2 * This code is derived from code formerly in pcap-dlpi.c, originally
3 * contributed by Atanu Ghosh (atanu@cs.ucl.ac.uk), University College
4 * London, and subsequently modified by Guy Harris (guy@alum.mit.edu),
5 * Mark Pizzolato <List-tcpdump-workers@subscriptions.pizzolato.net>,
6 * Mark C. Brown (mbrown@hp.com), and Sagun Shakya <Sagun.Shakya@Sun.COM>.
10 * This file contains dlpi/libdlpi related common functions used
11 * by pcap-[dlpi,libdlpi].c.
19 #define DL_IPATM 0x12 /* ATM Classical IP interface */
22 #ifdef HAVE_SYS_BUFMOD_H
24 * Size of a bufmod chunk to pass upstream; that appears to be the
25 * biggest value to which you can set it, and setting it to that value
26 * (which is bigger than what appears to be the Solaris default of 8192)
27 * reduces the number of packet drops.
29 #define CHUNKSIZE 65536
32 * Size of the buffer to allocate for packet data we read; it must be
33 * large enough to hold a chunk.
35 #define PKTBUFSIZE CHUNKSIZE
37 #else /* HAVE_SYS_BUFMOD_H */
40 * Size of the buffer to allocate for packet data we read; this is
41 * what the value used to be - there's no particular reason why it
42 * should be tied to MAXDLBUF, but we'll leave it as this for now.
45 #define PKTBUFSIZE (MAXDLBUF * sizeof(bpf_u_int32))
49 #include <sys/types.h>
51 #ifdef HAVE_SYS_BUFMOD_H
52 #include <sys/bufmod.h>
55 #include <sys/stream.h>
72 #ifdef HAVE_SYS_BUFMOD_H
73 static void pcap_stream_err(const char *, int, char *);
77 * Get the packet statistics.
80 pcap_stats_dlpi(pcap_t
*p
, struct pcap_stat
*ps
)
82 struct pcap_dlpi
*pd
= p
->priv
;
85 * "ps_recv" counts packets handed to the filter, not packets
86 * that passed the filter. As filtering is done in userland,
87 * this would not include packets dropped because we ran out
88 * of buffer space; in order to make this more like other
89 * platforms (Linux 2.4 and later, BSDs with BPF), where the
90 * "packets received" count includes packets received but dropped
91 * due to running out of buffer space, and to keep from confusing
92 * applications that, for example, compute packet drop percentages,
93 * we also make it count packets dropped by "bufmod" (otherwise we
94 * might run the risk of the packet drop count being bigger than
95 * the received-packet count).
97 * "ps_drop" counts packets dropped by "bufmod" because of
98 * flow control requirements or resource exhaustion; it doesn't
99 * count packets dropped by the interface driver, or packets
100 * dropped upstream. As filtering is done in userland, it counts
101 * packets regardless of whether they would've passed the filter.
103 * These statistics don't include packets not yet read from
104 * the kernel by libpcap, but they may include packets not
105 * yet read from libpcap by the application.
110 * Add in the drop count, as per the above comment.
112 ps
->ps_recv
+= ps
->ps_drop
;
117 * Loop through the packets and call the callback for each packet.
118 * Return the number of packets read.
121 pcap_process_pkts(pcap_t
*p
, pcap_handler callback
, u_char
*user
,
122 int count
, u_char
*bufp
, int len
)
124 struct pcap_dlpi
*pd
= p
->priv
;
125 int n
, caplen
, origlen
;
127 struct pcap_pkthdr pkthdr
;
128 #ifdef HAVE_SYS_BUFMOD_H
135 /* Loop through packets */
139 #ifdef HAVE_SYS_BUFMOD_H
142 * Has "pcap_breakloop()" been called?
143 * If so, return immediately - if we haven't read any
144 * packets, clear the flag and return -2 to indicate
145 * that we were told to break out of the loop, otherwise
146 * leave the flag set, so that the *next* call will break
147 * out of the loop without having read any packets, and
148 * return the number of packets we've processed so far.
161 if ((long)bufp
& 3) {
163 memcpy(sbp
, bufp
, sizeof(*sbp
));
166 sbp
= (struct sb_hdr
*)bufp
;
167 pd
->stat
.ps_drop
= sbp
->sbh_drops
;
168 pk
= bufp
+ sizeof(*sbp
);
169 bufp
+= sbp
->sbh_totlen
;
170 origlen
= sbp
->sbh_origlen
;
171 caplen
= sbp
->sbh_msglen
;
174 caplen
= min(p
->snapshot
, len
);
179 if (bpf_filter(p
->fcode
.bf_insns
, pk
, origlen
, caplen
)) {
180 #ifdef HAVE_SYS_BUFMOD_H
181 pkthdr
.ts
.tv_sec
= sbp
->sbh_timestamp
.tv_sec
;
182 pkthdr
.ts
.tv_usec
= sbp
->sbh_timestamp
.tv_usec
;
184 (void) gettimeofday(&pkthdr
.ts
, NULL
);
186 pkthdr
.len
= origlen
;
187 pkthdr
.caplen
= caplen
;
188 /* Insure caplen does not exceed snapshot */
189 if (pkthdr
.caplen
> p
->snapshot
)
190 pkthdr
.caplen
= p
->snapshot
;
191 (*callback
)(user
, &pkthdr
, pk
);
192 if (++n
>= count
&& !PACKET_COUNT_IS_UNLIMITED(count
)) {
198 #ifdef HAVE_SYS_BUFMOD_H
206 * Process the mac type. Returns -1 if no matching mac type found, otherwise 0.
209 pcap_process_mactype(pcap_t
*p
, u_int mactype
)
217 p
->linktype
= DLT_EN10MB
;
220 * This is (presumably) a real Ethernet capture; give it a
221 * link-layer-type list with DLT_EN10MB and DLT_DOCSIS, so
222 * that an application can let you choose it, in case you're
223 * capturing DOCSIS traffic that a Cisco Cable Modem
224 * Termination System is putting out onto an Ethernet (it
225 * doesn't put an Ethernet header onto the wire, it puts raw
226 * DOCSIS frames out on the wire inside the low-level
229 p
->dlt_list
= (u_int
*)malloc(sizeof(u_int
) * 2);
231 * If that fails, just leave the list empty.
233 if (p
->dlt_list
!= NULL
) {
234 p
->dlt_list
[0] = DLT_EN10MB
;
235 p
->dlt_list
[1] = DLT_DOCSIS
;
241 p
->linktype
= DLT_FDDI
;
246 /* XXX - what about DL_TPB? Is that Token Bus? */
247 p
->linktype
= DLT_IEEE802
;
253 p
->linktype
= DLT_SUNATM
;
254 p
->offset
= 0; /* works for LANE and LLC encapsulation */
259 snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
, "unknown mactype %u",
267 #ifdef HAVE_SYS_BUFMOD_H
269 * Push and configure the buffer module. Returns -1 for error, otherwise 0.
272 pcap_conf_bufmod(pcap_t
*p
, int snaplen
)
275 bpf_u_int32 ss
, chunksize
;
277 /* Non-standard call to get the data nicely buffered. */
278 if (ioctl(p
->fd
, I_PUSH
, "bufmod") != 0) {
279 pcap_stream_err("I_PUSH bufmod", errno
, p
->errbuf
);
285 strioctl(p
->fd
, SBIOCSSNAP
, sizeof(ss
), (char *)&ss
) != 0) {
286 pcap_stream_err("SBIOCSSNAP", errno
, p
->errbuf
);
290 if (p
->opt
.immediate
) {
291 /* Set the timeout to zero, for immediate delivery. */
294 if (strioctl(p
->fd
, SBIOCSTIME
, sizeof(to
), (char *)&to
) != 0) {
295 pcap_stream_err("SBIOCSTIME", errno
, p
->errbuf
);
299 /* Set up the bufmod timeout. */
300 if (p
->opt
.timeout
!= 0) {
301 to
.tv_sec
= p
->opt
.timeout
/ 1000;
302 to
.tv_usec
= (p
->opt
.timeout
* 1000) % 1000000;
303 if (strioctl(p
->fd
, SBIOCSTIME
, sizeof(to
), (char *)&to
) != 0) {
304 pcap_stream_err("SBIOCSTIME", errno
, p
->errbuf
);
309 /* Set the chunk length. */
310 chunksize
= CHUNKSIZE
;
311 if (strioctl(p
->fd
, SBIOCSCHUNK
, sizeof(chunksize
), (char *)&chunksize
)
313 pcap_stream_err("SBIOCSCHUNKP", errno
, p
->errbuf
);
320 #endif /* HAVE_SYS_BUFMOD_H */
323 * Allocate data buffer. Returns -1 if memory allocation fails, else 0.
326 pcap_alloc_databuf(pcap_t
*p
)
328 p
->bufsize
= PKTBUFSIZE
;
329 p
->buffer
= (u_char
*)malloc(p
->bufsize
+ p
->offset
);
330 if (p
->buffer
== NULL
) {
331 strlcpy(p
->errbuf
, pcap_strerror(errno
), PCAP_ERRBUF_SIZE
);
339 * Issue a STREAMS I_STR ioctl. Returns -1 on error, otherwise
340 * length of returned data on success.
343 strioctl(int fd
, int cmd
, int len
, char *dp
)
352 if ((retv
= ioctl(fd
, I_STR
, &str
)) < 0)
358 #ifdef HAVE_SYS_BUFMOD_H
360 * Write stream error message to errbuf.
363 pcap_stream_err(const char *func
, int err
, char *errbuf
)
365 snprintf(errbuf
, PCAP_ERRBUF_SIZE
, "%s: %s", func
, pcap_strerror(err
));