fea8707db3
MFC after: 1 month
331 lines
6.7 KiB
C
331 lines
6.7 KiB
C
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
|
|
#include <ctype.h>
|
|
#include <netinet/in.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include <snf.h>
|
|
|
|
#include "pcap-int.h"
|
|
#include "pcap-snf.h"
|
|
|
|
/*
|
|
* Private data for capturing on SNF devices.
|
|
*/
|
|
struct pcap_snf {
|
|
snf_handle_t snf_handle; /* opaque device handle */
|
|
snf_ring_t snf_ring; /* opaque device ring handle */
|
|
int snf_timeout;
|
|
int snf_boardnum;
|
|
};
|
|
|
|
static int
|
|
snf_set_datalink(pcap_t *p, int dlt)
|
|
{
|
|
p->linktype = dlt;
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
snf_pcap_stats(pcap_t *p, struct pcap_stat *ps)
|
|
{
|
|
struct snf_ring_stats stats;
|
|
int rc;
|
|
|
|
if ((rc = snf_ring_getstats(ps->snf_ring, &stats))) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "snf_get_stats: %s",
|
|
pcap_strerror(rc));
|
|
return -1;
|
|
}
|
|
ps->ps_recv = stats.ring_pkt_recv + stats.ring_pkt_overflow;
|
|
ps->ps_drop = stats.ring_pkt_overflow;
|
|
ps->ps_ifdrop = stats.nic_pkt_overflow + stats.nic_pkt_bad;
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
snf_platform_cleanup(pcap_t *p)
|
|
{
|
|
struct pcap_snf *ps = p->priv;
|
|
|
|
if (p == NULL)
|
|
return;
|
|
|
|
snf_ring_close(ps->snf_ring);
|
|
snf_close(ps->snf_handle);
|
|
pcap_cleanup_live_common(p);
|
|
}
|
|
|
|
static int
|
|
snf_getnonblock(pcap_t *p, char *errbuf)
|
|
{
|
|
struct pcap_snf *ps = p->priv;
|
|
|
|
return (ps->snf_timeout == 0);
|
|
}
|
|
|
|
static int
|
|
snf_setnonblock(pcap_t *p, int nonblock, char *errbuf)
|
|
{
|
|
struct pcap_snf *ps = p->priv;
|
|
|
|
if (nonblock)
|
|
ps->snf_timeout = 0;
|
|
else {
|
|
if (p->opt.timeout <= 0)
|
|
ps->snf_timeout = -1; /* forever */
|
|
else
|
|
ps->snf_timeout = p->opt.timeout;
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
#define _NSEC_PER_SEC 1000000000
|
|
|
|
static inline
|
|
struct timeval
|
|
snf_timestamp_to_timeval(const int64_t ts_nanosec)
|
|
{
|
|
struct timeval tv;
|
|
int32_t rem;
|
|
if (ts_nanosec == 0)
|
|
return (struct timeval) { 0, 0 };
|
|
tv.tv_sec = ts_nanosec / _NSEC_PER_SEC;
|
|
tv.tv_usec = (ts_nanosec % _NSEC_PER_SEC) / 1000;
|
|
return tv;
|
|
}
|
|
|
|
static int
|
|
snf_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
|
|
{
|
|
struct pcap_snf *ps = p->priv;
|
|
struct pcap_pkthdr hdr;
|
|
int i, flags, err, caplen, n;
|
|
struct snf_recv_req req;
|
|
|
|
if (!p || cnt == 0)
|
|
return -1;
|
|
|
|
n = 0;
|
|
while (n < cnt || PACKET_COUNT_IS_UNLIMITED(cnt)) {
|
|
/*
|
|
* Has "pcap_breakloop()" been called?
|
|
*/
|
|
if (p->break_loop) {
|
|
if (n == 0) {
|
|
p->break_loop = 0;
|
|
return (-2);
|
|
} else {
|
|
return (n);
|
|
}
|
|
}
|
|
|
|
err = snf_ring_recv(ps->snf_ring, ps->snf_timeout, &req);
|
|
|
|
if (err) {
|
|
if (err == EBUSY || err == EAGAIN)
|
|
return (0);
|
|
if (err == EINTR)
|
|
continue;
|
|
if (err != 0) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "snf_read: %s",
|
|
pcap_strerror(err));
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
caplen = req.length;
|
|
if (caplen > p->snapshot)
|
|
caplen = p->snapshot;
|
|
|
|
if ((p->fcode.bf_insns == NULL) ||
|
|
bpf_filter(p->fcode.bf_insns, req.pkt_addr, req.length, caplen)) {
|
|
hdr.ts = snf_timestamp_to_timeval(req.timestamp);
|
|
hdr.caplen = caplen;
|
|
hdr.len = req.length;
|
|
callback(user, &hdr, req.pkt_addr);
|
|
}
|
|
n++;
|
|
}
|
|
return (n);
|
|
}
|
|
|
|
static int
|
|
snf_setfilter(pcap_t *p, struct bpf_program *fp)
|
|
{
|
|
if (!p)
|
|
return -1;
|
|
if (!fp) {
|
|
strncpy(p->errbuf, "setfilter: No filter specified",
|
|
sizeof(p->errbuf));
|
|
return -1;
|
|
}
|
|
|
|
/* Make our private copy of the filter */
|
|
|
|
if (install_bpf_program(p, fp) < 0)
|
|
return -1;
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
snf_inject(pcap_t *p, const void *buf _U_, size_t size _U_)
|
|
{
|
|
strlcpy(p->errbuf, "Sending packets isn't supported with snf",
|
|
PCAP_ERRBUF_SIZE);
|
|
return (-1);
|
|
}
|
|
|
|
static int
|
|
snf_activate(pcap_t* p)
|
|
{
|
|
struct pcap_snf *ps = p->priv;
|
|
char *device = p->opt.source;
|
|
const char *nr = NULL;
|
|
int err;
|
|
int flags = 0;
|
|
|
|
if (device == NULL) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
|
|
"device is NULL: %s", pcap_strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
/* In Libpcap, we set pshared by default if NUM_RINGS is set to > 1.
|
|
* Since libpcap isn't thread-safe */
|
|
if ((nr = getenv("SNF_NUM_RINGS")) && *nr && atoi(nr) > 1)
|
|
flags |= SNF_F_PSHARED;
|
|
else
|
|
nr = NULL;
|
|
|
|
err = snf_open(ps->snf_boardnum,
|
|
0, /* let SNF API parse SNF_NUM_RINGS, if set */
|
|
NULL, /* default RSS, or use SNF_RSS_FLAGS env */
|
|
0, /* default to SNF_DATARING_SIZE from env */
|
|
flags, /* may want pshared */
|
|
&ps->snf_handle);
|
|
if (err != 0) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
|
|
"snf_open failed: %s", pcap_strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
err = snf_ring_open(ps->snf_handle, &ps->snf_ring);
|
|
if (err != 0) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
|
|
"snf_ring_open failed: %s", pcap_strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
if (p->opt.timeout <= 0)
|
|
ps->snf_timeout = -1;
|
|
else
|
|
ps->snf_timeout = p->opt.timeout;
|
|
|
|
err = snf_start(ps->snf_handle);
|
|
if (err != 0) {
|
|
snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
|
|
"snf_start failed: %s", pcap_strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* "select()" and "poll()" don't work on snf descriptors.
|
|
*/
|
|
p->selectable_fd = -1;
|
|
p->linktype = DLT_EN10MB;
|
|
p->read_op = snf_read;
|
|
p->inject_op = snf_inject;
|
|
p->setfilter_op = snf_setfilter;
|
|
p->setdirection_op = NULL; /* Not implemented.*/
|
|
p->set_datalink_op = snf_set_datalink;
|
|
p->getnonblock_op = snf_getnonblock;
|
|
p->setnonblock_op = snf_setnonblock;
|
|
p->stats_op = snf_pcap_stats;
|
|
p->cleanup_op = snf_platform_cleanup;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
snf_findalldevs(pcap_if_t **devlistp, char *errbuf)
|
|
{
|
|
/*
|
|
* There are no platform-specific devices since each device
|
|
* exists as a regular Ethernet device.
|
|
*/
|
|
return 0;
|
|
}
|
|
|
|
pcap_t *
|
|
snf_create(const char *device, char *ebuf, int *is_ours)
|
|
{
|
|
pcap_t *p;
|
|
int boardnum = -1;
|
|
struct snf_ifaddrs *ifaddrs, *ifa;
|
|
size_t devlen;
|
|
struct pcap_snf *ps;
|
|
|
|
if (snf_init(SNF_VERSION_API)) {
|
|
/* Can't initialize the API, so no SNF devices */
|
|
*is_ours = 0;
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Match a given interface name to our list of interface names, from
|
|
* which we can obtain the intended board number
|
|
*/
|
|
if (snf_getifaddrs(&ifaddrs) || ifaddrs == NULL) {
|
|
/* Can't get SNF addresses */
|
|
*is_ours = 0;
|
|
return NULL;
|
|
}
|
|
devlen = strlen(device) + 1;
|
|
ifa = ifaddrs;
|
|
while (ifa) {
|
|
if (!strncmp(device, ifa->snf_ifa_name, devlen)) {
|
|
boardnum = ifa->snf_ifa_boardnum;
|
|
break;
|
|
}
|
|
ifa = ifa->snf_ifa_next;
|
|
}
|
|
snf_freeifaddrs(ifaddrs);
|
|
|
|
if (ifa == NULL) {
|
|
/*
|
|
* If we can't find the device by name, support the name "snfX"
|
|
* and "snf10gX" where X is the board number.
|
|
*/
|
|
if (sscanf(device, "snf10g%d", &boardnum) != 1 &&
|
|
sscanf(device, "snf%d", &boardnum) != 1) {
|
|
/* Nope, not a supported name */
|
|
*is_ours = 0;
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* OK, it's probably ours. */
|
|
*is_ours = 1;
|
|
|
|
p = pcap_create_common(device, ebuf, sizeof (struct pcap_snf));
|
|
if (p == NULL)
|
|
return NULL;
|
|
ps = p->priv;
|
|
|
|
p->activate_op = snf_activate;
|
|
ps->snf_boardnum = boardnum;
|
|
return p;
|
|
}
|