354 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			354 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
| 		    How to write a libpcap module
 | |
| 
 | |
| WARNING: this document describes an unstable interface; future releases
 | |
| of libpcap may, and some probably will, change the interface in an
 | |
| incompatible fashion.  If you submit your module to the libpcap
 | |
| developers for inclusion in libpcap, not only does that make it more
 | |
| likely that it will be available in the libpcap provided by operating
 | |
| system vendors (such as Linux distributions), but it also means that we
 | |
| will attempt to update it to handle future changes to this interface.
 | |
| If we add new capabilities, we may have to ask you how to provide those
 | |
| additional capabilities if you're using an underlying mechanism for
 | |
| which we have neither the source code nor the documentation.
 | |
| 
 | |
| NOTE: this document assumes familiarity with the entire libpcap API.
 | |
| 
 | |
| TODO: more routines, more stuff that the activate routine has to do
 | |
| (such as setting the list of DLT_s), convert to Markdown?
 | |
| 
 | |
| On Linux, *BSD, macOS, Solaris, AIX, HP-UX, IRIX, and Tru64 UNIX,
 | |
| Libpcap supports capturing on network interfaces as supported by the
 | |
| operating system networking stack, using the native packet capture
 | |
| mechanism provided by the OS.  On Windows, it supports it with the help
 | |
| of the driver and library supplied by WinPcap and Npcap.
 | |
| 
 | |
| In addition, it also supports capturing on other types of devices, such
 | |
| as:
 | |
| 
 | |
| 	specialized capture cards, such as Endace DAG cards;
 | |
| 
 | |
| 	network adapters that provide special high-performance code
 | |
| 	paths, such as CSPI Myricom adapters;
 | |
| 
 | |
| 	buses such as USB;
 | |
| 
 | |
| 	software communication channels such as D-Bus and Linux netlink;
 | |
| 
 | |
| 	etc..
 | |
| 
 | |
| Support for those devices is provided by modules compiled into libpcap.
 | |
| 
 | |
| If you want to add such a module, you would first have to check the list
 | |
| of link-layer header types supported by libpcap, to see if one of those
 | |
| would be sufficient for your device.  The current version of the list
 | |
| can be found at
 | |
| 
 | |
| 	https://www.tcpdump.org/linktypes.html
 | |
| 
 | |
| If none of those would work for your device, please read
 | |
| doc/DLT_ALLOCATE_HOWTO.md and the introductory paragraphs on the Web
 | |
| page mentioned above, and then send a request for the new link-layer
 | |
| header type to tcpdump-workers@lists.tcpdump.org.
 | |
| 
 | |
| Once you have a link-layer header type value or values that you can use,
 | |
| you can add new module.
 | |
| 
 | |
| The module should be a C source file, with a name of the form
 | |
| pcap-{MOD}.c, where {MOD} is a name appropriate for your device; for
 | |
| example, the support for DAG cards is in pcap-dag.c, and the support for
 | |
| capturing USB traffic on Linux is pcap-usb-linux.c.
 | |
| 
 | |
| Your module is assumed to support one or more named devices.  The names
 | |
| should be relatively short names, containing only lower-case
 | |
| alphanumeric characters, consisting of a prefix that ends with an
 | |
| alphabetic character and, if there can be more than one device instance,
 | |
| possibly followed by a numerical device ID, such as "mydevice" or
 | |
| "mydevice0"/"mydevice1"/....  If you have more than one type of device
 | |
| that you can support, you can have more than one prefix, each of which
 | |
| can be followed by a numerical device ID.
 | |
| 
 | |
| The two exported functions that your module must provide are routines to
 | |
| provide a list of device instances and a program to initialize a
 | |
| created-but-not-activated pcap_t for an instance of one of your devices.
 | |
| 
 | |
| The "list of device instances" routine takes, as arguments:
 | |
| 
 | |
| 	a pointer to a pcap_if_list_t;
 | |
| 
 | |
| 	a pointer to an error message buffer.
 | |
| 
 | |
| The error message buffer may be assumed to be PCAP_ERRBUF_SIZE bytes
 | |
| large, but must not be assumed to be larger.  By convention, the routine
 | |
| typically has a name containing "findalldevs".
 | |
| 
 | |
| The routine should attempt to determine what device instances are
 | |
| available and add them to the list pointed to by the first argument;
 | |
| this may be impossible for some modules, but, for those modules, it may
 | |
| be difficult to capture on the devices using Wirehshark (although it
 | |
| should be possible to capture on them using tcpdump, TShark, or other
 | |
| programs that take a device name on the command line), so we recommend
 | |
| that your routine provide the list of devices if possible.  If it
 | |
| cannot, it should just immediately return 0.
 | |
| 
 | |
| The routine should add devices to the list by calling the add_dev()
 | |
| routine in libpcap, declared in the pcap-int.h header.  It takes, as
 | |
| arguments:
 | |
| 
 | |
| 	the pointer to the pcap_if_list_t passed as an argument to the
 | |
| 	routine;
 | |
| 
 | |
| 	the device name, as described above;
 | |
| 
 | |
| 	a 32-bit word of flags, as provided by pcap_findalldevs();
 | |
| 
 | |
| 	a text description of the device, or NULL if there is no
 | |
| 	description;
 | |
| 
 | |
| 	the error message buffer pointer provided to the routine.
 | |
| 
 | |
| add_dev() will, if it succeeds, return a pointer to a pcap_if_t that was
 | |
| added to the list of devices.  If it fails, it will return NULL; in this
 | |
| case, the error message buffer has been filled in with an error string,
 | |
| and your routine must return -1 to indicate the error.
 | |
| 
 | |
| If your routine succeeds, it must return 0.  If it fails, it must fill
 | |
| in the error message buffer with an error string and return -1.
 | |
| 
 | |
| The "initialize the pcap_t" routine takes, as arguments:
 | |
| 
 | |
| 	a pointer to a device name;
 | |
| 
 | |
| 	a pointer to an error message buffer;
 | |
| 
 | |
| 	a pointer to an int.
 | |
| 
 | |
| It returns a pointer to a pcap_t.
 | |
| 
 | |
| Your module will probably need, for each pcap_t for an opened device, a
 | |
| private data structure to maintain its own information about the opened
 | |
| device.  These should be allocated per opened instance, not per device;
 | |
| if, for example, mydevice0 can be captured on by more than one program
 | |
| at the same time, there will be more than one pcap_t opened for
 | |
| mydevice0, and so there will be separate private data structures for
 | |
| each pcap_t.  If you need to maintain per-device, rather than per-opened
 | |
| instance information, you will have to maintain that yourself.
 | |
| 
 | |
| The routine should first check the device to see whether it looks like a
 | |
| device that this module would handle; for example, it should begin with
 | |
| one of the device name prefixes for your module and, if your devices
 | |
| have instance numbers, be followed by a number.  If it is not one of
 | |
| those devices, you must set the integer pointed to by the third
 | |
| argument to 0, to indicate that this is *not* one of the devices for
 | |
| your module, and return NULL.
 | |
| 
 | |
| If it *is* one of those devices, it should call pcap_create_common,
 | |
| passing to it the error message buffer as the first argument and the
 | |
| size of the per-opened instance data structure as the second argument.
 | |
| If it fails, it will return NULL; you must return NULL in this case.
 | |
| 
 | |
| If it succeeds, the pcap_t pointed to by the return value has been
 | |
| partially initialized, but you will need to complete the process.  It
 | |
| has a "priv" member, which is a void * that points to the private data
 | |
| structure attached to it; that structure has been initialized to zeroes.
 | |
| 
 | |
| What you need to set are some function pointers to your routines to
 | |
| handle certain operations:
 | |
| 
 | |
| 	activate_op
 | |
| 		the routine called when pcap_activate() is done on the
 | |
| 		pcap_t
 | |
| 
 | |
| 	can_set_rfmon_op
 | |
| 		the routine called when pcap_can_set_rfmon() is done on
 | |
| 		the pcap_t - if your device doesn't support 802.11
 | |
| 		monitor mode, you can leave this as initialized by
 | |
| 		pcap_create_common(), as that routine will return "no,
 | |
| 		monitor mode isn't supported".
 | |
| 
 | |
| Once you've set the activate_op and, if necessary, the can_set_rfmon_op,
 | |
| you must return the pcap_t * that was returned to you.
 | |
| 
 | |
| Your activate routine takes, as an argument, a pointer to the pcap_t
 | |
| being activated, and returns an int.
 | |
| 
 | |
| The perameters set for the device in the pcap_create() call, and after
 | |
| that call(), are mostly in the opt member of the pcap_t:
 | |
| 
 | |
| 	device
 | |
| 		the name of the device
 | |
| 
 | |
| 	timeout
 | |
| 		the buffering timeout, in milliseconds
 | |
| 
 | |
| 	buffer_size
 | |
| 		the buffer size to use
 | |
| 
 | |
| 	promisc
 | |
| 		1 if promiscuous mode is to be used, 0 otherwise
 | |
| 
 | |
| 	rfmon
 | |
| 		1 if monitor mode is to be used, 0 otherwise
 | |
| 
 | |
| 	immediate
 | |
| 		1 if the device should be in immediate mode, 0 otherwise
 | |
| 
 | |
| 	nonblock
 | |
| 		1 if the device should be in non-blocking mode, 0
 | |
| 		otherwise
 | |
| 
 | |
| 	tstamp_type
 | |
| 		the type of time stamp to supply
 | |
| 
 | |
| 	tstamp_precision
 | |
| 		the time stamp precision to supply
 | |
| 
 | |
| The snapshot member of the pcap_t structure will contain the snapshot
 | |
| length to be used.
 | |
| 
 | |
| Your routine should attempt to set up the device for capturing.  If it
 | |
| fails, it must return an error indication which is one of the PCAP_ERROR
 | |
| values.  For PCAP_ERROR, it must also set the errbuf member of the
 | |
| pcap_t to an error string.  For PCAP_ERROR_NO_SUCH_DEVICE and
 | |
| PCAP_ERROR_PERM_DENIED, it may set it to an error string providing
 | |
| additional information that may be useful for debugging, or may just
 | |
| leave it as a null string.
 | |
| 
 | |
| If it succeeds, it must set certain function pointers in the pcap_t
 | |
| structure:
 | |
| 
 | |
| 	read_op
 | |
| 		called whenever packets are to be read
 | |
| 
 | |
| 	inject_op
 | |
| 		called whenever packets are to be injected
 | |
| 
 | |
| 	setfilter_op
 | |
| 		called whenever pcap_setfilter() is called
 | |
| 
 | |
| 	setdirection_op
 | |
| 		called whenever pcap_setdirection() is called
 | |
| 
 | |
| 	set_datalink_op
 | |
| 		called whnever pcap_set_datalink() is called
 | |
| 
 | |
| 	getnonblock_op
 | |
| 		called whenever pcap_getnonblock() is called
 | |
| 
 | |
| 	setnonblock_op
 | |
| 		called whenever pcap_setnonblock() is called
 | |
| 
 | |
| 	stats_op
 | |
| 		called whenever pcap_stats() is called
 | |
| 
 | |
| 	cleanup_op
 | |
| 		called if the activate routine fails or pcap_close() is
 | |
| 		called
 | |
| 
 | |
| and must also set the linktype member to the DLT_ value for the device.
 | |
| 
 | |
| On UN*Xes, if the device supports waiting for packets to arrive with
 | |
| select()/poll()/epoll()/kqueues etc., it should set the selectable_fd
 | |
| member of the structure to the descriptor you would use with those
 | |
| calls.  If it does not, then, if that's because the device polls for
 | |
| packets rather than receiving interrupts or other signals when packets
 | |
| arrive, it should have a struct timeval in the private data structure,
 | |
| set the value of that struct timeval to the poll timeout, and set the
 | |
| required_select_timeout member of the pcap_t to point to the struct
 | |
| timeval.
 | |
| 
 | |
| The read_op routine is called when pcap_dispatch(), pcap_loop(),
 | |
| pcap_next(), or pcap_next_ex() is called.  It is passed the same
 | |
| arguments as pcap_dispatch() is called.
 | |
| 
 | |
| The routine should first check if the break_loop member of the pcap_t is
 | |
| non-zero and, if so, set that member to zero and return
 | |
| PCAP_ERROR_BREAK.
 | |
| 
 | |
| Then, if the pcap_t is in blocking mode (as opposed to non-blocking
 | |
| mode), and there are no packets immediately available to be passed to
 | |
| the callback, it should block waiting for packets to arrive, using the
 | |
| buffering timeout, first, and read packets from the device if necessary.
 | |
| 
 | |
| Then it should loop through the available packets, calling the callback
 | |
| routine for each packet:
 | |
| 
 | |
| 	If the PACKET_COUNT_IS_UNLIMITED() macro evaluates to true when
 | |
| 	passed the packet count argument, the loop should continue until
 | |
| 	there are no more packets immediately available or the
 | |
| 	break_loop member of the pcap_t is non-zero.  If the break_loop
 | |
| 	member is fount to be non-zero, it should set that member to
 | |
| 	zero and return PCAP_ERROR_BREAK.
 | |
| 
 | |
| 	If it doesn't evaluat to true, then the loop should also
 | |
| 	terminate if the specified number of packets have been delivered
 | |
| 	to the callback.
 | |
| 
 | |
| Note that there is *NO* requirement that the packet header or data
 | |
| provided to the callback remain available, or valid, after the callback
 | |
| routine returns; if the callback needs to save the data for other code
 | |
| to use, it must make a copy of that data.  This means that the module is
 | |
| free to, for example, overwrite the buffer into which it read the
 | |
| packet, or release back to the kernel a packet in a memory-mapped
 | |
| buffer shared between the kernel and userland, after the callback
 | |
| returns.
 | |
| 
 | |
| If an error occurs when reading packets from the device, it must set the
 | |
| errbuf member of the pcap_t to an error string and return PCAP_ERROR.
 | |
| 
 | |
| If no error occurs, it must return the number of packets that were
 | |
| supplied to the callback routine.
 | |
| 
 | |
| The inject routine is passed a pointer to the pcap_t, a buffer
 | |
| containing the contents of the packet to inject, and the number of bytes
 | |
| in the packet.  If the device doesn't support packet injection, the
 | |
| routine must set the errbuf member of the pcap_t to a message indicating
 | |
| that packet injection isn't supported and return PCAP_ERROR.  Otherwise,
 | |
| it should attempt to inject the packet; if the attempt fails, it must
 | |
| set the errbuf member of the pcap_t to an error message and return
 | |
| PCAP_ERROR.  Otherwise, it should return the number of bytes injected.
 | |
| 
 | |
| The setfilter routine is passed a pointer to the pcap_t and a pointer
 | |
| to a struct bpf_program containing a BPF program to be used as a filter.
 | |
| If the mechanism used by your module can perform filtering with a BPF
 | |
| program, it would attempt to set that filter to the specified program.
 | |
| 
 | |
| If that failed because the program was too large, or used BPF features
 | |
| not supported by that mechanism, the module should fall back on
 | |
| filtering in userland by saving a copy of the filter with a call to
 | |
| install_bpf_program(), setting a flag in the private data instructure
 | |
| indicating that filtering is being done by the module and, in the read
 | |
| routine's main loop, checking the flag and, if it's set, calling
 | |
| pcap_filter(), passing it the fcode.bf_insns member of the pcap_t, the
 | |
| raw packet data, the on-the-wire length of the packet, and the captured
 | |
| length of the packet, and only passing the packet to the callback
 | |
| routine, and counting it, if pcap_filter() returns a non-zero value.
 | |
| (If the flag is not set, all packets should be passed to the callback
 | |
| routine and counted, as the filtering is being done by the mechanism
 | |
| used by the module.)  If install_bpf_program() returns a negative value,
 | |
| the routine should return PCAP_ERROR.
 | |
| 
 | |
| If the attempt to set the filter failed for any other reason, the
 | |
| routine must set the errbuf member of the pcap_t to an error message and
 | |
| return PCAP_ERROR.
 | |
| 
 | |
| If the attempt to set the filter succeeded, or it failed because the
 | |
| mechanism used by the module rejected it and the call to
 | |
| install_bpf_program() succeeded, the routine should return 0.
 | |
| 
 | |
| If the mechanism the module uses doesn't support filtering, the pointer
 | |
| to the setfilter routine can just be set to point to
 | |
| install_bpf_program; the module does not need a routine of its own to
 | |
| handle that.
 | |
| 
 | |
| The setdirection routine is passed a pointer to the pcap_t and a
 | |
| pcap_direction_t indicating which packet directions should be accepted.
 | |
| If the module can't arrange to handle only incoming packets or only
 | |
| outgoing packets, it can set the pointer to the setdirection routine to
 | |
| NULL, and calls to pcap_setdirection() will fail with an error message
 | |
| indicating that setting the direction isn't supported.
 | |
| 
 | |
| XXX describe set_datalink, including what the activate routine has to do
 | |
| XXX
 | |
| 
 | |
| XXX describe the rest of the routines XXX
 |