xref: /freebsd/contrib/libpcap/pcap-usb-linux.c (revision eda14cbc264d6969b02f2b1994cef11148e914f1)
1 /*
2  * Copyright (c) 2006 Paolo Abeni (Italy)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  * notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  * notice, this list of conditions and the following disclaimer in the
13  * documentation and/or other materials provided with the distribution.
14  * 3. The name of the author may not be used to endorse or promote
15  * products derived from this software without specific prior written
16  * permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  *
30  * USB sniffing API implementation for Linux platform
31  * By Paolo Abeni <paolo.abeni@email.it>
32  * Modifications: Kris Katterjohn <katterjohn@gmail.com>
33  *
34  */
35 
36 #ifdef HAVE_CONFIG_H
37 #include <config.h>
38 #endif
39 
40 #include "pcap-int.h"
41 #include "pcap-usb-linux.h"
42 #include "pcap/usb.h"
43 
44 #ifdef NEED_STRERROR_H
45 #include "strerror.h"
46 #endif
47 
48 #include <ctype.h>
49 #include <errno.h>
50 #include <stdlib.h>
51 #include <unistd.h>
52 #include <fcntl.h>
53 #include <limits.h>
54 #include <string.h>
55 #include <dirent.h>
56 #include <byteswap.h>
57 #include <netinet/in.h>
58 #include <sys/ioctl.h>
59 #include <sys/mman.h>
60 #include <sys/utsname.h>
61 #ifdef HAVE_LINUX_USBDEVICE_FS_H
62 /*
63  * We might need <linux/compiler.h> to define __user for
64  * <linux/usbdevice_fs.h>.
65  */
66 #ifdef HAVE_LINUX_COMPILER_H
67 #include <linux/compiler.h>
68 #endif /* HAVE_LINUX_COMPILER_H */
69 #include <linux/usbdevice_fs.h>
70 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
71 
72 #define USB_IFACE "usbmon"
73 #define USB_TEXT_DIR_OLD "/sys/kernel/debug/usbmon"
74 #define USB_TEXT_DIR "/sys/kernel/debug/usb/usbmon"
75 #define SYS_USB_BUS_DIR "/sys/bus/usb/devices"
76 #define PROC_USB_BUS_DIR "/proc/bus/usb"
77 #define USB_LINE_LEN 4096
78 
79 #if __BYTE_ORDER == __LITTLE_ENDIAN
80 #define htols(s) s
81 #define htoll(l) l
82 #define htol64(ll) ll
83 #else
84 #define htols(s) bswap_16(s)
85 #define htoll(l) bswap_32(l)
86 #define htol64(ll) bswap_64(ll)
87 #endif
88 
89 struct mon_bin_stats {
90 	uint32_t queued;
91 	uint32_t dropped;
92 };
93 
94 struct mon_bin_get {
95 	pcap_usb_header *hdr;
96 	void *data;
97 	size_t data_len;   /* Length of data (can be zero) */
98 };
99 
100 struct mon_bin_mfetch {
101 	int32_t *offvec;   /* Vector of events fetched */
102 	int32_t nfetch;    /* Number of events to fetch (out: fetched) */
103 	int32_t nflush;    /* Number of events to flush */
104 };
105 
106 #define MON_IOC_MAGIC 0x92
107 
108 #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
109 #define MON_IOCX_URB  _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
110 #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
111 #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
112 #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
113 #define MON_IOCX_GET   _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
114 #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
115 #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
116 
117 #define MON_BIN_SETUP 	0x1 /* setup hdr is present*/
118 #define MON_BIN_SETUP_ZERO 	0x2 /* setup buffer is not available */
119 #define MON_BIN_DATA_ZERO 	0x4 /* data buffer is not available */
120 #define MON_BIN_ERROR 	0x8
121 
122 /*
123  * Private data for capturing on Linux USB.
124  */
125 struct pcap_usb_linux {
126 	u_char *mmapbuf;	/* memory-mapped region pointer */
127 	size_t mmapbuflen;	/* size of region */
128 	int bus_index;
129 	u_int packets_read;
130 };
131 
132 /* forward declaration */
133 static int usb_activate(pcap_t *);
134 static int usb_stats_linux(pcap_t *, struct pcap_stat *);
135 static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
136 static int usb_read_linux(pcap_t *, int , pcap_handler , u_char *);
137 static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
138 static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
139 static int usb_inject_linux(pcap_t *, const void *, size_t);
140 static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
141 static void usb_cleanup_linux_mmap(pcap_t *);
142 
143 static int
144 have_binary_usbmon(void)
145 {
146 	struct utsname utsname;
147 	char *version_component, *endp;
148 	int major, minor, subminor;
149 
150 	if (uname(&utsname) == 0) {
151 		/*
152 		 * 2.6.21 is the first release with the binary-mode
153 		 * USB monitoring.
154 		 */
155 		version_component = utsname.release;
156 		major = strtol(version_component, &endp, 10);
157 		if (endp != version_component && *endp == '.') {
158 			/*
159 			 * OK, that was a valid major version.
160 			 * Is it 3 or greater?  If so, we have binary
161 			 * mode support.
162 			 */
163 			if (major >= 3)
164 				return 1;
165 
166 			/*
167 			 * Is it 1 or less?  If so, we don't have binary
168 			 * mode support.  (In fact, we don't have any
169 			 * USB monitoring....)
170 			 */
171 			if (major <= 1)
172 				return 0;
173 		}
174 
175 		/*
176 		 * OK, this is a 2.x kernel.
177 		 * What's the minor version?
178 		 */
179 		version_component = endp + 1;
180 		minor = strtol(version_component, &endp, 10);
181 		if (endp != version_component &&
182 		    (*endp == '.' || *endp == '\0')) {
183 			/*
184 			 * OK, that was a valid minor version.
185 			 * Is is 2.6 or later?  (There shouldn't be a
186 			 * "later", as 2.6.x went to 3.x, but we'll
187 			 * check anyway.)
188 			 */
189 			if (minor < 6) {
190 				/*
191 				 * No, so no binary support (did 2.4 have
192 				 * any USB monitoring at all?)
193 				 */
194 				return 0;
195 			}
196 
197 			/*
198 			 * OK, this is a 2.6.x kernel.
199 			 * What's the subminor version?
200 			 */
201 			version_component = endp + 1;
202 			subminor = strtol(version_component, &endp, 10);
203 			if (endp != version_component &&
204 			    (*endp == '.' || *endp == '\0')) {
205 				/*
206 				 * OK, that was a valid subminor version.
207 				 * Is it 21 or greater?
208 				 */
209 				if (subminor >= 21) {
210 					/*
211 					 * Yes - we have binary mode
212 					 * support.
213 					 */
214 					return 1;
215 				}
216 			}
217 		}
218 	}
219 
220 	/*
221 	 * Either uname() failed, in which case we just say "no binary
222 	 * mode support", or we don't have binary mode support.
223 	 */
224 	return 0;
225 }
226 
227 /* facility to add an USB device to the device list*/
228 static int
229 usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
230 {
231 	char dev_name[10];
232 	char dev_descr[30];
233 	pcap_snprintf(dev_name, 10, USB_IFACE"%d", n);
234 	/*
235 	 * XXX - is there any notion of "up" and "running"?
236 	 */
237 	if (n == 0) {
238 		/*
239 		 * As this refers to all buses, there's no notion of
240 		 * "connected" vs. "disconnected", as that's a property
241 		 * that would apply to a particular USB interface.
242 		 */
243 		if (add_dev(devlistp, dev_name,
244 		    PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
245 		    "Raw USB traffic, all USB buses", err_str) == NULL)
246 			return -1;
247 	} else {
248 		/*
249 		 * XXX - is there a way to determine whether anything's
250 		 * plugged into this bus interface or not, and set
251 		 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
252 		 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
253 		 */
254 		pcap_snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
255 		if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
256 			return -1;
257 	}
258 
259 	return 0;
260 }
261 
262 int
263 usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
264 {
265 	char usb_mon_dir[PATH_MAX];
266 	char *usb_mon_prefix;
267 	size_t usb_mon_prefix_len;
268 	struct dirent* data;
269 	int ret = 0;
270 	DIR* dir;
271 	int n;
272 	char* name;
273 	size_t len;
274 
275 	if (have_binary_usbmon()) {
276 		/*
277 		 * We have binary-mode support.
278 		 * What do the device names look like?
279 		 * Split LINUX_USB_MON_DEV into a directory that we'll
280 		 * scan and a file name prefix that we'll check for.
281 		 */
282 		pcap_strlcpy(usb_mon_dir, LINUX_USB_MON_DEV, sizeof usb_mon_dir);
283 		usb_mon_prefix = strrchr(usb_mon_dir, '/');
284 		if (usb_mon_prefix == NULL) {
285 			/*
286 			 * This "shouldn't happen".  Just give up if it
287 			 * does.
288 			 */
289 			return 0;
290 		}
291 		*usb_mon_prefix++ = '\0';
292 		usb_mon_prefix_len = strlen(usb_mon_prefix);
293 
294 		/*
295 		 * Open the directory and scan it.
296 		 */
297 		dir = opendir(usb_mon_dir);
298 		if (dir != NULL) {
299 			while ((ret == 0) && ((data = readdir(dir)) != 0)) {
300 				name = data->d_name;
301 
302 				/*
303 				 * Is this a usbmon device?
304 				 */
305 				if (strncmp(name, usb_mon_prefix, usb_mon_prefix_len) != 0)
306 					continue;	/* no */
307 
308 				/*
309 				 * What's the device number?
310 				 */
311 				if (sscanf(&name[usb_mon_prefix_len], "%d", &n) == 0)
312 					continue;	/* failed */
313 
314 				ret = usb_dev_add(devlistp, n, err_str);
315 			}
316 
317 			closedir(dir);
318 		}
319 		return 0;
320 	} else {
321 		/*
322 		 * We have only text mode support.
323 		 * We don't look for the text devices because we can't
324 		 * look for them without root privileges, and we don't
325 		 * want to require root privileges to enumerate devices
326 		 * (we want to let the user to try a device and get
327 		 * an error, rather than seeing no devices and asking
328 		 * "why am I not seeing devices" and forcing a long
329 		 * process of poking to figure out whether it's "no
330 		 * privileges" or "your kernel is too old" or "the
331 		 * usbmon module isn't loaded" or...).
332 		 *
333 		 * Instead, we look to see what buses we have.
334 		 * If the kernel is so old that it doesn't have
335 		 * binary-mode support, it's also so old that
336 		 * it doesn't have a "scan all buses" device.
337 		 *
338 		 * First, try scanning sysfs USB bus directory.
339 		 */
340 		dir = opendir(SYS_USB_BUS_DIR);
341 		if (dir != NULL) {
342 			while ((ret == 0) && ((data = readdir(dir)) != 0)) {
343 				name = data->d_name;
344 
345 				if (strncmp(name, "usb", 3) != 0)
346 					continue;
347 
348 				if (sscanf(&name[3], "%d", &n) == 0)
349 					continue;
350 
351 				ret = usb_dev_add(devlistp, n, err_str);
352 			}
353 
354 			closedir(dir);
355 			return 0;
356 		}
357 
358 		/* That didn't work; try scanning procfs USB bus directory. */
359 		dir = opendir(PROC_USB_BUS_DIR);
360 		if (dir != NULL) {
361 			while ((ret == 0) && ((data = readdir(dir)) != 0)) {
362 				name = data->d_name;
363 				len = strlen(name);
364 
365 				/* if this file name does not end with a number it's not of our interest */
366 				if ((len < 1) || !isdigit(name[--len]))
367 					continue;
368 				while (isdigit(name[--len]));
369 				if (sscanf(&name[len+1], "%d", &n) != 1)
370 					continue;
371 
372 				ret = usb_dev_add(devlistp, n, err_str);
373 			}
374 
375 			closedir(dir);
376 			return ret;
377 		}
378 
379 		/* neither of them worked */
380 		return 0;
381 	}
382 }
383 
384 /*
385  * Matches what's in mon_bin.c in the Linux kernel.
386  */
387 #define MIN_RING_SIZE	(8*1024)
388 #define MAX_RING_SIZE	(1200*1024)
389 
390 static int
391 usb_set_ring_size(pcap_t* handle, int header_size)
392 {
393 	/*
394 	 * A packet from binary usbmon has:
395 	 *
396 	 *  1) a fixed-length header, of size header_size;
397 	 *  2) descriptors, for isochronous transfers;
398 	 *  3) the payload.
399 	 *
400 	 * The kernel buffer has a size, defaulting to 300KB, with a
401 	 * minimum of 8KB and a maximum of 1200KB.  The size is set with
402 	 * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
403 	 * to a page size.
404 	 *
405 	 * No more than {buffer size}/5 bytes worth of payload is saved.
406 	 * Therefore, if we subtract the fixed-length size from the
407 	 * snapshot length, we have the biggest payload we want (we
408 	 * don't worry about the descriptors - if we have descriptors,
409 	 * we'll just discard the last bit of the payload to get it
410 	 * to fit).  We multiply that result by 5 and set the buffer
411 	 * size to that value.
412 	 */
413 	int ring_size;
414 
415 	if (handle->snapshot < header_size)
416 		handle->snapshot = header_size;
417 	/* The maximum snapshot size is small enough that this won't overflow */
418 	ring_size = (handle->snapshot - header_size) * 5;
419 
420 	/*
421 	 * Will this get an error?
422 	 * (There's no wqy to query the minimum or maximum, so we just
423 	 * copy the value from the kernel source.  We don't round it
424 	 * up to a multiple of the page size.)
425 	 */
426 	if (ring_size > MAX_RING_SIZE) {
427 		/*
428 		 * Yes.  Lower the ring size to the maximum, and set the
429 		 * snapshot length to the value that would give us a
430 		 * maximum-size ring.
431 		 */
432 		ring_size = MAX_RING_SIZE;
433 		handle->snapshot = header_size + (MAX_RING_SIZE/5);
434 	} else if (ring_size < MIN_RING_SIZE) {
435 		/*
436 		 * Yes.  Raise the ring size to the minimum, but leave
437 		 * the snapshot length unchanged, so we show the
438 		 * callback no more data than specified by the
439 		 * snapshot length.
440 		 */
441 		ring_size = MIN_RING_SIZE;
442 	}
443 
444 	if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
445 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
446 		    errno, "Can't set ring size from fd %d", handle->fd);
447 		return -1;
448 	}
449 	return ring_size;
450 }
451 
452 static
453 int usb_mmap(pcap_t* handle)
454 {
455 	struct pcap_usb_linux *handlep = handle->priv;
456 	int len;
457 
458 	/*
459 	 * Attempt to set the ring size as appropriate for the snapshot
460 	 * length, reducing the snapshot length if that'd make the ring
461 	 * bigger than the kernel supports.
462 	 */
463 	len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
464 	if (len == -1) {
465 		/* Failed.  Fall back on non-memory-mapped access. */
466 		return 0;
467 	}
468 
469 	handlep->mmapbuflen = len;
470 	handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
471 	    MAP_SHARED, handle->fd, 0);
472 	if (handlep->mmapbuf == MAP_FAILED) {
473 		/*
474 		 * Failed.  We don't treat that as a fatal error, we
475 		 * just try to fall back on non-memory-mapped access.
476 		 */
477 		return 0;
478 	}
479 	return 1;
480 }
481 
482 #ifdef HAVE_LINUX_USBDEVICE_FS_H
483 
484 #define CTRL_TIMEOUT    (5*1000)        /* milliseconds */
485 
486 #define USB_DIR_IN		0x80
487 #define USB_TYPE_STANDARD	0x00
488 #define USB_RECIP_DEVICE	0x00
489 
490 #define USB_REQ_GET_DESCRIPTOR	6
491 
492 #define USB_DT_DEVICE		1
493 
494 /* probe the descriptors of the devices attached to the bus */
495 /* the descriptors will end up in the captured packet stream */
496 /* and be decoded by external apps like wireshark */
497 /* without these identifying probes packet data can't be fully decoded */
498 static void
499 probe_devices(int bus)
500 {
501 	struct usbdevfs_ctrltransfer ctrl;
502 	struct dirent* data;
503 	int ret = 0;
504 	char buf[sizeof("/dev/bus/usb/000/") + NAME_MAX];
505 	DIR* dir;
506 
507 	/* scan usb bus directories for device nodes */
508 	pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d", bus);
509 	dir = opendir(buf);
510 	if (!dir)
511 		return;
512 
513 	while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
514 		int fd;
515 		char* name = data->d_name;
516 
517 		if (name[0] == '.')
518 			continue;
519 
520 		pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d/%s", bus, data->d_name);
521 
522 		fd = open(buf, O_RDWR);
523 		if (fd == -1)
524 			continue;
525 
526 		/*
527 		 * Sigh.  Different kernels have different member names
528 		 * for this structure.
529 		 */
530 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
531 		ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
532 		ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
533 		ctrl.wValue = USB_DT_DEVICE << 8;
534 		ctrl.wIndex = 0;
535  		ctrl.wLength = sizeof(buf);
536 #else
537 		ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
538 		ctrl.request = USB_REQ_GET_DESCRIPTOR;
539 		ctrl.value = USB_DT_DEVICE << 8;
540 		ctrl.index = 0;
541  		ctrl.length = sizeof(buf);
542 #endif
543 		ctrl.data = buf;
544 		ctrl.timeout = CTRL_TIMEOUT;
545 
546 		ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
547 
548 		close(fd);
549 	}
550 	closedir(dir);
551 }
552 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
553 
554 pcap_t *
555 usb_create(const char *device, char *ebuf, int *is_ours)
556 {
557 	const char *cp;
558 	char *cpend;
559 	long devnum;
560 	pcap_t *p;
561 
562 	/* Does this look like a USB monitoring device? */
563 	cp = strrchr(device, '/');
564 	if (cp == NULL)
565 		cp = device;
566 	/* Does it begin with USB_IFACE? */
567 	if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
568 		/* Nope, doesn't begin with USB_IFACE */
569 		*is_ours = 0;
570 		return NULL;
571 	}
572 	/* Yes - is USB_IFACE followed by a number? */
573 	cp += sizeof USB_IFACE - 1;
574 	devnum = strtol(cp, &cpend, 10);
575 	if (cpend == cp || *cpend != '\0') {
576 		/* Not followed by a number. */
577 		*is_ours = 0;
578 		return NULL;
579 	}
580 	if (devnum < 0) {
581 		/* Followed by a non-valid number. */
582 		*is_ours = 0;
583 		return NULL;
584 	}
585 
586 	/* OK, it's probably ours. */
587 	*is_ours = 1;
588 
589 	p = pcap_create_common(ebuf, sizeof (struct pcap_usb_linux));
590 	if (p == NULL)
591 		return (NULL);
592 
593 	p->activate_op = usb_activate;
594 	return (p);
595 }
596 
597 static int
598 usb_activate(pcap_t* handle)
599 {
600 	struct pcap_usb_linux *handlep = handle->priv;
601 	char 		full_path[USB_LINE_LEN];
602 	int		ret;
603 
604 	/*
605 	 * Turn a negative snapshot value (invalid), a snapshot value of
606 	 * 0 (unspecified), or a value bigger than the normal maximum
607 	 * value, into the maximum allowed value.
608 	 *
609 	 * If some application really *needs* a bigger snapshot
610 	 * length, we should just increase MAXIMUM_SNAPLEN.
611 	 */
612 	if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
613 		handle->snapshot = MAXIMUM_SNAPLEN;
614 
615 	/* Initialize some components of the pcap structure. */
616 	handle->bufsize = handle->snapshot;
617 	handle->offset = 0;
618 	handle->linktype = DLT_USB_LINUX;
619 
620 	handle->inject_op = usb_inject_linux;
621 	handle->setfilter_op = install_bpf_program; /* no kernel filtering */
622 	handle->setdirection_op = usb_setdirection_linux;
623 	handle->set_datalink_op = NULL;	/* can't change data link type */
624 	handle->getnonblock_op = pcap_getnonblock_fd;
625 	handle->setnonblock_op = pcap_setnonblock_fd;
626 
627 	/*get usb bus index from device name */
628 	if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
629 	{
630 		pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
631 			"Can't get USB bus index from %s", handle->opt.device);
632 		return PCAP_ERROR;
633 	}
634 
635 	if (have_binary_usbmon())
636 	{
637 		/*
638 		 * We have binary-mode support.
639 		 * Try to open the binary interface.
640 		 */
641 		pcap_snprintf(full_path, USB_LINE_LEN, LINUX_USB_MON_DEV"%d", handlep->bus_index);
642 		handle->fd = open(full_path, O_RDONLY, 0);
643 		if (handle->fd < 0)
644 		{
645 			/*
646 			 * The attempt failed; why?
647 			 */
648 			switch (errno) {
649 
650 			case ENOENT:
651 				/*
652 				 * The device doesn't exist.
653 				 * That could either mean that there's
654 				 * no support for monitoring USB buses
655 				 * (which probably means "the usbmon
656 				 * module isn't loaded") or that there
657 				 * is but that *particular* device
658 				 * doesn't exist (no "scan all buses"
659 				 * device if the bus index is 0, no
660 				 * such bus if the bus index isn't 0).
661 				 */
662 				return PCAP_ERROR_NO_SUCH_DEVICE;
663 
664 			case EACCES:
665 				/*
666 				 * We didn't have permission to open it.
667 				 */
668 				return PCAP_ERROR_PERM_DENIED;
669 
670 			default:
671 				/*
672 				 * Something went wrong.
673 				 */
674 				pcap_fmt_errmsg_for_errno(handle->errbuf,
675 				    PCAP_ERRBUF_SIZE, errno,
676 				    "Can't open USB bus file %s", full_path);
677 				return PCAP_ERROR;
678 			}
679 		}
680 
681 		if (handle->opt.rfmon)
682 		{
683 			/*
684 			 * Monitor mode doesn't apply to USB devices.
685 			 */
686 			close(handle->fd);
687 			return PCAP_ERROR_RFMON_NOTSUP;
688 		}
689 
690 		/* try to use fast mmap access */
691 		if (usb_mmap(handle))
692 		{
693 			/* We succeeded. */
694 			handle->linktype = DLT_USB_LINUX_MMAPPED;
695 			handle->stats_op = usb_stats_linux_bin;
696 			handle->read_op = usb_read_linux_mmap;
697 			handle->cleanup_op = usb_cleanup_linux_mmap;
698 #ifdef HAVE_LINUX_USBDEVICE_FS_H
699 			probe_devices(handlep->bus_index);
700 #endif
701 
702 			/*
703 			 * "handle->fd" is a real file, so
704 			 * "select()" and "poll()" work on it.
705 			 */
706 			handle->selectable_fd = handle->fd;
707 			return 0;
708 		}
709 
710 		/*
711 		 * We failed; try plain binary interface access.
712 		 *
713 		 * Attempt to set the ring size as appropriate for
714 		 * the snapshot length, reducing the snapshot length
715 		 * if that'd make the ring bigger than the kernel
716 		 * supports.
717 		 */
718 		if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
719 			/* Failed. */
720 			close(handle->fd);
721 			return PCAP_ERROR;
722 		}
723 		handle->stats_op = usb_stats_linux_bin;
724 		handle->read_op = usb_read_linux_bin;
725 #ifdef HAVE_LINUX_USBDEVICE_FS_H
726 		probe_devices(handlep->bus_index);
727 #endif
728 	}
729 	else {
730 		/*
731 		 * We don't have binary mode support.
732 		 * Try opening the text-mode device.
733 		 */
734 		pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR"/%dt", handlep->bus_index);
735 		handle->fd = open(full_path, O_RDONLY, 0);
736 		if (handle->fd < 0)
737 		{
738 			if (errno == ENOENT)
739 			{
740 				/*
741 				 * Not found at the new location; try
742 				 * the old location.
743 				 */
744 				pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%dt", handlep->bus_index);
745 				handle->fd = open(full_path, O_RDONLY, 0);
746 			}
747 			if (handle->fd < 0) {
748 				if (errno == ENOENT)
749 				{
750 					/*
751 					 * The problem is that the file
752 					 * doesn't exist.  Report that as
753 					 * "no such device".  (That could
754 					 * mean "no such USB bus" or
755 					 * "monitoring not supported".)
756 					 */
757 					ret = PCAP_ERROR_NO_SUCH_DEVICE;
758 				}
759 				else if (errno == EACCES)
760 				{
761 					/*
762 					 * The problem is that we don't
763 					 * have sufficient permission to
764 					 * open the file.  Report that.
765 					 */
766 					ret = PCAP_ERROR_PERM_DENIED;
767 				}
768 				else
769 				{
770 					/*
771 					 * Some other error.
772 					 */
773 					ret = PCAP_ERROR;
774 				}
775 				pcap_fmt_errmsg_for_errno(handle->errbuf,
776 				    PCAP_ERRBUF_SIZE, errno,
777 				    "Can't open USB bus file %s",
778 				    full_path);
779 				return ret;
780 			}
781 		}
782 
783 		if (handle->opt.rfmon)
784 		{
785 			/*
786 			 * Monitor mode doesn't apply to USB devices.
787 			 */
788 			close(handle->fd);
789 			return PCAP_ERROR_RFMON_NOTSUP;
790 		}
791 
792 		handle->stats_op = usb_stats_linux;
793 		handle->read_op = usb_read_linux;
794 	}
795 
796 	/*
797 	 * "handle->fd" is a real file, so "select()" and "poll()"
798 	 * work on it.
799 	 */
800 	handle->selectable_fd = handle->fd;
801 
802 	/* for plain binary access and text access we need to allocate the read
803 	 * buffer */
804 	handle->buffer = malloc(handle->bufsize);
805 	if (!handle->buffer) {
806 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
807 		    errno, "malloc");
808 		close(handle->fd);
809 		return PCAP_ERROR;
810 	}
811 	return 0;
812 }
813 
814 static inline int
815 ascii_to_int(char c)
816 {
817 	return c < 'A' ? c- '0': ((c<'a') ? c - 'A' + 10: c-'a'+10);
818 }
819 
820 /*
821  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
822  * <linux-kernel-source>/drivers/usb/mon/mon_text.c for urb string
823  * format description
824  */
825 static int
826 usb_read_linux(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
827 {
828 	/* see:
829 	* /usr/src/linux/Documentation/usb/usbmon.txt
830 	* for message format
831 	*/
832 	struct pcap_usb_linux *handlep = handle->priv;
833 	unsigned timestamp;
834 	int tag, cnt, ep_num, dev_addr, dummy, ret, urb_len, data_len;
835 	char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN];
836 	char *string = line;
837 	u_char * rawdata = handle->buffer;
838 	struct pcap_pkthdr pkth;
839 	pcap_usb_header* uhdr = (pcap_usb_header*)handle->buffer;
840 	u_char urb_transfer=0;
841 	int incoming=0;
842 
843 	/* ignore interrupt system call errors */
844 	do {
845 		ret = read(handle->fd, line, USB_LINE_LEN - 1);
846 		if (handle->break_loop)
847 		{
848 			handle->break_loop = 0;
849 			return -2;
850 		}
851 	} while ((ret == -1) && (errno == EINTR));
852 	if (ret < 0)
853 	{
854 		if (errno == EAGAIN)
855 			return 0;	/* no data there */
856 
857 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
858 		    errno, "Can't read from fd %d", handle->fd);
859 		return -1;
860 	}
861 
862 	/* read urb header; %n argument may increment return value, but it's
863 	* not mandatory, so does not count on it*/
864 	string[ret] = 0;
865 	ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, &timestamp, &etype,
866 		&pipeid1, &pipeid2, &dev_addr, &ep_num, status,
867 		&cnt);
868 	if (ret < 8)
869 	{
870 		pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
871 		    "Can't parse USB bus message '%s', too few tokens (expected 8 got %d)",
872 		    string, ret);
873 		return -1;
874 	}
875 	uhdr->id = tag;
876 	uhdr->device_address = dev_addr;
877 	uhdr->bus_id = handlep->bus_index;
878 	uhdr->status = 0;
879 	string += cnt;
880 
881 	/* don't use usbmon provided timestamp, since it have low precision*/
882 	if (gettimeofday(&pkth.ts, NULL) < 0)
883 	{
884 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
885 		    errno, "Can't get timestamp for message '%s'", string);
886 		return -1;
887 	}
888 	uhdr->ts_sec = pkth.ts.tv_sec;
889 	uhdr->ts_usec = pkth.ts.tv_usec;
890 
891 	/* parse endpoint information */
892 	if (pipeid1 == 'C')
893 		urb_transfer = URB_CONTROL;
894 	else if (pipeid1 == 'Z')
895 		urb_transfer = URB_ISOCHRONOUS;
896 	else if (pipeid1 == 'I')
897 		urb_transfer = URB_INTERRUPT;
898 	else if (pipeid1 == 'B')
899 		urb_transfer = URB_BULK;
900 	if (pipeid2 == 'i') {
901 		ep_num |= URB_TRANSFER_IN;
902 		incoming = 1;
903 	}
904 	if (etype == 'C')
905 		incoming = !incoming;
906 
907 	/* direction check*/
908 	if (incoming)
909 	{
910 		if (handle->direction == PCAP_D_OUT)
911 			return 0;
912 	}
913 	else
914 		if (handle->direction == PCAP_D_IN)
915 			return 0;
916 	uhdr->event_type = etype;
917 	uhdr->transfer_type = urb_transfer;
918 	uhdr->endpoint_number = ep_num;
919 	pkth.caplen = sizeof(pcap_usb_header);
920 	rawdata += sizeof(pcap_usb_header);
921 
922 	/* check if this is a setup packet */
923 	ret = sscanf(status, "%d", &dummy);
924 	if (ret != 1)
925 	{
926 		/* this a setup packet, setup data can be filled with underscore if
927 		* usbmon has not been able to read them, so we must parse this fields as
928 		* strings */
929 		pcap_usb_setup* shdr;
930 		char str1[3], str2[3], str3[5], str4[5], str5[5];
931 		ret = sscanf(string, "%s %s %s %s %s%n", str1, str2, str3, str4,
932 		str5, &cnt);
933 		if (ret < 5)
934 		{
935 			pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
936 				"Can't parse USB bus message '%s', too few tokens (expected 5 got %d)",
937 				string, ret);
938 			return -1;
939 		}
940 		string += cnt;
941 
942 		/* try to convert to corresponding integer */
943 		shdr = &uhdr->setup;
944 		shdr->bmRequestType = strtoul(str1, 0, 16);
945 		shdr->bRequest = strtoul(str2, 0, 16);
946 		shdr->wValue = htols(strtoul(str3, 0, 16));
947 		shdr->wIndex = htols(strtoul(str4, 0, 16));
948 		shdr->wLength = htols(strtoul(str5, 0, 16));
949 
950 		uhdr->setup_flag = 0;
951 	}
952 	else
953 		uhdr->setup_flag = 1;
954 
955 	/* read urb data */
956 	ret = sscanf(string, " %d%n", &urb_len, &cnt);
957 	if (ret < 1)
958 	{
959 		pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
960 		  "Can't parse urb length from '%s'", string);
961 		return -1;
962 	}
963 	string += cnt;
964 
965 	/* urb tag is not present if urb length is 0, so we can stop here
966 	 * text parsing */
967 	pkth.len = urb_len+pkth.caplen;
968 	uhdr->urb_len = urb_len;
969 	uhdr->data_flag = 1;
970 	data_len = 0;
971 	if (uhdr->urb_len == 0)
972 		goto got;
973 
974 	/* check for data presence; data is present if and only if urb tag is '=' */
975 	if (sscanf(string, " %c", &urb_tag) != 1)
976 	{
977 		pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
978 			"Can't parse urb tag from '%s'", string);
979 		return -1;
980 	}
981 
982 	if (urb_tag != '=')
983 		goto got;
984 
985 	/* skip urb tag and following space */
986 	string += 3;
987 
988 	/* if we reach this point we got some urb data*/
989 	uhdr->data_flag = 0;
990 
991 	/* read all urb data; if urb length is greater then the usbmon internal
992 	 * buffer length used by the kernel to spool the URB, we get only
993 	 * a partial information.
994 	 * At least until linux 2.6.17 there is no way to set usbmon intenal buffer
995 	 * length and default value is 130. */
996 	while ((string[0] != 0) && (string[1] != 0) && (pkth.caplen < (bpf_u_int32)handle->snapshot))
997 	{
998 		rawdata[0] = ascii_to_int(string[0]) * 16 + ascii_to_int(string[1]);
999 		rawdata++;
1000 		string+=2;
1001 		if (string[0] == ' ')
1002 			string++;
1003 		pkth.caplen++;
1004 		data_len++;
1005 	}
1006 
1007 got:
1008 	uhdr->data_len = data_len;
1009 	if (pkth.caplen > (bpf_u_int32)handle->snapshot)
1010 		pkth.caplen = (bpf_u_int32)handle->snapshot;
1011 
1012 	if (handle->fcode.bf_insns == NULL ||
1013 	    bpf_filter(handle->fcode.bf_insns, handle->buffer,
1014 	      pkth.len, pkth.caplen)) {
1015 		handlep->packets_read++;
1016 		callback(user, &pkth, handle->buffer);
1017 		return 1;
1018 	}
1019 	return 0;	/* didn't pass filter */
1020 }
1021 
1022 static int
1023 usb_inject_linux(pcap_t *handle, const void *buf _U_, size_t size _U_)
1024 {
1025 	pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1026 	    "Packet injection is not supported on USB devices");
1027 	return (-1);
1028 }
1029 
1030 static int
1031 usb_stats_linux(pcap_t *handle, struct pcap_stat *stats)
1032 {
1033 	struct pcap_usb_linux *handlep = handle->priv;
1034 	int dummy, ret, consumed, cnt;
1035 	char string[USB_LINE_LEN];
1036 	char token[USB_LINE_LEN];
1037 	char * ptr = string;
1038 	int fd;
1039 
1040 	pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR"/%ds", handlep->bus_index);
1041 	fd = open(string, O_RDONLY, 0);
1042 	if (fd < 0)
1043 	{
1044 		if (errno == ENOENT)
1045 		{
1046 			/*
1047 			 * Not found at the new location; try the old
1048 			 * location.
1049 			 */
1050 			pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%ds", handlep->bus_index);
1051 			fd = open(string, O_RDONLY, 0);
1052 		}
1053 		if (fd < 0) {
1054 			pcap_fmt_errmsg_for_errno(handle->errbuf,
1055 			    PCAP_ERRBUF_SIZE, errno,
1056 			    "Can't open USB stats file %s", string);
1057 			return -1;
1058 		}
1059 	}
1060 
1061 	/* read stats line */
1062 	do {
1063 		ret = read(fd, string, USB_LINE_LEN-1);
1064 	} while ((ret == -1) && (errno == EINTR));
1065 	close(fd);
1066 
1067 	if (ret < 0)
1068 	{
1069 		pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1070 			"Can't read stats from fd %d ", fd);
1071 		return -1;
1072 	}
1073 	string[ret] = 0;
1074 
1075 	stats->ps_recv = handlep->packets_read;
1076 	stats->ps_drop = 0;	/* unless we find text_lost */
1077 	stats->ps_ifdrop = 0;
1078 
1079 	/* extract info on dropped urbs */
1080 	for (consumed=0; consumed < ret; ) {
1081 		/* from the sscanf man page:
1082  		 * The C standard says: "Execution of a %n directive does
1083  		 * not increment the assignment count returned at the completion
1084 		 * of  execution" but the Corrigendum seems to contradict this.
1085 		 * Do not make any assumptions on the effect of %n conversions
1086 		 * on the return value and explicitly check for cnt assignmet*/
1087 		int ntok;
1088 
1089 		cnt = -1;
1090 		ntok = sscanf(ptr, "%s%n", token, &cnt);
1091 		if ((ntok < 1) || (cnt < 0))
1092 			break;
1093 		consumed += cnt;
1094 		ptr += cnt;
1095 		if (strcmp(token, "text_lost") == 0)
1096 			ntok = sscanf(ptr, "%d%n", &stats->ps_drop, &cnt);
1097 		else
1098 			ntok = sscanf(ptr, "%d%n", &dummy, &cnt);
1099 		if ((ntok != 1) || (cnt < 0))
1100 			break;
1101 		consumed += cnt;
1102 		ptr += cnt;
1103 	}
1104 
1105 	return 0;
1106 }
1107 
1108 static int
1109 usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
1110 {
1111 	p->direction = d;
1112 	return 0;
1113 }
1114 
1115 
1116 static int
1117 usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
1118 {
1119 	struct pcap_usb_linux *handlep = handle->priv;
1120 	int ret;
1121 	struct mon_bin_stats st;
1122 	ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
1123 	if (ret < 0)
1124 	{
1125 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1126 		    errno, "Can't read stats from fd %d", handle->fd);
1127 		return -1;
1128 	}
1129 
1130 	stats->ps_recv = handlep->packets_read + st.queued;
1131 	stats->ps_drop = st.dropped;
1132 	stats->ps_ifdrop = 0;
1133 	return 0;
1134 }
1135 
1136 /*
1137  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1138  * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1139  */
1140 static int
1141 usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
1142 {
1143 	struct pcap_usb_linux *handlep = handle->priv;
1144 	struct mon_bin_get info;
1145 	int ret;
1146 	struct pcap_pkthdr pkth;
1147 	u_int clen = handle->snapshot - sizeof(pcap_usb_header);
1148 
1149 	/* the usb header is going to be part of 'packet' data*/
1150 	info.hdr = (pcap_usb_header*) handle->buffer;
1151 	info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
1152 	info.data_len = clen;
1153 
1154 	/* ignore interrupt system call errors */
1155 	do {
1156 		ret = ioctl(handle->fd, MON_IOCX_GET, &info);
1157 		if (handle->break_loop)
1158 		{
1159 			handle->break_loop = 0;
1160 			return -2;
1161 		}
1162 	} while ((ret == -1) && (errno == EINTR));
1163 	if (ret < 0)
1164 	{
1165 		if (errno == EAGAIN)
1166 			return 0;	/* no data there */
1167 
1168 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1169 		    errno, "Can't read from fd %d", handle->fd);
1170 		return -1;
1171 	}
1172 
1173 	/*
1174 	 * info.hdr->data_len is the number of bytes of isochronous
1175 	 * descriptors (if any) plus the number of bytes of data
1176 	 * provided.  There are no isochronous descriptors here,
1177 	 * because we're using the old 48-byte header.
1178 	 *
1179 	 * If info.hdr->data_flag is non-zero, there's no URB data;
1180 	 * info.hdr->urb_len is the size of the buffer into which
1181 	 * data is to be placed; it does not represent the amount
1182 	 * of data transferred.  If info.hdr->data_flag is zero,
1183 	 * there is URB data, and info.hdr->urb_len is the number
1184 	 * of bytes transmitted or received; it doesn't include
1185 	 * isochronous descriptors.
1186 	 *
1187 	 * The kernel may give us more data than the snaplen; if it did,
1188 	 * reduce the data length so that the total number of bytes we
1189 	 * tell our client we have is not greater than the snaplen.
1190 	 */
1191 	if (info.hdr->data_len < clen)
1192 		clen = info.hdr->data_len;
1193 	info.hdr->data_len = clen;
1194 	pkth.caplen = sizeof(pcap_usb_header) + clen;
1195 	if (info.hdr->data_flag) {
1196 		/*
1197 		 * No data; just base the on-the-wire length on
1198 		 * info.hdr->data_len (so that it's >= the captured
1199 		 * length).
1200 		 */
1201 		pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
1202 	} else {
1203 		/*
1204 		 * We got data; base the on-the-wire length on
1205 		 * info.hdr->urb_len, so that it includes data
1206 		 * discarded by the USB monitor device due to
1207 		 * its buffer being too small.
1208 		 */
1209 		pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
1210 	}
1211 	pkth.ts.tv_sec = info.hdr->ts_sec;
1212 	pkth.ts.tv_usec = info.hdr->ts_usec;
1213 
1214 	if (handle->fcode.bf_insns == NULL ||
1215 	    bpf_filter(handle->fcode.bf_insns, handle->buffer,
1216 	      pkth.len, pkth.caplen)) {
1217 		handlep->packets_read++;
1218 		callback(user, &pkth, handle->buffer);
1219 		return 1;
1220 	}
1221 
1222 	return 0;	/* didn't pass filter */
1223 }
1224 
1225 /*
1226  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1227  * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1228  */
1229 #define VEC_SIZE 32
1230 static int
1231 usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
1232 {
1233 	struct pcap_usb_linux *handlep = handle->priv;
1234 	struct mon_bin_mfetch fetch;
1235 	int32_t vec[VEC_SIZE];
1236 	struct pcap_pkthdr pkth;
1237 	pcap_usb_header_mmapped* hdr;
1238 	int nflush = 0;
1239 	int packets = 0;
1240 	u_int clen, max_clen;
1241 
1242 	max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
1243 
1244 	for (;;) {
1245 		int i, ret;
1246 		int limit = max_packets - packets;
1247 		if (limit <= 0)
1248 			limit = VEC_SIZE;
1249 		if (limit > VEC_SIZE)
1250 			limit = VEC_SIZE;
1251 
1252 		/* try to fetch as many events as possible*/
1253 		fetch.offvec = vec;
1254 		fetch.nfetch = limit;
1255 		fetch.nflush = nflush;
1256 		/* ignore interrupt system call errors */
1257 		do {
1258 			ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
1259 			if (handle->break_loop)
1260 			{
1261 				handle->break_loop = 0;
1262 				return -2;
1263 			}
1264 		} while ((ret == -1) && (errno == EINTR));
1265 		if (ret < 0)
1266 		{
1267 			if (errno == EAGAIN)
1268 				return 0;	/* no data there */
1269 
1270 			pcap_fmt_errmsg_for_errno(handle->errbuf,
1271 			    PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
1272 			    handle->fd);
1273 			return -1;
1274 		}
1275 
1276 		/* keep track of processed events, we will flush them later */
1277 		nflush = fetch.nfetch;
1278 		for (i=0; i<fetch.nfetch; ++i) {
1279 			/* discard filler */
1280 			hdr = (pcap_usb_header_mmapped*) &handlep->mmapbuf[vec[i]];
1281 			if (hdr->event_type == '@')
1282 				continue;
1283 
1284 			/*
1285 			 * hdr->data_len is the number of bytes of
1286 			 * isochronous descriptors (if any) plus the
1287 			 * number of bytes of data provided.
1288 			 *
1289 			 * If hdr->data_flag is non-zero, there's no
1290 			 * URB data; hdr->urb_len is the size of the
1291 			 * buffer into which data is to be placed; it does
1292 			 * not represent the amount of data transferred.
1293 			 * If hdr->data_flag is zero, there is URB data,
1294 			 * and hdr->urb_len is the number of bytes
1295 			 * transmitted or received; it doesn't include
1296 			 * isochronous descriptors.
1297 			 *
1298 			 * The kernel may give us more data than the
1299 			 * snaplen; if it did, reduce the data length
1300 			 * so that the total number of bytes we
1301 			 * tell our client we have is not greater than
1302 			 * the snaplen.
1303 			 */
1304 			clen = max_clen;
1305 			if (hdr->data_len < clen)
1306 				clen = hdr->data_len;
1307 			pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
1308 			if (hdr->data_flag) {
1309 				/*
1310 				 * No data; just base the on-the-wire length
1311 				 * on hdr->data_len (so that it's >= the
1312 				 * captured length).
1313 				 */
1314 				pkth.len = sizeof(pcap_usb_header_mmapped) +
1315 				    hdr->data_len;
1316 			} else {
1317 				/*
1318 				 * We got data; base the on-the-wire length
1319 				 * on hdr->urb_len, so that it includes
1320 				 * data discarded by the USB monitor device
1321 				 * due to its buffer being too small.
1322 				 */
1323 				pkth.len = sizeof(pcap_usb_header_mmapped) +
1324 				    (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
1325 			}
1326 			pkth.ts.tv_sec = hdr->ts_sec;
1327 			pkth.ts.tv_usec = hdr->ts_usec;
1328 
1329 			if (handle->fcode.bf_insns == NULL ||
1330 			    bpf_filter(handle->fcode.bf_insns, (u_char*) hdr,
1331 			      pkth.len, pkth.caplen)) {
1332 				handlep->packets_read++;
1333 				callback(user, &pkth, (u_char*) hdr);
1334 				packets++;
1335 			}
1336 		}
1337 
1338 		/* with max_packets specifying "unlimited" we stop afer the first chunk*/
1339 		if (PACKET_COUNT_IS_UNLIMITED(max_packets) || (packets == max_packets))
1340 			break;
1341 	}
1342 
1343 	/* flush pending events*/
1344 	if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
1345 		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1346 		    errno, "Can't mflush fd %d", handle->fd);
1347 		return -1;
1348 	}
1349 	return packets;
1350 }
1351 
1352 static void
1353 usb_cleanup_linux_mmap(pcap_t* handle)
1354 {
1355 	struct pcap_usb_linux *handlep = handle->priv;
1356 
1357 	/* if we have a memory-mapped buffer, unmap it */
1358 	if (handlep->mmapbuf != NULL) {
1359 		munmap(handlep->mmapbuf, handlep->mmapbuflen);
1360 		handlep->mmapbuf = NULL;
1361 	}
1362 	pcap_cleanup_live_common(handle);
1363 }
1364