2 * Copyright (C) 2014 Luigi Rizzo. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 #define NETMAP_WITH_LIBS
41 #include <net/netmap_user.h>
44 #include "pcap-netmap.h"
48 * On FreeBSD we use IFF_PPROMISC which is in ifr_flagshigh.
49 * Remap to IFF_PROMISC on other platforms.
51 * XXX - DragonFly BSD?
53 #define IFF_PPROMISC IFF_PROMISC
54 #endif /* __FreeBSD__ */
57 struct nm_desc *d; /* pointer returned by nm_open() */
58 pcap_handler cb; /* callback and argument */
60 int must_clear_promisc; /* flag */
61 uint64_t rx_pkts; /* # of pkts received before the filter */
66 pcap_netmap_stats(pcap_t *p, struct pcap_stat *ps)
68 struct pcap_netmap *pn = p->priv;
70 ps->ps_recv = (u_int)pn->rx_pkts;
78 pcap_netmap_filter(u_char *arg, struct pcap_pkthdr *h, const u_char *buf)
80 pcap_t *p = (pcap_t *)arg;
81 struct pcap_netmap *pn = p->priv;
82 const struct bpf_insn *pc = p->fcode.bf_insns;
85 if (pc == NULL || bpf_filter(pc, buf, h->len, h->caplen))
86 pn->cb(pn->cb_arg, h, buf);
91 pcap_netmap_dispatch(pcap_t *p, int cnt, pcap_handler cb, u_char *user)
94 struct pcap_netmap *pn = p->priv;
95 struct nm_desc *d = pn->d;
96 struct pollfd pfd = { .fd = p->fd, .events = POLLIN, .revents = 0 };
104 return PCAP_ERROR_BREAK;
106 /* nm_dispatch won't run forever */
108 ret = nm_dispatch((void *)d, cnt, (void *)pcap_netmap_filter, (void *)p);
112 ret = poll(&pfd, 1, p->opt.timeout);
118 /* XXX need to check the NIOCTXSYNC/poll */
120 pcap_netmap_inject(pcap_t *p, const void *buf, size_t size)
122 struct pcap_netmap *pn = p->priv;
123 struct nm_desc *d = pn->d;
125 return nm_inject(d, buf, size);
130 pcap_netmap_ioctl(pcap_t *p, u_long what, uint32_t *if_flags)
132 struct pcap_netmap *pn = p->priv;
133 struct nm_desc *d = pn->d;
135 int error, fd = d->fd;
138 fd = socket(AF_INET, SOCK_DGRAM, 0);
140 fprintf(stderr, "Error: cannot get device control socket.\n");
144 bzero(&ifr, sizeof(ifr));
145 strncpy(ifr.ifr_name, d->req.nr_name, sizeof(ifr.ifr_name));
149 * The flags we pass in are 32-bit and unsigned.
151 * On most if not all UN*Xes, ifr_flags is 16-bit and
152 * signed, and the result of assigning a longer
153 * unsigned value to a shorter signed value is
154 * implementation-defined (even if, in practice, it'll
155 * do what's intended on all platforms we support
156 * result of assigning a 32-bit unsigned value).
157 * So we mask out the upper 16 bits.
159 ifr.ifr_flags = *if_flags & 0xffff;
162 * In FreeBSD, we need to set the high-order flags,
163 * as we're using IFF_PPROMISC, which is in those bits.
165 * XXX - DragonFly BSD?
167 ifr.ifr_flagshigh = *if_flags >> 16;
168 #endif /* __FreeBSD__ */
171 error = ioctl(fd, what, &ifr);
176 * The flags we return are 32-bit.
178 * On most if not all UN*Xes, ifr_flags is
179 * 16-bit and signed, and will get sign-
180 * extended, so that the upper 16 bits of
181 * those flags will be forced on. So we
182 * mask out the upper 16 bits of the
183 * sign-extended value.
185 *if_flags = ifr.ifr_flags & 0xffff;
188 * In FreeBSD, we need to return the
189 * high-order flags, as we're using
190 * IFF_PPROMISC, which is in those bits.
192 * XXX - DragonFly BSD?
194 *if_flags |= (ifr.ifr_flagshigh << 16);
195 #endif /* __FreeBSD__ */
201 return error ? -1 : 0;
206 pcap_netmap_close(pcap_t *p)
208 struct pcap_netmap *pn = p->priv;
209 struct nm_desc *d = pn->d;
210 uint32_t if_flags = 0;
212 if (pn->must_clear_promisc) {
213 pcap_netmap_ioctl(p, SIOCGIFFLAGS, &if_flags); /* fetch flags */
214 if (if_flags & IFF_PPROMISC) {
215 if_flags &= ~IFF_PPROMISC;
216 pcap_netmap_ioctl(p, SIOCSIFFLAGS, &if_flags);
220 pcap_cleanup_live_common(p);
225 pcap_netmap_activate(pcap_t *p)
227 struct pcap_netmap *pn = p->priv;
229 uint32_t if_flags = 0;
231 d = nm_open(p->opt.device, NULL, 0, NULL);
233 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
234 errno, "netmap open: cannot access %s",
236 pcap_cleanup_live_common(p);
240 fprintf(stderr, "%s device %s priv %p fd %d ports %d..%d\n",
241 __FUNCTION__, p->opt.device, d, d->fd,
242 d->first_rx_ring, d->last_rx_ring);
248 * Turn a negative snapshot value (invalid), a snapshot value of
249 * 0 (unspecified), or a value bigger than the normal maximum
250 * value, into the maximum allowed value.
252 * If some application really *needs* a bigger snapshot
253 * length, we should just increase MAXIMUM_SNAPLEN.
255 if (p->snapshot <= 0 || p->snapshot > MAXIMUM_SNAPLEN)
256 p->snapshot = MAXIMUM_SNAPLEN;
258 if (p->opt.promisc && !(d->req.nr_ringid & NETMAP_SW_RING)) {
259 pcap_netmap_ioctl(p, SIOCGIFFLAGS, &if_flags); /* fetch flags */
260 if (!(if_flags & IFF_PPROMISC)) {
261 pn->must_clear_promisc = 1;
262 if_flags |= IFF_PPROMISC;
263 pcap_netmap_ioctl(p, SIOCSIFFLAGS, &if_flags);
266 p->linktype = DLT_EN10MB;
267 p->selectable_fd = p->fd;
268 p->read_op = pcap_netmap_dispatch;
269 p->inject_op = pcap_netmap_inject;
270 p->setfilter_op = install_bpf_program;
271 p->setdirection_op = NULL;
272 p->set_datalink_op = NULL;
273 p->getnonblock_op = pcap_getnonblock_fd;
274 p->setnonblock_op = pcap_setnonblock_fd;
275 p->stats_op = pcap_netmap_stats;
276 p->cleanup_op = pcap_netmap_close;
283 pcap_netmap_create(const char *device, char *ebuf, int *is_ours)
287 *is_ours = (!strncmp(device, "netmap:", 7) || !strncmp(device, "vale", 4));
290 p = pcap_create_common(ebuf, sizeof (struct pcap_netmap));
293 p->activate_op = pcap_netmap_activate;
298 * The "device name" for netmap devices isn't a name for a device, it's
299 * an expression that indicates how the device should be set up, so
300 * there's no way to enumerate them.
303 pcap_netmap_findalldevs(pcap_if_list_t *devlistp _U_, char *err_str _U_)