commit | 8b51b35b5760d256b7028784e733f5f13e9d47d5 | [log] [tgz] |
---|---|---|
author | Denis Ovsienko <denis@ovsienko.info> | Fri Mar 01 01:37:33 2024 +0000 |
committer | Denis Ovsienko <denis@ovsienko.info> | Thu Aug 29 17:28:37 2024 +0100 |
tree | f2980b34fa9ff9841b527d3a76f3ff19427a67b4 | |
parent | a45caf36e2a2142dc81161255538deb050cbcea1 [diff] |
Treat ifaddrs.ifa_flags as a 64-bit mask. [skip appveyor] libpcap internally uses a 32-bit mask for its PCAP_IF_ constants, but the OS bit mask for the IFF_ constants may or may not fit into 32 bits. Specifically, in illumos and Solaris 11.4 it is 64-bit, so make the if_flags argument of pcapint_find_or_add_if() and pcapint_add_addr_to_if() 64-bit to accommodate the complete OS bitmask, whatever the size, before producing the libpcap bit mask. (cherry picked from commit d139b30152b54464d4c8cfab2c94d9f1f376fa6d)
To report a security issue please send an e-mail to security@tcpdump.org.
To report bugs and other problems, contribute patches, request a feature, provide generic feedback etc please see the guidelines for contributing.
The documentation directory has README files about specific operating systems and options.
Anonymous Git is available via:
https://github.com/the-tcpdump-group/libpcap.git
This directory contains source code for libpcap, a system-independent interface for user-level packet capture. libpcap provides a portable framework for low-level network monitoring. Applications include network statistics collection, security monitoring, network debugging, etc. Since almost every system vendor provides a different interface for packet capture, and since we‘ve developed several tools that require this functionality, we’ve created this system-independent API to ease in porting and to alleviate the need for several system-dependent packet capture modules in each application.
formerly from Lawrence Berkeley National Laboratory Network Research Group <libpcap@ee.lbl.gov> ftp://ftp.ee.lbl.gov/old/libpcap-0.4a7.tar.Z
For some platforms there are README.{system}
files that discuss issues with the OS‘s interface for packet capture on those platforms, such as how to enable support for that interface in the OS, if it’s not built in by default.
The libpcap interface supports a filtering mechanism based on the architecture in the BSD packet filter. BPF is described in the 1993 Winter Usenix paper ``The BSD Packet Filter: A New Architecture for User-level Packet Capture'' (compressed PostScript, gzipped PostScript, PDF).
Although most packet capture interfaces support in-kernel filtering, libpcap utilizes in-kernel filtering only for the BPF interface. On systems that don't have BPF, all packets are read into user-space and the BPF filters are evaluated in the libpcap library, incurring added overhead (especially, for selective filters). Ideally, libpcap would translate BPF filters into a filter program that is compatible with the underlying kernel subsystem, but this is not yet implemented.
BPF is standard in 4.4BSD, BSD/OS, NetBSD, FreeBSD, OpenBSD, DragonFly BSD, macOS, and Solaris 11; an older, modified and undocumented version is standard in AIX. {DEC OSF/1, Digital UNIX, Tru64 UNIX} uses the packetfilter interface but has been extended to accept BPF filters (which libpcap utilizes).
Linux has a number of BPF based systems, and libpcap does not support any of the eBPF mechanisms as yet, although it supports many of the memory mapped receive mechanisms. See the Linux-specific README for more information.
There's now a rule to make a shared library, which should work on Linux and *BSD, among other platforms.
It sets the soname of the library to libpcap.so.1
; this is what it should be, NOT libpcap.so.1.x
or libpcap.so.1.x.y
or something such as that.
We‘ve been maintaining binary compatibility between libpcap releases for quite a while; there’s no reason to tie a binary linked with libpcap to a particular release of libpcap.