1/*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22#include "varattrs.h"
23
24/*
25 * This doesn't actually test libpcap itself; it tests whether
26 * valgrind properly handles the APIs libpcap uses.  If it doesn't,
27 * we end up getting patches submitted to "fix" references that
28 * valgrind claims are being made to uninitialized data, when, in
29 * fact, the OS isn't making any such references - or we get
30 * valgrind *not* detecting *actual* incorrect references.
31 *
32 * Both BPF and Linux socket filters aren't handled correctly
33 * by some versions of valgrind.  See valgrind bug 318203 for
34 * Linux:
35 *
36 *	https://bugs.kde.org/show_bug.cgi?id=318203
37 *
38 * and valgrind bug 312989 for macOS:
39 *
40 *	https://bugs.kde.org/show_bug.cgi?id=312989
41 *
42 * The fixes for both of those are checked into the official valgrind
43 * repository.
44 *
45 * The unofficial FreeBSD port has similar issues to the official macOS
46 * port, for similar reasons.
47 */
48#ifndef lint
49static const char copyright[] _U_ =
50    "@(#) Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000\n\
51The Regents of the University of California.  All rights reserved.\n";
52#endif
53
54#ifdef HAVE_CONFIG_H
55#include <config.h>
56#endif
57
58#include <stdio.h>
59#include <stdlib.h>
60#include <string.h>
61#include <stdarg.h>
62#include <unistd.h>
63#include <fcntl.h>
64#include <errno.h>
65#include <arpa/inet.h>
66#include <sys/types.h>
67#include <sys/stat.h>
68
69#include "pcap/funcattrs.h"
70
71#if defined(__APPLE__) || defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__DragonFly__) || defined(_AIX) || defined(sun)
72/* OS with BPF - use BPF */
73#define USE_BPF
74#elif defined(linux)
75/* Linux - use socket filters */
76#define USE_SOCKET_FILTERS
77#else
78#error "Unknown platform or platform that doesn't support Valgrind"
79#endif
80
81#if defined(USE_BPF)
82
83#include <sys/ioctl.h>
84#include <net/bpf.h>
85
86/*
87 * Make "pcap.h" not include "pcap/bpf.h"; we are going to include the
88 * native OS version, as we're going to be doing our own ioctls to
89 * make sure that, in the uninitialized-data tests, the filters aren't
90 * checked by libpcap before being handed to BPF.
91 */
92#define PCAP_DONT_INCLUDE_PCAP_BPF_H
93
94#elif defined(USE_SOCKET_FILTERS)
95
96#include <sys/socket.h>
97#include <linux/types.h>
98#include <linux/filter.h>
99
100#endif
101
102#include <pcap.h>
103
104static char *program_name;
105
106/* Forwards */
107static void PCAP_NORETURN usage(void);
108static void PCAP_NORETURN error(const char *, ...) PCAP_PRINTFLIKE(1, 2);
109static void warning(const char *, ...) PCAP_PRINTFLIKE(1, 2);
110
111/*
112 * On Windows, we need to open the file in binary mode, so that
113 * we get all the bytes specified by the size we get from "fstat()".
114 * On UNIX, that's not necessary.  O_BINARY is defined on Windows;
115 * we define it as 0 if it's not defined, so it does nothing.
116 */
117#ifndef O_BINARY
118#define O_BINARY	0
119#endif
120
121static char *
122read_infile(char *fname)
123{
124	register int i, fd, cc;
125	register char *cp;
126	struct stat buf;
127
128	fd = open(fname, O_RDONLY|O_BINARY);
129	if (fd < 0)
130		error("can't open %s: %s", fname, pcap_strerror(errno));
131
132	if (fstat(fd, &buf) < 0)
133		error("can't stat %s: %s", fname, pcap_strerror(errno));
134
135	cp = malloc((u_int)buf.st_size + 1);
136	if (cp == NULL)
137		error("malloc(%d) for %s: %s", (u_int)buf.st_size + 1,
138			fname, pcap_strerror(errno));
139	cc = read(fd, cp, (u_int)buf.st_size);
140	if (cc < 0)
141		error("read %s: %s", fname, pcap_strerror(errno));
142	if (cc != buf.st_size)
143		error("short read %s (%d != %d)", fname, cc, (int)buf.st_size);
144
145	close(fd);
146	/* replace "# comment" with spaces */
147	for (i = 0; i < cc; i++) {
148		if (cp[i] == '#')
149			while (i < cc && cp[i] != '\n')
150				cp[i++] = ' ';
151	}
152	cp[cc] = '\0';
153	return (cp);
154}
155
156/* VARARGS */
157static void
158error(const char *fmt, ...)
159{
160	va_list ap;
161
162	(void)fprintf(stderr, "%s: ", program_name);
163	va_start(ap, fmt);
164	(void)vfprintf(stderr, fmt, ap);
165	va_end(ap);
166	if (*fmt) {
167		fmt += strlen(fmt);
168		if (fmt[-1] != '\n')
169			(void)fputc('\n', stderr);
170	}
171	exit(1);
172	/* NOTREACHED */
173}
174
175/* VARARGS */
176static void
177warning(const char *fmt, ...)
178{
179	va_list ap;
180
181	(void)fprintf(stderr, "%s: WARNING: ", program_name);
182	va_start(ap, fmt);
183	(void)vfprintf(stderr, fmt, ap);
184	va_end(ap);
185	if (*fmt) {
186		fmt += strlen(fmt);
187		if (fmt[-1] != '\n')
188			(void)fputc('\n', stderr);
189	}
190}
191
192/*
193 * Copy arg vector into a new buffer, concatenating arguments with spaces.
194 */
195static char *
196copy_argv(register char **argv)
197{
198	register char **p;
199	register u_int len = 0;
200	char *buf;
201	char *src, *dst;
202
203	p = argv;
204	if (*p == 0)
205		return 0;
206
207	while (*p)
208		len += strlen(*p++) + 1;
209
210	buf = (char *)malloc(len);
211	if (buf == NULL)
212		error("copy_argv: malloc");
213
214	p = argv;
215	dst = buf;
216	while ((src = *p++) != NULL) {
217		while ((*dst++ = *src++) != '\0')
218			;
219		dst[-1] = ' ';
220	}
221	dst[-1] = '\0';
222
223	return buf;
224}
225
226#define INSN_COUNT	17
227
228int
229main(int argc, char **argv)
230{
231	char *cp, *device;
232	int op;
233	int dorfmon, useactivate;
234	char ebuf[PCAP_ERRBUF_SIZE];
235	char *infile;
236	const char *cmdbuf;
237	pcap_if_t *devlist;
238	pcap_t *pd;
239	int status = 0;
240	int pcap_fd;
241#if defined(USE_BPF)
242	struct bpf_program bad_fcode;
243	struct bpf_insn uninitialized[INSN_COUNT];
244#elif defined(USE_SOCKET_FILTERS)
245	struct sock_fprog bad_fcode;
246	struct sock_filter uninitialized[INSN_COUNT];
247#endif
248	struct bpf_program fcode;
249
250	device = NULL;
251	dorfmon = 0;
252	useactivate = 0;
253	infile = NULL;
254
255	if ((cp = strrchr(argv[0], '/')) != NULL)
256		program_name = cp + 1;
257	else
258		program_name = argv[0];
259
260	opterr = 0;
261	while ((op = getopt(argc, argv, "aF:i:I")) != -1) {
262		switch (op) {
263
264		case 'a':
265			useactivate = 1;
266			break;
267
268		case 'F':
269			infile = optarg;
270			break;
271
272		case 'i':
273			device = optarg;
274			break;
275
276		case 'I':
277			dorfmon = 1;
278			useactivate = 1;	/* required for rfmon */
279			break;
280
281		default:
282			usage();
283			/* NOTREACHED */
284		}
285	}
286
287	if (device == NULL) {
288		/*
289		 * No interface specified; get whatever pcap_lookupdev()
290		 * finds.
291		 */
292		if (pcap_findalldevs(&devlist, ebuf) == -1)
293			error("%s", ebuf);
294		if (devlist == NULL)
295			error("no interfaces available for capture");
296		device = strdup(devlist->name);
297		pcap_freealldevs(devlist);
298	}
299
300	if (infile != NULL) {
301		/*
302		 * Filter specified with "-F" and a file containing
303		 * a filter.
304		 */
305		cmdbuf = read_infile(infile);
306	} else {
307		if (optind < argc) {
308			/*
309			 * Filter specified with arguments on the
310			 * command line.
311			 */
312			cmdbuf = copy_argv(&argv[optind+1]);
313		} else {
314			/*
315			 * No filter specified; use an empty string, which
316			 * compiles to an "accept all" filter.
317			 */
318			cmdbuf = "";
319		}
320	}
321
322	if (useactivate) {
323		pd = pcap_create(device, ebuf);
324		if (pd == NULL)
325			error("%s: pcap_create() failed: %s", device, ebuf);
326		status = pcap_set_snaplen(pd, 65535);
327		if (status != 0)
328			error("%s: pcap_set_snaplen failed: %s",
329			    device, pcap_statustostr(status));
330		status = pcap_set_promisc(pd, 1);
331		if (status != 0)
332			error("%s: pcap_set_promisc failed: %s",
333			    device, pcap_statustostr(status));
334		if (dorfmon) {
335			status = pcap_set_rfmon(pd, 1);
336			if (status != 0)
337				error("%s: pcap_set_rfmon failed: %s",
338				    device, pcap_statustostr(status));
339		}
340		status = pcap_set_timeout(pd, 1000);
341		if (status != 0)
342			error("%s: pcap_set_timeout failed: %s",
343			    device, pcap_statustostr(status));
344		status = pcap_activate(pd);
345		if (status < 0) {
346			/*
347			 * pcap_activate() failed.
348			 */
349			error("%s: %s\n(%s)", device,
350			    pcap_statustostr(status), pcap_geterr(pd));
351		} else if (status > 0) {
352			/*
353			 * pcap_activate() succeeded, but it's warning us
354			 * of a problem it had.
355			 */
356			warning("%s: %s\n(%s)", device,
357			    pcap_statustostr(status), pcap_geterr(pd));
358		}
359	} else {
360		*ebuf = '\0';
361		pd = pcap_open_live(device, 65535, 1, 1000, ebuf);
362		if (pd == NULL)
363			error("%s", ebuf);
364		else if (*ebuf)
365			warning("%s", ebuf);
366	}
367
368	pcap_fd = pcap_fileno(pd);
369
370	/*
371	 * Try setting a filter with an uninitialized bpf_program
372	 * structure.  This should cause valgrind to report a
373	 * problem.
374	 *
375	 * We don't check for errors, because it could get an
376	 * error due to a bad pointer or count.
377	 */
378#if defined(USE_BPF)
379	ioctl(pcap_fd, BIOCSETF, &bad_fcode);
380#elif defined(USE_SOCKET_FILTERS)
381	setsockopt(pcap_fd, SOL_SOCKET, SO_ATTACH_FILTER, &bad_fcode,
382	    sizeof(bad_fcode));
383#endif
384
385	/*
386	 * Try setting a filter with an initialized bpf_program
387	 * structure that points to an uninitialized program.
388	 * That should also cause valgrind to report a problem.
389	 *
390	 * We don't check for errors, because it could get an
391	 * error due to a bad pointer or count.
392	 */
393#if defined(USE_BPF)
394	bad_fcode.bf_len = INSN_COUNT;
395	bad_fcode.bf_insns = uninitialized;
396	ioctl(pcap_fd, BIOCSETF, &bad_fcode);
397#elif defined(USE_SOCKET_FILTERS)
398	bad_fcode.len = INSN_COUNT;
399	bad_fcode.filter = uninitialized;
400	setsockopt(pcap_fd, SOL_SOCKET, SO_ATTACH_FILTER, &bad_fcode,
401	    sizeof(bad_fcode));
402#endif
403
404	/*
405	 * Now compile a filter and set the filter with that.
406	 * That should *not* cause valgrind to report a
407	 * problem.
408	 */
409	if (pcap_compile(pd, &fcode, cmdbuf, 1, 0) < 0)
410		error("can't compile filter: %s", pcap_geterr(pd));
411	if (pcap_setfilter(pd, &fcode) < 0)
412		error("can't set filter: %s", pcap_geterr(pd));
413
414	pcap_close(pd);
415	exit(status < 0 ? 1 : 0);
416}
417
418static void
419usage(void)
420{
421	(void)fprintf(stderr, "%s, with %s\n", program_name,
422	    pcap_lib_version());
423	(void)fprintf(stderr,
424	    "Usage: %s [-aI] [ -F file ] [ -I interface ] [ expression ]\n",
425	    program_name);
426	exit(1);
427}
428