Home | History | Annotate | Download | only in libpcap
      1 /*
      2  * pcap-septel.c: Packet capture interface for Intel/Septel card.
      3  *
      4  * The functionality of this code attempts to mimic that of pcap-linux as much
      5  * as possible.  This code is compiled in several different ways depending on
      6  * whether SEPTEL_ONLY and HAVE_SEPTEL_API are defined.  If HAVE_SEPTEL_API is
      7  * not defined it should not get compiled in, otherwise if SEPTEL_ONLY is
      8  * defined then the 'septel_' function calls are renamed to 'pcap_'
      9  * equivalents.  If SEPTEL_ONLY is not defined then nothing is altered - the
     10  * septel_ functions will be called as required from their
     11  * pcap-linux/equivalents.
     12  *
     13  * Authors: Gilbert HOYEK (gil_hoyek (at) hotmail.com), Elias M. KHOURY
     14  * (+961 3 485243)
     15  */
     16 
     17 #ifndef lint
     18 static const char rcsid[] _U_ =
     19     "@(#) $Header: /tcpdump/master/libpcap/pcap-septel.c,v 1.4 2008-04-14 20:40:58 guy Exp $";
     20 #endif
     21 
     22 #ifdef HAVE_CONFIG_H
     23 #include "config.h"
     24 #endif
     25 
     26 #include <sys/param.h>
     27 
     28 #include <stdlib.h>
     29 #include <string.h>
     30 #include <errno.h>
     31 
     32 #include "pcap-int.h"
     33 
     34 #include <ctype.h>
     35 #include <netinet/in.h>
     36 #include <sys/mman.h>
     37 #include <sys/socket.h>
     38 #include <sys/types.h>
     39 #include <unistd.h>
     40 
     41 #include <msg.h>
     42 #include <ss7_inc.h>
     43 #include <sysgct.h>
     44 #include <pack.h>
     45 #include <system.h>
     46 
     47 #include "pcap-septel.h"
     48 
     49 static int septel_setfilter(pcap_t *p, struct bpf_program *fp);
     50 static int septel_stats(pcap_t *p, struct pcap_stat *ps);
     51 static int septel_setnonblock(pcap_t *p, int nonblock, char *errbuf);
     52 
     53 /*
     54  * Private data for capturing on Septel devices.
     55  */
     56 struct pcap_septel {
     57 	struct pcap_stat stat;
     58 }
     59 
     60 /*
     61  *  Read at most max_packets from the capture queue and call the callback
     62  *  for each of them. Returns the number of packets handled, -1 if an
     63  *  error occured, or -2 if we were told to break out of the loop.
     64  */
     65 static int septel_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) {
     66 
     67   struct pcap_septel *ps = p->priv;
     68   HDR *h;
     69   MSG *m;
     70   int processed = 0 ;
     71   int t = 0 ;
     72 
     73   /* identifier for the message queue of the module(upe) from which we are capturing
     74    * packets.These IDs are defined in system.txt . By default it is set to 0x2d
     75    * so change it to 0xdd for technical reason and therefore the module id for upe becomes:
     76    * LOCAL        0xdd           * upe - Example user part task */
     77   unsigned int id = 0xdd;
     78 
     79   /* process the packets */
     80   do  {
     81 
     82     unsigned short packet_len = 0;
     83     int caplen = 0;
     84     int counter = 0;
     85     struct pcap_pkthdr   pcap_header;
     86     u_char *dp ;
     87 
     88     /*
     89      * Has "pcap_breakloop()" been called?
     90      */
     91 loop:
     92     if (p->break_loop) {
     93       /*
     94        * Yes - clear the flag that indicates that
     95        * it has, and return -2 to indicate that
     96        * we were told to break out of the loop.
     97        */
     98       p->break_loop = 0;
     99       return -2;
    100     }
    101 
    102     /*repeat until a packet is read
    103      *a NULL message means :
    104      * when no packet is in queue or all packets in queue already read */
    105     do  {
    106       /* receive packet in non-blocking mode
    107        * GCT_grab is defined in the septel library software */
    108       h = GCT_grab(id);
    109 
    110       m = (MSG*)h;
    111       /* a couter is added here to avoid an infinite loop
    112        * that will cause our capture program GUI to freeze while waiting
    113        * for a packet*/
    114       counter++ ;
    115 
    116     }
    117     while  ((m == NULL)&& (counter< 100)) ;
    118 
    119     if (m != NULL) {
    120 
    121       t = h->type ;
    122 
    123       /* catch only messages with type = 0xcf00 or 0x8f01 corrsponding to ss7 messages*/
    124       /* XXX = why not use API_MSG_TX_REQ for 0xcf00 and API_MSG_RX_IND
    125        * for 0x8f01? */
    126       if ((t != 0xcf00) && (t != 0x8f01)) {
    127         relm(h);
    128         goto loop ;
    129       }
    130 
    131       /* XXX - is API_MSG_RX_IND for an MTP2 or MTP3 message? */
    132       dp = get_param(m);/* get pointer to MSG parameter area (m->param) */
    133       packet_len = m->len;
    134       caplen =  p->snapshot ;
    135 
    136 
    137       if (caplen > packet_len) {
    138 
    139         caplen = packet_len;
    140       }
    141       /* Run the packet filter if there is one. */
    142       if ((p->fcode.bf_insns == NULL) || bpf_filter(p->fcode.bf_insns, dp, packet_len, caplen)) {
    143 
    144 
    145         /*  get a time stamp , consisting of :
    146          *
    147          *  pcap_header.ts.tv_sec:
    148          *  ----------------------
    149          *   a UNIX format time-in-seconds when he packet was captured,
    150          *   i.e. the number of seconds since Epoch time (January 1,1970, 00:00:00 GMT)
    151          *
    152          *  pcap_header.ts.tv_usec :
    153          *  ------------------------
    154          *   the number of microseconds since that second
    155          *   when the packet was captured
    156          */
    157 
    158         (void)gettimeofday(&pcap_header.ts, NULL);
    159 
    160         /* Fill in our own header data */
    161         pcap_header.caplen = caplen;
    162         pcap_header.len = packet_len;
    163 
    164         /* Count the packet. */
    165         ps->stat.ps_recv++;
    166 
    167         /* Call the user supplied callback function */
    168         callback(user, &pcap_header, dp);
    169 
    170         processed++ ;
    171 
    172       }
    173       /* after being processed the packet must be
    174        *released in order to receive another one */
    175       relm(h);
    176     }else
    177       processed++;
    178 
    179   }
    180   while (processed < cnt) ;
    181 
    182   return processed ;
    183 }
    184 
    185 
    186 static int
    187 septel_inject(pcap_t *handle, const void *buf _U_, size_t size _U_)
    188 {
    189   strlcpy(handle->errbuf, "Sending packets isn't supported on Septel cards",
    190           PCAP_ERRBUF_SIZE);
    191   return (-1);
    192 }
    193 
    194 /*
    195  *  Activate a handle for a live capture from the given Septel device.  Always pass a NULL device
    196  *  The promisc flag is ignored because Septel cards have built-in tracing.
    197  *  The timeout is also ignored as it is not supported in hardware.
    198  *
    199  *  See also pcap(3).
    200  */
    201 static pcap_t *septel_activate(pcap_t* handle) {
    202   /* Initialize some components of the pcap structure. */
    203   handle->linktype = DLT_MTP2;
    204 
    205   handle->bufsize = 0;
    206 
    207   /*
    208    * "select()" and "poll()" don't work on Septel queues
    209    */
    210   handle->selectable_fd = -1;
    211 
    212   handle->read_op = septel_read;
    213   handle->inject_op = septel_inject;
    214   handle->setfilter_op = septel_setfilter;
    215   handle->set_datalink_op = NULL; /* can't change data link type */
    216   handle->getnonblock_op = pcap_getnonblock_fd;
    217   handle->setnonblock_op = septel_setnonblock;
    218   handle->stats_op = septel_stats;
    219 
    220   return 0;
    221 }
    222 
    223 pcap_t *septel_create(const char *device, char *ebuf, int *is_ours) {
    224 	const char *cp;
    225 	pcap_t *p;
    226 
    227 	/* Does this look like the Septel device? */
    228 	cp = strrchr(device, '/');
    229 	if (cp == NULL)
    230 		cp = device;
    231 	if (strcmp(cp, "septel") != 0) {
    232 		/* Nope, it's not "septel" */
    233 		*is_ours = 0;
    234 		return NULL;
    235 	}
    236 
    237 	/* OK, it's probably ours. */
    238 	*is_ours = 1;
    239 
    240 	p = pcap_create_common(device, ebuf, sizeof (struct pcap_septel));
    241 	if (p == NULL)
    242 		return NULL;
    243 
    244 	p->activate_op = septel_activate;
    245 	return p;
    246 }
    247 
    248 static int septel_stats(pcap_t *p, struct pcap_stat *ps) {
    249   struct pcap_septel *handlep = p->priv;
    250   /*handlep->stat.ps_recv = 0;*/
    251   /*handlep->stat.ps_drop = 0;*/
    252 
    253   *ps = handlep->stat;
    254 
    255   return 0;
    256 }
    257 
    258 
    259 int
    260 septel_findalldevs(pcap_if_t **devlistp, char *errbuf)
    261 {
    262 unsigned char *p;
    263   const char description[512]= "Intel/Septel device";
    264   char name[512]="septel" ;
    265   int ret = 0;
    266   pcap_add_if(devlistp,name,0,description,errbuf);
    267 
    268   return (ret);
    269 }
    270 
    271 
    272 /*
    273  * Installs the given bpf filter program in the given pcap structure.  There is
    274  * no attempt to store the filter in kernel memory as that is not supported
    275  * with Septel cards.
    276  */
    277 static int septel_setfilter(pcap_t *p, struct bpf_program *fp) {
    278   if (!p)
    279     return -1;
    280   if (!fp) {
    281     strncpy(p->errbuf, "setfilter: No filter specified",
    282 	    sizeof(p->errbuf));
    283     return -1;
    284   }
    285 
    286   /* Make our private copy of the filter */
    287 
    288   if (install_bpf_program(p, fp) < 0) {
    289     snprintf(p->errbuf, sizeof(p->errbuf),
    290 	     "malloc: %s", pcap_strerror(errno));
    291     return -1;
    292   }
    293 
    294   return (0);
    295 }
    296 
    297 
    298 static int
    299 septel_setnonblock(pcap_t *p, int nonblock, char *errbuf)
    300 {
    301   fprintf(errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices");
    302   return (-1);
    303 }
    304