]>
The Tcpdump Group git mirrors - libpcap/blob - pcap-netmap.c
2 * Copyright (C) 2014 Luigi Rizzo. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 #define NETMAP_WITH_LIBS
40 #include <net/netmap_user.h>
43 #include "pcap-netmap.h"
47 * On FreeBSD we use IFF_PPROMISC which is in ifr_flagshigh.
48 * Remap to IFF_PROMISC on other platforms.
50 * XXX - DragonFly BSD?
52 #define IFF_PPROMISC IFF_PROMISC
53 #endif /* __FreeBSD__ */
56 struct nm_desc
*d
; /* pointer returned by nm_open() */
57 pcap_handler cb
; /* callback and argument */
59 int must_clear_promisc
; /* flag */
60 uint64_t rx_pkts
; /* # of pkts received before the filter */
65 pcap_netmap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
67 struct pcap_netmap
*pn
= p
->priv
;
69 ps
->ps_recv
= (u_int
)pn
->rx_pkts
;
77 pcap_netmap_filter(u_char
*arg
, struct pcap_pkthdr
*h
, const u_char
*buf
)
79 pcap_t
*p
= (pcap_t
*)arg
;
80 struct pcap_netmap
*pn
= p
->priv
;
81 const struct bpf_insn
*pc
= p
->fcode
.bf_insns
;
84 if (pc
== NULL
|| pcap_filter(pc
, buf
, h
->len
, h
->caplen
))
85 pn
->cb(pn
->cb_arg
, h
, buf
);
90 pcap_netmap_dispatch(pcap_t
*p
, int cnt
, pcap_handler cb
, u_char
*user
)
93 struct pcap_netmap
*pn
= p
->priv
;
94 struct nm_desc
*d
= pn
->d
;
95 struct pollfd pfd
= { .fd
= p
->fd
, .events
= POLLIN
, .revents
= 0 };
103 return PCAP_ERROR_BREAK
;
105 /* nm_dispatch won't run forever */
107 ret
= nm_dispatch((void *)d
, cnt
, (void *)pcap_netmap_filter
, (void *)p
);
111 ret
= poll(&pfd
, 1, p
->opt
.timeout
);
117 /* XXX need to check the NIOCTXSYNC/poll */
119 pcap_netmap_inject(pcap_t
*p
, const void *buf
, int size
)
121 struct pcap_netmap
*pn
= p
->priv
;
122 struct nm_desc
*d
= pn
->d
;
124 return nm_inject(d
, buf
, size
);
129 pcap_netmap_ioctl(pcap_t
*p
, u_long what
, uint32_t *if_flags
)
131 struct pcap_netmap
*pn
= p
->priv
;
132 struct nm_desc
*d
= pn
->d
;
134 int error
, fd
= d
->fd
;
137 fd
= socket(AF_INET
, SOCK_DGRAM
, 0);
139 fprintf(stderr
, "Error: cannot get device control socket.\n");
143 bzero(&ifr
, sizeof(ifr
));
144 strncpy(ifr
.ifr_name
, d
->req
.nr_name
, sizeof(ifr
.ifr_name
));
148 * The flags we pass in are 32-bit and unsigned.
150 * On most if not all UN*Xes, ifr_flags is 16-bit and
151 * signed, and the result of assigning a longer
152 * unsigned value to a shorter signed value is
153 * implementation-defined (even if, in practice, it'll
154 * do what's intended on all platforms we support
155 * result of assigning a 32-bit unsigned value).
156 * So we mask out the upper 16 bits.
158 ifr
.ifr_flags
= *if_flags
& 0xffff;
161 * In FreeBSD, we need to set the high-order flags,
162 * as we're using IFF_PPROMISC, which is in those bits.
164 * XXX - DragonFly BSD?
166 ifr
.ifr_flagshigh
= *if_flags
>> 16;
167 #endif /* __FreeBSD__ */
170 error
= ioctl(fd
, what
, &ifr
);
175 * The flags we return are 32-bit.
177 * On most if not all UN*Xes, ifr_flags is
178 * 16-bit and signed, and will get sign-
179 * extended, so that the upper 16 bits of
180 * those flags will be forced on. So we
181 * mask out the upper 16 bits of the
182 * sign-extended value.
184 *if_flags
= ifr
.ifr_flags
& 0xffff;
187 * In FreeBSD, we need to return the
188 * high-order flags, as we're using
189 * IFF_PPROMISC, which is in those bits.
191 * XXX - DragonFly BSD?
193 *if_flags
|= (ifr
.ifr_flagshigh
<< 16);
194 #endif /* __FreeBSD__ */
200 return error
? -1 : 0;
205 pcap_netmap_close(pcap_t
*p
)
207 struct pcap_netmap
*pn
= p
->priv
;
208 struct nm_desc
*d
= pn
->d
;
209 uint32_t if_flags
= 0;
211 if (pn
->must_clear_promisc
) {
212 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
213 if (if_flags
& IFF_PPROMISC
) {
214 if_flags
&= ~IFF_PPROMISC
;
215 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
219 pcap_cleanup_live_common(p
);
224 pcap_netmap_activate(pcap_t
*p
)
226 struct pcap_netmap
*pn
= p
->priv
;
228 uint32_t if_flags
= 0;
230 d
= nm_open(p
->opt
.device
, NULL
, 0, NULL
);
232 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
233 errno
, "netmap open: cannot access %s",
235 pcap_cleanup_live_common(p
);
239 fprintf(stderr
, "%s device %s priv %p fd %d ports %d..%d\n",
240 __FUNCTION__
, p
->opt
.device
, d
, d
->fd
,
241 d
->first_rx_ring
, d
->last_rx_ring
);
247 * Turn a negative snapshot value (invalid), a snapshot value of
248 * 0 (unspecified), or a value bigger than the normal maximum
249 * value, into the maximum allowed value.
251 * If some application really *needs* a bigger snapshot
252 * length, we should just increase MAXIMUM_SNAPLEN.
254 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
255 p
->snapshot
= MAXIMUM_SNAPLEN
;
257 if (p
->opt
.promisc
&& !(d
->req
.nr_ringid
& NETMAP_SW_RING
)) {
258 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
259 if (!(if_flags
& IFF_PPROMISC
)) {
260 pn
->must_clear_promisc
= 1;
261 if_flags
|= IFF_PPROMISC
;
262 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
265 p
->linktype
= DLT_EN10MB
;
266 p
->selectable_fd
= p
->fd
;
267 p
->read_op
= pcap_netmap_dispatch
;
268 p
->inject_op
= pcap_netmap_inject
;
269 p
->setfilter_op
= pcap_install_bpf_program
;
270 p
->setdirection_op
= NULL
;
271 p
->set_datalink_op
= NULL
;
272 p
->getnonblock_op
= pcap_getnonblock_fd
;
273 p
->setnonblock_op
= pcap_setnonblock_fd
;
274 p
->stats_op
= pcap_netmap_stats
;
275 p
->cleanup_op
= pcap_netmap_close
;
282 pcap_netmap_create(const char *device
, char *ebuf
, int *is_ours
)
286 *is_ours
= (!strncmp(device
, "netmap:", 7) || !strncmp(device
, "vale", 4));
289 p
= PCAP_CREATE_COMMON(ebuf
, struct pcap_netmap
);
292 p
->activate_op
= pcap_netmap_activate
;
297 * The "device name" for netmap devices isn't a name for a device, it's
298 * an expression that indicates how the device should be set up, so
299 * there's no way to enumerate them.
302 pcap_netmap_findalldevs(pcap_if_list_t
*devlistp _U_
, char *err_str _U_
)