|
|
if (status < 0) {
|
|
/*
|
|
* pcap_activate() failed.
|
|
*/
|
|
error("%s: %s\n(%s)", device,
|
|
pcap_statustostr(status), pcap_geterr(pd));
|
|
} else if (status > 0) {
|
|
/*
|
|
* pcap_activate() succeeded, but it's warning us
|
|
* of a problem it had.
|
|
*/
|
|
warning("%s: %s\n(%s)", device,
|
|
pcap_statustostr(status), pcap_geterr(pd));
|
|
}
|
|
} else {
|
|
*ebuf = '\0';
|
|
pd = pcap_open_live(device, 65535, 1, 1000, ebuf);
|
|
if (pd == NULL)
|
|
error("%s", ebuf);
|
|
else if (*ebuf)
|
|
warning("%s", ebuf);
|
|
}
|
|
|
|
pcap_fd = pcap_fileno(pd);
|
|
|
|
/*
|
|
* Try setting a filter with an uninitialized bpf_program
|
|
* structure. This should cause valgrind to report a
|
|
* problem.
|
|
*
|
|
* We don't check for errors, because it could get an
|
|
* error due to a bad pointer or count.
|
|
*/
|
|
#if defined(USE_BPF)
|
|
ioctl(pcap_fd, BIOCSETF, &bad_fcode);
|
|
#elif defined(USE_SOCKET_FILTERS)
|
|
setsockopt(pcap_fd, SOL_SOCKET, SO_ATTACH_FILTER, &bad_fcode,
|
|
sizeof(bad_fcode));
|
|
#endif
|
|
|
|
/*
|
|
* Try setting a filter with an initialized bpf_program
|
|
* structure that points to an uninitialized program.
|
|
* That should also cause valgrind to report a problem.
|
|
*
|
|
* We don't check for errors, because it could get an
|
|
* error due to a bad pointer or count.
|
|
*/
|
|
#if defined(USE_BPF)
|
|
bad_fcode.bf_len = INSN_COUNT;
|
|
bad_fcode.bf_insns = uninitialized;
|
|
ioctl(pcap_fd, BIOCSETF, &bad_fcode);
|
|
#elif defined(USE_SOCKET_FILTERS)
|
|
bad_fcode.len = INSN_COUNT;
|
|
bad_fcode.filter = uninitialized;
|
|
setsockopt(pcap_fd, SOL_SOCKET, SO_ATTACH_FILTER, &bad_fcode,
|
|
sizeof(bad_fcode));
|
|
#endif
|
|
|
|
/*
|
|
* Now compile a filter and set the filter with that.
|
|
* That should *not* cause valgrind to report a
|
|
* problem.
|
|
*/
|
|
if (pcap_compile(pd, &fcode, cmdbuf, 1, 0) < 0)
|
|
error("can't compile filter: %s", pcap_geterr(pd));
|
|
if (pcap_setfilter(pd, &fcode) < 0)
|
|
error("can't set filter: %s", pcap_geterr(pd));
|
|
|
|
pcap_close(pd);
|
|
exit(status < 0 ? 1 : 0);
|
|
}
|
|
|
|
static void
|
|
usage(void)
|
|
{
|
|
(void)fprintf(stderr, "%s, with %s\n", program_name,
|
|
pcap_lib_version());
|
|
(void)fprintf(stderr,
|
|
"Usage: %s [-aI] [ -F file ] [ -i interface ] [ expression ]\n",
|
|
program_name);
|
|
exit(1);
|
|
}
|