1 /* 2 * pcap-dag.c: Packet capture interface for Endace DAG card. 3 * 4 * The functionality of this code attempts to mimic that of pcap-linux as much 5 * as possible. This code is compiled in several different ways depending on 6 * whether DAG_ONLY and HAVE_DAG_API are defined. If HAVE_DAG_API is not 7 * defined it should not get compiled in, otherwise if DAG_ONLY is defined then 8 * the 'dag_' function calls are renamed to 'pcap_' equivalents. If DAG_ONLY 9 * is not defined then nothing is altered - the dag_ functions will be 10 * called as required from their pcap-linux/bpf equivalents. 11 * 12 * Authors: Richard Littin, Sean Irvine ({richard,sean}@reeltwo.com) 13 * Modifications: Jesper Peterson, Koryn Grant <support@endace.com> 14 */ 15 16 #ifndef lint 17 static const char rcsid[] _U_ = 18 "@(#) $Header: /tcpdump/master/libpcap/pcap-dag.c,v 1.21.2.1 2005/05/03 18:54:35 guy Exp $ (LBL)"; 19 #endif 20 21 #ifdef HAVE_CONFIG_H 22 #include "config.h" 23 #endif 24 25 #include <sys/param.h> /* optionally get BSD define */ 26 27 #include <stdlib.h> 28 #include <string.h> 29 #include <errno.h> 30 31 #include "pcap-int.h" 32 33 #include <ctype.h> 34 #include <netinet/in.h> 35 #include <sys/mman.h> 36 #include <sys/socket.h> 37 #include <sys/types.h> 38 #include <unistd.h> 39 40 struct mbuf; /* Squelch compiler warnings on some platforms for */ 41 struct rtentry; /* declarations in <net/if.h> */ 42 #include <net/if.h> 43 44 #include "dagnew.h" 45 #include "dagapi.h" 46 47 #define MIN_DAG_SNAPLEN 12 48 #define MAX_DAG_SNAPLEN 2040 49 #define ATM_CELL_SIZE 52 50 #define ATM_HDR_SIZE 4 51 52 /* SunATM pseudo header */ 53 struct sunatm_hdr { 54 unsigned char flags; /* destination and traffic type */ 55 unsigned char vpi; /* VPI */ 56 unsigned short vci; /* VCI */ 57 }; 58 59 typedef struct pcap_dag_node { 60 struct pcap_dag_node *next; 61 pcap_t *p; 62 pid_t pid; 63 } pcap_dag_node_t; 64 65 static pcap_dag_node_t *pcap_dags = NULL; 66 static int atexit_handler_installed = 0; 67 static const unsigned short endian_test_word = 0x0100; 68 69 #define IS_BIGENDIAN() (*((unsigned char *)&endian_test_word)) 70 71 /* 72 * Swap byte ordering of unsigned long long timestamp on a big endian 73 * machine. 74 */ 75 #define SWAP_TS(ull) ((ull & 0xff00000000000000LL) >> 56) | \ 76 ((ull & 0x00ff000000000000LL) >> 40) | \ 77 ((ull & 0x0000ff0000000000LL) >> 24) | \ 78 ((ull & 0x000000ff00000000LL) >> 8) | \ 79 ((ull & 0x00000000ff000000LL) << 8) | \ 80 ((ull & 0x0000000000ff0000LL) << 24) | \ 81 ((ull & 0x000000000000ff00LL) << 40) | \ 82 ((ull & 0x00000000000000ffLL) << 56) 83 84 85 #ifdef DAG_ONLY 86 /* This code is required when compiling for a DAG device only. */ 87 #include "pcap-dag.h" 88 89 /* Replace dag function names with pcap equivalent. */ 90 #define dag_open_live pcap_open_live 91 #define dag_platform_finddevs pcap_platform_finddevs 92 #endif /* DAG_ONLY */ 93 94 static int dag_setfilter(pcap_t *p, struct bpf_program *fp); 95 static int dag_stats(pcap_t *p, struct pcap_stat *ps); 96 static int dag_set_datalink(pcap_t *p, int dlt); 97 static int dag_get_datalink(pcap_t *p); 98 static int dag_setnonblock(pcap_t *p, int nonblock, char *errbuf); 99 100 static void 101 delete_pcap_dag(pcap_t *p) 102 { 103 pcap_dag_node_t *curr = NULL, *prev = NULL; 104 105 for (prev = NULL, curr = pcap_dags; curr != NULL && curr->p != p; prev = curr, curr = curr->next) { 106 /* empty */ 107 } 108 109 if (curr != NULL && curr->p == p) { 110 if (prev != NULL) { 111 prev->next = curr->next; 112 } else { 113 pcap_dags = curr->next; 114 } 115 } 116 } 117 118 /* 119 * Performs a graceful shutdown of the DAG card, frees dynamic memory held 120 * in the pcap_t structure, and closes the file descriptor for the DAG card. 121 */ 122 123 static void 124 dag_platform_close(pcap_t *p) 125 { 126 127 #ifdef linux 128 if (p != NULL && p->md.device != NULL) { 129 if(dag_stop(p->fd) < 0) 130 fprintf(stderr,"dag_stop %s: %s\n", p->md.device, strerror(errno)); 131 if(dag_close(p->fd) < 0) 132 fprintf(stderr,"dag_close %s: %s\n", p->md.device, strerror(errno)); 133 134 free(p->md.device); 135 } 136 #else 137 if (p != NULL) { 138 if(dag_stop(p->fd) < 0) 139 fprintf(stderr,"dag_stop: %s\n", strerror(errno)); 140 if(dag_close(p->fd) < 0) 141 fprintf(stderr,"dag_close: %s\n", strerror(errno)); 142 } 143 #endif 144 delete_pcap_dag(p); 145 /* Note: don't need to call close(p->fd) here as dag_close(p->fd) does this. */ 146 } 147 148 static void 149 atexit_handler(void) 150 { 151 while (pcap_dags != NULL) { 152 if (pcap_dags->pid == getpid()) { 153 dag_platform_close(pcap_dags->p); 154 } else { 155 delete_pcap_dag(pcap_dags->p); 156 } 157 } 158 } 159 160 static int 161 new_pcap_dag(pcap_t *p) 162 { 163 pcap_dag_node_t *node = NULL; 164 165 if ((node = malloc(sizeof(pcap_dag_node_t))) == NULL) { 166 return -1; 167 } 168 169 if (!atexit_handler_installed) { 170 atexit(atexit_handler); 171 atexit_handler_installed = 1; 172 } 173 174 node->next = pcap_dags; 175 node->p = p; 176 node->pid = getpid(); 177 178 pcap_dags = node; 179 180 return 0; 181 } 182 183 /* 184 * Read at most max_packets from the capture stream and call the callback 185 * for each of them. Returns the number of packets handled, -1 if an 186 * error occured, or -2 if we were told to break out of the loop. 187 */ 188 static int 189 dag_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) 190 { 191 unsigned int processed = 0; 192 int flags = p->md.dag_offset_flags; 193 unsigned int nonblocking = flags & DAGF_NONBLOCK; 194 195 for (;;) 196 { 197 /* Get the next bufferful of packets (if necessary). */ 198 while (p->md.dag_mem_top - p->md.dag_mem_bottom < dag_record_size) { 199 200 /* 201 * Has "pcap_breakloop()" been called? 202 */ 203 if (p->break_loop) { 204 /* 205 * Yes - clear the flag that indicates that 206 * it has, and return -2 to indicate that 207 * we were told to break out of the loop. 208 */ 209 p->break_loop = 0; 210 return -2; 211 } 212 213 p->md.dag_mem_top = dag_offset(p->fd, &(p->md.dag_mem_bottom), flags); 214 if (nonblocking && (p->md.dag_mem_top - p->md.dag_mem_bottom < dag_record_size)) 215 { 216 /* Pcap is configured to process only available packets, and there aren't any. */ 217 return 0; 218 } 219 } 220 221 /* Process the packets. */ 222 while (p->md.dag_mem_top - p->md.dag_mem_bottom >= dag_record_size) { 223 224 unsigned short packet_len = 0; 225 int caplen = 0; 226 struct pcap_pkthdr pcap_header; 227 228 dag_record_t *header = (dag_record_t *)(p->md.dag_mem_base + p->md.dag_mem_bottom); 229 u_char *dp = ((u_char *)header) + dag_record_size; 230 unsigned short rlen; 231 232 /* 233 * Has "pcap_breakloop()" been called? 234 */ 235 if (p->break_loop) { 236 /* 237 * Yes - clear the flag that indicates that 238 * it has, and return -2 to indicate that 239 * we were told to break out of the loop. 240 */ 241 p->break_loop = 0; 242 return -2; 243 } 244 245 rlen = ntohs(header->rlen); 246 if (rlen < dag_record_size) 247 { 248 strncpy(p->errbuf, "dag_read: record too small", PCAP_ERRBUF_SIZE); 249 return -1; 250 } 251 p->md.dag_mem_bottom += rlen; 252 253 switch(header->type) { 254 case TYPE_AAL5: 255 case TYPE_ATM: 256 if (header->type == TYPE_AAL5) { 257 packet_len = ntohs(header->wlen); 258 caplen = rlen - dag_record_size; 259 } else { 260 caplen = packet_len = ATM_CELL_SIZE; 261 } 262 if (p->linktype == DLT_SUNATM) { 263 struct sunatm_hdr *sunatm = (struct sunatm_hdr *)dp; 264 unsigned long rawatm; 265 266 rawatm = ntohl(*((unsigned long *)dp)); 267 sunatm->vci = htons((rawatm >> 4) & 0xffff); 268 sunatm->vpi = (rawatm >> 20) & 0x00ff; 269 sunatm->flags = ((header->flags.iface & 1) ? 0x80 : 0x00) | 270 ((sunatm->vpi == 0 && sunatm->vci == htons(5)) ? 6 : 271 ((sunatm->vpi == 0 && sunatm->vci == htons(16)) ? 5 : 272 ((dp[ATM_HDR_SIZE] == 0xaa && 273 dp[ATM_HDR_SIZE+1] == 0xaa && 274 dp[ATM_HDR_SIZE+2] == 0x03) ? 2 : 1))); 275 276 } else { 277 packet_len -= ATM_HDR_SIZE; 278 caplen -= ATM_HDR_SIZE; 279 dp += ATM_HDR_SIZE; 280 } 281 break; 282 283 case TYPE_ETH: 284 packet_len = ntohs(header->wlen); 285 packet_len -= (p->md.dag_fcs_bits >> 3); 286 caplen = rlen - dag_record_size - 2; 287 if (caplen > packet_len) { 288 caplen = packet_len; 289 } 290 dp += 2; 291 break; 292 293 case TYPE_HDLC_POS: 294 packet_len = ntohs(header->wlen); 295 packet_len -= (p->md.dag_fcs_bits >> 3); 296 caplen = rlen - dag_record_size; 297 if (caplen > packet_len) { 298 caplen = packet_len; 299 } 300 break; 301 } 302 303 if (caplen > p->snapshot) 304 caplen = p->snapshot; 305 306 /* Count lost packets. */ 307 if (header->lctr) { 308 if (p->md.stat.ps_drop > (UINT_MAX - ntohs(header->lctr))) { 309 p->md.stat.ps_drop = UINT_MAX; 310 } else { 311 p->md.stat.ps_drop += ntohs(header->lctr); 312 } 313 } 314 315 /* Run the packet filter if there is one. */ 316 if ((p->fcode.bf_insns == NULL) || bpf_filter(p->fcode.bf_insns, dp, packet_len, caplen)) { 317 318 /* convert between timestamp formats */ 319 register unsigned long long ts; 320 321 if (IS_BIGENDIAN()) { 322 ts = SWAP_TS(header->ts); 323 } else { 324 ts = header->ts; 325 } 326 327 pcap_header.ts.tv_sec = ts >> 32; 328 ts = (ts & 0xffffffffULL) * 1000000; 329 ts += 0x80000000; /* rounding */ 330 pcap_header.ts.tv_usec = ts >> 32; 331 if (pcap_header.ts.tv_usec >= 1000000) { 332 pcap_header.ts.tv_usec -= 1000000; 333 pcap_header.ts.tv_sec++; 334 } 335 336 /* Fill in our own header data */ 337 pcap_header.caplen = caplen; 338 pcap_header.len = packet_len; 339 340 /* Count the packet. */ 341 p->md.stat.ps_recv++; 342 343 /* Call the user supplied callback function */ 344 callback(user, &pcap_header, dp); 345 346 /* Only count packets that pass the filter, for consistency with standard Linux behaviour. */ 347 processed++; 348 if (processed == cnt) 349 { 350 /* Reached the user-specified limit. */ 351 return cnt; 352 } 353 } 354 } 355 356 if (nonblocking || processed) 357 { 358 return processed; 359 } 360 } 361 362 return processed; 363 } 364 365 static int 366 dag_inject(pcap_t *p, const void *buf _U_, size_t size _U_) 367 { 368 strlcpy(p->errbuf, "Sending packets isn't supported on DAG cards", 369 PCAP_ERRBUF_SIZE); 370 return (-1); 371 } 372 373 /* 374 * Get a handle for a live capture from the given DAG device. Passing a NULL 375 * device will result in a failure. The promisc flag is ignored because DAG 376 * cards are always promiscuous. The to_ms parameter is also ignored as it is 377 * not supported in hardware. 378 * 379 * See also pcap(3). 380 */ 381 pcap_t * 382 dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) 383 { 384 char conf[30]; /* dag configure string */ 385 pcap_t *handle; 386 char *s; 387 int n; 388 daginf_t* daginf; 389 390 if (device == NULL) { 391 snprintf(ebuf, PCAP_ERRBUF_SIZE, "device is NULL: %s", pcap_strerror(errno)); 392 return NULL; 393 } 394 /* Allocate a handle for this session. */ 395 396 handle = malloc(sizeof(*handle)); 397 if (handle == NULL) { 398 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno)); 399 return NULL; 400 } 401 402 /* Initialize some components of the pcap structure. */ 403 404 memset(handle, 0, sizeof(*handle)); 405 406 if (strstr(device, "/dev") == NULL) { 407 char * newDev = (char *)malloc(strlen(device) + 6); 408 newDev[0] = '\0'; 409 strcat(newDev, "/dev/"); 410 strcat(newDev,device); 411 device = newDev; 412 } else { 413 device = strdup(device); 414 } 415 416 if (device == NULL) { 417 snprintf(ebuf, PCAP_ERRBUF_SIZE, "str_dup: %s\n", pcap_strerror(errno)); 418 goto fail; 419 } 420 421 /* setup device parameters */ 422 if((handle->fd = dag_open((char *)device)) < 0) { 423 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_open %s: %s", device, pcap_strerror(errno)); 424 goto fail; 425 } 426 427 /* set the card snap length to the specified snaplen parameter */ 428 if (snaplen == 0 || snaplen > MAX_DAG_SNAPLEN) { 429 snaplen = MAX_DAG_SNAPLEN; 430 } else if (snaplen < MIN_DAG_SNAPLEN) { 431 snaplen = MIN_DAG_SNAPLEN; 432 } 433 /* snap len has to be a multiple of 4 */ 434 snprintf(conf, 30, "varlen slen=%d", (snaplen + 3) & ~3); 435 436 if(dag_configure(handle->fd, conf) < 0) { 437 snprintf(ebuf, PCAP_ERRBUF_SIZE,"dag_configure %s: %s\n", device, pcap_strerror(errno)); 438 goto fail; 439 } 440 441 if((handle->md.dag_mem_base = dag_mmap(handle->fd)) == MAP_FAILED) { 442 snprintf(ebuf, PCAP_ERRBUF_SIZE,"dag_mmap %s: %s\n", device, pcap_strerror(errno)); 443 goto fail; 444 } 445 446 if(dag_start(handle->fd) < 0) { 447 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_start %s: %s\n", device, pcap_strerror(errno)); 448 goto fail; 449 } 450 451 /* 452 * Important! You have to ensure bottom is properly 453 * initialized to zero on startup, it won't give you 454 * a compiler warning if you make this mistake! 455 */ 456 handle->md.dag_mem_bottom = 0; 457 handle->md.dag_mem_top = 0; 458 handle->md.dag_fcs_bits = 32; 459 460 /* Query the card first for special cases. */ 461 daginf = dag_info(handle->fd); 462 if ((0x4200 == daginf->device_code) || (0x4230 == daginf->device_code)) 463 { 464 /* DAG 4.2S and 4.23S already strip the FCS. Stripping the final word again truncates the packet. */ 465 handle->md.dag_fcs_bits = 0; 466 } 467 468 /* Then allow an environment variable to override. */ 469 if ((s = getenv("ERF_FCS_BITS")) != NULL) { 470 if ((n = atoi(s)) == 0 || n == 16|| n == 32) { 471 handle->md.dag_fcs_bits = n; 472 } else { 473 snprintf(ebuf, PCAP_ERRBUF_SIZE, 474 "pcap_open_live %s: bad ERF_FCS_BITS value (%d) in environment\n", device, n); 475 goto fail; 476 } 477 } 478 479 handle->snapshot = snaplen; 480 /*handle->md.timeout = to_ms; */ 481 482 handle->linktype = -1; 483 if (dag_get_datalink(handle) < 0) { 484 strcpy(ebuf, handle->errbuf); 485 goto fail; 486 } 487 488 handle->bufsize = 0; 489 490 if (new_pcap_dag(handle) < 0) { 491 snprintf(ebuf, PCAP_ERRBUF_SIZE, "new_pcap_dag %s: %s\n", device, pcap_strerror(errno)); 492 goto fail; 493 } 494 495 /* 496 * "select()" and "poll()" don't (yet) work on DAG device descriptors. 497 */ 498 handle->selectable_fd = -1; 499 500 #ifdef linux 501 handle->md.device = (char *)device; 502 #else 503 free((char *)device); 504 device = NULL; 505 #endif 506 507 handle->read_op = dag_read; 508 handle->inject_op = dag_inject; 509 handle->setfilter_op = dag_setfilter; 510 handle->setdirection_op = NULL; /* Not implemented.*/ 511 handle->set_datalink_op = dag_set_datalink; 512 handle->getnonblock_op = pcap_getnonblock_fd; 513 handle->setnonblock_op = dag_setnonblock; 514 handle->stats_op = dag_stats; 515 handle->close_op = dag_platform_close; 516 517 return handle; 518 519 fail: 520 if (device != NULL) { 521 free((char *)device); 522 } 523 if (handle != NULL) { 524 /* 525 * Get rid of any link-layer type list we allocated. 526 */ 527 if (handle->dlt_list != NULL) { 528 free(handle->dlt_list); 529 } 530 free(handle); 531 } 532 533 return NULL; 534 } 535 536 static int 537 dag_stats(pcap_t *p, struct pcap_stat *ps) { 538 /* This needs to be filled out correctly. Hopefully a dagapi call will 539 provide all necessary information. 540 */ 541 /*p->md.stat.ps_recv = 0;*/ 542 /*p->md.stat.ps_drop = 0;*/ 543 544 *ps = p->md.stat; 545 546 return 0; 547 } 548 549 /* 550 * Get from "/proc/dag" all interfaces listed there; if they're 551 * already in the list of interfaces we have, that won't add another 552 * instance, but if they're not, that'll add them. 553 * 554 * We don't bother getting any addresses for them. 555 * 556 * We also don't fail if we couldn't open "/proc/dag"; we just leave 557 * the list of interfaces as is. 558 */ 559 int 560 dag_platform_finddevs(pcap_if_t **devlistp, char *errbuf) 561 { 562 FILE *proc_dag_f; 563 char linebuf[512]; 564 int linenum; 565 unsigned char *p; 566 char name[512]; /* XXX - pick a size */ 567 char *q; 568 int ret = 0; 569 570 /* Quick exit if /proc/dag not readable */ 571 proc_dag_f = fopen("/proc/dag", "r"); 572 if (proc_dag_f == NULL) 573 { 574 int i; 575 char dev[16] = "dagx"; 576 577 for (i = '0'; ret == 0 && i <= '9'; i++) { 578 dev[3] = i; 579 if (pcap_add_if(devlistp, dev, 0, NULL, errbuf) == -1) { 580 /* 581 * Failure. 582 */ 583 ret = -1; 584 } 585 } 586 587 return (ret); 588 } 589 590 for (linenum = 1; fgets(linebuf, sizeof linebuf, proc_dag_f) != NULL; linenum++) { 591 592 /* 593 * Skip the first two lines - they're headers. 594 */ 595 if (linenum <= 2) 596 continue; 597 598 p = &linebuf[0]; 599 600 if (*p == '\0' || *p == '\n' || *p != 'D') 601 continue; /* not a Dag line */ 602 603 /* 604 * Get the interface name. 605 */ 606 q = &name[0]; 607 while (*p != '\0' && *p != ':') { 608 if (*p != ' ') 609 *q++ = tolower(*p++); 610 else 611 p++; 612 } 613 *q = '\0'; 614 615 /* 616 * Add an entry for this interface, with no addresses. 617 */ 618 p[strlen(p) - 1] = '\0'; /* get rid of \n */ 619 if (pcap_add_if(devlistp, name, 0, strdup(p + 2), errbuf) == -1) { 620 /* 621 * Failure. 622 */ 623 ret = -1; 624 break; 625 } 626 } 627 if (ret != -1) { 628 /* 629 * Well, we didn't fail for any other reason; did we 630 * fail due to an error reading the file? 631 */ 632 if (ferror(proc_dag_f)) { 633 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, 634 "Error reading /proc/dag: %s", 635 pcap_strerror(errno)); 636 ret = -1; 637 } 638 } 639 640 (void)fclose(proc_dag_f); 641 return (ret); 642 } 643 644 /* 645 * Installs the given bpf filter program in the given pcap structure. There is 646 * no attempt to store the filter in kernel memory as that is not supported 647 * with DAG cards. 648 */ 649 static int 650 dag_setfilter(pcap_t *p, struct bpf_program *fp) 651 { 652 if (!p) 653 return -1; 654 if (!fp) { 655 strncpy(p->errbuf, "setfilter: No filter specified", 656 sizeof(p->errbuf)); 657 return -1; 658 } 659 660 /* Make our private copy of the filter */ 661 662 if (install_bpf_program(p, fp) < 0) 663 return -1; 664 665 p->md.use_bpf = 0; 666 667 return (0); 668 } 669 670 static int 671 dag_set_datalink(pcap_t *p, int dlt) 672 { 673 p->linktype = dlt; 674 675 return (0); 676 } 677 678 static int 679 dag_setnonblock(pcap_t *p, int nonblock, char *errbuf) 680 { 681 /* 682 * Set non-blocking mode on the FD. 683 * XXX - is that necessary? If not, don't bother calling it, 684 * and have a "dag_getnonblock()" function that looks at 685 * "p->md.dag_offset_flags". 686 */ 687 if (pcap_setnonblock_fd(p, nonblock, errbuf) < 0) 688 return (-1); 689 690 if (nonblock) { 691 p->md.dag_offset_flags |= DAGF_NONBLOCK; 692 } else { 693 p->md.dag_offset_flags &= ~DAGF_NONBLOCK; 694 } 695 return (0); 696 } 697 698 static int 699 dag_get_datalink(pcap_t *p) 700 { 701 int daglinktype; 702 703 if (p->dlt_list == NULL && (p->dlt_list = malloc(2*sizeof(*(p->dlt_list)))) == NULL) { 704 (void)snprintf(p->errbuf, sizeof(p->errbuf), "malloc: %s", pcap_strerror(errno)); 705 return (-1); 706 } 707 708 /* Check the type through a dagapi call. */ 709 daglinktype = dag_linktype(p->fd); 710 711 switch(daglinktype) { 712 713 case TYPE_HDLC_POS: 714 if (p->dlt_list != NULL) { 715 p->dlt_count = 2; 716 p->dlt_list[0] = DLT_CHDLC; 717 p->dlt_list[1] = DLT_PPP_SERIAL; 718 } 719 p->linktype = DLT_CHDLC; 720 break; 721 722 case TYPE_ETH: 723 /* 724 * This is (presumably) a real Ethernet capture; give it a 725 * link-layer-type list with DLT_EN10MB and DLT_DOCSIS, so 726 * that an application can let you choose it, in case you're 727 * capturing DOCSIS traffic that a Cisco Cable Modem 728 * Termination System is putting out onto an Ethernet (it 729 * doesn't put an Ethernet header onto the wire, it puts raw 730 * DOCSIS frames out on the wire inside the low-level 731 * Ethernet framing). 732 */ 733 if (p->dlt_list != NULL) { 734 p->dlt_count = 2; 735 p->dlt_list[0] = DLT_EN10MB; 736 p->dlt_list[1] = DLT_DOCSIS; 737 } 738 p->linktype = DLT_EN10MB; 739 break; 740 741 case TYPE_AAL5: 742 case TYPE_ATM: 743 if (p->dlt_list != NULL) { 744 p->dlt_count = 2; 745 p->dlt_list[0] = DLT_ATM_RFC1483; 746 p->dlt_list[1] = DLT_SUNATM; 747 } 748 p->linktype = DLT_ATM_RFC1483; 749 break; 750 751 752 case TYPE_LEGACY: 753 p->linktype = DLT_NULL; 754 break; 755 756 default: 757 snprintf(p->errbuf, sizeof(p->errbuf), "unknown DAG linktype %d\n", daglinktype); 758 return (-1); 759 760 } 761 762 return p->linktype; 763 } 764