pcap-snf.c revision 356341
1#ifdef HAVE_CONFIG_H
2#include <config.h>
3#endif
4
5#ifndef _WIN32
6#include <sys/param.h>
7#endif /* !_WIN32 */
8
9#include <stdlib.h>
10#include <string.h>
11#include <errno.h>
12
13#include <ctype.h>
14#ifndef _WIN32
15#include <netinet/in.h>
16#include <sys/mman.h>
17#include <sys/socket.h>
18#include <sys/types.h>
19#include <unistd.h>
20#endif /* !_WIN32 */
21
22#include <snf.h>
23#if SNF_VERSION_API >= 0x0003
24#define SNF_HAVE_INJECT_API
25#endif
26
27#include "pcap-int.h"
28#include "pcap-snf.h"
29
30/*
31 * Private data for capturing on SNF devices.
32 */
33struct pcap_snf {
34	snf_handle_t snf_handle; /* opaque device handle */
35	snf_ring_t   snf_ring;   /* opaque device ring handle */
36#ifdef SNF_HAVE_INJECT_API
37	snf_inject_t snf_inj;    /* inject handle, if inject is used */
38#endif
39	int          snf_timeout;
40	int          snf_boardnum;
41};
42
43static int
44snf_set_datalink(pcap_t *p, int dlt)
45{
46	p->linktype = dlt;
47	return (0);
48}
49
50static int
51snf_pcap_stats(pcap_t *p, struct pcap_stat *ps)
52{
53	struct snf_ring_stats stats;
54	struct pcap_snf *snfps = p->priv;
55	int rc;
56
57	if ((rc = snf_ring_getstats(snfps->snf_ring, &stats))) {
58		pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
59		    rc, "snf_get_stats");
60		return -1;
61	}
62	ps->ps_recv = stats.ring_pkt_recv + stats.ring_pkt_overflow;
63	ps->ps_drop = stats.ring_pkt_overflow;
64	ps->ps_ifdrop = stats.nic_pkt_overflow + stats.nic_pkt_bad;
65	return 0;
66}
67
68static void
69snf_platform_cleanup(pcap_t *p)
70{
71	struct pcap_snf *ps = p->priv;
72
73#ifdef SNF_HAVE_INJECT_API
74	if (ps->snf_inj)
75		snf_inject_close(ps->snf_inj);
76#endif
77	snf_ring_close(ps->snf_ring);
78	snf_close(ps->snf_handle);
79	pcap_cleanup_live_common(p);
80}
81
82static int
83snf_getnonblock(pcap_t *p)
84{
85	struct pcap_snf *ps = p->priv;
86
87	return (ps->snf_timeout == 0);
88}
89
90static int
91snf_setnonblock(pcap_t *p, int nonblock)
92{
93	struct pcap_snf *ps = p->priv;
94
95	if (nonblock)
96		ps->snf_timeout = 0;
97	else {
98		if (p->opt.timeout <= 0)
99			ps->snf_timeout = -1; /* forever */
100		else
101			ps->snf_timeout = p->opt.timeout;
102	}
103	return (0);
104}
105
106#define _NSEC_PER_SEC 1000000000
107
108static inline
109struct timeval
110snf_timestamp_to_timeval(const int64_t ts_nanosec, const int tstamp_precision)
111{
112	struct timeval tv;
113	long tv_nsec;
114        const static struct timeval zero_timeval;
115
116        if (ts_nanosec == 0)
117                return zero_timeval;
118
119	tv.tv_sec = ts_nanosec / _NSEC_PER_SEC;
120	tv_nsec = (ts_nanosec % _NSEC_PER_SEC);
121
122	/* libpcap expects tv_usec to be nanos if using nanosecond precision. */
123	if (tstamp_precision == PCAP_TSTAMP_PRECISION_NANO)
124		tv.tv_usec = tv_nsec;
125	else
126		tv.tv_usec = tv_nsec / 1000;
127
128	return tv;
129}
130
131static int
132snf_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user)
133{
134	struct pcap_snf *ps = p->priv;
135	struct pcap_pkthdr hdr;
136	int i, flags, err, caplen, n;
137	struct snf_recv_req req;
138	int nonblock, timeout;
139
140	if (!p)
141		return -1;
142
143	n = 0;
144	timeout = ps->snf_timeout;
145	while (n < cnt || PACKET_COUNT_IS_UNLIMITED(cnt)) {
146		/*
147		 * Has "pcap_breakloop()" been called?
148		 */
149		if (p->break_loop) {
150			if (n == 0) {
151				p->break_loop = 0;
152				return (-2);
153			} else {
154				return (n);
155			}
156		}
157
158		err = snf_ring_recv(ps->snf_ring, timeout, &req);
159
160		if (err) {
161			if (err == EBUSY || err == EAGAIN) {
162				return (n);
163			}
164			else if (err == EINTR) {
165				timeout = 0;
166				continue;
167			}
168			else {
169				pcap_fmt_errmsg_for_errno(p->errbuf,
170				    PCAP_ERRBUF_SIZE, err, "snf_read");
171				return -1;
172			}
173		}
174
175		caplen = req.length;
176		if (caplen > p->snapshot)
177			caplen = p->snapshot;
178
179		if ((p->fcode.bf_insns == NULL) ||
180		     bpf_filter(p->fcode.bf_insns, req.pkt_addr, req.length, caplen)) {
181			hdr.ts = snf_timestamp_to_timeval(req.timestamp, p->opt.tstamp_precision);
182			hdr.caplen = caplen;
183			hdr.len = req.length;
184			callback(user, &hdr, req.pkt_addr);
185			n++;
186		}
187
188		/* After one successful packet is received, we won't block
189		* again for that timeout. */
190		if (timeout != 0)
191			timeout = 0;
192	}
193	return (n);
194}
195
196static int
197snf_setfilter(pcap_t *p, struct bpf_program *fp)
198{
199	if (!p)
200		return -1;
201	if (!fp) {
202		strncpy(p->errbuf, "setfilter: No filter specified",
203			sizeof(p->errbuf));
204		return -1;
205	}
206
207	/* Make our private copy of the filter */
208
209	if (install_bpf_program(p, fp) < 0)
210		return -1;
211
212	return (0);
213}
214
215static int
216snf_inject(pcap_t *p, const void *buf _U_, size_t size _U_)
217{
218#ifdef SNF_HAVE_INJECT_API
219	struct pcap_snf *ps = p->priv;
220	int rc;
221	if (ps->snf_inj == NULL) {
222		rc = snf_inject_open(ps->snf_boardnum, 0, &ps->snf_inj);
223		if (rc) {
224			pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
225			    rc, "snf_inject_open");
226			return (-1);
227		}
228	}
229
230	rc = snf_inject_send(ps->snf_inj, -1, 0, buf, size);
231	if (!rc) {
232		return (size);
233	}
234	else {
235		pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
236		    rc, "snf_inject_send");
237		return (-1);
238	}
239#else
240	pcap_strlcpy(p->errbuf, "Sending packets isn't supported with this snf version",
241	    PCAP_ERRBUF_SIZE);
242	return (-1);
243#endif
244}
245
246static int
247snf_activate(pcap_t* p)
248{
249	struct pcap_snf *ps = p->priv;
250	char *device = p->opt.device;
251	const char *nr = NULL;
252	int err;
253	int flags = -1, ring_id = -1;
254
255	if (device == NULL) {
256		pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "device is NULL");
257		return -1;
258	}
259
260	/* In Libpcap, we set pshared by default if NUM_RINGS is set to > 1.
261	 * Since libpcap isn't thread-safe */
262	if ((nr = getenv("SNF_FLAGS")) && *nr)
263		flags = strtol(nr, NULL, 0);
264	else if ((nr = getenv("SNF_NUM_RINGS")) && *nr && atoi(nr) > 1)
265		flags = SNF_F_PSHARED;
266	else
267		nr = NULL;
268
269
270        /* Allow pcap_set_buffer_size() to set dataring_size.
271         * Default is zero which allows setting from env SNF_DATARING_SIZE.
272         * pcap_set_buffer_size() is in bytes while snf_open() accepts values
273         * between 0 and 1048576 in Megabytes. Values in this range are
274         * mapped to 1MB.
275         */
276	err = snf_open(ps->snf_boardnum,
277			0, /* let SNF API parse SNF_NUM_RINGS, if set */
278			NULL, /* default RSS, or use SNF_RSS_FLAGS env */
279                        (p->opt.buffer_size > 0 && p->opt.buffer_size < 1048576) ? 1048576 : p->opt.buffer_size, /* default to SNF_DATARING_SIZE from env */
280			flags, /* may want pshared */
281			&ps->snf_handle);
282	if (err != 0) {
283		pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
284		    err, "snf_open failed");
285		return -1;
286	}
287
288	if ((nr = getenv("SNF_PCAP_RING_ID")) && *nr) {
289		ring_id = (int) strtol(nr, NULL, 0);
290	}
291	err = snf_ring_open_id(ps->snf_handle, ring_id, &ps->snf_ring);
292	if (err != 0) {
293		pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
294		    err, "snf_ring_open_id(ring=%d) failed", ring_id);
295		return -1;
296	}
297
298	/*
299	 * Turn a negative snapshot value (invalid), a snapshot value of
300	 * 0 (unspecified), or a value bigger than the normal maximum
301	 * value, into the maximum allowed value.
302	 *
303	 * If some application really *needs* a bigger snapshot
304	 * length, we should just increase MAXIMUM_SNAPLEN.
305	 */
306	if (p->snapshot <= 0 || p->snapshot > MAXIMUM_SNAPLEN)
307		p->snapshot = MAXIMUM_SNAPLEN;
308
309	if (p->opt.timeout <= 0)
310		ps->snf_timeout = -1;
311	else
312		ps->snf_timeout = p->opt.timeout;
313
314	err = snf_start(ps->snf_handle);
315	if (err != 0) {
316		pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
317		    err, "snf_start failed");
318		return -1;
319	}
320
321	/*
322	 * "select()" and "poll()" don't work on snf descriptors.
323	 */
324#ifndef _WIN32
325	p->selectable_fd = -1;
326#endif /* !_WIN32 */
327	p->linktype = DLT_EN10MB;
328	p->read_op = snf_read;
329	p->inject_op = snf_inject;
330	p->setfilter_op = snf_setfilter;
331	p->setdirection_op = NULL; /* Not implemented.*/
332	p->set_datalink_op = snf_set_datalink;
333	p->getnonblock_op = snf_getnonblock;
334	p->setnonblock_op = snf_setnonblock;
335	p->stats_op = snf_pcap_stats;
336	p->cleanup_op = snf_platform_cleanup;
337#ifdef SNF_HAVE_INJECT_API
338	ps->snf_inj = NULL;
339#endif
340	return 0;
341}
342
343#define MAX_DESC_LENGTH 128
344int
345snf_findalldevs(pcap_if_list_t *devlistp, char *errbuf)
346{
347	pcap_if_t *dev;
348#ifdef _WIN32
349	struct sockaddr_in addr;
350#endif
351	struct snf_ifaddrs *ifaddrs, *ifa;
352	char name[MAX_DESC_LENGTH];
353	char desc[MAX_DESC_LENGTH];
354	int ret, allports = 0, merge = 0;
355	const char *nr = NULL;
356
357	if (snf_init(SNF_VERSION_API)) {
358		(void)pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE,
359		    "snf_getifaddrs: snf_init failed");
360		return (-1);
361	}
362
363	if (snf_getifaddrs(&ifaddrs) || ifaddrs == NULL)
364	{
365		pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
366		    errno, "snf_getifaddrs");
367		return (-1);
368	}
369	if ((nr = getenv("SNF_FLAGS")) && *nr) {
370		errno = 0;
371		merge = strtol(nr, NULL, 0);
372		if (errno) {
373			(void)pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE,
374				"snf_getifaddrs: SNF_FLAGS is not a valid number");
375			return (-1);
376		}
377		merge = merge & SNF_F_AGGREGATE_PORTMASK;
378	}
379
380	for (ifa = ifaddrs; ifa != NULL; ifa = ifa->snf_ifa_next) {
381		/*
382		 * Myricom SNF adapter ports may appear as regular
383		 * network interfaces, which would already have been
384		 * added to the list of adapters by pcap_platform_finddevs()
385		 * if this isn't an SNF-only version of libpcap.
386		 *
387		 * Our create routine intercepts pcap_create() calls for
388		 * those interfaces and arranges that they will be
389		 * opened using the SNF API instead.
390		 *
391		 * So if we already have an entry for the device, we
392		 * don't add an additional entry for it, we just
393		 * update the description for it, if any, to indicate
394		 * which snfN device it is.  Otherwise, we add an entry
395		 * for it.
396		 *
397		 * In either case, if SNF_F_AGGREGATE_PORTMASK is set
398		 * in SNF_FLAGS, we add this port to the bitmask
399		 * of ports, which we use to generate a device
400		 * we can use to capture on all ports.
401		 *
402		 * Generate the description string.  If port aggregation
403		 * is set, use 2^{port number} as the unit number,
404		 * rather than {port number}.
405		 *
406		 * XXX - do entries in this list have IP addresses for
407		 * the port?  If so, should we add them to the
408		 * entry for the device, if they're not already in the
409		 * list of IP addresses for the device?
410 		 */
411		(void)pcap_snprintf(desc,MAX_DESC_LENGTH,"Myricom %ssnf%d",
412			merge ? "Merge Bitmask Port " : "",
413			merge ? 1 << ifa->snf_ifa_portnum : ifa->snf_ifa_portnum);
414		/*
415		 * Add the port to the bitmask.
416		 */
417		if (merge)
418			allports |= 1 << ifa->snf_ifa_portnum;
419		/*
420		 * See if there's already an entry for the device
421		 * with the name ifa->snf_ifa_name.
422		 */
423		dev = find_dev(devlistp, ifa->snf_ifa_name);
424		if (dev != NULL) {
425			/*
426			 * Yes.  Update its description.
427			 */
428			char *desc_str;
429
430			desc_str = strdup(desc);
431			if (desc_str == NULL) {
432				pcap_fmt_errmsg_for_errno(errbuf,
433				    PCAP_ERRBUF_SIZE, errno,
434				    "snf_findalldevs strdup");
435				return -1;
436			}
437			free(dev->description);
438			dev->description = desc_str;
439		} else {
440			/*
441			 * No.  Add an entry for it.
442			 *
443			 * XXX - is there a notion of "up" or "running",
444			 * and can we determine whether something's
445			 * plugged into the adapter and set
446			 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
447			 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
448			 */
449			dev = add_dev(devlistp, ifa->snf_ifa_name, 0, desc,
450			    errbuf);
451			if (dev == NULL)
452				return -1;
453#ifdef _WIN32
454			/*
455			 * On Windows, fill in IP# from device name
456			 */
457                        ret = inet_pton(AF_INET, dev->name, &addr.sin_addr);
458                        if (ret == 1) {
459                        	/*
460                        	 * Successful conversion of device name
461                        	 * to IPv4 address.
462                        	 */
463	                        addr.sin_family = AF_INET;
464        	                if (add_addr_to_dev(dev, &addr, sizeof(addr),
465                	            NULL, 0, NULL, 0, NULL, 0, errbuf) == -1)
466                        		return -1;
467                        } else if (ret == -1) {
468				/*
469				 * Error.
470				 */
471				pcap_fmt_errmsg_for_errno(errbuf,
472				    PCAP_ERRBUF_SIZE, errno,
473				    "sinf_findalldevs inet_pton");
474                                return -1;
475                        }
476#endif _WIN32
477		}
478	}
479	snf_freeifaddrs(ifaddrs);
480	/*
481	 * Create a snfX entry if port aggregation is enabled
482       	 */
483	if (merge) {
484		/*
485		 * Add a new entry with all ports bitmask
486		 */
487		(void)pcap_snprintf(name,MAX_DESC_LENGTH,"snf%d",allports);
488		(void)pcap_snprintf(desc,MAX_DESC_LENGTH,"Myricom Merge Bitmask All Ports snf%d",
489			allports);
490		/*
491		 * XXX - is there any notion of "up" and "running" that
492		 * would apply to this device, given that it handles
493		 * multiple ports?
494		 *
495		 * Presumably, there's no notion of "connected" vs.
496		 * "disconnected", as "is this plugged into a network?"
497		 * would be a per-port property.
498		 */
499		if (add_dev(devlistp, name,
500		    PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE, desc,
501		    errbuf) == NULL)
502			return (-1);
503		/*
504		 * XXX - should we give it a list of addresses with all
505		 * the addresses for all the ports?
506		 */
507	}
508
509	return 0;
510}
511
512pcap_t *
513snf_create(const char *device, char *ebuf, int *is_ours)
514{
515	pcap_t *p;
516	int boardnum = -1;
517	struct snf_ifaddrs *ifaddrs, *ifa;
518	size_t devlen;
519	struct pcap_snf *ps;
520
521	if (snf_init(SNF_VERSION_API)) {
522		/* Can't initialize the API, so no SNF devices */
523		*is_ours = 0;
524		return NULL;
525	}
526
527	/*
528	 * Match a given interface name to our list of interface names, from
529	 * which we can obtain the intended board number
530	 */
531	if (snf_getifaddrs(&ifaddrs) || ifaddrs == NULL) {
532		/* Can't get SNF addresses */
533		*is_ours = 0;
534		return NULL;
535	}
536	devlen = strlen(device) + 1;
537	ifa = ifaddrs;
538	while (ifa) {
539		if (strncmp(device, ifa->snf_ifa_name, devlen) == 0) {
540			boardnum = ifa->snf_ifa_boardnum;
541			break;
542		}
543		ifa = ifa->snf_ifa_next;
544	}
545	snf_freeifaddrs(ifaddrs);
546
547	if (ifa == NULL) {
548		/*
549		 * If we can't find the device by name, support the name "snfX"
550		 * and "snf10gX" where X is the board number.
551		 */
552		if (sscanf(device, "snf10g%d", &boardnum) != 1 &&
553		    sscanf(device, "snf%d", &boardnum) != 1) {
554			/* Nope, not a supported name */
555			*is_ours = 0;
556			return NULL;
557		}
558	}
559
560	/* OK, it's probably ours. */
561	*is_ours = 1;
562
563	p = pcap_create_common(ebuf, sizeof (struct pcap_snf));
564	if (p == NULL)
565		return NULL;
566	ps = p->priv;
567
568	/*
569	 * We support microsecond and nanosecond time stamps.
570	 */
571	p->tstamp_precision_count = 2;
572	p->tstamp_precision_list = malloc(2 * sizeof(u_int));
573	if (p->tstamp_precision_list == NULL) {
574		pcap_fmt_errmsg_for_errno(ebuf, PCAP_ERRBUF_SIZE, errno,
575		    "malloc");
576		pcap_close(p);
577		return NULL;
578	}
579	p->tstamp_precision_list[0] = PCAP_TSTAMP_PRECISION_MICRO;
580	p->tstamp_precision_list[1] = PCAP_TSTAMP_PRECISION_NANO;
581
582	p->activate_op = snf_activate;
583	ps->snf_boardnum = boardnum;
584	return p;
585}
586
587#ifdef SNF_ONLY
588/*
589 * This libpcap build supports only SNF cards, not regular network
590 * interfaces..
591 */
592
593/*
594 * There are no regular interfaces, just SNF interfaces.
595 */
596int
597pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf)
598{
599	return (0);
600}
601
602/*
603 * Attempts to open a regular interface fail.
604 */
605pcap_t *
606pcap_create_interface(const char *device, char *errbuf)
607{
608	pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE,
609	    "This version of libpcap only supports SNF cards");
610	return NULL;
611}
612
613/*
614 * Libpcap version string.
615 */
616const char *
617pcap_lib_version(void)
618{
619	return (PCAP_VERSION_STRING " (SNF-only)");
620}
621#endif
622