]>
The Tcpdump Group git mirrors - libpcap/blob - pcap-dlpi.c
bb1548dcbc7b6fc24b3fba37e30f09e4e17713af
2 * Copyright (c) 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 * This code contributed by Atanu Ghosh (atanu@cs.ucl.ac.uk),
22 * University College London.
26 * Packet capture routine for dlpi under SunOS 5
30 * - Apparently the DLIOCRAW ioctl() is specific to SunOS.
32 * - There is a bug in bufmod(7) such that setting the snapshot
33 * length results in data being left of the front of the packet.
35 * - It might be desirable to use pfmod(7) to filter packets in the
40 static const char rcsid
[] =
41 "@(#) $Header: /tcpdump/master/libpcap/pcap-dlpi.c,v 1.57 2000-07-06 01:50:36 assar Exp $ (LBL)";
44 #include <sys/types.h>
46 #ifdef HAVE_SYS_BUFMOD_H
47 #include <sys/bufmod.h>
50 #ifdef HAVE_SYS_DLPI_EXT_H
51 #include <sys/dlpi_ext.h>
54 #include <sys/socket.h>
56 #ifdef DL_HP_PPA_ACK_OBS
59 #include <sys/stream.h>
60 #if defined(HAVE_SOLARIS) && defined(HAVE_SYS_BUFMOD_H)
61 #include <sys/systeminfo.h>
84 #ifdef HAVE_OS_PROTO_H
88 #ifndef PCAP_DEV_PREFIX
89 #define PCAP_DEV_PREFIX "/dev"
95 static int dlattachreq(int, bpf_u_int32
, char *);
96 static int dlbindack(int, char *, char *);
97 static int dlbindreq(int, bpf_u_int32
, char *);
98 static int dlinfoack(int, char *, char *);
99 static int dlinforeq(int, char *);
100 static int dlokack(int, const char *, char *, char *);
101 static int recv_ack(int, int, const char *, char *, char *);
102 static int dlpromisconreq(int, bpf_u_int32
, char *);
103 #if defined(HAVE_SOLARIS) && defined(HAVE_SYS_BUFMOD_H)
104 static char *get_release(bpf_u_int32
*, bpf_u_int32
*, bpf_u_int32
*);
106 static int send_request(int, char *, int, char *, char *);
107 #ifdef HAVE_SYS_BUFMOD_H
108 static int strioctl(int, int, int, char *);
111 static int dlpi_kread(int, off_t
, void *, u_int
, char *);
114 static int get_dlpi_ppa(int, const char *, int, char *);
118 pcap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
125 /* XXX Needed by HP-UX (at least) */
126 static bpf_u_int32 ctlbuf
[MAXDLBUF
];
127 static struct strbuf ctl
= {
134 pcap_read(pcap_t
*p
, int cnt
, pcap_handler callback
, u_char
*user
)
136 register int cc
, n
, caplen
, origlen
;
137 register u_char
*bp
, *ep
, *pk
;
138 register struct bpf_insn
*fcode
;
139 #ifdef HAVE_SYS_BUFMOD_H
140 register struct sb_hdr
*sbp
;
147 struct pcap_pkthdr pkthdr
;
152 data
.buf
= (char *)p
->buffer
+ p
->offset
;
153 data
.maxlen
= MAXDLBUF
;
156 if (getmsg(p
->fd
, &ctl
, &data
, &flags
) < 0) {
157 /* Don't choke when we get ptraced */
158 if (errno
== EINTR
) {
162 strlcpy(p
->errbuf
, pcap_strerror(errno
),
168 bp
= p
->buffer
+ p
->offset
;
172 /* Loop through packets */
173 fcode
= p
->fcode
.bf_insns
;
176 #ifdef HAVE_SYS_BUFMOD_H
181 memcpy(sbp
, bp
, sizeof(*sbp
));
184 sbp
= (struct sb_hdr
*)bp
;
185 p
->md
.stat
.ps_drop
+= sbp
->sbh_drops
;
186 pk
= bp
+ sizeof(*sbp
);
187 bp
+= sbp
->sbh_totlen
;
188 origlen
= sbp
->sbh_origlen
;
189 caplen
= sbp
->sbh_msglen
;
192 caplen
= min(p
->snapshot
, cc
);
196 ++p
->md
.stat
.ps_recv
;
197 if (bpf_filter(fcode
, pk
, origlen
, caplen
)) {
198 #ifdef HAVE_SYS_BUFMOD_H
199 pkthdr
.ts
= sbp
->sbh_timestamp
;
201 (void)gettimeofday(&pkthdr
.ts
, NULL
);
203 pkthdr
.len
= origlen
;
204 pkthdr
.caplen
= caplen
;
205 /* Insure caplen does not exceed snapshot */
206 if (pkthdr
.caplen
> p
->snapshot
)
207 pkthdr
.caplen
= p
->snapshot
;
208 (*callback
)(user
, &pkthdr
, pk
);
209 if (++n
>= cnt
&& cnt
>= 0) {
215 #ifdef HAVE_SYS_BUFMOD_H
223 pcap_open_live(char *device
, int snaplen
, int promisc
, int to_ms
, char *ebuf
)
229 register dl_info_ack_t
*infop
;
230 #ifdef HAVE_SYS_BUFMOD_H
231 bpf_u_int32 ss
, flag
;
233 register char *release
;
234 bpf_u_int32 osmajor
, osminor
, osmicro
;
237 bpf_u_int32 buf
[MAXDLBUF
];
239 #ifndef HAVE_DEV_DLPI
243 p
= (pcap_t
*)malloc(sizeof(*p
));
245 strlcpy(ebuf
, pcap_strerror(errno
), PCAP_ERRBUF_SIZE
);
248 memset(p
, 0, sizeof(*p
));
252 ** Remove any "/dev/" on the front of the device.
254 cp
= strrchr(device
, '/');
259 strlcpy(dname
, cp
, sizeof(dname
));
262 * Split the name into a device type and a unit number.
264 cp
= strpbrk(dname
, "0123456789");
266 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
267 "%s missing unit number", device
);
270 ppa
= strtol(cp
, &eos
, 10);
272 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
273 "%s bad unit number", device
);
279 * Use "/dev/dlpi" as the device.
281 * XXX - HP's DLPI Programmer's Guide for HP-UX 11.00 says that
282 * the "dl_mjr_num" field is for the "major number of interface
283 * driver"; that's the major of "/dev/dlpi" on the system on
284 * which I tried this, but there may be DLPI devices that
285 * use a different driver, in which case we may need to
286 * search "/dev" for the appropriate device with that major
287 * device number, rather than hardwiring "/dev/dlpi".
290 if ((p
->fd
= open(cp
, O_RDWR
)) < 0) {
291 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
292 "%s: %s", cp
, pcap_strerror(errno
));
297 * Get a table of all PPAs for that device, and search that
298 * table for the specified device type name and unit number.
300 ppa
= get_dlpi_ppa(p
->fd
, dname
, ppa
, ebuf
);
305 ** Determine device and ppa
307 cp
= strpbrk(device
, "0123456789");
309 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "%s missing unit number",
313 ppa
= strtol(cp
, &eos
, 10);
315 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "%s bad unit number", device
);
320 strlcpy(dname
, device
, sizeof(dname
));
322 snprintf(dname
, sizeof(dname
), "%s/%s", PCAP_DEV_PREFIX
,
325 /* Try device without unit number */
326 strlcpy(dname2
, dname
, sizeof(dname2
));
327 cp
= strchr(dname
, *cp
);
329 if ((p
->fd
= open(dname
, O_RDWR
)) < 0) {
330 if (errno
!= ENOENT
) {
331 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "%s: %s", dname
,
332 pcap_strerror(errno
));
336 /* Try again with unit number */
337 if ((p
->fd
= open(dname2
, O_RDWR
)) < 0) {
338 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "%s: %s", dname2
,
339 pcap_strerror(errno
));
342 /* XXX Assume unit zero */
347 p
->snapshot
= snaplen
;
350 ** Attach if "style 2" provider
352 if (dlinforeq(p
->fd
, ebuf
) < 0 ||
353 dlinfoack(p
->fd
, (char *)buf
, ebuf
) < 0)
355 infop
= &((union DL_primitives
*)buf
)->info_ack
;
356 if (infop
->dl_provider_style
== DL_STYLE2
&&
357 (dlattachreq(p
->fd
, ppa
, ebuf
) < 0 ||
358 dlokack(p
->fd
, "attach", (char *)buf
, ebuf
) < 0))
361 ** Bind (defer if using HP-UX 9 or HP-UX 10.20, totally skip if
364 #if !defined(HAVE_HPUX9) && !defined(HAVE_HPUX10_20) && !defined(sinix)
366 /* According to IBM's AIX Support Line, the dl_sap value
367 ** should not be less than 0x600 (1536) for standard ethernet
369 if (dlbindreq(p
->fd
, 1537, ebuf
) < 0 ||
371 if (dlbindreq(p
->fd
, 0, ebuf
) < 0 ||
373 dlbindack(p
->fd
, (char *)buf
, ebuf
) < 0)
379 ** Enable promiscuous
381 if (dlpromisconreq(p
->fd
, DL_PROMISC_PHYS
, ebuf
) < 0 ||
382 dlokack(p
->fd
, "promisc_phys", (char *)buf
, ebuf
) < 0)
386 ** Try to enable multicast (you would have thought
387 ** promiscuous would be sufficient). (Skip if using
390 #if !defined(__hpux) && !defined(sinix)
391 if (dlpromisconreq(p
->fd
, DL_PROMISC_MULTI
, ebuf
) < 0 ||
392 dlokack(p
->fd
, "promisc_multi", (char *)buf
, ebuf
) < 0)
394 "WARNING: DL_PROMISC_MULTI failed (%s)\n", ebuf
);
398 ** Try to enable sap (when not in promiscuous mode when using
399 ** using HP-UX and never under SINIX)
406 (dlpromisconreq(p
->fd
, DL_PROMISC_SAP
, ebuf
) < 0 ||
407 dlokack(p
->fd
, "promisc_sap", (char *)buf
, ebuf
) < 0)) {
408 /* Not fatal if promisc since the DL_PROMISC_PHYS worked */
411 "WARNING: DL_PROMISC_SAP failed (%s)\n", ebuf
);
418 ** HP-UX 9 and HP-UX 10.20 must bind after setting promiscuous
421 #if defined(HAVE_HPUX9) || defined(HAVE_HPUX10_20)
422 if (dlbindreq(p
->fd
, 0, ebuf
) < 0 ||
423 dlbindack(p
->fd
, (char *)buf
, ebuf
) < 0)
428 ** Determine link type
430 if (dlinforeq(p
->fd
, ebuf
) < 0 ||
431 dlinfoack(p
->fd
, (char *)buf
, ebuf
) < 0)
434 infop
= &((union DL_primitives
*)buf
)->info_ack
;
435 switch (infop
->dl_mac_type
) {
439 p
->linktype
= DLT_EN10MB
;
444 p
->linktype
= DLT_FDDI
;
449 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "unknown mac type 0x%lu",
456 ** This is a non standard SunOS hack to get the ethernet header.
458 if (strioctl(p
->fd
, DLIOCRAW
, 0, NULL
) < 0) {
459 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "DLIOCRAW: %s",
460 pcap_strerror(errno
));
465 #ifdef HAVE_SYS_BUFMOD_H
467 ** Another non standard call to get the data nicely buffered
469 if (ioctl(p
->fd
, I_PUSH
, "bufmod") != 0) {
470 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "I_PUSH bufmod: %s",
471 pcap_strerror(errno
));
476 ** Now that the bufmod is pushed lets configure it.
478 ** There is a bug in bufmod(7). When dealing with messages of
479 ** less than snaplen size it strips data from the beginning not
482 ** This bug is supposed to be fixed in 5.3.2. Also, there is a
483 ** patch available. Ask for bugid 1149065.
487 release
= get_release(&osmajor
, &osminor
, &osmicro
);
488 if (osmajor
== 5 && (osminor
<= 2 || (osminor
== 3 && osmicro
< 2)) &&
489 getenv("BUFMOD_FIXED") == NULL
) {
491 "WARNING: bufmod is broken in SunOS %s; ignoring snaplen.\n",
497 strioctl(p
->fd
, SBIOCSSNAP
, sizeof(ss
), (char *)&ss
) != 0) {
498 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "SBIOCSSNAP: %s",
499 pcap_strerror(errno
));
504 ** Set up the bufmod flags
506 if (strioctl(p
->fd
, SBIOCGFLAGS
, sizeof(flag
), (char *)&flag
) < 0) {
507 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "SBIOCGFLAGS: %s",
508 pcap_strerror(errno
));
512 if (strioctl(p
->fd
, SBIOCSFLAGS
, sizeof(flag
), (char *)&flag
) != 0) {
513 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "SBIOCSFLAGS: %s",
514 pcap_strerror(errno
));
518 ** Set up the bufmod timeout
523 to
.tv_sec
= to_ms
/ 1000;
524 to
.tv_usec
= (to_ms
* 1000) % 1000000;
525 if (strioctl(p
->fd
, SBIOCSTIME
, sizeof(to
), (char *)&to
) != 0) {
526 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "SBIOCSTIME: %s",
527 pcap_strerror(errno
));
534 ** As the last operation flush the read side.
536 if (ioctl(p
->fd
, I_FLUSH
, FLUSHR
) != 0) {
537 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "FLUSHR: %s",
538 pcap_strerror(errno
));
541 /* Allocate data buffer */
542 p
->bufsize
= MAXDLBUF
* sizeof(bpf_u_int32
);
543 p
->buffer
= (u_char
*)malloc(p
->bufsize
+ p
->offset
);
552 pcap_setfilter(pcap_t
*p
, struct bpf_program
*fp
)
560 send_request(int fd
, char *ptr
, int len
, char *what
, char *ebuf
)
570 if (putmsg(fd
, &ctl
, (struct strbuf
*) NULL
, flags
) < 0) {
571 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
572 "send_request: putmsg \"%s\": %s",
573 what
, pcap_strerror(errno
));
580 recv_ack(int fd
, int size
, const char *what
, char *bufp
, char *ebuf
)
582 union DL_primitives
*dlp
;
586 ctl
.maxlen
= MAXDLBUF
;
591 if (getmsg(fd
, &ctl
, (struct strbuf
*)NULL
, &flags
) < 0) {
592 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "recv_ack: %s getmsg: %s",
593 what
, pcap_strerror(errno
));
597 dlp
= (union DL_primitives
*) ctl
.buf
;
598 switch (dlp
->dl_primitive
) {
611 switch (dlp
->error_ack
.dl_errno
) {
614 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
615 "recv_ack: %s bad ppa (device unit)", what
);
620 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "recv_ack: %s: %s",
621 what
, pcap_strerror(dlp
->error_ack
.dl_unix_errno
));
625 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
626 "recv_ack: %s: Service not supplied by provider",
631 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
632 "recv_ack: %s error 0x%x",
633 what
, (bpf_u_int32
)dlp
->error_ack
.dl_errno
);
639 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
640 "recv_ack: %s unexpected primitive ack 0x%x ",
641 what
, (bpf_u_int32
)dlp
->dl_primitive
);
645 if (ctl
.len
< size
) {
646 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
647 "recv_ack: %s ack too small (%d < %d)",
648 what
, ctl
.len
, size
);
655 dlattachreq(int fd
, bpf_u_int32 ppa
, char *ebuf
)
659 req
.dl_primitive
= DL_ATTACH_REQ
;
662 return (send_request(fd
, (char *)&req
, sizeof(req
), "attach", ebuf
));
666 dlbindreq(int fd
, bpf_u_int32 sap
, char *ebuf
)
671 memset((char *)&req
, 0, sizeof(req
));
672 req
.dl_primitive
= DL_BIND_REQ
;
674 req
.dl_max_conind
= 1; /* XXX magic number */
675 /* 22 is INSAP as per the HP-UX DLPI Programmer's Guide */
677 req
.dl_service_mode
= DL_HP_RAWDLS
;
681 req
.dl_service_mode
= DL_CLDLS
;
685 return (send_request(fd
, (char *)&req
, sizeof(req
), "bind", ebuf
));
689 dlbindack(int fd
, char *bufp
, char *ebuf
)
692 return (recv_ack(fd
, DL_BIND_ACK_SIZE
, "bind", bufp
, ebuf
));
696 dlpromisconreq(int fd
, bpf_u_int32 level
, char *ebuf
)
698 dl_promiscon_req_t req
;
700 req
.dl_primitive
= DL_PROMISCON_REQ
;
701 req
.dl_level
= level
;
703 return (send_request(fd
, (char *)&req
, sizeof(req
), "promiscon", ebuf
));
707 dlokack(int fd
, const char *what
, char *bufp
, char *ebuf
)
710 return (recv_ack(fd
, DL_OK_ACK_SIZE
, what
, bufp
, ebuf
));
715 dlinforeq(int fd
, char *ebuf
)
719 req
.dl_primitive
= DL_INFO_REQ
;
721 return (send_request(fd
, (char *)&req
, sizeof(req
), "info", ebuf
));
725 dlinfoack(int fd
, char *bufp
, char *ebuf
)
728 return (recv_ack(fd
, DL_INFO_ACK_SIZE
, "info", bufp
, ebuf
));
731 #ifdef HAVE_SYS_BUFMOD_H
733 strioctl(int fd
, int cmd
, int len
, char *dp
)
742 rc
= ioctl(fd
, I_STR
, &str
);
751 #if defined(HAVE_SOLARIS) && defined(HAVE_SYS_BUFMOD_H)
753 get_release(bpf_u_int32
*majorp
, bpf_u_int32
*minorp
, bpf_u_int32
*microp
)
761 if (sysinfo(SI_RELEASE
, buf
, sizeof(buf
)) < 0)
766 *majorp
= strtol(cp
, &cp
, 10);
769 *minorp
= strtol(cp
, &cp
, 10);
772 *microp
= strtol(cp
, &cp
, 10);
777 #ifdef DL_HP_PPA_ACK_OBS
779 * Under HP-UX 10 and HP-UX 11, we can ask for the ppa
784 * Determine ppa number that specifies ifname.
786 * If the "dl_hp_ppa_info_t" doesn't have a "dl_module_id_1" member,
787 * the code that's used here is the old code for HP-UX 10.x.
789 * However, HP-UX 10.20, at least, appears to have such a member
790 * in its "dl_hp_ppa_info_t" structure, so the new code is used.
791 * The new code didn't work on an old 10.20 system on which Rick
792 * Jones of HP tried it, but with later patches installed, it
793 * worked - it appears that the older system had those members but
794 * didn't put anything in them, so, if the search by name fails, we
797 * Rick suggests that making sure your system is "up on the latest
798 * lancommon/DLPI/driver patches" is probably a good idea; it'd fix
799 * that problem, as well as allowing libpcap to see packets sent
800 * from the system on which the libpcap application is being run.
801 * (On 10.20, in addition to getting the latest patches, you need
802 * to turn the kernel "lanc_outbound_promisc_flag" flag on with ADB;
803 * a posting to "comp.sys.hp.hpux" at
805 * http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=558092266
807 * says that, to see the machine's outgoing traffic, you'd need to
808 * apply the right patches to your system, and also set that variable
811 echo 'lanc_outbound_promisc_flag/W1' | /usr/bin/adb -w /stand/vmunix /dev/kmem
813 * which could be put in, for example, "/sbin/init.d/lan".
815 * Setting the variable is not necessary on HP-UX 11.x.
818 get_dlpi_ppa(register int fd
, register const char *device
, register int unit
,
821 register dl_hp_ppa_ack_t
*ap
;
822 register dl_hp_ppa_info_t
*ipstart
, *ip
;
825 register u_long majdev
;
828 bpf_u_int32 buf
[MAXDLBUF
];
830 memset((char *)&req
, 0, sizeof(req
));
831 req
.dl_primitive
= DL_HP_PPA_REQ
;
833 memset((char *)buf
, 0, sizeof(buf
));
834 if (send_request(fd
, (char *)&req
, sizeof(req
), "hpppa", ebuf
) < 0 ||
835 recv_ack(fd
, DL_HP_PPA_ACK_SIZE
, "hpppa", (char *)buf
, ebuf
) < 0)
838 ap
= (dl_hp_ppa_ack_t
*)buf
;
839 ipstart
= (dl_hp_ppa_info_t
*)((u_char
*)ap
+ ap
->dl_offset
);
842 #ifdef HAVE_HP_PPA_INFO_T_DL_MODULE_ID_1
844 * The "dl_hp_ppa_info_t" structure has a "dl_module_id_1"
845 * member that should, in theory, contain the part of the
846 * name for the device that comes before the unit number,
847 * and should also have a "dl_module_id_2" member that may
848 * contain an alternate name (e.g., I think Ethernet devices
849 * have both "lan", for "lanN", and "snap", for "snapN", with
850 * the former being for Ethernet packets and the latter being
851 * for 802.3/802.2 packets).
853 * Search for the device that has the specified name and
856 for (i
= 0; i
< ap
->dl_count
; i
++) {
857 if ((strcmp(ip
->dl_module_id_1
, device
) == 0 ||
858 strcmp(ip
->dl_module_id_2
, device
) == 0) &&
859 ip
->dl_instance_num
== unit
)
862 ip
= (dl_hp_ppa_info_t
*)((u_char
*)ipstart
+ ip
->dl_next_offset
);
866 * We don't have that member, so the search is impossible; make it
867 * look as if the search failed.
872 if (i
== ap
->dl_count
) {
874 * Well, we didn't, or can't, find the device by name.
876 * HP-UX 10.20, whilst it has "dl_module_id_1" and
877 * "dl_module_id_2" fields in the "dl_hp_ppa_info_t",
878 * doesn't seem to fill them in unless the system is
879 * at a reasonably up-to-date patch level.
881 * Older HP-UX 10.x systems might not have those fields
884 * Therefore, we'll search for the entry with the major
885 * device number of a device with the name "/dev/<dev><unit>",
886 * if such a device exists, as the old code did.
888 snprintf(dname
, sizeof(dname
), "/dev/%s%d", device
, unit
);
889 if (stat(dname
, &statbuf
) < 0) {
890 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "stat: %s: %s",
891 dname
, pcap_strerror(errno
));
894 majdev
= major(statbuf
.st_rdev
);
898 for (i
= 0; i
< ap
->dl_count
; i
++) {
899 if (ip
->dl_mjr_num
== majdev
&&
900 ip
->dl_instance_num
== unit
)
903 ip
= (dl_hp_ppa_info_t
*)((u_char
*)ipstart
+ ip
->dl_next_offset
);
906 if (i
== ap
->dl_count
) {
907 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
908 "can't find PPA for %s", device
);
911 if (ip
->dl_hdw_state
== HDW_DEAD
) {
912 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
913 "%s: hardware state: DOWN\n", device
);
916 return ((int)ip
->dl_ppa
);
922 * Under HP-UX 9, there is no good way to determine the ppa.
923 * So punt and read it from /dev/kmem.
925 static struct nlist nl
[] = {
931 static char path_vmunix
[] = "/hp-ux";
933 /* Determine ppa number that specifies ifname */
935 get_dlpi_ppa(register int fd
, register const char *ifname
, register int unit
,
938 register const char *cp
;
942 char if_name
[sizeof(ifnet
.if_name
) + 1];
944 cp
= strrchr(ifname
, '/');
947 if (nlist(path_vmunix
, &nl
) < 0) {
948 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "nlist %s failed",
952 if (nl
[NL_IFNET
].n_value
== 0) {
953 snprintf(ebuf
, PCAP_ERRBUF_SIZE
,
954 "could't find %s kernel symbol",
955 nl
[NL_IFNET
].n_name
);
958 kd
= open("/dev/kmem", O_RDONLY
);
960 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "kmem open: %s",
961 pcap_strerror(errno
));
964 if (dlpi_kread(kd
, nl
[NL_IFNET
].n_value
,
965 &addr
, sizeof(addr
), ebuf
) < 0) {
969 for (; addr
!= NULL
; addr
= ifnet
.if_next
) {
970 if (dlpi_kread(kd
, (off_t
)addr
,
971 &ifnet
, sizeof(ifnet
), ebuf
) < 0 ||
972 dlpi_kread(kd
, (off_t
)ifnet
.if_name
,
973 if_name
, sizeof(ifnet
.if_name
), ebuf
) < 0) {
977 if_name
[sizeof(ifnet
.if_name
)] = '\0';
978 if (strcmp(if_name
, ifname
) == 0 && ifnet
.if_unit
== unit
)
979 return (ifnet
.if_index
);
982 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "Can't find %s", ifname
);
987 dlpi_kread(register int fd
, register off_t addr
,
988 register void *buf
, register u_int len
, register char *ebuf
)
992 if (lseek(fd
, addr
, SEEK_SET
) < 0) {
993 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "lseek: %s",
994 pcap_strerror(errno
));
997 cc
= read(fd
, buf
, len
);
999 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "read: %s",
1000 pcap_strerror(errno
));
1002 } else if (cc
!= len
) {
1003 snprintf(ebuf
, PCAP_ERRBUF_SIZE
, "short read (%d != %d)", cc
,