1/*
2 * Copyright (c) 2006 Paolo Abeni (Italy)
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. The name of the author may not be used to endorse or promote
15 * products derived from this software without specific prior written
16 * permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 *
30 * USB sniffing API implementation for Linux platform
31 * By Paolo Abeni <paolo.abeni@email.it>
32 * Modifications: Kris Katterjohn <katterjohn@gmail.com>
33 *
34 */
35
36#ifdef HAVE_CONFIG_H
37#include <config.h>
38#endif
39
40#include "pcap-int.h"
41#include "pcap-usb-linux.h"
42#include "pcap-usb-linux-common.h"
43#include "pcap/usb.h"
44
45#include "extract.h"
46
47#ifdef NEED_STRERROR_H
48#include "strerror.h"
49#endif
50
51#include <errno.h>
52#include <stdlib.h>
53#include <unistd.h>
54#include <fcntl.h>
55#include <limits.h>
56#include <string.h>
57#include <dirent.h>
58#include <byteswap.h>
59#include <netinet/in.h>
60#include <sys/ioctl.h>
61#include <sys/mman.h>
62#include <sys/utsname.h>
63#ifdef HAVE_LINUX_USBDEVICE_FS_H
64/*
65 * We might need <linux/compiler.h> to define __user for
66 * <linux/usbdevice_fs.h>.
67 */
68#ifdef HAVE_LINUX_COMPILER_H
69#include <linux/compiler.h>
70#endif /* HAVE_LINUX_COMPILER_H */
71#include <linux/usbdevice_fs.h>
72#endif /* HAVE_LINUX_USBDEVICE_FS_H */
73
74#include "diag-control.h"
75
76#define USB_IFACE "usbmon"
77
78#define USBMON_DEV_PREFIX "usbmon"
79#define USBMON_DEV_PREFIX_LEN	(sizeof USBMON_DEV_PREFIX - 1)
80#define USB_LINE_LEN 4096
81
82#if __BYTE_ORDER == __LITTLE_ENDIAN
83#define htols(s) s
84#define htoll(l) l
85#define htol64(ll) ll
86#else
87#define htols(s) bswap_16(s)
88#define htoll(l) bswap_32(l)
89#define htol64(ll) bswap_64(ll)
90#endif
91
92struct mon_bin_stats {
93	uint32_t queued;
94	uint32_t dropped;
95};
96
97struct mon_bin_get {
98	pcap_usb_header *hdr;
99	void *data;
100	size_t data_len;   /* Length of data (can be zero) */
101};
102
103struct mon_bin_mfetch {
104	int32_t *offvec;   /* Vector of events fetched */
105	int32_t nfetch;    /* Number of events to fetch (out: fetched) */
106	int32_t nflush;    /* Number of events to flush */
107};
108
109#define MON_IOC_MAGIC 0x92
110
111#define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
112#define MON_IOCX_URB  _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
113#define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
114#define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
115#define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
116#define MON_IOCX_GET   _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
117#define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
118#define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
119
120#define MON_BIN_SETUP	0x1 /* setup hdr is present*/
121#define MON_BIN_SETUP_ZERO	0x2 /* setup buffer is not available */
122#define MON_BIN_DATA_ZERO	0x4 /* data buffer is not available */
123#define MON_BIN_ERROR	0x8
124
125/*
126 * Private data for capturing on Linux USB.
127 */
128struct pcap_usb_linux {
129	u_char *mmapbuf;	/* memory-mapped region pointer */
130	size_t mmapbuflen;	/* size of region */
131	int bus_index;
132	u_int packets_read;
133};
134
135/* forward declaration */
136static int usb_activate(pcap_t *);
137static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
138static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
139static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
140static int usb_inject_linux(pcap_t *, const void *, int);
141static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
142static void usb_cleanup_linux_mmap(pcap_t *);
143
144/* facility to add an USB device to the device list*/
145static int
146usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
147{
148	char dev_name[10];
149	char dev_descr[30];
150	snprintf(dev_name, 10, USB_IFACE"%d", n);
151	/*
152	 * XXX - is there any notion of "up" and "running"?
153	 */
154	if (n == 0) {
155		/*
156		 * As this refers to all buses, there's no notion of
157		 * "connected" vs. "disconnected", as that's a property
158		 * that would apply to a particular USB interface.
159		 */
160		if (add_dev(devlistp, dev_name,
161		    PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
162		    "Raw USB traffic, all USB buses", err_str) == NULL)
163			return -1;
164	} else {
165		/*
166		 * XXX - is there a way to determine whether anything's
167		 * plugged into this bus interface or not, and set
168		 * PCAP_IF_CONNECTION_STATUS_CONNECTED or
169		 * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
170		 */
171		snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
172		if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
173			return -1;
174	}
175
176	return 0;
177}
178
179int
180usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
181{
182	struct dirent* data;
183	int ret = 0;
184	DIR* dir;
185	int n;
186	char* name;
187
188	/*
189	 * We require 2.6.27 or later kernels, so we have binary-mode support.
190	 * The devices are of the form /dev/usbmon{N}.
191	 * Open /dev and scan it.
192	 */
193	dir = opendir("/dev");
194	if (dir != NULL) {
195		while ((ret == 0) && ((data = readdir(dir)) != 0)) {
196			name = data->d_name;
197
198			/*
199			 * Is this a usbmon device?
200			 */
201			if (strncmp(name, USBMON_DEV_PREFIX,
202			    USBMON_DEV_PREFIX_LEN) != 0)
203				continue;	/* no */
204
205			/*
206			 * What's the device number?
207			 */
208			if (sscanf(&name[USBMON_DEV_PREFIX_LEN], "%d", &n) == 0)
209				continue;	/* failed */
210
211			ret = usb_dev_add(devlistp, n, err_str);
212		}
213
214		closedir(dir);
215	}
216	return 0;
217}
218
219/*
220 * Matches what's in mon_bin.c in the Linux kernel.
221 */
222#define MIN_RING_SIZE	(8*1024)
223#define MAX_RING_SIZE	(1200*1024)
224
225static int
226usb_set_ring_size(pcap_t* handle, int header_size)
227{
228	/*
229	 * A packet from binary usbmon has:
230	 *
231	 *  1) a fixed-length header, of size header_size;
232	 *  2) descriptors, for isochronous transfers;
233	 *  3) the payload.
234	 *
235	 * The kernel buffer has a size, defaulting to 300KB, with a
236	 * minimum of 8KB and a maximum of 1200KB.  The size is set with
237	 * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
238	 * to a page size.
239	 *
240	 * No more than {buffer size}/5 bytes worth of payload is saved.
241	 * Therefore, if we subtract the fixed-length size from the
242	 * snapshot length, we have the biggest payload we want (we
243	 * don't worry about the descriptors - if we have descriptors,
244	 * we'll just discard the last bit of the payload to get it
245	 * to fit).  We multiply that result by 5 and set the buffer
246	 * size to that value.
247	 */
248	int ring_size;
249
250	if (handle->snapshot < header_size)
251		handle->snapshot = header_size;
252	/* The maximum snapshot size is small enough that this won't overflow */
253	ring_size = (handle->snapshot - header_size) * 5;
254
255	/*
256	 * Will this get an error?
257	 * (There's no wqy to query the minimum or maximum, so we just
258	 * copy the value from the kernel source.  We don't round it
259	 * up to a multiple of the page size.)
260	 */
261	if (ring_size > MAX_RING_SIZE) {
262		/*
263		 * Yes.  Lower the ring size to the maximum, and set the
264		 * snapshot length to the value that would give us a
265		 * maximum-size ring.
266		 */
267		ring_size = MAX_RING_SIZE;
268		handle->snapshot = header_size + (MAX_RING_SIZE/5);
269	} else if (ring_size < MIN_RING_SIZE) {
270		/*
271		 * Yes.  Raise the ring size to the minimum, but leave
272		 * the snapshot length unchanged, so we show the
273		 * callback no more data than specified by the
274		 * snapshot length.
275		 */
276		ring_size = MIN_RING_SIZE;
277	}
278
279	if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
280		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
281		    errno, "Can't set ring size from fd %d", handle->fd);
282		return -1;
283	}
284	return ring_size;
285}
286
287static
288int usb_mmap(pcap_t* handle)
289{
290	struct pcap_usb_linux *handlep = handle->priv;
291	int len;
292
293	/*
294	 * Attempt to set the ring size as appropriate for the snapshot
295	 * length, reducing the snapshot length if that'd make the ring
296	 * bigger than the kernel supports.
297	 */
298	len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
299	if (len == -1) {
300		/* Failed.  Fall back on non-memory-mapped access. */
301		return 0;
302	}
303
304	handlep->mmapbuflen = len;
305	handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
306	    MAP_SHARED, handle->fd, 0);
307	if (handlep->mmapbuf == MAP_FAILED) {
308		/*
309		 * Failed.  We don't treat that as a fatal error, we
310		 * just try to fall back on non-memory-mapped access.
311		 */
312		return 0;
313	}
314	return 1;
315}
316
317#ifdef HAVE_LINUX_USBDEVICE_FS_H
318
319#define CTRL_TIMEOUT    (5*1000)        /* milliseconds */
320
321#define USB_DIR_IN		0x80
322#define USB_TYPE_STANDARD	0x00
323#define USB_RECIP_DEVICE	0x00
324
325#define USB_REQ_GET_DESCRIPTOR	6
326
327#define USB_DT_DEVICE		1
328#define USB_DT_CONFIG		2
329
330#define USB_DEVICE_DESCRIPTOR_SIZE	18
331#define USB_CONFIG_DESCRIPTOR_SIZE	9
332
333/* probe the descriptors of the devices attached to the bus */
334/* the descriptors will end up in the captured packet stream */
335/* and be decoded by external apps like wireshark */
336/* without these identifying probes packet data can't be fully decoded */
337static void
338probe_devices(int bus)
339{
340	struct usbdevfs_ctrltransfer ctrl;
341	struct dirent* data;
342	int ret = 0;
343	char busdevpath[sizeof("/dev/bus/usb/000/") + NAME_MAX];
344	DIR* dir;
345	uint8_t descriptor[USB_DEVICE_DESCRIPTOR_SIZE];
346	uint8_t configdesc[USB_CONFIG_DESCRIPTOR_SIZE];
347
348	/* scan usb bus directories for device nodes */
349	snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d", bus);
350	dir = opendir(busdevpath);
351	if (!dir)
352		return;
353
354	while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
355		int fd;
356		char* name = data->d_name;
357
358		if (name[0] == '.')
359			continue;
360
361		snprintf(busdevpath, sizeof(busdevpath), "/dev/bus/usb/%03d/%s", bus, data->d_name);
362
363		fd = open(busdevpath, O_RDWR);
364		if (fd == -1)
365			continue;
366
367		/*
368		 * Sigh.  Different kernels have different member names
369		 * for this structure.
370		 */
371#ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
372		ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
373		ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
374		ctrl.wValue = USB_DT_DEVICE << 8;
375		ctrl.wIndex = 0;
376		ctrl.wLength = sizeof(descriptor);
377#else
378		ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
379		ctrl.request = USB_REQ_GET_DESCRIPTOR;
380		ctrl.value = USB_DT_DEVICE << 8;
381		ctrl.index = 0;
382		ctrl.length = sizeof(descriptor);
383#endif
384		ctrl.data = descriptor;
385		ctrl.timeout = CTRL_TIMEOUT;
386
387		ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
388
389		/* Request CONFIGURATION descriptor alone to know wTotalLength */
390#ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
391		ctrl.wValue = USB_DT_CONFIG << 8;
392		ctrl.wLength = sizeof(configdesc);
393#else
394		ctrl.value = USB_DT_CONFIG << 8;
395		ctrl.length = sizeof(configdesc);
396#endif
397		ctrl.data = configdesc;
398		ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
399		if (ret >= 0) {
400			uint16_t wtotallength;
401			wtotallength = EXTRACT_LE_U_2(&configdesc[2]);
402#ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
403			ctrl.wLength = wtotallength;
404#else
405			ctrl.length = wtotallength;
406#endif
407			ctrl.data = malloc(wtotallength);
408			if (ctrl.data) {
409				ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
410				free(ctrl.data);
411			}
412		}
413		close(fd);
414	}
415	closedir(dir);
416}
417#endif /* HAVE_LINUX_USBDEVICE_FS_H */
418
419pcap_t *
420usb_create(const char *device, char *ebuf, int *is_ours)
421{
422	const char *cp;
423	char *cpend;
424	long devnum;
425	pcap_t *p;
426
427	/* Does this look like a USB monitoring device? */
428	cp = strrchr(device, '/');
429	if (cp == NULL)
430		cp = device;
431	/* Does it begin with USB_IFACE? */
432	if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
433		/* Nope, doesn't begin with USB_IFACE */
434		*is_ours = 0;
435		return NULL;
436	}
437	/* Yes - is USB_IFACE followed by a number? */
438	cp += sizeof USB_IFACE - 1;
439	devnum = strtol(cp, &cpend, 10);
440	if (cpend == cp || *cpend != '\0') {
441		/* Not followed by a number. */
442		*is_ours = 0;
443		return NULL;
444	}
445	if (devnum < 0) {
446		/* Followed by a non-valid number. */
447		*is_ours = 0;
448		return NULL;
449	}
450
451	/* OK, it's probably ours. */
452	*is_ours = 1;
453
454	p = PCAP_CREATE_COMMON(ebuf, struct pcap_usb_linux);
455	if (p == NULL)
456		return (NULL);
457
458	p->activate_op = usb_activate;
459	return (p);
460}
461
462static int
463usb_activate(pcap_t* handle)
464{
465	struct pcap_usb_linux *handlep = handle->priv;
466	char		full_path[USB_LINE_LEN];
467
468	/*
469	 * Turn a negative snapshot value (invalid), a snapshot value of
470	 * 0 (unspecified), or a value bigger than the normal maximum
471	 * value, into the maximum allowed value.
472	 *
473	 * If some application really *needs* a bigger snapshot
474	 * length, we should just increase MAXIMUM_SNAPLEN.
475	 */
476	if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
477		handle->snapshot = MAXIMUM_SNAPLEN;
478
479	/* Initialize some components of the pcap structure. */
480	handle->bufsize = handle->snapshot;
481	handle->offset = 0;
482	handle->linktype = DLT_USB_LINUX;
483
484	handle->inject_op = usb_inject_linux;
485	handle->setfilter_op = install_bpf_program; /* no kernel filtering */
486	handle->setdirection_op = usb_setdirection_linux;
487	handle->set_datalink_op = NULL;	/* can't change data link type */
488	handle->getnonblock_op = pcap_getnonblock_fd;
489	handle->setnonblock_op = pcap_setnonblock_fd;
490
491	/*get usb bus index from device name */
492	if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
493	{
494		snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
495			"Can't get USB bus index from %s", handle->opt.device);
496		return PCAP_ERROR;
497	}
498
499	/*
500	 * We require 2.6.27 or later kernels, so we have binary-mode support.
501	 * Try to open the binary interface.
502	 */
503	snprintf(full_path, USB_LINE_LEN, "/dev/"USBMON_DEV_PREFIX"%d",
504	    handlep->bus_index);
505	handle->fd = open(full_path, O_RDONLY, 0);
506	if (handle->fd < 0)
507	{
508		/*
509		 * The attempt failed; why?
510		 */
511		switch (errno) {
512
513		case ENOENT:
514			/*
515			 * The device doesn't exist.
516			 * That could either mean that there's
517			 * no support for monitoring USB buses
518			 * (which probably means "the usbmon
519			 * module isn't loaded") or that there
520			 * is but that *particular* device
521			 * doesn't exist (no "scan all buses"
522			 * device if the bus index is 0, no
523			 * such bus if the bus index isn't 0).
524			 *
525			 * For now, don't provide an error message;
526			 * if we can determine what the particular
527			 * problem is, we should report that.
528			 */
529			handle->errbuf[0] = '\0';
530			return PCAP_ERROR_NO_SUCH_DEVICE;
531
532		case EACCES:
533			/*
534			 * We didn't have permission to open it.
535			 */
536DIAG_OFF_FORMAT_TRUNCATION
537			snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
538			    "Attempt to open %s failed with EACCES - root privileges may be required",
539			    full_path);
540DIAG_ON_FORMAT_TRUNCATION
541			return PCAP_ERROR_PERM_DENIED;
542
543		default:
544			/*
545			 * Something went wrong.
546			 */
547			pcap_fmt_errmsg_for_errno(handle->errbuf,
548			    PCAP_ERRBUF_SIZE, errno,
549			    "Can't open USB bus file %s", full_path);
550			return PCAP_ERROR;
551		}
552	}
553
554	if (handle->opt.rfmon)
555	{
556		/*
557		 * Monitor mode doesn't apply to USB devices.
558		 */
559		close(handle->fd);
560		return PCAP_ERROR_RFMON_NOTSUP;
561	}
562
563	/* try to use fast mmap access */
564	if (usb_mmap(handle))
565	{
566		/* We succeeded. */
567		handle->linktype = DLT_USB_LINUX_MMAPPED;
568		handle->stats_op = usb_stats_linux_bin;
569		handle->read_op = usb_read_linux_mmap;
570		handle->cleanup_op = usb_cleanup_linux_mmap;
571#ifdef HAVE_LINUX_USBDEVICE_FS_H
572		probe_devices(handlep->bus_index);
573#endif
574
575		/*
576		 * "handle->fd" is a real file, so
577		 * "select()" and "poll()" work on it.
578		 */
579		handle->selectable_fd = handle->fd;
580		return 0;
581	}
582
583	/*
584	 * We failed; try plain binary interface access.
585	 *
586	 * Attempt to set the ring size as appropriate for
587	 * the snapshot length, reducing the snapshot length
588	 * if that'd make the ring bigger than the kernel
589	 * supports.
590	 */
591	if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
592		/* Failed. */
593		close(handle->fd);
594		return PCAP_ERROR;
595	}
596	handle->stats_op = usb_stats_linux_bin;
597	handle->read_op = usb_read_linux_bin;
598#ifdef HAVE_LINUX_USBDEVICE_FS_H
599	probe_devices(handlep->bus_index);
600#endif
601
602	/*
603	 * "handle->fd" is a real file, so "select()" and "poll()"
604	 * work on it.
605	 */
606	handle->selectable_fd = handle->fd;
607
608	/* for plain binary access and text access we need to allocate the read
609	 * buffer */
610	handle->buffer = malloc(handle->bufsize);
611	if (!handle->buffer) {
612		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
613		    errno, "malloc");
614		close(handle->fd);
615		return PCAP_ERROR;
616	}
617	return 0;
618}
619
620static int
621usb_inject_linux(pcap_t *handle, const void *buf _U_, int size _U_)
622{
623	snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
624	    "Packet injection is not supported on USB devices");
625	return (-1);
626}
627
628static int
629usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
630{
631	/*
632	 * It's guaranteed, at this point, that d is a valid
633	 * direction value.
634	 */
635	p->direction = d;
636	return 0;
637}
638
639static int
640usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
641{
642	struct pcap_usb_linux *handlep = handle->priv;
643	int ret;
644	struct mon_bin_stats st;
645	ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
646	if (ret < 0)
647	{
648		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
649		    errno, "Can't read stats from fd %d", handle->fd);
650		return -1;
651	}
652
653	stats->ps_recv = handlep->packets_read + st.queued;
654	stats->ps_drop = st.dropped;
655	stats->ps_ifdrop = 0;
656	return 0;
657}
658
659/*
660 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
661 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
662 */
663static int
664usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
665{
666	struct pcap_usb_linux *handlep = handle->priv;
667	struct mon_bin_get info;
668	int ret;
669	struct pcap_pkthdr pkth;
670	u_int clen = handle->snapshot - sizeof(pcap_usb_header);
671
672	/* the usb header is going to be part of 'packet' data*/
673	info.hdr = (pcap_usb_header*) handle->buffer;
674	info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
675	info.data_len = clen;
676
677	/* ignore interrupt system call errors */
678	do {
679		ret = ioctl(handle->fd, MON_IOCX_GET, &info);
680		if (handle->break_loop)
681		{
682			handle->break_loop = 0;
683			return -2;
684		}
685	} while ((ret == -1) && (errno == EINTR));
686	if (ret < 0)
687	{
688		if (errno == EAGAIN)
689			return 0;	/* no data there */
690
691		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
692		    errno, "Can't read from fd %d", handle->fd);
693		return -1;
694	}
695
696	/*
697	 * info.hdr->data_len is the number of bytes of isochronous
698	 * descriptors (if any) plus the number of bytes of data
699	 * provided.  There are no isochronous descriptors here,
700	 * because we're using the old 48-byte header.
701	 *
702	 * If info.hdr->data_flag is non-zero, there's no URB data;
703	 * info.hdr->urb_len is the size of the buffer into which
704	 * data is to be placed; it does not represent the amount
705	 * of data transferred.  If info.hdr->data_flag is zero,
706	 * there is URB data, and info.hdr->urb_len is the number
707	 * of bytes transmitted or received; it doesn't include
708	 * isochronous descriptors.
709	 *
710	 * The kernel may give us more data than the snaplen; if it did,
711	 * reduce the data length so that the total number of bytes we
712	 * tell our client we have is not greater than the snaplen.
713	 */
714	if (info.hdr->data_len < clen)
715		clen = info.hdr->data_len;
716	info.hdr->data_len = clen;
717	pkth.caplen = sizeof(pcap_usb_header) + clen;
718	if (info.hdr->data_flag) {
719		/*
720		 * No data; just base the on-the-wire length on
721		 * info.hdr->data_len (so that it's >= the captured
722		 * length).
723		 */
724		pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
725	} else {
726		/*
727		 * We got data; base the on-the-wire length on
728		 * info.hdr->urb_len, so that it includes data
729		 * discarded by the USB monitor device due to
730		 * its buffer being too small.
731		 */
732		pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
733	}
734	pkth.ts.tv_sec = (time_t)info.hdr->ts_sec;
735	pkth.ts.tv_usec = info.hdr->ts_usec;
736
737	if (handle->fcode.bf_insns == NULL ||
738	    pcap_filter(handle->fcode.bf_insns, handle->buffer,
739	      pkth.len, pkth.caplen)) {
740		handlep->packets_read++;
741		callback(user, &pkth, handle->buffer);
742		return 1;
743	}
744
745	return 0;	/* didn't pass filter */
746}
747
748/*
749 * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
750 * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
751 */
752#define VEC_SIZE 32
753static int
754usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
755{
756	struct pcap_usb_linux *handlep = handle->priv;
757	struct mon_bin_mfetch fetch;
758	int32_t vec[VEC_SIZE];
759	struct pcap_pkthdr pkth;
760	u_char *bp;
761	pcap_usb_header_mmapped* hdr;
762	int nflush = 0;
763	int packets = 0;
764	u_int clen, max_clen;
765
766	max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
767
768	for (;;) {
769		int i, ret;
770		int limit;
771
772		if (PACKET_COUNT_IS_UNLIMITED(max_packets)) {
773			/*
774			 * There's no limit on the number of packets
775			 * to process, so try to fetch VEC_SIZE packets.
776			 */
777			limit = VEC_SIZE;
778		} else {
779			/*
780			 * Try to fetch as many packets as we have left
781			 * to process, or VEC_SIZE packets, whichever
782			 * is less.
783			 *
784			 * At this point, max_packets > 0 (otherwise,
785			 * PACKET_COUNT_IS_UNLIMITED(max_packets)
786			 * would be true) and max_packets > packets
787			 * (packet starts out as 0, and the test
788			 * at the bottom of the loop exits if
789			 * max_packets <= packets), so limit is
790			 * guaranteed to be > 0.
791			 */
792			limit = max_packets - packets;
793			if (limit > VEC_SIZE)
794				limit = VEC_SIZE;
795		}
796
797		/*
798		 * Try to fetch as many events as possible, up to
799		 * the limit, and flush the events we've processed
800		 * earlier (nflush) - MON_IOCX_MFETCH does both
801		 * (presumably to reduce the number of system
802		 * calls in loops like this).
803		 */
804		fetch.offvec = vec;
805		fetch.nfetch = limit;
806		fetch.nflush = nflush;
807		/* ignore interrupt system call errors */
808		do {
809			ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
810			if (handle->break_loop)
811			{
812				handle->break_loop = 0;
813				return -2;
814			}
815		} while ((ret == -1) && (errno == EINTR));
816		if (ret < 0)
817		{
818			if (errno == EAGAIN)
819				return 0;	/* no data there */
820
821			pcap_fmt_errmsg_for_errno(handle->errbuf,
822			    PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
823			    handle->fd);
824			return -1;
825		}
826
827		/* keep track of processed events, we will flush them later */
828		nflush = fetch.nfetch;
829		for (i=0; i<fetch.nfetch; ++i) {
830			/*
831			 * XXX - we can't check break_loop here, as
832			 * we read the indices of packets into a
833			 * local variable, so if we're later called
834			 * to fetch more packets, those packets will
835			 * not be seen - and won't be flushed, either.
836			 *
837			 * Instead, we would have to keep the array
838			 * of indices in our private data, along
839			 * with the count of packets to flush - or
840			 * would have to flush the already-processed
841			 * packets if we break out of the loop here.
842			 */
843
844			/* Get a pointer to this packet's buffer */
845			bp = &handlep->mmapbuf[vec[i]];
846
847			/* That begins with a metadata header */
848			hdr = (pcap_usb_header_mmapped*) bp;
849
850			/* discard filler */
851			if (hdr->event_type == '@')
852				continue;
853
854			/*
855			 * hdr->data_len is the number of bytes of
856			 * isochronous descriptors (if any) plus the
857			 * number of bytes of data provided.
858			 *
859			 * If hdr->data_flag is non-zero, there's no
860			 * URB data; hdr->urb_len is the size of the
861			 * buffer into which data is to be placed; it does
862			 * not represent the amount of data transferred.
863			 * If hdr->data_flag is zero, there is URB data,
864			 * and hdr->urb_len is the number of bytes
865			 * transmitted or received; it doesn't include
866			 * isochronous descriptors.
867			 *
868			 * The kernel may give us more data than the
869			 * snaplen; if it did, reduce the data length
870			 * so that the total number of bytes we
871			 * tell our client we have is not greater than
872			 * the snaplen.
873			 */
874			clen = max_clen;
875			if (hdr->data_len < clen)
876				clen = hdr->data_len;
877			pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
878			if (hdr->data_flag) {
879				/*
880				 * No data; just base the on-the-wire length
881				 * on hdr->data_len (so that it's >= the
882				 * captured length).
883				 */
884				pkth.len = sizeof(pcap_usb_header_mmapped) +
885				    hdr->data_len;
886			} else {
887				/*
888				 * We got data; base the on-the-wire length
889				 * on hdr->urb_len, so that it includes
890				 * data discarded by the USB monitor device
891				 * due to its buffer being too small.
892				 */
893				pkth.len = sizeof(pcap_usb_header_mmapped) +
894				    (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
895
896				/*
897				 * Now clean it up if it's a completion
898				 * event for an incoming isochronous
899				 * transfer.
900				 */
901				fix_linux_usb_mmapped_length(&pkth, bp);
902			}
903			pkth.ts.tv_sec = (time_t)hdr->ts_sec;
904			pkth.ts.tv_usec = hdr->ts_usec;
905
906			if (handle->fcode.bf_insns == NULL ||
907			    pcap_filter(handle->fcode.bf_insns, (u_char*) hdr,
908			      pkth.len, pkth.caplen)) {
909				handlep->packets_read++;
910				callback(user, &pkth, (u_char*) hdr);
911				packets++;
912			}
913		}
914
915		/*
916		 * If max_packets specifiesg "unlimited", we stop after
917		 * the first chunk.
918		 */
919		if (PACKET_COUNT_IS_UNLIMITED(max_packets) ||
920		    (packets >= max_packets))
921			break;
922	}
923
924	/* flush pending events*/
925	if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
926		pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
927		    errno, "Can't mflush fd %d", handle->fd);
928		return -1;
929	}
930	return packets;
931}
932
933static void
934usb_cleanup_linux_mmap(pcap_t* handle)
935{
936	struct pcap_usb_linux *handlep = handle->priv;
937
938	/* if we have a memory-mapped buffer, unmap it */
939	if (handlep->mmapbuf != NULL) {
940		munmap(handlep->mmapbuf, handlep->mmapbuflen);
941		handlep->mmapbuf = NULL;
942	}
943	pcap_cleanup_live_common(handle);
944}
945