blob: 59055a95130e132f57330d92e2fe783ad3af1b21 [file] [log] [blame]
Bernhard Reutner-Fischerdac7ff12006-04-12 17:55:51 +00001/* vi: set sw=4 ts=4: */
Mike Frysingerb662f0d2005-05-11 03:59:53 +00002/*
3 * ether-wake.c - Send a magic packet to wake up sleeping machines.
4 *
Bernhard Reutner-Fischerdac7ff12006-04-12 17:55:51 +00005 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
Mike Frysingerb662f0d2005-05-11 03:59:53 +00006 *
7 * Author: Donald Becker, http://www.scyld.com/"; http://www.scyld.com/wakeonlan.html
8 * Busybox port: Christian Volkmann <haveaniceday@online.de>
9 * Used version of ether-wake.c: v1.09 11/12/2003 Donald Becker, http://www.scyld.com/";
10 */
11
12/* full usage according Donald Becker
13 * usage: ether-wake [-i <ifname>] [-p aa:bb:cc:dd[:ee:ff]] 00:11:22:33:44:55\n"
14 *
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000015 * This program generates and transmits a Wake-On-LAN (WOL)\n"
16 * \"Magic Packet\", used for restarting machines that have been\n"
17 * soft-powered-down (ACPI D3-warm state).\n"
18 * It currently generates the standard AMD Magic Packet format, with\n"
19 * an optional password appended.\n"
Mike Frysingerb662f0d2005-05-11 03:59:53 +000020 *
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000021 * The single required parameter is the Ethernet MAC (station) address\n"
22 * of the machine to wake or a host ID with known NSS 'ethers' entry.\n"
23 * The MAC address may be found with the 'arp' program while the target\n"
24 * machine is awake.\n"
Mike Frysingerb662f0d2005-05-11 03:59:53 +000025 *
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000026 * Options:\n"
27 * -b Send wake-up packet to the broadcast address.\n"
28 * -D Increase the debug level.\n"
29 * -i ifname Use interface IFNAME instead of the default 'eth0'.\n"
30 * -p <pw> Append the four or six byte password PW to the packet.\n"
31 * A password is only required for a few adapter types.\n"
32 * The password may be specified in ethernet hex format\n"
33 * or dotted decimal (Internet address)\n"
34 * -p 00:22:44:66:88:aa\n"
35 * -p 192.168.1.1\n";
Mike Frysingerb662f0d2005-05-11 03:59:53 +000036 *
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000037 *
38 * This program generates and transmits a Wake-On-LAN (WOL) "Magic Packet",
39 * used for restarting machines that have been soft-powered-down
40 * (ACPI D3-warm state). It currently generates the standard AMD Magic Packet
41 * format, with an optional password appended.
42 *
43 * This software may be used and distributed according to the terms
44 * of the GNU Public License, incorporated herein by reference.
45 * Contact the author for use under other terms.
46 *
47 * This source file was originally part of the network tricks package, and
48 * is now distributed to support the Scyld Beowulf system.
49 * Copyright 1999-2003 Donald Becker and Scyld Computing Corporation.
50 *
51 * The author may be reached as becker@scyld, or C/O
52 * Scyld Computing Corporation
53 * 914 Bay Ridge Road, Suite 220
54 * Annapolis MD 21403
55 *
Mike Frysingerb662f0d2005-05-11 03:59:53 +000056 * Notes:
57 * On some systems dropping root capability allows the process to be
58 * dumped, traced or debugged.
59 * If someone traces this program, they get control of a raw socket.
60 * Linux handles this safely, but beware when porting this program.
Tim Rikerc1ef7bd2006-01-25 00:08:53 +000061 *
Mike Frysingerb662f0d2005-05-11 03:59:53 +000062 * An alternative to needing 'root' is using a UDP broadcast socket, however
63 * doing so only works with adapters configured for unicast+broadcast Rx
64 * filter. That configuration consumes more power.
65*/
66
67
Mike Frysingerb662f0d2005-05-11 03:59:53 +000068#include <netpacket/packet.h>
69#include <net/ethernet.h>
Mike Frysingerb662f0d2005-05-11 03:59:53 +000070#include <netinet/ether.h>
Mike Frysingerb662f0d2005-05-11 03:59:53 +000071#include <linux/if.h>
Mike Frysingerb662f0d2005-05-11 03:59:53 +000072
73#include "busybox.h"
74
75/* Note: PF_INET, SOCK_DGRAM, IPPROTO_UDP would allow SIOCGIFHWADDR to
76 * work as non-root, but we need SOCK_PACKET to specify the Ethernet
77 * destination address.
78 */
79#ifdef PF_PACKET
80# define whereto_t sockaddr_ll
Rob Landleyd921b2e2006-08-03 15:41:12 +000081# define make_socket() xsocket(PF_PACKET, SOCK_RAW, 0)
Mike Frysingerb662f0d2005-05-11 03:59:53 +000082#else
83# define whereto_t sockaddr
Rob Landleyd921b2e2006-08-03 15:41:12 +000084# define make_socket() xsocket(AF_INET, SOCK_PACKET, SOCK_PACKET)
Mike Frysingerb662f0d2005-05-11 03:59:53 +000085#endif
86
87#ifdef DEBUG
88# define bb_debug_msg(fmt, args...) fprintf(stderr, fmt, ## args)
89void bb_debug_dump_packet(unsigned char *outpack, int pktsize)
90{
91 int i;
92 printf("packet dump:\n");
93 for (i = 0; i < pktsize; ++i) {
94 printf("%2.2x ", outpack[i]);
Denis Vlasenkoc6f188d2006-10-26 00:37:00 +000095 if (i % 20 == 19) puts("");
Mike Frysingerb662f0d2005-05-11 03:59:53 +000096 }
97 printf("\n\n");
98}
99#else
100# define bb_debug_msg(fmt, args...)
101# define bb_debug_dump_packet(outpack, pktsize)
102#endif
103
104static inline void get_dest_addr(const char *arg, struct ether_addr *eaddr);
105static inline int get_fill(unsigned char *pkt, struct ether_addr *eaddr, int broadcast);
106static inline int get_wol_pw(const char *ethoptarg, unsigned char *wol_passwd);
107
Bernhard Reutner-Fischerfebe3c42007-04-04 20:52:03 +0000108int ether_wake_main(int argc, char **argv);
109int ether_wake_main(int argc, char **argv)
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000110{
Denis Vlasenko4c978632007-02-03 03:31:13 +0000111 const char *ifname = "eth0";
112 char *pass = NULL;
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000113 unsigned long flags;
114 unsigned char wol_passwd[6];
115 int wol_passwd_sz = 0;
116
117 int s; /* Raw socket */
118 int pktsize;
119 unsigned char outpack[1000];
120
121 struct ether_addr eaddr;
122 struct whereto_t whereto; /* who to wake up */
123
124 /* handle misc user options */
Denis Vlasenko67b23e62006-10-03 21:00:06 +0000125 flags = getopt32(argc, argv, "bi:p:", &ifname, &pass);
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000126 if (optind == argc)
127 bb_show_usage();
128 if (pass)
129 wol_passwd_sz = get_wol_pw(pass, wol_passwd);
130
131 /* create the raw socket */
132 s = make_socket();
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000133
134 /* now that we have a raw socket we can drop root */
Rob Landleyafb94ec2006-07-16 08:06:34 +0000135 xsetuid(getuid());
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000136
137 /* look up the dest mac address */
138 get_dest_addr(argv[optind], &eaddr);
139
140 /* fill out the header of the packet */
141 pktsize = get_fill(outpack, &eaddr, flags /*& 1 [OPT_BROADCAST]*/);
142
143 bb_debug_dump_packet(outpack, pktsize);
144
145 /* Fill in the source address, if possible. */
146#ifdef __linux__
147 {
148 struct ifreq if_hwaddr;
149
Denis Vlasenko229b3d22006-11-27 23:44:57 +0000150 strncpy(if_hwaddr.ifr_name, ifname, sizeof(if_hwaddr.ifr_name));
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000151 if (ioctl(s, SIOCGIFHWADDR, &if_hwaddr) < 0)
152 bb_perror_msg_and_die("SIOCGIFHWADDR on %s failed", ifname);
153
154 memcpy(outpack+6, if_hwaddr.ifr_hwaddr.sa_data, 6);
155
156# ifdef DEBUG
157 {
158 unsigned char *hwaddr = if_hwaddr.ifr_hwaddr.sa_data;
159 printf("The hardware address (SIOCGIFHWADDR) of %s is type %d "
160 "%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x\n\n", ifname,
161 if_hwaddr.ifr_hwaddr.sa_family, hwaddr[0], hwaddr[1],
162 hwaddr[2], hwaddr[3], hwaddr[4], hwaddr[5]);
163 }
164# endif
165 }
166#endif /* __linux__ */
167
168 bb_debug_dump_packet(outpack, pktsize);
169
170 /* append the password if specified */
171 if (wol_passwd_sz > 0) {
172 memcpy(outpack+pktsize, wol_passwd, wol_passwd_sz);
173 pktsize += wol_passwd_sz;
174 }
175
176 bb_debug_dump_packet(outpack, pktsize);
177
178 /* This is necessary for broadcasts to work */
179 if (flags /*& 1 [OPT_BROADCAST]*/) {
Denis Vlasenko48237b02006-11-22 23:22:06 +0000180 if (setsockopt_broadcast(s) < 0)
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000181 bb_perror_msg("SO_BROADCAST");
182 }
183
184#if defined(PF_PACKET)
185 {
186 struct ifreq ifr;
187 strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
188 if (ioctl(s, SIOCGIFINDEX, &ifr) == -1)
189 bb_perror_msg_and_die("SIOCGIFINDEX");
190 memset(&whereto, 0, sizeof(whereto));
191 whereto.sll_family = AF_PACKET;
192 whereto.sll_ifindex = ifr.ifr_ifindex;
193 /* The manual page incorrectly claims the address must be filled.
194 We do so because the code may change to match the docs. */
195 whereto.sll_halen = ETH_ALEN;
196 memcpy(whereto.sll_addr, outpack, ETH_ALEN);
197 }
198#else
199 whereto.sa_family = 0;
200 strcpy(whereto.sa_data, ifname);
201#endif
Bernhard Reutner-Fischerb2908892007-04-12 11:34:39 +0000202 xsendto(s, outpack, pktsize, (struct sockaddr *)&whereto, sizeof(whereto));
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000203 close(s);
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000204 return EXIT_SUCCESS;
205}
206
207/* Convert the host ID string to a MAC address.
208 * The string may be a:
209 * Host name
210 * IP address string
211 * MAC address string
212*/
213static inline void get_dest_addr(const char *hostid, struct ether_addr *eaddr)
214{
215 struct ether_addr *eap;
216
217 eap = ether_aton(hostid);
218 if (eap) {
219 *eaddr = *eap;
220 bb_debug_msg("The target station address is %s\n\n", ether_ntoa(eaddr));
Mike Frysingerd84a35f2005-07-31 22:49:12 +0000221#if !defined(__UCLIBC__)
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000222 } else if (ether_hostton(hostid, eaddr) == 0) {
223 bb_debug_msg("Station address for hostname %s is %s\n\n", hostid, ether_ntoa(eaddr));
Mike Frysingerd84a35f2005-07-31 22:49:12 +0000224#endif
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000225 } else
226 bb_show_usage();
227}
228
229static inline int get_fill(unsigned char *pkt, struct ether_addr *eaddr, int broadcast)
230{
231 int offset, i;
232 unsigned char *station_addr = eaddr->ether_addr_octet;
233
234 if (broadcast)
235 memset(pkt+0, 0xff, 6);
236 else
237 memcpy(pkt, station_addr, 6);
238 memcpy(pkt+6, station_addr, 6);
239 pkt[12] = 0x08; /* Or 0x0806 for ARP, 0x8035 for RARP */
240 pkt[13] = 0x42;
241 offset = 14;
242
243 memset(pkt+offset, 0xff, 6);
244 offset += 6;
245
246 for (i = 0; i < 16; ++i) {
247 memcpy(pkt+offset, station_addr, 6);
248 offset += 6;
249 }
250
251 return offset;
252}
253
254static inline int get_wol_pw(const char *ethoptarg, unsigned char *wol_passwd)
255{
256 int passwd[6];
257 int byte_cnt, i;
258
259 /* handle MAC format */
260 byte_cnt = sscanf(ethoptarg, "%2x:%2x:%2x:%2x:%2x:%2x",
261 &passwd[0], &passwd[1], &passwd[2],
262 &passwd[3], &passwd[4], &passwd[5]);
263 /* handle IP format */
264 if (byte_cnt < 4)
265 byte_cnt = sscanf(ethoptarg, "%d.%d.%d.%d",
266 &passwd[0], &passwd[1], &passwd[2], &passwd[3]);
267 if (byte_cnt < 4) {
Denis Vlasenko89f0b342006-11-18 22:04:09 +0000268 bb_error_msg("cannot read Wake-On-LAN pass");
Mike Frysingerb662f0d2005-05-11 03:59:53 +0000269 return 0;
270 }
271
272 for (i = 0; i < byte_cnt; ++i)
273 wol_passwd[i] = passwd[i];
274
275 bb_debug_msg("password: %2.2x %2.2x %2.2x %2.2x (%d)\n\n",
276 wol_passwd[0], wol_passwd[1], wol_passwd[2], wol_passwd[3],
277 byte_cnt);
278
279 return byte_cnt;
280}