]>
The Tcpdump Group git mirrors - libpcap/blob - pcap-netmap.c
2 * Copyright (C) 2014 Luigi Rizzo. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 #define NETMAP_WITH_LIBS
41 #include <net/netmap_user.h>
44 #include "pcap-netmap.h"
47 /* On FreeBSD we use IFF_PPROMISC which is in ifr_flagshigh.
48 * remap to IFF_PROMISC on linux
50 #define IFF_PPROMISC IFF_PROMISC
54 struct nm_desc
*d
; /* pointer returned by nm_open() */
55 pcap_handler cb
; /* callback and argument */
57 int must_clear_promisc
; /* flag */
58 uint64_t rx_pkts
; /* # of pkts received before the filter */
63 pcap_netmap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
65 struct pcap_netmap
*pn
= p
->priv
;
67 ps
->ps_recv
= pn
->rx_pkts
;
75 pcap_netmap_filter(u_char
*arg
, struct pcap_pkthdr
*h
, const u_char
*buf
)
77 pcap_t
*p
= (pcap_t
*)arg
;
78 struct pcap_netmap
*pn
= p
->priv
;
79 const struct bpf_insn
*pc
= p
->fcode
.bf_insns
;
82 if (pc
== NULL
|| bpf_filter(pc
, buf
, h
->len
, h
->caplen
))
83 pn
->cb(pn
->cb_arg
, h
, buf
);
88 pcap_netmap_dispatch(pcap_t
*p
, int cnt
, pcap_handler cb
, u_char
*user
)
91 struct pcap_netmap
*pn
= p
->priv
;
92 struct nm_desc
*d
= pn
->d
;
93 struct pollfd pfd
= { .fd
= p
->fd
, .events
= POLLIN
, .revents
= 0 };
101 return PCAP_ERROR_BREAK
;
103 /* nm_dispatch won't run forever */
105 ret
= nm_dispatch((void *)d
, cnt
, (void *)pcap_netmap_filter
, (void *)p
);
109 ret
= poll(&pfd
, 1, p
->opt
.timeout
);
115 /* XXX need to check the NIOCTXSYNC/poll */
117 pcap_netmap_inject(pcap_t
*p
, const void *buf
, size_t size
)
119 struct pcap_netmap
*pn
= p
->priv
;
120 struct nm_desc
*d
= pn
->d
;
122 return nm_inject(d
, buf
, size
);
127 pcap_netmap_ioctl(pcap_t
*p
, u_long what
, uint32_t *if_flags
)
129 struct pcap_netmap
*pn
= p
->priv
;
130 struct nm_desc
*d
= pn
->d
;
132 int error
, fd
= d
->fd
;
135 fd
= socket(AF_INET
, SOCK_DGRAM
, 0);
137 fprintf(stderr
, "Error: cannot get device control socket.\n");
141 bzero(&ifr
, sizeof(ifr
));
142 strncpy(ifr
.ifr_name
, d
->req
.nr_name
, sizeof(ifr
.ifr_name
));
145 ifr
.ifr_flags
= *if_flags
;
147 ifr
.ifr_flagshigh
= *if_flags
>> 16;
148 #endif /* __FreeBSD__ */
151 error
= ioctl(fd
, what
, &ifr
);
155 *if_flags
= ifr
.ifr_flags
;
157 *if_flags
|= (ifr
.ifr_flagshigh
<< 16);
158 #endif /* __FreeBSD__ */
164 return error
? -1 : 0;
169 pcap_netmap_close(pcap_t
*p
)
171 struct pcap_netmap
*pn
= p
->priv
;
172 struct nm_desc
*d
= pn
->d
;
173 uint32_t if_flags
= 0;
175 if (pn
->must_clear_promisc
) {
176 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
177 if (if_flags
& IFF_PPROMISC
) {
178 if_flags
&= ~IFF_PPROMISC
;
179 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
183 pcap_cleanup_live_common(p
);
188 pcap_netmap_activate(pcap_t
*p
)
190 struct pcap_netmap
*pn
= p
->priv
;
192 uint32_t if_flags
= 0;
194 d
= nm_open(p
->opt
.device
, NULL
, 0, NULL
);
196 snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
197 "netmap open: cannot access %s: %s\n",
198 p
->opt
.device
, pcap_strerror(errno
));
199 pcap_cleanup_live_common(p
);
203 fprintf(stderr
, "%s device %s priv %p fd %d ports %d..%d\n",
204 __FUNCTION__
, p
->opt
.device
, d
, d
->fd
,
205 d
->first_rx_ring
, d
->last_rx_ring
);
210 * Turn a negative snapshot value (invalid), a snapshot value of
211 * 0 (unspecified), or a value bigger than the normal maximum
212 * value, into the maximum allowed value.
214 * If some application really *needs* a bigger snapshot
215 * length, we should just increase MAXIMUM_SNAPLEN.
217 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
218 p
->snapshot
= MAXIMUM_SNAPLEN
;
220 if (p
->opt
.promisc
&& !(d
->req
.nr_ringid
& NETMAP_SW_RING
)) {
221 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
222 if (!(if_flags
& IFF_PPROMISC
)) {
223 pn
->must_clear_promisc
= 1;
224 if_flags
|= IFF_PPROMISC
;
225 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
228 p
->linktype
= DLT_EN10MB
;
229 p
->selectable_fd
= p
->fd
;
230 p
->read_op
= pcap_netmap_dispatch
;
231 p
->inject_op
= pcap_netmap_inject
,
232 p
->setfilter_op
= install_bpf_program
;
233 p
->setdirection_op
= NULL
;
234 p
->set_datalink_op
= NULL
;
235 p
->getnonblock_op
= pcap_getnonblock_fd
;
236 p
->setnonblock_op
= pcap_setnonblock_fd
;
237 p
->stats_op
= pcap_netmap_stats
;
238 p
->cleanup_op
= pcap_netmap_close
;
245 pcap_netmap_create(const char *device
, char *ebuf
, int *is_ours
)
249 *is_ours
= (!strncmp(device
, "netmap:", 7) || !strncmp(device
, "vale", 4));
252 p
= pcap_create_common(ebuf
, sizeof (struct pcap_netmap
));
255 p
->activate_op
= pcap_netmap_activate
;
260 * The "device name" for netmap devices isn't a name for a device, it's
261 * an expression that indicates how the device should be set up, so
262 * there's no way to enumerate them.
265 pcap_netmap_findalldevs(pcap_if_list_t
*devlistp _U_
, char *err_str _U_
)