2 * Copyright (c) 2006 Paolo Abeni (Italy)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote
15 * products derived from this software without specific prior written
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 * USB sniffing API implementation for Linux platform
31 * By Paolo Abeni <paolo.abeni@email.it>
32 * Modifications: Kris Katterjohn <katterjohn@gmail.com>
41 #include "pcap-usb-linux.h"
46 #ifdef NEED_STRERROR_H
58 #include <netinet/in.h>
59 #include <sys/ioctl.h>
61 #include <sys/utsname.h>
62 #ifdef HAVE_LINUX_USBDEVICE_FS_H
64 * We might need <linux/compiler.h> to define __user for
65 * <linux/usbdevice_fs.h>.
67 #ifdef HAVE_LINUX_COMPILER_H
68 #include <linux/compiler.h>
69 #endif /* HAVE_LINUX_COMPILER_H */
70 #include <linux/usbdevice_fs.h>
71 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
73 #define USB_IFACE "usbmon"
74 #define USB_TEXT_DIR_OLD "/sys/kernel/debug/usbmon"
75 #define USB_TEXT_DIR "/sys/kernel/debug/usb/usbmon"
76 #define SYS_USB_BUS_DIR "/sys/bus/usb/devices"
77 #define PROC_USB_BUS_DIR "/proc/bus/usb"
78 #define USB_LINE_LEN 4096
80 #if __BYTE_ORDER == __LITTLE_ENDIAN
85 #define htols(s) bswap_16(s)
86 #define htoll(l) bswap_32(l)
87 #define htol64(ll) bswap_64(ll)
90 struct mon_bin_stats
{
98 size_t data_len
; /* Length of data (can be zero) */
101 struct mon_bin_mfetch
{
102 int32_t *offvec
; /* Vector of events fetched */
103 int32_t nfetch
; /* Number of events to fetch (out: fetched) */
104 int32_t nflush
; /* Number of events to flush */
107 #define MON_IOC_MAGIC 0x92
109 #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
110 #define MON_IOCX_URB _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
111 #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
112 #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
113 #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
114 #define MON_IOCX_GET _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
115 #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
116 #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
118 #define MON_BIN_SETUP 0x1 /* setup hdr is present*/
119 #define MON_BIN_SETUP_ZERO 0x2 /* setup buffer is not available */
120 #define MON_BIN_DATA_ZERO 0x4 /* data buffer is not available */
121 #define MON_BIN_ERROR 0x8
124 * Private data for capturing on Linux USB.
126 struct pcap_usb_linux
{
127 u_char
*mmapbuf
; /* memory-mapped region pointer */
128 size_t mmapbuflen
; /* size of region */
133 /* forward declaration */
134 static int usb_activate(pcap_t
*);
135 static int usb_stats_linux(pcap_t
*, struct pcap_stat
*);
136 static int usb_stats_linux_bin(pcap_t
*, struct pcap_stat
*);
137 static int usb_read_linux(pcap_t
*, int , pcap_handler
, u_char
*);
138 static int usb_read_linux_bin(pcap_t
*, int , pcap_handler
, u_char
*);
139 static int usb_read_linux_mmap(pcap_t
*, int , pcap_handler
, u_char
*);
140 static int usb_inject_linux(pcap_t
*, const void *, int);
141 static int usb_setdirection_linux(pcap_t
*, pcap_direction_t
);
142 static void usb_cleanup_linux_mmap(pcap_t
*);
145 have_binary_usbmon(void)
147 struct utsname utsname
;
148 char *version_component
, *endp
;
149 long major
, minor
, subminor
;
151 if (uname(&utsname
) == 0) {
153 * 2.6.21 is the first release with the binary-mode
156 version_component
= utsname
.release
;
157 major
= strtol(version_component
, &endp
, 10);
158 if (endp
!= version_component
&& *endp
== '.') {
160 * OK, that was a valid major version.
161 * Is it 3 or greater? If so, we have binary
168 * Is it 1 or less? If so, we don't have binary
169 * mode support. (In fact, we don't have any
170 * USB monitoring....)
177 * OK, this is a 2.x kernel.
178 * What's the minor version?
180 version_component
= endp
+ 1;
181 minor
= strtol(version_component
, &endp
, 10);
182 if (endp
!= version_component
&&
183 (*endp
== '.' || *endp
== '\0')) {
185 * OK, that was a valid minor version.
186 * Is is 2.6 or later? (There shouldn't be a
187 * "later", as 2.6.x went to 3.x, but we'll
192 * No, so no binary support (did 2.4 have
193 * any USB monitoring at all?)
199 * OK, this is a 2.6.x kernel.
200 * What's the subminor version?
202 version_component
= endp
+ 1;
203 subminor
= strtol(version_component
, &endp
, 10);
204 if (endp
!= version_component
&&
205 (*endp
== '.' || *endp
== '\0')) {
207 * OK, that was a valid subminor version.
208 * Is it 21 or greater?
210 if (subminor
>= 21) {
212 * Yes - we have binary mode
222 * Either uname() failed, in which case we just say "no binary
223 * mode support", or we don't have binary mode support.
228 /* facility to add an USB device to the device list*/
230 usb_dev_add(pcap_if_list_t
*devlistp
, int n
, char *err_str
)
234 snprintf(dev_name
, 10, USB_IFACE
"%d", n
);
236 * XXX - is there any notion of "up" and "running"?
240 * As this refers to all buses, there's no notion of
241 * "connected" vs. "disconnected", as that's a property
242 * that would apply to a particular USB interface.
244 if (add_dev(devlistp
, dev_name
,
245 PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE
,
246 "Raw USB traffic, all USB buses", err_str
) == NULL
)
250 * XXX - is there a way to determine whether anything's
251 * plugged into this bus interface or not, and set
252 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
253 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
255 snprintf(dev_descr
, 30, "Raw USB traffic, bus number %d", n
);
256 if (add_dev(devlistp
, dev_name
, 0, dev_descr
, err_str
) == NULL
)
264 usb_findalldevs(pcap_if_list_t
*devlistp
, char *err_str
)
266 char usb_mon_dir
[PATH_MAX
];
267 char *usb_mon_prefix
;
268 size_t usb_mon_prefix_len
;
276 if (have_binary_usbmon()) {
278 * We have binary-mode support.
279 * What do the device names look like?
280 * Split LINUX_USB_MON_DEV into a directory that we'll
281 * scan and a file name prefix that we'll check for.
283 pcap_strlcpy(usb_mon_dir
, LINUX_USB_MON_DEV
, sizeof usb_mon_dir
);
284 usb_mon_prefix
= strrchr(usb_mon_dir
, '/');
285 if (usb_mon_prefix
== NULL
) {
287 * This "shouldn't happen". Just give up if it
292 *usb_mon_prefix
++ = '\0';
293 usb_mon_prefix_len
= strlen(usb_mon_prefix
);
296 * Open the directory and scan it.
298 dir
= opendir(usb_mon_dir
);
300 while ((ret
== 0) && ((data
= readdir(dir
)) != 0)) {
304 * Is this a usbmon device?
306 if (strncmp(name
, usb_mon_prefix
, usb_mon_prefix_len
) != 0)
310 * What's the device number?
312 if (sscanf(&name
[usb_mon_prefix_len
], "%d", &n
) == 0)
313 continue; /* failed */
315 ret
= usb_dev_add(devlistp
, n
, err_str
);
323 * We have only text mode support.
324 * We don't look for the text devices because we can't
325 * look for them without root privileges, and we don't
326 * want to require root privileges to enumerate devices
327 * (we want to let the user to try a device and get
328 * an error, rather than seeing no devices and asking
329 * "why am I not seeing devices" and forcing a long
330 * process of poking to figure out whether it's "no
331 * privileges" or "your kernel is too old" or "the
332 * usbmon module isn't loaded" or...).
334 * Instead, we look to see what buses we have.
335 * If the kernel is so old that it doesn't have
336 * binary-mode support, it's also so old that
337 * it doesn't have a "scan all buses" device.
339 * First, try scanning sysfs USB bus directory.
341 dir
= opendir(SYS_USB_BUS_DIR
);
343 while ((ret
== 0) && ((data
= readdir(dir
)) != 0)) {
346 if (strncmp(name
, "usb", 3) != 0)
349 if (sscanf(&name
[3], "%d", &n
) == 0)
352 ret
= usb_dev_add(devlistp
, n
, err_str
);
359 /* That didn't work; try scanning procfs USB bus directory. */
360 dir
= opendir(PROC_USB_BUS_DIR
);
362 while ((ret
== 0) && ((data
= readdir(dir
)) != 0)) {
366 /* if this file name does not end with a number it's not of our interest */
367 if ((len
< 1) || !PCAP_ISDIGIT(name
[--len
]))
369 while (PCAP_ISDIGIT(name
[--len
]));
370 if (sscanf(&name
[len
+1], "%d", &n
) != 1)
373 ret
= usb_dev_add(devlistp
, n
, err_str
);
380 /* neither of them worked */
386 * Matches what's in mon_bin.c in the Linux kernel.
388 #define MIN_RING_SIZE (8*1024)
389 #define MAX_RING_SIZE (1200*1024)
392 usb_set_ring_size(pcap_t
* handle
, int header_size
)
395 * A packet from binary usbmon has:
397 * 1) a fixed-length header, of size header_size;
398 * 2) descriptors, for isochronous transfers;
401 * The kernel buffer has a size, defaulting to 300KB, with a
402 * minimum of 8KB and a maximum of 1200KB. The size is set with
403 * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
406 * No more than {buffer size}/5 bytes worth of payload is saved.
407 * Therefore, if we subtract the fixed-length size from the
408 * snapshot length, we have the biggest payload we want (we
409 * don't worry about the descriptors - if we have descriptors,
410 * we'll just discard the last bit of the payload to get it
411 * to fit). We multiply that result by 5 and set the buffer
412 * size to that value.
416 if (handle
->snapshot
< header_size
)
417 handle
->snapshot
= header_size
;
418 /* The maximum snapshot size is small enough that this won't overflow */
419 ring_size
= (handle
->snapshot
- header_size
) * 5;
422 * Will this get an error?
423 * (There's no wqy to query the minimum or maximum, so we just
424 * copy the value from the kernel source. We don't round it
425 * up to a multiple of the page size.)
427 if (ring_size
> MAX_RING_SIZE
) {
429 * Yes. Lower the ring size to the maximum, and set the
430 * snapshot length to the value that would give us a
433 ring_size
= MAX_RING_SIZE
;
434 handle
->snapshot
= header_size
+ (MAX_RING_SIZE
/5);
435 } else if (ring_size
< MIN_RING_SIZE
) {
437 * Yes. Raise the ring size to the minimum, but leave
438 * the snapshot length unchanged, so we show the
439 * callback no more data than specified by the
442 ring_size
= MIN_RING_SIZE
;
445 if (ioctl(handle
->fd
, MON_IOCT_RING_SIZE
, ring_size
) == -1) {
446 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
447 errno
, "Can't set ring size from fd %d", handle
->fd
);
454 int usb_mmap(pcap_t
* handle
)
456 struct pcap_usb_linux
*handlep
= handle
->priv
;
460 * Attempt to set the ring size as appropriate for the snapshot
461 * length, reducing the snapshot length if that'd make the ring
462 * bigger than the kernel supports.
464 len
= usb_set_ring_size(handle
, (int)sizeof(pcap_usb_header_mmapped
));
466 /* Failed. Fall back on non-memory-mapped access. */
470 handlep
->mmapbuflen
= len
;
471 handlep
->mmapbuf
= mmap(0, handlep
->mmapbuflen
, PROT_READ
,
472 MAP_SHARED
, handle
->fd
, 0);
473 if (handlep
->mmapbuf
== MAP_FAILED
) {
475 * Failed. We don't treat that as a fatal error, we
476 * just try to fall back on non-memory-mapped access.
483 #ifdef HAVE_LINUX_USBDEVICE_FS_H
485 #define CTRL_TIMEOUT (5*1000) /* milliseconds */
487 #define USB_DIR_IN 0x80
488 #define USB_TYPE_STANDARD 0x00
489 #define USB_RECIP_DEVICE 0x00
491 #define USB_REQ_GET_DESCRIPTOR 6
493 #define USB_DT_DEVICE 1
494 #define USB_DT_CONFIG 2
496 #define USB_DEVICE_DESCRIPTOR_SIZE 18
497 #define USB_CONFIG_DESCRIPTOR_SIZE 9
499 /* probe the descriptors of the devices attached to the bus */
500 /* the descriptors will end up in the captured packet stream */
501 /* and be decoded by external apps like wireshark */
502 /* without these identifying probes packet data can't be fully decoded */
504 probe_devices(int bus
)
506 struct usbdevfs_ctrltransfer ctrl
;
509 char busdevpath
[sizeof("/dev/bus/usb/000/") + NAME_MAX
];
511 uint8_t descriptor
[USB_DEVICE_DESCRIPTOR_SIZE
];
512 uint8_t configdesc
[USB_CONFIG_DESCRIPTOR_SIZE
];
514 /* scan usb bus directories for device nodes */
515 snprintf(busdevpath
, sizeof(busdevpath
), "/dev/bus/usb/%03d", bus
);
516 dir
= opendir(busdevpath
);
520 while ((ret
>= 0) && ((data
= readdir(dir
)) != 0)) {
522 char* name
= data
->d_name
;
527 snprintf(busdevpath
, sizeof(busdevpath
), "/dev/bus/usb/%03d/%s", bus
, data
->d_name
);
529 fd
= open(busdevpath
, O_RDWR
);
534 * Sigh. Different kernels have different member names
535 * for this structure.
537 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
538 ctrl
.bRequestType
= USB_DIR_IN
| USB_TYPE_STANDARD
| USB_RECIP_DEVICE
;
539 ctrl
.bRequest
= USB_REQ_GET_DESCRIPTOR
;
540 ctrl
.wValue
= USB_DT_DEVICE
<< 8;
542 ctrl
.wLength
= sizeof(descriptor
);
544 ctrl
.requesttype
= USB_DIR_IN
| USB_TYPE_STANDARD
| USB_RECIP_DEVICE
;
545 ctrl
.request
= USB_REQ_GET_DESCRIPTOR
;
546 ctrl
.value
= USB_DT_DEVICE
<< 8;
548 ctrl
.length
= sizeof(descriptor
);
550 ctrl
.data
= descriptor
;
551 ctrl
.timeout
= CTRL_TIMEOUT
;
553 ret
= ioctl(fd
, USBDEVFS_CONTROL
, &ctrl
);
555 /* Request CONFIGURATION descriptor alone to know wTotalLength */
556 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
557 ctrl
.wValue
= USB_DT_CONFIG
<< 8;
558 ctrl
.wLength
= sizeof(configdesc
);
560 ctrl
.value
= USB_DT_CONFIG
<< 8;
561 ctrl
.length
= sizeof(configdesc
);
563 ctrl
.data
= configdesc
;
564 ret
= ioctl(fd
, USBDEVFS_CONTROL
, &ctrl
);
566 uint16_t wtotallength
;
567 wtotallength
= EXTRACT_LE_U_2(&configdesc
[2]);
568 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
569 ctrl
.wLength
= wtotallength
;
571 ctrl
.length
= wtotallength
;
573 ctrl
.data
= malloc(wtotallength
);
575 ret
= ioctl(fd
, USBDEVFS_CONTROL
, &ctrl
);
583 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
586 usb_create(const char *device
, char *ebuf
, int *is_ours
)
593 /* Does this look like a USB monitoring device? */
594 cp
= strrchr(device
, '/');
597 /* Does it begin with USB_IFACE? */
598 if (strncmp(cp
, USB_IFACE
, sizeof USB_IFACE
- 1) != 0) {
599 /* Nope, doesn't begin with USB_IFACE */
603 /* Yes - is USB_IFACE followed by a number? */
604 cp
+= sizeof USB_IFACE
- 1;
605 devnum
= strtol(cp
, &cpend
, 10);
606 if (cpend
== cp
|| *cpend
!= '\0') {
607 /* Not followed by a number. */
612 /* Followed by a non-valid number. */
617 /* OK, it's probably ours. */
620 p
= PCAP_CREATE_COMMON(ebuf
, struct pcap_usb_linux
);
624 p
->activate_op
= usb_activate
;
629 usb_activate(pcap_t
* handle
)
631 struct pcap_usb_linux
*handlep
= handle
->priv
;
632 char full_path
[USB_LINE_LEN
];
636 * Turn a negative snapshot value (invalid), a snapshot value of
637 * 0 (unspecified), or a value bigger than the normal maximum
638 * value, into the maximum allowed value.
640 * If some application really *needs* a bigger snapshot
641 * length, we should just increase MAXIMUM_SNAPLEN.
643 if (handle
->snapshot
<= 0 || handle
->snapshot
> MAXIMUM_SNAPLEN
)
644 handle
->snapshot
= MAXIMUM_SNAPLEN
;
646 /* Initialize some components of the pcap structure. */
647 handle
->bufsize
= handle
->snapshot
;
649 handle
->linktype
= DLT_USB_LINUX
;
651 handle
->inject_op
= usb_inject_linux
;
652 handle
->setfilter_op
= install_bpf_program
; /* no kernel filtering */
653 handle
->setdirection_op
= usb_setdirection_linux
;
654 handle
->set_datalink_op
= NULL
; /* can't change data link type */
655 handle
->getnonblock_op
= pcap_getnonblock_fd
;
656 handle
->setnonblock_op
= pcap_setnonblock_fd
;
658 /*get usb bus index from device name */
659 if (sscanf(handle
->opt
.device
, USB_IFACE
"%d", &handlep
->bus_index
) != 1)
661 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
662 "Can't get USB bus index from %s", handle
->opt
.device
);
666 if (have_binary_usbmon())
669 * We have binary-mode support.
670 * Try to open the binary interface.
672 snprintf(full_path
, USB_LINE_LEN
, LINUX_USB_MON_DEV
"%d", handlep
->bus_index
);
673 handle
->fd
= open(full_path
, O_RDONLY
, 0);
677 * The attempt failed; why?
683 * The device doesn't exist.
684 * That could either mean that there's
685 * no support for monitoring USB buses
686 * (which probably means "the usbmon
687 * module isn't loaded") or that there
688 * is but that *particular* device
689 * doesn't exist (no "scan all buses"
690 * device if the bus index is 0, no
691 * such bus if the bus index isn't 0).
693 return PCAP_ERROR_NO_SUCH_DEVICE
;
697 * We didn't have permission to open it.
699 return PCAP_ERROR_PERM_DENIED
;
703 * Something went wrong.
705 pcap_fmt_errmsg_for_errno(handle
->errbuf
,
706 PCAP_ERRBUF_SIZE
, errno
,
707 "Can't open USB bus file %s", full_path
);
712 if (handle
->opt
.rfmon
)
715 * Monitor mode doesn't apply to USB devices.
718 return PCAP_ERROR_RFMON_NOTSUP
;
721 /* try to use fast mmap access */
722 if (usb_mmap(handle
))
725 handle
->linktype
= DLT_USB_LINUX_MMAPPED
;
726 handle
->stats_op
= usb_stats_linux_bin
;
727 handle
->read_op
= usb_read_linux_mmap
;
728 handle
->cleanup_op
= usb_cleanup_linux_mmap
;
729 #ifdef HAVE_LINUX_USBDEVICE_FS_H
730 probe_devices(handlep
->bus_index
);
734 * "handle->fd" is a real file, so
735 * "select()" and "poll()" work on it.
737 handle
->selectable_fd
= handle
->fd
;
742 * We failed; try plain binary interface access.
744 * Attempt to set the ring size as appropriate for
745 * the snapshot length, reducing the snapshot length
746 * if that'd make the ring bigger than the kernel
749 if (usb_set_ring_size(handle
, (int)sizeof(pcap_usb_header
)) == -1) {
754 handle
->stats_op
= usb_stats_linux_bin
;
755 handle
->read_op
= usb_read_linux_bin
;
756 #ifdef HAVE_LINUX_USBDEVICE_FS_H
757 probe_devices(handlep
->bus_index
);
762 * We don't have binary mode support.
763 * Try opening the text-mode device.
765 snprintf(full_path
, USB_LINE_LEN
, USB_TEXT_DIR
"/%dt", handlep
->bus_index
);
766 handle
->fd
= open(full_path
, O_RDONLY
, 0);
772 * Not found at the new location; try
775 snprintf(full_path
, USB_LINE_LEN
, USB_TEXT_DIR_OLD
"/%dt", handlep
->bus_index
);
776 handle
->fd
= open(full_path
, O_RDONLY
, 0);
778 if (handle
->fd
< 0) {
782 * The problem is that the file
783 * doesn't exist. Report that as
784 * "no such device". (That could
785 * mean "no such USB bus" or
786 * "monitoring not supported".)
788 ret
= PCAP_ERROR_NO_SUCH_DEVICE
;
790 else if (errno
== EACCES
)
793 * The problem is that we don't
794 * have sufficient permission to
795 * open the file. Report that.
797 ret
= PCAP_ERROR_PERM_DENIED
;
806 pcap_fmt_errmsg_for_errno(handle
->errbuf
,
807 PCAP_ERRBUF_SIZE
, errno
,
808 "Can't open USB bus file %s",
814 if (handle
->opt
.rfmon
)
817 * Monitor mode doesn't apply to USB devices.
820 return PCAP_ERROR_RFMON_NOTSUP
;
823 handle
->stats_op
= usb_stats_linux
;
824 handle
->read_op
= usb_read_linux
;
828 * "handle->fd" is a real file, so "select()" and "poll()"
831 handle
->selectable_fd
= handle
->fd
;
833 /* for plain binary access and text access we need to allocate the read
835 handle
->buffer
= malloc(handle
->bufsize
);
836 if (!handle
->buffer
) {
837 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
848 return c
< 'A' ? c
- '0': ((c
<'a') ? c
- 'A' + 10: c
-'a'+10);
852 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
853 * <linux-kernel-source>/drivers/usb/mon/mon_text.c for urb string
857 usb_read_linux(pcap_t
*handle
, int max_packets _U_
, pcap_handler callback
, u_char
*user
)
860 * /usr/src/linux/Documentation/usb/usbmon.txt
863 struct pcap_usb_linux
*handlep
= handle
->priv
;
865 int tag
, cnt
, ep_num
, dev_addr
, dummy
, ret
, urb_len
, data_len
;
867 char etype
, pipeid1
, pipeid2
, status
[16], urb_tag
, line
[USB_LINE_LEN
];
869 u_char
* rawdata
= handle
->buffer
;
870 struct pcap_pkthdr pkth
;
871 pcap_usb_header
* uhdr
= (pcap_usb_header
*)handle
->buffer
;
872 u_char urb_transfer
=0;
875 /* ignore interrupt system call errors */
877 read_ret
= read(handle
->fd
, line
, USB_LINE_LEN
- 1);
878 if (handle
->break_loop
)
880 handle
->break_loop
= 0;
883 } while ((read_ret
== -1) && (errno
== EINTR
));
887 return 0; /* no data there */
889 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
890 errno
, "Can't read from fd %d", handle
->fd
);
894 /* read urb header; %n argument may increment return value, but it's
895 * not mandatory, so does not count on it*/
896 string
[read_ret
] = 0;
897 ret
= sscanf(string
, "%x %d %c %c%c:%d:%d %s%n", &tag
, ×tamp
, &etype
,
898 &pipeid1
, &pipeid2
, &dev_addr
, &ep_num
, status
,
902 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
903 "Can't parse USB bus message '%s', too few tokens (expected 8 got %d)",
908 uhdr
->device_address
= dev_addr
;
909 uhdr
->bus_id
= handlep
->bus_index
;
913 /* don't use usbmon provided timestamp, since it have low precision*/
914 if (gettimeofday(&pkth
.ts
, NULL
) < 0)
916 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
917 errno
, "Can't get timestamp for message '%s'", string
);
920 uhdr
->ts_sec
= pkth
.ts
.tv_sec
;
921 uhdr
->ts_usec
= (int32_t)pkth
.ts
.tv_usec
;
923 /* parse endpoint information */
925 urb_transfer
= URB_CONTROL
;
926 else if (pipeid1
== 'Z')
927 urb_transfer
= URB_ISOCHRONOUS
;
928 else if (pipeid1
== 'I')
929 urb_transfer
= URB_INTERRUPT
;
930 else if (pipeid1
== 'B')
931 urb_transfer
= URB_BULK
;
932 if (pipeid2
== 'i') {
933 ep_num
|= URB_TRANSFER_IN
;
937 incoming
= !incoming
;
942 if (handle
->direction
== PCAP_D_OUT
)
946 if (handle
->direction
== PCAP_D_IN
)
948 uhdr
->event_type
= etype
;
949 uhdr
->transfer_type
= urb_transfer
;
950 uhdr
->endpoint_number
= ep_num
;
951 pkth
.caplen
= sizeof(pcap_usb_header
);
952 rawdata
+= sizeof(pcap_usb_header
);
954 /* check if this is a setup packet */
955 ret
= sscanf(status
, "%d", &dummy
);
958 /* this a setup packet, setup data can be filled with underscore if
959 * usbmon has not been able to read them, so we must parse this fields as
961 pcap_usb_setup
* shdr
;
962 char str1
[3], str2
[3], str3
[5], str4
[5], str5
[5];
963 ret
= sscanf(string
, "%s %s %s %s %s%n", str1
, str2
, str3
, str4
,
967 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
968 "Can't parse USB bus message '%s', too few tokens (expected 5 got %d)",
974 /* try to convert to corresponding integer */
976 shdr
->bmRequestType
= strtoul(str1
, 0, 16);
977 shdr
->bRequest
= strtoul(str2
, 0, 16);
978 shdr
->wValue
= htols(strtoul(str3
, 0, 16));
979 shdr
->wIndex
= htols(strtoul(str4
, 0, 16));
980 shdr
->wLength
= htols(strtoul(str5
, 0, 16));
982 uhdr
->setup_flag
= 0;
985 uhdr
->setup_flag
= 1;
988 ret
= sscanf(string
, " %d%n", &urb_len
, &cnt
);
991 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
992 "Can't parse urb length from '%s'", string
);
997 /* urb tag is not present if urb length is 0, so we can stop here
999 pkth
.len
= urb_len
+pkth
.caplen
;
1000 uhdr
->urb_len
= urb_len
;
1001 uhdr
->data_flag
= 1;
1003 if (uhdr
->urb_len
== 0)
1006 /* check for data presence; data is present if and only if urb tag is '=' */
1007 if (sscanf(string
, " %c", &urb_tag
) != 1)
1009 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1010 "Can't parse urb tag from '%s'", string
);
1017 /* skip urb tag and following space */
1020 /* if we reach this point we got some urb data*/
1021 uhdr
->data_flag
= 0;
1023 /* read all urb data; if urb length is greater then the usbmon internal
1024 * buffer length used by the kernel to spool the URB, we get only
1025 * a partial information.
1026 * At least until linux 2.6.17 there is no way to set usbmon intenal buffer
1027 * length and default value is 130. */
1028 while ((string
[0] != 0) && (string
[1] != 0) && (pkth
.caplen
< (bpf_u_int32
)handle
->snapshot
))
1030 rawdata
[0] = ascii_to_int(string
[0]) * 16 + ascii_to_int(string
[1]);
1033 if (string
[0] == ' ')
1040 uhdr
->data_len
= data_len
;
1041 if (pkth
.caplen
> (bpf_u_int32
)handle
->snapshot
)
1042 pkth
.caplen
= (bpf_u_int32
)handle
->snapshot
;
1044 if (handle
->fcode
.bf_insns
== NULL
||
1045 pcap_filter(handle
->fcode
.bf_insns
, handle
->buffer
,
1046 pkth
.len
, pkth
.caplen
)) {
1047 handlep
->packets_read
++;
1048 callback(user
, &pkth
, handle
->buffer
);
1051 return 0; /* didn't pass filter */
1055 usb_inject_linux(pcap_t
*handle
, const void *buf _U_
, int size _U_
)
1057 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1058 "Packet injection is not supported on USB devices");
1063 usb_stats_linux(pcap_t
*handle
, struct pcap_stat
*stats
)
1065 struct pcap_usb_linux
*handlep
= handle
->priv
;
1067 ssize_t ret
, consumed
;
1068 char string
[USB_LINE_LEN
];
1069 char token
[USB_LINE_LEN
];
1070 char * ptr
= string
;
1073 snprintf(string
, USB_LINE_LEN
, USB_TEXT_DIR
"/%ds", handlep
->bus_index
);
1074 fd
= open(string
, O_RDONLY
, 0);
1077 if (errno
== ENOENT
)
1080 * Not found at the new location; try the old
1083 snprintf(string
, USB_LINE_LEN
, USB_TEXT_DIR_OLD
"/%ds", handlep
->bus_index
);
1084 fd
= open(string
, O_RDONLY
, 0);
1087 pcap_fmt_errmsg_for_errno(handle
->errbuf
,
1088 PCAP_ERRBUF_SIZE
, errno
,
1089 "Can't open USB stats file %s", string
);
1094 /* read stats line */
1096 ret
= read(fd
, string
, USB_LINE_LEN
-1);
1097 } while ((ret
== -1) && (errno
== EINTR
));
1102 snprintf(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1103 "Can't read stats from fd %d ", fd
);
1108 stats
->ps_recv
= handlep
->packets_read
;
1109 stats
->ps_drop
= 0; /* unless we find text_lost */
1110 stats
->ps_ifdrop
= 0;
1112 /* extract info on dropped urbs */
1113 for (consumed
=0; consumed
< ret
; ) {
1114 /* from the sscanf man page:
1115 * The C standard says: "Execution of a %n directive does
1116 * not increment the assignment count returned at the completion
1117 * of execution" but the Corrigendum seems to contradict this.
1118 * Do not make any assumptions on the effect of %n conversions
1119 * on the return value and explicitly check for cnt assignmet*/
1123 ntok
= sscanf(ptr
, "%s%n", token
, &cnt
);
1124 if ((ntok
< 1) || (cnt
< 0))
1128 if (strcmp(token
, "text_lost") == 0)
1129 ntok
= sscanf(ptr
, "%d%n", &stats
->ps_drop
, &cnt
);
1131 ntok
= sscanf(ptr
, "%d%n", &dummy
, &cnt
);
1132 if ((ntok
!= 1) || (cnt
< 0))
1142 usb_setdirection_linux(pcap_t
*p
, pcap_direction_t d
)
1145 * It's guaranteed, at this point, that d is a valid
1154 usb_stats_linux_bin(pcap_t
*handle
, struct pcap_stat
*stats
)
1156 struct pcap_usb_linux
*handlep
= handle
->priv
;
1158 struct mon_bin_stats st
;
1159 ret
= ioctl(handle
->fd
, MON_IOCG_STATS
, &st
);
1162 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1163 errno
, "Can't read stats from fd %d", handle
->fd
);
1167 stats
->ps_recv
= handlep
->packets_read
+ st
.queued
;
1168 stats
->ps_drop
= st
.dropped
;
1169 stats
->ps_ifdrop
= 0;
1174 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1175 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1178 usb_read_linux_bin(pcap_t
*handle
, int max_packets _U_
, pcap_handler callback
, u_char
*user
)
1180 struct pcap_usb_linux
*handlep
= handle
->priv
;
1181 struct mon_bin_get info
;
1183 struct pcap_pkthdr pkth
;
1184 u_int clen
= handle
->snapshot
- sizeof(pcap_usb_header
);
1186 /* the usb header is going to be part of 'packet' data*/
1187 info
.hdr
= (pcap_usb_header
*) handle
->buffer
;
1188 info
.data
= (u_char
*)handle
->buffer
+ sizeof(pcap_usb_header
);
1189 info
.data_len
= clen
;
1191 /* ignore interrupt system call errors */
1193 ret
= ioctl(handle
->fd
, MON_IOCX_GET
, &info
);
1194 if (handle
->break_loop
)
1196 handle
->break_loop
= 0;
1199 } while ((ret
== -1) && (errno
== EINTR
));
1202 if (errno
== EAGAIN
)
1203 return 0; /* no data there */
1205 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1206 errno
, "Can't read from fd %d", handle
->fd
);
1211 * info.hdr->data_len is the number of bytes of isochronous
1212 * descriptors (if any) plus the number of bytes of data
1213 * provided. There are no isochronous descriptors here,
1214 * because we're using the old 48-byte header.
1216 * If info.hdr->data_flag is non-zero, there's no URB data;
1217 * info.hdr->urb_len is the size of the buffer into which
1218 * data is to be placed; it does not represent the amount
1219 * of data transferred. If info.hdr->data_flag is zero,
1220 * there is URB data, and info.hdr->urb_len is the number
1221 * of bytes transmitted or received; it doesn't include
1222 * isochronous descriptors.
1224 * The kernel may give us more data than the snaplen; if it did,
1225 * reduce the data length so that the total number of bytes we
1226 * tell our client we have is not greater than the snaplen.
1228 if (info
.hdr
->data_len
< clen
)
1229 clen
= info
.hdr
->data_len
;
1230 info
.hdr
->data_len
= clen
;
1231 pkth
.caplen
= sizeof(pcap_usb_header
) + clen
;
1232 if (info
.hdr
->data_flag
) {
1234 * No data; just base the on-the-wire length on
1235 * info.hdr->data_len (so that it's >= the captured
1238 pkth
.len
= sizeof(pcap_usb_header
) + info
.hdr
->data_len
;
1241 * We got data; base the on-the-wire length on
1242 * info.hdr->urb_len, so that it includes data
1243 * discarded by the USB monitor device due to
1244 * its buffer being too small.
1246 pkth
.len
= sizeof(pcap_usb_header
) + info
.hdr
->urb_len
;
1248 pkth
.ts
.tv_sec
= (time_t)info
.hdr
->ts_sec
;
1249 pkth
.ts
.tv_usec
= info
.hdr
->ts_usec
;
1251 if (handle
->fcode
.bf_insns
== NULL
||
1252 pcap_filter(handle
->fcode
.bf_insns
, handle
->buffer
,
1253 pkth
.len
, pkth
.caplen
)) {
1254 handlep
->packets_read
++;
1255 callback(user
, &pkth
, handle
->buffer
);
1259 return 0; /* didn't pass filter */
1263 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1264 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1268 usb_read_linux_mmap(pcap_t
*handle
, int max_packets
, pcap_handler callback
, u_char
*user
)
1270 struct pcap_usb_linux
*handlep
= handle
->priv
;
1271 struct mon_bin_mfetch fetch
;
1272 int32_t vec
[VEC_SIZE
];
1273 struct pcap_pkthdr pkth
;
1274 pcap_usb_header_mmapped
* hdr
;
1277 u_int clen
, max_clen
;
1279 max_clen
= handle
->snapshot
- sizeof(pcap_usb_header_mmapped
);
1283 int limit
= max_packets
- packets
;
1286 if (limit
> VEC_SIZE
)
1289 /* try to fetch as many events as possible*/
1291 fetch
.nfetch
= limit
;
1292 fetch
.nflush
= nflush
;
1293 /* ignore interrupt system call errors */
1295 ret
= ioctl(handle
->fd
, MON_IOCX_MFETCH
, &fetch
);
1296 if (handle
->break_loop
)
1298 handle
->break_loop
= 0;
1301 } while ((ret
== -1) && (errno
== EINTR
));
1304 if (errno
== EAGAIN
)
1305 return 0; /* no data there */
1307 pcap_fmt_errmsg_for_errno(handle
->errbuf
,
1308 PCAP_ERRBUF_SIZE
, errno
, "Can't mfetch fd %d",
1313 /* keep track of processed events, we will flush them later */
1314 nflush
= fetch
.nfetch
;
1315 for (i
=0; i
<fetch
.nfetch
; ++i
) {
1316 /* discard filler */
1317 hdr
= (pcap_usb_header_mmapped
*) &handlep
->mmapbuf
[vec
[i
]];
1318 if (hdr
->event_type
== '@')
1322 * hdr->data_len is the number of bytes of
1323 * isochronous descriptors (if any) plus the
1324 * number of bytes of data provided.
1326 * If hdr->data_flag is non-zero, there's no
1327 * URB data; hdr->urb_len is the size of the
1328 * buffer into which data is to be placed; it does
1329 * not represent the amount of data transferred.
1330 * If hdr->data_flag is zero, there is URB data,
1331 * and hdr->urb_len is the number of bytes
1332 * transmitted or received; it doesn't include
1333 * isochronous descriptors.
1335 * The kernel may give us more data than the
1336 * snaplen; if it did, reduce the data length
1337 * so that the total number of bytes we
1338 * tell our client we have is not greater than
1342 if (hdr
->data_len
< clen
)
1343 clen
= hdr
->data_len
;
1344 pkth
.caplen
= sizeof(pcap_usb_header_mmapped
) + clen
;
1345 if (hdr
->data_flag
) {
1347 * No data; just base the on-the-wire length
1348 * on hdr->data_len (so that it's >= the
1351 pkth
.len
= sizeof(pcap_usb_header_mmapped
) +
1355 * We got data; base the on-the-wire length
1356 * on hdr->urb_len, so that it includes
1357 * data discarded by the USB monitor device
1358 * due to its buffer being too small.
1360 pkth
.len
= sizeof(pcap_usb_header_mmapped
) +
1361 (hdr
->ndesc
* sizeof (usb_isodesc
)) + hdr
->urb_len
;
1363 pkth
.ts
.tv_sec
= (time_t)hdr
->ts_sec
;
1364 pkth
.ts
.tv_usec
= hdr
->ts_usec
;
1366 if (handle
->fcode
.bf_insns
== NULL
||
1367 pcap_filter(handle
->fcode
.bf_insns
, (u_char
*) hdr
,
1368 pkth
.len
, pkth
.caplen
)) {
1369 handlep
->packets_read
++;
1370 callback(user
, &pkth
, (u_char
*) hdr
);
1375 /* with max_packets specifying "unlimited" we stop afer the first chunk*/
1376 if (PACKET_COUNT_IS_UNLIMITED(max_packets
) || (packets
== max_packets
))
1380 /* flush pending events*/
1381 if (ioctl(handle
->fd
, MON_IOCH_MFLUSH
, nflush
) == -1) {
1382 pcap_fmt_errmsg_for_errno(handle
->errbuf
, PCAP_ERRBUF_SIZE
,
1383 errno
, "Can't mflush fd %d", handle
->fd
);
1390 usb_cleanup_linux_mmap(pcap_t
* handle
)
1392 struct pcap_usb_linux
*handlep
= handle
->priv
;
1394 /* if we have a memory-mapped buffer, unmap it */
1395 if (handlep
->mmapbuf
!= NULL
) {
1396 munmap(handlep
->mmapbuf
, handlep
->mmapbuflen
);
1397 handlep
->mmapbuf
= NULL
;
1399 pcap_cleanup_live_common(handle
);