blob: 09bd134bae0248b22e49e557117302b7e30cdd36 [file] [log] [blame] [raw]
/* sim_ether.c: OS-dependent network routines
------------------------------------------------------------------------------
Copyright (c) 2002-2007, David T. Hittner
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"),
to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of the author shall not be
used in advertising or otherwise to promote the sale, use or other dealings
in this Software without prior written authorization from the author.
------------------------------------------------------------------------------
This ethernet simulation is based on the PCAP and WinPcap packages.
PCAP/WinPcap was chosen as the basis for network code since it is the most
"universal" of the various network packages available. Using this style has
allowed rapid network development for the major SIMH platforms. Developing
a network package specifically for SIMH was rejected due to the time required;
the advantage would be a more easily compiled and integrated code set.
There are various problems associated with use of ethernet networking, which
would be true regardless of the network package used, since there are no
universally accepted networking methods. The most serious of these is getting
the proper networking package loaded onto the system, since most environments
do not come with the network interface packages loaded.
The second most serious network issue relates to security. The network
simulation needs to simulate operating system level functionality (packet
driving). However, the host network programming interfaces tend to operate at
the user level of functionality, so getting to the full functionality of
the network interface usually requires that the person executing the
network code be a privileged user of the host system. See the PCAP/WinPcap
documentation for the appropriate host platform if unprivileged use of
networking is needed - there may be known workarounds.
Define one of the two macros below to enable networking:
USE_NETWORK - Create statically linked network code
USE_SHARED - Create dynamically linked network code (_WIN32 only)
------------------------------------------------------------------------------
Supported/Tested Platforms:
Windows(NT,2K,XP,2K3) WinPcap V3.0+
Linux libpcap at least 0.9
OpenBSD,FreeBSD,NetBSD libpcap at least 0.9
MAC OS/X libpcap at least 0.9
Solaris Sparc libpcap at least 0.9
Solaris Intel libpcap at least 0.9
AIX ??
HP/UX ??
Compaq Tru64 Unix ??
VMS Alpha/Itanium VMS only, needs VMS libpcap
WinPcap is available from:
http://winpcap.polito.it/
libpcap for VMS is available from:
http://simh.trailing-edge.com/sources/vms-pcap.zip
libpcap for other Unix platforms is available at:
Current Version: http://www.tcpdump.org/daily/libpcap-current.tar.gz
Released Version: http://www.tcpdump.org/release/
Note: You can only use the released version if it is at least
version 0.9
We've gotten the tarball, unpacked, built and installed it with:
gzip -dc libpcap-current.tar.gz | tar xvf -
cd libpcap-directory-name
./configure
make
make install
Note: The "make install" step generally will have to be done as root.
This will install libpcap in /usr/local/lib and /usr/local/include
It is then important to make sure that you get the just installed
libpcap components referenced during your build. This is generally
achieved by invoking gcc with:
-isystem /usr/local/include -L /usr/local/lib
Note: Building for the platforms indicated above, with the indicated libpcap,
should automatically leverage the appropriate mechanisms contained here.
Things are structured so that it is likely to work for any other as yet
untested platform. If it works for you, please let the author know so we
can update the table above. If it doesn't work, then the following #define
variables can influence the operation on an untested platform.
USE_BPF - Determines if this code leverages a libpcap/WinPcap
provided bpf packet filtering facility. All tested
environments have bpf facilities that work the way we
need them to. However a new one might not. undefine
this variable to let this code do its own filtering.
USE_SETNONBLOCK - Specifies whether the libpcap environment's non-blocking
semantics are to be leveraged. This helps to manage the
varying behaviours of the kernel packet facilities
leveraged by libpcap.
USE_READER_THREAD - Specifies that packet reading should be done in the
context of a separate thread. The Posix threading
APIs are used. This option is less efficient than the
default non-threaded approach, but it exists since some
platforms don't want to work with nonblocking libpcap
semantics. OpenBSD and NetBSD either don't have pthread
APIs available, or they are too buggy to be useful.
Using the threaded approach may require special compile
and/or link time switches (i.e. -lpthread or -pthread,
etc.) Consult the documentation for your platform as
needed.
MUST_DO_SELECT - Specifies that when USE_READER_THREAD is active, that
select() should be used to determin when available
packets are ready for reading. Otherwise, we depend
on the libpcap/kernel packet timeout specified on
pcap_open_live. If USE_READER_THREAD is not set, then
MUST_DO_SELECT is irrelevant
NEED_PCAP_SENDPACKET
- Specifies that you are using an older version of libpcap
which doesn't provide a pcap_sendpacket API.
NOTE: Changing these defines is done in either sim_ether.h OR on the global
compiler command line which builds all of the modules included in a
simulator.
------------------------------------------------------------------------------
Modification history:
17-May-07 DTH Fixed non-ethernet device removal loop (from Naoki Hamada)
15-May-07 DTH Added dynamic loading of wpcap.dll;
Corrected exceed max index bug in ethX lookup
04-May-07 DTH Corrected failure to look up ethernet device names in
the registry on Windows XP x64
10-Jul-06 RMS Fixed linux conditionalization (from Chaskiel Grundman)
02-Jun-06 JDB Fixed compiler warning for incompatible sscanf parameter
15-Dec-05 DTH Patched eth_host_devices [remove non-ethernet devices]
(from Mark Pizzolato and Galen Tackett, 08-Jun-05)
Patched eth_open [tun fix](from Antal Ritter, 06-Oct-05)
30-Nov-05 DTH Added option to regenerate CRC on received packets; some
ethernet devices need to pass it on to the simulation, and by
the time libpcap/winpcap gets the packet, the host OS network
layer has already stripped CRC out of the packet
01-Dec-04 DTH Added Windows user-defined adapter names (from Timothe Litt)
25-Mar-04 MP Revised comments and minor #defines to deal with updated
libpcap which now provides pcap_sendpacket on all platforms.
04-Feb-04 MP Returned success/fail status from eth_write to support
determining if the current libpcap connection can successfully
write packets.
Added threaded approach to reading packets since
this works better on some platforms (solaris intel) than the
inconsistently implemented non-blocking read approach.
04-Feb-04 DTH Converted ETH_DEBUG to sim_debug
13-Jan-04 MP tested and fixed on OpenBSD, NetBS and FreeBSD.
09-Jan-04 MP removed the BIOCSHDRCMPLT ioctl() for OS/X
05-Jan-04 DTH Added eth_mac_scan
30-Dec-03 DTH Cleaned up queue routines, added no network support message
26-Dec-03 DTH Added ethernet show and queue functions from pdp11_xq
15-Dec-03 MP polished generic libpcap support.
05-Dec-03 DTH Genericized eth_devices() and #ifdefs
03-Dec-03 MP Added Solaris support
02-Dec-03 DTH Corrected decnet fix to use reflection counting
01-Dec-03 DTH Added BPF source filtering and reflection counting
28-Nov-03 DTH Rewrote eth_devices using universal pcap_findalldevs()
25-Nov-03 DTH Verified DECNET_FIX, reversed ifdef to mainstream code
19-Nov-03 MP Fixed BPF functionality on Linux/BSD.
17-Nov-03 DTH Added xBSD simplification
14-Nov-03 DTH Added #ifdef DECNET_FIX for problematic duplicate detection code
13-Nov-03 DTH Merged in __FreeBSD__ support
21-Oct-03 MP Added enriched packet dumping for debugging
20-Oct-03 MP Added support for multiple ethernet devices on VMS
20-Sep-03 Ankan Add VMS support (Alpha only)
29-Sep-03 MP Changed separator character in eth_fmt_mac to be ":" to
format ethernet addresses the way the BPF compile engine
wants to see them.
Added BPF support to filter packets
Added missing printf in eth_close
07-Jun-03 MP Added WIN32 support for DECNET duplicate address detection.
06-Jun-03 MP Fixed formatting of Ethernet Protocol Type in eth_packet_trace
30-May-03 DTH Changed WIN32 to _WIN32 for consistency
07-Mar-03 MP Fixed Linux implementation of PacketGetAdapterNames to also
work on Red Hat 6.2-sparc and Debian 3.0r1-sparc.
03-Mar-03 MP Changed logging to be consistent on stdout and sim_log
01-Feb-03 MP Changed type of local variables in eth_packet_trace to
conform to the interface needs of eth_mac_fmt wich produces
char data instead of unsigned char data. Suggested by the
DECC compiler.
15-Jan-03 DTH Corrected PacketGetAdapterNames parameter2 datatype
26-Dec-02 DTH Merged Mark Pizzolato's enhancements with main source
Added networking documentation
Changed _DEBUG to ETH_DEBUG
20-Dec-02 MP Added display of packet CRC to the eth_packet_trace.
This helps distinguish packets with identical lengths
and protocols.
05-Dec-02 MP With the goal of draining the input buffer more rapidly
changed eth_read to call pcap_dispatch repeatedly until
either a timeout returns nothing or a packet allowed by
the filter is seen. This more closely reflects how the
pcap layer will work when the filtering is actually done
by a bpf filter.
31-Oct-02 DTH Added USE_NETWORK conditional
Reworked not attached test
Added OpenBSD support (from Federico Schwindt)
Added ethX detection simplification (from Megan Gentry)
Removed sections of temporary code
Added parameter validation
23-Oct-02 DTH Beta 5 released
22-Oct-02 DTH Added all_multicast and promiscuous support
Fixed not attached behavior
21-Oct-02 DTH Added NetBSD support (from Jason Thorpe)
Patched buffer size to make sure entire packet is read in
Made 'ethX' check characters passed as well as length
Corrected copyright again
16-Oct-02 DTH Beta 4 released
Corrected copyright
09-Oct-02 DTH Beta 3 released
Added pdp11 write acceleration (from Patrick Caulfield)
08-Oct-02 DTH Beta 2 released
Integrated with 2.10-0p4
Added variable vector and copyrights
04-Oct-02 DTH Added linux support (from Patrick Caulfield)
03-Oct-02 DTH Beta version of xq/sim_ether released for SIMH 2.09-11
24-Sep-02 DTH Finished eth_devices, eth_getname
18-Sep-02 DTH Callbacks implemented
13-Sep-02 DTH Basic packet read/write written
20-Aug-02 DTH Created Sim_Ether for O/S independant ethernet implementation
------------------------------------------------------------------------------
*/
#include <ctype.h>
#include "sim_ether.h"
#include "sim_sock.h"
extern FILE *sim_log;
/*============================================================================*/
/* OS-independant ethernet routines */
/*============================================================================*/
t_stat eth_mac_scan (ETH_MAC* mac, char* strmac)
{
int i, j;
short unsigned int num;
char cptr[18];
int len = strlen(strmac);
const ETH_MAC zeros = {0,0,0,0,0,0};
const ETH_MAC ones = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
ETH_MAC newmac;
/* format of string must be 6 double-digit hex bytes with valid separators
ideally, this mac scanner could allow more flexible formatting later */
if (len != 17) return SCPE_ARG;
/* copy string to local storage for mangling */
strcpy(cptr, strmac);
/* make sure byte separators are OK */
for (i=2; i<len; i=i+3) {
if ((cptr[i] != '-') &&
(cptr[i] != '.') &&
(cptr[i] != ':')) return SCPE_ARG;
cptr[i] = '\0';
}
/* get and set address bytes */
for (i=0, j=0; i<len; i=i+3, j++) {
int valid = strspn(&cptr[i], "0123456789abcdefABCDEF");
if (valid < 2) return SCPE_ARG;
sscanf(&cptr[i], "%hx", &num);
newmac[j] = (unsigned char) num;
}
/* final check - mac cannot be broadcast or multicast address */
if (!memcmp(newmac, zeros, sizeof(ETH_MAC)) || /* broadcast */
!memcmp(newmac, ones, sizeof(ETH_MAC)) || /* broadcast */
(newmac[0] & 0x01) /* multicast */
)
return SCPE_ARG;
/* new mac is OK, copy into passed mac */
memcpy (*mac, newmac, sizeof(ETH_MAC));
return SCPE_OK;
}
void eth_mac_fmt(ETH_MAC* mac, char* buff)
{
uint8* m = (uint8*) mac;
sprintf(buff, "%02X:%02X:%02X:%02X:%02X:%02X", m[0], m[1], m[2], m[3], m[4], m[5]);
return;
}
static const uint32 crcTable[256] = {
0x00000000, 0x77073096, 0xEE0E612C, 0x990951BA, 0x076DC419, 0x706AF48F,
0xE963A535, 0x9E6495A3, 0x0EDB8832, 0x79DCB8A4, 0xE0D5E91E, 0x97D2D988,
0x09B64C2B, 0x7EB17CBD, 0xE7B82D07, 0x90BF1D91, 0x1DB71064, 0x6AB020F2,
0xF3B97148, 0x84BE41DE, 0x1ADAD47D, 0x6DDDE4EB, 0xF4D4B551, 0x83D385C7,
0x136C9856, 0x646BA8C0, 0xFD62F97A, 0x8A65C9EC, 0x14015C4F, 0x63066CD9,
0xFA0F3D63, 0x8D080DF5, 0x3B6E20C8, 0x4C69105E, 0xD56041E4, 0xA2677172,
0x3C03E4D1, 0x4B04D447, 0xD20D85FD, 0xA50AB56B, 0x35B5A8FA, 0x42B2986C,
0xDBBBC9D6, 0xACBCF940, 0x32D86CE3, 0x45DF5C75, 0xDCD60DCF, 0xABD13D59,
0x26D930AC, 0x51DE003A, 0xC8D75180, 0xBFD06116, 0x21B4F4B5, 0x56B3C423,
0xCFBA9599, 0xB8BDA50F, 0x2802B89E, 0x5F058808, 0xC60CD9B2, 0xB10BE924,
0x2F6F7C87, 0x58684C11, 0xC1611DAB, 0xB6662D3D, 0x76DC4190, 0x01DB7106,
0x98D220BC, 0xEFD5102A, 0x71B18589, 0x06B6B51F, 0x9FBFE4A5, 0xE8B8D433,
0x7807C9A2, 0x0F00F934, 0x9609A88E, 0xE10E9818, 0x7F6A0DBB, 0x086D3D2D,
0x91646C97, 0xE6635C01, 0x6B6B51F4, 0x1C6C6162, 0x856530D8, 0xF262004E,
0x6C0695ED, 0x1B01A57B, 0x8208F4C1, 0xF50FC457, 0x65B0D9C6, 0x12B7E950,
0x8BBEB8EA, 0xFCB9887C, 0x62DD1DDF, 0x15DA2D49, 0x8CD37CF3, 0xFBD44C65,
0x4DB26158, 0x3AB551CE, 0xA3BC0074, 0xD4BB30E2, 0x4ADFA541, 0x3DD895D7,
0xA4D1C46D, 0xD3D6F4FB, 0x4369E96A, 0x346ED9FC, 0xAD678846, 0xDA60B8D0,
0x44042D73, 0x33031DE5, 0xAA0A4C5F, 0xDD0D7CC9, 0x5005713C, 0x270241AA,
0xBE0B1010, 0xC90C2086, 0x5768B525, 0x206F85B3, 0xB966D409, 0xCE61E49F,
0x5EDEF90E, 0x29D9C998, 0xB0D09822, 0xC7D7A8B4, 0x59B33D17, 0x2EB40D81,
0xB7BD5C3B, 0xC0BA6CAD, 0xEDB88320, 0x9ABFB3B6, 0x03B6E20C, 0x74B1D29A,
0xEAD54739, 0x9DD277AF, 0x04DB2615, 0x73DC1683, 0xE3630B12, 0x94643B84,
0x0D6D6A3E, 0x7A6A5AA8, 0xE40ECF0B, 0x9309FF9D, 0x0A00AE27, 0x7D079EB1,
0xF00F9344, 0x8708A3D2, 0x1E01F268, 0x6906C2FE, 0xF762575D, 0x806567CB,
0x196C3671, 0x6E6B06E7, 0xFED41B76, 0x89D32BE0, 0x10DA7A5A, 0x67DD4ACC,
0xF9B9DF6F, 0x8EBEEFF9, 0x17B7BE43, 0x60B08ED5, 0xD6D6A3E8, 0xA1D1937E,
0x38D8C2C4, 0x4FDFF252, 0xD1BB67F1, 0xA6BC5767, 0x3FB506DD, 0x48B2364B,
0xD80D2BDA, 0xAF0A1B4C, 0x36034AF6, 0x41047A60, 0xDF60EFC3, 0xA867DF55,
0x316E8EEF, 0x4669BE79, 0xCB61B38C, 0xBC66831A, 0x256FD2A0, 0x5268E236,
0xCC0C7795, 0xBB0B4703, 0x220216B9, 0x5505262F, 0xC5BA3BBE, 0xB2BD0B28,
0x2BB45A92, 0x5CB36A04, 0xC2D7FFA7, 0xB5D0CF31, 0x2CD99E8B, 0x5BDEAE1D,
0x9B64C2B0, 0xEC63F226, 0x756AA39C, 0x026D930A, 0x9C0906A9, 0xEB0E363F,
0x72076785, 0x05005713, 0x95BF4A82, 0xE2B87A14, 0x7BB12BAE, 0x0CB61B38,
0x92D28E9B, 0xE5D5BE0D, 0x7CDCEFB7, 0x0BDBDF21, 0x86D3D2D4, 0xF1D4E242,
0x68DDB3F8, 0x1FDA836E, 0x81BE16CD, 0xF6B9265B, 0x6FB077E1, 0x18B74777,
0x88085AE6, 0xFF0F6A70, 0x66063BCA, 0x11010B5C, 0x8F659EFF, 0xF862AE69,
0x616BFFD3, 0x166CCF45, 0xA00AE278, 0xD70DD2EE, 0x4E048354, 0x3903B3C2,
0xA7672661, 0xD06016F7, 0x4969474D, 0x3E6E77DB, 0xAED16A4A, 0xD9D65ADC,
0x40DF0B66, 0x37D83BF0, 0xA9BCAE53, 0xDEBB9EC5, 0x47B2CF7F, 0x30B5FFE9,
0xBDBDF21C, 0xCABAC28A, 0x53B39330, 0x24B4A3A6, 0xBAD03605, 0xCDD70693,
0x54DE5729, 0x23D967BF, 0xB3667A2E, 0xC4614AB8, 0x5D681B02, 0x2A6F2B94,
0xB40BBE37, 0xC30C8EA1, 0x5A05DF1B, 0x2D02EF8D
};
uint32 eth_crc32(uint32 crc, const void* vbuf, size_t len)
{
const uint32 mask = 0xFFFFFFFF;
const unsigned char* buf = (const unsigned char*)vbuf;
crc ^= mask;
while (0 != len--)
crc = (crc >> 8) ^ crcTable[ (crc ^ (*buf++)) & 0xFF ];
return(crc ^ mask);
}
void eth_add_crc32(ETH_PACK* packet)
{
if (packet->len <= ETH_MAX_PACKET) {
uint32 crc = eth_crc32(0, packet->msg, packet->len); /* calculate CRC */
uint32 ncrc = htonl(crc); /* CRC in network order */
int size = sizeof(ncrc); /* size of crc field */
memcpy(&packet->msg[packet->len], &ncrc, size); /* append crc to packet */
packet->crc_len = packet->len + size; /* set packet crc length */
} else {
packet->crc_len = 0; /* appending crc would destroy packet */
}
}
void eth_setcrc(ETH_DEV* dev, int need_crc)
{
dev->need_crc = need_crc;
}
void eth_packet_trace_ex(ETH_DEV* dev, const uint8 *msg, int len, char* txt, int dmp)
{
if (dev->dptr->dctrl & dev->dbit) {
char src[20];
char dst[20];
unsigned short* proto = (unsigned short*) &msg[12];
uint32 crc = eth_crc32(0, msg, len);
eth_mac_fmt((ETH_MAC*)&msg[0], dst);
eth_mac_fmt((ETH_MAC*)&msg[6], src);
sim_debug(dev->dbit, dev->dptr, "%s dst: %s src: %s proto: 0x%04X len: %d crc: %X\n",
txt, dst, src, ntohs(*proto), len, crc);
if (dmp) {
int i, same, group, sidx, oidx;
char outbuf[80], strbuf[18];
static char hex[] = "0123456789ABCDEF";
for (i=same=0; i<len; i += 16) {
if ((i > 0) && (0 == memcmp(&msg[i], &msg[i-16], 16))) {
++same;
continue;
}
if (same > 0) {
sim_debug(dev->dbit, dev->dptr, "%04X thru %04X same as above\r\n", i-(16*same), i-1);
same = 0;
}
group = (((len - i) > 16) ? 16 : (len - i));
for (sidx=oidx=0; sidx<group; ++sidx) {
outbuf[oidx++] = ' ';
outbuf[oidx++] = hex[(msg[i+sidx]>>4)&0xf];
outbuf[oidx++] = hex[msg[i+sidx]&0xf];
if (isprint(msg[i+sidx]))
strbuf[sidx] = msg[i+sidx];
else
strbuf[sidx] = '.';
}
outbuf[oidx] = '\0';
strbuf[sidx] = '\0';
sim_debug(dev->dbit, dev->dptr, "%04X%-48s %s\r\n", i, outbuf, strbuf);
}
if (same > 0)
sim_debug(dev->dbit, dev->dptr, "%04X thru %04X same as above\r\n", i-(16*same), len-1);
}
}
}
void eth_packet_trace(ETH_DEV* dev, const uint8 *msg, int len, char* txt)
{
eth_packet_trace_ex(dev, msg, len, txt, 1/*len > ETH_MAX_PACKET*/);
}
char* eth_getname(int number, char* name)
{
ETH_LIST list[ETH_MAX_DEVICE];
int count = eth_devices(ETH_MAX_DEVICE, list);
if (count <= number) return 0;
strcpy(name, list[number].name);
return name;
}
char* eth_getname_bydesc(char* desc, char* name)
{
ETH_LIST list[ETH_MAX_DEVICE];
int count = eth_devices(ETH_MAX_DEVICE, list);
int i;
int j=strlen(desc);
for (i=0; i<count; i++) {
int found = 1;
int k = strlen(list[i].desc);
if (j != k) continue;
for (k=0; k<j; k++)
if (tolower(list[i].desc[k]) != tolower(desc[k]))
found = 0;
if (found == 0) continue;
/* found a case-insensitive description match */
strcpy(name, list[i].name);
return name;
}
/* not found */
return 0;
}
/* strncasecmp() is not available on all platforms */
int eth_strncasecmp(char* string1, char* string2, int len)
{
int i;
unsigned char s1, s2;
for (i=0; i<len; i++) {
s1 = string1[i];
s2 = string2[i];
if (islower (s1)) s1 = toupper (s1);
if (islower (s2)) s2 = toupper (s2);
if (s1 < s2)
return -1;
if (s1 > s2)
return 1;
if (s1 == 0) return 0;
}
return 0;
}
char* eth_getname_byname(char* name, char* temp)
{
ETH_LIST list[ETH_MAX_DEVICE];
int count = eth_devices(ETH_MAX_DEVICE, list);
int i, n, found;
found = 0;
n = strlen(name);
for (i=0; i<count && !found; i++) {
if (eth_strncasecmp(name, list[i].name, n) == 0) {
found = 1;
strcpy(temp, list[i].name); /* only case might be different */
}
}
if (found) {
return temp;
} else {
return 0;
}
}
void eth_zero(ETH_DEV* dev)
{
/* set all members to NULL OR 0 */
memset(dev, 0, sizeof(ETH_DEV));
dev->reflections = -1; /* not established yet */
}
t_stat eth_show (FILE* st, UNIT* uptr, int32 val, void* desc)
{
ETH_LIST list[ETH_MAX_DEVICE];
int number = eth_devices(ETH_MAX_DEVICE, list);
fprintf(st, "ETH devices:\n");
if (number == -1)
fprintf(st, " network support not available in simulator\n");
else
if (number == 0)
fprintf(st, " no network devices are available\n");
else {
int i, min, len;
for (i=0, min=0; i<number; i++)
if ((len = strlen(list[i].name)) > min) min = len;
for (i=0; i<number; i++)
fprintf(st," %d %-*s (%s)\n", i, min, list[i].name, list[i].desc);
}
return SCPE_OK;
}
t_stat ethq_init(ETH_QUE* que, int max)
{
/* create dynamic queue if it does not exist */
if (!que->item) {
size_t size = sizeof(struct eth_item) * max;
que->max = max;
que->item = (struct eth_item *) malloc(size);
if (que->item) {
/* init dynamic memory */
memset(que->item, 0, size);
} else {
/* failed to allocate memory */
char* msg = "EthQ: failed to allocate dynamic queue[%d]\r\n";
printf(msg, max);
if (sim_log) fprintf(sim_log, msg, max);
return SCPE_MEM;
};
};
return SCPE_OK;
}
void ethq_clear(ETH_QUE* que)
{
/* clear packet array */
memset(que->item, 0, sizeof(struct eth_item) * que->max);
/* clear rest of structure */
que->count = que->head = que->tail = que->loss = que->high = 0;
}
void ethq_remove(ETH_QUE* que)
{
struct eth_item* item = &que->item[que->head];
if (que->count) {
memset(item, 0, sizeof(struct eth_item));
if (++que->head == que->max)
que->head = 0;
que->count--;
}
}
void ethq_insert(ETH_QUE* que, int32 type, ETH_PACK* pack, int32 status)
{
struct eth_item* item;
/* if queue empty, set pointers to beginning */
if (!que->count) {
que->head = 0;
que->tail = -1;
}
/* find new tail of the circular queue */
if (++que->tail == que->max)
que->tail = 0;
if (++que->count > que->max) {
que->count = que->max;
/* lose oldest packet */
if (++que->head == que->max)
que->head = 0;
que->loss++;
}
if (que->count > que->high)
que->high = que->count;
/* set information in (new) tail item */
item = &que->item[que->tail];
item->type = type;
item->packet.len = pack->len;
item->packet.used = 0;
item->packet.crc_len = pack->crc_len;
memcpy(item->packet.msg, pack->msg, ((pack->len > pack->crc_len) ? pack->len : pack->crc_len));
item->packet.status = status;
}
/*============================================================================*/
/* Non-implemented versions */
/*============================================================================*/
#if !defined (USE_NETWORK) && !defined(USE_SHARED)
t_stat eth_open(ETH_DEV* dev, char* name, DEVICE* dptr, uint32 dbit)
{return SCPE_NOFNC;}
t_stat eth_close (ETH_DEV* dev)
{return SCPE_NOFNC;}
t_stat eth_write (ETH_DEV* dev, ETH_PACK* packet, ETH_PCALLBACK routine)
{return SCPE_NOFNC;}
t_stat eth_read (ETH_DEV* dev, ETH_PACK* packet, ETH_PCALLBACK routine)
{return SCPE_NOFNC;}
t_stat eth_filter (ETH_DEV* dev, int addr_count, ETH_MAC* addresses,
ETH_BOOL all_multicast, ETH_BOOL promiscuous)
{return SCPE_NOFNC;}
int eth_devices (int max, ETH_LIST* dev)
{return -1;}
#else /* endif unimplemented */
/*============================================================================*/
/* WIN32, Linux, and xBSD routines use WinPcap and libpcap packages */
/* OpenVMS Alpha uses a WinPcap port and an associated execlet */
/*============================================================================*/
#if defined (xBSD) && !defined(__APPLE__)
#include <sys/ioctl.h>
#include <net/bpf.h>
#endif /* xBSD */
#include <pcap.h>
#include <string.h>
/* Allows windows to look up user-defined adapter names */
#if defined(_WIN32)
#include <winreg.h>
#endif
#if defined(_WIN32) && defined(USE_SHARED)
/* Dynamic DLL loading technique and modified source comes from
Etherial/WireShark capture_pcap.c */
/* Dynamic DLL load variables */
static HINSTANCE hDll = 0; /* handle to DLL */
static int dll_loaded = 0; /* 0=not loaded, 1=loaded, 2=DLL load failed, 3=Func load failed */
static char* no_wpcap = "wpcap load failure";
/* define pointers to pcap functions needed */
static void (*p_pcap_close) (pcap_t *);
static int (*p_pcap_compile) (pcap_t *, struct bpf_program *, char *, int, bpf_u_int32);
static int (*p_pcap_datalink) (pcap_t *);
static int (*p_pcap_dispatch) (pcap_t *, int, pcap_handler, u_char *);
static int (*p_pcap_findalldevs) (pcap_if_t **, char *);
static void (*p_pcap_freealldevs) (pcap_if_t *);
static void (*p_pcap_freecode) (struct bpf_program *);
static char* (*p_pcap_geterr) (pcap_t *);
static int (*p_pcap_lookupnet) (const char *, bpf_u_int32 *, bpf_u_int32 *, char *);
static pcap_t* (*p_pcap_open_live) (const char *, int, int, int, char *);
static int (*p_pcap_sendpacket) (pcap_t* handle, const u_char* msg, int len);
static int (*p_pcap_setfilter) (pcap_t *, struct bpf_program *);
static char* (*p_pcap_lib_version) (void);
/* load function pointer from DLL */
void load_function(char* function, void** func_ptr) {
*func_ptr = GetProcAddress(hDll, function);
if (*func_ptr == 0) {
char* msg = "Eth: Failed to find function '%s' in wpcap.dll\r\n";
printf (msg, function);
if (sim_log) fprintf (sim_log, msg, function);
dll_loaded = 3;
}
}
/* load wpcap.dll as required */
int load_wpcap(void) {
switch(dll_loaded) {
case 0: /* not loaded */
/* attempt to load DLL */
hDll = LoadLibrary(TEXT("wpcap.dll"));
if (hDll == 0) {
/* failed to load DLL */
char* msg = "Eth: Failed to load wpcap.dll\r\n";
char* msg2 = "Eth: You must install WinPcap 4.x to use networking\r\n";
printf (msg);
printf (msg2);
if (sim_log) {
fprintf (sim_log, msg);
fprintf (sim_log, msg2);
}
dll_loaded = 2;
break;
} else {
/* DLL loaded OK */
dll_loaded = 1;
}
/* load required functions; sets dll_load=3 on error */
load_function("pcap_close", (void**) &p_pcap_close);
load_function("pcap_compile", (void**) &p_pcap_compile);
load_function("pcap_datalink", (void**) &p_pcap_datalink);
load_function("pcap_dispatch", (void**) &p_pcap_dispatch);
load_function("pcap_findalldevs", (void**) &p_pcap_findalldevs);
load_function("pcap_freealldevs", (void**) &p_pcap_freealldevs);
load_function("pcap_freecode", (void**) &p_pcap_freecode);
load_function("pcap_geterr", (void**) &p_pcap_geterr);
load_function("pcap_lookupnet", (void**) &p_pcap_lookupnet);
load_function("pcap_open_live", (void**) &p_pcap_open_live);
load_function("pcap_sendpacket", (void**) &p_pcap_sendpacket);
load_function("pcap_setfilter", (void**) &p_pcap_setfilter);
load_function("pcap_lib_version", (void**) &p_pcap_lib_version);
if (dll_loaded == 1) {
/* log successful load */
char* version = p_pcap_lib_version();
printf("%s\n", version);
if (sim_log)
fprintf(sim_log, "%s\n", version);
}
break;
default: /* loaded or failed */
break;
}
return (dll_loaded == 1) ? 1 : 0;
}
/* define functions with dynamic revectoring */
void pcap_close(pcap_t* a) {
if (load_wpcap() != 0) {
p_pcap_close(a);
}
}
int pcap_compile(pcap_t* a, struct bpf_program* b, char* c, int d, bpf_u_int32 e) {
if (load_wpcap() != 0) {
return p_pcap_compile(a, b, c, d, e);
} else {
return 0;
}
}
int pcap_datalink(pcap_t* a) {
if (load_wpcap() != 0) {
return p_pcap_datalink(a);
} else {
return 0;
}
}
int pcap_dispatch(pcap_t* a, int b, pcap_handler c, u_char* d) {
if (load_wpcap() != 0) {
return p_pcap_dispatch(a, b, c, d);
} else {
return 0;
}
}
int pcap_findalldevs(pcap_if_t** a, char* b) {
if (load_wpcap() != 0) {
return p_pcap_findalldevs(a, b);
} else {
*a = 0;
strcpy(b, no_wpcap);
return -1;
}
}
void pcap_freealldevs(pcap_if_t* a) {
if (load_wpcap() != 0) {
p_pcap_freealldevs(a);
}
}
void pcap_freecode(struct bpf_program* a) {
if (load_wpcap() != 0) {
p_pcap_freecode(a);
}
}
char* pcap_geterr(pcap_t* a) {
if (load_wpcap() != 0) {
return p_pcap_geterr(a);
} else {
return (char*) 0;
}
}
int pcap_lookupnet(const char* a, bpf_u_int32* b, bpf_u_int32* c, char* d) {
if (load_wpcap() != 0) {
return p_pcap_lookupnet(a, b, c, d);
} else {
return 0;
}
}
pcap_t* pcap_open_live(const char* a, int b, int c, int d, char* e) {
if (load_wpcap() != 0) {
return p_pcap_open_live(a, b, c, d, e);
} else {
return (pcap_t*) 0;
}
}
int pcap_sendpacket(pcap_t* a, const u_char* b, int c) {
if (load_wpcap() != 0) {
return p_pcap_sendpacket(a, b, c);
} else {
return 0;
}
}
int pcap_setfilter(pcap_t* a, struct bpf_program* b) {
if (load_wpcap() != 0) {
return p_pcap_setfilter(a, b);
} else {
return 0;
}
}
#endif
/* Some platforms have always had pcap_sendpacket */
#if defined(_WIN32) || defined(VMS)
#define HAS_PCAP_SENDPACKET 1
#else
/* The latest libpcap and WinPcap all have pcap_sendpacket */
#if !defined (NEED_PCAP_SENDPACKET)
#define HAS_PCAP_SENDPACKET 1
#endif
#endif
#if !defined (HAS_PCAP_SENDPACKET)
/* libpcap has no function to write a packet, so we need to implement
pcap_sendpacket() for compatibility with the WinPcap base code.
Return value: 0=Success, -1=Failure */
int pcap_sendpacket(pcap_t* handle, const u_char* msg, int len)
{
#if defined (__linux)
return (send(pcap_fileno(handle), msg, len, 0) == len)? 0 : -1;
#else
return (write(pcap_fileno(handle), msg, len) == len)? 0 : -1;
#endif /* linux */
}
#endif /* !HAS_PCAP_SENDPACKET */
#if defined (USE_READER_THREAD)
#include <pthread.h>
void eth_callback(u_char* info, const struct pcap_pkthdr* header, const u_char* data);
static void *
_eth_reader(void *arg)
{
ETH_DEV* volatile dev = (ETH_DEV*)arg;
int status;
struct timeval timeout;
timeout.tv_sec = 0;
timeout.tv_usec = 200*1000;
sim_debug(dev->dbit, dev->dptr, "Reader Thread Starting\n");
while (dev->handle) {
#if defined (MUST_DO_SELECT)
int sel_ret;
fd_set setl;
FD_ZERO(&setl);
FD_SET(pcap_get_selectable_fd((pcap_t *)dev->handle), &setl);
sel_ret = select(1+pcap_get_selectable_fd((pcap_t *)dev->handle), &setl, NULL, NULL, &timeout);
if (sel_ret < 0 && errno != EINTR) break;
if (sel_ret > 0) {
/* dispatch read request queue available packets */
status = pcap_dispatch((pcap_t*)dev->handle, -1, &eth_callback, (u_char*)dev);
}
#else
/* dispatch read request queue available packets */
status = pcap_dispatch((pcap_t*)dev->handle, 1, &eth_callback, (u_char*)dev);
#endif
}
sim_debug(dev->dbit, dev->dptr, "Reader Thread Exiting\n");
return NULL;
}
#endif
t_stat eth_open(ETH_DEV* dev, char* name, DEVICE* dptr, uint32 dbit)
{
const int bufsz = (BUFSIZ < ETH_MAX_PACKET) ? ETH_MAX_PACKET : BUFSIZ;
char errbuf[PCAP_ERRBUF_SIZE];
char temp[1024];
char* savname = name;
int num;
char* msg;
/* initialize device */
eth_zero(dev);
/* translate name of type "ethX" to real device name */
if ((strlen(name) == 4)
&& (tolower(name[0]) == 'e')
&& (tolower(name[1]) == 't')
&& (tolower(name[2]) == 'h')
&& isdigit(name[3])
) {
num = atoi(&name[3]);
savname = eth_getname(num, temp);
if (savname == 0) /* didn't translate */
return SCPE_OPENERR;
} else {
/* are they trying to use device description? */
savname = eth_getname_bydesc(name, temp);
if (savname == 0) { /* didn't translate */
/* probably is not ethX and has no description */
savname = eth_getname_byname(name, temp);
if (savname == 0) /* didn't translate */
return SCPE_OPENERR;
}
}
/* attempt to connect device */
memset(errbuf, 0, sizeof(errbuf));
dev->handle = (void*) pcap_open_live(savname, bufsz, ETH_PROMISC, PCAP_READ_TIMEOUT, errbuf);
if (!dev->handle) { /* can't open device */
msg = "Eth: pcap_open_live error - %s\r\n";
printf (msg, errbuf);
if (sim_log) fprintf (sim_log, msg, errbuf);
return SCPE_OPENERR;
} else {
msg = "Eth: opened %s\r\n";
printf (msg, savname);
if (sim_log) fprintf (sim_log, msg, savname);
}
/* save name of device */
dev->name = malloc(strlen(savname)+1);
strcpy(dev->name, savname);
/* save debugging information */
dev->dptr = dptr;
dev->dbit = dbit;
#if !defined(HAS_PCAP_SENDPACKET) && defined (xBSD) && !defined (__APPLE__)
/* Tell the kernel that the header is fully-formed when it gets it.
This is required in order to fake the src address. */
{
int one = 1;
ioctl(pcap_fileno(dev->handle), BIOCSHDRCMPLT, &one);
}
#endif /* xBSD */
#if defined (USE_READER_THREAD)
{
pthread_attr_t attr;
ethq_init (&dev->read_queue, 200); /* initialize FIFO queue */
pthread_mutex_init (&dev->lock, NULL);
pthread_attr_init(&attr);
pthread_attr_setscope(&attr, PTHREAD_SCOPE_SYSTEM);
pthread_create (&dev->reader_thread, &attr, _eth_reader, (void *)dev);
pthread_attr_destroy(&attr);
}
#else /* !defined (USE_READER_THREAD */
#ifdef USE_SETNONBLOCK
/* set ethernet device non-blocking so pcap_dispatch() doesn't hang */
if (pcap_setnonblock (dev->handle, 1, errbuf) == -1) {
msg = "Eth: Failed to set non-blocking: %s\r\n";
printf (msg, errbuf);
if (sim_log) fprintf (sim_log, msg, errbuf);
}
#endif
#endif /* !defined (USE_READER_THREAD */
return SCPE_OK;
}
t_stat eth_close(ETH_DEV* dev)
{
char* msg = "Eth: closed %s\r\n";
pcap_t *pcap;
/* make sure device exists */
if (!dev) return SCPE_UNATT;
/* close the device */
pcap = (pcap_t *)dev->handle;
dev->handle = NULL;
pcap_close(pcap);
printf (msg, dev->name);
if (sim_log) fprintf (sim_log, msg, dev->name);
#if defined (USE_READER_THREAD)
pthread_join (dev->reader_thread, NULL);
#endif
/* clean up the mess */
free(dev->name);
eth_zero(dev);
return SCPE_OK;
}
t_stat eth_reflect(ETH_DEV* dev, ETH_MAC mac)
{
ETH_PACK send, recv;
t_stat status;
int i;
struct timeval delay;
/* build a packet */
memset (&send, 0, sizeof(ETH_PACK));
send.len = ETH_MIN_PACKET; /* minimum packet size */
memcpy(&send.msg[0], mac, sizeof(ETH_MAC)); /* target address */
memcpy(&send.msg[6], mac, sizeof(ETH_MAC)); /* source address */
send.msg[12] = 0x90; /* loopback packet type */
for (i=14; i<send.len; i++)
send.msg[i] = 32 + i; /* gibberish */
dev->reflections = 0;
eth_filter(dev, 1, (ETH_MAC *)mac, 0, 0);
/* send the packet */
status = eth_write (dev, &send, NULL);
if (status != SCPE_OK) {
char *msg;
msg = "Eth: Error Transmitting packet: %s\r\n"
"You may need to run as root, or install a libpcap version\r\n"
"which is at least 0.9 from www.tcpdump.org\r\n";
printf(msg, strerror(errno));
if (sim_log) fprintf (sim_log, msg, strerror(errno));
return status;
}
/* if/when we have a sim_os_msleep() we'll use it here instead of this select() */
delay.tv_sec = 0;
delay.tv_usec = 50*1000;
select(0, NULL, NULL, NULL, &delay); /* make sure things settle into the read path */
/* empty the read queue and count the reflections */
do {
memset (&recv, 0, sizeof(ETH_PACK));
status = eth_read (dev, &recv, NULL);
if (memcmp(send.msg, recv.msg, ETH_MIN_PACKET)== 0)
dev->reflections++;
} while (recv.len > 0);
sim_debug(dev->dbit, dev->dptr, "Reflections = %d\n", dev->reflections);
return dev->reflections;
}
t_stat eth_write(ETH_DEV* dev, ETH_PACK* packet, ETH_PCALLBACK routine)
{
int status = 1; /* default to failure */
/* make sure device exists */
if (!dev) return SCPE_UNATT;
/* make sure packet exists */
if (!packet) return SCPE_ARG;
/* make sure packet is acceptable length */
if ((packet->len >= ETH_MIN_PACKET) && (packet->len <= ETH_MAX_PACKET)) {
eth_packet_trace (dev, packet->msg, packet->len, "writing");
/* dispatch write request (synchronous; no need to save write info to dev) */
status = pcap_sendpacket((pcap_t*)dev->handle, (u_char*)packet->msg, packet->len);
/* detect sending of decnet loopback packet */
if ((status == 0) && DECNET_SELF_FRAME(dev->decnet_addr, packet->msg))
dev->decnet_self_sent += dev->reflections;
} /* if packet->len */
/* call optional write callback function */
if (routine)
(routine)(status);
return ((status == 0) ? SCPE_OK : SCPE_IOERR);
}
void eth_callback(u_char* info, const struct pcap_pkthdr* header, const u_char* data)
{
ETH_DEV* dev = (ETH_DEV*) info;
#ifdef USE_BPF
int to_me = 1;
#else /* !USE_BPF */
int to_me = 0;
int from_me = 0;
int i;
#ifdef ETH_DEBUG
// eth_packet_trace (dev, data, header->len, "received");
#endif
for (i = 0; i < dev->addr_count; i++) {
if (memcmp(data, dev->filter_address[i], 6) == 0) to_me = 1;
if (memcmp(&data[6], dev->filter_address[i], 6) == 0) from_me = 1;
}
/* all multicast mode? */
if (dev->all_multicast && (data[0] & 0x01)) to_me = 1;
/* promiscuous mode? */
if (dev->promiscuous) to_me = 1;
#endif /* USE_BPF */
/* detect sending of decnet loopback packet */
if (DECNET_SELF_FRAME(dev->decnet_addr, data)) {
/* lower reflection count - if already zero, pass it on */
if (dev->decnet_self_sent > 0) {
dev->decnet_self_sent--;
to_me = 0;
}
#ifndef USE_BPF
else
from_me = 0;
#endif
}
#ifdef USE_BPF
if (to_me) {
#else /* !USE_BPF */
if (to_me && !from_me) {
#endif
#if defined (USE_READER_THREAD)
ETH_PACK tmp_packet;
/* set data in passed read packet */
tmp_packet.len = header->len;
memcpy(tmp_packet.msg, data, header->len);
if (dev->need_crc)
eth_add_crc32(&tmp_packet);
eth_packet_trace (dev, tmp_packet.msg, tmp_packet.len, "rcvqd");
pthread_mutex_lock (&dev->lock);
ethq_insert(&dev->read_queue, 2, &tmp_packet, 0);
pthread_mutex_unlock (&dev->lock);
#else
/* set data in passed read packet */
dev->read_packet->len = header->len;
memcpy(dev->read_packet->msg, data, header->len);
if (dev->need_crc)
eth_add_crc32(dev->read_packet);
eth_packet_trace (dev, dev->read_packet->msg, dev->read_packet->len, "reading");
/* call optional read callback function */
if (dev->read_callback)
(dev->read_callback)(0);
#endif
}
}
t_stat eth_read(ETH_DEV* dev, ETH_PACK* packet, ETH_PCALLBACK routine)
{
int status;
/* make sure device exists */
if (!dev) return SCPE_UNATT;
/* make sure packet exists */
if (!packet) return SCPE_ARG;
#if !defined (USE_READER_THREAD)
/* set read packet */
dev->read_packet = packet;
packet->len = 0;
/* set optional callback routine */
dev->read_callback = routine;
/* dispatch read request to either receive a filtered packet or timeout */
do {
status = pcap_dispatch((pcap_t*)dev->handle, 1, &eth_callback, (u_char*)dev);
} while ((status) && (0 == packet->len));
#else /* USE_READER_THREAD */
status = 0;
pthread_mutex_lock (&dev->lock);
if (dev->read_queue.count > 0) {
ETH_ITEM* item = &dev->read_queue.item[dev->read_queue.head];
packet->len = item->packet.len;
memcpy(packet->msg, item->packet.msg, packet->len);
if (routine)
routine(status);
ethq_remove(&dev->read_queue);
}
pthread_mutex_unlock (&dev->lock);
#endif
return SCPE_OK;
}
t_stat eth_filter(ETH_DEV* dev, int addr_count, ETH_MAC* addresses,
ETH_BOOL all_multicast, ETH_BOOL promiscuous)
{
int i;
bpf_u_int32 bpf_subnet, bpf_netmask;
char buf[110+66*ETH_FILTER_MAX];
char errbuf[PCAP_ERRBUF_SIZE];
char mac[20];
char* buf2;
t_stat status;
#ifdef USE_BPF
struct bpf_program bpf;
char* msg;
#endif
/* make sure device exists */
if (!dev) return SCPE_UNATT;
/* filter count OK? */
if ((addr_count < 0) || (addr_count > ETH_FILTER_MAX))
return SCPE_ARG;
else
if (!addresses) return SCPE_ARG;
/* set new filter addresses */
for (i = 0; i < addr_count; i++)
memcpy(dev->filter_address[i], addresses[i], sizeof(ETH_MAC));
dev->addr_count = addr_count;
/* store other flags */
dev->all_multicast = all_multicast;
dev->promiscuous = promiscuous;
/* print out filter information if debugging */
if (dev->dptr->dctrl & dev->dbit) {
sim_debug(dev->dbit, dev->dptr, "Filter Set\n");
for (i = 0; i < addr_count; i++) {
char mac[20];
eth_mac_fmt(&dev->filter_address[i], mac);
sim_debug(dev->dbit, dev->dptr, " Addr[%d]: %s\n", i, mac);
}
if (dev->all_multicast)
sim_debug(dev->dbit, dev->dptr, "All Multicast\n");
if (dev->promiscuous)
sim_debug(dev->dbit, dev->dptr, "Promiscuous\n");
}
/* test reflections */
if (dev->reflections == -1)
status = eth_reflect(dev, dev->filter_address[0]);
/* setup BPF filters and other fields to minimize packet delivery */
strcpy(buf, "");
/* construct destination filters - since the real ethernet interface was set
into promiscuous mode by eth_open(), we need to filter out the packets that
our simulated interface doesn't want. */
if (!dev->promiscuous) {
for (i = 0; i < addr_count; i++) {
eth_mac_fmt(&dev->filter_address[i], mac);
if (!strstr(buf, mac)) /* eliminate duplicates */
sprintf(&buf[strlen(buf)], "%s(ether dst %s)", (*buf) ? " or " : "", mac);
}
if (dev->all_multicast)
sprintf(&buf[strlen(buf)], "%s(ether multicast)", (*buf) ? " or " : "");
}
/* construct source filters - this prevents packets from being reflected back
by systems where WinPcap and libpcap cause packet reflections. Note that
some systems do not reflect packets at all. This *assumes* that the
simulated NIC will not send out packets with multicast source fields. */
if ((addr_count > 0) && (dev->reflections > 0)) {
if (strlen(buf) > 0)
sprintf(&buf[strlen(buf)], " and ");
sprintf (&buf[strlen(buf)], "not (");
buf2 = &buf[strlen(buf)];
for (i = 0; i < addr_count; i++) {
if (dev->filter_address[i][0] & 0x01) continue; /* skip multicast addresses */
eth_mac_fmt(&dev->filter_address[i], mac);
if (!strstr(buf2, mac)) /* eliminate duplicates */
sprintf(&buf2[strlen(buf2)], "%s(ether src %s)", (*buf2) ? " or " : "", mac);
}
sprintf (&buf[strlen(buf)], ")");
}
/* When starting, DECnet sends out a packet with the source and destination
addresses set to the same value as the DECnet MAC address. This packet is
designed to find and help diagnose DECnet address conflicts. Normally, this
packet would not be seen by the sender, only by the other machine that has
the same DECnet address. If the ethernet subsystem is reflecting packets,
DECnet will fail to start if it sees the reflected packet, since it thinks
another system is using this DECnet address. We have to let these packets
through, so that if another machine has the same DECnet address that we
can detect it. Both eth_write() and eth_callback() help by checking the
reflection count - eth_write() adds the reflection count to
dev->decnet_self_sent, and eth_callback() check the value - if the
dev->decnet_self_sent count is zero, then the packet has come from another
machine with the same address, and needs to be passed on to the simulated
machine. */
memset(dev->decnet_addr, 0, sizeof(ETH_MAC));
/* check for decnet address in filters */
if ((addr_count) && (dev->reflections > 0)) {
for (i = 0; i < addr_count; i++) {
eth_mac_fmt(&dev->filter_address[i], mac);
if (memcmp(mac, "AA:00:04", 8) == 0) {
memcpy(dev->decnet_addr, &dev->filter_address[i], sizeof(ETH_MAC));
/* let packets through where dst and src are the same as our decnet address */
sprintf (&buf[strlen(buf)], " or ((ether dst %s) and (ether src %s))", mac, mac);
break;
}
}
}
sim_debug(dev->dbit, dev->dptr, "BPF string is: |%s|\n", buf);
/* get netmask, which is required for compiling */
if (pcap_lookupnet(dev->handle, &bpf_subnet, &bpf_netmask, errbuf)<0) {
bpf_netmask = 0;
}
#ifdef USE_BPF
/* compile filter string */
if ((status = pcap_compile(dev->handle, &bpf, buf, 1, bpf_netmask)) < 0) {
sprintf(errbuf, "%s", pcap_geterr(dev->handle));
msg = "Eth: pcap_compile error: %s\r\n";
printf(msg, errbuf);
if (sim_log) fprintf (sim_log, msg, errbuf);
/* show erroneous BPF string */
msg = "Eth: BPF string is: |%s|\r\n";
printf (msg, buf);
if (sim_log) fprintf (sim_log, msg, buf);
} else {
/* apply compiled filter string */
if ((status = pcap_setfilter(dev->handle, &bpf)) < 0) {
sprintf(errbuf, "%s", pcap_geterr(dev->handle));
msg = "Eth: pcap_setfilter error: %s\r\n";
printf(msg, errbuf);
if (sim_log) fprintf (sim_log, msg, errbuf);
} else {
#ifdef USE_SETNONBLOCK
/* set file non-blocking */
status = pcap_setnonblock (dev->handle, 1, errbuf);
#endif /* USE_SETNONBLOCK */
}
pcap_freecode(&bpf);
}
#endif /* USE_BPF */
return SCPE_OK;
}
/*
The libpcap provided API pcap_findalldevs() on most platforms, will
leverage the getifaddrs() API if it is available in preference to
alternate platform specific methods of determining the interface list.
A limitation of getifaddrs() is that it returns only interfaces which
have associated addresses. This may not include all of the interesting
interfaces that we are interested in since a host may have dedicated
interfaces for a simulator, which is otherwise unused by the host.
One could hand craft the the build of libpcap to specifically use
alternate methods to implement pcap_findalldevs(). However, this can
get tricky, and would then result in a sort of deviant libpcap.
This routine exists to allow platform specific code to validate and/or
extend the set of available interfaces to include any that are not
returned by pcap_findalldevs.
*/
int eth_host_devices(int used, int max, ETH_LIST* list)
{
pcap_t* conn;
int i, j, datalink;
char errbuf[PCAP_ERRBUF_SIZE];
for (i=0; i<used; ++i) {
/* Cull any non-ethernet interface types */
conn = pcap_open_live(list[i].name, ETH_MAX_PACKET, ETH_PROMISC, PCAP_READ_TIMEOUT, errbuf);
if (NULL != conn) datalink = pcap_datalink(conn), pcap_close(conn);
if ((NULL == conn) || (datalink != DLT_EN10MB)) {
for (j=i; j<used-1; ++j)
list[j] = list[j+1];
--used;
--i;
}
} /* for */
#if defined(_WIN32)
/* replace device description with user-defined adapter name (if defined) */
for (i=0; i<used; i++) {
char regkey[2048];
char regval[2048];
LONG status;
DWORD reglen, regtype;
HKEY reghnd;
/* These registry keys don't seem to exist for all devices, so we simply ignore errors. */
/* Windows XP x64 registry uses wide characters by default,
so we force use of narrow characters by using the 'A'(ANSI) version of RegOpenKeyEx.
This could cause some problems later, if this code is internationalized. Ideally,
the pcap lookup will return wide characters, and we should use them to build a wide
registry key, rather than hardcoding the string as we do here. */
if(list[i].name[strlen( "\\Device\\NPF_" )] == '{') {
sprintf( regkey, "SYSTEM\\CurrentControlSet\\Control\\Network\\"
"{4D36E972-E325-11CE-BFC1-08002BE10318}\\%hs\\Connection", list[i].name+
strlen( "\\Device\\NPF_" ) );
if((status = RegOpenKeyExA (HKEY_LOCAL_MACHINE, regkey, 0, KEY_QUERY_VALUE, &reghnd)) != ERROR_SUCCESS) {
continue;
}
reglen = sizeof(regval);
/* look for user-defined adapter name, bail if not found */
/* same comment about Windows XP x64 (above) using RegQueryValueEx */
if((status = RegQueryValueExA (reghnd, "Name", NULL, &regtype, regval, &reglen)) != ERROR_SUCCESS) {
RegCloseKey (reghnd);
continue;
}
/* make sure value is the right type, bail if not acceptable */
if((regtype != REG_SZ) || (reglen > sizeof(regval))) {
RegCloseKey (reghnd);
continue;
}
/* registry value seems OK, finish up and replace description */
RegCloseKey (reghnd );
sprintf (list[i].desc, "%s", regval);
}
} /* for */
#endif
return used;
}
int eth_devices(int max, ETH_LIST* list)
{
pcap_if_t* alldevs;
pcap_if_t* dev;
int i = 0;
char errbuf[PCAP_ERRBUF_SIZE];
#ifndef DONT_USE_PCAP_FINDALLDEVS
/* retrieve the device list */
if (pcap_findalldevs(&alldevs, errbuf) == -1) {
char* msg = "Eth: error in pcap_findalldevs: %s\r\n";
printf (msg, errbuf);
if (sim_log) fprintf (sim_log, msg, errbuf);
} else {
/* copy device list into the passed structure */
for (i=0, dev=alldevs; dev; dev=dev->next) {
if ((dev->flags & PCAP_IF_LOOPBACK) || (!strcmp("any", dev->name))) continue;
list[i].num = i;
sprintf(list[i].name, "%s", dev->name);
if (dev->description)
sprintf(list[i].desc, "%s", dev->description);
else
sprintf(list[i].desc, "%s", "No description available");
if (i++ >= max) break;
}
/* free device list */
pcap_freealldevs(alldevs);
}
#endif
/* Add any host specific devices and/or validate those already found */
i = eth_host_devices(i, max, list);
/* return device count */
return i;
}
#endif /* USE_NETWORK */