mirror of https://github.com/OISF/suricata
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			76 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			C
		
	
			
		
		
	
	
			76 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			C
		
	
/* Copyright (C) 2018 Open Information Security Foundation
 | 
						|
 *
 | 
						|
 * You can copy, redistribute or modify this Program under the terms of
 | 
						|
 * the GNU General Public License version 2 as published by the Free
 | 
						|
 * Software Foundation.
 | 
						|
 *
 | 
						|
 * This program is distributed in the hope that it will be useful,
 | 
						|
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
 * GNU General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU General Public License
 | 
						|
 * version 2 along with this program; if not, write to the Free Software
 | 
						|
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 | 
						|
 * 02110-1301, USA.
 | 
						|
 */
 | 
						|
 | 
						|
/**
 | 
						|
 * \file
 | 
						|
 *
 | 
						|
 * \author Eric Leblond <eric@regit.org>
 | 
						|
 */
 | 
						|
 | 
						|
#include "suricata-common.h"
 | 
						|
#include "util-bpf.h"
 | 
						|
#include "threads.h"
 | 
						|
 | 
						|
#if !defined __OpenBSD__
 | 
						|
 | 
						|
/** protect bpf filter build, as it is not thread safe */
 | 
						|
static SCMutex bpf_set_filter_lock = SCMUTEX_INITIALIZER;
 | 
						|
 | 
						|
void SCBPFFree(struct bpf_program *program)
 | 
						|
{
 | 
						|
    if (program)
 | 
						|
        pcap_freecode(program);
 | 
						|
}
 | 
						|
 | 
						|
int SCBPFCompile(int snaplen_arg, int linktype_arg, struct bpf_program *program,
 | 
						|
                 const char *buf,
 | 
						|
                 int optimize, uint32_t mask,
 | 
						|
                 char *errbuf, size_t errbuf_len)
 | 
						|
{
 | 
						|
    pcap_t *p;
 | 
						|
    int ret;
 | 
						|
 | 
						|
    p = pcap_open_dead(linktype_arg, snaplen_arg);
 | 
						|
    if (p == NULL)
 | 
						|
        return (-1);
 | 
						|
 | 
						|
    SCMutexLock(&bpf_set_filter_lock);
 | 
						|
    ret = pcap_compile(p, program, buf, optimize, mask);
 | 
						|
    if (ret == -1) {
 | 
						|
        if (errbuf) {
 | 
						|
            snprintf(errbuf, errbuf_len, "%s", pcap_geterr(p));
 | 
						|
        }
 | 
						|
        pcap_close(p);
 | 
						|
        SCMutexUnlock(&bpf_set_filter_lock);
 | 
						|
        return (-1);
 | 
						|
    }
 | 
						|
    pcap_close(p);
 | 
						|
    SCMutexUnlock(&bpf_set_filter_lock);
 | 
						|
 | 
						|
    if (program->bf_insns == NULL) {
 | 
						|
        if (errbuf) {
 | 
						|
            snprintf(errbuf, errbuf_len, "Filter badly setup");
 | 
						|
        }
 | 
						|
        SCBPFFree(program);
 | 
						|
        return (-1);
 | 
						|
    }
 | 
						|
 | 
						|
    return (ret);
 | 
						|
}
 | 
						|
 | 
						|
#endif /* Not __OpenBSD__ */
 |