]> The Tcpdump Group git mirrors - libpcap/blob - pcap-usb-linux.c
Handle the pcap_t+private data in a fashion that makes fewer assumptions.
[libpcap] / pcap-usb-linux.c
1 /*
2 * Copyright (c) 2006 Paolo Abeni (Italy)
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote
15 * products derived from this software without specific prior written
16 * permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 *
30 * USB sniffing API implementation for Linux platform
31 * By Paolo Abeni <paolo.abeni@email.it>
32 * Modifications: Kris Katterjohn <katterjohn@gmail.com>
33 *
34 */
35
36 #ifdef HAVE_CONFIG_H
37 #include <config.h>
38 #endif
39
40 #include "pcap-int.h"
41 #include "pcap-usb-linux.h"
42 #include "pcap/usb.h"
43
44 #include "extract.h"
45
46 #ifdef NEED_STRERROR_H
47 #include "strerror.h"
48 #endif
49
50 #include <errno.h>
51 #include <stdlib.h>
52 #include <unistd.h>
53 #include <fcntl.h>
54 #include <limits.h>
55 #include <string.h>
56 #include <dirent.h>
57 #include <byteswap.h>
58 #include <netinet/in.h>
59 #include <sys/ioctl.h>
60 #include <sys/mman.h>
61 #include <sys/utsname.h>
62 #ifdef HAVE_LINUX_USBDEVICE_FS_H
63 /*
64 * We might need <linux/compiler.h> to define __user for
65 * <linux/usbdevice_fs.h>.
66 */
67 #ifdef HAVE_LINUX_COMPILER_H
68 #include <linux/compiler.h>
69 #endif /* HAVE_LINUX_COMPILER_H */
70 #include <linux/usbdevice_fs.h>
71 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
72
73 #define USB_IFACE "usbmon"
74 #define USB_TEXT_DIR_OLD "/sys/kernel/debug/usbmon"
75 #define USB_TEXT_DIR "/sys/kernel/debug/usb/usbmon"
76 #define SYS_USB_BUS_DIR "/sys/bus/usb/devices"
77 #define PROC_USB_BUS_DIR "/proc/bus/usb"
78 #define USB_LINE_LEN 4096
79
80 #if __BYTE_ORDER == __LITTLE_ENDIAN
81 #define htols(s) s
82 #define htoll(l) l
83 #define htol64(ll) ll
84 #else
85 #define htols(s) bswap_16(s)
86 #define htoll(l) bswap_32(l)
87 #define htol64(ll) bswap_64(ll)
88 #endif
89
90 struct mon_bin_stats {
91 uint32_t queued;
92 uint32_t dropped;
93 };
94
95 struct mon_bin_get {
96 pcap_usb_header *hdr;
97 void *data;
98 size_t data_len; /* Length of data (can be zero) */
99 };
100
101 struct mon_bin_mfetch {
102 int32_t *offvec; /* Vector of events fetched */
103 int32_t nfetch; /* Number of events to fetch (out: fetched) */
104 int32_t nflush; /* Number of events to flush */
105 };
106
107 #define MON_IOC_MAGIC 0x92
108
109 #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
110 #define MON_IOCX_URB _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
111 #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
112 #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
113 #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
114 #define MON_IOCX_GET _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
115 #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
116 #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
117
118 #define MON_BIN_SETUP 0x1 /* setup hdr is present*/
119 #define MON_BIN_SETUP_ZERO 0x2 /* setup buffer is not available */
120 #define MON_BIN_DATA_ZERO 0x4 /* data buffer is not available */
121 #define MON_BIN_ERROR 0x8
122
123 /*
124 * Private data for capturing on Linux USB.
125 */
126 struct pcap_usb_linux {
127 u_char *mmapbuf; /* memory-mapped region pointer */
128 size_t mmapbuflen; /* size of region */
129 int bus_index;
130 u_int packets_read;
131 };
132
133 /* forward declaration */
134 static int usb_activate(pcap_t *);
135 static int usb_stats_linux(pcap_t *, struct pcap_stat *);
136 static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
137 static int usb_read_linux(pcap_t *, int , pcap_handler , u_char *);
138 static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
139 static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
140 static int usb_inject_linux(pcap_t *, const void *, int);
141 static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
142 static void usb_cleanup_linux_mmap(pcap_t *);
143
144 static int
145 have_binary_usbmon(void)
146 {
147 struct utsname utsname;
148 char *version_component, *endp;
149 long major, minor, subminor;
150
151 if (uname(&utsname) == 0) {
152 /*
153 * 2.6.21 is the first release with the binary-mode
154 * USB monitoring.
155 */
156 version_component = utsname.release;
157 major = strtol(version_component, &endp, 10);
158 if (endp != version_component && *endp == '.') {
159 /*
160 * OK, that was a valid major version.
161 * Is it 3 or greater? If so, we have binary
162 * mode support.
163 */
164 if (major >= 3)
165 return 1;
166
167 /*
168 * Is it 1 or less? If so, we don't have binary
169 * mode support. (In fact, we don't have any
170 * USB monitoring....)
171 */
172 if (major <= 1)
173 return 0;
174 }
175
176 /*
177 * OK, this is a 2.x kernel.
178 * What's the minor version?
179 */
180 version_component = endp + 1;
181 minor = strtol(version_component, &endp, 10);
182 if (endp != version_component &&
183 (*endp == '.' || *endp == '\0')) {
184 /*
185 * OK, that was a valid minor version.
186 * Is is 2.6 or later? (There shouldn't be a
187 * "later", as 2.6.x went to 3.x, but we'll
188 * check anyway.)
189 */
190 if (minor < 6) {
191 /*
192 * No, so no binary support (did 2.4 have
193 * any USB monitoring at all?)
194 */
195 return 0;
196 }
197
198 /*
199 * OK, this is a 2.6.x kernel.
200 * What's the subminor version?
201 */
202 version_component = endp + 1;
203 subminor = strtol(version_component, &endp, 10);
204 if (endp != version_component &&
205 (*endp == '.' || *endp == '\0')) {
206 /*
207 * OK, that was a valid subminor version.
208 * Is it 21 or greater?
209 */
210 if (subminor >= 21) {
211 /*
212 * Yes - we have binary mode
213 * support.
214 */
215 return 1;
216 }
217 }
218 }
219 }
220
221 /*
222 * Either uname() failed, in which case we just say "no binary
223 * mode support", or we don't have binary mode support.
224 */
225 return 0;
226 }
227
228 /* facility to add an USB device to the device list*/
229 static int
230 usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
231 {
232 char dev_name[10];
233 char dev_descr[30];
234 snprintf(dev_name, 10, USB_IFACE"%d", n);
235 /*
236 * XXX - is there any notion of "up" and "running"?
237 */
238 if (n == 0) {
239 /*
240 * As this refers to all buses, there's no notion of
241 * "connected" vs. "disconnected", as that's a property
242 * that would apply to a particular USB interface.
243 */
244 if (add_dev(devlistp, dev_name,
245 PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
246 "Raw USB traffic, all USB buses", err_str) == NULL)
247 return -1;
248 } else {
249 /*
250 * XXX - is there a way to determine whether anything's
251 * plugged into this bus interface or not, and set
252 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
253 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
254 */
255 snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
256 if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
257 return -1;
258 }
259
260 return 0;
261 }
262
263 int
264 usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
265 {
266 char usb_mon_dir[PATH_MAX];
267 char *usb_mon_prefix;
268 size_t usb_mon_prefix_len;
269 struct dirent* data;
270 int ret = 0;
271 DIR* dir;
272 int n;
273 char* name;
274 size_t len;
275
276 if (have_binary_usbmon()) {
277 /*
278 * We have binary-mode support.
279 * What do the device names look like?
280 * Split LINUX_USB_MON_DEV into a directory that we'll
281 * scan and a file name prefix that we'll check for.
282 */
283 pcap_strlcpy(usb_mon_dir, LINUX_USB_MON_DEV, sizeof usb_mon_dir);
284 usb_mon_prefix = strrchr(usb_mon_dir, '/');
285 if (usb_mon_prefix == NULL) {
286 /*
287 * This "shouldn't happen". Just give up if it
288 * does.
289 */
290 return 0;
291 }
292 *usb_mon_prefix++ = '\0';
293 usb_mon_prefix_len = strlen(usb_mon_prefix);
294
295 /*
296 * Open the directory and scan it.
297 */
298 dir = opendir(usb_mon_dir);
299 if (dir != NULL) {
300 while ((ret == 0) && ((data = readdir(dir)) != 0)) {
301 name = data->d_name;
302
303 /*
304 * Is this a usbmon device?
305 */
306 if (strncmp(name, usb_mon_prefix, usb_mon_prefix_len) != 0)
307 continue; /* no */
308
309 /*
310 * What's the device number?
311 */
312 if (sscanf(&name[usb_mon_prefix_len], "%d", &n) == 0)
313 continue; /* failed */
314
315 ret = usb_dev_add(devlistp, n, err_str);
316 }
317
318 closedir(dir);
319 }
320 return 0;
321 } else {
322 /*
323 * We have only text mode support.
324 * We don't look for the text devices because we can't
325 * look for them without root privileges, and we don't
326 * want to require root privileges to enumerate devices
327 * (we want to let the user to try a device and get
328 * an error, rather than seeing no devices and asking
329 * "why am I not seeing devices" and forcing a long
330 * process of poking to figure out whether it's "no
331 * privileges" or "your kernel is too old" or "the
332 * usbmon module isn't loaded" or...).
333 *
334 * Instead, we look to see what buses we have.
335 * If the kernel is so old that it doesn't have
336 * binary-mode support, it's also so old that
337 * it doesn't have a "scan all buses" device.
338 *
339 * First, try scanning sysfs USB bus directory.
340 */
341 dir = opendir(SYS_USB_BUS_DIR);
342 if (dir != NULL) {
343 while ((ret == 0) && ((data = readdir(dir)) != 0)) {
344 name = data->d_name;
345
346 if (strncmp(name, "usb", 3) != 0)
347 continue;
348
349 if (sscanf(&name[3], "%d", &n) == 0)
350 continue;
351
352 ret = usb_dev_add(devlistp, n, err_str);
353 }
354
355 closedir(dir);
356 return 0;
357 }
358
359 /* That didn't work; try scanning procfs USB bus directory. */
360 dir = opendir(PROC_USB_BUS_DIR);
361 if (dir != NULL) {
362 while ((ret == 0) && ((data = readdir(dir)) != 0)) {
363 name = data->d_name;
364 len = strlen(name);
365
366 /* if this file name does not end with a number it's not of our interest */
367 if ((len < 1) || !PCAP_ISDIGIT(name[--len]))
368 continue;
369 while (PCAP_ISDIGIT(name[--len]));
370 if (sscanf(&name[len+1], "%d", &n) != 1)
371 continue;
372
373 ret = usb_dev_add(devlistp, n, err_str);
374 }
375
376 closedir(dir);
377 return ret;
378 }
379
380 /* neither of them worked */
381 return 0;
382 }
383 }
384
385 /*
386 * Matches what's in mon_bin.c in the Linux kernel.
387 */
388 #define MIN_RING_SIZE (8*1024)
389 #define MAX_RING_SIZE (1200*1024)
390
391 static int
392 usb_set_ring_size(pcap_t* handle, int header_size)
393 {
394 /*
395 * A packet from binary usbmon has:
396 *
397 * 1) a fixed-length header, of size header_size;
398 * 2) descriptors, for isochronous transfers;
399 * 3) the payload.
400 *
401 * The kernel buffer has a size, defaulting to 300KB, with a
402 * minimum of 8KB and a maximum of 1200KB. The size is set with
403 * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
404 * to a page size.
405 *
406 * No more than {buffer size}/5 bytes worth of payload is saved.
407 * Therefore, if we subtract the fixed-length size from the
408 * snapshot length, we have the biggest payload we want (we
409 * don't worry about the descriptors - if we have descriptors,
410 * we'll just discard the last bit of the payload to get it
411 * to fit). We multiply that result by 5 and set the buffer
412 * size to that value.
413 */
414 int ring_size;
415
416 if (handle->snapshot < header_size)
417 handle->snapshot = header_size;
418 /* The maximum snapshot size is small enough that this won't overflow */
419 ring_size = (handle->snapshot - header_size) * 5;
420
421 /*
422 * Will this get an error?
423 * (There's no wqy to query the minimum or maximum, so we just
424 * copy the value from the kernel source. We don't round it
425 * up to a multiple of the page size.)
426 */
427 if (ring_size > MAX_RING_SIZE) {
428 /*
429 * Yes. Lower the ring size to the maximum, and set the
430 * snapshot length to the value that would give us a
431 * maximum-size ring.
432 */
433 ring_size = MAX_RING_SIZE;
434 handle->snapshot = header_size + (MAX_RING_SIZE/5);
435 } else if (ring_size < MIN_RING_SIZE) {
436 /*
437 * Yes. Raise the ring size to the minimum, but leave
438 * the snapshot length unchanged, so we show the
439 * callback no more data than specified by the
440 * snapshot length.
441 */
442 ring_size = MIN_RING_SIZE;
443 }
444
445 if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
446 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
447 errno, "Can't set ring size from fd %d", handle->fd);
448 return -1;
449 }
450 return ring_size;
451 }
452
453 static
454 int usb_mmap(pcap_t* handle)
455 {
456 struct pcap_usb_linux *handlep = handle->priv;
457 int len;
458
459 /*
460 * Attempt to set the ring size as appropriate for the snapshot
461 * length, reducing the snapshot length if that'd make the ring
462 * bigger than the kernel supports.
463 */
464 len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
465 if (len == -1) {
466 /* Failed. Fall back on non-memory-mapped access. */
467 return 0;
468 }
469
470 handlep->mmapbuflen = len;
471 handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
472 MAP_SHARED, handle->fd, 0);
473 if (handlep->mmapbuf == MAP_FAILED) {
474 /*
475 * Failed. We don't treat that as a fatal error, we
476 * just try to fall back on non-memory-mapped access.
477 */
478 return 0;
479 }
480 return 1;
481 }
482
483 #ifdef HAVE_LINUX_USBDEVICE_FS_H
484
485 #define CTRL_TIMEOUT (5*1000) /* milliseconds */
486
487 #define USB_DIR_IN 0x80
488 #define USB_TYPE_STANDARD 0x00
489 #define USB_RECIP_DEVICE 0x00
490
491 #define USB_REQ_GET_DESCRIPTOR 6
492
493 #define USB_DT_DEVICE 1
494 #define USB_DT_CONFIG 2
495
496 #define USB_DEVICE_DESCRIPTOR_SIZE 18
497 #define USB_CONFIG_DESCRIPTOR_SIZE 9
498
499 /* probe the descriptors of the devices attached to the bus */
500 /* the descriptors will end up in the captured packet stream */
501 /* and be decoded by external apps like wireshark */
502 /* without these identifying probes packet data can't be fully decoded */
503 static void
504 probe_devices(int bus)
505 {
506 struct usbdevfs_ctrltransfer ctrl;
507 struct dirent* data;
508 int ret = 0;
509 char busdevpath[sizeof("/dev/bus/usb/000/") + NAME_MAX];
510 DIR* dir;
511 uint8_t descriptor[USB_DEVICE_DESCRIPTOR_SIZE];
512 uint8_t configdesc[USB_CONFIG_DESCRIPTOR_SIZE];
513
514 /* scan usb bus directories for device nodes */
515 snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d", bus);
516 dir = opendir(busdevpath);
517 if (!dir)
518 return;
519
520 while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
521 int fd;
522 char* name = data->d_name;
523
524 if (name[0] == '.')
525 continue;
526
527 snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d/%s", bus, data->d_name);
528
529 fd = open(busdevpath, O_RDWR);
530 if (fd == -1)
531 continue;
532
533 /*
534 * Sigh. Different kernels have different member names
535 * for this structure.
536 */
537 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
538 ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
539 ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
540 ctrl.wValue = USB_DT_DEVICE << 8;
541 ctrl.wIndex = 0;
542 ctrl.wLength = sizeof(descriptor);
543 #else
544 ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
545 ctrl.request = USB_REQ_GET_DESCRIPTOR;
546 ctrl.value = USB_DT_DEVICE << 8;
547 ctrl.index = 0;
548 ctrl.length = sizeof(descriptor);
549 #endif
550 ctrl.data = descriptor;
551 ctrl.timeout = CTRL_TIMEOUT;
552
553 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
554
555 /* Request CONFIGURATION descriptor alone to know wTotalLength */
556 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
557 ctrl.wValue = USB_DT_CONFIG << 8;
558 ctrl.wLength = sizeof(configdesc);
559 #else
560 ctrl.value = USB_DT_CONFIG << 8;
561 ctrl.length = sizeof(configdesc);
562 #endif
563 ctrl.data = configdesc;
564 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
565 if (ret >= 0) {
566 uint16_t wtotallength;
567 wtotallength = EXTRACT_LE_U_2(&configdesc[2]);
568 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
569 ctrl.wLength = wtotallength;
570 #else
571 ctrl.length = wtotallength;
572 #endif
573 ctrl.data = malloc(wtotallength);
574 if (ctrl.data) {
575 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
576 free(ctrl.data);
577 }
578 }
579 close(fd);
580 }
581 closedir(dir);
582 }
583 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
584
585 pcap_t *
586 usb_create(const char *device, char *ebuf, int *is_ours)
587 {
588 const char *cp;
589 char *cpend;
590 long devnum;
591 pcap_t *p;
592
593 /* Does this look like a USB monitoring device? */
594 cp = strrchr(device, '/');
595 if (cp == NULL)
596 cp = device;
597 /* Does it begin with USB_IFACE? */
598 if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
599 /* Nope, doesn't begin with USB_IFACE */
600 *is_ours = 0;
601 return NULL;
602 }
603 /* Yes - is USB_IFACE followed by a number? */
604 cp += sizeof USB_IFACE - 1;
605 devnum = strtol(cp, &cpend, 10);
606 if (cpend == cp || *cpend != '\0') {
607 /* Not followed by a number. */
608 *is_ours = 0;
609 return NULL;
610 }
611 if (devnum < 0) {
612 /* Followed by a non-valid number. */
613 *is_ours = 0;
614 return NULL;
615 }
616
617 /* OK, it's probably ours. */
618 *is_ours = 1;
619
620 p = PCAP_CREATE_COMMON(ebuf, struct pcap_usb_linux);
621 if (p == NULL)
622 return (NULL);
623
624 p->activate_op = usb_activate;
625 return (p);
626 }
627
628 static int
629 usb_activate(pcap_t* handle)
630 {
631 struct pcap_usb_linux *handlep = handle->priv;
632 char full_path[USB_LINE_LEN];
633 int ret;
634
635 /*
636 * Turn a negative snapshot value (invalid), a snapshot value of
637 * 0 (unspecified), or a value bigger than the normal maximum
638 * value, into the maximum allowed value.
639 *
640 * If some application really *needs* a bigger snapshot
641 * length, we should just increase MAXIMUM_SNAPLEN.
642 */
643 if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
644 handle->snapshot = MAXIMUM_SNAPLEN;
645
646 /* Initialize some components of the pcap structure. */
647 handle->bufsize = handle->snapshot;
648 handle->offset = 0;
649 handle->linktype = DLT_USB_LINUX;
650
651 handle->inject_op = usb_inject_linux;
652 handle->setfilter_op = install_bpf_program; /* no kernel filtering */
653 handle->setdirection_op = usb_setdirection_linux;
654 handle->set_datalink_op = NULL; /* can't change data link type */
655 handle->getnonblock_op = pcap_getnonblock_fd;
656 handle->setnonblock_op = pcap_setnonblock_fd;
657
658 /*get usb bus index from device name */
659 if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
660 {
661 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
662 "Can't get USB bus index from %s", handle->opt.device);
663 return PCAP_ERROR;
664 }
665
666 if (have_binary_usbmon())
667 {
668 /*
669 * We have binary-mode support.
670 * Try to open the binary interface.
671 */
672 snprintf(full_path, USB_LINE_LEN, LINUX_USB_MON_DEV"%d", handlep->bus_index);
673 handle->fd = open(full_path, O_RDONLY, 0);
674 if (handle->fd < 0)
675 {
676 /*
677 * The attempt failed; why?
678 */
679 switch (errno) {
680
681 case ENOENT:
682 /*
683 * The device doesn't exist.
684 * That could either mean that there's
685 * no support for monitoring USB buses
686 * (which probably means "the usbmon
687 * module isn't loaded") or that there
688 * is but that *particular* device
689 * doesn't exist (no "scan all buses"
690 * device if the bus index is 0, no
691 * such bus if the bus index isn't 0).
692 */
693 return PCAP_ERROR_NO_SUCH_DEVICE;
694
695 case EACCES:
696 /*
697 * We didn't have permission to open it.
698 */
699 return PCAP_ERROR_PERM_DENIED;
700
701 default:
702 /*
703 * Something went wrong.
704 */
705 pcap_fmt_errmsg_for_errno(handle->errbuf,
706 PCAP_ERRBUF_SIZE, errno,
707 "Can't open USB bus file %s", full_path);
708 return PCAP_ERROR;
709 }
710 }
711
712 if (handle->opt.rfmon)
713 {
714 /*
715 * Monitor mode doesn't apply to USB devices.
716 */
717 close(handle->fd);
718 return PCAP_ERROR_RFMON_NOTSUP;
719 }
720
721 /* try to use fast mmap access */
722 if (usb_mmap(handle))
723 {
724 /* We succeeded. */
725 handle->linktype = DLT_USB_LINUX_MMAPPED;
726 handle->stats_op = usb_stats_linux_bin;
727 handle->read_op = usb_read_linux_mmap;
728 handle->cleanup_op = usb_cleanup_linux_mmap;
729 #ifdef HAVE_LINUX_USBDEVICE_FS_H
730 probe_devices(handlep->bus_index);
731 #endif
732
733 /*
734 * "handle->fd" is a real file, so
735 * "select()" and "poll()" work on it.
736 */
737 handle->selectable_fd = handle->fd;
738 return 0;
739 }
740
741 /*
742 * We failed; try plain binary interface access.
743 *
744 * Attempt to set the ring size as appropriate for
745 * the snapshot length, reducing the snapshot length
746 * if that'd make the ring bigger than the kernel
747 * supports.
748 */
749 if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
750 /* Failed. */
751 close(handle->fd);
752 return PCAP_ERROR;
753 }
754 handle->stats_op = usb_stats_linux_bin;
755 handle->read_op = usb_read_linux_bin;
756 #ifdef HAVE_LINUX_USBDEVICE_FS_H
757 probe_devices(handlep->bus_index);
758 #endif
759 }
760 else {
761 /*
762 * We don't have binary mode support.
763 * Try opening the text-mode device.
764 */
765 snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR"/%dt", handlep->bus_index);
766 handle->fd = open(full_path, O_RDONLY, 0);
767 if (handle->fd < 0)
768 {
769 if (errno == ENOENT)
770 {
771 /*
772 * Not found at the new location; try
773 * the old location.
774 */
775 snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%dt", handlep->bus_index);
776 handle->fd = open(full_path, O_RDONLY, 0);
777 }
778 if (handle->fd < 0) {
779 if (errno == ENOENT)
780 {
781 /*
782 * The problem is that the file
783 * doesn't exist. Report that as
784 * "no such device". (That could
785 * mean "no such USB bus" or
786 * "monitoring not supported".)
787 */
788 ret = PCAP_ERROR_NO_SUCH_DEVICE;
789 }
790 else if (errno == EACCES)
791 {
792 /*
793 * The problem is that we don't
794 * have sufficient permission to
795 * open the file. Report that.
796 */
797 ret = PCAP_ERROR_PERM_DENIED;
798 }
799 else
800 {
801 /*
802 * Some other error.
803 */
804 ret = PCAP_ERROR;
805 }
806 pcap_fmt_errmsg_for_errno(handle->errbuf,
807 PCAP_ERRBUF_SIZE, errno,
808 "Can't open USB bus file %s",
809 full_path);
810 return ret;
811 }
812 }
813
814 if (handle->opt.rfmon)
815 {
816 /*
817 * Monitor mode doesn't apply to USB devices.
818 */
819 close(handle->fd);
820 return PCAP_ERROR_RFMON_NOTSUP;
821 }
822
823 handle->stats_op = usb_stats_linux;
824 handle->read_op = usb_read_linux;
825 }
826
827 /*
828 * "handle->fd" is a real file, so "select()" and "poll()"
829 * work on it.
830 */
831 handle->selectable_fd = handle->fd;
832
833 /* for plain binary access and text access we need to allocate the read
834 * buffer */
835 handle->buffer = malloc(handle->bufsize);
836 if (!handle->buffer) {
837 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
838 errno, "malloc");
839 close(handle->fd);
840 return PCAP_ERROR;
841 }
842 return 0;
843 }
844
845 static inline int
846 ascii_to_int(char c)
847 {
848 return c < 'A' ? c- '0': ((c<'a') ? c - 'A' + 10: c-'a'+10);
849 }
850
851 /*
852 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
853 * <linux-kernel-source>/drivers/usb/mon/mon_text.c for urb string
854 * format description
855 */
856 static int
857 usb_read_linux(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
858 {
859 /* see:
860 * /usr/src/linux/Documentation/usb/usbmon.txt
861 * for message format
862 */
863 struct pcap_usb_linux *handlep = handle->priv;
864 unsigned timestamp;
865 int tag, cnt, ep_num, dev_addr, dummy, ret, urb_len, data_len;
866 ssize_t read_ret;
867 char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN];
868 char *string = line;
869 u_char * rawdata = handle->buffer;
870 struct pcap_pkthdr pkth;
871 pcap_usb_header* uhdr = (pcap_usb_header*)handle->buffer;
872 u_char urb_transfer=0;
873 int incoming=0;
874
875 /* ignore interrupt system call errors */
876 do {
877 read_ret = read(handle->fd, line, USB_LINE_LEN - 1);
878 if (handle->break_loop)
879 {
880 handle->break_loop = 0;
881 return -2;
882 }
883 } while ((read_ret == -1) && (errno == EINTR));
884 if (read_ret < 0)
885 {
886 if (errno == EAGAIN)
887 return 0; /* no data there */
888
889 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
890 errno, "Can't read from fd %d", handle->fd);
891 return -1;
892 }
893
894 /* read urb header; %n argument may increment return value, but it's
895 * not mandatory, so does not count on it*/
896 string[read_ret] = 0;
897 ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, &timestamp, &etype,
898 &pipeid1, &pipeid2, &dev_addr, &ep_num, status,
899 &cnt);
900 if (ret < 8)
901 {
902 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
903 "Can't parse USB bus message '%s', too few tokens (expected 8 got %d)",
904 string, ret);
905 return -1;
906 }
907 uhdr->id = tag;
908 uhdr->device_address = dev_addr;
909 uhdr->bus_id = handlep->bus_index;
910 uhdr->status = 0;
911 string += cnt;
912
913 /* don't use usbmon provided timestamp, since it have low precision*/
914 if (gettimeofday(&pkth.ts, NULL) < 0)
915 {
916 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
917 errno, "Can't get timestamp for message '%s'", string);
918 return -1;
919 }
920 uhdr->ts_sec = pkth.ts.tv_sec;
921 uhdr->ts_usec = (int32_t)pkth.ts.tv_usec;
922
923 /* parse endpoint information */
924 if (pipeid1 == 'C')
925 urb_transfer = URB_CONTROL;
926 else if (pipeid1 == 'Z')
927 urb_transfer = URB_ISOCHRONOUS;
928 else if (pipeid1 == 'I')
929 urb_transfer = URB_INTERRUPT;
930 else if (pipeid1 == 'B')
931 urb_transfer = URB_BULK;
932 if (pipeid2 == 'i') {
933 ep_num |= URB_TRANSFER_IN;
934 incoming = 1;
935 }
936 if (etype == 'C')
937 incoming = !incoming;
938
939 /* direction check*/
940 if (incoming)
941 {
942 if (handle->direction == PCAP_D_OUT)
943 return 0;
944 }
945 else
946 if (handle->direction == PCAP_D_IN)
947 return 0;
948 uhdr->event_type = etype;
949 uhdr->transfer_type = urb_transfer;
950 uhdr->endpoint_number = ep_num;
951 pkth.caplen = sizeof(pcap_usb_header);
952 rawdata += sizeof(pcap_usb_header);
953
954 /* check if this is a setup packet */
955 ret = sscanf(status, "%d", &dummy);
956 if (ret != 1)
957 {
958 /* this a setup packet, setup data can be filled with underscore if
959 * usbmon has not been able to read them, so we must parse this fields as
960 * strings */
961 pcap_usb_setup* shdr;
962 char str1[3], str2[3], str3[5], str4[5], str5[5];
963 ret = sscanf(string, "%s %s %s %s %s%n", str1, str2, str3, str4,
964 str5, &cnt);
965 if (ret < 5)
966 {
967 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
968 "Can't parse USB bus message '%s', too few tokens (expected 5 got %d)",
969 string, ret);
970 return -1;
971 }
972 string += cnt;
973
974 /* try to convert to corresponding integer */
975 shdr = &uhdr->setup;
976 shdr->bmRequestType = strtoul(str1, 0, 16);
977 shdr->bRequest = strtoul(str2, 0, 16);
978 shdr->wValue = htols(strtoul(str3, 0, 16));
979 shdr->wIndex = htols(strtoul(str4, 0, 16));
980 shdr->wLength = htols(strtoul(str5, 0, 16));
981
982 uhdr->setup_flag = 0;
983 }
984 else
985 uhdr->setup_flag = 1;
986
987 /* read urb data */
988 ret = sscanf(string, " %d%n", &urb_len, &cnt);
989 if (ret < 1)
990 {
991 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
992 "Can't parse urb length from '%s'", string);
993 return -1;
994 }
995 string += cnt;
996
997 /* urb tag is not present if urb length is 0, so we can stop here
998 * text parsing */
999 pkth.len = urb_len+pkth.caplen;
1000 uhdr->urb_len = urb_len;
1001 uhdr->data_flag = 1;
1002 data_len = 0;
1003 if (uhdr->urb_len == 0)
1004 goto got;
1005
1006 /* check for data presence; data is present if and only if urb tag is '=' */
1007 if (sscanf(string, " %c", &urb_tag) != 1)
1008 {
1009 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1010 "Can't parse urb tag from '%s'", string);
1011 return -1;
1012 }
1013
1014 if (urb_tag != '=')
1015 goto got;
1016
1017 /* skip urb tag and following space */
1018 string += 3;
1019
1020 /* if we reach this point we got some urb data*/
1021 uhdr->data_flag = 0;
1022
1023 /* read all urb data; if urb length is greater then the usbmon internal
1024 * buffer length used by the kernel to spool the URB, we get only
1025 * a partial information.
1026 * At least until linux 2.6.17 there is no way to set usbmon intenal buffer
1027 * length and default value is 130. */
1028 while ((string[0] != 0) && (string[1] != 0) && (pkth.caplen < (bpf_u_int32)handle->snapshot))
1029 {
1030 rawdata[0] = ascii_to_int(string[0]) * 16 + ascii_to_int(string[1]);
1031 rawdata++;
1032 string+=2;
1033 if (string[0] == ' ')
1034 string++;
1035 pkth.caplen++;
1036 data_len++;
1037 }
1038
1039 got:
1040 uhdr->data_len = data_len;
1041 if (pkth.caplen > (bpf_u_int32)handle->snapshot)
1042 pkth.caplen = (bpf_u_int32)handle->snapshot;
1043
1044 if (handle->fcode.bf_insns == NULL ||
1045 pcap_filter(handle->fcode.bf_insns, handle->buffer,
1046 pkth.len, pkth.caplen)) {
1047 handlep->packets_read++;
1048 callback(user, &pkth, handle->buffer);
1049 return 1;
1050 }
1051 return 0; /* didn't pass filter */
1052 }
1053
1054 static int
1055 usb_inject_linux(pcap_t *handle, const void *buf _U_, int size _U_)
1056 {
1057 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1058 "Packet injection is not supported on USB devices");
1059 return (-1);
1060 }
1061
1062 static int
1063 usb_stats_linux(pcap_t *handle, struct pcap_stat *stats)
1064 {
1065 struct pcap_usb_linux *handlep = handle->priv;
1066 int dummy, cnt;
1067 ssize_t ret, consumed;
1068 char string[USB_LINE_LEN];
1069 char token[USB_LINE_LEN];
1070 char * ptr = string;
1071 int fd;
1072
1073 snprintf(string, USB_LINE_LEN, USB_TEXT_DIR"/%ds", handlep->bus_index);
1074 fd = open(string, O_RDONLY, 0);
1075 if (fd < 0)
1076 {
1077 if (errno == ENOENT)
1078 {
1079 /*
1080 * Not found at the new location; try the old
1081 * location.
1082 */
1083 snprintf(string, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%ds", handlep->bus_index);
1084 fd = open(string, O_RDONLY, 0);
1085 }
1086 if (fd < 0) {
1087 pcap_fmt_errmsg_for_errno(handle->errbuf,
1088 PCAP_ERRBUF_SIZE, errno,
1089 "Can't open USB stats file %s", string);
1090 return -1;
1091 }
1092 }
1093
1094 /* read stats line */
1095 do {
1096 ret = read(fd, string, USB_LINE_LEN-1);
1097 } while ((ret == -1) && (errno == EINTR));
1098 close(fd);
1099
1100 if (ret < 0)
1101 {
1102 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1103 "Can't read stats from fd %d ", fd);
1104 return -1;
1105 }
1106 string[ret] = 0;
1107
1108 stats->ps_recv = handlep->packets_read;
1109 stats->ps_drop = 0; /* unless we find text_lost */
1110 stats->ps_ifdrop = 0;
1111
1112 /* extract info on dropped urbs */
1113 for (consumed=0; consumed < ret; ) {
1114 /* from the sscanf man page:
1115 * The C standard says: "Execution of a %n directive does
1116 * not increment the assignment count returned at the completion
1117 * of execution" but the Corrigendum seems to contradict this.
1118 * Do not make any assumptions on the effect of %n conversions
1119 * on the return value and explicitly check for cnt assignmet*/
1120 int ntok;
1121
1122 cnt = -1;
1123 ntok = sscanf(ptr, "%s%n", token, &cnt);
1124 if ((ntok < 1) || (cnt < 0))
1125 break;
1126 consumed += cnt;
1127 ptr += cnt;
1128 if (strcmp(token, "text_lost") == 0)
1129 ntok = sscanf(ptr, "%d%n", &stats->ps_drop, &cnt);
1130 else
1131 ntok = sscanf(ptr, "%d%n", &dummy, &cnt);
1132 if ((ntok != 1) || (cnt < 0))
1133 break;
1134 consumed += cnt;
1135 ptr += cnt;
1136 }
1137
1138 return 0;
1139 }
1140
1141 static int
1142 usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
1143 {
1144 /*
1145 * It's guaranteed, at this point, that d is a valid
1146 * direction value.
1147 */
1148 p->direction = d;
1149 return 0;
1150 }
1151
1152
1153 static int
1154 usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
1155 {
1156 struct pcap_usb_linux *handlep = handle->priv;
1157 int ret;
1158 struct mon_bin_stats st;
1159 ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
1160 if (ret < 0)
1161 {
1162 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1163 errno, "Can't read stats from fd %d", handle->fd);
1164 return -1;
1165 }
1166
1167 stats->ps_recv = handlep->packets_read + st.queued;
1168 stats->ps_drop = st.dropped;
1169 stats->ps_ifdrop = 0;
1170 return 0;
1171 }
1172
1173 /*
1174 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1175 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1176 */
1177 static int
1178 usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
1179 {
1180 struct pcap_usb_linux *handlep = handle->priv;
1181 struct mon_bin_get info;
1182 int ret;
1183 struct pcap_pkthdr pkth;
1184 u_int clen = handle->snapshot - sizeof(pcap_usb_header);
1185
1186 /* the usb header is going to be part of 'packet' data*/
1187 info.hdr = (pcap_usb_header*) handle->buffer;
1188 info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
1189 info.data_len = clen;
1190
1191 /* ignore interrupt system call errors */
1192 do {
1193 ret = ioctl(handle->fd, MON_IOCX_GET, &info);
1194 if (handle->break_loop)
1195 {
1196 handle->break_loop = 0;
1197 return -2;
1198 }
1199 } while ((ret == -1) && (errno == EINTR));
1200 if (ret < 0)
1201 {
1202 if (errno == EAGAIN)
1203 return 0; /* no data there */
1204
1205 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1206 errno, "Can't read from fd %d", handle->fd);
1207 return -1;
1208 }
1209
1210 /*
1211 * info.hdr->data_len is the number of bytes of isochronous
1212 * descriptors (if any) plus the number of bytes of data
1213 * provided. There are no isochronous descriptors here,
1214 * because we're using the old 48-byte header.
1215 *
1216 * If info.hdr->data_flag is non-zero, there's no URB data;
1217 * info.hdr->urb_len is the size of the buffer into which
1218 * data is to be placed; it does not represent the amount
1219 * of data transferred. If info.hdr->data_flag is zero,
1220 * there is URB data, and info.hdr->urb_len is the number
1221 * of bytes transmitted or received; it doesn't include
1222 * isochronous descriptors.
1223 *
1224 * The kernel may give us more data than the snaplen; if it did,
1225 * reduce the data length so that the total number of bytes we
1226 * tell our client we have is not greater than the snaplen.
1227 */
1228 if (info.hdr->data_len < clen)
1229 clen = info.hdr->data_len;
1230 info.hdr->data_len = clen;
1231 pkth.caplen = sizeof(pcap_usb_header) + clen;
1232 if (info.hdr->data_flag) {
1233 /*
1234 * No data; just base the on-the-wire length on
1235 * info.hdr->data_len (so that it's >= the captured
1236 * length).
1237 */
1238 pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
1239 } else {
1240 /*
1241 * We got data; base the on-the-wire length on
1242 * info.hdr->urb_len, so that it includes data
1243 * discarded by the USB monitor device due to
1244 * its buffer being too small.
1245 */
1246 pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
1247 }
1248 pkth.ts.tv_sec = (time_t)info.hdr->ts_sec;
1249 pkth.ts.tv_usec = info.hdr->ts_usec;
1250
1251 if (handle->fcode.bf_insns == NULL ||
1252 pcap_filter(handle->fcode.bf_insns, handle->buffer,
1253 pkth.len, pkth.caplen)) {
1254 handlep->packets_read++;
1255 callback(user, &pkth, handle->buffer);
1256 return 1;
1257 }
1258
1259 return 0; /* didn't pass filter */
1260 }
1261
1262 /*
1263 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1264 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1265 */
1266 #define VEC_SIZE 32
1267 static int
1268 usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
1269 {
1270 struct pcap_usb_linux *handlep = handle->priv;
1271 struct mon_bin_mfetch fetch;
1272 int32_t vec[VEC_SIZE];
1273 struct pcap_pkthdr pkth;
1274 pcap_usb_header_mmapped* hdr;
1275 int nflush = 0;
1276 int packets = 0;
1277 u_int clen, max_clen;
1278
1279 max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
1280
1281 for (;;) {
1282 int i, ret;
1283 int limit = max_packets - packets;
1284 if (limit <= 0)
1285 limit = VEC_SIZE;
1286 if (limit > VEC_SIZE)
1287 limit = VEC_SIZE;
1288
1289 /* try to fetch as many events as possible*/
1290 fetch.offvec = vec;
1291 fetch.nfetch = limit;
1292 fetch.nflush = nflush;
1293 /* ignore interrupt system call errors */
1294 do {
1295 ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
1296 if (handle->break_loop)
1297 {
1298 handle->break_loop = 0;
1299 return -2;
1300 }
1301 } while ((ret == -1) && (errno == EINTR));
1302 if (ret < 0)
1303 {
1304 if (errno == EAGAIN)
1305 return 0; /* no data there */
1306
1307 pcap_fmt_errmsg_for_errno(handle->errbuf,
1308 PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
1309 handle->fd);
1310 return -1;
1311 }
1312
1313 /* keep track of processed events, we will flush them later */
1314 nflush = fetch.nfetch;
1315 for (i=0; i<fetch.nfetch; ++i) {
1316 /* discard filler */
1317 hdr = (pcap_usb_header_mmapped*) &handlep->mmapbuf[vec[i]];
1318 if (hdr->event_type == '@')
1319 continue;
1320
1321 /*
1322 * hdr->data_len is the number of bytes of
1323 * isochronous descriptors (if any) plus the
1324 * number of bytes of data provided.
1325 *
1326 * If hdr->data_flag is non-zero, there's no
1327 * URB data; hdr->urb_len is the size of the
1328 * buffer into which data is to be placed; it does
1329 * not represent the amount of data transferred.
1330 * If hdr->data_flag is zero, there is URB data,
1331 * and hdr->urb_len is the number of bytes
1332 * transmitted or received; it doesn't include
1333 * isochronous descriptors.
1334 *
1335 * The kernel may give us more data than the
1336 * snaplen; if it did, reduce the data length
1337 * so that the total number of bytes we
1338 * tell our client we have is not greater than
1339 * the snaplen.
1340 */
1341 clen = max_clen;
1342 if (hdr->data_len < clen)
1343 clen = hdr->data_len;
1344 pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
1345 if (hdr->data_flag) {
1346 /*
1347 * No data; just base the on-the-wire length
1348 * on hdr->data_len (so that it's >= the
1349 * captured length).
1350 */
1351 pkth.len = sizeof(pcap_usb_header_mmapped) +
1352 hdr->data_len;
1353 } else {
1354 /*
1355 * We got data; base the on-the-wire length
1356 * on hdr->urb_len, so that it includes
1357 * data discarded by the USB monitor device
1358 * due to its buffer being too small.
1359 */
1360 pkth.len = sizeof(pcap_usb_header_mmapped) +
1361 (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
1362 }
1363 pkth.ts.tv_sec = (time_t)hdr->ts_sec;
1364 pkth.ts.tv_usec = hdr->ts_usec;
1365
1366 if (handle->fcode.bf_insns == NULL ||
1367 pcap_filter(handle->fcode.bf_insns, (u_char*) hdr,
1368 pkth.len, pkth.caplen)) {
1369 handlep->packets_read++;
1370 callback(user, &pkth, (u_char*) hdr);
1371 packets++;
1372 }
1373 }
1374
1375 /* with max_packets specifying "unlimited" we stop afer the first chunk*/
1376 if (PACKET_COUNT_IS_UNLIMITED(max_packets) || (packets == max_packets))
1377 break;
1378 }
1379
1380 /* flush pending events*/
1381 if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
1382 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1383 errno, "Can't mflush fd %d", handle->fd);
1384 return -1;
1385 }
1386 return packets;
1387 }
1388
1389 static void
1390 usb_cleanup_linux_mmap(pcap_t* handle)
1391 {
1392 struct pcap_usb_linux *handlep = handle->priv;
1393
1394 /* if we have a memory-mapped buffer, unmap it */
1395 if (handlep->mmapbuf != NULL) {
1396 munmap(handlep->mmapbuf, handlep->mmapbuflen);
1397 handlep->mmapbuf = NULL;
1398 }
1399 pcap_cleanup_live_common(handle);
1400 }