mirror of
https://github.com/the-tcpdump-group/tcpdump.git
synced 2024-11-27 03:53:53 +08:00
5faefb7542
It should rarely be called (if it's called, either the packet was cut short by snapshot-based slicing or it's malformed, or the dissector has a bug), so inlining it doesn't help much, and, as it calls longjmp(), which often expands to a call to __builtin_longjmp(), GCC won't inline it anyway (see "An Inline Function is As Fast As a Macro" in the GCC documentation), and Apple clang version 14.0.3 (clang-1403.0.22.14.1), at least, doesn't inline it, either, so you get a bunch of inlined definitions of it throughout the generated code. Just make it a regular routine.
316 lines
8.2 KiB
C
316 lines
8.2 KiB
C
/*
|
|
* Copyright (c) 1988-1997
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Copyright (c) 1998-2012 Michael Richardson <mcr@tcpdump.org>
|
|
* The TCPDUMP project
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
* distributions including binary code include the above copyright notice and
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
* features or use of this software display the following acknowledgement:
|
|
* ``This product includes software developed by the University of California,
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
* the University nor the names of its contributors may be used to endorse
|
|
* or promote products derived from this software without specific prior
|
|
* written permission.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include "netdissect-stdinc.h"
|
|
#include "netdissect.h"
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#ifdef USE_LIBSMI
|
|
#include <smi.h>
|
|
#endif
|
|
|
|
/*
|
|
* Initialize anything that must be initialized before dissecting
|
|
* packets.
|
|
*
|
|
* This should be called at the beginning of the program; it does
|
|
* not need to be called, and should not be called, for every
|
|
* netdissect_options structure.
|
|
*/
|
|
int
|
|
nd_init(char *errbuf, size_t errbuf_size)
|
|
{
|
|
#ifdef _WIN32
|
|
WORD wVersionRequested;
|
|
WSADATA wsaData;
|
|
int err;
|
|
|
|
/*
|
|
* Request Winsock 2.2; we expect Winsock 2.
|
|
*/
|
|
wVersionRequested = MAKEWORD(2, 2);
|
|
err = WSAStartup(wVersionRequested, &wsaData);
|
|
if (err != 0) {
|
|
strlcpy(errbuf, "Attempting to initialize Winsock failed",
|
|
errbuf_size);
|
|
return (-1);
|
|
}
|
|
#endif /* _WIN32 */
|
|
|
|
#ifdef USE_LIBSMI
|
|
/*
|
|
* XXX - should we just fail if this fails? Some of the
|
|
* libsmi calls may fail.
|
|
*/
|
|
smiInit("tcpdump");
|
|
#endif
|
|
|
|
/*
|
|
* Clears the error buffer, and uses it so we don't get
|
|
* "unused argument" warnings at compile time.
|
|
*/
|
|
strlcpy(errbuf, "", errbuf_size);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Clean up anything that ndo_init() did.
|
|
*/
|
|
void
|
|
nd_cleanup(void)
|
|
{
|
|
#ifdef USE_LIBSMI
|
|
/*
|
|
* This appears, in libsmi 0.4.8, to do nothing if smiInit()
|
|
* wasn't done or failed, so we call it unconditionally.
|
|
*/
|
|
smiExit();
|
|
#endif
|
|
|
|
#ifdef _WIN32
|
|
/*
|
|
* Undo the WSAStartup() call above.
|
|
*/
|
|
WSACleanup();
|
|
#endif
|
|
}
|
|
|
|
int
|
|
nd_have_smi_support(void)
|
|
{
|
|
#ifdef USE_LIBSMI
|
|
return (1);
|
|
#else
|
|
return (0);
|
|
#endif
|
|
}
|
|
|
|
/*
|
|
* Indicates whether an SMI module has been loaded, so that we can use
|
|
* libsmi to translate OIDs.
|
|
*/
|
|
int nd_smi_module_loaded;
|
|
|
|
int
|
|
nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size)
|
|
{
|
|
#ifdef USE_LIBSMI
|
|
if (smiLoadModule(module) == 0) {
|
|
snprintf(errbuf, errbuf_size, "could not load MIB module %s",
|
|
module);
|
|
return (-1);
|
|
}
|
|
nd_smi_module_loaded = 1;
|
|
return (0);
|
|
#else
|
|
snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support",
|
|
module);
|
|
return (-1);
|
|
#endif
|
|
}
|
|
|
|
const char *
|
|
nd_smi_version_string(void)
|
|
{
|
|
#ifdef USE_LIBSMI
|
|
return (smi_version_string);
|
|
#else
|
|
return (NULL);
|
|
#endif
|
|
}
|
|
|
|
|
|
int
|
|
nd_push_buffer(netdissect_options *ndo, u_char *new_buffer,
|
|
const u_char *new_packetp, const u_int newlen)
|
|
{
|
|
struct netdissect_saved_packet_info *ndspi;
|
|
|
|
ndspi = (struct netdissect_saved_packet_info *)malloc(sizeof(struct netdissect_saved_packet_info));
|
|
if (ndspi == NULL)
|
|
return (0); /* fail */
|
|
ndspi->ndspi_buffer = new_buffer;
|
|
ndspi->ndspi_packetp = ndo->ndo_packetp;
|
|
ndspi->ndspi_snapend = ndo->ndo_snapend;
|
|
ndspi->ndspi_prev = ndo->ndo_packet_info_stack;
|
|
|
|
ndo->ndo_packetp = new_packetp;
|
|
ndo->ndo_snapend = new_packetp + newlen;
|
|
ndo->ndo_packet_info_stack = ndspi;
|
|
|
|
return (1); /* success */
|
|
}
|
|
|
|
|
|
/*
|
|
* In a given netdissect_options structure:
|
|
*
|
|
* push the current packet information onto the packet information
|
|
* stack;
|
|
*
|
|
* given a pointer into the packet and a length past that point in
|
|
* the packet, calculate a new snapshot end that's at the lower
|
|
* of the current snapshot end and that point in the packet;
|
|
*
|
|
* set the snapshot end to that new value.
|
|
*/
|
|
int
|
|
nd_push_snaplen(netdissect_options *ndo, const u_char *bp, const u_int newlen)
|
|
{
|
|
struct netdissect_saved_packet_info *ndspi;
|
|
u_int snaplen_remaining;
|
|
|
|
ndspi = (struct netdissect_saved_packet_info *)malloc(sizeof(struct netdissect_saved_packet_info));
|
|
if (ndspi == NULL)
|
|
return (0); /* fail */
|
|
ndspi->ndspi_buffer = NULL; /* no new buffer */
|
|
ndspi->ndspi_packetp = ndo->ndo_packetp;
|
|
ndspi->ndspi_snapend = ndo->ndo_snapend;
|
|
ndspi->ndspi_prev = ndo->ndo_packet_info_stack;
|
|
|
|
/*
|
|
* Push the saved previous data onto the stack.
|
|
*/
|
|
ndo->ndo_packet_info_stack = ndspi;
|
|
|
|
/*
|
|
* Find out how many bytes remain after the current snapend.
|
|
*
|
|
* We're restricted to packets with at most UINT_MAX bytes;
|
|
* cast the result to u_int, so that we don't get truncation
|
|
* warnings on LP64 and LLP64 platforms. (ptrdiff_t is
|
|
* signed and we want an unsigned difference; the pointer
|
|
* should at most be equal to snapend, and must *never*
|
|
* be past snapend.)
|
|
*/
|
|
snaplen_remaining = (u_int)(ndo->ndo_snapend - bp);
|
|
|
|
/*
|
|
* If the new snapend is smaller than the one calculated
|
|
* above, set the snapend to that value, otherwise leave
|
|
* it unchanged.
|
|
*/
|
|
if (newlen <= snaplen_remaining) {
|
|
/* Snapend isn't past the previous snapend */
|
|
ndo->ndo_snapend = bp + newlen;
|
|
}
|
|
|
|
return (1); /* success */
|
|
}
|
|
|
|
/*
|
|
* In a given netdissect_options structure:
|
|
*
|
|
* given a pointer into the packet and a length past that point in
|
|
* the packet, calculate a new snapshot end that's at the lower
|
|
* of the previous snapshot end - or, if there is no previous
|
|
* snapshot end, the current snapshot end - and that point in the
|
|
* packet;
|
|
*
|
|
* set the snapshot end to that new value.
|
|
*
|
|
* This is to change the current snapshot end. This may increase the
|
|
* snapshot end, as it may be used, for example, for a Jumbo Payload
|
|
* option in IPv6. It must not increase it past the snapshot length
|
|
* atop which the current one was pushed, however.
|
|
*/
|
|
void
|
|
nd_change_snaplen(netdissect_options *ndo, const u_char *bp, const u_int newlen)
|
|
{
|
|
struct netdissect_saved_packet_info *ndspi;
|
|
const u_char *previous_snapend;
|
|
u_int snaplen_remaining;
|
|
|
|
ndspi = ndo->ndo_packet_info_stack;
|
|
if (ndspi->ndspi_prev != NULL)
|
|
previous_snapend = ndspi->ndspi_prev->ndspi_snapend;
|
|
else
|
|
previous_snapend = ndo->ndo_snapend;
|
|
|
|
/*
|
|
* Find out how many bytes remain after the previous
|
|
* snapend - or, if there is no previous snapend, after
|
|
* the current snapend.
|
|
*
|
|
* We're restricted to packets with at most UINT_MAX bytes;
|
|
* cast the result to u_int, so that we don't get truncation
|
|
* warnings on LP64 and LLP64 platforms. (ptrdiff_t is
|
|
* signed and we want an unsigned difference; the pointer
|
|
* should at most be equal to snapend, and must *never*
|
|
* be past snapend.)
|
|
*/
|
|
snaplen_remaining = (u_int)(previous_snapend - bp);
|
|
|
|
/*
|
|
* If the new snapend is smaller than the one calculated
|
|
* above, set the snapend to that value, otherwise leave
|
|
* it unchanged.
|
|
*/
|
|
if (newlen <= snaplen_remaining) {
|
|
/* Snapend isn't past the previous snapend */
|
|
ndo->ndo_snapend = bp + newlen;
|
|
}
|
|
}
|
|
|
|
void
|
|
nd_pop_packet_info(netdissect_options *ndo)
|
|
{
|
|
struct netdissect_saved_packet_info *ndspi;
|
|
|
|
ndspi = ndo->ndo_packet_info_stack;
|
|
ndo->ndo_packetp = ndspi->ndspi_packetp;
|
|
ndo->ndo_snapend = ndspi->ndspi_snapend;
|
|
ndo->ndo_packet_info_stack = ndspi->ndspi_prev;
|
|
|
|
free(ndspi->ndspi_buffer);
|
|
free(ndspi);
|
|
}
|
|
|
|
void
|
|
nd_pop_all_packet_info(netdissect_options *ndo)
|
|
{
|
|
while (ndo->ndo_packet_info_stack != NULL)
|
|
nd_pop_packet_info(ndo);
|
|
}
|
|
|
|
NORETURN void
|
|
nd_trunc_longjmp(netdissect_options *ndo)
|
|
{
|
|
longjmp(ndo->ndo_early_end, ND_TRUNCATED);
|
|
#ifdef _AIX
|
|
/*
|
|
* In AIX <setjmp.h> decorates longjmp() with "#pragma leaves", which tells
|
|
* XL C that the function is noreturn, but GCC remains unaware of that and
|
|
* yields a "'noreturn' function does return" warning.
|
|
*/
|
|
ND_UNREACHABLE
|
|
#endif /* _AIX */
|
|
}
|