From patchwork Thu Nov 20 08:44:14 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Maxim Uvarov X-Patchwork-Id: 41221 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-wi0-f200.google.com (mail-wi0-f200.google.com [209.85.212.200]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id 9C45A23588 for ; Thu, 20 Nov 2014 08:44:56 +0000 (UTC) Received: by mail-wi0-f200.google.com with SMTP id ex7sf1709841wid.11 for ; Thu, 20 Nov 2014 00:44:55 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id:in-reply-to :references:subject:precedence:list-id:list-unsubscribe:list-archive :list-post:list-help:list-subscribe:mime-version:content-type :content-transfer-encoding:errors-to:sender:x-original-sender :x-original-authentication-results:mailing-list; bh=upfk4ule9Xs2afdMAi4QRfjePStJNszmHJd+8CYTv/U=; b=jsXeqSG/kXnYrTUtIAA04SoBJRyE/mXyR69PfkzX8vx8fnLue1U7v3X45aEhSnEJ7g 2NcWHYOG04MWi3mPpNhNYMd1dxFd86flG5nQp6ekl6YsoJ+ZeF90PezLzIwSy3/Uk7Mo 4xCfBHvUj0HB51Il7A/exkbMxYPZLqB+OK5xqf0nTPidITzafaxB0nhrtgBF9yQ9z8Uj dVb33INV9SqNHalNWTxQsIjj2f9UBdiqfwrn4ExUz52HWz6SPPmLr6+mYi+y1wUe+lWX bVXcr33deYiFfaIceXTBGlMr+LzZ/lAE+VAHccY87fYrbOSju+yvAy6mVgcoBd2G4TzV VDYg== X-Gm-Message-State: ALoCoQkiQ4hhSGgRl57Nf0Ow54IleKqo/x1+hI3e7/OwNdGx3GBmoyHeMkL7s9nN2nDMOZRNkNLN X-Received: by 10.112.151.38 with SMTP id un6mr1937938lbb.0.1416473095899; Thu, 20 Nov 2014 00:44:55 -0800 (PST) X-BeenThere: patchwork-forward@linaro.org Received: by 10.152.19.39 with SMTP id b7ls28744lae.38.gmail; Thu, 20 Nov 2014 00:44:55 -0800 (PST) X-Received: by 10.112.132.67 with SMTP id os3mr747199lbb.90.1416473095752; Thu, 20 Nov 2014 00:44:55 -0800 (PST) Received: from mail-lb0-f179.google.com (mail-lb0-f179.google.com. [209.85.217.179]) by mx.google.com with ESMTPS id du3si1588334lbc.32.2014.11.20.00.44.55 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 20 Nov 2014 00:44:55 -0800 (PST) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.217.179 as permitted sender) client-ip=209.85.217.179; Received: by mail-lb0-f179.google.com with SMTP id l4so1886207lbv.10 for ; Thu, 20 Nov 2014 00:44:55 -0800 (PST) X-Received: by 10.152.8.170 with SMTP id s10mr9938132laa.56.1416473095671; Thu, 20 Nov 2014 00:44:55 -0800 (PST) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.112.184.201 with SMTP id ew9csp226347lbc; Thu, 20 Nov 2014 00:44:53 -0800 (PST) X-Received: by 10.229.40.71 with SMTP id j7mr57506867qce.21.1416473093388; Thu, 20 Nov 2014 00:44:53 -0800 (PST) Received: from ip-10-35-177-41.ec2.internal (lists.linaro.org. [54.225.227.206]) by mx.google.com with ESMTPS id 91si1980890qgm.102.2014.11.20.00.44.52 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Thu, 20 Nov 2014 00:44:53 -0800 (PST) Received-SPF: none (google.com: lng-odp-bounces@lists.linaro.org does not designate permitted sender hosts) client-ip=54.225.227.206; Received: from localhost ([127.0.0.1] helo=ip-10-35-177-41.ec2.internal) by ip-10-35-177-41.ec2.internal with esmtp (Exim 4.76) (envelope-from ) id 1XrNMA-00089W-Sd; Thu, 20 Nov 2014 08:44:50 +0000 Received: from mail-lb0-f182.google.com ([209.85.217.182]) by ip-10-35-177-41.ec2.internal with esmtp (Exim 4.76) (envelope-from ) id 1XrNLr-00087G-Eh for lng-odp@lists.linaro.org; Thu, 20 Nov 2014 08:44:31 +0000 Received: by mail-lb0-f182.google.com with SMTP id f15so426223lbj.27 for ; Thu, 20 Nov 2014 00:44:25 -0800 (PST) X-Received: by 10.152.198.235 with SMTP id jf11mr10089593lac.72.1416473065912; Thu, 20 Nov 2014 00:44:25 -0800 (PST) Received: from localhost.localdomain (broadband-46-188-125-135.2com.net. [46.188.125.135]) by mx.google.com with ESMTPSA id ba19sm427858lab.31.2014.11.20.00.44.24 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 20 Nov 2014 00:44:25 -0800 (PST) From: Maxim Uvarov To: lng-odp@lists.linaro.org Date: Thu, 20 Nov 2014 11:44:14 +0300 Message-Id: <1416473054-10656-4-git-send-email-maxim.uvarov@linaro.org> X-Mailer: git-send-email 1.8.5.1.163.gd7aced9 In-Reply-To: <1416473054-10656-1-git-send-email-maxim.uvarov@linaro.org> References: <1416473054-10656-1-git-send-email-maxim.uvarov@linaro.org> X-Topics: patch Subject: [lng-odp] [PATCHv5 3/3] promisc mode manipulation functions X-BeenThere: lng-odp@lists.linaro.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: , List-Help: , List-Subscribe: , MIME-Version: 1.0 Errors-To: lng-odp-bounces@lists.linaro.org Sender: lng-odp-bounces@lists.linaro.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: maxim.uvarov@linaro.org X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.217.179 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 Define API and implement promisc functions: odp_pktio_set_promisc() odp_pktio_promisc() Signed-off-by: Maxim Uvarov Reviewed-by Mike Holmes --- platform/linux-generic/include/api/odp_packet_io.h | 25 +++++++ platform/linux-generic/odp_packet_io.c | 77 ++++++++++++++++++++++ 2 files changed, 102 insertions(+) diff --git a/platform/linux-generic/include/api/odp_packet_io.h b/platform/linux-generic/include/api/odp_packet_io.h index 667395c..c84c14e 100644 --- a/platform/linux-generic/include/api/odp_packet_io.h +++ b/platform/linux-generic/include/api/odp_packet_io.h @@ -149,6 +149,31 @@ int odp_pktio_set_mtu(odp_pktio_t id, int mtu); int odp_pktio_mtu(odp_pktio_t id); /** + * Set promiscuous mode on a packet IO interface. + * + * @param[in] id ODP packet IO handle. + * @param[in] enable 1 to enable promiscuous mode, 0 to disable + * + * @retval 0 on success. + * @retval -1 on a bad pktio id + * @retval -1 ilegal enable value + * @retval -1 any other error + */ +int odp_pktio_set_promisc(odp_pktio_t id, int enable); + +/** + * Determine if promiscuous mode is enabled for a packet IO interface. + * + * @param[in] id ODP packet IO handle. + * + * @retval 1 if promiscuous mode is enabled. + * @retval 0 if promiscuous mode is disabled. + * @retval -1 on a bad pktio id + * @retval -1 any other error +*/ +int odp_pktio_promisc(odp_pktio_t id); + +/** * @} */ diff --git a/platform/linux-generic/odp_packet_io.c b/platform/linux-generic/odp_packet_io.c index c523350..a4d6cd1 100644 --- a/platform/linux-generic/odp_packet_io.c +++ b/platform/linux-generic/odp_packet_io.c @@ -542,3 +542,80 @@ int odp_pktio_mtu(odp_pktio_t id) return ifr.ifr_mtu; } + +int odp_pktio_set_promisc(odp_pktio_t id, int enable) +{ + pktio_entry_t *entry; + int sockfd; + struct ifreq ifr; + int ret; + + if (enable < 0 || enable > 1) { + ODP_DBG("illegal enable value %d\n", enable); + return -1; + } + + entry = get_entry(id); + if (entry == NULL) { + ODP_DBG("pktio entry %d does not exist\n", id); + return -1; + } + + if (entry->s.pkt_sock_mmap.sockfd) + sockfd = entry->s.pkt_sock_mmap.sockfd; + else + sockfd = entry->s.pkt_sock.sockfd; + + strncpy(ifr.ifr_name, entry->s.name, IFNAMSIZ); + + ret = ioctl(sockfd, SIOCGIFFLAGS, &ifr); + if (ret < 0) { + ODP_DBG("ioctl SIOCGIFFLAGS error\n"); + return -1; + } + + if (enable) + ifr.ifr_flags |= IFF_PROMISC; + else + ifr.ifr_flags &= ~(IFF_PROMISC); + + ret = ioctl(sockfd, SIOCSIFFLAGS, &ifr); + if (ret < 0) { + ODP_DBG("ioctl SIOCSIFFLAGS error\n"); + return -1; + } + + return 0; +} + +int odp_pktio_promisc(odp_pktio_t id) +{ + pktio_entry_t *entry; + int sockfd; + struct ifreq ifr; + int ret; + + entry = get_entry(id); + if (entry == NULL) { + ODP_DBG("pktio entry %d does not exist\n", id); + return -1; + } + + if (entry->s.pkt_sock_mmap.sockfd) + sockfd = entry->s.pkt_sock_mmap.sockfd; + else + sockfd = entry->s.pkt_sock.sockfd; + + strncpy(ifr.ifr_name, entry->s.name, IFNAMSIZ); + + ret = ioctl(sockfd, SIOCGIFFLAGS, &ifr); + if (ret < 0) { + ODP_DBG("ioctl SIOCGIFFLAGS error\n"); + return -1; + } + + if (ifr.ifr_flags & IFF_PROMISC) + return 1; + else + return 0; +}