2001-04-10 06:20:02 +04:00
|
|
|
// Copyright (C) 2001 MandrakeSoft S.A.
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
|
|
|
// MandrakeSoft S.A.
|
|
|
|
// 43, rue d'Aboukir
|
|
|
|
// 75002 Paris - France
|
|
|
|
// http://www.linux-mandrake.com/
|
|
|
|
// http://www.mandrakesoft.com/
|
|
|
|
//
|
|
|
|
// This library is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation; either
|
|
|
|
// version 2 of the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
// Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public
|
|
|
|
// License along with this library; if not, write to the Free Software
|
|
|
|
// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
|
|
|
|
// Peter Grehan (grehan@iprg.nokia.com) coded all of this
|
|
|
|
// NE2000/ether stuff.
|
|
|
|
|
|
|
|
// eth_fbsd.cc - A FreeBSD packet filter implementation of
|
|
|
|
// an ethernet pktmover. There are some problems and limitations
|
|
|
|
// with FreeBSD:
|
|
|
|
// - the source address of the frame is overwritten by
|
|
|
|
// the hosts's source address. This causes problems with
|
|
|
|
// learning bridges - since they cannot determine where
|
|
|
|
// BOCHS 'is', they broadcast the frame to all ports.
|
|
|
|
// - packets cannot be sent from BOCHS to the host
|
|
|
|
// - TCP performance seems to be abysmal; I think this is
|
|
|
|
// a timing problem somewhere.
|
|
|
|
// - I haven't handled the case where multiple frames arrive
|
|
|
|
// in a single BPF read.
|
|
|
|
//
|
|
|
|
// The /dev/bpf* devices need to be set up with the appropriate
|
|
|
|
// permissions for this to work.
|
|
|
|
//
|
|
|
|
// The config line in .bochsrc should look something like:
|
|
|
|
//
|
2001-05-23 23:47:14 +04:00
|
|
|
// ne2k: ioaddr=0x280, irq=9, mac=00:a:b:c:1:2, ethmod=fbsd, ethdev=fxp0
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
|
|
|
|
|
|
|
#include "bochs.h"
|
2001-06-18 03:08:27 +04:00
|
|
|
#ifdef ETH_FBSD
|
2001-05-23 04:46:47 +04:00
|
|
|
#define LOG_THIS this->
|
2001-04-10 05:04:59 +04:00
|
|
|
|
|
|
|
extern "C" {
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/bpf.h>
|
2001-06-27 23:16:01 +04:00
|
|
|
#include <errno.h>
|
2001-04-10 05:04:59 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
#define BX_BPF_POLL 1000 // Poll for a frame every 1000 usecs
|
|
|
|
|
|
|
|
#define BX_BPF_BUFSIZ 2048 // enough for an ether frame + bpf hdr
|
|
|
|
|
|
|
|
#define BX_BPF_INSNSIZ 8 // number of bpf insns
|
|
|
|
|
|
|
|
// template filter for a unicast mac address and all
|
|
|
|
// multicast/broadcast frames
|
|
|
|
static const struct bpf_insn macfilter[] = {
|
|
|
|
BPF_STMT(BPF_LD|BPF_W|BPF_ABS, 2),
|
|
|
|
BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0xaaaaaaaa, 0, 2),
|
|
|
|
BPF_STMT(BPF_LD|BPF_H|BPF_ABS, 0),
|
|
|
|
BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 0x0000aaaa, 2, 0),
|
|
|
|
BPF_STMT(BPF_LD|BPF_B|BPF_ABS, 0),
|
|
|
|
BPF_JUMP(BPF_JMP|BPF_JSET|BPF_K, 0x01, 0, 1),
|
|
|
|
BPF_STMT(BPF_RET, 1514),
|
|
|
|
BPF_STMT(BPF_RET, 0),
|
|
|
|
};
|
|
|
|
|
|
|
|
// template filter for all frames
|
|
|
|
static const struct bpf_insn promiscfilter[] = {
|
|
|
|
BPF_STMT(BPF_RET, 1514)
|
|
|
|
};
|
|
|
|
|
|
|
|
//
|
|
|
|
// Define the class. This is private to this module
|
|
|
|
//
|
|
|
|
class bx_fbsd_pktmover_c : public eth_pktmover_c {
|
|
|
|
public:
|
|
|
|
bx_fbsd_pktmover_c(const char *netif,
|
|
|
|
const char *macaddr,
|
|
|
|
eth_rx_handler_t rxh,
|
|
|
|
void *rxarg);
|
|
|
|
void sendpkt(void *buf, unsigned io_len);
|
|
|
|
|
|
|
|
private:
|
|
|
|
char *fbsd_macaddr[6];
|
|
|
|
int bpf_fd;
|
|
|
|
static void rx_timer_handler(void *);
|
|
|
|
void rx_timer(void);
|
|
|
|
int rx_timer_index;
|
|
|
|
struct bpf_insn filter[BX_BPF_INSNSIZ];
|
2001-06-19 20:57:55 +04:00
|
|
|
FILE *ne2klog, *ne2klog_txt;
|
2001-04-10 05:04:59 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Define the static class that registers the derived pktmover class,
|
|
|
|
// and allocates one on request.
|
|
|
|
//
|
|
|
|
class bx_fbsd_locator_c : public eth_locator_c {
|
|
|
|
public:
|
|
|
|
bx_fbsd_locator_c(void) : eth_locator_c("fbsd") {}
|
|
|
|
protected:
|
|
|
|
eth_pktmover_c *allocate(const char *netif,
|
|
|
|
const char *macaddr,
|
|
|
|
eth_rx_handler_t rxh,
|
|
|
|
void *rxarg) {
|
|
|
|
return (new bx_fbsd_pktmover_c(netif, macaddr, rxh, rxarg));
|
|
|
|
}
|
|
|
|
} bx_fbsd_match;
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Define the methods for the bx_fbsd_pktmover derived class
|
|
|
|
//
|
|
|
|
|
|
|
|
// the constructor
|
|
|
|
//
|
|
|
|
// Open a bpf file descriptor, and attempt to bind to
|
|
|
|
// the specified netif (Replicates libpcap open code)
|
|
|
|
//
|
|
|
|
bx_fbsd_pktmover_c::bx_fbsd_pktmover_c(const char *netif,
|
|
|
|
const char *macaddr,
|
|
|
|
eth_rx_handler_t rxh,
|
|
|
|
void *rxarg)
|
|
|
|
{
|
|
|
|
char device[sizeof "/dev/bpf000"];
|
|
|
|
int tmpfd;
|
|
|
|
int n = 0;
|
|
|
|
struct ifreq ifr;
|
|
|
|
struct bpf_version bv;
|
|
|
|
struct bpf_program bp;
|
|
|
|
u_int v;
|
|
|
|
|
2001-09-01 02:02:29 +04:00
|
|
|
put("BPF");
|
2001-04-10 05:04:59 +04:00
|
|
|
memcpy(fbsd_macaddr, macaddr, 6);
|
|
|
|
|
|
|
|
do {
|
|
|
|
(void)sprintf(device, "/dev/bpf%d", n++);
|
|
|
|
this->bpf_fd = open(device, O_RDWR);
|
2001-09-01 02:02:29 +04:00
|
|
|
BX_DEBUG(("tried %s, returned %d (%s)",device,this->bpf_fd,strerror(errno)));
|
2001-06-27 23:16:01 +04:00
|
|
|
if(errno == EACCES)
|
|
|
|
break;
|
|
|
|
} while (this->bpf_fd == -1);
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2001-06-27 23:16:01 +04:00
|
|
|
if (this->bpf_fd == -1) {
|
2001-09-01 02:02:29 +04:00
|
|
|
BX_ERROR(("eth_freebsd: could not open packet filter"));
|
2001-04-10 05:04:59 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ioctl(this->bpf_fd, BIOCVERSION, (caddr_t)&bv) < 0) {
|
2001-09-01 02:02:29 +04:00
|
|
|
BX_ERROR(("eth_freebsd: could not retrieve bpf version"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (bv.bv_major != BPF_MAJOR_VERSION ||
|
|
|
|
bv.bv_minor < BPF_MINOR_VERSION) {
|
2001-09-01 02:02:29 +04:00
|
|
|
BX_ERROR(("eth_freebsd: bpf version mismatch"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set buffer size
|
|
|
|
v = BX_BPF_BUFSIZ;
|
|
|
|
if (ioctl(this->bpf_fd, BIOCSBLEN, (caddr_t)&v) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not set buffer size"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
(void)strncpy(ifr.ifr_name, netif, sizeof(ifr.ifr_name));
|
|
|
|
if (ioctl(this->bpf_fd, BIOCSETIF, (caddr_t)&ifr) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not enable interface %s", netif));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd == -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify that the device is an ethernet.
|
|
|
|
if (ioctl(this->bpf_fd, BIOCGDLT, (caddr_t)&v) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not retrieve datalink type"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (v != DLT_EN10MB) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: incorrect datalink type %d", v));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put the device into promisc mode. This could be optimised
|
|
|
|
// to filter on a MAC address, broadcast, and all-multi,
|
|
|
|
// but this will do for now.
|
|
|
|
//
|
|
|
|
if (ioctl(this->bpf_fd, BIOCPROMISC, NULL) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not enable promisc mode"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set up non-blocking i/o
|
|
|
|
v = 1;
|
|
|
|
if (ioctl(this->bpf_fd, FIONBIO, &v) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not enable non-blocking i/o"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Install a filter
|
|
|
|
#ifdef notdef
|
|
|
|
memcpy(&this->filter, promiscfilter, sizeof(promiscfilter));
|
|
|
|
bp.bf_len = 1;
|
|
|
|
#endif
|
|
|
|
memcpy(&this->filter, macfilter, sizeof(macfilter));
|
|
|
|
this->filter[1].k = (macaddr[2] & 0xff) << 24 |
|
|
|
|
(macaddr[3] & 0xff) << 16 |
|
|
|
|
(macaddr[4] & 0xff) << 8 |
|
|
|
|
(macaddr[5] & 0xff);
|
|
|
|
this->filter[3].k = (macaddr[0] & 0xff) << 8 |
|
|
|
|
(macaddr[1] & 0xff);
|
|
|
|
bp.bf_len = 8;
|
|
|
|
bp.bf_insns = &this->filter[0];
|
|
|
|
if (ioctl(this->bpf_fd, BIOCSETF, &bp) < 0) {
|
2001-05-30 22:56:02 +04:00
|
|
|
BX_INFO(("eth_freebsd: could not set filter"));
|
2001-04-10 05:04:59 +04:00
|
|
|
close(this->bpf_fd);
|
|
|
|
this->bpf_fd = -1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start the rx poll
|
|
|
|
this->rx_timer_index =
|
|
|
|
bx_pc_system.register_timer(this, this->rx_timer_handler, BX_BPF_POLL,
|
|
|
|
1, 1); // continuous, active
|
|
|
|
|
|
|
|
this->rxh = rxh;
|
|
|
|
this->rxarg = rxarg;
|
2001-06-19 20:09:13 +04:00
|
|
|
|
|
|
|
#if BX_ETH_FBSD_LOGGING
|
2001-06-19 20:57:55 +04:00
|
|
|
// eventually Bryce wants ne2klog to dump in pcap format so that
|
2001-06-19 20:09:13 +04:00
|
|
|
// tcpdump -r FILE can read it and interpret packets.
|
2001-06-19 20:57:55 +04:00
|
|
|
ne2klog = fopen ("ne2k.raw", "wb");
|
|
|
|
if (!ne2klog) BX_PANIC (("open ne2k-tx.log failed"));
|
|
|
|
ne2klog_txt = fopen ("ne2k.txt", "wb");
|
|
|
|
if (!ne2klog_txt) BX_PANIC (("open ne2k-txdump.txt failed"));
|
|
|
|
fprintf (ne2klog_txt, "null packetmover readable log file\n");
|
|
|
|
fprintf (ne2klog_txt, "net IF = %s\n", netif);
|
|
|
|
fprintf (ne2klog_txt, "MAC address = ");
|
|
|
|
for (int i=0; i<6; i++)
|
|
|
|
fprintf (ne2klog_txt, "%02x%s", 0xff & macaddr[i], i<5?":" : "");
|
|
|
|
fprintf (ne2klog_txt, "\n--\n");
|
|
|
|
fflush (ne2klog_txt);
|
2001-06-19 20:09:13 +04:00
|
|
|
#endif
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// the output routine - called with pre-formatted ethernet frame.
|
|
|
|
void
|
|
|
|
bx_fbsd_pktmover_c::sendpkt(void *buf, unsigned io_len)
|
|
|
|
{
|
2001-06-19 20:09:13 +04:00
|
|
|
#if BX_ETH_FBSD_LOGGING
|
|
|
|
BX_DEBUG (("sendpkt length %u", io_len));
|
|
|
|
// dump raw bytes to a file, eventually dump in pcap format so that
|
|
|
|
// tcpdump -r FILE can interpret them for us.
|
2001-06-19 20:57:55 +04:00
|
|
|
int n = fwrite (buf, io_len, 1, ne2klog);
|
|
|
|
if (n != 1) BX_ERROR (("fwrite to ne2klog failed", io_len));
|
2001-06-19 20:09:13 +04:00
|
|
|
// dump packet in hex into an ascii log file
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (ne2klog_txt, "NE2K TX packet, length %u\n", io_len);
|
2001-06-19 20:09:13 +04:00
|
|
|
Bit8u *charbuf = (Bit8u *)buf;
|
|
|
|
for (n=0; n<io_len; n++) {
|
|
|
|
if (((n % 16) == 0) && n>0)
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (ne2klog_txt, "\n");
|
|
|
|
fprintf (ne2klog_txt, "%02x ", charbuf[n]);
|
2001-06-19 20:09:13 +04:00
|
|
|
}
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (ne2klog_txt, "\n--\n");
|
2001-06-19 20:09:13 +04:00
|
|
|
// flush log so that we see the packets as they arrive w/o buffering
|
2001-06-19 20:57:55 +04:00
|
|
|
fflush (ne2klog);
|
|
|
|
fflush (ne2klog_txt);
|
2001-06-19 20:09:13 +04:00
|
|
|
#endif
|
2001-04-10 05:04:59 +04:00
|
|
|
int status;
|
|
|
|
|
|
|
|
if (this->bpf_fd != -1)
|
|
|
|
status = write(this->bpf_fd, buf, io_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
// The receive poll process
|
|
|
|
void
|
|
|
|
bx_fbsd_pktmover_c::rx_timer_handler(void *this_ptr)
|
|
|
|
{
|
|
|
|
bx_fbsd_pktmover_c *class_ptr = (bx_fbsd_pktmover_c *) this_ptr;
|
|
|
|
|
|
|
|
class_ptr->rx_timer();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
bx_fbsd_pktmover_c::rx_timer(void)
|
|
|
|
{
|
|
|
|
int nbytes = 0;
|
|
|
|
Bit8u rxbuf[BX_BPF_BUFSIZ];
|
|
|
|
struct bpf_hdr *bhdr;
|
|
|
|
|
|
|
|
nbytes = read(this->bpf_fd, rxbuf, sizeof(rxbuf));
|
|
|
|
|
|
|
|
if (nbytes > 0) {
|
|
|
|
bhdr = (struct bpf_hdr *) rxbuf;
|
|
|
|
|
|
|
|
// filter out packets sourced from this node
|
|
|
|
if (memcmp(rxbuf + bhdr->bh_hdrlen + 6, this->fbsd_macaddr, 6)) {
|
|
|
|
(*rxh)(rxarg, rxbuf + bhdr->bh_hdrlen, bhdr->bh_caplen);
|
|
|
|
}
|
2001-06-19 20:09:13 +04:00
|
|
|
#if BX_ETH_FBSD_LOGGING
|
|
|
|
/// hey wait there is no receive data with a NULL ethernet, is there....
|
|
|
|
if (nbytes > 0) {
|
|
|
|
BX_DEBUG (("receive packet length %u", nbytes));
|
|
|
|
// dump raw bytes to a file, eventually dump in pcap format so that
|
|
|
|
// tcpdump -r FILE can interpret them for us.
|
2001-06-19 20:57:55 +04:00
|
|
|
int n = fwrite (rxbuf, nbytes, 1, ne2klog);
|
|
|
|
if (n != 1) BX_ERROR (("fwrite to ne2klog failed", nbytes));
|
2001-06-19 20:09:13 +04:00
|
|
|
// dump packet in hex into an ascii log file
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (this->ne2klog_txt, "NE2K RX packet, length %u\n", nbytes);
|
2001-06-19 20:09:13 +04:00
|
|
|
Bit8u *charrxbuf = (Bit8u *)rxbuf;
|
|
|
|
for (n=0; n<nbytes; n++) {
|
|
|
|
if (((n % 16) == 0) && n>0)
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (this->ne2klog_txt, "\n");
|
|
|
|
fprintf (this->ne2klog_txt, "%02x ", rxbuf[n]);
|
2001-06-19 20:09:13 +04:00
|
|
|
}
|
2001-06-19 20:57:55 +04:00
|
|
|
fprintf (this->ne2klog_txt, "\n--\n");
|
2001-06-19 20:09:13 +04:00
|
|
|
// flush log so that we see the packets as they arrive w/o buffering
|
2001-06-19 20:57:55 +04:00
|
|
|
fflush (this->ne2klog);
|
|
|
|
fflush (this->ne2klog_txt);
|
2001-06-19 20:09:13 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
|
|
|
}
|
2001-06-18 03:08:27 +04:00
|
|
|
#endif
|
|
|
|
|