12 #include <limits.h> /* for INT_MAX */
15 #include <netinet/in.h>
17 #include <sys/socket.h>
18 #include <sys/types.h>
23 #if SNF_VERSION_API >= 0x0003
24 #define SNF_HAVE_INJECT_API
31 * Private data for capturing on SNF devices.
34 snf_handle_t snf_handle
; /* opaque device handle */
35 snf_ring_t snf_ring
; /* opaque device ring handle */
36 #ifdef SNF_HAVE_INJECT_API
37 snf_inject_t snf_inj
; /* inject handle, if inject is used */
44 snf_set_datalink(pcap_t
*p
, int dlt
)
51 snf_pcap_stats(pcap_t
*p
, struct pcap_stat
*ps
)
53 struct snf_ring_stats stats
;
54 struct pcap_snf
*snfps
= p
->priv
;
57 if ((rc
= snf_ring_getstats(snfps
->snf_ring
, &stats
))) {
58 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
62 ps
->ps_recv
= stats
.ring_pkt_recv
+ stats
.ring_pkt_overflow
;
63 ps
->ps_drop
= stats
.ring_pkt_overflow
;
64 ps
->ps_ifdrop
= stats
.nic_pkt_overflow
+ stats
.nic_pkt_bad
;
69 snf_platform_cleanup(pcap_t
*p
)
71 struct pcap_snf
*ps
= p
->priv
;
73 #ifdef SNF_HAVE_INJECT_API
75 snf_inject_close(ps
->snf_inj
);
77 snf_ring_close(ps
->snf_ring
);
78 snf_close(ps
->snf_handle
);
79 pcap_cleanup_live_common(p
);
83 snf_getnonblock(pcap_t
*p
)
85 struct pcap_snf
*ps
= p
->priv
;
87 return (ps
->snf_timeout
== 0);
91 snf_setnonblock(pcap_t
*p
, int nonblock
)
93 struct pcap_snf
*ps
= p
->priv
;
98 if (p
->opt
.timeout
<= 0)
99 ps
->snf_timeout
= -1; /* forever */
101 ps
->snf_timeout
= p
->opt
.timeout
;
106 #define _NSEC_PER_SEC 1000000000
110 snf_timestamp_to_timeval(const int64_t ts_nanosec
, const int tstamp_precision
)
114 const static struct timeval zero_timeval
;
119 tv
.tv_sec
= ts_nanosec
/ _NSEC_PER_SEC
;
120 tv_nsec
= (ts_nanosec
% _NSEC_PER_SEC
);
122 /* libpcap expects tv_usec to be nanos if using nanosecond precision. */
123 if (tstamp_precision
== PCAP_TSTAMP_PRECISION_NANO
)
124 tv
.tv_usec
= tv_nsec
;
126 tv
.tv_usec
= tv_nsec
/ 1000;
132 snf_read(pcap_t
*p
, int cnt
, pcap_handler callback
, u_char
*user
)
134 struct pcap_snf
*ps
= p
->priv
;
135 struct pcap_pkthdr hdr
;
136 int i
, flags
, err
, caplen
, n
;
137 struct snf_recv_req req
;
138 int nonblock
, timeout
;
144 * This can conceivably process more than INT_MAX packets,
145 * which would overflow the packet count, causing it either
146 * to look like a negative number, and thus cause us to
147 * return a value that looks like an error, or overflow
148 * back into positive territory, and thus cause us to
149 * return a too-low count.
151 * Therefore, if the packet count is unlimited, we clip
152 * it at INT_MAX; this routine is not expected to
153 * process packets indefinitely, so that's not an issue.
155 if (PACKET_COUNT_IS_UNLIMITED(cnt
))
159 timeout
= ps
->snf_timeout
;
162 * Has "pcap_breakloop()" been called?
173 err
= snf_ring_recv(ps
->snf_ring
, timeout
, &req
);
176 if (err
== EBUSY
|| err
== EAGAIN
) {
179 else if (err
== EINTR
) {
184 pcap_fmt_errmsg_for_errno(p
->errbuf
,
185 PCAP_ERRBUF_SIZE
, err
, "snf_read");
191 if (caplen
> p
->snapshot
)
192 caplen
= p
->snapshot
;
194 if ((p
->fcode
.bf_insns
== NULL
) ||
195 pcap_filter(p
->fcode
.bf_insns
, req
.pkt_addr
, req
.length
, caplen
)) {
196 hdr
.ts
= snf_timestamp_to_timeval(req
.timestamp
, p
->opt
.tstamp_precision
);
198 hdr
.len
= req
.length
;
199 callback(user
, &hdr
, req
.pkt_addr
);
203 /* After one successful packet is received, we won't block
204 * again for that timeout. */
212 snf_inject(pcap_t
*p
, const void *buf _U_
, int size _U_
)
214 #ifdef SNF_HAVE_INJECT_API
215 struct pcap_snf
*ps
= p
->priv
;
217 if (ps
->snf_inj
== NULL
) {
218 rc
= snf_inject_open(ps
->snf_boardnum
, 0, &ps
->snf_inj
);
220 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
221 rc
, "snf_inject_open");
226 rc
= snf_inject_send(ps
->snf_inj
, -1, 0, buf
, size
);
231 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
232 rc
, "snf_inject_send");
236 pcap_strlcpy(p
->errbuf
, "Sending packets isn't supported with this snf version",
243 snf_activate(pcap_t
* p
)
245 struct pcap_snf
*ps
= p
->priv
;
246 char *device
= p
->opt
.device
;
247 const char *nr
= NULL
;
249 int flags
= -1, ring_id
= -1;
251 if (device
== NULL
) {
252 snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
, "device is NULL");
256 /* In Libpcap, we set pshared by default if NUM_RINGS is set to > 1.
257 * Since libpcap isn't thread-safe */
258 if ((nr
= getenv("SNF_FLAGS")) && *nr
)
259 flags
= strtol(nr
, NULL
, 0);
260 else if ((nr
= getenv("SNF_NUM_RINGS")) && *nr
&& atoi(nr
) > 1)
261 flags
= SNF_F_PSHARED
;
266 /* Allow pcap_set_buffer_size() to set dataring_size.
267 * Default is zero which allows setting from env SNF_DATARING_SIZE.
268 * pcap_set_buffer_size() is in bytes while snf_open() accepts values
269 * between 0 and 1048576 in Megabytes. Values in this range are
272 err
= snf_open(ps
->snf_boardnum
,
273 0, /* let SNF API parse SNF_NUM_RINGS, if set */
274 NULL
, /* default RSS, or use SNF_RSS_FLAGS env */
275 (p
->opt
.buffer_size
> 0 && p
->opt
.buffer_size
< 1048576) ? 1048576 : p
->opt
.buffer_size
, /* default to SNF_DATARING_SIZE from env */
276 flags
, /* may want pshared */
279 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
280 err
, "snf_open failed");
284 if ((nr
= getenv("SNF_PCAP_RING_ID")) && *nr
) {
285 ring_id
= (int) strtol(nr
, NULL
, 0);
287 err
= snf_ring_open_id(ps
->snf_handle
, ring_id
, &ps
->snf_ring
);
289 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
290 err
, "snf_ring_open_id(ring=%d) failed", ring_id
);
295 * Turn a negative snapshot value (invalid), a snapshot value of
296 * 0 (unspecified), or a value bigger than the normal maximum
297 * value, into the maximum allowed value.
299 * If some application really *needs* a bigger snapshot
300 * length, we should just increase MAXIMUM_SNAPLEN.
302 if (p
->snapshot
<= 0 || p
->snapshot
> MAXIMUM_SNAPLEN
)
303 p
->snapshot
= MAXIMUM_SNAPLEN
;
305 if (p
->opt
.timeout
<= 0)
306 ps
->snf_timeout
= -1;
308 ps
->snf_timeout
= p
->opt
.timeout
;
310 err
= snf_start(ps
->snf_handle
);
312 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
313 err
, "snf_start failed");
318 * "select()" and "poll()" don't work on snf descriptors.
321 p
->selectable_fd
= -1;
323 p
->linktype
= DLT_EN10MB
;
324 p
->read_op
= snf_read
;
325 p
->inject_op
= snf_inject
;
326 p
->setfilter_op
= install_bpf_program
;
327 p
->setdirection_op
= NULL
; /* Not implemented.*/
328 p
->set_datalink_op
= snf_set_datalink
;
329 p
->getnonblock_op
= snf_getnonblock
;
330 p
->setnonblock_op
= snf_setnonblock
;
331 p
->stats_op
= snf_pcap_stats
;
332 p
->cleanup_op
= snf_platform_cleanup
;
333 #ifdef SNF_HAVE_INJECT_API
339 #define MAX_DESC_LENGTH 128
341 snf_findalldevs(pcap_if_list_t
*devlistp
, char *errbuf
)
345 struct sockaddr_in addr
;
347 struct snf_ifaddrs
*ifaddrs
, *ifa
;
348 char name
[MAX_DESC_LENGTH
];
349 char desc
[MAX_DESC_LENGTH
];
350 int ret
, allports
= 0, merge
= 0;
351 const char *nr
= NULL
;
353 if (snf_init(SNF_VERSION_API
)) {
354 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
355 "snf_getifaddrs: snf_init failed");
359 if (snf_getifaddrs(&ifaddrs
) || ifaddrs
== NULL
)
361 pcap_fmt_errmsg_for_errno(errbuf
, PCAP_ERRBUF_SIZE
,
362 errno
, "snf_getifaddrs");
365 if ((nr
= getenv("SNF_FLAGS")) && *nr
) {
367 merge
= strtol(nr
, NULL
, 0);
369 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
370 "snf_getifaddrs: SNF_FLAGS is not a valid number");
373 merge
= merge
& SNF_F_AGGREGATE_PORTMASK
;
376 for (ifa
= ifaddrs
; ifa
!= NULL
; ifa
= ifa
->snf_ifa_next
) {
378 * Myricom SNF adapter ports may appear as regular
379 * network interfaces, which would already have been
380 * added to the list of adapters by pcap_platform_finddevs()
381 * if this isn't an SNF-only version of libpcap.
383 * Our create routine intercepts pcap_create() calls for
384 * those interfaces and arranges that they will be
385 * opened using the SNF API instead.
387 * So if we already have an entry for the device, we
388 * don't add an additional entry for it, we just
389 * update the description for it, if any, to indicate
390 * which snfN device it is. Otherwise, we add an entry
393 * In either case, if SNF_F_AGGREGATE_PORTMASK is set
394 * in SNF_FLAGS, we add this port to the bitmask
395 * of ports, which we use to generate a device
396 * we can use to capture on all ports.
398 * Generate the description string. If port aggregation
399 * is set, use 2^{port number} as the unit number,
400 * rather than {port number}.
402 * XXX - do entries in this list have IP addresses for
403 * the port? If so, should we add them to the
404 * entry for the device, if they're not already in the
405 * list of IP addresses for the device?
407 (void)snprintf(desc
,MAX_DESC_LENGTH
,"Myricom %ssnf%d",
408 merge
? "Merge Bitmask Port " : "",
409 merge
? 1 << ifa
->snf_ifa_portnum
: ifa
->snf_ifa_portnum
);
411 * Add the port to the bitmask.
414 allports
|= 1 << ifa
->snf_ifa_portnum
;
416 * See if there's already an entry for the device
417 * with the name ifa->snf_ifa_name.
419 dev
= find_dev(devlistp
, ifa
->snf_ifa_name
);
422 * Yes. Update its description.
426 desc_str
= strdup(desc
);
427 if (desc_str
== NULL
) {
428 pcap_fmt_errmsg_for_errno(errbuf
,
429 PCAP_ERRBUF_SIZE
, errno
,
430 "snf_findalldevs strdup");
433 free(dev
->description
);
434 dev
->description
= desc_str
;
437 * No. Add an entry for it.
439 * XXX - is there a notion of "up" or "running",
440 * and can we determine whether something's
441 * plugged into the adapter and set
442 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
443 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
445 dev
= add_dev(devlistp
, ifa
->snf_ifa_name
, 0, desc
,
451 * On Windows, fill in IP# from device name
453 ret
= inet_pton(AF_INET
, dev
->name
, &addr
.sin_addr
);
456 * Successful conversion of device name
459 addr
.sin_family
= AF_INET
;
460 if (add_addr_to_dev(dev
, &addr
, sizeof(addr
),
461 NULL
, 0, NULL
, 0, NULL
, 0, errbuf
) == -1)
463 } else if (ret
== -1) {
467 pcap_fmt_errmsg_for_errno(errbuf
,
468 PCAP_ERRBUF_SIZE
, errno
,
469 "sinf_findalldevs inet_pton");
475 snf_freeifaddrs(ifaddrs
);
477 * Create a snfX entry if port aggregation is enabled
481 * Add a new entry with all ports bitmask
483 (void)snprintf(name
,MAX_DESC_LENGTH
,"snf%d",allports
);
484 (void)snprintf(desc
,MAX_DESC_LENGTH
,"Myricom Merge Bitmask All Ports snf%d",
487 * XXX - is there any notion of "up" and "running" that
488 * would apply to this device, given that it handles
491 * Presumably, there's no notion of "connected" vs.
492 * "disconnected", as "is this plugged into a network?"
493 * would be a per-port property.
495 if (add_dev(devlistp
, name
,
496 PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE
, desc
,
500 * XXX - should we give it a list of addresses with all
501 * the addresses for all the ports?
509 snf_create(const char *device
, char *ebuf
, int *is_ours
)
513 struct snf_ifaddrs
*ifaddrs
, *ifa
;
517 if (snf_init(SNF_VERSION_API
)) {
518 /* Can't initialize the API, so no SNF devices */
524 * Match a given interface name to our list of interface names, from
525 * which we can obtain the intended board number
527 if (snf_getifaddrs(&ifaddrs
) || ifaddrs
== NULL
) {
528 /* Can't get SNF addresses */
532 devlen
= strlen(device
) + 1;
535 if (strncmp(device
, ifa
->snf_ifa_name
, devlen
) == 0) {
536 boardnum
= ifa
->snf_ifa_boardnum
;
539 ifa
= ifa
->snf_ifa_next
;
541 snf_freeifaddrs(ifaddrs
);
545 * If we can't find the device by name, support the name "snfX"
546 * and "snf10gX" where X is the board number.
548 if (sscanf(device
, "snf10g%d", &boardnum
) != 1 &&
549 sscanf(device
, "snf%d", &boardnum
) != 1) {
550 /* Nope, not a supported name */
556 /* OK, it's probably ours. */
559 p
= PCAP_CREATE_COMMON(ebuf
, struct pcap_snf
);
565 * We support microsecond and nanosecond time stamps.
567 p
->tstamp_precision_list
= malloc(2 * sizeof(u_int
));
568 if (p
->tstamp_precision_list
== NULL
) {
569 pcap_fmt_errmsg_for_errno(ebuf
, PCAP_ERRBUF_SIZE
, errno
,
574 p
->tstamp_precision_list
[0] = PCAP_TSTAMP_PRECISION_MICRO
;
575 p
->tstamp_precision_list
[1] = PCAP_TSTAMP_PRECISION_NANO
;
576 p
->tstamp_precision_count
= 2;
578 p
->activate_op
= snf_activate
;
579 ps
->snf_boardnum
= boardnum
;
585 * This libpcap build supports only SNF cards, not regular network
590 * There are no regular interfaces, just SNF interfaces.
593 pcap_platform_finddevs(pcap_if_list_t
*devlistp
, char *errbuf
)
599 * Attempts to open a regular interface fail.
602 pcap_create_interface(const char *device
, char *errbuf
)
604 snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
605 "This version of libpcap only supports SNF cards");
610 * Libpcap version string.
613 pcap_lib_version(void)
615 return (PCAP_VERSION_STRING
" (SNF-only)");