1 /* 2 * Copyright (c) 2006 Paolo Abeni (Italy) 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 3. The name of the author may not be used to endorse or promote 15 * products derived from this software without specific prior written 16 * permission. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 * 30 * USB sniffing API implementation for Linux platform 31 * By Paolo Abeni <paolo.abeni@email.it> 32 * Modifications: Kris Katterjohn <katterjohn@gmail.com> 33 * 34 */ 35 36 #include <config.h> 37 38 #include "pcap/usb.h" 39 #include "pcap-int.h" 40 #include "pcap-usb-linux.h" 41 #include "pcap-usb-linux-common.h" 42 43 #include "extract.h" 44 45 #ifdef NEED_STRERROR_H 46 #include "strerror.h" 47 #endif 48 49 #include <errno.h> 50 #include <stdlib.h> 51 #include <unistd.h> 52 #include <fcntl.h> 53 #include <limits.h> 54 #include <string.h> 55 #include <dirent.h> 56 #include <byteswap.h> 57 #include <netinet/in.h> 58 #include <sys/ioctl.h> 59 #include <sys/mman.h> 60 #include <sys/utsname.h> 61 #ifdef HAVE_LINUX_USBDEVICE_FS_H 62 /* 63 * We might need <linux/compiler.h> to define __user for 64 * <linux/usbdevice_fs.h>. 65 */ 66 #ifdef HAVE_LINUX_COMPILER_H 67 #include <linux/compiler.h> 68 #endif /* HAVE_LINUX_COMPILER_H */ 69 #include <linux/usbdevice_fs.h> 70 #endif /* HAVE_LINUX_USBDEVICE_FS_H */ 71 72 #include "diag-control.h" 73 74 #define USB_IFACE "usbmon" 75 76 #define USBMON_DEV_PREFIX "usbmon" 77 #define USBMON_DEV_PREFIX_LEN (sizeof USBMON_DEV_PREFIX - 1) 78 #define USB_LINE_LEN 4096 79 80 #if __BYTE_ORDER == __LITTLE_ENDIAN 81 #define htols(s) s 82 #define htoll(l) l 83 #define htol64(ll) ll 84 #else 85 #define htols(s) bswap_16(s) 86 #define htoll(l) bswap_32(l) 87 #define htol64(ll) bswap_64(ll) 88 #endif 89 90 struct mon_bin_stats { 91 uint32_t queued; 92 uint32_t dropped; 93 }; 94 95 struct mon_bin_get { 96 pcap_usb_header *hdr; 97 void *data; 98 size_t data_len; /* Length of data (can be zero) */ 99 }; 100 101 struct mon_bin_mfetch { 102 int32_t *offvec; /* Vector of events fetched */ 103 int32_t nfetch; /* Number of events to fetch (out: fetched) */ 104 int32_t nflush; /* Number of events to flush */ 105 }; 106 107 #define MON_IOC_MAGIC 0x92 108 109 #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1) 110 #define MON_IOCX_URB _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr) 111 #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats) 112 #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4) 113 #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5) 114 #define MON_IOCX_GET _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get) 115 #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch) 116 #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8) 117 118 #define MON_BIN_SETUP 0x1 /* setup hdr is present*/ 119 #define MON_BIN_SETUP_ZERO 0x2 /* setup buffer is not available */ 120 #define MON_BIN_DATA_ZERO 0x4 /* data buffer is not available */ 121 #define MON_BIN_ERROR 0x8 122 123 /* 124 * Private data for capturing on Linux USB. 125 */ 126 struct pcap_usb_linux { 127 u_char *mmapbuf; /* memory-mapped region pointer */ 128 size_t mmapbuflen; /* size of region */ 129 int bus_index; 130 u_int packets_read; 131 }; 132 133 /* forward declaration */ 134 static int usb_activate(pcap_t *); 135 static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *); 136 static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *); 137 static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *); 138 static int usb_inject_linux(pcap_t *, const void *, int); 139 static int usb_setdirection_linux(pcap_t *, pcap_direction_t); 140 static void usb_cleanup_linux_mmap(pcap_t *); 141 142 /* facility to add an USB device to the device list*/ 143 static int 144 usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str) 145 { 146 char dev_name[10]; 147 char dev_descr[30]; 148 snprintf(dev_name, 10, USB_IFACE"%d", n); 149 /* 150 * XXX - is there any notion of "up" and "running"? 151 */ 152 if (n == 0) { 153 /* 154 * As this refers to all buses, there's no notion of 155 * "connected" vs. "disconnected", as that's a property 156 * that would apply to a particular USB interface. 157 */ 158 if (pcapint_add_dev(devlistp, dev_name, 159 PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE, 160 "Raw USB traffic, all USB buses", err_str) == NULL) 161 return -1; 162 } else { 163 /* 164 * XXX - is there a way to determine whether anything's 165 * plugged into this bus interface or not, and set 166 * PCAP_IF_CONNECTION_STATUS_CONNECTED or 167 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED? 168 */ 169 snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n); 170 if (pcapint_add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL) 171 return -1; 172 } 173 174 return 0; 175 } 176 177 int 178 usb_findalldevs(pcap_if_list_t *devlistp, char *err_str) 179 { 180 struct dirent* data; 181 int ret = 0; 182 DIR* dir; 183 int n; 184 char* name; 185 186 /* 187 * We require 2.6.27 or later kernels, so we have binary-mode support. 188 * The devices are of the form /dev/usbmon{N}. 189 * Open /dev and scan it. 190 */ 191 dir = opendir("/dev"); 192 if (dir != NULL) { 193 while ((ret == 0) && ((data = readdir(dir)) != 0)) { 194 name = data->d_name; 195 196 /* 197 * Is this a usbmon device? 198 */ 199 if (strncmp(name, USBMON_DEV_PREFIX, 200 USBMON_DEV_PREFIX_LEN) != 0) 201 continue; /* no */ 202 203 /* 204 * What's the device number? 205 */ 206 if (sscanf(&name[USBMON_DEV_PREFIX_LEN], "%d", &n) == 0) 207 continue; /* failed */ 208 209 ret = usb_dev_add(devlistp, n, err_str); 210 } 211 212 closedir(dir); 213 } 214 return 0; 215 } 216 217 /* 218 * Matches what's in mon_bin.c in the Linux kernel. 219 */ 220 #define MIN_RING_SIZE (8*1024) 221 #define MAX_RING_SIZE (1200*1024) 222 223 static int 224 usb_set_ring_size(pcap_t* handle, int header_size) 225 { 226 /* 227 * A packet from binary usbmon has: 228 * 229 * 1) a fixed-length header, of size header_size; 230 * 2) descriptors, for isochronous transfers; 231 * 3) the payload. 232 * 233 * The kernel buffer has a size, defaulting to 300KB, with a 234 * minimum of 8KB and a maximum of 1200KB. The size is set with 235 * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up 236 * to a page size. 237 * 238 * No more than {buffer size}/5 bytes worth of payload is saved. 239 * Therefore, if we subtract the fixed-length size from the 240 * snapshot length, we have the biggest payload we want (we 241 * don't worry about the descriptors - if we have descriptors, 242 * we'll just discard the last bit of the payload to get it 243 * to fit). We multiply that result by 5 and set the buffer 244 * size to that value. 245 */ 246 int ring_size; 247 248 if (handle->snapshot < header_size) 249 handle->snapshot = header_size; 250 /* The maximum snapshot size is small enough that this won't overflow */ 251 ring_size = (handle->snapshot - header_size) * 5; 252 253 /* 254 * Will this get an error? 255 * (There's no way to query the minimum or maximum, so we just 256 * copy the value from the kernel source. We don't round it 257 * up to a multiple of the page size.) 258 */ 259 if (ring_size > MAX_RING_SIZE) { 260 /* 261 * Yes. Lower the ring size to the maximum, and set the 262 * snapshot length to the value that would give us a 263 * maximum-size ring. 264 */ 265 ring_size = MAX_RING_SIZE; 266 handle->snapshot = header_size + (MAX_RING_SIZE/5); 267 } else if (ring_size < MIN_RING_SIZE) { 268 /* 269 * Yes. Raise the ring size to the minimum, but leave 270 * the snapshot length unchanged, so we show the 271 * callback no more data than specified by the 272 * snapshot length. 273 */ 274 ring_size = MIN_RING_SIZE; 275 } 276 277 if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) { 278 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, 279 errno, "Can't set ring size from fd %d", handle->fd); 280 return -1; 281 } 282 return ring_size; 283 } 284 285 static 286 int usb_mmap(pcap_t* handle) 287 { 288 struct pcap_usb_linux *handlep = handle->priv; 289 int len; 290 291 /* 292 * Attempt to set the ring size as appropriate for the snapshot 293 * length, reducing the snapshot length if that'd make the ring 294 * bigger than the kernel supports. 295 */ 296 len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped)); 297 if (len == -1) { 298 /* Failed. Fall back on non-memory-mapped access. */ 299 return 0; 300 } 301 302 handlep->mmapbuflen = len; 303 handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ, 304 MAP_SHARED, handle->fd, 0); 305 if (handlep->mmapbuf == MAP_FAILED) { 306 /* 307 * Failed. We don't treat that as a fatal error, we 308 * just try to fall back on non-memory-mapped access. 309 */ 310 return 0; 311 } 312 return 1; 313 } 314 315 #ifdef HAVE_LINUX_USBDEVICE_FS_H 316 317 #define CTRL_TIMEOUT (5*1000) /* milliseconds */ 318 319 #define USB_DIR_IN 0x80 320 #define USB_TYPE_STANDARD 0x00 321 #define USB_RECIP_DEVICE 0x00 322 323 #define USB_REQ_GET_DESCRIPTOR 6 324 325 #define USB_DT_DEVICE 1 326 #define USB_DT_CONFIG 2 327 328 #define USB_DEVICE_DESCRIPTOR_SIZE 18 329 #define USB_CONFIG_DESCRIPTOR_SIZE 9 330 331 /* probe the descriptors of the devices attached to the bus */ 332 /* the descriptors will end up in the captured packet stream */ 333 /* and be decoded by external apps like wireshark */ 334 /* without these identifying probes packet data can't be fully decoded */ 335 static void 336 probe_devices(int bus) 337 { 338 struct usbdevfs_ctrltransfer ctrl; 339 struct dirent* data; 340 int ret = 0; 341 char busdevpath[sizeof("/dev/bus/usb/000/") + NAME_MAX]; 342 DIR* dir; 343 uint8_t descriptor[USB_DEVICE_DESCRIPTOR_SIZE]; 344 uint8_t configdesc[USB_CONFIG_DESCRIPTOR_SIZE]; 345 346 /* scan usb bus directories for device nodes */ 347 snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d", bus); 348 dir = opendir(busdevpath); 349 if (!dir) 350 return; 351 352 while ((ret >= 0) && ((data = readdir(dir)) != 0)) { 353 int fd; 354 char* name = data->d_name; 355 356 if (name[0] == '.') 357 continue; 358 359 snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d/%s", bus, data->d_name); 360 361 fd = open(busdevpath, O_RDWR); 362 if (fd == -1) 363 continue; 364 365 /* 366 * Sigh. Different kernels have different member names 367 * for this structure. 368 */ 369 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE 370 ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE; 371 ctrl.bRequest = USB_REQ_GET_DESCRIPTOR; 372 ctrl.wValue = USB_DT_DEVICE << 8; 373 ctrl.wIndex = 0; 374 ctrl.wLength = sizeof(descriptor); 375 #else 376 ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE; 377 ctrl.request = USB_REQ_GET_DESCRIPTOR; 378 ctrl.value = USB_DT_DEVICE << 8; 379 ctrl.index = 0; 380 ctrl.length = sizeof(descriptor); 381 #endif 382 ctrl.data = descriptor; 383 ctrl.timeout = CTRL_TIMEOUT; 384 385 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl); 386 387 /* Request CONFIGURATION descriptor alone to know wTotalLength */ 388 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE 389 ctrl.wValue = USB_DT_CONFIG << 8; 390 ctrl.wLength = sizeof(configdesc); 391 #else 392 ctrl.value = USB_DT_CONFIG << 8; 393 ctrl.length = sizeof(configdesc); 394 #endif 395 ctrl.data = configdesc; 396 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl); 397 if (ret >= 0) { 398 uint16_t wtotallength; 399 wtotallength = EXTRACT_LE_U_2(&configdesc[2]); 400 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE 401 ctrl.wLength = wtotallength; 402 #else 403 ctrl.length = wtotallength; 404 #endif 405 ctrl.data = malloc(wtotallength); 406 if (ctrl.data) { 407 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl); 408 free(ctrl.data); 409 } 410 } 411 close(fd); 412 } 413 closedir(dir); 414 } 415 #endif /* HAVE_LINUX_USBDEVICE_FS_H */ 416 417 pcap_t * 418 usb_create(const char *device, char *ebuf, int *is_ours) 419 { 420 const char *cp; 421 char *cpend; 422 long devnum; 423 pcap_t *p; 424 425 /* Does this look like a USB monitoring device? */ 426 cp = strrchr(device, '/'); 427 if (cp == NULL) 428 cp = device; 429 /* Does it begin with USB_IFACE? */ 430 if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) { 431 /* Nope, doesn't begin with USB_IFACE */ 432 *is_ours = 0; 433 return NULL; 434 } 435 /* Yes - is USB_IFACE followed by a number? */ 436 cp += sizeof USB_IFACE - 1; 437 devnum = strtol(cp, &cpend, 10); 438 if (cpend == cp || *cpend != '\0') { 439 /* Not followed by a number. */ 440 *is_ours = 0; 441 return NULL; 442 } 443 if (devnum < 0) { 444 /* Followed by a non-valid number. */ 445 *is_ours = 0; 446 return NULL; 447 } 448 449 /* OK, it's probably ours. */ 450 *is_ours = 1; 451 452 p = PCAP_CREATE_COMMON(ebuf, struct pcap_usb_linux); 453 if (p == NULL) 454 return (NULL); 455 456 p->activate_op = usb_activate; 457 return (p); 458 } 459 460 static int 461 usb_activate(pcap_t* handle) 462 { 463 struct pcap_usb_linux *handlep = handle->priv; 464 char full_path[USB_LINE_LEN]; 465 466 /* 467 * Turn a negative snapshot value (invalid), a snapshot value of 468 * 0 (unspecified), or a value bigger than the normal maximum 469 * value, into the maximum allowed value. 470 * 471 * If some application really *needs* a bigger snapshot 472 * length, we should just increase MAXIMUM_SNAPLEN. 473 */ 474 if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN) 475 handle->snapshot = MAXIMUM_SNAPLEN; 476 477 /* Initialize some components of the pcap structure. */ 478 handle->bufsize = handle->snapshot; 479 handle->offset = 0; 480 handle->linktype = DLT_USB_LINUX; 481 482 handle->inject_op = usb_inject_linux; 483 handle->setfilter_op = pcapint_install_bpf_program; /* no kernel filtering */ 484 handle->setdirection_op = usb_setdirection_linux; 485 handle->set_datalink_op = NULL; /* can't change data link type */ 486 handle->getnonblock_op = pcapint_getnonblock_fd; 487 handle->setnonblock_op = pcapint_setnonblock_fd; 488 489 /*get usb bus index from device name */ 490 if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1) 491 { 492 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, 493 "Can't get USB bus index from %s", handle->opt.device); 494 return PCAP_ERROR; 495 } 496 497 /* 498 * We require 2.6.27 or later kernels, so we have binary-mode support. 499 * Try to open the binary interface. 500 */ 501 snprintf(full_path, USB_LINE_LEN, "/dev/"USBMON_DEV_PREFIX"%d", 502 handlep->bus_index); 503 handle->fd = open(full_path, O_RDONLY, 0); 504 if (handle->fd < 0) 505 { 506 /* 507 * The attempt failed; why? 508 */ 509 switch (errno) { 510 511 case ENOENT: 512 /* 513 * The device doesn't exist. 514 * That could either mean that there's 515 * no support for monitoring USB buses 516 * (which probably means "the usbmon 517 * module isn't loaded") or that there 518 * is but that *particular* device 519 * doesn't exist (no "scan all buses" 520 * device if the bus index is 0, no 521 * such bus if the bus index isn't 0). 522 * 523 * For now, don't provide an error message; 524 * if we can determine what the particular 525 * problem is, we should report that. 526 */ 527 handle->errbuf[0] = '\0'; 528 return PCAP_ERROR_NO_SUCH_DEVICE; 529 530 case EACCES: 531 /* 532 * We didn't have permission to open it. 533 */ 534 DIAG_OFF_FORMAT_TRUNCATION 535 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, 536 "Attempt to open %s failed with EACCES - root privileges may be required", 537 full_path); 538 DIAG_ON_FORMAT_TRUNCATION 539 return PCAP_ERROR_PERM_DENIED; 540 541 default: 542 /* 543 * Something went wrong. 544 */ 545 pcapint_fmt_errmsg_for_errno(handle->errbuf, 546 PCAP_ERRBUF_SIZE, errno, 547 "Can't open USB bus file %s", full_path); 548 return PCAP_ERROR; 549 } 550 } 551 552 if (handle->opt.rfmon) 553 { 554 /* 555 * Monitor mode doesn't apply to USB devices. 556 */ 557 close(handle->fd); 558 return PCAP_ERROR_RFMON_NOTSUP; 559 } 560 561 /* try to use fast mmap access */ 562 if (usb_mmap(handle)) 563 { 564 /* We succeeded. */ 565 handle->linktype = DLT_USB_LINUX_MMAPPED; 566 handle->stats_op = usb_stats_linux_bin; 567 handle->read_op = usb_read_linux_mmap; 568 handle->cleanup_op = usb_cleanup_linux_mmap; 569 #ifdef HAVE_LINUX_USBDEVICE_FS_H 570 probe_devices(handlep->bus_index); 571 #endif 572 573 /* 574 * "handle->fd" is a real file, so 575 * "select()" and "poll()" work on it. 576 */ 577 handle->selectable_fd = handle->fd; 578 return 0; 579 } 580 581 /* 582 * We failed; try plain binary interface access. 583 * 584 * Attempt to set the ring size as appropriate for 585 * the snapshot length, reducing the snapshot length 586 * if that'd make the ring bigger than the kernel 587 * supports. 588 */ 589 if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) { 590 /* Failed. */ 591 close(handle->fd); 592 return PCAP_ERROR; 593 } 594 handle->stats_op = usb_stats_linux_bin; 595 handle->read_op = usb_read_linux_bin; 596 #ifdef HAVE_LINUX_USBDEVICE_FS_H 597 probe_devices(handlep->bus_index); 598 #endif 599 600 /* 601 * "handle->fd" is a real file, so "select()" and "poll()" 602 * work on it. 603 */ 604 handle->selectable_fd = handle->fd; 605 606 /* for plain binary access and text access we need to allocate the read 607 * buffer */ 608 handle->buffer = malloc(handle->bufsize); 609 if (!handle->buffer) { 610 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, 611 errno, "malloc"); 612 close(handle->fd); 613 return PCAP_ERROR; 614 } 615 return 0; 616 } 617 618 static int 619 usb_inject_linux(pcap_t *handle, const void *buf _U_, int size _U_) 620 { 621 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, 622 "Packet injection is not supported on USB devices"); 623 return (-1); 624 } 625 626 static int 627 usb_setdirection_linux(pcap_t *p, pcap_direction_t d) 628 { 629 /* 630 * It's guaranteed, at this point, that d is a valid 631 * direction value. 632 */ 633 p->direction = d; 634 return 0; 635 } 636 637 static int 638 usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats) 639 { 640 struct pcap_usb_linux *handlep = handle->priv; 641 int ret; 642 struct mon_bin_stats st; 643 ret = ioctl(handle->fd, MON_IOCG_STATS, &st); 644 if (ret < 0) 645 { 646 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, 647 errno, "Can't read stats from fd %d", handle->fd); 648 return -1; 649 } 650 651 stats->ps_recv = handlep->packets_read + st.queued; 652 stats->ps_drop = st.dropped; 653 stats->ps_ifdrop = 0; 654 return 0; 655 } 656 657 /* 658 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and 659 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI 660 */ 661 static int 662 usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user) 663 { 664 struct pcap_usb_linux *handlep = handle->priv; 665 struct mon_bin_get info; 666 int ret; 667 struct pcap_pkthdr pkth; 668 u_int clen = handle->snapshot - sizeof(pcap_usb_header); 669 670 /* the usb header is going to be part of 'packet' data*/ 671 info.hdr = (pcap_usb_header*) handle->buffer; 672 info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header); 673 info.data_len = clen; 674 675 /* ignore interrupt system call errors */ 676 do { 677 ret = ioctl(handle->fd, MON_IOCX_GET, &info); 678 if (handle->break_loop) 679 { 680 handle->break_loop = 0; 681 return -2; 682 } 683 } while ((ret == -1) && (errno == EINTR)); 684 if (ret < 0) 685 { 686 if (errno == EAGAIN) 687 return 0; /* no data there */ 688 689 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, 690 errno, "Can't read from fd %d", handle->fd); 691 return -1; 692 } 693 694 /* 695 * info.hdr->data_len is the number of bytes of isochronous 696 * descriptors (if any) plus the number of bytes of data 697 * provided. There are no isochronous descriptors here, 698 * because we're using the old 48-byte header. 699 * 700 * If info.hdr->data_flag is non-zero, there's no URB data; 701 * info.hdr->urb_len is the size of the buffer into which 702 * data is to be placed; it does not represent the amount 703 * of data transferred. If info.hdr->data_flag is zero, 704 * there is URB data, and info.hdr->urb_len is the number 705 * of bytes transmitted or received; it doesn't include 706 * isochronous descriptors. 707 * 708 * The kernel may give us more data than the snaplen; if it did, 709 * reduce the data length so that the total number of bytes we 710 * tell our client we have is not greater than the snaplen. 711 */ 712 if (info.hdr->data_len < clen) 713 clen = info.hdr->data_len; 714 info.hdr->data_len = clen; 715 pkth.caplen = sizeof(pcap_usb_header) + clen; 716 if (info.hdr->data_flag) { 717 /* 718 * No data; just base the original length on 719 * info.hdr->data_len (so that it's >= the captured 720 * length). 721 */ 722 pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len; 723 } else { 724 /* 725 * We got data; base the original length on 726 * info.hdr->urb_len, so that it includes data 727 * discarded by the USB monitor device due to 728 * its buffer being too small. 729 */ 730 pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len; 731 } 732 pkth.ts.tv_sec = (time_t)info.hdr->ts_sec; 733 pkth.ts.tv_usec = info.hdr->ts_usec; 734 735 if (handle->fcode.bf_insns == NULL || 736 pcapint_filter(handle->fcode.bf_insns, handle->buffer, 737 pkth.len, pkth.caplen)) { 738 handlep->packets_read++; 739 callback(user, &pkth, handle->buffer); 740 return 1; 741 } 742 743 return 0; /* didn't pass filter */ 744 } 745 746 /* 747 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and 748 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI 749 */ 750 #define VEC_SIZE 32 751 static int 752 usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user) 753 { 754 struct pcap_usb_linux *handlep = handle->priv; 755 struct mon_bin_mfetch fetch; 756 int32_t vec[VEC_SIZE]; 757 struct pcap_pkthdr pkth; 758 u_char *bp; 759 pcap_usb_header_mmapped* hdr; 760 int nflush = 0; 761 int packets = 0; 762 u_int clen, max_clen; 763 764 max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped); 765 766 for (;;) { 767 int i, ret; 768 int limit; 769 770 if (PACKET_COUNT_IS_UNLIMITED(max_packets)) { 771 /* 772 * There's no limit on the number of packets 773 * to process, so try to fetch VEC_SIZE packets. 774 */ 775 limit = VEC_SIZE; 776 } else { 777 /* 778 * Try to fetch as many packets as we have left 779 * to process, or VEC_SIZE packets, whichever 780 * is less. 781 * 782 * At this point, max_packets > 0 (otherwise, 783 * PACKET_COUNT_IS_UNLIMITED(max_packets) 784 * would be true) and max_packets > packets 785 * (packet starts out as 0, and the test 786 * at the bottom of the loop exits if 787 * max_packets <= packets), so limit is 788 * guaranteed to be > 0. 789 */ 790 limit = max_packets - packets; 791 if (limit > VEC_SIZE) 792 limit = VEC_SIZE; 793 } 794 795 /* 796 * Try to fetch as many events as possible, up to 797 * the limit, and flush the events we've processed 798 * earlier (nflush) - MON_IOCX_MFETCH does both 799 * (presumably to reduce the number of system 800 * calls in loops like this). 801 */ 802 fetch.offvec = vec; 803 fetch.nfetch = limit; 804 fetch.nflush = nflush; 805 /* ignore interrupt system call errors */ 806 do { 807 ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch); 808 if (handle->break_loop) 809 { 810 handle->break_loop = 0; 811 return -2; 812 } 813 } while ((ret == -1) && (errno == EINTR)); 814 if (ret < 0) 815 { 816 if (errno == EAGAIN) 817 return 0; /* no data there */ 818 819 pcapint_fmt_errmsg_for_errno(handle->errbuf, 820 PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d", 821 handle->fd); 822 return -1; 823 } 824 825 /* keep track of processed events, we will flush them later */ 826 nflush = fetch.nfetch; 827 for (i=0; i<fetch.nfetch; ++i) { 828 /* 829 * XXX - we can't check break_loop here, as 830 * we read the indices of packets into a 831 * local variable, so if we're later called 832 * to fetch more packets, those packets will 833 * not be seen - and won't be flushed, either. 834 * 835 * Instead, we would have to keep the array 836 * of indices in our private data, along 837 * with the count of packets to flush - or 838 * would have to flush the already-processed 839 * packets if we break out of the loop here. 840 */ 841 842 /* Get a pointer to this packet's buffer */ 843 bp = &handlep->mmapbuf[vec[i]]; 844 845 /* That begins with a metadata header */ 846 hdr = (pcap_usb_header_mmapped*) bp; 847 848 /* discard filler */ 849 if (hdr->event_type == '@') 850 continue; 851 852 /* 853 * hdr->data_len is the number of bytes of 854 * isochronous descriptors (if any) plus the 855 * number of bytes of data provided. 856 * 857 * If hdr->data_flag is non-zero, there's no 858 * URB data; hdr->urb_len is the size of the 859 * buffer into which data is to be placed; it does 860 * not represent the amount of data transferred. 861 * If hdr->data_flag is zero, there is URB data, 862 * and hdr->urb_len is the number of bytes 863 * transmitted or received; it doesn't include 864 * isochronous descriptors. 865 * 866 * The kernel may give us more data than the 867 * snaplen; if it did, reduce the data length 868 * so that the total number of bytes we 869 * tell our client we have is not greater than 870 * the snaplen. 871 */ 872 clen = max_clen; 873 if (hdr->data_len < clen) 874 clen = hdr->data_len; 875 pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen; 876 if (hdr->data_flag) { 877 /* 878 * No data; just base the original length 879 * on hdr->data_len (so that it's >= the 880 * captured length). Clamp the result 881 * at UINT_MAX, so it fits in an unsigned 882 * int. 883 */ 884 pkth.len = u_int_sum(sizeof(pcap_usb_header_mmapped), 885 hdr->data_len); 886 } else { 887 /* 888 * We got data. 889 */ 890 if (is_isochronous_transfer_completion(hdr)) { 891 /* 892 * For isochronous transfer completion 893 * events, hdr->urb_len doesn't take 894 * into account the way the data is 895 * put into the buffer, as it doesn't 896 * count any padding between the 897 * chunks of isochronous data, so 898 * we have to calculate the amount 899 * of data from the isochronous 900 * descriptors. 901 */ 902 pkth.len = incoming_isochronous_transfer_completed_len(&pkth, bp); 903 } else { 904 /* 905 * For everything else, the original 906 * data length is just the length of 907 * the memory-mapped Linux USB header 908 * plus hdr->urb_len; we use 909 * hdr->urb_len so that it includes 910 * data discarded by the USB monitor 911 * device due to its buffer being 912 * too small. Clamp the result at 913 * UINT_MAX, so it fits in an 914 * unsigned int. 915 */ 916 pkth.len = u_int_sum(sizeof(pcap_usb_header_mmapped), 917 hdr->urb_len); 918 } 919 } 920 pkth.ts.tv_sec = (time_t)hdr->ts_sec; 921 pkth.ts.tv_usec = hdr->ts_usec; 922 923 if (handle->fcode.bf_insns == NULL || 924 pcapint_filter(handle->fcode.bf_insns, (u_char*) hdr, 925 pkth.len, pkth.caplen)) { 926 handlep->packets_read++; 927 callback(user, &pkth, (u_char*) hdr); 928 packets++; 929 } 930 } 931 932 /* 933 * If max_packets specifies "unlimited", we stop after 934 * the first chunk. 935 */ 936 if (PACKET_COUNT_IS_UNLIMITED(max_packets) || 937 (packets >= max_packets)) 938 break; 939 } 940 941 /* flush pending events*/ 942 if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) { 943 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, 944 errno, "Can't mflush fd %d", handle->fd); 945 return -1; 946 } 947 return packets; 948 } 949 950 static void 951 usb_cleanup_linux_mmap(pcap_t* handle) 952 { 953 struct pcap_usb_linux *handlep = handle->priv; 954 955 /* if we have a memory-mapped buffer, unmap it */ 956 if (handlep->mmapbuf != NULL) { 957 munmap(handlep->mmapbuf, handlep->mmapbuflen); 958 handlep->mmapbuf = NULL; 959 } 960 pcapint_cleanup_live_common(handle); 961 } 962