2 * Copyright (C) 2014 Luigi Rizzo. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include <sys/ioctl.h>
38 #define NETMAP_WITH_LIBS
39 #include <net/netmap_user.h>
42 #include "pcap-netmap.h"
46 * On FreeBSD we use IFF_PPROMISC which is in ifr_flagshigh.
47 * Remap to IFF_PROMISC on other platforms.
49 * XXX - DragonFly BSD?
51 #define IFF_PPROMISC IFF_PROMISC
52 #endif /* __FreeBSD__ */
55 struct nm_desc
*d
; /* pointer returned by nm_open() */
56 pcap_handler cb
; /* callback and argument */
58 int must_clear_promisc
; /* flag */
59 uint64_t rx_pkts
; /* # of pkts received before the filter */
64 pcap_netmap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
66 struct pcap_netmap
*pn
= p
->priv
;
68 ps
->ps_recv
= (u_int
)pn
->rx_pkts
;
76 pcap_netmap_filter(u_char
*arg
, struct pcap_pkthdr
*h
, const u_char
*buf
)
78 pcap_t
*p
= (pcap_t
*)arg
;
79 struct pcap_netmap
*pn
= p
->priv
;
80 const struct bpf_insn
*pc
= p
->fcode
.bf_insns
;
83 if (pc
== NULL
|| pcapint_filter(pc
, buf
, h
->len
, h
->caplen
))
84 pn
->cb(pn
->cb_arg
, h
, buf
);
89 pcap_netmap_dispatch(pcap_t
*p
, int cnt
, pcap_handler cb
, u_char
*user
)
92 struct pcap_netmap
*pn
= p
->priv
;
93 struct nm_desc
*d
= pn
->d
;
94 struct pollfd pfd
= { .fd
= p
->fd
, .events
= POLLIN
, .revents
= 0 };
102 return PCAP_ERROR_BREAK
;
104 /* nm_dispatch won't run forever */
106 ret
= nm_dispatch((void *)d
, cnt
, (void *)pcap_netmap_filter
, (void *)p
);
110 ret
= poll(&pfd
, 1, p
->opt
.timeout
);
116 /* XXX need to check the NIOCTXSYNC/poll */
118 pcap_netmap_inject(pcap_t
*p
, const void *buf
, int size
)
120 struct pcap_netmap
*pn
= p
->priv
;
121 struct nm_desc
*d
= pn
->d
;
123 return nm_inject(d
, buf
, size
);
128 pcap_netmap_ioctl(pcap_t
*p
, u_long what
, uint32_t *if_flags
)
130 struct pcap_netmap
*pn
= p
->priv
;
131 struct nm_desc
*d
= pn
->d
;
133 int error
, fd
= d
->fd
;
136 fd
= socket(AF_INET
, SOCK_DGRAM
, 0);
138 fprintf(stderr
, "Error: cannot get device control socket.\n");
141 #endif /* __linux__ */
142 bzero(&ifr
, sizeof(ifr
));
144 * ifreq.ifr_name and nmreq.nr_name have the same size and both
145 * contain a NUL-terminated string.
147 (void)pcapint_strlcpy(ifr
.ifr_name
, d
->req
.nr_name
, sizeof(ifr
.ifr_name
));
151 * The flags we pass in are 32-bit and unsigned.
153 * On most if not all UN*Xes, ifr_flags is 16-bit and
154 * signed, and the result of assigning a longer
155 * unsigned value to a shorter signed value is
156 * implementation-defined (even if, in practice, it'll
157 * do what's intended on all platforms we support
158 * result of assigning a 32-bit unsigned value).
159 * So we mask out the upper 16 bits.
161 ifr
.ifr_flags
= *if_flags
& 0xffff;
164 * In FreeBSD, we need to set the high-order flags,
165 * as we're using IFF_PPROMISC, which is in those bits.
167 * XXX - DragonFly BSD?
169 ifr
.ifr_flagshigh
= *if_flags
>> 16;
170 #endif /* __FreeBSD__ */
173 error
= ioctl(fd
, what
, &ifr
);
178 * The flags we return are 32-bit.
180 * On most if not all UN*Xes, ifr_flags is
181 * 16-bit and signed, and will get sign-
182 * extended, so that the upper 16 bits of
183 * those flags will be forced on. So we
184 * mask out the upper 16 bits of the
185 * sign-extended value.
187 *if_flags
= ifr
.ifr_flags
& 0xffff;
190 * In FreeBSD, we need to return the
191 * high-order flags, as we're using
192 * IFF_PPROMISC, which is in those bits.
194 * XXX - DragonFly BSD?
196 *if_flags
|= (ifr
.ifr_flagshigh
<< 16);
197 #endif /* __FreeBSD__ */
202 #endif /* __linux__ */
203 return error
? -1 : 0;
208 pcap_netmap_close(pcap_t
*p
)
210 struct pcap_netmap
*pn
= p
->priv
;
211 struct nm_desc
*d
= pn
->d
;
212 uint32_t if_flags
= 0;
214 if (pn
->must_clear_promisc
) {
215 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
216 if (if_flags
& IFF_PPROMISC
) {
217 if_flags
&= ~IFF_PPROMISC
;
218 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
222 pcapint_cleanup_live_common(p
);
227 pcap_netmap_activate(pcap_t
*p
)
229 struct pcap_netmap
*pn
= p
->priv
;
231 uint32_t if_flags
= 0;
233 d
= nm_open(p
->opt
.device
, NULL
, 0, NULL
);
235 pcapint_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
236 errno
, "netmap open: cannot access %s",
238 pcapint_cleanup_live_common(p
);
242 fprintf(stderr
, "%s device %s priv %p fd %d ports %d..%d\n",
243 __func__
, p
->opt
.device
, d
, d
->fd
,
244 d
->first_rx_ring
, d
->last_rx_ring
);
250 * Turn a negative snapshot value (invalid), a snapshot value of
251 * 0 (unspecified), or a value bigger than the normal maximum
252 * value, into the maximum allowed value.
254 * If some application really *needs* a bigger snapshot
255 * length, we should just increase MAXIMUM_SNAPLEN.
257 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
258 p
->snapshot
= MAXIMUM_SNAPLEN
;
260 if (p
->opt
.promisc
&& !(d
->req
.nr_ringid
& NETMAP_SW_RING
)) {
261 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
262 if (!(if_flags
& IFF_PPROMISC
)) {
263 pn
->must_clear_promisc
= 1;
264 if_flags
|= IFF_PPROMISC
;
265 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
268 p
->linktype
= DLT_EN10MB
;
269 p
->selectable_fd
= p
->fd
;
270 p
->read_op
= pcap_netmap_dispatch
;
271 p
->inject_op
= pcap_netmap_inject
;
272 p
->setfilter_op
= pcapint_install_bpf_program
;
273 p
->setdirection_op
= NULL
;
274 p
->set_datalink_op
= NULL
;
275 p
->getnonblock_op
= pcapint_getnonblock_fd
;
276 p
->setnonblock_op
= pcapint_setnonblock_fd
;
277 p
->stats_op
= pcap_netmap_stats
;
278 p
->cleanup_op
= pcap_netmap_close
;
285 pcap_netmap_create(const char *device
, char *ebuf
, int *is_ours
)
289 *is_ours
= (!strncmp(device
, "netmap:", 7) || !strncmp(device
, "vale", 4));
292 p
= PCAP_CREATE_COMMON(ebuf
, struct pcap_netmap
);
295 p
->activate_op
= pcap_netmap_activate
;
300 * The "device name" for netmap devices isn't a name for a device, it's
301 * an expression that indicates how the device should be set up, so
302 * there's no way to enumerate them.
305 pcap_netmap_findalldevs(pcap_if_list_t
*devlistp _U_
, char *err_str _U_
)