]>
The Tcpdump Group git mirrors - libpcap/blob - pcap-netmap.c
2 * Copyright (C) 2014 Luigi Rizzo. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 #define NETMAP_WITH_LIBS
41 #include <net/netmap_user.h>
44 #include "pcap-netmap.h"
48 * On FreeBSD we use IFF_PPROMISC which is in ifr_flagshigh.
49 * Remap to IFF_PROMISC on other platforms.
51 * XXX - DragonFly BSD?
53 #define IFF_PPROMISC IFF_PROMISC
54 #endif /* __FreeBSD__ */
57 struct nm_desc
*d
; /* pointer returned by nm_open() */
58 pcap_handler cb
; /* callback and argument */
60 int must_clear_promisc
; /* flag */
61 uint64_t rx_pkts
; /* # of pkts received before the filter */
66 pcap_netmap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
68 struct pcap_netmap
*pn
= p
->priv
;
70 ps
->ps_recv
= pn
->rx_pkts
;
78 pcap_netmap_filter(u_char
*arg
, struct pcap_pkthdr
*h
, const u_char
*buf
)
80 pcap_t
*p
= (pcap_t
*)arg
;
81 struct pcap_netmap
*pn
= p
->priv
;
82 const struct bpf_insn
*pc
= p
->fcode
.bf_insns
;
85 if (pc
== NULL
|| bpf_filter(pc
, buf
, h
->len
, h
->caplen
))
86 pn
->cb(pn
->cb_arg
, h
, buf
);
91 pcap_netmap_dispatch(pcap_t
*p
, int cnt
, pcap_handler cb
, u_char
*user
)
94 struct pcap_netmap
*pn
= p
->priv
;
95 struct nm_desc
*d
= pn
->d
;
96 struct pollfd pfd
= { .fd
= p
->fd
, .events
= POLLIN
, .revents
= 0 };
104 return PCAP_ERROR_BREAK
;
106 /* nm_dispatch won't run forever */
108 ret
= nm_dispatch((void *)d
, cnt
, (void *)pcap_netmap_filter
, (void *)p
);
112 ret
= poll(&pfd
, 1, p
->opt
.timeout
);
118 /* XXX need to check the NIOCTXSYNC/poll */
120 pcap_netmap_inject(pcap_t
*p
, const void *buf
, size_t size
)
122 struct pcap_netmap
*pn
= p
->priv
;
123 struct nm_desc
*d
= pn
->d
;
125 return nm_inject(d
, buf
, size
);
130 pcap_netmap_ioctl(pcap_t
*p
, u_long what
, uint32_t *if_flags
)
132 struct pcap_netmap
*pn
= p
->priv
;
133 struct nm_desc
*d
= pn
->d
;
135 int error
, fd
= d
->fd
;
138 fd
= socket(AF_INET
, SOCK_DGRAM
, 0);
140 fprintf(stderr
, "Error: cannot get device control socket.\n");
144 bzero(&ifr
, sizeof(ifr
));
145 strncpy(ifr
.ifr_name
, d
->req
.nr_name
, sizeof(ifr
.ifr_name
));
149 * The flags we pass in are 32-bit and unsigned.
151 * On most if not all UN*Xes, ifr_flags is 16-bit and
152 * signed, and the result of assigning a longer
153 * unsigned value to a shorter signed value is
154 * implementation-defined (even if, in practice, it'll
155 * do what's intended on all platforms we support
156 * result of assigning a 32-bit unsigned value).
157 * So we mask out the upper 16 bits.
159 ifr
.ifr_flags
= *if_flags
& 0xffff;
162 * In FreeBSD, we need to set the high-order flags,
163 * as we're using IFF_PPROMISC, which is in those bits.
165 * XXX - DragonFly BSD?
167 ifr
.ifr_flagshigh
= *if_flags
>> 16;
168 #endif /* __FreeBSD__ */
171 error
= ioctl(fd
, what
, &ifr
);
176 * The flags we return are 32-bit.
178 * On most if not all UN*Xes, ifr_flags is
179 * 16-bit and signed, and will get sign-
180 * extended, so that the upper 16 bits of
181 * those flags will be forced on. So we
182 * mask out the upper 16 bits of the
183 * sign-extended value.
185 *if_flags
= ifr
.ifr_flags
& 0xffff;
188 * In FreeBSD, we need to return the
189 * high-order flags, as we're using
190 * IFF_PPROMISC, which is in those bits.
192 * XXX - DragonFly BSD?
194 *if_flags
|= (ifr
.ifr_flagshigh
<< 16);
195 #endif /* __FreeBSD__ */
201 return error
? -1 : 0;
206 pcap_netmap_close(pcap_t
*p
)
208 struct pcap_netmap
*pn
= p
->priv
;
209 struct nm_desc
*d
= pn
->d
;
210 uint32_t if_flags
= 0;
212 if (pn
->must_clear_promisc
) {
213 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
214 if (if_flags
& IFF_PPROMISC
) {
215 if_flags
&= ~IFF_PPROMISC
;
216 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
220 pcap_cleanup_live_common(p
);
225 pcap_netmap_activate(pcap_t
*p
)
227 struct pcap_netmap
*pn
= p
->priv
;
229 uint32_t if_flags
= 0;
231 d
= nm_open(p
->opt
.device
, NULL
, 0, NULL
);
233 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
234 errno
, "netmap open: cannot access %s",
236 pcap_cleanup_live_common(p
);
240 fprintf(stderr
, "%s device %s priv %p fd %d ports %d..%d\n",
241 __FUNCTION__
, p
->opt
.device
, d
, d
->fd
,
242 d
->first_rx_ring
, d
->last_rx_ring
);
248 * Turn a negative snapshot value (invalid), a snapshot value of
249 * 0 (unspecified), or a value bigger than the normal maximum
250 * value, into the maximum allowed value.
252 * If some application really *needs* a bigger snapshot
253 * length, we should just increase MAXIMUM_SNAPLEN.
255 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
256 p
->snapshot
= MAXIMUM_SNAPLEN
;
258 if (p
->opt
.promisc
&& !(d
->req
.nr_ringid
& NETMAP_SW_RING
)) {
259 pcap_netmap_ioctl(p
, SIOCGIFFLAGS
, &if_flags
); /* fetch flags */
260 if (!(if_flags
& IFF_PPROMISC
)) {
261 pn
->must_clear_promisc
= 1;
262 if_flags
|= IFF_PPROMISC
;
263 pcap_netmap_ioctl(p
, SIOCSIFFLAGS
, &if_flags
);
266 p
->linktype
= DLT_EN10MB
;
267 p
->selectable_fd
= p
->fd
;
268 p
->read_op
= pcap_netmap_dispatch
;
269 p
->inject_op
= pcap_netmap_inject
;
270 p
->setfilter_op
= install_bpf_program
;
271 p
->setdirection_op
= NULL
;
272 p
->set_datalink_op
= NULL
;
273 p
->getnonblock_op
= pcap_getnonblock_fd
;
274 p
->setnonblock_op
= pcap_setnonblock_fd
;
275 p
->stats_op
= pcap_netmap_stats
;
276 p
->cleanup_op
= pcap_netmap_close
;
283 pcap_netmap_create(const char *device
, char *ebuf
, int *is_ours
)
287 *is_ours
= (!strncmp(device
, "netmap:", 7) || !strncmp(device
, "vale", 4));
290 p
= pcap_create_common(ebuf
, sizeof (struct pcap_netmap
));
293 p
->activate_op
= pcap_netmap_activate
;
298 * The "device name" for netmap devices isn't a name for a device, it's
299 * an expression that indicates how the device should be set up, so
300 * there's no way to enumerate them.
303 pcap_netmap_findalldevs(pcap_if_list_t
*devlistp _U_
, char *err_str _U_
)