]> The Tcpdump Group git mirrors - libpcap/blob - pcap-int.h
Expand a comment to explain why we clamp the snaphot length.
[libpcap] / pcap-int.h
1 /*
2 * Copyright (c) 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the Computer Systems
16 * Engineering Group at Lawrence Berkeley Laboratory.
17 * 4. Neither the name of the University nor of the Laboratory may be used
18 * to endorse or promote products derived from this software without
19 * specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34 #ifndef pcap_int_h
35 #define pcap_int_h
36
37 #include <signal.h>
38
39 #include <pcap/pcap.h>
40
41 #include "varattrs.h"
42 #include "fmtutils.h"
43
44 /*
45 * Version string.
46 * Uses PACKAGE_VERSION from config.h.
47 */
48 #define PCAP_VERSION_STRING "libpcap version " PACKAGE_VERSION
49
50 #ifdef __cplusplus
51 extern "C" {
52 #endif
53
54 #ifdef MSDOS
55 #include <fcntl.h>
56 #include <io.h>
57 #endif
58
59 /*
60 * Swap byte ordering of unsigned long long timestamp on a big endian
61 * machine.
62 */
63 #define SWAPLL(ull) ((ull & 0xff00000000000000ULL) >> 56) | \
64 ((ull & 0x00ff000000000000ULL) >> 40) | \
65 ((ull & 0x0000ff0000000000ULL) >> 24) | \
66 ((ull & 0x000000ff00000000ULL) >> 8) | \
67 ((ull & 0x00000000ff000000ULL) << 8) | \
68 ((ull & 0x0000000000ff0000ULL) << 24) | \
69 ((ull & 0x000000000000ff00ULL) << 40) | \
70 ((ull & 0x00000000000000ffULL) << 56)
71
72 /*
73 * Maximum snapshot length.
74 *
75 * Somewhat arbitrary, but chosen to be:
76 *
77 * 1) big enough for maximum-size Linux loopback packets (65549)
78 * and some USB packets captured with USBPcap:
79 *
80 * http://desowin.org/usbpcap/
81 *
82 * (> 131072, < 262144)
83 *
84 * and
85 *
86 * 2) small enough not to cause attempts to allocate huge amounts of
87 * memory; some applications might use the snapshot length in a
88 * savefile header to control the size of the buffer they allocate,
89 * so a size of, say, 2^31-1 might not work well. (libpcap uses it
90 * as a hint, but doesn't start out allocating a buffer bigger than
91 * 2 KiB, and grows the buffer as necessary, but not beyond the
92 * per-linktype maximum snapshot length. Other code might naively
93 * use it; we want to avoid writing a too-large snapshot length,
94 * in order not to cause that code problems.)
95 *
96 * We don't enforce this in pcap_set_snaplen(), but we use it internally.
97 */
98 #define MAXIMUM_SNAPLEN 262144
99
100 struct pcap_opt {
101 char *device;
102 int timeout; /* timeout for buffering */
103 u_int buffer_size;
104 int promisc;
105 int rfmon; /* monitor mode */
106 int immediate; /* immediate mode - deliver packets as soon as they arrive */
107 int nonblock; /* non-blocking mode - don't wait for packets to be delivered, return "no packets available" */
108 int tstamp_type;
109 int tstamp_precision;
110
111 /*
112 * Platform-dependent options.
113 */
114 #ifdef __linux__
115 int protocol; /* protocol to use when creating PF_PACKET socket */
116 #endif
117 #ifdef _WIN32
118 int nocapture_local;/* disable NPF loopback */
119 #endif
120 };
121
122 typedef int (*activate_op_t)(pcap_t *);
123 typedef int (*can_set_rfmon_op_t)(pcap_t *);
124 typedef int (*read_op_t)(pcap_t *, int cnt, pcap_handler, u_char *);
125 typedef int (*next_packet_op_t)(pcap_t *, struct pcap_pkthdr *, u_char **);
126 typedef int (*inject_op_t)(pcap_t *, const void *, int);
127 typedef void (*save_current_filter_op_t)(pcap_t *, const char *);
128 typedef int (*setfilter_op_t)(pcap_t *, struct bpf_program *);
129 typedef int (*setdirection_op_t)(pcap_t *, pcap_direction_t);
130 typedef int (*set_datalink_op_t)(pcap_t *, int);
131 typedef int (*getnonblock_op_t)(pcap_t *);
132 typedef int (*setnonblock_op_t)(pcap_t *, int);
133 typedef int (*stats_op_t)(pcap_t *, struct pcap_stat *);
134 typedef void (*breakloop_op_t)(pcap_t *);
135 #ifdef _WIN32
136 typedef struct pcap_stat *(*stats_ex_op_t)(pcap_t *, int *);
137 typedef int (*setbuff_op_t)(pcap_t *, int);
138 typedef int (*setmode_op_t)(pcap_t *, int);
139 typedef int (*setmintocopy_op_t)(pcap_t *, int);
140 typedef HANDLE (*getevent_op_t)(pcap_t *);
141 typedef int (*oid_get_request_op_t)(pcap_t *, bpf_u_int32, void *, size_t *);
142 typedef int (*oid_set_request_op_t)(pcap_t *, bpf_u_int32, const void *, size_t *);
143 typedef u_int (*sendqueue_transmit_op_t)(pcap_t *, pcap_send_queue *, int);
144 typedef int (*setuserbuffer_op_t)(pcap_t *, int);
145 typedef int (*live_dump_op_t)(pcap_t *, char *, int, int);
146 typedef int (*live_dump_ended_op_t)(pcap_t *, int);
147 typedef PAirpcapHandle (*get_airpcap_handle_op_t)(pcap_t *);
148 #endif
149 typedef void (*cleanup_op_t)(pcap_t *);
150
151 /*
152 * We put all the stuff used in the read code path at the beginning,
153 * to try to keep it together in the same cache line or lines.
154 */
155 struct pcap {
156 /*
157 * Method to call to read packets on a live capture.
158 */
159 read_op_t read_op;
160
161 /*
162 * Method to call to read the next packet from a savefile.
163 */
164 next_packet_op_t next_packet_op;
165
166 #ifdef _WIN32
167 HANDLE handle;
168 #else
169 int fd;
170 #endif /* _WIN32 */
171
172 /*
173 * Read buffer.
174 */
175 u_int bufsize;
176 void *buffer;
177 u_char *bp;
178 int cc;
179
180 sig_atomic_t break_loop; /* flag set to force break from packet-reading loop */
181
182 void *priv; /* private data for methods */
183
184 #ifdef ENABLE_REMOTE
185 struct pcap_samp rmt_samp; /* parameters related to the sampling process. */
186 #endif
187
188 int swapped;
189 FILE *rfile; /* null if live capture, non-null if savefile */
190 u_int fddipad;
191 struct pcap *next; /* list of open pcaps that need stuff cleared on close */
192
193 /*
194 * File version number; meaningful only for a savefile, but we
195 * keep it here so that apps that (mistakenly) ask for the
196 * version numbers will get the same zero values that they
197 * always did.
198 */
199 int version_major;
200 int version_minor;
201
202 int snapshot;
203 int linktype; /* Network linktype */
204 int linktype_ext; /* Extended information stored in the linktype field of a file */
205 int offset; /* offset for proper alignment */
206 int activated; /* true if the capture is really started */
207 int oldstyle; /* if we're opening with pcap_open_live() */
208
209 struct pcap_opt opt;
210
211 /*
212 * Place holder for pcap_next().
213 */
214 u_char *pkt;
215
216 #ifdef _WIN32
217 struct pcap_stat stat; /* used for pcap_stats_ex() */
218 #endif
219
220 /* We're accepting only packets in this direction/these directions. */
221 pcap_direction_t direction;
222
223 /*
224 * Flags to affect BPF code generation.
225 */
226 int bpf_codegen_flags;
227
228 #if !defined(_WIN32) && !defined(MSDOS)
229 int selectable_fd; /* FD on which select()/poll()/epoll_wait()/kevent()/etc. can be done */
230
231 /*
232 * In case there either is no selectable FD, or there is but
233 * it doesn't necessarily work (e.g., if it doesn't get notified
234 * if the packet capture timeout expires before the buffer
235 * fills up), this points to a timeout that should be used
236 * in select()/poll()/epoll_wait()/kevent() call. The pcap_t should
237 * be put into non-blocking mode, and, if the timeout expires on
238 * the call, an attempt should be made to read packets from all
239 * pcap_t's with a required timeout, and the code must be
240 * prepared not to see any packets from the attempt.
241 */
242 struct timeval *required_select_timeout;
243 #endif
244
245 /*
246 * Placeholder for filter code if bpf not in kernel.
247 */
248 struct bpf_program fcode;
249
250 char errbuf[PCAP_ERRBUF_SIZE + 1];
251 int dlt_count;
252 u_int *dlt_list;
253 int tstamp_type_count;
254 u_int *tstamp_type_list;
255 int tstamp_precision_count;
256 u_int *tstamp_precision_list;
257
258 struct pcap_pkthdr pcap_header; /* This is needed for the pcap_next_ex() to work */
259
260 /*
261 * More methods.
262 */
263 activate_op_t activate_op;
264 can_set_rfmon_op_t can_set_rfmon_op;
265 inject_op_t inject_op;
266 save_current_filter_op_t save_current_filter_op;
267 setfilter_op_t setfilter_op;
268 setdirection_op_t setdirection_op;
269 set_datalink_op_t set_datalink_op;
270 getnonblock_op_t getnonblock_op;
271 setnonblock_op_t setnonblock_op;
272 stats_op_t stats_op;
273 breakloop_op_t breakloop_op;
274
275 /*
276 * Routine to use as callback for pcap_next()/pcap_next_ex().
277 */
278 pcap_handler oneshot_callback;
279
280 #ifdef _WIN32
281 /*
282 * These are, at least currently, specific to the Win32 NPF
283 * driver.
284 */
285 stats_ex_op_t stats_ex_op;
286 setbuff_op_t setbuff_op;
287 setmode_op_t setmode_op;
288 setmintocopy_op_t setmintocopy_op;
289 getevent_op_t getevent_op;
290 oid_get_request_op_t oid_get_request_op;
291 oid_set_request_op_t oid_set_request_op;
292 sendqueue_transmit_op_t sendqueue_transmit_op;
293 setuserbuffer_op_t setuserbuffer_op;
294 live_dump_op_t live_dump_op;
295 live_dump_ended_op_t live_dump_ended_op;
296 get_airpcap_handle_op_t get_airpcap_handle_op;
297 #endif
298 cleanup_op_t cleanup_op;
299 };
300
301 /*
302 * BPF code generation flags.
303 */
304 #define BPF_SPECIAL_VLAN_HANDLING 0x00000001 /* special VLAN handling for Linux */
305
306 /*
307 * This is a timeval as stored in a savefile.
308 * It has to use the same types everywhere, independent of the actual
309 * `struct timeval'; `struct timeval' has 32-bit tv_sec values on some
310 * platforms and 64-bit tv_sec values on other platforms, and writing
311 * out native `struct timeval' values would mean files could only be
312 * read on systems with the same tv_sec size as the system on which
313 * the file was written.
314 */
315
316 struct pcap_timeval {
317 bpf_int32 tv_sec; /* seconds */
318 bpf_int32 tv_usec; /* microseconds */
319 };
320
321 /*
322 * This is a `pcap_pkthdr' as actually stored in a savefile.
323 *
324 * Do not change the format of this structure, in any way (this includes
325 * changes that only affect the length of fields in this structure),
326 * and do not make the time stamp anything other than seconds and
327 * microseconds (e.g., seconds and nanoseconds). Instead:
328 *
329 * introduce a new structure for the new format;
330 *
331 * send mail to "tcpdump-workers@lists.tcpdump.org", requesting
332 * a new magic number for your new capture file format, and, when
333 * you get the new magic number, put it in "savefile.c";
334 *
335 * use that magic number for save files with the changed record
336 * header;
337 *
338 * make the code in "savefile.c" capable of reading files with
339 * the old record header as well as files with the new record header
340 * (using the magic number to determine the header format).
341 *
342 * Then supply the changes by forking the branch at
343 *
344 * https://github.com/the-tcpdump-group/libpcap/issues
345 *
346 * and issuing a pull request, so that future versions of libpcap and
347 * programs that use it (such as tcpdump) will be able to read your new
348 * capture file format.
349 */
350
351 struct pcap_sf_pkthdr {
352 struct pcap_timeval ts; /* time stamp */
353 bpf_u_int32 caplen; /* length of portion present */
354 bpf_u_int32 len; /* length this packet (off wire) */
355 };
356
357 /*
358 * How a `pcap_pkthdr' is actually stored in savefiles written
359 * by some patched versions of libpcap (e.g. the ones in Red
360 * Hat Linux 6.1 and 6.2).
361 *
362 * Do not change the format of this structure, in any way (this includes
363 * changes that only affect the length of fields in this structure).
364 * Instead, introduce a new structure, as per the above.
365 */
366
367 struct pcap_sf_patched_pkthdr {
368 struct pcap_timeval ts; /* time stamp */
369 bpf_u_int32 caplen; /* length of portion present */
370 bpf_u_int32 len; /* length this packet (off wire) */
371 int index;
372 unsigned short protocol;
373 unsigned char pkt_type;
374 };
375
376 /*
377 * User data structure for the one-shot callback used for pcap_next()
378 * and pcap_next_ex().
379 */
380 struct oneshot_userdata {
381 struct pcap_pkthdr *hdr;
382 const u_char **pkt;
383 pcap_t *pd;
384 };
385
386 #ifndef min
387 #define min(a, b) ((a) > (b) ? (b) : (a))
388 #endif
389
390 int pcap_offline_read(pcap_t *, int, pcap_handler, u_char *);
391
392 #include <stdarg.h>
393
394 #include "portability.h"
395
396 /*
397 * Does the packet count argument to a module's read routine say
398 * "supply packets until you run out of packets"?
399 */
400 #define PACKET_COUNT_IS_UNLIMITED(count) ((count) <= 0)
401
402 /*
403 * Routines that most pcap implementations can use for non-blocking mode.
404 */
405 #if !defined(_WIN32) && !defined(MSDOS)
406 int pcap_getnonblock_fd(pcap_t *);
407 int pcap_setnonblock_fd(pcap_t *p, int);
408 #endif
409
410 /*
411 * Internal interfaces for "pcap_create()".
412 *
413 * "pcap_create_interface()" is the routine to do a pcap_create on
414 * a regular network interface. There are multiple implementations
415 * of this, one for each platform type (Linux, BPF, DLPI, etc.),
416 * with the one used chosen by the configure script.
417 *
418 * "pcap_create_common()" allocates and fills in a pcap_t, for use
419 * by pcap_create routines.
420 */
421 pcap_t *pcap_create_interface(const char *, char *);
422 pcap_t *pcap_create_common(char *, size_t);
423 int pcap_do_addexit(pcap_t *);
424 void pcap_add_to_pcaps_to_close(pcap_t *);
425 void pcap_remove_from_pcaps_to_close(pcap_t *);
426 void pcap_cleanup_live_common(pcap_t *);
427 int pcap_check_activated(pcap_t *);
428 void pcap_breakloop_common(pcap_t *);
429
430 /*
431 * Internal interfaces for "pcap_findalldevs()".
432 *
433 * A pcap_if_list_t * is a reference to a list of devices.
434 *
435 * A get_if_flags_func is a platform-dependent function called to get
436 * additional interface flags.
437 *
438 * "pcap_platform_finddevs()" is the platform-dependent routine to
439 * find local network interfaces.
440 *
441 * "pcap_findalldevs_interfaces()" is a helper to find those interfaces
442 * using the "standard" mechanisms (SIOCGIFCONF, "getifaddrs()", etc.).
443 *
444 * "add_dev()" adds an entry to a pcap_if_list_t.
445 *
446 * "find_dev()" tries to find a device, by name, in a pcap_if_list_t.
447 *
448 * "find_or_add_dev()" checks whether a device is already in a pcap_if_list_t
449 * and, if not, adds an entry for it.
450 */
451 struct pcap_if_list;
452 typedef struct pcap_if_list pcap_if_list_t;
453 typedef int (*get_if_flags_func)(const char *, bpf_u_int32 *, char *);
454 int pcap_platform_finddevs(pcap_if_list_t *, char *);
455 #if !defined(_WIN32) && !defined(MSDOS)
456 int pcap_findalldevs_interfaces(pcap_if_list_t *, char *,
457 int (*)(const char *), get_if_flags_func);
458 #endif
459 pcap_if_t *find_or_add_dev(pcap_if_list_t *, const char *, bpf_u_int32,
460 get_if_flags_func, const char *, char *);
461 pcap_if_t *find_dev(pcap_if_list_t *, const char *);
462 pcap_if_t *add_dev(pcap_if_list_t *, const char *, bpf_u_int32, const char *,
463 char *);
464 int add_addr_to_dev(pcap_if_t *, struct sockaddr *, size_t,
465 struct sockaddr *, size_t, struct sockaddr *, size_t,
466 struct sockaddr *dstaddr, size_t, char *errbuf);
467 #ifndef _WIN32
468 pcap_if_t *find_or_add_if(pcap_if_list_t *, const char *, bpf_u_int32,
469 get_if_flags_func, char *);
470 int add_addr_to_if(pcap_if_list_t *, const char *, bpf_u_int32,
471 get_if_flags_func,
472 struct sockaddr *, size_t, struct sockaddr *, size_t,
473 struct sockaddr *, size_t, struct sockaddr *, size_t, char *);
474 #endif
475
476 /*
477 * Internal interfaces for "pcap_open_offline()".
478 *
479 * "pcap_open_offline_common()" allocates and fills in a pcap_t, for use
480 * by pcap_open_offline routines.
481 *
482 * "pcap_adjust_snapshot()" adjusts the snapshot to be non-zero and
483 * fit within an int.
484 *
485 * "sf_cleanup()" closes the file handle associated with a pcap_t, if
486 * appropriate, and frees all data common to all modules for handling
487 * savefile types.
488 */
489 pcap_t *pcap_open_offline_common(char *ebuf, size_t size);
490 bpf_u_int32 pcap_adjust_snapshot(bpf_u_int32 linktype, bpf_u_int32 snaplen);
491 void sf_cleanup(pcap_t *p);
492
493 /*
494 * Internal interfaces for doing user-mode filtering of packets and
495 * validating filter programs.
496 */
497 /*
498 * Auxiliary data, for use when interpreting a filter intended for the
499 * Linux kernel when the kernel rejects the filter (requiring us to
500 * run it in userland). It contains VLAN tag information.
501 */
502 struct bpf_aux_data {
503 u_short vlan_tag_present;
504 u_short vlan_tag;
505 };
506
507 /*
508 * Filtering routine that takes the auxiliary data as an additional
509 * argument.
510 */
511 u_int pcap_filter_with_aux_data(const struct bpf_insn *,
512 const u_char *, u_int, u_int, const struct bpf_aux_data *);
513
514 /*
515 * Filtering routine that doesn't.
516 */
517 u_int pcap_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
518
519 /*
520 * Routine to validate a BPF program.
521 */
522 int pcap_validate_filter(const struct bpf_insn *, int);
523
524 /*
525 * Internal interfaces for both "pcap_create()" and routines that
526 * open savefiles.
527 *
528 * "pcap_oneshot()" is the standard one-shot callback for "pcap_next()"
529 * and "pcap_next_ex()".
530 */
531 void pcap_oneshot(u_char *, const struct pcap_pkthdr *, const u_char *);
532
533 int install_bpf_program(pcap_t *, struct bpf_program *);
534
535 int pcap_strcasecmp(const char *, const char *);
536
537 /*
538 * Internal interfaces for pcap_createsrcstr and pcap_parsesrcstr with
539 * the additional bit of information regarding SSL support (rpcap:// vs.
540 * rpcaps://).
541 */
542 int pcap_createsrcstr_ex(char *, int, const char *, const char *,
543 const char *, unsigned char, char *);
544 int pcap_parsesrcstr_ex(const char *, int *, char *, char *,
545 char *, unsigned char *, char *);
546
547 #ifdef YYDEBUG
548 extern int pcap_debug;
549 #endif
550
551 #ifdef __cplusplus
552 }
553 #endif
554
555 #endif