Coverage Report

Created: 2021-11-03 07:11

/src/libpcap-1.9.1/pcap-usb-linux.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (c) 2006 Paolo Abeni (Italy)
3
 * All rights reserved.
4
 *
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
7
 * are met:
8
 *
9
 * 1. Redistributions of source code must retain the above copyright
10
 * notice, this list of conditions and the following disclaimer.
11
 * 2. Redistributions in binary form must reproduce the above copyright
12
 * notice, this list of conditions and the following disclaimer in the
13
 * documentation and/or other materials provided with the distribution.
14
 * 3. The name of the author may not be used to endorse or promote
15
 * products derived from this software without specific prior written
16
 * permission.
17
 *
18
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21
 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22
 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24
 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28
 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29
 *
30
 * USB sniffing API implementation for Linux platform
31
 * By Paolo Abeni <paolo.abeni@email.it>
32
 * Modifications: Kris Katterjohn <katterjohn@gmail.com>
33
 *
34
 */
35
36
#ifdef HAVE_CONFIG_H
37
#include <config.h>
38
#endif
39
40
#include "pcap-int.h"
41
#include "pcap-usb-linux.h"
42
#include "pcap/usb.h"
43
44
#ifdef NEED_STRERROR_H
45
#include "strerror.h"
46
#endif
47
48
#include <ctype.h>
49
#include <errno.h>
50
#include <stdlib.h>
51
#include <unistd.h>
52
#include <fcntl.h>
53
#include <limits.h>
54
#include <string.h>
55
#include <dirent.h>
56
#include <byteswap.h>
57
#include <netinet/in.h>
58
#include <sys/ioctl.h>
59
#include <sys/mman.h>
60
#include <sys/utsname.h>
61
#ifdef HAVE_LINUX_USBDEVICE_FS_H
62
/*
63
 * We might need <linux/compiler.h> to define __user for
64
 * <linux/usbdevice_fs.h>.
65
 */
66
#ifdef HAVE_LINUX_COMPILER_H
67
#include <linux/compiler.h>
68
#endif /* HAVE_LINUX_COMPILER_H */
69
#include <linux/usbdevice_fs.h>
70
#endif /* HAVE_LINUX_USBDEVICE_FS_H */
71
72
0
#define USB_IFACE "usbmon"
73
0
#define USB_TEXT_DIR_OLD "/sys/kernel/debug/usbmon"
74
0
#define USB_TEXT_DIR "/sys/kernel/debug/usb/usbmon"
75
0
#define SYS_USB_BUS_DIR "/sys/bus/usb/devices"
76
0
#define PROC_USB_BUS_DIR "/proc/bus/usb"
77
0
#define USB_LINE_LEN 4096
78
79
#if __BYTE_ORDER == __LITTLE_ENDIAN
80
0
#define htols(s) s
81
#define htoll(l) l
82
#define htol64(ll) ll
83
#else
84
#define htols(s) bswap_16(s)
85
#define htoll(l) bswap_32(l)
86
#define htol64(ll) bswap_64(ll)
87
#endif
88
89
struct mon_bin_stats {
90
  uint32_t queued;
91
  uint32_t dropped;
92
};
93
94
struct mon_bin_get {
95
  pcap_usb_header *hdr;
96
  void *data;
97
  size_t data_len;   /* Length of data (can be zero) */
98
};
99
100
struct mon_bin_mfetch {
101
  int32_t *offvec;   /* Vector of events fetched */
102
  int32_t nfetch;    /* Number of events to fetch (out: fetched) */
103
  int32_t nflush;    /* Number of events to flush */
104
};
105
106
#define MON_IOC_MAGIC 0x92
107
108
#define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
109
#define MON_IOCX_URB  _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
110
0
#define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
111
0
#define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
112
#define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
113
0
#define MON_IOCX_GET   _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
114
0
#define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
115
0
#define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
116
117
#define MON_BIN_SETUP   0x1 /* setup hdr is present*/
118
#define MON_BIN_SETUP_ZERO  0x2 /* setup buffer is not available */
119
#define MON_BIN_DATA_ZERO   0x4 /* data buffer is not available */
120
#define MON_BIN_ERROR   0x8
121
122
/*
123
 * Private data for capturing on Linux USB.
124
 */
125
struct pcap_usb_linux {
126
  u_char *mmapbuf;  /* memory-mapped region pointer */
127
  size_t mmapbuflen;  /* size of region */
128
  int bus_index;
129
  u_int packets_read;
130
};
131
132
/* forward declaration */
133
static int usb_activate(pcap_t *);
134
static int usb_stats_linux(pcap_t *, struct pcap_stat *);
135
static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
136
static int usb_read_linux(pcap_t *, int , pcap_handler , u_char *);
137
static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
138
static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
139
static int usb_inject_linux(pcap_t *, const void *, size_t);
140
static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
141
static void usb_cleanup_linux_mmap(pcap_t *);
142
143
static int
144
have_binary_usbmon(void)
145
0
{
146
0
  struct utsname utsname;
147
0
  char *version_component, *endp;
148
0
  int major, minor, subminor;
149
150
0
  if (uname(&utsname) == 0) {
151
    /*
152
     * 2.6.21 is the first release with the binary-mode
153
     * USB monitoring.
154
     */
155
0
    version_component = utsname.release;
156
0
    major = strtol(version_component, &endp, 10);
157
0
    if (endp != version_component && *endp == '.') {
158
      /*
159
       * OK, that was a valid major version.
160
       * Is it 3 or greater?  If so, we have binary
161
       * mode support.
162
       */
163
0
      if (major >= 3)
164
0
        return 1;
165
166
      /*
167
       * Is it 1 or less?  If so, we don't have binary
168
       * mode support.  (In fact, we don't have any
169
       * USB monitoring....)
170
       */
171
0
      if (major <= 1)
172
0
        return 0;
173
0
    }
174
175
    /*
176
     * OK, this is a 2.x kernel.
177
     * What's the minor version?
178
     */
179
0
    version_component = endp + 1;
180
0
    minor = strtol(version_component, &endp, 10);
181
0
    if (endp != version_component &&
182
0
        (*endp == '.' || *endp == '\0')) {
183
      /*
184
       * OK, that was a valid minor version.
185
       * Is is 2.6 or later?  (There shouldn't be a
186
       * "later", as 2.6.x went to 3.x, but we'll
187
       * check anyway.)
188
       */
189
0
      if (minor < 6) {
190
        /*
191
         * No, so no binary support (did 2.4 have
192
         * any USB monitoring at all?)
193
         */
194
0
        return 0;
195
0
      }
196
197
      /*
198
       * OK, this is a 2.6.x kernel.
199
       * What's the subminor version?
200
       */
201
0
      version_component = endp + 1;
202
0
      subminor = strtol(version_component, &endp, 10);
203
0
      if (endp != version_component &&
204
0
          (*endp == '.' || *endp == '\0')) {
205
        /*
206
         * OK, that was a valid subminor version.
207
         * Is it 21 or greater?
208
         */
209
0
        if (subminor >= 21) {
210
          /*
211
           * Yes - we have binary mode
212
           * support.
213
           */
214
0
          return 1;
215
0
        }
216
0
      }
217
0
    }
218
0
  }
219
220
  /*
221
   * Either uname() failed, in which case we just say "no binary
222
   * mode support", or we don't have binary mode support.
223
   */
224
0
  return 0;
225
0
}
226
227
/* facility to add an USB device to the device list*/
228
static int
229
usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
230
0
{
231
0
  char dev_name[10];
232
0
  char dev_descr[30];
233
0
  pcap_snprintf(dev_name, 10, USB_IFACE"%d", n);
234
  /*
235
   * XXX - is there any notion of "up" and "running"?
236
   */
237
0
  if (n == 0) {
238
    /*
239
     * As this refers to all buses, there's no notion of
240
     * "connected" vs. "disconnected", as that's a property
241
     * that would apply to a particular USB interface.
242
     */
243
0
    if (add_dev(devlistp, dev_name,
244
0
        PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
245
0
        "Raw USB traffic, all USB buses", err_str) == NULL)
246
0
      return -1;
247
0
  } else {
248
    /*
249
     * XXX - is there a way to determine whether anything's
250
     * plugged into this bus interface or not, and set
251
     * PCAP_IF_CONNECTION_STATUS_CONNECTED or
252
     * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
253
     */
254
0
    pcap_snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
255
0
    if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
256
0
      return -1;
257
0
  }
258
259
0
  return 0;
260
0
}
261
262
int
263
usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
264
0
{
265
0
  char usb_mon_dir[PATH_MAX];
266
0
  char *usb_mon_prefix;
267
0
  size_t usb_mon_prefix_len;
268
0
  struct dirent* data;
269
0
  int ret = 0;
270
0
  DIR* dir;
271
0
  int n;
272
0
  char* name;
273
0
  size_t len;
274
275
0
  if (have_binary_usbmon()) {
276
    /*
277
     * We have binary-mode support.
278
     * What do the device names look like?
279
     * Split LINUX_USB_MON_DEV into a directory that we'll
280
     * scan and a file name prefix that we'll check for.
281
     */
282
0
    pcap_strlcpy(usb_mon_dir, LINUX_USB_MON_DEV, sizeof usb_mon_dir);
283
0
    usb_mon_prefix = strrchr(usb_mon_dir, '/');
284
0
    if (usb_mon_prefix == NULL) {
285
      /*
286
       * This "shouldn't happen".  Just give up if it
287
       * does.
288
       */
289
0
      return 0;
290
0
    }
291
0
    *usb_mon_prefix++ = '\0';
292
0
    usb_mon_prefix_len = strlen(usb_mon_prefix);
293
294
    /*
295
     * Open the directory and scan it.
296
     */
297
0
    dir = opendir(usb_mon_dir);
298
0
    if (dir != NULL) {
299
0
      while ((ret == 0) && ((data = readdir(dir)) != 0)) {
300
0
        name = data->d_name;
301
302
        /*
303
         * Is this a usbmon device?
304
         */
305
0
        if (strncmp(name, usb_mon_prefix, usb_mon_prefix_len) != 0)
306
0
          continue; /* no */
307
308
        /*
309
         * What's the device number?
310
         */
311
0
        if (sscanf(&name[usb_mon_prefix_len], "%d", &n) == 0)
312
0
          continue; /* failed */
313
314
0
        ret = usb_dev_add(devlistp, n, err_str);
315
0
      }
316
317
0
      closedir(dir);
318
0
    }
319
0
    return 0;
320
0
  } else {
321
    /*
322
     * We have only text mode support.
323
     * We don't look for the text devices because we can't
324
     * look for them without root privileges, and we don't
325
     * want to require root privileges to enumerate devices
326
     * (we want to let the user to try a device and get
327
     * an error, rather than seeing no devices and asking
328
     * "why am I not seeing devices" and forcing a long
329
     * process of poking to figure out whether it's "no
330
     * privileges" or "your kernel is too old" or "the
331
     * usbmon module isn't loaded" or...).
332
     *
333
     * Instead, we look to see what buses we have.
334
     * If the kernel is so old that it doesn't have
335
     * binary-mode support, it's also so old that
336
     * it doesn't have a "scan all buses" device.
337
     *
338
     * First, try scanning sysfs USB bus directory.
339
     */
340
0
    dir = opendir(SYS_USB_BUS_DIR);
341
0
    if (dir != NULL) {
342
0
      while ((ret == 0) && ((data = readdir(dir)) != 0)) {
343
0
        name = data->d_name;
344
345
0
        if (strncmp(name, "usb", 3) != 0)
346
0
          continue;
347
348
0
        if (sscanf(&name[3], "%d", &n) == 0)
349
0
          continue;
350
351
0
        ret = usb_dev_add(devlistp, n, err_str);
352
0
      }
353
354
0
      closedir(dir);
355
0
      return 0;
356
0
    }
357
358
    /* That didn't work; try scanning procfs USB bus directory. */
359
0
    dir = opendir(PROC_USB_BUS_DIR);
360
0
    if (dir != NULL) {
361
0
      while ((ret == 0) && ((data = readdir(dir)) != 0)) {
362
0
        name = data->d_name;
363
0
        len = strlen(name);
364
365
        /* if this file name does not end with a number it's not of our interest */
366
0
        if ((len < 1) || !isdigit(name[--len]))
367
0
          continue;
368
0
        while (isdigit(name[--len]));
369
0
        if (sscanf(&name[len+1], "%d", &n) != 1)
370
0
          continue;
371
372
0
        ret = usb_dev_add(devlistp, n, err_str);
373
0
      }
374
375
0
      closedir(dir);
376
0
      return ret;
377
0
    }
378
379
    /* neither of them worked */
380
0
    return 0;
381
0
  }
382
0
}
383
384
/*
385
 * Matches what's in mon_bin.c in the Linux kernel.
386
 */
387
0
#define MIN_RING_SIZE (8*1024)
388
0
#define MAX_RING_SIZE (1200*1024)
389
390
static int
391
usb_set_ring_size(pcap_t* handle, int header_size)
392
0
{
393
  /*
394
   * A packet from binary usbmon has:
395
   *
396
   *  1) a fixed-length header, of size header_size;
397
   *  2) descriptors, for isochronous transfers;
398
   *  3) the payload.
399
   *
400
   * The kernel buffer has a size, defaulting to 300KB, with a
401
   * minimum of 8KB and a maximum of 1200KB.  The size is set with
402
   * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
403
   * to a page size.
404
   *
405
   * No more than {buffer size}/5 bytes worth of payload is saved.
406
   * Therefore, if we subtract the fixed-length size from the
407
   * snapshot length, we have the biggest payload we want (we
408
   * don't worry about the descriptors - if we have descriptors,
409
   * we'll just discard the last bit of the payload to get it
410
   * to fit).  We multiply that result by 5 and set the buffer
411
   * size to that value.
412
   */
413
0
  int ring_size;
414
415
0
  if (handle->snapshot < header_size)
416
0
    handle->snapshot = header_size;
417
  /* The maximum snapshot size is small enough that this won't overflow */
418
0
  ring_size = (handle->snapshot - header_size) * 5;
419
420
  /*
421
   * Will this get an error?
422
   * (There's no wqy to query the minimum or maximum, so we just
423
   * copy the value from the kernel source.  We don't round it
424
   * up to a multiple of the page size.)
425
   */
426
0
  if (ring_size > MAX_RING_SIZE) {
427
    /*
428
     * Yes.  Lower the ring size to the maximum, and set the
429
     * snapshot length to the value that would give us a
430
     * maximum-size ring.
431
     */
432
0
    ring_size = MAX_RING_SIZE;
433
0
    handle->snapshot = header_size + (MAX_RING_SIZE/5);
434
0
  } else if (ring_size < MIN_RING_SIZE) {
435
    /*
436
     * Yes.  Raise the ring size to the minimum, but leave
437
     * the snapshot length unchanged, so we show the
438
     * callback no more data than specified by the
439
     * snapshot length.
440
     */
441
0
    ring_size = MIN_RING_SIZE;
442
0
  }
443
444
0
  if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
445
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
446
0
        errno, "Can't set ring size from fd %d", handle->fd);
447
0
    return -1;
448
0
  }
449
0
  return ring_size;
450
0
}
451
452
static
453
int usb_mmap(pcap_t* handle)
454
0
{
455
0
  struct pcap_usb_linux *handlep = handle->priv;
456
0
  int len;
457
458
  /*
459
   * Attempt to set the ring size as appropriate for the snapshot
460
   * length, reducing the snapshot length if that'd make the ring
461
   * bigger than the kernel supports.
462
   */
463
0
  len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
464
0
  if (len == -1) {
465
    /* Failed.  Fall back on non-memory-mapped access. */
466
0
    return 0;
467
0
  }
468
469
0
  handlep->mmapbuflen = len;
470
0
  handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
471
0
      MAP_SHARED, handle->fd, 0);
472
0
  if (handlep->mmapbuf == MAP_FAILED) {
473
    /*
474
     * Failed.  We don't treat that as a fatal error, we
475
     * just try to fall back on non-memory-mapped access.
476
     */
477
0
    return 0;
478
0
  }
479
0
  return 1;
480
0
}
481
482
#ifdef HAVE_LINUX_USBDEVICE_FS_H
483
484
0
#define CTRL_TIMEOUT    (5*1000)        /* milliseconds */
485
486
0
#define USB_DIR_IN    0x80
487
0
#define USB_TYPE_STANDARD 0x00
488
0
#define USB_RECIP_DEVICE  0x00
489
490
0
#define USB_REQ_GET_DESCRIPTOR  6
491
492
0
#define USB_DT_DEVICE   1
493
494
/* probe the descriptors of the devices attached to the bus */
495
/* the descriptors will end up in the captured packet stream */
496
/* and be decoded by external apps like wireshark */
497
/* without these identifying probes packet data can't be fully decoded */
498
static void
499
probe_devices(int bus)
500
0
{
501
0
  struct usbdevfs_ctrltransfer ctrl;
502
0
  struct dirent* data;
503
0
  int ret = 0;
504
0
  char buf[sizeof("/dev/bus/usb/000/") + NAME_MAX];
505
0
  DIR* dir;
506
507
  /* scan usb bus directories for device nodes */
508
0
  pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d", bus);
509
0
  dir = opendir(buf);
510
0
  if (!dir)
511
0
    return;
512
513
0
  while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
514
0
    int fd;
515
0
    char* name = data->d_name;
516
517
0
    if (name[0] == '.')
518
0
      continue;
519
520
0
    pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d/%s", bus, data->d_name);
521
522
0
    fd = open(buf, O_RDWR);
523
0
    if (fd == -1)
524
0
      continue;
525
526
    /*
527
     * Sigh.  Different kernels have different member names
528
     * for this structure.
529
     */
530
0
#ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
531
0
    ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
532
0
    ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
533
0
    ctrl.wValue = USB_DT_DEVICE << 8;
534
0
    ctrl.wIndex = 0;
535
0
    ctrl.wLength = sizeof(buf);
536
#else
537
    ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
538
    ctrl.request = USB_REQ_GET_DESCRIPTOR;
539
    ctrl.value = USB_DT_DEVICE << 8;
540
    ctrl.index = 0;
541
    ctrl.length = sizeof(buf);
542
#endif
543
0
    ctrl.data = buf;
544
0
    ctrl.timeout = CTRL_TIMEOUT;
545
546
0
    ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
547
548
0
    close(fd);
549
0
  }
550
0
  closedir(dir);
551
0
}
552
#endif /* HAVE_LINUX_USBDEVICE_FS_H */
553
554
pcap_t *
555
usb_create(const char *device, char *ebuf, int *is_ours)
556
0
{
557
0
  const char *cp;
558
0
  char *cpend;
559
0
  long devnum;
560
0
  pcap_t *p;
561
562
  /* Does this look like a USB monitoring device? */
563
0
  cp = strrchr(device, '/');
564
0
  if (cp == NULL)
565
0
    cp = device;
566
  /* Does it begin with USB_IFACE? */
567
0
  if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
568
    /* Nope, doesn't begin with USB_IFACE */
569
0
    *is_ours = 0;
570
0
    return NULL;
571
0
  }
572
  /* Yes - is USB_IFACE followed by a number? */
573
0
  cp += sizeof USB_IFACE - 1;
574
0
  devnum = strtol(cp, &cpend, 10);
575
0
  if (cpend == cp || *cpend != '\0') {
576
    /* Not followed by a number. */
577
0
    *is_ours = 0;
578
0
    return NULL;
579
0
  }
580
0
  if (devnum < 0) {
581
    /* Followed by a non-valid number. */
582
0
    *is_ours = 0;
583
0
    return NULL;
584
0
  }
585
586
  /* OK, it's probably ours. */
587
0
  *is_ours = 1;
588
589
0
  p = pcap_create_common(ebuf, sizeof (struct pcap_usb_linux));
590
0
  if (p == NULL)
591
0
    return (NULL);
592
593
0
  p->activate_op = usb_activate;
594
0
  return (p);
595
0
}
596
597
static int
598
usb_activate(pcap_t* handle)
599
0
{
600
0
  struct pcap_usb_linux *handlep = handle->priv;
601
0
  char    full_path[USB_LINE_LEN];
602
0
  int   ret;
603
604
  /*
605
   * Turn a negative snapshot value (invalid), a snapshot value of
606
   * 0 (unspecified), or a value bigger than the normal maximum
607
   * value, into the maximum allowed value.
608
   *
609
   * If some application really *needs* a bigger snapshot
610
   * length, we should just increase MAXIMUM_SNAPLEN.
611
   */
612
0
  if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
613
0
    handle->snapshot = MAXIMUM_SNAPLEN;
614
615
  /* Initialize some components of the pcap structure. */
616
0
  handle->bufsize = handle->snapshot;
617
0
  handle->offset = 0;
618
0
  handle->linktype = DLT_USB_LINUX;
619
620
0
  handle->inject_op = usb_inject_linux;
621
0
  handle->setfilter_op = install_bpf_program; /* no kernel filtering */
622
0
  handle->setdirection_op = usb_setdirection_linux;
623
0
  handle->set_datalink_op = NULL; /* can't change data link type */
624
0
  handle->getnonblock_op = pcap_getnonblock_fd;
625
0
  handle->setnonblock_op = pcap_setnonblock_fd;
626
627
  /*get usb bus index from device name */
628
0
  if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
629
0
  {
630
0
    pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
631
0
      "Can't get USB bus index from %s", handle->opt.device);
632
0
    return PCAP_ERROR;
633
0
  }
634
635
0
  if (have_binary_usbmon())
636
0
  {
637
    /*
638
     * We have binary-mode support.
639
     * Try to open the binary interface.
640
     */
641
0
    pcap_snprintf(full_path, USB_LINE_LEN, LINUX_USB_MON_DEV"%d", handlep->bus_index);
642
0
    handle->fd = open(full_path, O_RDONLY, 0);
643
0
    if (handle->fd < 0)
644
0
    {
645
      /*
646
       * The attempt failed; why?
647
       */
648
0
      switch (errno) {
649
650
0
      case ENOENT:
651
        /*
652
         * The device doesn't exist.
653
         * That could either mean that there's
654
         * no support for monitoring USB buses
655
         * (which probably means "the usbmon
656
         * module isn't loaded") or that there
657
         * is but that *particular* device
658
         * doesn't exist (no "scan all buses"
659
         * device if the bus index is 0, no
660
         * such bus if the bus index isn't 0).
661
         */
662
0
        return PCAP_ERROR_NO_SUCH_DEVICE;
663
664
0
      case EACCES:
665
        /*
666
         * We didn't have permission to open it.
667
         */
668
0
        return PCAP_ERROR_PERM_DENIED;
669
670
0
      default:
671
        /*
672
         * Something went wrong.
673
         */
674
0
        pcap_fmt_errmsg_for_errno(handle->errbuf,
675
0
            PCAP_ERRBUF_SIZE, errno,
676
0
            "Can't open USB bus file %s", full_path);
677
0
        return PCAP_ERROR;
678
0
      }
679
0
    }
680
681
0
    if (handle->opt.rfmon)
682
0
    {
683
      /*
684
       * Monitor mode doesn't apply to USB devices.
685
       */
686
0
      close(handle->fd);
687
0
      return PCAP_ERROR_RFMON_NOTSUP;
688
0
    }
689
690
    /* try to use fast mmap access */
691
0
    if (usb_mmap(handle))
692
0
    {
693
      /* We succeeded. */
694
0
      handle->linktype = DLT_USB_LINUX_MMAPPED;
695
0
      handle->stats_op = usb_stats_linux_bin;
696
0
      handle->read_op = usb_read_linux_mmap;
697
0
      handle->cleanup_op = usb_cleanup_linux_mmap;
698
0
#ifdef HAVE_LINUX_USBDEVICE_FS_H
699
0
      probe_devices(handlep->bus_index);
700
0
#endif
701
702
      /*
703
       * "handle->fd" is a real file, so
704
       * "select()" and "poll()" work on it.
705
       */
706
0
      handle->selectable_fd = handle->fd;
707
0
      return 0;
708
0
    }
709
710
    /*
711
     * We failed; try plain binary interface access.
712
     *
713
     * Attempt to set the ring size as appropriate for
714
     * the snapshot length, reducing the snapshot length
715
     * if that'd make the ring bigger than the kernel
716
     * supports.
717
     */
718
0
    if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
719
      /* Failed. */
720
0
      close(handle->fd);
721
0
      return PCAP_ERROR;
722
0
    }
723
0
    handle->stats_op = usb_stats_linux_bin;
724
0
    handle->read_op = usb_read_linux_bin;
725
0
#ifdef HAVE_LINUX_USBDEVICE_FS_H
726
0
    probe_devices(handlep->bus_index);
727
0
#endif
728
0
  }
729
0
  else {
730
    /*
731
     * We don't have binary mode support.
732
     * Try opening the text-mode device.
733
     */
734
0
    pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR"/%dt", handlep->bus_index);
735
0
    handle->fd = open(full_path, O_RDONLY, 0);
736
0
    if (handle->fd < 0)
737
0
    {
738
0
      if (errno == ENOENT)
739
0
      {
740
        /*
741
         * Not found at the new location; try
742
         * the old location.
743
         */
744
0
        pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%dt", handlep->bus_index);
745
0
        handle->fd = open(full_path, O_RDONLY, 0);
746
0
      }
747
0
      if (handle->fd < 0) {
748
0
        if (errno == ENOENT)
749
0
        {
750
          /*
751
           * The problem is that the file
752
           * doesn't exist.  Report that as
753
           * "no such device".  (That could
754
           * mean "no such USB bus" or
755
           * "monitoring not supported".)
756
           */
757
0
          ret = PCAP_ERROR_NO_SUCH_DEVICE;
758
0
        }
759
0
        else if (errno == EACCES)
760
0
        {
761
          /*
762
           * The problem is that we don't
763
           * have sufficient permission to
764
           * open the file.  Report that.
765
           */
766
0
          ret = PCAP_ERROR_PERM_DENIED;
767
0
        }
768
0
        else
769
0
        {
770
          /*
771
           * Some other error.
772
           */
773
0
          ret = PCAP_ERROR;
774
0
        }
775
0
        pcap_fmt_errmsg_for_errno(handle->errbuf,
776
0
            PCAP_ERRBUF_SIZE, errno,
777
0
            "Can't open USB bus file %s",
778
0
            full_path);
779
0
        return ret;
780
0
      }
781
0
    }
782
783
0
    if (handle->opt.rfmon)
784
0
    {
785
      /*
786
       * Monitor mode doesn't apply to USB devices.
787
       */
788
0
      close(handle->fd);
789
0
      return PCAP_ERROR_RFMON_NOTSUP;
790
0
    }
791
792
0
    handle->stats_op = usb_stats_linux;
793
0
    handle->read_op = usb_read_linux;
794
0
  }
795
796
  /*
797
   * "handle->fd" is a real file, so "select()" and "poll()"
798
   * work on it.
799
   */
800
0
  handle->selectable_fd = handle->fd;
801
802
  /* for plain binary access and text access we need to allocate the read
803
   * buffer */
804
0
  handle->buffer = malloc(handle->bufsize);
805
0
  if (!handle->buffer) {
806
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
807
0
        errno, "malloc");
808
0
    close(handle->fd);
809
0
    return PCAP_ERROR;
810
0
  }
811
0
  return 0;
812
0
}
813
814
static inline int
815
ascii_to_int(char c)
816
0
{
817
0
  return c < 'A' ? c- '0': ((c<'a') ? c - 'A' + 10: c-'a'+10);
818
0
}
819
820
/*
821
 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
822
 * <linux-kernel-source>/drivers/usb/mon/mon_text.c for urb string
823
 * format description
824
 */
825
static int
826
usb_read_linux(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
827
0
{
828
  /* see:
829
  * /usr/src/linux/Documentation/usb/usbmon.txt
830
  * for message format
831
  */
832
0
  struct pcap_usb_linux *handlep = handle->priv;
833
0
  unsigned timestamp;
834
0
  int tag, cnt, ep_num, dev_addr, dummy, ret, urb_len, data_len;
835
0
  char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN];
836
0
  char *string = line;
837
0
  u_char * rawdata = handle->buffer;
838
0
  struct pcap_pkthdr pkth;
839
0
  pcap_usb_header* uhdr = (pcap_usb_header*)handle->buffer;
840
0
  u_char urb_transfer=0;
841
0
  int incoming=0;
842
843
  /* ignore interrupt system call errors */
844
0
  do {
845
0
    ret = read(handle->fd, line, USB_LINE_LEN - 1);
846
0
    if (handle->break_loop)
847
0
    {
848
0
      handle->break_loop = 0;
849
0
      return -2;
850
0
    }
851
0
  } while ((ret == -1) && (errno == EINTR));
852
0
  if (ret < 0)
853
0
  {
854
0
    if (errno == EAGAIN)
855
0
      return 0; /* no data there */
856
857
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
858
0
        errno, "Can't read from fd %d", handle->fd);
859
0
    return -1;
860
0
  }
861
862
  /* read urb header; %n argument may increment return value, but it's
863
  * not mandatory, so does not count on it*/
864
0
  string[ret] = 0;
865
0
  ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, &timestamp, &etype,
866
0
    &pipeid1, &pipeid2, &dev_addr, &ep_num, status,
867
0
    &cnt);
868
0
  if (ret < 8)
869
0
  {
870
0
    pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
871
0
        "Can't parse USB bus message '%s', too few tokens (expected 8 got %d)",
872
0
        string, ret);
873
0
    return -1;
874
0
  }
875
0
  uhdr->id = tag;
876
0
  uhdr->device_address = dev_addr;
877
0
  uhdr->bus_id = handlep->bus_index;
878
0
  uhdr->status = 0;
879
0
  string += cnt;
880
881
  /* don't use usbmon provided timestamp, since it have low precision*/
882
0
  if (gettimeofday(&pkth.ts, NULL) < 0)
883
0
  {
884
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
885
0
        errno, "Can't get timestamp for message '%s'", string);
886
0
    return -1;
887
0
  }
888
0
  uhdr->ts_sec = pkth.ts.tv_sec;
889
0
  uhdr->ts_usec = pkth.ts.tv_usec;
890
891
  /* parse endpoint information */
892
0
  if (pipeid1 == 'C')
893
0
    urb_transfer = URB_CONTROL;
894
0
  else if (pipeid1 == 'Z')
895
0
    urb_transfer = URB_ISOCHRONOUS;
896
0
  else if (pipeid1 == 'I')
897
0
    urb_transfer = URB_INTERRUPT;
898
0
  else if (pipeid1 == 'B')
899
0
    urb_transfer = URB_BULK;
900
0
  if (pipeid2 == 'i') {
901
0
    ep_num |= URB_TRANSFER_IN;
902
0
    incoming = 1;
903
0
  }
904
0
  if (etype == 'C')
905
0
    incoming = !incoming;
906
907
  /* direction check*/
908
0
  if (incoming)
909
0
  {
910
0
    if (handle->direction == PCAP_D_OUT)
911
0
      return 0;
912
0
  }
913
0
  else
914
0
    if (handle->direction == PCAP_D_IN)
915
0
      return 0;
916
0
  uhdr->event_type = etype;
917
0
  uhdr->transfer_type = urb_transfer;
918
0
  uhdr->endpoint_number = ep_num;
919
0
  pkth.caplen = sizeof(pcap_usb_header);
920
0
  rawdata += sizeof(pcap_usb_header);
921
922
  /* check if this is a setup packet */
923
0
  ret = sscanf(status, "%d", &dummy);
924
0
  if (ret != 1)
925
0
  {
926
    /* this a setup packet, setup data can be filled with underscore if
927
    * usbmon has not been able to read them, so we must parse this fields as
928
    * strings */
929
0
    pcap_usb_setup* shdr;
930
0
    char str1[3], str2[3], str3[5], str4[5], str5[5];
931
0
    ret = sscanf(string, "%s %s %s %s %s%n", str1, str2, str3, str4,
932
0
    str5, &cnt);
933
0
    if (ret < 5)
934
0
    {
935
0
      pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
936
0
        "Can't parse USB bus message '%s', too few tokens (expected 5 got %d)",
937
0
        string, ret);
938
0
      return -1;
939
0
    }
940
0
    string += cnt;
941
942
    /* try to convert to corresponding integer */
943
0
    shdr = &uhdr->setup;
944
0
    shdr->bmRequestType = strtoul(str1, 0, 16);
945
0
    shdr->bRequest = strtoul(str2, 0, 16);
946
0
    shdr->wValue = htols(strtoul(str3, 0, 16));
947
0
    shdr->wIndex = htols(strtoul(str4, 0, 16));
948
0
    shdr->wLength = htols(strtoul(str5, 0, 16));
949
950
0
    uhdr->setup_flag = 0;
951
0
  }
952
0
  else
953
0
    uhdr->setup_flag = 1;
954
955
  /* read urb data */
956
0
  ret = sscanf(string, " %d%n", &urb_len, &cnt);
957
0
  if (ret < 1)
958
0
  {
959
0
    pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
960
0
      "Can't parse urb length from '%s'", string);
961
0
    return -1;
962
0
  }
963
0
  string += cnt;
964
965
  /* urb tag is not present if urb length is 0, so we can stop here
966
   * text parsing */
967
0
  pkth.len = urb_len+pkth.caplen;
968
0
  uhdr->urb_len = urb_len;
969
0
  uhdr->data_flag = 1;
970
0
  data_len = 0;
971
0
  if (uhdr->urb_len == 0)
972
0
    goto got;
973
974
  /* check for data presence; data is present if and only if urb tag is '=' */
975
0
  if (sscanf(string, " %c", &urb_tag) != 1)
976
0
  {
977
0
    pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
978
0
      "Can't parse urb tag from '%s'", string);
979
0
    return -1;
980
0
  }
981
982
0
  if (urb_tag != '=')
983
0
    goto got;
984
985
  /* skip urb tag and following space */
986
0
  string += 3;
987
988
  /* if we reach this point we got some urb data*/
989
0
  uhdr->data_flag = 0;
990
991
  /* read all urb data; if urb length is greater then the usbmon internal
992
   * buffer length used by the kernel to spool the URB, we get only
993
   * a partial information.
994
   * At least until linux 2.6.17 there is no way to set usbmon intenal buffer
995
   * length and default value is 130. */
996
0
  while ((string[0] != 0) && (string[1] != 0) && (pkth.caplen < (bpf_u_int32)handle->snapshot))
997
0
  {
998
0
    rawdata[0] = ascii_to_int(string[0]) * 16 + ascii_to_int(string[1]);
999
0
    rawdata++;
1000
0
    string+=2;
1001
0
    if (string[0] == ' ')
1002
0
      string++;
1003
0
    pkth.caplen++;
1004
0
    data_len++;
1005
0
  }
1006
1007
0
got:
1008
0
  uhdr->data_len = data_len;
1009
0
  if (pkth.caplen > (bpf_u_int32)handle->snapshot)
1010
0
    pkth.caplen = (bpf_u_int32)handle->snapshot;
1011
1012
0
  if (handle->fcode.bf_insns == NULL ||
1013
0
      bpf_filter(handle->fcode.bf_insns, handle->buffer,
1014
0
        pkth.len, pkth.caplen)) {
1015
0
    handlep->packets_read++;
1016
0
    callback(user, &pkth, handle->buffer);
1017
0
    return 1;
1018
0
  }
1019
0
  return 0; /* didn't pass filter */
1020
0
}
1021
1022
static int
1023
usb_inject_linux(pcap_t *handle, const void *buf _U_, size_t size _U_)
1024
0
{
1025
0
  pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1026
0
      "Packet injection is not supported on USB devices");
1027
0
  return (-1);
1028
0
}
1029
1030
static int
1031
usb_stats_linux(pcap_t *handle, struct pcap_stat *stats)
1032
0
{
1033
0
  struct pcap_usb_linux *handlep = handle->priv;
1034
0
  int dummy, ret, consumed, cnt;
1035
0
  char string[USB_LINE_LEN];
1036
0
  char token[USB_LINE_LEN];
1037
0
  char * ptr = string;
1038
0
  int fd;
1039
1040
0
  pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR"/%ds", handlep->bus_index);
1041
0
  fd = open(string, O_RDONLY, 0);
1042
0
  if (fd < 0)
1043
0
  {
1044
0
    if (errno == ENOENT)
1045
0
    {
1046
      /*
1047
       * Not found at the new location; try the old
1048
       * location.
1049
       */
1050
0
      pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%ds", handlep->bus_index);
1051
0
      fd = open(string, O_RDONLY, 0);
1052
0
    }
1053
0
    if (fd < 0) {
1054
0
      pcap_fmt_errmsg_for_errno(handle->errbuf,
1055
0
          PCAP_ERRBUF_SIZE, errno,
1056
0
          "Can't open USB stats file %s", string);
1057
0
      return -1;
1058
0
    }
1059
0
  }
1060
1061
  /* read stats line */
1062
0
  do {
1063
0
    ret = read(fd, string, USB_LINE_LEN-1);
1064
0
  } while ((ret == -1) && (errno == EINTR));
1065
0
  close(fd);
1066
1067
0
  if (ret < 0)
1068
0
  {
1069
0
    pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1070
0
      "Can't read stats from fd %d ", fd);
1071
0
    return -1;
1072
0
  }
1073
0
  string[ret] = 0;
1074
1075
0
  stats->ps_recv = handlep->packets_read;
1076
0
  stats->ps_drop = 0; /* unless we find text_lost */
1077
0
  stats->ps_ifdrop = 0;
1078
1079
  /* extract info on dropped urbs */
1080
0
  for (consumed=0; consumed < ret; ) {
1081
    /* from the sscanf man page:
1082
     * The C standard says: "Execution of a %n directive does
1083
     * not increment the assignment count returned at the completion
1084
     * of  execution" but the Corrigendum seems to contradict this.
1085
     * Do not make any assumptions on the effect of %n conversions
1086
     * on the return value and explicitly check for cnt assignmet*/
1087
0
    int ntok;
1088
1089
0
    cnt = -1;
1090
0
    ntok = sscanf(ptr, "%s%n", token, &cnt);
1091
0
    if ((ntok < 1) || (cnt < 0))
1092
0
      break;
1093
0
    consumed += cnt;
1094
0
    ptr += cnt;
1095
0
    if (strcmp(token, "text_lost") == 0)
1096
0
      ntok = sscanf(ptr, "%d%n", &stats->ps_drop, &cnt);
1097
0
    else
1098
0
      ntok = sscanf(ptr, "%d%n", &dummy, &cnt);
1099
0
    if ((ntok != 1) || (cnt < 0))
1100
0
      break;
1101
0
    consumed += cnt;
1102
0
    ptr += cnt;
1103
0
  }
1104
1105
0
  return 0;
1106
0
}
1107
1108
static int
1109
usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
1110
0
{
1111
0
  p->direction = d;
1112
0
  return 0;
1113
0
}
1114
1115
1116
static int
1117
usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
1118
0
{
1119
0
  struct pcap_usb_linux *handlep = handle->priv;
1120
0
  int ret;
1121
0
  struct mon_bin_stats st;
1122
0
  ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
1123
0
  if (ret < 0)
1124
0
  {
1125
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1126
0
        errno, "Can't read stats from fd %d", handle->fd);
1127
0
    return -1;
1128
0
  }
1129
1130
0
  stats->ps_recv = handlep->packets_read + st.queued;
1131
0
  stats->ps_drop = st.dropped;
1132
0
  stats->ps_ifdrop = 0;
1133
0
  return 0;
1134
0
}
1135
1136
/*
1137
 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1138
 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1139
 */
1140
static int
1141
usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
1142
0
{
1143
0
  struct pcap_usb_linux *handlep = handle->priv;
1144
0
  struct mon_bin_get info;
1145
0
  int ret;
1146
0
  struct pcap_pkthdr pkth;
1147
0
  u_int clen = handle->snapshot - sizeof(pcap_usb_header);
1148
1149
  /* the usb header is going to be part of 'packet' data*/
1150
0
  info.hdr = (pcap_usb_header*) handle->buffer;
1151
0
  info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
1152
0
  info.data_len = clen;
1153
1154
  /* ignore interrupt system call errors */
1155
0
  do {
1156
0
    ret = ioctl(handle->fd, MON_IOCX_GET, &info);
1157
0
    if (handle->break_loop)
1158
0
    {
1159
0
      handle->break_loop = 0;
1160
0
      return -2;
1161
0
    }
1162
0
  } while ((ret == -1) && (errno == EINTR));
1163
0
  if (ret < 0)
1164
0
  {
1165
0
    if (errno == EAGAIN)
1166
0
      return 0; /* no data there */
1167
1168
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1169
0
        errno, "Can't read from fd %d", handle->fd);
1170
0
    return -1;
1171
0
  }
1172
1173
  /*
1174
   * info.hdr->data_len is the number of bytes of isochronous
1175
   * descriptors (if any) plus the number of bytes of data
1176
   * provided.  There are no isochronous descriptors here,
1177
   * because we're using the old 48-byte header.
1178
   *
1179
   * If info.hdr->data_flag is non-zero, there's no URB data;
1180
   * info.hdr->urb_len is the size of the buffer into which
1181
   * data is to be placed; it does not represent the amount
1182
   * of data transferred.  If info.hdr->data_flag is zero,
1183
   * there is URB data, and info.hdr->urb_len is the number
1184
   * of bytes transmitted or received; it doesn't include
1185
   * isochronous descriptors.
1186
   *
1187
   * The kernel may give us more data than the snaplen; if it did,
1188
   * reduce the data length so that the total number of bytes we
1189
   * tell our client we have is not greater than the snaplen.
1190
   */
1191
0
  if (info.hdr->data_len < clen)
1192
0
    clen = info.hdr->data_len;
1193
0
  info.hdr->data_len = clen;
1194
0
  pkth.caplen = sizeof(pcap_usb_header) + clen;
1195
0
  if (info.hdr->data_flag) {
1196
    /*
1197
     * No data; just base the on-the-wire length on
1198
     * info.hdr->data_len (so that it's >= the captured
1199
     * length).
1200
     */
1201
0
    pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
1202
0
  } else {
1203
    /*
1204
     * We got data; base the on-the-wire length on
1205
     * info.hdr->urb_len, so that it includes data
1206
     * discarded by the USB monitor device due to
1207
     * its buffer being too small.
1208
     */
1209
0
    pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
1210
0
  }
1211
0
  pkth.ts.tv_sec = info.hdr->ts_sec;
1212
0
  pkth.ts.tv_usec = info.hdr->ts_usec;
1213
1214
0
  if (handle->fcode.bf_insns == NULL ||
1215
0
      bpf_filter(handle->fcode.bf_insns, handle->buffer,
1216
0
        pkth.len, pkth.caplen)) {
1217
0
    handlep->packets_read++;
1218
0
    callback(user, &pkth, handle->buffer);
1219
0
    return 1;
1220
0
  }
1221
1222
0
  return 0; /* didn't pass filter */
1223
0
}
1224
1225
/*
1226
 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1227
 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1228
 */
1229
0
#define VEC_SIZE 32
1230
static int
1231
usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
1232
0
{
1233
0
  struct pcap_usb_linux *handlep = handle->priv;
1234
0
  struct mon_bin_mfetch fetch;
1235
0
  int32_t vec[VEC_SIZE];
1236
0
  struct pcap_pkthdr pkth;
1237
0
  pcap_usb_header_mmapped* hdr;
1238
0
  int nflush = 0;
1239
0
  int packets = 0;
1240
0
  u_int clen, max_clen;
1241
1242
0
  max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
1243
1244
0
  for (;;) {
1245
0
    int i, ret;
1246
0
    int limit = max_packets - packets;
1247
0
    if (limit <= 0)
1248
0
      limit = VEC_SIZE;
1249
0
    if (limit > VEC_SIZE)
1250
0
      limit = VEC_SIZE;
1251
1252
    /* try to fetch as many events as possible*/
1253
0
    fetch.offvec = vec;
1254
0
    fetch.nfetch = limit;
1255
0
    fetch.nflush = nflush;
1256
    /* ignore interrupt system call errors */
1257
0
    do {
1258
0
      ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
1259
0
      if (handle->break_loop)
1260
0
      {
1261
0
        handle->break_loop = 0;
1262
0
        return -2;
1263
0
      }
1264
0
    } while ((ret == -1) && (errno == EINTR));
1265
0
    if (ret < 0)
1266
0
    {
1267
0
      if (errno == EAGAIN)
1268
0
        return 0; /* no data there */
1269
1270
0
      pcap_fmt_errmsg_for_errno(handle->errbuf,
1271
0
          PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
1272
0
          handle->fd);
1273
0
      return -1;
1274
0
    }
1275
1276
    /* keep track of processed events, we will flush them later */
1277
0
    nflush = fetch.nfetch;
1278
0
    for (i=0; i<fetch.nfetch; ++i) {
1279
      /* discard filler */
1280
0
      hdr = (pcap_usb_header_mmapped*) &handlep->mmapbuf[vec[i]];
1281
0
      if (hdr->event_type == '@')
1282
0
        continue;
1283
1284
      /*
1285
       * hdr->data_len is the number of bytes of
1286
       * isochronous descriptors (if any) plus the
1287
       * number of bytes of data provided.
1288
       *
1289
       * If hdr->data_flag is non-zero, there's no
1290
       * URB data; hdr->urb_len is the size of the
1291
       * buffer into which data is to be placed; it does
1292
       * not represent the amount of data transferred.
1293
       * If hdr->data_flag is zero, there is URB data,
1294
       * and hdr->urb_len is the number of bytes
1295
       * transmitted or received; it doesn't include
1296
       * isochronous descriptors.
1297
       *
1298
       * The kernel may give us more data than the
1299
       * snaplen; if it did, reduce the data length
1300
       * so that the total number of bytes we
1301
       * tell our client we have is not greater than
1302
       * the snaplen.
1303
       */
1304
0
      clen = max_clen;
1305
0
      if (hdr->data_len < clen)
1306
0
        clen = hdr->data_len;
1307
0
      pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
1308
0
      if (hdr->data_flag) {
1309
        /*
1310
         * No data; just base the on-the-wire length
1311
         * on hdr->data_len (so that it's >= the
1312
         * captured length).
1313
         */
1314
0
        pkth.len = sizeof(pcap_usb_header_mmapped) +
1315
0
            hdr->data_len;
1316
0
      } else {
1317
        /*
1318
         * We got data; base the on-the-wire length
1319
         * on hdr->urb_len, so that it includes
1320
         * data discarded by the USB monitor device
1321
         * due to its buffer being too small.
1322
         */
1323
0
        pkth.len = sizeof(pcap_usb_header_mmapped) +
1324
0
            (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
1325
0
      }
1326
0
      pkth.ts.tv_sec = hdr->ts_sec;
1327
0
      pkth.ts.tv_usec = hdr->ts_usec;
1328
1329
0
      if (handle->fcode.bf_insns == NULL ||
1330
0
          bpf_filter(handle->fcode.bf_insns, (u_char*) hdr,
1331
0
            pkth.len, pkth.caplen)) {
1332
0
        handlep->packets_read++;
1333
0
        callback(user, &pkth, (u_char*) hdr);
1334
0
        packets++;
1335
0
      }
1336
0
    }
1337
1338
    /* with max_packets specifying "unlimited" we stop afer the first chunk*/
1339
0
    if (PACKET_COUNT_IS_UNLIMITED(max_packets) || (packets == max_packets))
1340
0
      break;
1341
0
  }
1342
1343
  /* flush pending events*/
1344
0
  if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
1345
0
    pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1346
0
        errno, "Can't mflush fd %d", handle->fd);
1347
0
    return -1;
1348
0
  }
1349
0
  return packets;
1350
0
}
1351
1352
static void
1353
usb_cleanup_linux_mmap(pcap_t* handle)
1354
0
{
1355
0
  struct pcap_usb_linux *handlep = handle->priv;
1356
1357
  /* if we have a memory-mapped buffer, unmap it */
1358
0
  if (handlep->mmapbuf != NULL) {
1359
0
    munmap(handlep->mmapbuf, handlep->mmapbuflen);
1360
0
    handlep->mmapbuf = NULL;
1361
0
  }
1362
0
  pcap_cleanup_live_common(handle);
1363
0
}