1*8b26181fSAndroid Build Coastguard Worker /*
2*8b26181fSAndroid Build Coastguard Worker * Copyright (c) 2006 Paolo Abeni (Italy)
3*8b26181fSAndroid Build Coastguard Worker * All rights reserved.
4*8b26181fSAndroid Build Coastguard Worker *
5*8b26181fSAndroid Build Coastguard Worker * Redistribution and use in source and binary forms, with or without
6*8b26181fSAndroid Build Coastguard Worker * modification, are permitted provided that the following conditions
7*8b26181fSAndroid Build Coastguard Worker * are met:
8*8b26181fSAndroid Build Coastguard Worker *
9*8b26181fSAndroid Build Coastguard Worker * 1. Redistributions of source code must retain the above copyright
10*8b26181fSAndroid Build Coastguard Worker * notice, this list of conditions and the following disclaimer.
11*8b26181fSAndroid Build Coastguard Worker * 2. Redistributions in binary form must reproduce the above copyright
12*8b26181fSAndroid Build Coastguard Worker * notice, this list of conditions and the following disclaimer in the
13*8b26181fSAndroid Build Coastguard Worker * documentation and/or other materials provided with the distribution.
14*8b26181fSAndroid Build Coastguard Worker * 3. The name of the author may not be used to endorse or promote
15*8b26181fSAndroid Build Coastguard Worker * products derived from this software without specific prior written
16*8b26181fSAndroid Build Coastguard Worker * permission.
17*8b26181fSAndroid Build Coastguard Worker *
18*8b26181fSAndroid Build Coastguard Worker * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19*8b26181fSAndroid Build Coastguard Worker * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20*8b26181fSAndroid Build Coastguard Worker * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21*8b26181fSAndroid Build Coastguard Worker * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22*8b26181fSAndroid Build Coastguard Worker * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23*8b26181fSAndroid Build Coastguard Worker * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24*8b26181fSAndroid Build Coastguard Worker * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25*8b26181fSAndroid Build Coastguard Worker * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26*8b26181fSAndroid Build Coastguard Worker * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27*8b26181fSAndroid Build Coastguard Worker * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28*8b26181fSAndroid Build Coastguard Worker * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29*8b26181fSAndroid Build Coastguard Worker *
30*8b26181fSAndroid Build Coastguard Worker * USB sniffing API implementation for Linux platform
31*8b26181fSAndroid Build Coastguard Worker * By Paolo Abeni <[email protected]>
32*8b26181fSAndroid Build Coastguard Worker * Modifications: Kris Katterjohn <[email protected]>
33*8b26181fSAndroid Build Coastguard Worker *
34*8b26181fSAndroid Build Coastguard Worker */
35*8b26181fSAndroid Build Coastguard Worker
36*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_CONFIG_H
37*8b26181fSAndroid Build Coastguard Worker #include <config.h>
38*8b26181fSAndroid Build Coastguard Worker #endif
39*8b26181fSAndroid Build Coastguard Worker
40*8b26181fSAndroid Build Coastguard Worker #include "pcap-int.h"
41*8b26181fSAndroid Build Coastguard Worker #include "pcap-usb-linux.h"
42*8b26181fSAndroid Build Coastguard Worker #include "pcap-usb-linux-common.h"
43*8b26181fSAndroid Build Coastguard Worker #include "pcap/usb.h"
44*8b26181fSAndroid Build Coastguard Worker
45*8b26181fSAndroid Build Coastguard Worker #include "extract.h"
46*8b26181fSAndroid Build Coastguard Worker
47*8b26181fSAndroid Build Coastguard Worker #ifdef NEED_STRERROR_H
48*8b26181fSAndroid Build Coastguard Worker #include "strerror.h"
49*8b26181fSAndroid Build Coastguard Worker #endif
50*8b26181fSAndroid Build Coastguard Worker
51*8b26181fSAndroid Build Coastguard Worker #include <errno.h>
52*8b26181fSAndroid Build Coastguard Worker #include <stdlib.h>
53*8b26181fSAndroid Build Coastguard Worker #include <unistd.h>
54*8b26181fSAndroid Build Coastguard Worker #include <fcntl.h>
55*8b26181fSAndroid Build Coastguard Worker #include <limits.h>
56*8b26181fSAndroid Build Coastguard Worker #include <string.h>
57*8b26181fSAndroid Build Coastguard Worker #include <dirent.h>
58*8b26181fSAndroid Build Coastguard Worker #include <byteswap.h>
59*8b26181fSAndroid Build Coastguard Worker #include <netinet/in.h>
60*8b26181fSAndroid Build Coastguard Worker #include <sys/ioctl.h>
61*8b26181fSAndroid Build Coastguard Worker #include <sys/mman.h>
62*8b26181fSAndroid Build Coastguard Worker #include <sys/utsname.h>
63*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_LINUX_USBDEVICE_FS_H
64*8b26181fSAndroid Build Coastguard Worker /*
65*8b26181fSAndroid Build Coastguard Worker * We might need <linux/compiler.h> to define __user for
66*8b26181fSAndroid Build Coastguard Worker * <linux/usbdevice_fs.h>.
67*8b26181fSAndroid Build Coastguard Worker */
68*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_LINUX_COMPILER_H
69*8b26181fSAndroid Build Coastguard Worker #include <linux/compiler.h>
70*8b26181fSAndroid Build Coastguard Worker #endif /* HAVE_LINUX_COMPILER_H */
71*8b26181fSAndroid Build Coastguard Worker #include <linux/usbdevice_fs.h>
72*8b26181fSAndroid Build Coastguard Worker #endif /* HAVE_LINUX_USBDEVICE_FS_H */
73*8b26181fSAndroid Build Coastguard Worker
74*8b26181fSAndroid Build Coastguard Worker #include "diag-control.h"
75*8b26181fSAndroid Build Coastguard Worker
76*8b26181fSAndroid Build Coastguard Worker #define USB_IFACE "usbmon"
77*8b26181fSAndroid Build Coastguard Worker
78*8b26181fSAndroid Build Coastguard Worker #define USBMON_DEV_PREFIX "usbmon"
79*8b26181fSAndroid Build Coastguard Worker #define USBMON_DEV_PREFIX_LEN (sizeof USBMON_DEV_PREFIX - 1)
80*8b26181fSAndroid Build Coastguard Worker #define USB_LINE_LEN 4096
81*8b26181fSAndroid Build Coastguard Worker
82*8b26181fSAndroid Build Coastguard Worker #if __BYTE_ORDER == __LITTLE_ENDIAN
83*8b26181fSAndroid Build Coastguard Worker #define htols(s) s
84*8b26181fSAndroid Build Coastguard Worker #define htoll(l) l
85*8b26181fSAndroid Build Coastguard Worker #define htol64(ll) ll
86*8b26181fSAndroid Build Coastguard Worker #else
87*8b26181fSAndroid Build Coastguard Worker #define htols(s) bswap_16(s)
88*8b26181fSAndroid Build Coastguard Worker #define htoll(l) bswap_32(l)
89*8b26181fSAndroid Build Coastguard Worker #define htol64(ll) bswap_64(ll)
90*8b26181fSAndroid Build Coastguard Worker #endif
91*8b26181fSAndroid Build Coastguard Worker
92*8b26181fSAndroid Build Coastguard Worker struct mon_bin_stats {
93*8b26181fSAndroid Build Coastguard Worker uint32_t queued;
94*8b26181fSAndroid Build Coastguard Worker uint32_t dropped;
95*8b26181fSAndroid Build Coastguard Worker };
96*8b26181fSAndroid Build Coastguard Worker
97*8b26181fSAndroid Build Coastguard Worker struct mon_bin_get {
98*8b26181fSAndroid Build Coastguard Worker pcap_usb_header *hdr;
99*8b26181fSAndroid Build Coastguard Worker void *data;
100*8b26181fSAndroid Build Coastguard Worker size_t data_len; /* Length of data (can be zero) */
101*8b26181fSAndroid Build Coastguard Worker };
102*8b26181fSAndroid Build Coastguard Worker
103*8b26181fSAndroid Build Coastguard Worker struct mon_bin_mfetch {
104*8b26181fSAndroid Build Coastguard Worker int32_t *offvec; /* Vector of events fetched */
105*8b26181fSAndroid Build Coastguard Worker int32_t nfetch; /* Number of events to fetch (out: fetched) */
106*8b26181fSAndroid Build Coastguard Worker int32_t nflush; /* Number of events to flush */
107*8b26181fSAndroid Build Coastguard Worker };
108*8b26181fSAndroid Build Coastguard Worker
109*8b26181fSAndroid Build Coastguard Worker #define MON_IOC_MAGIC 0x92
110*8b26181fSAndroid Build Coastguard Worker
111*8b26181fSAndroid Build Coastguard Worker #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
112*8b26181fSAndroid Build Coastguard Worker #define MON_IOCX_URB _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
113*8b26181fSAndroid Build Coastguard Worker #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
114*8b26181fSAndroid Build Coastguard Worker #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
115*8b26181fSAndroid Build Coastguard Worker #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
116*8b26181fSAndroid Build Coastguard Worker #define MON_IOCX_GET _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
117*8b26181fSAndroid Build Coastguard Worker #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
118*8b26181fSAndroid Build Coastguard Worker #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
119*8b26181fSAndroid Build Coastguard Worker
120*8b26181fSAndroid Build Coastguard Worker #define MON_BIN_SETUP 0x1 /* setup hdr is present*/
121*8b26181fSAndroid Build Coastguard Worker #define MON_BIN_SETUP_ZERO 0x2 /* setup buffer is not available */
122*8b26181fSAndroid Build Coastguard Worker #define MON_BIN_DATA_ZERO 0x4 /* data buffer is not available */
123*8b26181fSAndroid Build Coastguard Worker #define MON_BIN_ERROR 0x8
124*8b26181fSAndroid Build Coastguard Worker
125*8b26181fSAndroid Build Coastguard Worker /*
126*8b26181fSAndroid Build Coastguard Worker * Private data for capturing on Linux USB.
127*8b26181fSAndroid Build Coastguard Worker */
128*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux {
129*8b26181fSAndroid Build Coastguard Worker u_char *mmapbuf; /* memory-mapped region pointer */
130*8b26181fSAndroid Build Coastguard Worker size_t mmapbuflen; /* size of region */
131*8b26181fSAndroid Build Coastguard Worker int bus_index;
132*8b26181fSAndroid Build Coastguard Worker u_int packets_read;
133*8b26181fSAndroid Build Coastguard Worker };
134*8b26181fSAndroid Build Coastguard Worker
135*8b26181fSAndroid Build Coastguard Worker /* forward declaration */
136*8b26181fSAndroid Build Coastguard Worker static int usb_activate(pcap_t *);
137*8b26181fSAndroid Build Coastguard Worker static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
138*8b26181fSAndroid Build Coastguard Worker static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
139*8b26181fSAndroid Build Coastguard Worker static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
140*8b26181fSAndroid Build Coastguard Worker static int usb_inject_linux(pcap_t *, const void *, int);
141*8b26181fSAndroid Build Coastguard Worker static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
142*8b26181fSAndroid Build Coastguard Worker static void usb_cleanup_linux_mmap(pcap_t *);
143*8b26181fSAndroid Build Coastguard Worker
144*8b26181fSAndroid Build Coastguard Worker /* facility to add an USB device to the device list*/
145*8b26181fSAndroid Build Coastguard Worker static int
usb_dev_add(pcap_if_list_t * devlistp,int n,char * err_str)146*8b26181fSAndroid Build Coastguard Worker usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
147*8b26181fSAndroid Build Coastguard Worker {
148*8b26181fSAndroid Build Coastguard Worker char dev_name[10];
149*8b26181fSAndroid Build Coastguard Worker char dev_descr[30];
150*8b26181fSAndroid Build Coastguard Worker snprintf(dev_name, 10, USB_IFACE"%d", n);
151*8b26181fSAndroid Build Coastguard Worker /*
152*8b26181fSAndroid Build Coastguard Worker * XXX - is there any notion of "up" and "running"?
153*8b26181fSAndroid Build Coastguard Worker */
154*8b26181fSAndroid Build Coastguard Worker if (n == 0) {
155*8b26181fSAndroid Build Coastguard Worker /*
156*8b26181fSAndroid Build Coastguard Worker * As this refers to all buses, there's no notion of
157*8b26181fSAndroid Build Coastguard Worker * "connected" vs. "disconnected", as that's a property
158*8b26181fSAndroid Build Coastguard Worker * that would apply to a particular USB interface.
159*8b26181fSAndroid Build Coastguard Worker */
160*8b26181fSAndroid Build Coastguard Worker if (add_dev(devlistp, dev_name,
161*8b26181fSAndroid Build Coastguard Worker PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
162*8b26181fSAndroid Build Coastguard Worker "Raw USB traffic, all USB buses", err_str) == NULL)
163*8b26181fSAndroid Build Coastguard Worker return -1;
164*8b26181fSAndroid Build Coastguard Worker } else {
165*8b26181fSAndroid Build Coastguard Worker /*
166*8b26181fSAndroid Build Coastguard Worker * XXX - is there a way to determine whether anything's
167*8b26181fSAndroid Build Coastguard Worker * plugged into this bus interface or not, and set
168*8b26181fSAndroid Build Coastguard Worker * PCAP_IF_CONNECTION_STATUS_CONNECTED or
169*8b26181fSAndroid Build Coastguard Worker * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
170*8b26181fSAndroid Build Coastguard Worker */
171*8b26181fSAndroid Build Coastguard Worker snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
172*8b26181fSAndroid Build Coastguard Worker if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
173*8b26181fSAndroid Build Coastguard Worker return -1;
174*8b26181fSAndroid Build Coastguard Worker }
175*8b26181fSAndroid Build Coastguard Worker
176*8b26181fSAndroid Build Coastguard Worker return 0;
177*8b26181fSAndroid Build Coastguard Worker }
178*8b26181fSAndroid Build Coastguard Worker
179*8b26181fSAndroid Build Coastguard Worker int
usb_findalldevs(pcap_if_list_t * devlistp,char * err_str)180*8b26181fSAndroid Build Coastguard Worker usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
181*8b26181fSAndroid Build Coastguard Worker {
182*8b26181fSAndroid Build Coastguard Worker struct dirent* data;
183*8b26181fSAndroid Build Coastguard Worker int ret = 0;
184*8b26181fSAndroid Build Coastguard Worker DIR* dir;
185*8b26181fSAndroid Build Coastguard Worker int n;
186*8b26181fSAndroid Build Coastguard Worker char* name;
187*8b26181fSAndroid Build Coastguard Worker
188*8b26181fSAndroid Build Coastguard Worker /*
189*8b26181fSAndroid Build Coastguard Worker * We require 2.6.27 or later kernels, so we have binary-mode support.
190*8b26181fSAndroid Build Coastguard Worker * The devices are of the form /dev/usbmon{N}.
191*8b26181fSAndroid Build Coastguard Worker * Open /dev and scan it.
192*8b26181fSAndroid Build Coastguard Worker */
193*8b26181fSAndroid Build Coastguard Worker dir = opendir("/dev");
194*8b26181fSAndroid Build Coastguard Worker if (dir != NULL) {
195*8b26181fSAndroid Build Coastguard Worker while ((ret == 0) && ((data = readdir(dir)) != 0)) {
196*8b26181fSAndroid Build Coastguard Worker name = data->d_name;
197*8b26181fSAndroid Build Coastguard Worker
198*8b26181fSAndroid Build Coastguard Worker /*
199*8b26181fSAndroid Build Coastguard Worker * Is this a usbmon device?
200*8b26181fSAndroid Build Coastguard Worker */
201*8b26181fSAndroid Build Coastguard Worker if (strncmp(name, USBMON_DEV_PREFIX,
202*8b26181fSAndroid Build Coastguard Worker USBMON_DEV_PREFIX_LEN) != 0)
203*8b26181fSAndroid Build Coastguard Worker continue; /* no */
204*8b26181fSAndroid Build Coastguard Worker
205*8b26181fSAndroid Build Coastguard Worker /*
206*8b26181fSAndroid Build Coastguard Worker * What's the device number?
207*8b26181fSAndroid Build Coastguard Worker */
208*8b26181fSAndroid Build Coastguard Worker if (sscanf(&name[USBMON_DEV_PREFIX_LEN], "%d", &n) == 0)
209*8b26181fSAndroid Build Coastguard Worker continue; /* failed */
210*8b26181fSAndroid Build Coastguard Worker
211*8b26181fSAndroid Build Coastguard Worker ret = usb_dev_add(devlistp, n, err_str);
212*8b26181fSAndroid Build Coastguard Worker }
213*8b26181fSAndroid Build Coastguard Worker
214*8b26181fSAndroid Build Coastguard Worker closedir(dir);
215*8b26181fSAndroid Build Coastguard Worker }
216*8b26181fSAndroid Build Coastguard Worker return 0;
217*8b26181fSAndroid Build Coastguard Worker }
218*8b26181fSAndroid Build Coastguard Worker
219*8b26181fSAndroid Build Coastguard Worker /*
220*8b26181fSAndroid Build Coastguard Worker * Matches what's in mon_bin.c in the Linux kernel.
221*8b26181fSAndroid Build Coastguard Worker */
222*8b26181fSAndroid Build Coastguard Worker #define MIN_RING_SIZE (8*1024)
223*8b26181fSAndroid Build Coastguard Worker #define MAX_RING_SIZE (1200*1024)
224*8b26181fSAndroid Build Coastguard Worker
225*8b26181fSAndroid Build Coastguard Worker static int
usb_set_ring_size(pcap_t * handle,int header_size)226*8b26181fSAndroid Build Coastguard Worker usb_set_ring_size(pcap_t* handle, int header_size)
227*8b26181fSAndroid Build Coastguard Worker {
228*8b26181fSAndroid Build Coastguard Worker /*
229*8b26181fSAndroid Build Coastguard Worker * A packet from binary usbmon has:
230*8b26181fSAndroid Build Coastguard Worker *
231*8b26181fSAndroid Build Coastguard Worker * 1) a fixed-length header, of size header_size;
232*8b26181fSAndroid Build Coastguard Worker * 2) descriptors, for isochronous transfers;
233*8b26181fSAndroid Build Coastguard Worker * 3) the payload.
234*8b26181fSAndroid Build Coastguard Worker *
235*8b26181fSAndroid Build Coastguard Worker * The kernel buffer has a size, defaulting to 300KB, with a
236*8b26181fSAndroid Build Coastguard Worker * minimum of 8KB and a maximum of 1200KB. The size is set with
237*8b26181fSAndroid Build Coastguard Worker * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
238*8b26181fSAndroid Build Coastguard Worker * to a page size.
239*8b26181fSAndroid Build Coastguard Worker *
240*8b26181fSAndroid Build Coastguard Worker * No more than {buffer size}/5 bytes worth of payload is saved.
241*8b26181fSAndroid Build Coastguard Worker * Therefore, if we subtract the fixed-length size from the
242*8b26181fSAndroid Build Coastguard Worker * snapshot length, we have the biggest payload we want (we
243*8b26181fSAndroid Build Coastguard Worker * don't worry about the descriptors - if we have descriptors,
244*8b26181fSAndroid Build Coastguard Worker * we'll just discard the last bit of the payload to get it
245*8b26181fSAndroid Build Coastguard Worker * to fit). We multiply that result by 5 and set the buffer
246*8b26181fSAndroid Build Coastguard Worker * size to that value.
247*8b26181fSAndroid Build Coastguard Worker */
248*8b26181fSAndroid Build Coastguard Worker int ring_size;
249*8b26181fSAndroid Build Coastguard Worker
250*8b26181fSAndroid Build Coastguard Worker if (handle->snapshot < header_size)
251*8b26181fSAndroid Build Coastguard Worker handle->snapshot = header_size;
252*8b26181fSAndroid Build Coastguard Worker /* The maximum snapshot size is small enough that this won't overflow */
253*8b26181fSAndroid Build Coastguard Worker ring_size = (handle->snapshot - header_size) * 5;
254*8b26181fSAndroid Build Coastguard Worker
255*8b26181fSAndroid Build Coastguard Worker /*
256*8b26181fSAndroid Build Coastguard Worker * Will this get an error?
257*8b26181fSAndroid Build Coastguard Worker * (There's no wqy to query the minimum or maximum, so we just
258*8b26181fSAndroid Build Coastguard Worker * copy the value from the kernel source. We don't round it
259*8b26181fSAndroid Build Coastguard Worker * up to a multiple of the page size.)
260*8b26181fSAndroid Build Coastguard Worker */
261*8b26181fSAndroid Build Coastguard Worker if (ring_size > MAX_RING_SIZE) {
262*8b26181fSAndroid Build Coastguard Worker /*
263*8b26181fSAndroid Build Coastguard Worker * Yes. Lower the ring size to the maximum, and set the
264*8b26181fSAndroid Build Coastguard Worker * snapshot length to the value that would give us a
265*8b26181fSAndroid Build Coastguard Worker * maximum-size ring.
266*8b26181fSAndroid Build Coastguard Worker */
267*8b26181fSAndroid Build Coastguard Worker ring_size = MAX_RING_SIZE;
268*8b26181fSAndroid Build Coastguard Worker handle->snapshot = header_size + (MAX_RING_SIZE/5);
269*8b26181fSAndroid Build Coastguard Worker } else if (ring_size < MIN_RING_SIZE) {
270*8b26181fSAndroid Build Coastguard Worker /*
271*8b26181fSAndroid Build Coastguard Worker * Yes. Raise the ring size to the minimum, but leave
272*8b26181fSAndroid Build Coastguard Worker * the snapshot length unchanged, so we show the
273*8b26181fSAndroid Build Coastguard Worker * callback no more data than specified by the
274*8b26181fSAndroid Build Coastguard Worker * snapshot length.
275*8b26181fSAndroid Build Coastguard Worker */
276*8b26181fSAndroid Build Coastguard Worker ring_size = MIN_RING_SIZE;
277*8b26181fSAndroid Build Coastguard Worker }
278*8b26181fSAndroid Build Coastguard Worker
279*8b26181fSAndroid Build Coastguard Worker if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
280*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
281*8b26181fSAndroid Build Coastguard Worker errno, "Can't set ring size from fd %d", handle->fd);
282*8b26181fSAndroid Build Coastguard Worker return -1;
283*8b26181fSAndroid Build Coastguard Worker }
284*8b26181fSAndroid Build Coastguard Worker return ring_size;
285*8b26181fSAndroid Build Coastguard Worker }
286*8b26181fSAndroid Build Coastguard Worker
287*8b26181fSAndroid Build Coastguard Worker static
usb_mmap(pcap_t * handle)288*8b26181fSAndroid Build Coastguard Worker int usb_mmap(pcap_t* handle)
289*8b26181fSAndroid Build Coastguard Worker {
290*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
291*8b26181fSAndroid Build Coastguard Worker int len;
292*8b26181fSAndroid Build Coastguard Worker
293*8b26181fSAndroid Build Coastguard Worker /*
294*8b26181fSAndroid Build Coastguard Worker * Attempt to set the ring size as appropriate for the snapshot
295*8b26181fSAndroid Build Coastguard Worker * length, reducing the snapshot length if that'd make the ring
296*8b26181fSAndroid Build Coastguard Worker * bigger than the kernel supports.
297*8b26181fSAndroid Build Coastguard Worker */
298*8b26181fSAndroid Build Coastguard Worker len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
299*8b26181fSAndroid Build Coastguard Worker if (len == -1) {
300*8b26181fSAndroid Build Coastguard Worker /* Failed. Fall back on non-memory-mapped access. */
301*8b26181fSAndroid Build Coastguard Worker return 0;
302*8b26181fSAndroid Build Coastguard Worker }
303*8b26181fSAndroid Build Coastguard Worker
304*8b26181fSAndroid Build Coastguard Worker handlep->mmapbuflen = len;
305*8b26181fSAndroid Build Coastguard Worker handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
306*8b26181fSAndroid Build Coastguard Worker MAP_SHARED, handle->fd, 0);
307*8b26181fSAndroid Build Coastguard Worker if (handlep->mmapbuf == MAP_FAILED) {
308*8b26181fSAndroid Build Coastguard Worker /*
309*8b26181fSAndroid Build Coastguard Worker * Failed. We don't treat that as a fatal error, we
310*8b26181fSAndroid Build Coastguard Worker * just try to fall back on non-memory-mapped access.
311*8b26181fSAndroid Build Coastguard Worker */
312*8b26181fSAndroid Build Coastguard Worker return 0;
313*8b26181fSAndroid Build Coastguard Worker }
314*8b26181fSAndroid Build Coastguard Worker return 1;
315*8b26181fSAndroid Build Coastguard Worker }
316*8b26181fSAndroid Build Coastguard Worker
317*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_LINUX_USBDEVICE_FS_H
318*8b26181fSAndroid Build Coastguard Worker
319*8b26181fSAndroid Build Coastguard Worker #define CTRL_TIMEOUT (5*1000) /* milliseconds */
320*8b26181fSAndroid Build Coastguard Worker
321*8b26181fSAndroid Build Coastguard Worker #define USB_DIR_IN 0x80
322*8b26181fSAndroid Build Coastguard Worker #define USB_TYPE_STANDARD 0x00
323*8b26181fSAndroid Build Coastguard Worker #define USB_RECIP_DEVICE 0x00
324*8b26181fSAndroid Build Coastguard Worker
325*8b26181fSAndroid Build Coastguard Worker #define USB_REQ_GET_DESCRIPTOR 6
326*8b26181fSAndroid Build Coastguard Worker
327*8b26181fSAndroid Build Coastguard Worker #define USB_DT_DEVICE 1
328*8b26181fSAndroid Build Coastguard Worker #define USB_DT_CONFIG 2
329*8b26181fSAndroid Build Coastguard Worker
330*8b26181fSAndroid Build Coastguard Worker #define USB_DEVICE_DESCRIPTOR_SIZE 18
331*8b26181fSAndroid Build Coastguard Worker #define USB_CONFIG_DESCRIPTOR_SIZE 9
332*8b26181fSAndroid Build Coastguard Worker
333*8b26181fSAndroid Build Coastguard Worker /* probe the descriptors of the devices attached to the bus */
334*8b26181fSAndroid Build Coastguard Worker /* the descriptors will end up in the captured packet stream */
335*8b26181fSAndroid Build Coastguard Worker /* and be decoded by external apps like wireshark */
336*8b26181fSAndroid Build Coastguard Worker /* without these identifying probes packet data can't be fully decoded */
337*8b26181fSAndroid Build Coastguard Worker static void
probe_devices(int bus)338*8b26181fSAndroid Build Coastguard Worker probe_devices(int bus)
339*8b26181fSAndroid Build Coastguard Worker {
340*8b26181fSAndroid Build Coastguard Worker struct usbdevfs_ctrltransfer ctrl;
341*8b26181fSAndroid Build Coastguard Worker struct dirent* data;
342*8b26181fSAndroid Build Coastguard Worker int ret = 0;
343*8b26181fSAndroid Build Coastguard Worker char busdevpath[sizeof("/dev/bus/usb/000/") + NAME_MAX];
344*8b26181fSAndroid Build Coastguard Worker DIR* dir;
345*8b26181fSAndroid Build Coastguard Worker uint8_t descriptor[USB_DEVICE_DESCRIPTOR_SIZE];
346*8b26181fSAndroid Build Coastguard Worker uint8_t configdesc[USB_CONFIG_DESCRIPTOR_SIZE];
347*8b26181fSAndroid Build Coastguard Worker
348*8b26181fSAndroid Build Coastguard Worker /* scan usb bus directories for device nodes */
349*8b26181fSAndroid Build Coastguard Worker snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d", bus);
350*8b26181fSAndroid Build Coastguard Worker dir = opendir(busdevpath);
351*8b26181fSAndroid Build Coastguard Worker if (!dir)
352*8b26181fSAndroid Build Coastguard Worker return;
353*8b26181fSAndroid Build Coastguard Worker
354*8b26181fSAndroid Build Coastguard Worker while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
355*8b26181fSAndroid Build Coastguard Worker int fd;
356*8b26181fSAndroid Build Coastguard Worker char* name = data->d_name;
357*8b26181fSAndroid Build Coastguard Worker
358*8b26181fSAndroid Build Coastguard Worker if (name[0] == '.')
359*8b26181fSAndroid Build Coastguard Worker continue;
360*8b26181fSAndroid Build Coastguard Worker
361*8b26181fSAndroid Build Coastguard Worker snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d/%s", bus, data->d_name);
362*8b26181fSAndroid Build Coastguard Worker
363*8b26181fSAndroid Build Coastguard Worker fd = open(busdevpath, O_RDWR);
364*8b26181fSAndroid Build Coastguard Worker if (fd == -1)
365*8b26181fSAndroid Build Coastguard Worker continue;
366*8b26181fSAndroid Build Coastguard Worker
367*8b26181fSAndroid Build Coastguard Worker /*
368*8b26181fSAndroid Build Coastguard Worker * Sigh. Different kernels have different member names
369*8b26181fSAndroid Build Coastguard Worker * for this structure.
370*8b26181fSAndroid Build Coastguard Worker */
371*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
372*8b26181fSAndroid Build Coastguard Worker ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
373*8b26181fSAndroid Build Coastguard Worker ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
374*8b26181fSAndroid Build Coastguard Worker ctrl.wValue = USB_DT_DEVICE << 8;
375*8b26181fSAndroid Build Coastguard Worker ctrl.wIndex = 0;
376*8b26181fSAndroid Build Coastguard Worker ctrl.wLength = sizeof(descriptor);
377*8b26181fSAndroid Build Coastguard Worker #else
378*8b26181fSAndroid Build Coastguard Worker ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
379*8b26181fSAndroid Build Coastguard Worker ctrl.request = USB_REQ_GET_DESCRIPTOR;
380*8b26181fSAndroid Build Coastguard Worker ctrl.value = USB_DT_DEVICE << 8;
381*8b26181fSAndroid Build Coastguard Worker ctrl.index = 0;
382*8b26181fSAndroid Build Coastguard Worker ctrl.length = sizeof(descriptor);
383*8b26181fSAndroid Build Coastguard Worker #endif
384*8b26181fSAndroid Build Coastguard Worker ctrl.data = descriptor;
385*8b26181fSAndroid Build Coastguard Worker ctrl.timeout = CTRL_TIMEOUT;
386*8b26181fSAndroid Build Coastguard Worker
387*8b26181fSAndroid Build Coastguard Worker ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
388*8b26181fSAndroid Build Coastguard Worker
389*8b26181fSAndroid Build Coastguard Worker /* Request CONFIGURATION descriptor alone to know wTotalLength */
390*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
391*8b26181fSAndroid Build Coastguard Worker ctrl.wValue = USB_DT_CONFIG << 8;
392*8b26181fSAndroid Build Coastguard Worker ctrl.wLength = sizeof(configdesc);
393*8b26181fSAndroid Build Coastguard Worker #else
394*8b26181fSAndroid Build Coastguard Worker ctrl.value = USB_DT_CONFIG << 8;
395*8b26181fSAndroid Build Coastguard Worker ctrl.length = sizeof(configdesc);
396*8b26181fSAndroid Build Coastguard Worker #endif
397*8b26181fSAndroid Build Coastguard Worker ctrl.data = configdesc;
398*8b26181fSAndroid Build Coastguard Worker ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
399*8b26181fSAndroid Build Coastguard Worker if (ret >= 0) {
400*8b26181fSAndroid Build Coastguard Worker uint16_t wtotallength;
401*8b26181fSAndroid Build Coastguard Worker wtotallength = EXTRACT_LE_U_2(&configdesc[2]);
402*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
403*8b26181fSAndroid Build Coastguard Worker ctrl.wLength = wtotallength;
404*8b26181fSAndroid Build Coastguard Worker #else
405*8b26181fSAndroid Build Coastguard Worker ctrl.length = wtotallength;
406*8b26181fSAndroid Build Coastguard Worker #endif
407*8b26181fSAndroid Build Coastguard Worker ctrl.data = malloc(wtotallength);
408*8b26181fSAndroid Build Coastguard Worker if (ctrl.data) {
409*8b26181fSAndroid Build Coastguard Worker ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
410*8b26181fSAndroid Build Coastguard Worker free(ctrl.data);
411*8b26181fSAndroid Build Coastguard Worker }
412*8b26181fSAndroid Build Coastguard Worker }
413*8b26181fSAndroid Build Coastguard Worker close(fd);
414*8b26181fSAndroid Build Coastguard Worker }
415*8b26181fSAndroid Build Coastguard Worker closedir(dir);
416*8b26181fSAndroid Build Coastguard Worker }
417*8b26181fSAndroid Build Coastguard Worker #endif /* HAVE_LINUX_USBDEVICE_FS_H */
418*8b26181fSAndroid Build Coastguard Worker
419*8b26181fSAndroid Build Coastguard Worker pcap_t *
usb_create(const char * device,char * ebuf,int * is_ours)420*8b26181fSAndroid Build Coastguard Worker usb_create(const char *device, char *ebuf, int *is_ours)
421*8b26181fSAndroid Build Coastguard Worker {
422*8b26181fSAndroid Build Coastguard Worker const char *cp;
423*8b26181fSAndroid Build Coastguard Worker char *cpend;
424*8b26181fSAndroid Build Coastguard Worker long devnum;
425*8b26181fSAndroid Build Coastguard Worker pcap_t *p;
426*8b26181fSAndroid Build Coastguard Worker
427*8b26181fSAndroid Build Coastguard Worker /* Does this look like a USB monitoring device? */
428*8b26181fSAndroid Build Coastguard Worker cp = strrchr(device, '/');
429*8b26181fSAndroid Build Coastguard Worker if (cp == NULL)
430*8b26181fSAndroid Build Coastguard Worker cp = device;
431*8b26181fSAndroid Build Coastguard Worker /* Does it begin with USB_IFACE? */
432*8b26181fSAndroid Build Coastguard Worker if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
433*8b26181fSAndroid Build Coastguard Worker /* Nope, doesn't begin with USB_IFACE */
434*8b26181fSAndroid Build Coastguard Worker *is_ours = 0;
435*8b26181fSAndroid Build Coastguard Worker return NULL;
436*8b26181fSAndroid Build Coastguard Worker }
437*8b26181fSAndroid Build Coastguard Worker /* Yes - is USB_IFACE followed by a number? */
438*8b26181fSAndroid Build Coastguard Worker cp += sizeof USB_IFACE - 1;
439*8b26181fSAndroid Build Coastguard Worker devnum = strtol(cp, &cpend, 10);
440*8b26181fSAndroid Build Coastguard Worker if (cpend == cp || *cpend != '\0') {
441*8b26181fSAndroid Build Coastguard Worker /* Not followed by a number. */
442*8b26181fSAndroid Build Coastguard Worker *is_ours = 0;
443*8b26181fSAndroid Build Coastguard Worker return NULL;
444*8b26181fSAndroid Build Coastguard Worker }
445*8b26181fSAndroid Build Coastguard Worker if (devnum < 0) {
446*8b26181fSAndroid Build Coastguard Worker /* Followed by a non-valid number. */
447*8b26181fSAndroid Build Coastguard Worker *is_ours = 0;
448*8b26181fSAndroid Build Coastguard Worker return NULL;
449*8b26181fSAndroid Build Coastguard Worker }
450*8b26181fSAndroid Build Coastguard Worker
451*8b26181fSAndroid Build Coastguard Worker /* OK, it's probably ours. */
452*8b26181fSAndroid Build Coastguard Worker *is_ours = 1;
453*8b26181fSAndroid Build Coastguard Worker
454*8b26181fSAndroid Build Coastguard Worker p = PCAP_CREATE_COMMON(ebuf, struct pcap_usb_linux);
455*8b26181fSAndroid Build Coastguard Worker if (p == NULL)
456*8b26181fSAndroid Build Coastguard Worker return (NULL);
457*8b26181fSAndroid Build Coastguard Worker
458*8b26181fSAndroid Build Coastguard Worker p->activate_op = usb_activate;
459*8b26181fSAndroid Build Coastguard Worker return (p);
460*8b26181fSAndroid Build Coastguard Worker }
461*8b26181fSAndroid Build Coastguard Worker
462*8b26181fSAndroid Build Coastguard Worker static int
usb_activate(pcap_t * handle)463*8b26181fSAndroid Build Coastguard Worker usb_activate(pcap_t* handle)
464*8b26181fSAndroid Build Coastguard Worker {
465*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
466*8b26181fSAndroid Build Coastguard Worker char full_path[USB_LINE_LEN];
467*8b26181fSAndroid Build Coastguard Worker
468*8b26181fSAndroid Build Coastguard Worker /*
469*8b26181fSAndroid Build Coastguard Worker * Turn a negative snapshot value (invalid), a snapshot value of
470*8b26181fSAndroid Build Coastguard Worker * 0 (unspecified), or a value bigger than the normal maximum
471*8b26181fSAndroid Build Coastguard Worker * value, into the maximum allowed value.
472*8b26181fSAndroid Build Coastguard Worker *
473*8b26181fSAndroid Build Coastguard Worker * If some application really *needs* a bigger snapshot
474*8b26181fSAndroid Build Coastguard Worker * length, we should just increase MAXIMUM_SNAPLEN.
475*8b26181fSAndroid Build Coastguard Worker */
476*8b26181fSAndroid Build Coastguard Worker if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
477*8b26181fSAndroid Build Coastguard Worker handle->snapshot = MAXIMUM_SNAPLEN;
478*8b26181fSAndroid Build Coastguard Worker
479*8b26181fSAndroid Build Coastguard Worker /* Initialize some components of the pcap structure. */
480*8b26181fSAndroid Build Coastguard Worker handle->bufsize = handle->snapshot;
481*8b26181fSAndroid Build Coastguard Worker handle->offset = 0;
482*8b26181fSAndroid Build Coastguard Worker handle->linktype = DLT_USB_LINUX;
483*8b26181fSAndroid Build Coastguard Worker
484*8b26181fSAndroid Build Coastguard Worker handle->inject_op = usb_inject_linux;
485*8b26181fSAndroid Build Coastguard Worker handle->setfilter_op = install_bpf_program; /* no kernel filtering */
486*8b26181fSAndroid Build Coastguard Worker handle->setdirection_op = usb_setdirection_linux;
487*8b26181fSAndroid Build Coastguard Worker handle->set_datalink_op = NULL; /* can't change data link type */
488*8b26181fSAndroid Build Coastguard Worker handle->getnonblock_op = pcap_getnonblock_fd;
489*8b26181fSAndroid Build Coastguard Worker handle->setnonblock_op = pcap_setnonblock_fd;
490*8b26181fSAndroid Build Coastguard Worker
491*8b26181fSAndroid Build Coastguard Worker /*get usb bus index from device name */
492*8b26181fSAndroid Build Coastguard Worker if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
493*8b26181fSAndroid Build Coastguard Worker {
494*8b26181fSAndroid Build Coastguard Worker snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
495*8b26181fSAndroid Build Coastguard Worker "Can't get USB bus index from %s", handle->opt.device);
496*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR;
497*8b26181fSAndroid Build Coastguard Worker }
498*8b26181fSAndroid Build Coastguard Worker
499*8b26181fSAndroid Build Coastguard Worker /*
500*8b26181fSAndroid Build Coastguard Worker * We require 2.6.27 or later kernels, so we have binary-mode support.
501*8b26181fSAndroid Build Coastguard Worker * Try to open the binary interface.
502*8b26181fSAndroid Build Coastguard Worker */
503*8b26181fSAndroid Build Coastguard Worker snprintf(full_path, USB_LINE_LEN, "/dev/"USBMON_DEV_PREFIX"%d",
504*8b26181fSAndroid Build Coastguard Worker handlep->bus_index);
505*8b26181fSAndroid Build Coastguard Worker handle->fd = open(full_path, O_RDONLY, 0);
506*8b26181fSAndroid Build Coastguard Worker if (handle->fd < 0)
507*8b26181fSAndroid Build Coastguard Worker {
508*8b26181fSAndroid Build Coastguard Worker /*
509*8b26181fSAndroid Build Coastguard Worker * The attempt failed; why?
510*8b26181fSAndroid Build Coastguard Worker */
511*8b26181fSAndroid Build Coastguard Worker switch (errno) {
512*8b26181fSAndroid Build Coastguard Worker
513*8b26181fSAndroid Build Coastguard Worker case ENOENT:
514*8b26181fSAndroid Build Coastguard Worker /*
515*8b26181fSAndroid Build Coastguard Worker * The device doesn't exist.
516*8b26181fSAndroid Build Coastguard Worker * That could either mean that there's
517*8b26181fSAndroid Build Coastguard Worker * no support for monitoring USB buses
518*8b26181fSAndroid Build Coastguard Worker * (which probably means "the usbmon
519*8b26181fSAndroid Build Coastguard Worker * module isn't loaded") or that there
520*8b26181fSAndroid Build Coastguard Worker * is but that *particular* device
521*8b26181fSAndroid Build Coastguard Worker * doesn't exist (no "scan all buses"
522*8b26181fSAndroid Build Coastguard Worker * device if the bus index is 0, no
523*8b26181fSAndroid Build Coastguard Worker * such bus if the bus index isn't 0).
524*8b26181fSAndroid Build Coastguard Worker *
525*8b26181fSAndroid Build Coastguard Worker * For now, don't provide an error message;
526*8b26181fSAndroid Build Coastguard Worker * if we can determine what the particular
527*8b26181fSAndroid Build Coastguard Worker * problem is, we should report that.
528*8b26181fSAndroid Build Coastguard Worker */
529*8b26181fSAndroid Build Coastguard Worker handle->errbuf[0] = '\0';
530*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR_NO_SUCH_DEVICE;
531*8b26181fSAndroid Build Coastguard Worker
532*8b26181fSAndroid Build Coastguard Worker case EACCES:
533*8b26181fSAndroid Build Coastguard Worker /*
534*8b26181fSAndroid Build Coastguard Worker * We didn't have permission to open it.
535*8b26181fSAndroid Build Coastguard Worker */
536*8b26181fSAndroid Build Coastguard Worker DIAG_OFF_FORMAT_TRUNCATION
537*8b26181fSAndroid Build Coastguard Worker snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
538*8b26181fSAndroid Build Coastguard Worker "Attempt to open %s failed with EACCES - root privileges may be required",
539*8b26181fSAndroid Build Coastguard Worker full_path);
540*8b26181fSAndroid Build Coastguard Worker DIAG_ON_FORMAT_TRUNCATION
541*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR_PERM_DENIED;
542*8b26181fSAndroid Build Coastguard Worker
543*8b26181fSAndroid Build Coastguard Worker default:
544*8b26181fSAndroid Build Coastguard Worker /*
545*8b26181fSAndroid Build Coastguard Worker * Something went wrong.
546*8b26181fSAndroid Build Coastguard Worker */
547*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf,
548*8b26181fSAndroid Build Coastguard Worker PCAP_ERRBUF_SIZE, errno,
549*8b26181fSAndroid Build Coastguard Worker "Can't open USB bus file %s", full_path);
550*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR;
551*8b26181fSAndroid Build Coastguard Worker }
552*8b26181fSAndroid Build Coastguard Worker }
553*8b26181fSAndroid Build Coastguard Worker
554*8b26181fSAndroid Build Coastguard Worker if (handle->opt.rfmon)
555*8b26181fSAndroid Build Coastguard Worker {
556*8b26181fSAndroid Build Coastguard Worker /*
557*8b26181fSAndroid Build Coastguard Worker * Monitor mode doesn't apply to USB devices.
558*8b26181fSAndroid Build Coastguard Worker */
559*8b26181fSAndroid Build Coastguard Worker close(handle->fd);
560*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR_RFMON_NOTSUP;
561*8b26181fSAndroid Build Coastguard Worker }
562*8b26181fSAndroid Build Coastguard Worker
563*8b26181fSAndroid Build Coastguard Worker /* try to use fast mmap access */
564*8b26181fSAndroid Build Coastguard Worker if (usb_mmap(handle))
565*8b26181fSAndroid Build Coastguard Worker {
566*8b26181fSAndroid Build Coastguard Worker /* We succeeded. */
567*8b26181fSAndroid Build Coastguard Worker handle->linktype = DLT_USB_LINUX_MMAPPED;
568*8b26181fSAndroid Build Coastguard Worker handle->stats_op = usb_stats_linux_bin;
569*8b26181fSAndroid Build Coastguard Worker handle->read_op = usb_read_linux_mmap;
570*8b26181fSAndroid Build Coastguard Worker handle->cleanup_op = usb_cleanup_linux_mmap;
571*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_LINUX_USBDEVICE_FS_H
572*8b26181fSAndroid Build Coastguard Worker probe_devices(handlep->bus_index);
573*8b26181fSAndroid Build Coastguard Worker #endif
574*8b26181fSAndroid Build Coastguard Worker
575*8b26181fSAndroid Build Coastguard Worker /*
576*8b26181fSAndroid Build Coastguard Worker * "handle->fd" is a real file, so
577*8b26181fSAndroid Build Coastguard Worker * "select()" and "poll()" work on it.
578*8b26181fSAndroid Build Coastguard Worker */
579*8b26181fSAndroid Build Coastguard Worker handle->selectable_fd = handle->fd;
580*8b26181fSAndroid Build Coastguard Worker return 0;
581*8b26181fSAndroid Build Coastguard Worker }
582*8b26181fSAndroid Build Coastguard Worker
583*8b26181fSAndroid Build Coastguard Worker /*
584*8b26181fSAndroid Build Coastguard Worker * We failed; try plain binary interface access.
585*8b26181fSAndroid Build Coastguard Worker *
586*8b26181fSAndroid Build Coastguard Worker * Attempt to set the ring size as appropriate for
587*8b26181fSAndroid Build Coastguard Worker * the snapshot length, reducing the snapshot length
588*8b26181fSAndroid Build Coastguard Worker * if that'd make the ring bigger than the kernel
589*8b26181fSAndroid Build Coastguard Worker * supports.
590*8b26181fSAndroid Build Coastguard Worker */
591*8b26181fSAndroid Build Coastguard Worker if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
592*8b26181fSAndroid Build Coastguard Worker /* Failed. */
593*8b26181fSAndroid Build Coastguard Worker close(handle->fd);
594*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR;
595*8b26181fSAndroid Build Coastguard Worker }
596*8b26181fSAndroid Build Coastguard Worker handle->stats_op = usb_stats_linux_bin;
597*8b26181fSAndroid Build Coastguard Worker handle->read_op = usb_read_linux_bin;
598*8b26181fSAndroid Build Coastguard Worker #ifdef HAVE_LINUX_USBDEVICE_FS_H
599*8b26181fSAndroid Build Coastguard Worker probe_devices(handlep->bus_index);
600*8b26181fSAndroid Build Coastguard Worker #endif
601*8b26181fSAndroid Build Coastguard Worker
602*8b26181fSAndroid Build Coastguard Worker /*
603*8b26181fSAndroid Build Coastguard Worker * "handle->fd" is a real file, so "select()" and "poll()"
604*8b26181fSAndroid Build Coastguard Worker * work on it.
605*8b26181fSAndroid Build Coastguard Worker */
606*8b26181fSAndroid Build Coastguard Worker handle->selectable_fd = handle->fd;
607*8b26181fSAndroid Build Coastguard Worker
608*8b26181fSAndroid Build Coastguard Worker /* for plain binary access and text access we need to allocate the read
609*8b26181fSAndroid Build Coastguard Worker * buffer */
610*8b26181fSAndroid Build Coastguard Worker handle->buffer = malloc(handle->bufsize);
611*8b26181fSAndroid Build Coastguard Worker if (!handle->buffer) {
612*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
613*8b26181fSAndroid Build Coastguard Worker errno, "malloc");
614*8b26181fSAndroid Build Coastguard Worker close(handle->fd);
615*8b26181fSAndroid Build Coastguard Worker return PCAP_ERROR;
616*8b26181fSAndroid Build Coastguard Worker }
617*8b26181fSAndroid Build Coastguard Worker return 0;
618*8b26181fSAndroid Build Coastguard Worker }
619*8b26181fSAndroid Build Coastguard Worker
620*8b26181fSAndroid Build Coastguard Worker static int
usb_inject_linux(pcap_t * handle,const void * buf _U_,int size _U_)621*8b26181fSAndroid Build Coastguard Worker usb_inject_linux(pcap_t *handle, const void *buf _U_, int size _U_)
622*8b26181fSAndroid Build Coastguard Worker {
623*8b26181fSAndroid Build Coastguard Worker snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
624*8b26181fSAndroid Build Coastguard Worker "Packet injection is not supported on USB devices");
625*8b26181fSAndroid Build Coastguard Worker return (-1);
626*8b26181fSAndroid Build Coastguard Worker }
627*8b26181fSAndroid Build Coastguard Worker
628*8b26181fSAndroid Build Coastguard Worker static int
usb_setdirection_linux(pcap_t * p,pcap_direction_t d)629*8b26181fSAndroid Build Coastguard Worker usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
630*8b26181fSAndroid Build Coastguard Worker {
631*8b26181fSAndroid Build Coastguard Worker /*
632*8b26181fSAndroid Build Coastguard Worker * It's guaranteed, at this point, that d is a valid
633*8b26181fSAndroid Build Coastguard Worker * direction value.
634*8b26181fSAndroid Build Coastguard Worker */
635*8b26181fSAndroid Build Coastguard Worker p->direction = d;
636*8b26181fSAndroid Build Coastguard Worker return 0;
637*8b26181fSAndroid Build Coastguard Worker }
638*8b26181fSAndroid Build Coastguard Worker
639*8b26181fSAndroid Build Coastguard Worker static int
usb_stats_linux_bin(pcap_t * handle,struct pcap_stat * stats)640*8b26181fSAndroid Build Coastguard Worker usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
641*8b26181fSAndroid Build Coastguard Worker {
642*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
643*8b26181fSAndroid Build Coastguard Worker int ret;
644*8b26181fSAndroid Build Coastguard Worker struct mon_bin_stats st;
645*8b26181fSAndroid Build Coastguard Worker ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
646*8b26181fSAndroid Build Coastguard Worker if (ret < 0)
647*8b26181fSAndroid Build Coastguard Worker {
648*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
649*8b26181fSAndroid Build Coastguard Worker errno, "Can't read stats from fd %d", handle->fd);
650*8b26181fSAndroid Build Coastguard Worker return -1;
651*8b26181fSAndroid Build Coastguard Worker }
652*8b26181fSAndroid Build Coastguard Worker
653*8b26181fSAndroid Build Coastguard Worker stats->ps_recv = handlep->packets_read + st.queued;
654*8b26181fSAndroid Build Coastguard Worker stats->ps_drop = st.dropped;
655*8b26181fSAndroid Build Coastguard Worker stats->ps_ifdrop = 0;
656*8b26181fSAndroid Build Coastguard Worker return 0;
657*8b26181fSAndroid Build Coastguard Worker }
658*8b26181fSAndroid Build Coastguard Worker
659*8b26181fSAndroid Build Coastguard Worker /*
660*8b26181fSAndroid Build Coastguard Worker * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
661*8b26181fSAndroid Build Coastguard Worker * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
662*8b26181fSAndroid Build Coastguard Worker */
663*8b26181fSAndroid Build Coastguard Worker static int
usb_read_linux_bin(pcap_t * handle,int max_packets _U_,pcap_handler callback,u_char * user)664*8b26181fSAndroid Build Coastguard Worker usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
665*8b26181fSAndroid Build Coastguard Worker {
666*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
667*8b26181fSAndroid Build Coastguard Worker struct mon_bin_get info;
668*8b26181fSAndroid Build Coastguard Worker int ret;
669*8b26181fSAndroid Build Coastguard Worker struct pcap_pkthdr pkth;
670*8b26181fSAndroid Build Coastguard Worker u_int clen = handle->snapshot - sizeof(pcap_usb_header);
671*8b26181fSAndroid Build Coastguard Worker
672*8b26181fSAndroid Build Coastguard Worker /* the usb header is going to be part of 'packet' data*/
673*8b26181fSAndroid Build Coastguard Worker info.hdr = (pcap_usb_header*) handle->buffer;
674*8b26181fSAndroid Build Coastguard Worker info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
675*8b26181fSAndroid Build Coastguard Worker info.data_len = clen;
676*8b26181fSAndroid Build Coastguard Worker
677*8b26181fSAndroid Build Coastguard Worker /* ignore interrupt system call errors */
678*8b26181fSAndroid Build Coastguard Worker do {
679*8b26181fSAndroid Build Coastguard Worker ret = ioctl(handle->fd, MON_IOCX_GET, &info);
680*8b26181fSAndroid Build Coastguard Worker if (handle->break_loop)
681*8b26181fSAndroid Build Coastguard Worker {
682*8b26181fSAndroid Build Coastguard Worker handle->break_loop = 0;
683*8b26181fSAndroid Build Coastguard Worker return -2;
684*8b26181fSAndroid Build Coastguard Worker }
685*8b26181fSAndroid Build Coastguard Worker } while ((ret == -1) && (errno == EINTR));
686*8b26181fSAndroid Build Coastguard Worker if (ret < 0)
687*8b26181fSAndroid Build Coastguard Worker {
688*8b26181fSAndroid Build Coastguard Worker if (errno == EAGAIN)
689*8b26181fSAndroid Build Coastguard Worker return 0; /* no data there */
690*8b26181fSAndroid Build Coastguard Worker
691*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
692*8b26181fSAndroid Build Coastguard Worker errno, "Can't read from fd %d", handle->fd);
693*8b26181fSAndroid Build Coastguard Worker return -1;
694*8b26181fSAndroid Build Coastguard Worker }
695*8b26181fSAndroid Build Coastguard Worker
696*8b26181fSAndroid Build Coastguard Worker /*
697*8b26181fSAndroid Build Coastguard Worker * info.hdr->data_len is the number of bytes of isochronous
698*8b26181fSAndroid Build Coastguard Worker * descriptors (if any) plus the number of bytes of data
699*8b26181fSAndroid Build Coastguard Worker * provided. There are no isochronous descriptors here,
700*8b26181fSAndroid Build Coastguard Worker * because we're using the old 48-byte header.
701*8b26181fSAndroid Build Coastguard Worker *
702*8b26181fSAndroid Build Coastguard Worker * If info.hdr->data_flag is non-zero, there's no URB data;
703*8b26181fSAndroid Build Coastguard Worker * info.hdr->urb_len is the size of the buffer into which
704*8b26181fSAndroid Build Coastguard Worker * data is to be placed; it does not represent the amount
705*8b26181fSAndroid Build Coastguard Worker * of data transferred. If info.hdr->data_flag is zero,
706*8b26181fSAndroid Build Coastguard Worker * there is URB data, and info.hdr->urb_len is the number
707*8b26181fSAndroid Build Coastguard Worker * of bytes transmitted or received; it doesn't include
708*8b26181fSAndroid Build Coastguard Worker * isochronous descriptors.
709*8b26181fSAndroid Build Coastguard Worker *
710*8b26181fSAndroid Build Coastguard Worker * The kernel may give us more data than the snaplen; if it did,
711*8b26181fSAndroid Build Coastguard Worker * reduce the data length so that the total number of bytes we
712*8b26181fSAndroid Build Coastguard Worker * tell our client we have is not greater than the snaplen.
713*8b26181fSAndroid Build Coastguard Worker */
714*8b26181fSAndroid Build Coastguard Worker if (info.hdr->data_len < clen)
715*8b26181fSAndroid Build Coastguard Worker clen = info.hdr->data_len;
716*8b26181fSAndroid Build Coastguard Worker info.hdr->data_len = clen;
717*8b26181fSAndroid Build Coastguard Worker pkth.caplen = sizeof(pcap_usb_header) + clen;
718*8b26181fSAndroid Build Coastguard Worker if (info.hdr->data_flag) {
719*8b26181fSAndroid Build Coastguard Worker /*
720*8b26181fSAndroid Build Coastguard Worker * No data; just base the on-the-wire length on
721*8b26181fSAndroid Build Coastguard Worker * info.hdr->data_len (so that it's >= the captured
722*8b26181fSAndroid Build Coastguard Worker * length).
723*8b26181fSAndroid Build Coastguard Worker */
724*8b26181fSAndroid Build Coastguard Worker pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
725*8b26181fSAndroid Build Coastguard Worker } else {
726*8b26181fSAndroid Build Coastguard Worker /*
727*8b26181fSAndroid Build Coastguard Worker * We got data; base the on-the-wire length on
728*8b26181fSAndroid Build Coastguard Worker * info.hdr->urb_len, so that it includes data
729*8b26181fSAndroid Build Coastguard Worker * discarded by the USB monitor device due to
730*8b26181fSAndroid Build Coastguard Worker * its buffer being too small.
731*8b26181fSAndroid Build Coastguard Worker */
732*8b26181fSAndroid Build Coastguard Worker pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
733*8b26181fSAndroid Build Coastguard Worker }
734*8b26181fSAndroid Build Coastguard Worker pkth.ts.tv_sec = (time_t)info.hdr->ts_sec;
735*8b26181fSAndroid Build Coastguard Worker pkth.ts.tv_usec = info.hdr->ts_usec;
736*8b26181fSAndroid Build Coastguard Worker
737*8b26181fSAndroid Build Coastguard Worker if (handle->fcode.bf_insns == NULL ||
738*8b26181fSAndroid Build Coastguard Worker pcap_filter(handle->fcode.bf_insns, handle->buffer,
739*8b26181fSAndroid Build Coastguard Worker pkth.len, pkth.caplen)) {
740*8b26181fSAndroid Build Coastguard Worker handlep->packets_read++;
741*8b26181fSAndroid Build Coastguard Worker callback(user, &pkth, handle->buffer);
742*8b26181fSAndroid Build Coastguard Worker return 1;
743*8b26181fSAndroid Build Coastguard Worker }
744*8b26181fSAndroid Build Coastguard Worker
745*8b26181fSAndroid Build Coastguard Worker return 0; /* didn't pass filter */
746*8b26181fSAndroid Build Coastguard Worker }
747*8b26181fSAndroid Build Coastguard Worker
748*8b26181fSAndroid Build Coastguard Worker /*
749*8b26181fSAndroid Build Coastguard Worker * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
750*8b26181fSAndroid Build Coastguard Worker * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
751*8b26181fSAndroid Build Coastguard Worker */
752*8b26181fSAndroid Build Coastguard Worker #define VEC_SIZE 32
753*8b26181fSAndroid Build Coastguard Worker static int
usb_read_linux_mmap(pcap_t * handle,int max_packets,pcap_handler callback,u_char * user)754*8b26181fSAndroid Build Coastguard Worker usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
755*8b26181fSAndroid Build Coastguard Worker {
756*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
757*8b26181fSAndroid Build Coastguard Worker struct mon_bin_mfetch fetch;
758*8b26181fSAndroid Build Coastguard Worker int32_t vec[VEC_SIZE];
759*8b26181fSAndroid Build Coastguard Worker struct pcap_pkthdr pkth;
760*8b26181fSAndroid Build Coastguard Worker u_char *bp;
761*8b26181fSAndroid Build Coastguard Worker pcap_usb_header_mmapped* hdr;
762*8b26181fSAndroid Build Coastguard Worker int nflush = 0;
763*8b26181fSAndroid Build Coastguard Worker int packets = 0;
764*8b26181fSAndroid Build Coastguard Worker u_int clen, max_clen;
765*8b26181fSAndroid Build Coastguard Worker
766*8b26181fSAndroid Build Coastguard Worker max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
767*8b26181fSAndroid Build Coastguard Worker
768*8b26181fSAndroid Build Coastguard Worker for (;;) {
769*8b26181fSAndroid Build Coastguard Worker int i, ret;
770*8b26181fSAndroid Build Coastguard Worker int limit;
771*8b26181fSAndroid Build Coastguard Worker
772*8b26181fSAndroid Build Coastguard Worker if (PACKET_COUNT_IS_UNLIMITED(max_packets)) {
773*8b26181fSAndroid Build Coastguard Worker /*
774*8b26181fSAndroid Build Coastguard Worker * There's no limit on the number of packets
775*8b26181fSAndroid Build Coastguard Worker * to process, so try to fetch VEC_SIZE packets.
776*8b26181fSAndroid Build Coastguard Worker */
777*8b26181fSAndroid Build Coastguard Worker limit = VEC_SIZE;
778*8b26181fSAndroid Build Coastguard Worker } else {
779*8b26181fSAndroid Build Coastguard Worker /*
780*8b26181fSAndroid Build Coastguard Worker * Try to fetch as many packets as we have left
781*8b26181fSAndroid Build Coastguard Worker * to process, or VEC_SIZE packets, whichever
782*8b26181fSAndroid Build Coastguard Worker * is less.
783*8b26181fSAndroid Build Coastguard Worker *
784*8b26181fSAndroid Build Coastguard Worker * At this point, max_packets > 0 (otherwise,
785*8b26181fSAndroid Build Coastguard Worker * PACKET_COUNT_IS_UNLIMITED(max_packets)
786*8b26181fSAndroid Build Coastguard Worker * would be true) and max_packets > packets
787*8b26181fSAndroid Build Coastguard Worker * (packet starts out as 0, and the test
788*8b26181fSAndroid Build Coastguard Worker * at the bottom of the loop exits if
789*8b26181fSAndroid Build Coastguard Worker * max_packets <= packets), so limit is
790*8b26181fSAndroid Build Coastguard Worker * guaranteed to be > 0.
791*8b26181fSAndroid Build Coastguard Worker */
792*8b26181fSAndroid Build Coastguard Worker limit = max_packets - packets;
793*8b26181fSAndroid Build Coastguard Worker if (limit > VEC_SIZE)
794*8b26181fSAndroid Build Coastguard Worker limit = VEC_SIZE;
795*8b26181fSAndroid Build Coastguard Worker }
796*8b26181fSAndroid Build Coastguard Worker
797*8b26181fSAndroid Build Coastguard Worker /*
798*8b26181fSAndroid Build Coastguard Worker * Try to fetch as many events as possible, up to
799*8b26181fSAndroid Build Coastguard Worker * the limit, and flush the events we've processed
800*8b26181fSAndroid Build Coastguard Worker * earlier (nflush) - MON_IOCX_MFETCH does both
801*8b26181fSAndroid Build Coastguard Worker * (presumably to reduce the number of system
802*8b26181fSAndroid Build Coastguard Worker * calls in loops like this).
803*8b26181fSAndroid Build Coastguard Worker */
804*8b26181fSAndroid Build Coastguard Worker fetch.offvec = vec;
805*8b26181fSAndroid Build Coastguard Worker fetch.nfetch = limit;
806*8b26181fSAndroid Build Coastguard Worker fetch.nflush = nflush;
807*8b26181fSAndroid Build Coastguard Worker /* ignore interrupt system call errors */
808*8b26181fSAndroid Build Coastguard Worker do {
809*8b26181fSAndroid Build Coastguard Worker ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
810*8b26181fSAndroid Build Coastguard Worker if (handle->break_loop)
811*8b26181fSAndroid Build Coastguard Worker {
812*8b26181fSAndroid Build Coastguard Worker handle->break_loop = 0;
813*8b26181fSAndroid Build Coastguard Worker return -2;
814*8b26181fSAndroid Build Coastguard Worker }
815*8b26181fSAndroid Build Coastguard Worker } while ((ret == -1) && (errno == EINTR));
816*8b26181fSAndroid Build Coastguard Worker if (ret < 0)
817*8b26181fSAndroid Build Coastguard Worker {
818*8b26181fSAndroid Build Coastguard Worker if (errno == EAGAIN)
819*8b26181fSAndroid Build Coastguard Worker return 0; /* no data there */
820*8b26181fSAndroid Build Coastguard Worker
821*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf,
822*8b26181fSAndroid Build Coastguard Worker PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
823*8b26181fSAndroid Build Coastguard Worker handle->fd);
824*8b26181fSAndroid Build Coastguard Worker return -1;
825*8b26181fSAndroid Build Coastguard Worker }
826*8b26181fSAndroid Build Coastguard Worker
827*8b26181fSAndroid Build Coastguard Worker /* keep track of processed events, we will flush them later */
828*8b26181fSAndroid Build Coastguard Worker nflush = fetch.nfetch;
829*8b26181fSAndroid Build Coastguard Worker for (i=0; i<fetch.nfetch; ++i) {
830*8b26181fSAndroid Build Coastguard Worker /*
831*8b26181fSAndroid Build Coastguard Worker * XXX - we can't check break_loop here, as
832*8b26181fSAndroid Build Coastguard Worker * we read the indices of packets into a
833*8b26181fSAndroid Build Coastguard Worker * local variable, so if we're later called
834*8b26181fSAndroid Build Coastguard Worker * to fetch more packets, those packets will
835*8b26181fSAndroid Build Coastguard Worker * not be seen - and won't be flushed, either.
836*8b26181fSAndroid Build Coastguard Worker *
837*8b26181fSAndroid Build Coastguard Worker * Instead, we would have to keep the array
838*8b26181fSAndroid Build Coastguard Worker * of indices in our private data, along
839*8b26181fSAndroid Build Coastguard Worker * with the count of packets to flush - or
840*8b26181fSAndroid Build Coastguard Worker * would have to flush the already-processed
841*8b26181fSAndroid Build Coastguard Worker * packets if we break out of the loop here.
842*8b26181fSAndroid Build Coastguard Worker */
843*8b26181fSAndroid Build Coastguard Worker
844*8b26181fSAndroid Build Coastguard Worker /* Get a pointer to this packet's buffer */
845*8b26181fSAndroid Build Coastguard Worker bp = &handlep->mmapbuf[vec[i]];
846*8b26181fSAndroid Build Coastguard Worker
847*8b26181fSAndroid Build Coastguard Worker /* That begins with a metadata header */
848*8b26181fSAndroid Build Coastguard Worker hdr = (pcap_usb_header_mmapped*) bp;
849*8b26181fSAndroid Build Coastguard Worker
850*8b26181fSAndroid Build Coastguard Worker /* discard filler */
851*8b26181fSAndroid Build Coastguard Worker if (hdr->event_type == '@')
852*8b26181fSAndroid Build Coastguard Worker continue;
853*8b26181fSAndroid Build Coastguard Worker
854*8b26181fSAndroid Build Coastguard Worker /*
855*8b26181fSAndroid Build Coastguard Worker * hdr->data_len is the number of bytes of
856*8b26181fSAndroid Build Coastguard Worker * isochronous descriptors (if any) plus the
857*8b26181fSAndroid Build Coastguard Worker * number of bytes of data provided.
858*8b26181fSAndroid Build Coastguard Worker *
859*8b26181fSAndroid Build Coastguard Worker * If hdr->data_flag is non-zero, there's no
860*8b26181fSAndroid Build Coastguard Worker * URB data; hdr->urb_len is the size of the
861*8b26181fSAndroid Build Coastguard Worker * buffer into which data is to be placed; it does
862*8b26181fSAndroid Build Coastguard Worker * not represent the amount of data transferred.
863*8b26181fSAndroid Build Coastguard Worker * If hdr->data_flag is zero, there is URB data,
864*8b26181fSAndroid Build Coastguard Worker * and hdr->urb_len is the number of bytes
865*8b26181fSAndroid Build Coastguard Worker * transmitted or received; it doesn't include
866*8b26181fSAndroid Build Coastguard Worker * isochronous descriptors.
867*8b26181fSAndroid Build Coastguard Worker *
868*8b26181fSAndroid Build Coastguard Worker * The kernel may give us more data than the
869*8b26181fSAndroid Build Coastguard Worker * snaplen; if it did, reduce the data length
870*8b26181fSAndroid Build Coastguard Worker * so that the total number of bytes we
871*8b26181fSAndroid Build Coastguard Worker * tell our client we have is not greater than
872*8b26181fSAndroid Build Coastguard Worker * the snaplen.
873*8b26181fSAndroid Build Coastguard Worker */
874*8b26181fSAndroid Build Coastguard Worker clen = max_clen;
875*8b26181fSAndroid Build Coastguard Worker if (hdr->data_len < clen)
876*8b26181fSAndroid Build Coastguard Worker clen = hdr->data_len;
877*8b26181fSAndroid Build Coastguard Worker pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
878*8b26181fSAndroid Build Coastguard Worker if (hdr->data_flag) {
879*8b26181fSAndroid Build Coastguard Worker /*
880*8b26181fSAndroid Build Coastguard Worker * No data; just base the on-the-wire length
881*8b26181fSAndroid Build Coastguard Worker * on hdr->data_len (so that it's >= the
882*8b26181fSAndroid Build Coastguard Worker * captured length).
883*8b26181fSAndroid Build Coastguard Worker */
884*8b26181fSAndroid Build Coastguard Worker pkth.len = sizeof(pcap_usb_header_mmapped) +
885*8b26181fSAndroid Build Coastguard Worker hdr->data_len;
886*8b26181fSAndroid Build Coastguard Worker } else {
887*8b26181fSAndroid Build Coastguard Worker /*
888*8b26181fSAndroid Build Coastguard Worker * We got data; base the on-the-wire length
889*8b26181fSAndroid Build Coastguard Worker * on hdr->urb_len, so that it includes
890*8b26181fSAndroid Build Coastguard Worker * data discarded by the USB monitor device
891*8b26181fSAndroid Build Coastguard Worker * due to its buffer being too small.
892*8b26181fSAndroid Build Coastguard Worker */
893*8b26181fSAndroid Build Coastguard Worker pkth.len = sizeof(pcap_usb_header_mmapped) +
894*8b26181fSAndroid Build Coastguard Worker (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
895*8b26181fSAndroid Build Coastguard Worker
896*8b26181fSAndroid Build Coastguard Worker /*
897*8b26181fSAndroid Build Coastguard Worker * Now clean it up if it's a completion
898*8b26181fSAndroid Build Coastguard Worker * event for an incoming isochronous
899*8b26181fSAndroid Build Coastguard Worker * transfer.
900*8b26181fSAndroid Build Coastguard Worker */
901*8b26181fSAndroid Build Coastguard Worker fix_linux_usb_mmapped_length(&pkth, bp);
902*8b26181fSAndroid Build Coastguard Worker }
903*8b26181fSAndroid Build Coastguard Worker pkth.ts.tv_sec = (time_t)hdr->ts_sec;
904*8b26181fSAndroid Build Coastguard Worker pkth.ts.tv_usec = hdr->ts_usec;
905*8b26181fSAndroid Build Coastguard Worker
906*8b26181fSAndroid Build Coastguard Worker if (handle->fcode.bf_insns == NULL ||
907*8b26181fSAndroid Build Coastguard Worker pcap_filter(handle->fcode.bf_insns, (u_char*) hdr,
908*8b26181fSAndroid Build Coastguard Worker pkth.len, pkth.caplen)) {
909*8b26181fSAndroid Build Coastguard Worker handlep->packets_read++;
910*8b26181fSAndroid Build Coastguard Worker callback(user, &pkth, (u_char*) hdr);
911*8b26181fSAndroid Build Coastguard Worker packets++;
912*8b26181fSAndroid Build Coastguard Worker }
913*8b26181fSAndroid Build Coastguard Worker }
914*8b26181fSAndroid Build Coastguard Worker
915*8b26181fSAndroid Build Coastguard Worker /*
916*8b26181fSAndroid Build Coastguard Worker * If max_packets specifiesg "unlimited", we stop after
917*8b26181fSAndroid Build Coastguard Worker * the first chunk.
918*8b26181fSAndroid Build Coastguard Worker */
919*8b26181fSAndroid Build Coastguard Worker if (PACKET_COUNT_IS_UNLIMITED(max_packets) ||
920*8b26181fSAndroid Build Coastguard Worker (packets >= max_packets))
921*8b26181fSAndroid Build Coastguard Worker break;
922*8b26181fSAndroid Build Coastguard Worker }
923*8b26181fSAndroid Build Coastguard Worker
924*8b26181fSAndroid Build Coastguard Worker /* flush pending events*/
925*8b26181fSAndroid Build Coastguard Worker if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
926*8b26181fSAndroid Build Coastguard Worker pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
927*8b26181fSAndroid Build Coastguard Worker errno, "Can't mflush fd %d", handle->fd);
928*8b26181fSAndroid Build Coastguard Worker return -1;
929*8b26181fSAndroid Build Coastguard Worker }
930*8b26181fSAndroid Build Coastguard Worker return packets;
931*8b26181fSAndroid Build Coastguard Worker }
932*8b26181fSAndroid Build Coastguard Worker
933*8b26181fSAndroid Build Coastguard Worker static void
usb_cleanup_linux_mmap(pcap_t * handle)934*8b26181fSAndroid Build Coastguard Worker usb_cleanup_linux_mmap(pcap_t* handle)
935*8b26181fSAndroid Build Coastguard Worker {
936*8b26181fSAndroid Build Coastguard Worker struct pcap_usb_linux *handlep = handle->priv;
937*8b26181fSAndroid Build Coastguard Worker
938*8b26181fSAndroid Build Coastguard Worker /* if we have a memory-mapped buffer, unmap it */
939*8b26181fSAndroid Build Coastguard Worker if (handlep->mmapbuf != NULL) {
940*8b26181fSAndroid Build Coastguard Worker munmap(handlep->mmapbuf, handlep->mmapbuflen);
941*8b26181fSAndroid Build Coastguard Worker handlep->mmapbuf = NULL;
942*8b26181fSAndroid Build Coastguard Worker }
943*8b26181fSAndroid Build Coastguard Worker pcap_cleanup_live_common(handle);
944*8b26181fSAndroid Build Coastguard Worker }
945