15 #include <netinet/in.h>
17 #include <sys/socket.h>
18 #include <sys/types.h>
23 #if SNF_VERSION_API >= 0x0003
24 #define SNF_HAVE_INJECT_API
31 * Private data for capturing on SNF devices.
34 snf_handle_t snf_handle
; /* opaque device handle */
35 snf_ring_t snf_ring
; /* opaque device ring handle */
36 #ifdef SNF_HAVE_INJECT_API
37 snf_inject_t snf_inj
; /* inject handle, if inject is used */
44 snf_set_datalink(pcap_t
*p
, int dlt
)
51 snf_pcap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
53 struct snf_ring_stats stats
;
54 struct pcap_snf
*snfps
= p
->priv
;
57 if ((rc
= snf_ring_getstats(snfps
->snf_ring
, &stats
))) {
58 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
62 ps
->ps_recv
= stats
.ring_pkt_recv
+ stats
.ring_pkt_overflow
;
63 ps
->ps_drop
= stats
.ring_pkt_overflow
;
64 ps
->ps_ifdrop
= stats
.nic_pkt_overflow
+ stats
.nic_pkt_bad
;
69 snf_platform_cleanup(pcap_t
*p
)
71 struct pcap_snf
*ps
= p
->priv
;
73 #ifdef SNF_HAVE_INJECT_API
75 snf_inject_close(ps
->snf_inj
);
77 snf_ring_close(ps
->snf_ring
);
78 snf_close(ps
->snf_handle
);
79 pcap_cleanup_live_common(p
);
83 snf_getnonblock(pcap_t
*p
)
85 struct pcap_snf
*ps
= p
->priv
;
87 return (ps
->snf_timeout
== 0);
91 snf_setnonblock(pcap_t
*p
, int nonblock
)
93 struct pcap_snf
*ps
= p
->priv
;
98 if (p
->opt
.timeout
<= 0)
99 ps
->snf_timeout
= -1; /* forever */
101 ps
->snf_timeout
= p
->opt
.timeout
;
106 #define _NSEC_PER_SEC 1000000000
110 snf_timestamp_to_timeval(const int64_t ts_nanosec
, const int tstamp_precision
)
114 const static struct timeval zero_timeval
;
119 tv
.tv_sec
= ts_nanosec
/ _NSEC_PER_SEC
;
120 tv_nsec
= (ts_nanosec
% _NSEC_PER_SEC
);
122 /* libpcap expects tv_usec to be nanos if using nanosecond precision. */
123 if (tstamp_precision
== PCAP_TSTAMP_PRECISION_NANO
)
124 tv
.tv_usec
= tv_nsec
;
126 tv
.tv_usec
= tv_nsec
/ 1000;
132 snf_read(pcap_t
*p
, int cnt
, pcap_handler callback
, u_char
*user
)
134 struct pcap_snf
*ps
= p
->priv
;
135 struct pcap_pkthdr hdr
;
136 int i
, flags
, err
, caplen
, n
;
137 struct snf_recv_req req
;
138 int nonblock
, timeout
;
144 timeout
= ps
->snf_timeout
;
145 while (n
< cnt
|| PACKET_COUNT_IS_UNLIMITED(cnt
)) {
147 * Has "pcap_breakloop()" been called?
158 err
= snf_ring_recv(ps
->snf_ring
, timeout
, &req
);
161 if (err
== EBUSY
|| err
== EAGAIN
) {
164 else if (err
== EINTR
) {
169 pcap_fmt_errmsg_for_errno(p
->errbuf
,
170 PCAP_ERRBUF_SIZE
, err
, "snf_read");
176 if (caplen
> p
->snapshot
)
177 caplen
= p
->snapshot
;
179 if ((p
->fcode
.bf_insns
== NULL
) ||
180 pcap_filter(p
->fcode
.bf_insns
, req
.pkt_addr
, req
.length
, caplen
)) {
181 hdr
.ts
= snf_timestamp_to_timeval(req
.timestamp
, p
->opt
.tstamp_precision
);
183 hdr
.len
= req
.length
;
184 callback(user
, &hdr
, req
.pkt_addr
);
188 /* After one successful packet is received, we won't block
189 * again for that timeout. */
197 snf_inject(pcap_t
*p
, const void *buf _U_
, int size _U_
)
199 #ifdef SNF_HAVE_INJECT_API
200 struct pcap_snf
*ps
= p
->priv
;
202 if (ps
->snf_inj
== NULL
) {
203 rc
= snf_inject_open(ps
->snf_boardnum
, 0, &ps
->snf_inj
);
205 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
206 rc
, "snf_inject_open");
211 rc
= snf_inject_send(ps
->snf_inj
, -1, 0, buf
, size
);
216 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
217 rc
, "snf_inject_send");
221 pcap_strlcpy(p
->errbuf
, "Sending packets isn't supported with this snf version",
228 snf_activate(pcap_t
* p
)
230 struct pcap_snf
*ps
= p
->priv
;
231 char *device
= p
->opt
.device
;
232 const char *nr
= NULL
;
234 int flags
= -1, ring_id
= -1;
236 if (device
== NULL
) {
237 snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
, "device is NULL");
241 /* In Libpcap, we set pshared by default if NUM_RINGS is set to > 1.
242 * Since libpcap isn't thread-safe */
243 if ((nr
= getenv("SNF_FLAGS")) && *nr
)
244 flags
= strtol(nr
, NULL
, 0);
245 else if ((nr
= getenv("SNF_NUM_RINGS")) && *nr
&& atoi(nr
) > 1)
246 flags
= SNF_F_PSHARED
;
251 /* Allow pcap_set_buffer_size() to set dataring_size.
252 * Default is zero which allows setting from env SNF_DATARING_SIZE.
253 * pcap_set_buffer_size() is in bytes while snf_open() accepts values
254 * between 0 and 1048576 in Megabytes. Values in this range are
257 err
= snf_open(ps
->snf_boardnum
,
258 0, /* let SNF API parse SNF_NUM_RINGS, if set */
259 NULL
, /* default RSS, or use SNF_RSS_FLAGS env */
260 (p
->opt
.buffer_size
> 0 && p
->opt
.buffer_size
< 1048576) ? 1048576 : p
->opt
.buffer_size
, /* default to SNF_DATARING_SIZE from env */
261 flags
, /* may want pshared */
264 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
265 err
, "snf_open failed");
269 if ((nr
= getenv("SNF_PCAP_RING_ID")) && *nr
) {
270 ring_id
= (int) strtol(nr
, NULL
, 0);
272 err
= snf_ring_open_id(ps
->snf_handle
, ring_id
, &ps
->snf_ring
);
274 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
275 err
, "snf_ring_open_id(ring=%d) failed", ring_id
);
280 * Turn a negative snapshot value (invalid), a snapshot value of
281 * 0 (unspecified), or a value bigger than the normal maximum
282 * value, into the maximum allowed value.
284 * If some application really *needs* a bigger snapshot
285 * length, we should just increase MAXIMUM_SNAPLEN.
287 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
288 p
->snapshot
= MAXIMUM_SNAPLEN
;
290 if (p
->opt
.timeout
<= 0)
291 ps
->snf_timeout
= -1;
293 ps
->snf_timeout
= p
->opt
.timeout
;
295 err
= snf_start(ps
->snf_handle
);
297 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
298 err
, "snf_start failed");
303 * "select()" and "poll()" don't work on snf descriptors.
306 p
->selectable_fd
= -1;
308 p
->linktype
= DLT_EN10MB
;
309 p
->read_op
= snf_read
;
310 p
->inject_op
= snf_inject
;
311 p
->setfilter_op
= install_bpf_program
;
312 p
->setdirection_op
= NULL
; /* Not implemented.*/
313 p
->set_datalink_op
= snf_set_datalink
;
314 p
->getnonblock_op
= snf_getnonblock
;
315 p
->setnonblock_op
= snf_setnonblock
;
316 p
->stats_op
= snf_pcap_stats
;
317 p
->cleanup_op
= snf_platform_cleanup
;
318 #ifdef SNF_HAVE_INJECT_API
324 #define MAX_DESC_LENGTH 128
326 snf_findalldevs(pcap_if_list_t
*devlistp
, char *errbuf
)
330 struct sockaddr_in addr
;
332 struct snf_ifaddrs
*ifaddrs
, *ifa
;
333 char name
[MAX_DESC_LENGTH
];
334 char desc
[MAX_DESC_LENGTH
];
335 int ret
, allports
= 0, merge
= 0;
336 const char *nr
= NULL
;
338 if (snf_init(SNF_VERSION_API
)) {
339 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
340 "snf_getifaddrs: snf_init failed");
344 if (snf_getifaddrs(&ifaddrs
) || ifaddrs
== NULL
)
346 pcap_fmt_errmsg_for_errno(errbuf
, PCAP_ERRBUF_SIZE
,
347 errno
, "snf_getifaddrs");
350 if ((nr
= getenv("SNF_FLAGS")) && *nr
) {
352 merge
= strtol(nr
, NULL
, 0);
354 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
355 "snf_getifaddrs: SNF_FLAGS is not a valid number");
358 merge
= merge
& SNF_F_AGGREGATE_PORTMASK
;
361 for (ifa
= ifaddrs
; ifa
!= NULL
; ifa
= ifa
->snf_ifa_next
) {
363 * Myricom SNF adapter ports may appear as regular
364 * network interfaces, which would already have been
365 * added to the list of adapters by pcap_platform_finddevs()
366 * if this isn't an SNF-only version of libpcap.
368 * Our create routine intercepts pcap_create() calls for
369 * those interfaces and arranges that they will be
370 * opened using the SNF API instead.
372 * So if we already have an entry for the device, we
373 * don't add an additional entry for it, we just
374 * update the description for it, if any, to indicate
375 * which snfN device it is. Otherwise, we add an entry
378 * In either case, if SNF_F_AGGREGATE_PORTMASK is set
379 * in SNF_FLAGS, we add this port to the bitmask
380 * of ports, which we use to generate a device
381 * we can use to capture on all ports.
383 * Generate the description string. If port aggregation
384 * is set, use 2^{port number} as the unit number,
385 * rather than {port number}.
387 * XXX - do entries in this list have IP addresses for
388 * the port? If so, should we add them to the
389 * entry for the device, if they're not already in the
390 * list of IP addresses for the device?
392 (void)snprintf(desc
,MAX_DESC_LENGTH
,"Myricom %ssnf%d",
393 merge
? "Merge Bitmask Port " : "",
394 merge
? 1 << ifa
->snf_ifa_portnum
: ifa
->snf_ifa_portnum
);
396 * Add the port to the bitmask.
399 allports
|= 1 << ifa
->snf_ifa_portnum
;
401 * See if there's already an entry for the device
402 * with the name ifa->snf_ifa_name.
404 dev
= find_dev(devlistp
, ifa
->snf_ifa_name
);
407 * Yes. Update its description.
411 desc_str
= strdup(desc
);
412 if (desc_str
== NULL
) {
413 pcap_fmt_errmsg_for_errno(errbuf
,
414 PCAP_ERRBUF_SIZE
, errno
,
415 "snf_findalldevs strdup");
418 free(dev
->description
);
419 dev
->description
= desc_str
;
422 * No. Add an entry for it.
424 * XXX - is there a notion of "up" or "running",
425 * and can we determine whether something's
426 * plugged into the adapter and set
427 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
428 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
430 dev
= add_dev(devlistp
, ifa
->snf_ifa_name
, 0, desc
,
436 * On Windows, fill in IP# from device name
438 ret
= inet_pton(AF_INET
, dev
->name
, &addr
.sin_addr
);
441 * Successful conversion of device name
444 addr
.sin_family
= AF_INET
;
445 if (add_addr_to_dev(dev
, &addr
, sizeof(addr
),
446 NULL
, 0, NULL
, 0, NULL
, 0, errbuf
) == -1)
448 } else if (ret
== -1) {
452 pcap_fmt_errmsg_for_errno(errbuf
,
453 PCAP_ERRBUF_SIZE
, errno
,
454 "sinf_findalldevs inet_pton");
460 snf_freeifaddrs(ifaddrs
);
462 * Create a snfX entry if port aggregation is enabled
466 * Add a new entry with all ports bitmask
468 (void)snprintf(name
,MAX_DESC_LENGTH
,"snf%d",allports
);
469 (void)snprintf(desc
,MAX_DESC_LENGTH
,"Myricom Merge Bitmask All Ports snf%d",
472 * XXX - is there any notion of "up" and "running" that
473 * would apply to this device, given that it handles
476 * Presumably, there's no notion of "connected" vs.
477 * "disconnected", as "is this plugged into a network?"
478 * would be a per-port property.
480 if (add_dev(devlistp
, name
,
481 PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE
, desc
,
485 * XXX - should we give it a list of addresses with all
486 * the addresses for all the ports?
494 snf_create(const char *device
, char *ebuf
, int *is_ours
)
498 struct snf_ifaddrs
*ifaddrs
, *ifa
;
502 if (snf_init(SNF_VERSION_API
)) {
503 /* Can't initialize the API, so no SNF devices */
509 * Match a given interface name to our list of interface names, from
510 * which we can obtain the intended board number
512 if (snf_getifaddrs(&ifaddrs
) || ifaddrs
== NULL
) {
513 /* Can't get SNF addresses */
517 devlen
= strlen(device
) + 1;
520 if (strncmp(device
, ifa
->snf_ifa_name
, devlen
) == 0) {
521 boardnum
= ifa
->snf_ifa_boardnum
;
524 ifa
= ifa
->snf_ifa_next
;
526 snf_freeifaddrs(ifaddrs
);
530 * If we can't find the device by name, support the name "snfX"
531 * and "snf10gX" where X is the board number.
533 if (sscanf(device
, "snf10g%d", &boardnum
) != 1 &&
534 sscanf(device
, "snf%d", &boardnum
) != 1) {
535 /* Nope, not a supported name */
541 /* OK, it's probably ours. */
544 p
= pcap_create_common(ebuf
, sizeof (struct pcap_snf
));
550 * We support microsecond and nanosecond time stamps.
552 p
->tstamp_precision_count
= 2;
553 p
->tstamp_precision_list
= malloc(2 * sizeof(u_int
));
554 if (p
->tstamp_precision_list
== NULL
) {
555 pcap_fmt_errmsg_for_errno(ebuf
, PCAP_ERRBUF_SIZE
, errno
,
560 p
->tstamp_precision_list
[0] = PCAP_TSTAMP_PRECISION_MICRO
;
561 p
->tstamp_precision_list
[1] = PCAP_TSTAMP_PRECISION_NANO
;
563 p
->activate_op
= snf_activate
;
564 ps
->snf_boardnum
= boardnum
;
570 * This libpcap build supports only SNF cards, not regular network
575 * There are no regular interfaces, just SNF interfaces.
578 pcap_platform_finddevs(pcap_if_list_t
*devlistp
, char *errbuf
)
584 * Attempts to open a regular interface fail.
587 pcap_create_interface(const char *device
, char *errbuf
)
589 snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
590 "This version of libpcap only supports SNF cards");
595 * Libpcap version string.
598 pcap_lib_version(void)
600 return (PCAP_VERSION_STRING
" (SNF-only)");