]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/libpcap/pcap-usb-linux.c
amd64: use register macros for gdb_cpu_getreg()
[FreeBSD/FreeBSD.git] / contrib / libpcap / pcap-usb-linux.c
1 /*
2  * Copyright (c) 2006 Paolo Abeni (Italy)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  * notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  * notice, this list of conditions and the following disclaimer in the
13  * documentation and/or other materials provided with the distribution.
14  * 3. The name of the author may not be used to endorse or promote
15  * products derived from this software without specific prior written
16  * permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22  * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  *
30  * USB sniffing API implementation for Linux platform
31  * By Paolo Abeni <paolo.abeni@email.it>
32  * Modifications: Kris Katterjohn <katterjohn@gmail.com>
33  *
34  */
35
36 #ifdef HAVE_CONFIG_H
37 #include <config.h>
38 #endif
39
40 #include "pcap-int.h"
41 #include "pcap-usb-linux.h"
42 #include "pcap/usb.h"
43
44 #ifdef NEED_STRERROR_H
45 #include "strerror.h"
46 #endif
47
48 #include <ctype.h>
49 #include <errno.h>
50 #include <stdlib.h>
51 #include <unistd.h>
52 #include <fcntl.h>
53 #include <limits.h>
54 #include <string.h>
55 #include <dirent.h>
56 #include <byteswap.h>
57 #include <netinet/in.h>
58 #include <sys/ioctl.h>
59 #include <sys/mman.h>
60 #include <sys/utsname.h>
61 #ifdef HAVE_LINUX_USBDEVICE_FS_H
62 /*
63  * We might need <linux/compiler.h> to define __user for
64  * <linux/usbdevice_fs.h>.
65  */
66 #ifdef HAVE_LINUX_COMPILER_H
67 #include <linux/compiler.h>
68 #endif /* HAVE_LINUX_COMPILER_H */
69 #include <linux/usbdevice_fs.h>
70 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
71
72 #define USB_IFACE "usbmon"
73 #define USB_TEXT_DIR_OLD "/sys/kernel/debug/usbmon"
74 #define USB_TEXT_DIR "/sys/kernel/debug/usb/usbmon"
75 #define SYS_USB_BUS_DIR "/sys/bus/usb/devices"
76 #define PROC_USB_BUS_DIR "/proc/bus/usb"
77 #define USB_LINE_LEN 4096
78
79 #if __BYTE_ORDER == __LITTLE_ENDIAN
80 #define htols(s) s
81 #define htoll(l) l
82 #define htol64(ll) ll
83 #else
84 #define htols(s) bswap_16(s)
85 #define htoll(l) bswap_32(l)
86 #define htol64(ll) bswap_64(ll)
87 #endif
88
89 struct mon_bin_stats {
90         uint32_t queued;
91         uint32_t dropped;
92 };
93
94 struct mon_bin_get {
95         pcap_usb_header *hdr;
96         void *data;
97         size_t data_len;   /* Length of data (can be zero) */
98 };
99
100 struct mon_bin_mfetch {
101         int32_t *offvec;   /* Vector of events fetched */
102         int32_t nfetch;    /* Number of events to fetch (out: fetched) */
103         int32_t nflush;    /* Number of events to flush */
104 };
105
106 #define MON_IOC_MAGIC 0x92
107
108 #define MON_IOCQ_URB_LEN _IO(MON_IOC_MAGIC, 1)
109 #define MON_IOCX_URB  _IOWR(MON_IOC_MAGIC, 2, struct mon_bin_hdr)
110 #define MON_IOCG_STATS _IOR(MON_IOC_MAGIC, 3, struct mon_bin_stats)
111 #define MON_IOCT_RING_SIZE _IO(MON_IOC_MAGIC, 4)
112 #define MON_IOCQ_RING_SIZE _IO(MON_IOC_MAGIC, 5)
113 #define MON_IOCX_GET   _IOW(MON_IOC_MAGIC, 6, struct mon_bin_get)
114 #define MON_IOCX_MFETCH _IOWR(MON_IOC_MAGIC, 7, struct mon_bin_mfetch)
115 #define MON_IOCH_MFLUSH _IO(MON_IOC_MAGIC, 8)
116
117 #define MON_BIN_SETUP   0x1 /* setup hdr is present*/
118 #define MON_BIN_SETUP_ZERO      0x2 /* setup buffer is not available */
119 #define MON_BIN_DATA_ZERO       0x4 /* data buffer is not available */
120 #define MON_BIN_ERROR   0x8
121
122 /*
123  * Private data for capturing on Linux USB.
124  */
125 struct pcap_usb_linux {
126         u_char *mmapbuf;        /* memory-mapped region pointer */
127         size_t mmapbuflen;      /* size of region */
128         int bus_index;
129         u_int packets_read;
130 };
131
132 /* forward declaration */
133 static int usb_activate(pcap_t *);
134 static int usb_stats_linux(pcap_t *, struct pcap_stat *);
135 static int usb_stats_linux_bin(pcap_t *, struct pcap_stat *);
136 static int usb_read_linux(pcap_t *, int , pcap_handler , u_char *);
137 static int usb_read_linux_bin(pcap_t *, int , pcap_handler , u_char *);
138 static int usb_read_linux_mmap(pcap_t *, int , pcap_handler , u_char *);
139 static int usb_inject_linux(pcap_t *, const void *, size_t);
140 static int usb_setdirection_linux(pcap_t *, pcap_direction_t);
141 static void usb_cleanup_linux_mmap(pcap_t *);
142
143 static int
144 have_binary_usbmon(void)
145 {
146         struct utsname utsname;
147         char *version_component, *endp;
148         int major, minor, subminor;
149
150         if (uname(&utsname) == 0) {
151                 /*
152                  * 2.6.21 is the first release with the binary-mode
153                  * USB monitoring.
154                  */
155                 version_component = utsname.release;
156                 major = strtol(version_component, &endp, 10);
157                 if (endp != version_component && *endp == '.') {
158                         /*
159                          * OK, that was a valid major version.
160                          * Is it 3 or greater?  If so, we have binary
161                          * mode support.
162                          */
163                         if (major >= 3)
164                                 return 1;
165
166                         /*
167                          * Is it 1 or less?  If so, we don't have binary
168                          * mode support.  (In fact, we don't have any
169                          * USB monitoring....)
170                          */
171                         if (major <= 1)
172                                 return 0;
173                 }
174
175                 /*
176                  * OK, this is a 2.x kernel.
177                  * What's the minor version?
178                  */
179                 version_component = endp + 1;
180                 minor = strtol(version_component, &endp, 10);
181                 if (endp != version_component &&
182                     (*endp == '.' || *endp == '\0')) {
183                         /*
184                          * OK, that was a valid minor version.
185                          * Is is 2.6 or later?  (There shouldn't be a
186                          * "later", as 2.6.x went to 3.x, but we'll
187                          * check anyway.)
188                          */
189                         if (minor < 6) {
190                                 /*
191                                  * No, so no binary support (did 2.4 have
192                                  * any USB monitoring at all?)
193                                  */
194                                 return 0;
195                         }
196
197                         /*
198                          * OK, this is a 2.6.x kernel.
199                          * What's the subminor version?
200                          */
201                         version_component = endp + 1;
202                         subminor = strtol(version_component, &endp, 10);
203                         if (endp != version_component &&
204                             (*endp == '.' || *endp == '\0')) {
205                                 /*
206                                  * OK, that was a valid subminor version.
207                                  * Is it 21 or greater?
208                                  */
209                                 if (subminor >= 21) {
210                                         /*
211                                          * Yes - we have binary mode
212                                          * support.
213                                          */
214                                         return 1;
215                                 }
216                         }
217                 }
218         }
219
220         /*
221          * Either uname() failed, in which case we just say "no binary
222          * mode support", or we don't have binary mode support.
223          */
224         return 0;
225 }
226
227 /* facility to add an USB device to the device list*/
228 static int
229 usb_dev_add(pcap_if_list_t *devlistp, int n, char *err_str)
230 {
231         char dev_name[10];
232         char dev_descr[30];
233         pcap_snprintf(dev_name, 10, USB_IFACE"%d", n);
234         /*
235          * XXX - is there any notion of "up" and "running"?
236          */
237         if (n == 0) {
238                 /*
239                  * As this refers to all buses, there's no notion of
240                  * "connected" vs. "disconnected", as that's a property
241                  * that would apply to a particular USB interface.
242                  */
243                 if (add_dev(devlistp, dev_name,
244                     PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE,
245                     "Raw USB traffic, all USB buses", err_str) == NULL)
246                         return -1;
247         } else {
248                 /*
249                  * XXX - is there a way to determine whether anything's
250                  * plugged into this bus interface or not, and set
251                  * PCAP_IF_CONNECTION_STATUS_CONNECTED or
252                  * PCAP_IF_CONNECTION_STATUS_DISCONNECTED?
253                  */
254                 pcap_snprintf(dev_descr, 30, "Raw USB traffic, bus number %d", n);
255                 if (add_dev(devlistp, dev_name, 0, dev_descr, err_str) == NULL)
256                         return -1;
257         }
258
259         return 0;
260 }
261
262 int
263 usb_findalldevs(pcap_if_list_t *devlistp, char *err_str)
264 {
265         char usb_mon_dir[PATH_MAX];
266         char *usb_mon_prefix;
267         size_t usb_mon_prefix_len;
268         struct dirent* data;
269         int ret = 0;
270         DIR* dir;
271         int n;
272         char* name;
273         size_t len;
274
275         if (have_binary_usbmon()) {
276                 /*
277                  * We have binary-mode support.
278                  * What do the device names look like?
279                  * Split LINUX_USB_MON_DEV into a directory that we'll
280                  * scan and a file name prefix that we'll check for.
281                  */
282                 pcap_strlcpy(usb_mon_dir, LINUX_USB_MON_DEV, sizeof usb_mon_dir);
283                 usb_mon_prefix = strrchr(usb_mon_dir, '/');
284                 if (usb_mon_prefix == NULL) {
285                         /*
286                          * This "shouldn't happen".  Just give up if it
287                          * does.
288                          */
289                         return 0;
290                 }
291                 *usb_mon_prefix++ = '\0';
292                 usb_mon_prefix_len = strlen(usb_mon_prefix);
293
294                 /*
295                  * Open the directory and scan it.
296                  */
297                 dir = opendir(usb_mon_dir);
298                 if (dir != NULL) {
299                         while ((ret == 0) && ((data = readdir(dir)) != 0)) {
300                                 name = data->d_name;
301
302                                 /*
303                                  * Is this a usbmon device?
304                                  */
305                                 if (strncmp(name, usb_mon_prefix, usb_mon_prefix_len) != 0)
306                                         continue;       /* no */
307
308                                 /*
309                                  * What's the device number?
310                                  */
311                                 if (sscanf(&name[usb_mon_prefix_len], "%d", &n) == 0)
312                                         continue;       /* failed */
313
314                                 ret = usb_dev_add(devlistp, n, err_str);
315                         }
316
317                         closedir(dir);
318                 }
319                 return 0;
320         } else {
321                 /*
322                  * We have only text mode support.
323                  * We don't look for the text devices because we can't
324                  * look for them without root privileges, and we don't
325                  * want to require root privileges to enumerate devices
326                  * (we want to let the user to try a device and get
327                  * an error, rather than seeing no devices and asking
328                  * "why am I not seeing devices" and forcing a long
329                  * process of poking to figure out whether it's "no
330                  * privileges" or "your kernel is too old" or "the
331                  * usbmon module isn't loaded" or...).
332                  *
333                  * Instead, we look to see what buses we have.
334                  * If the kernel is so old that it doesn't have
335                  * binary-mode support, it's also so old that
336                  * it doesn't have a "scan all buses" device.
337                  *
338                  * First, try scanning sysfs USB bus directory.
339                  */
340                 dir = opendir(SYS_USB_BUS_DIR);
341                 if (dir != NULL) {
342                         while ((ret == 0) && ((data = readdir(dir)) != 0)) {
343                                 name = data->d_name;
344
345                                 if (strncmp(name, "usb", 3) != 0)
346                                         continue;
347
348                                 if (sscanf(&name[3], "%d", &n) == 0)
349                                         continue;
350
351                                 ret = usb_dev_add(devlistp, n, err_str);
352                         }
353
354                         closedir(dir);
355                         return 0;
356                 }
357
358                 /* That didn't work; try scanning procfs USB bus directory. */
359                 dir = opendir(PROC_USB_BUS_DIR);
360                 if (dir != NULL) {
361                         while ((ret == 0) && ((data = readdir(dir)) != 0)) {
362                                 name = data->d_name;
363                                 len = strlen(name);
364
365                                 /* if this file name does not end with a number it's not of our interest */
366                                 if ((len < 1) || !isdigit(name[--len]))
367                                         continue;
368                                 while (isdigit(name[--len]));
369                                 if (sscanf(&name[len+1], "%d", &n) != 1)
370                                         continue;
371
372                                 ret = usb_dev_add(devlistp, n, err_str);
373                         }
374
375                         closedir(dir);
376                         return ret;
377                 }
378
379                 /* neither of them worked */
380                 return 0;
381         }
382 }
383
384 /*
385  * Matches what's in mon_bin.c in the Linux kernel.
386  */
387 #define MIN_RING_SIZE   (8*1024)
388 #define MAX_RING_SIZE   (1200*1024)
389
390 static int
391 usb_set_ring_size(pcap_t* handle, int header_size)
392 {
393         /*
394          * A packet from binary usbmon has:
395          *
396          *  1) a fixed-length header, of size header_size;
397          *  2) descriptors, for isochronous transfers;
398          *  3) the payload.
399          *
400          * The kernel buffer has a size, defaulting to 300KB, with a
401          * minimum of 8KB and a maximum of 1200KB.  The size is set with
402          * the MON_IOCT_RING_SIZE ioctl; the size passed in is rounded up
403          * to a page size.
404          *
405          * No more than {buffer size}/5 bytes worth of payload is saved.
406          * Therefore, if we subtract the fixed-length size from the
407          * snapshot length, we have the biggest payload we want (we
408          * don't worry about the descriptors - if we have descriptors,
409          * we'll just discard the last bit of the payload to get it
410          * to fit).  We multiply that result by 5 and set the buffer
411          * size to that value.
412          */
413         int ring_size;
414
415         if (handle->snapshot < header_size)
416                 handle->snapshot = header_size;
417         /* The maximum snapshot size is small enough that this won't overflow */
418         ring_size = (handle->snapshot - header_size) * 5;
419
420         /*
421          * Will this get an error?
422          * (There's no wqy to query the minimum or maximum, so we just
423          * copy the value from the kernel source.  We don't round it
424          * up to a multiple of the page size.)
425          */
426         if (ring_size > MAX_RING_SIZE) {
427                 /*
428                  * Yes.  Lower the ring size to the maximum, and set the
429                  * snapshot length to the value that would give us a
430                  * maximum-size ring.
431                  */
432                 ring_size = MAX_RING_SIZE;
433                 handle->snapshot = header_size + (MAX_RING_SIZE/5);
434         } else if (ring_size < MIN_RING_SIZE) {
435                 /*
436                  * Yes.  Raise the ring size to the minimum, but leave
437                  * the snapshot length unchanged, so we show the
438                  * callback no more data than specified by the
439                  * snapshot length.
440                  */
441                 ring_size = MIN_RING_SIZE;
442         }
443
444         if (ioctl(handle->fd, MON_IOCT_RING_SIZE, ring_size) == -1) {
445                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
446                     errno, "Can't set ring size from fd %d", handle->fd);
447                 return -1;
448         }
449         return ring_size;
450 }
451
452 static
453 int usb_mmap(pcap_t* handle)
454 {
455         struct pcap_usb_linux *handlep = handle->priv;
456         int len;
457
458         /*
459          * Attempt to set the ring size as appropriate for the snapshot
460          * length, reducing the snapshot length if that'd make the ring
461          * bigger than the kernel supports.
462          */
463         len = usb_set_ring_size(handle, (int)sizeof(pcap_usb_header_mmapped));
464         if (len == -1) {
465                 /* Failed.  Fall back on non-memory-mapped access. */
466                 return 0;
467         }
468
469         handlep->mmapbuflen = len;
470         handlep->mmapbuf = mmap(0, handlep->mmapbuflen, PROT_READ,
471             MAP_SHARED, handle->fd, 0);
472         if (handlep->mmapbuf == MAP_FAILED) {
473                 /*
474                  * Failed.  We don't treat that as a fatal error, we
475                  * just try to fall back on non-memory-mapped access.
476                  */
477                 return 0;
478         }
479         return 1;
480 }
481
482 #ifdef HAVE_LINUX_USBDEVICE_FS_H
483
484 #define CTRL_TIMEOUT    (5*1000)        /* milliseconds */
485
486 #define USB_DIR_IN              0x80
487 #define USB_TYPE_STANDARD       0x00
488 #define USB_RECIP_DEVICE        0x00
489
490 #define USB_REQ_GET_DESCRIPTOR  6
491
492 #define USB_DT_DEVICE           1
493
494 /* probe the descriptors of the devices attached to the bus */
495 /* the descriptors will end up in the captured packet stream */
496 /* and be decoded by external apps like wireshark */
497 /* without these identifying probes packet data can't be fully decoded */
498 static void
499 probe_devices(int bus)
500 {
501         struct usbdevfs_ctrltransfer ctrl;
502         struct dirent* data;
503         int ret = 0;
504         char buf[sizeof("/dev/bus/usb/000/") + NAME_MAX];
505         DIR* dir;
506
507         /* scan usb bus directories for device nodes */
508         pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d", bus);
509         dir = opendir(buf);
510         if (!dir)
511                 return;
512
513         while ((ret >= 0) && ((data = readdir(dir)) != 0)) {
514                 int fd;
515                 char* name = data->d_name;
516
517                 if (name[0] == '.')
518                         continue;
519
520                 pcap_snprintf(buf, sizeof(buf), "/dev/bus/usb/%03d/%s", bus, data->d_name);
521
522                 fd = open(buf, O_RDWR);
523                 if (fd == -1)
524                         continue;
525
526                 /*
527                  * Sigh.  Different kernels have different member names
528                  * for this structure.
529                  */
530 #ifdef HAVE_STRUCT_USBDEVFS_CTRLTRANSFER_BREQUESTTYPE
531                 ctrl.bRequestType = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
532                 ctrl.bRequest = USB_REQ_GET_DESCRIPTOR;
533                 ctrl.wValue = USB_DT_DEVICE << 8;
534                 ctrl.wIndex = 0;
535                 ctrl.wLength = sizeof(buf);
536 #else
537                 ctrl.requesttype = USB_DIR_IN | USB_TYPE_STANDARD | USB_RECIP_DEVICE;
538                 ctrl.request = USB_REQ_GET_DESCRIPTOR;
539                 ctrl.value = USB_DT_DEVICE << 8;
540                 ctrl.index = 0;
541                 ctrl.length = sizeof(buf);
542 #endif
543                 ctrl.data = buf;
544                 ctrl.timeout = CTRL_TIMEOUT;
545
546                 ret = ioctl(fd, USBDEVFS_CONTROL, &ctrl);
547
548                 close(fd);
549         }
550         closedir(dir);
551 }
552 #endif /* HAVE_LINUX_USBDEVICE_FS_H */
553
554 pcap_t *
555 usb_create(const char *device, char *ebuf, int *is_ours)
556 {
557         const char *cp;
558         char *cpend;
559         long devnum;
560         pcap_t *p;
561
562         /* Does this look like a USB monitoring device? */
563         cp = strrchr(device, '/');
564         if (cp == NULL)
565                 cp = device;
566         /* Does it begin with USB_IFACE? */
567         if (strncmp(cp, USB_IFACE, sizeof USB_IFACE - 1) != 0) {
568                 /* Nope, doesn't begin with USB_IFACE */
569                 *is_ours = 0;
570                 return NULL;
571         }
572         /* Yes - is USB_IFACE followed by a number? */
573         cp += sizeof USB_IFACE - 1;
574         devnum = strtol(cp, &cpend, 10);
575         if (cpend == cp || *cpend != '\0') {
576                 /* Not followed by a number. */
577                 *is_ours = 0;
578                 return NULL;
579         }
580         if (devnum < 0) {
581                 /* Followed by a non-valid number. */
582                 *is_ours = 0;
583                 return NULL;
584         }
585
586         /* OK, it's probably ours. */
587         *is_ours = 1;
588
589         p = pcap_create_common(ebuf, sizeof (struct pcap_usb_linux));
590         if (p == NULL)
591                 return (NULL);
592
593         p->activate_op = usb_activate;
594         return (p);
595 }
596
597 static int
598 usb_activate(pcap_t* handle)
599 {
600         struct pcap_usb_linux *handlep = handle->priv;
601         char            full_path[USB_LINE_LEN];
602         int             ret;
603
604         /*
605          * Turn a negative snapshot value (invalid), a snapshot value of
606          * 0 (unspecified), or a value bigger than the normal maximum
607          * value, into the maximum allowed value.
608          *
609          * If some application really *needs* a bigger snapshot
610          * length, we should just increase MAXIMUM_SNAPLEN.
611          */
612         if (handle->snapshot <= 0 || handle->snapshot > MAXIMUM_SNAPLEN)
613                 handle->snapshot = MAXIMUM_SNAPLEN;
614
615         /* Initialize some components of the pcap structure. */
616         handle->bufsize = handle->snapshot;
617         handle->offset = 0;
618         handle->linktype = DLT_USB_LINUX;
619
620         handle->inject_op = usb_inject_linux;
621         handle->setfilter_op = install_bpf_program; /* no kernel filtering */
622         handle->setdirection_op = usb_setdirection_linux;
623         handle->set_datalink_op = NULL; /* can't change data link type */
624         handle->getnonblock_op = pcap_getnonblock_fd;
625         handle->setnonblock_op = pcap_setnonblock_fd;
626
627         /*get usb bus index from device name */
628         if (sscanf(handle->opt.device, USB_IFACE"%d", &handlep->bus_index) != 1)
629         {
630                 pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
631                         "Can't get USB bus index from %s", handle->opt.device);
632                 return PCAP_ERROR;
633         }
634
635         if (have_binary_usbmon())
636         {
637                 /*
638                  * We have binary-mode support.
639                  * Try to open the binary interface.
640                  */
641                 pcap_snprintf(full_path, USB_LINE_LEN, LINUX_USB_MON_DEV"%d", handlep->bus_index);
642                 handle->fd = open(full_path, O_RDONLY, 0);
643                 if (handle->fd < 0)
644                 {
645                         /*
646                          * The attempt failed; why?
647                          */
648                         switch (errno) {
649
650                         case ENOENT:
651                                 /*
652                                  * The device doesn't exist.
653                                  * That could either mean that there's
654                                  * no support for monitoring USB buses
655                                  * (which probably means "the usbmon
656                                  * module isn't loaded") or that there
657                                  * is but that *particular* device
658                                  * doesn't exist (no "scan all buses"
659                                  * device if the bus index is 0, no
660                                  * such bus if the bus index isn't 0).
661                                  */
662                                 return PCAP_ERROR_NO_SUCH_DEVICE;
663
664                         case EACCES:
665                                 /*
666                                  * We didn't have permission to open it.
667                                  */
668                                 return PCAP_ERROR_PERM_DENIED;
669
670                         default:
671                                 /*
672                                  * Something went wrong.
673                                  */
674                                 pcap_fmt_errmsg_for_errno(handle->errbuf,
675                                     PCAP_ERRBUF_SIZE, errno,
676                                     "Can't open USB bus file %s", full_path);
677                                 return PCAP_ERROR;
678                         }
679                 }
680
681                 if (handle->opt.rfmon)
682                 {
683                         /*
684                          * Monitor mode doesn't apply to USB devices.
685                          */
686                         close(handle->fd);
687                         return PCAP_ERROR_RFMON_NOTSUP;
688                 }
689
690                 /* try to use fast mmap access */
691                 if (usb_mmap(handle))
692                 {
693                         /* We succeeded. */
694                         handle->linktype = DLT_USB_LINUX_MMAPPED;
695                         handle->stats_op = usb_stats_linux_bin;
696                         handle->read_op = usb_read_linux_mmap;
697                         handle->cleanup_op = usb_cleanup_linux_mmap;
698 #ifdef HAVE_LINUX_USBDEVICE_FS_H
699                         probe_devices(handlep->bus_index);
700 #endif
701
702                         /*
703                          * "handle->fd" is a real file, so
704                          * "select()" and "poll()" work on it.
705                          */
706                         handle->selectable_fd = handle->fd;
707                         return 0;
708                 }
709
710                 /*
711                  * We failed; try plain binary interface access.
712                  *
713                  * Attempt to set the ring size as appropriate for
714                  * the snapshot length, reducing the snapshot length
715                  * if that'd make the ring bigger than the kernel
716                  * supports.
717                  */
718                 if (usb_set_ring_size(handle, (int)sizeof(pcap_usb_header)) == -1) {
719                         /* Failed. */
720                         close(handle->fd);
721                         return PCAP_ERROR;
722                 }
723                 handle->stats_op = usb_stats_linux_bin;
724                 handle->read_op = usb_read_linux_bin;
725 #ifdef HAVE_LINUX_USBDEVICE_FS_H
726                 probe_devices(handlep->bus_index);
727 #endif
728         }
729         else {
730                 /*
731                  * We don't have binary mode support.
732                  * Try opening the text-mode device.
733                  */
734                 pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR"/%dt", handlep->bus_index);
735                 handle->fd = open(full_path, O_RDONLY, 0);
736                 if (handle->fd < 0)
737                 {
738                         if (errno == ENOENT)
739                         {
740                                 /*
741                                  * Not found at the new location; try
742                                  * the old location.
743                                  */
744                                 pcap_snprintf(full_path, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%dt", handlep->bus_index);
745                                 handle->fd = open(full_path, O_RDONLY, 0);
746                         }
747                         if (handle->fd < 0) {
748                                 if (errno == ENOENT)
749                                 {
750                                         /*
751                                          * The problem is that the file
752                                          * doesn't exist.  Report that as
753                                          * "no such device".  (That could
754                                          * mean "no such USB bus" or
755                                          * "monitoring not supported".)
756                                          */
757                                         ret = PCAP_ERROR_NO_SUCH_DEVICE;
758                                 }
759                                 else if (errno == EACCES)
760                                 {
761                                         /*
762                                          * The problem is that we don't
763                                          * have sufficient permission to
764                                          * open the file.  Report that.
765                                          */
766                                         ret = PCAP_ERROR_PERM_DENIED;
767                                 }
768                                 else
769                                 {
770                                         /*
771                                          * Some other error.
772                                          */
773                                         ret = PCAP_ERROR;
774                                 }
775                                 pcap_fmt_errmsg_for_errno(handle->errbuf,
776                                     PCAP_ERRBUF_SIZE, errno,
777                                     "Can't open USB bus file %s",
778                                     full_path);
779                                 return ret;
780                         }
781                 }
782
783                 if (handle->opt.rfmon)
784                 {
785                         /*
786                          * Monitor mode doesn't apply to USB devices.
787                          */
788                         close(handle->fd);
789                         return PCAP_ERROR_RFMON_NOTSUP;
790                 }
791
792                 handle->stats_op = usb_stats_linux;
793                 handle->read_op = usb_read_linux;
794         }
795
796         /*
797          * "handle->fd" is a real file, so "select()" and "poll()"
798          * work on it.
799          */
800         handle->selectable_fd = handle->fd;
801
802         /* for plain binary access and text access we need to allocate the read
803          * buffer */
804         handle->buffer = malloc(handle->bufsize);
805         if (!handle->buffer) {
806                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
807                     errno, "malloc");
808                 close(handle->fd);
809                 return PCAP_ERROR;
810         }
811         return 0;
812 }
813
814 static inline int
815 ascii_to_int(char c)
816 {
817         return c < 'A' ? c- '0': ((c<'a') ? c - 'A' + 10: c-'a'+10);
818 }
819
820 /*
821  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
822  * <linux-kernel-source>/drivers/usb/mon/mon_text.c for urb string
823  * format description
824  */
825 static int
826 usb_read_linux(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
827 {
828         /* see:
829         * /usr/src/linux/Documentation/usb/usbmon.txt
830         * for message format
831         */
832         struct pcap_usb_linux *handlep = handle->priv;
833         unsigned timestamp;
834         int tag, cnt, ep_num, dev_addr, dummy, ret, urb_len, data_len;
835         char etype, pipeid1, pipeid2, status[16], urb_tag, line[USB_LINE_LEN];
836         char *string = line;
837         u_char * rawdata = handle->buffer;
838         struct pcap_pkthdr pkth;
839         pcap_usb_header* uhdr = (pcap_usb_header*)handle->buffer;
840         u_char urb_transfer=0;
841         int incoming=0;
842
843         /* ignore interrupt system call errors */
844         do {
845                 ret = read(handle->fd, line, USB_LINE_LEN - 1);
846                 if (handle->break_loop)
847                 {
848                         handle->break_loop = 0;
849                         return -2;
850                 }
851         } while ((ret == -1) && (errno == EINTR));
852         if (ret < 0)
853         {
854                 if (errno == EAGAIN)
855                         return 0;       /* no data there */
856
857                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
858                     errno, "Can't read from fd %d", handle->fd);
859                 return -1;
860         }
861
862         /* read urb header; %n argument may increment return value, but it's
863         * not mandatory, so does not count on it*/
864         string[ret] = 0;
865         ret = sscanf(string, "%x %d %c %c%c:%d:%d %s%n", &tag, &timestamp, &etype,
866                 &pipeid1, &pipeid2, &dev_addr, &ep_num, status,
867                 &cnt);
868         if (ret < 8)
869         {
870                 pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
871                     "Can't parse USB bus message '%s', too few tokens (expected 8 got %d)",
872                     string, ret);
873                 return -1;
874         }
875         uhdr->id = tag;
876         uhdr->device_address = dev_addr;
877         uhdr->bus_id = handlep->bus_index;
878         uhdr->status = 0;
879         string += cnt;
880
881         /* don't use usbmon provided timestamp, since it have low precision*/
882         if (gettimeofday(&pkth.ts, NULL) < 0)
883         {
884                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
885                     errno, "Can't get timestamp for message '%s'", string);
886                 return -1;
887         }
888         uhdr->ts_sec = pkth.ts.tv_sec;
889         uhdr->ts_usec = pkth.ts.tv_usec;
890
891         /* parse endpoint information */
892         if (pipeid1 == 'C')
893                 urb_transfer = URB_CONTROL;
894         else if (pipeid1 == 'Z')
895                 urb_transfer = URB_ISOCHRONOUS;
896         else if (pipeid1 == 'I')
897                 urb_transfer = URB_INTERRUPT;
898         else if (pipeid1 == 'B')
899                 urb_transfer = URB_BULK;
900         if (pipeid2 == 'i') {
901                 ep_num |= URB_TRANSFER_IN;
902                 incoming = 1;
903         }
904         if (etype == 'C')
905                 incoming = !incoming;
906
907         /* direction check*/
908         if (incoming)
909         {
910                 if (handle->direction == PCAP_D_OUT)
911                         return 0;
912         }
913         else
914                 if (handle->direction == PCAP_D_IN)
915                         return 0;
916         uhdr->event_type = etype;
917         uhdr->transfer_type = urb_transfer;
918         uhdr->endpoint_number = ep_num;
919         pkth.caplen = sizeof(pcap_usb_header);
920         rawdata += sizeof(pcap_usb_header);
921
922         /* check if this is a setup packet */
923         ret = sscanf(status, "%d", &dummy);
924         if (ret != 1)
925         {
926                 /* this a setup packet, setup data can be filled with underscore if
927                 * usbmon has not been able to read them, so we must parse this fields as
928                 * strings */
929                 pcap_usb_setup* shdr;
930                 char str1[3], str2[3], str3[5], str4[5], str5[5];
931                 ret = sscanf(string, "%s %s %s %s %s%n", str1, str2, str3, str4,
932                 str5, &cnt);
933                 if (ret < 5)
934                 {
935                         pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
936                                 "Can't parse USB bus message '%s', too few tokens (expected 5 got %d)",
937                                 string, ret);
938                         return -1;
939                 }
940                 string += cnt;
941
942                 /* try to convert to corresponding integer */
943                 shdr = &uhdr->setup;
944                 shdr->bmRequestType = strtoul(str1, 0, 16);
945                 shdr->bRequest = strtoul(str2, 0, 16);
946                 shdr->wValue = htols(strtoul(str3, 0, 16));
947                 shdr->wIndex = htols(strtoul(str4, 0, 16));
948                 shdr->wLength = htols(strtoul(str5, 0, 16));
949
950                 uhdr->setup_flag = 0;
951         }
952         else
953                 uhdr->setup_flag = 1;
954
955         /* read urb data */
956         ret = sscanf(string, " %d%n", &urb_len, &cnt);
957         if (ret < 1)
958         {
959                 pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
960                   "Can't parse urb length from '%s'", string);
961                 return -1;
962         }
963         string += cnt;
964
965         /* urb tag is not present if urb length is 0, so we can stop here
966          * text parsing */
967         pkth.len = urb_len+pkth.caplen;
968         uhdr->urb_len = urb_len;
969         uhdr->data_flag = 1;
970         data_len = 0;
971         if (uhdr->urb_len == 0)
972                 goto got;
973
974         /* check for data presence; data is present if and only if urb tag is '=' */
975         if (sscanf(string, " %c", &urb_tag) != 1)
976         {
977                 pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
978                         "Can't parse urb tag from '%s'", string);
979                 return -1;
980         }
981
982         if (urb_tag != '=')
983                 goto got;
984
985         /* skip urb tag and following space */
986         string += 3;
987
988         /* if we reach this point we got some urb data*/
989         uhdr->data_flag = 0;
990
991         /* read all urb data; if urb length is greater then the usbmon internal
992          * buffer length used by the kernel to spool the URB, we get only
993          * a partial information.
994          * At least until linux 2.6.17 there is no way to set usbmon intenal buffer
995          * length and default value is 130. */
996         while ((string[0] != 0) && (string[1] != 0) && (pkth.caplen < (bpf_u_int32)handle->snapshot))
997         {
998                 rawdata[0] = ascii_to_int(string[0]) * 16 + ascii_to_int(string[1]);
999                 rawdata++;
1000                 string+=2;
1001                 if (string[0] == ' ')
1002                         string++;
1003                 pkth.caplen++;
1004                 data_len++;
1005         }
1006
1007 got:
1008         uhdr->data_len = data_len;
1009         if (pkth.caplen > (bpf_u_int32)handle->snapshot)
1010                 pkth.caplen = (bpf_u_int32)handle->snapshot;
1011
1012         if (handle->fcode.bf_insns == NULL ||
1013             bpf_filter(handle->fcode.bf_insns, handle->buffer,
1014               pkth.len, pkth.caplen)) {
1015                 handlep->packets_read++;
1016                 callback(user, &pkth, handle->buffer);
1017                 return 1;
1018         }
1019         return 0;       /* didn't pass filter */
1020 }
1021
1022 static int
1023 usb_inject_linux(pcap_t *handle, const void *buf _U_, size_t size _U_)
1024 {
1025         pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1026             "Packet injection is not supported on USB devices");
1027         return (-1);
1028 }
1029
1030 static int
1031 usb_stats_linux(pcap_t *handle, struct pcap_stat *stats)
1032 {
1033         struct pcap_usb_linux *handlep = handle->priv;
1034         int dummy, ret, consumed, cnt;
1035         char string[USB_LINE_LEN];
1036         char token[USB_LINE_LEN];
1037         char * ptr = string;
1038         int fd;
1039
1040         pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR"/%ds", handlep->bus_index);
1041         fd = open(string, O_RDONLY, 0);
1042         if (fd < 0)
1043         {
1044                 if (errno == ENOENT)
1045                 {
1046                         /*
1047                          * Not found at the new location; try the old
1048                          * location.
1049                          */
1050                         pcap_snprintf(string, USB_LINE_LEN, USB_TEXT_DIR_OLD"/%ds", handlep->bus_index);
1051                         fd = open(string, O_RDONLY, 0);
1052                 }
1053                 if (fd < 0) {
1054                         pcap_fmt_errmsg_for_errno(handle->errbuf,
1055                             PCAP_ERRBUF_SIZE, errno,
1056                             "Can't open USB stats file %s", string);
1057                         return -1;
1058                 }
1059         }
1060
1061         /* read stats line */
1062         do {
1063                 ret = read(fd, string, USB_LINE_LEN-1);
1064         } while ((ret == -1) && (errno == EINTR));
1065         close(fd);
1066
1067         if (ret < 0)
1068         {
1069                 pcap_snprintf(handle->errbuf, PCAP_ERRBUF_SIZE,
1070                         "Can't read stats from fd %d ", fd);
1071                 return -1;
1072         }
1073         string[ret] = 0;
1074
1075         stats->ps_recv = handlep->packets_read;
1076         stats->ps_drop = 0;     /* unless we find text_lost */
1077         stats->ps_ifdrop = 0;
1078
1079         /* extract info on dropped urbs */
1080         for (consumed=0; consumed < ret; ) {
1081                 /* from the sscanf man page:
1082                  * The C standard says: "Execution of a %n directive does
1083                  * not increment the assignment count returned at the completion
1084                  * of  execution" but the Corrigendum seems to contradict this.
1085                  * Do not make any assumptions on the effect of %n conversions
1086                  * on the return value and explicitly check for cnt assignmet*/
1087                 int ntok;
1088
1089                 cnt = -1;
1090                 ntok = sscanf(ptr, "%s%n", token, &cnt);
1091                 if ((ntok < 1) || (cnt < 0))
1092                         break;
1093                 consumed += cnt;
1094                 ptr += cnt;
1095                 if (strcmp(token, "text_lost") == 0)
1096                         ntok = sscanf(ptr, "%d%n", &stats->ps_drop, &cnt);
1097                 else
1098                         ntok = sscanf(ptr, "%d%n", &dummy, &cnt);
1099                 if ((ntok != 1) || (cnt < 0))
1100                         break;
1101                 consumed += cnt;
1102                 ptr += cnt;
1103         }
1104
1105         return 0;
1106 }
1107
1108 static int
1109 usb_setdirection_linux(pcap_t *p, pcap_direction_t d)
1110 {
1111         p->direction = d;
1112         return 0;
1113 }
1114
1115
1116 static int
1117 usb_stats_linux_bin(pcap_t *handle, struct pcap_stat *stats)
1118 {
1119         struct pcap_usb_linux *handlep = handle->priv;
1120         int ret;
1121         struct mon_bin_stats st;
1122         ret = ioctl(handle->fd, MON_IOCG_STATS, &st);
1123         if (ret < 0)
1124         {
1125                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1126                     errno, "Can't read stats from fd %d", handle->fd);
1127                 return -1;
1128         }
1129
1130         stats->ps_recv = handlep->packets_read + st.queued;
1131         stats->ps_drop = st.dropped;
1132         stats->ps_ifdrop = 0;
1133         return 0;
1134 }
1135
1136 /*
1137  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1138  * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1139  */
1140 static int
1141 usb_read_linux_bin(pcap_t *handle, int max_packets _U_, pcap_handler callback, u_char *user)
1142 {
1143         struct pcap_usb_linux *handlep = handle->priv;
1144         struct mon_bin_get info;
1145         int ret;
1146         struct pcap_pkthdr pkth;
1147         u_int clen = handle->snapshot - sizeof(pcap_usb_header);
1148
1149         /* the usb header is going to be part of 'packet' data*/
1150         info.hdr = (pcap_usb_header*) handle->buffer;
1151         info.data = (u_char *)handle->buffer + sizeof(pcap_usb_header);
1152         info.data_len = clen;
1153
1154         /* ignore interrupt system call errors */
1155         do {
1156                 ret = ioctl(handle->fd, MON_IOCX_GET, &info);
1157                 if (handle->break_loop)
1158                 {
1159                         handle->break_loop = 0;
1160                         return -2;
1161                 }
1162         } while ((ret == -1) && (errno == EINTR));
1163         if (ret < 0)
1164         {
1165                 if (errno == EAGAIN)
1166                         return 0;       /* no data there */
1167
1168                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1169                     errno, "Can't read from fd %d", handle->fd);
1170                 return -1;
1171         }
1172
1173         /*
1174          * info.hdr->data_len is the number of bytes of isochronous
1175          * descriptors (if any) plus the number of bytes of data
1176          * provided.  There are no isochronous descriptors here,
1177          * because we're using the old 48-byte header.
1178          *
1179          * If info.hdr->data_flag is non-zero, there's no URB data;
1180          * info.hdr->urb_len is the size of the buffer into which
1181          * data is to be placed; it does not represent the amount
1182          * of data transferred.  If info.hdr->data_flag is zero,
1183          * there is URB data, and info.hdr->urb_len is the number
1184          * of bytes transmitted or received; it doesn't include
1185          * isochronous descriptors.
1186          *
1187          * The kernel may give us more data than the snaplen; if it did,
1188          * reduce the data length so that the total number of bytes we
1189          * tell our client we have is not greater than the snaplen.
1190          */
1191         if (info.hdr->data_len < clen)
1192                 clen = info.hdr->data_len;
1193         info.hdr->data_len = clen;
1194         pkth.caplen = sizeof(pcap_usb_header) + clen;
1195         if (info.hdr->data_flag) {
1196                 /*
1197                  * No data; just base the on-the-wire length on
1198                  * info.hdr->data_len (so that it's >= the captured
1199                  * length).
1200                  */
1201                 pkth.len = sizeof(pcap_usb_header) + info.hdr->data_len;
1202         } else {
1203                 /*
1204                  * We got data; base the on-the-wire length on
1205                  * info.hdr->urb_len, so that it includes data
1206                  * discarded by the USB monitor device due to
1207                  * its buffer being too small.
1208                  */
1209                 pkth.len = sizeof(pcap_usb_header) + info.hdr->urb_len;
1210         }
1211         pkth.ts.tv_sec = info.hdr->ts_sec;
1212         pkth.ts.tv_usec = info.hdr->ts_usec;
1213
1214         if (handle->fcode.bf_insns == NULL ||
1215             bpf_filter(handle->fcode.bf_insns, handle->buffer,
1216               pkth.len, pkth.caplen)) {
1217                 handlep->packets_read++;
1218                 callback(user, &pkth, handle->buffer);
1219                 return 1;
1220         }
1221
1222         return 0;       /* didn't pass filter */
1223 }
1224
1225 /*
1226  * see <linux-kernel-source>/Documentation/usb/usbmon.txt and
1227  * <linux-kernel-source>/drivers/usb/mon/mon_bin.c binary ABI
1228  */
1229 #define VEC_SIZE 32
1230 static int
1231 usb_read_linux_mmap(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user)
1232 {
1233         struct pcap_usb_linux *handlep = handle->priv;
1234         struct mon_bin_mfetch fetch;
1235         int32_t vec[VEC_SIZE];
1236         struct pcap_pkthdr pkth;
1237         pcap_usb_header_mmapped* hdr;
1238         int nflush = 0;
1239         int packets = 0;
1240         u_int clen, max_clen;
1241
1242         max_clen = handle->snapshot - sizeof(pcap_usb_header_mmapped);
1243
1244         for (;;) {
1245                 int i, ret;
1246                 int limit = max_packets - packets;
1247                 if (limit <= 0)
1248                         limit = VEC_SIZE;
1249                 if (limit > VEC_SIZE)
1250                         limit = VEC_SIZE;
1251
1252                 /* try to fetch as many events as possible*/
1253                 fetch.offvec = vec;
1254                 fetch.nfetch = limit;
1255                 fetch.nflush = nflush;
1256                 /* ignore interrupt system call errors */
1257                 do {
1258                         ret = ioctl(handle->fd, MON_IOCX_MFETCH, &fetch);
1259                         if (handle->break_loop)
1260                         {
1261                                 handle->break_loop = 0;
1262                                 return -2;
1263                         }
1264                 } while ((ret == -1) && (errno == EINTR));
1265                 if (ret < 0)
1266                 {
1267                         if (errno == EAGAIN)
1268                                 return 0;       /* no data there */
1269
1270                         pcap_fmt_errmsg_for_errno(handle->errbuf,
1271                             PCAP_ERRBUF_SIZE, errno, "Can't mfetch fd %d",
1272                             handle->fd);
1273                         return -1;
1274                 }
1275
1276                 /* keep track of processed events, we will flush them later */
1277                 nflush = fetch.nfetch;
1278                 for (i=0; i<fetch.nfetch; ++i) {
1279                         /* discard filler */
1280                         hdr = (pcap_usb_header_mmapped*) &handlep->mmapbuf[vec[i]];
1281                         if (hdr->event_type == '@')
1282                                 continue;
1283
1284                         /*
1285                          * hdr->data_len is the number of bytes of
1286                          * isochronous descriptors (if any) plus the
1287                          * number of bytes of data provided.
1288                          *
1289                          * If hdr->data_flag is non-zero, there's no
1290                          * URB data; hdr->urb_len is the size of the
1291                          * buffer into which data is to be placed; it does
1292                          * not represent the amount of data transferred.
1293                          * If hdr->data_flag is zero, there is URB data,
1294                          * and hdr->urb_len is the number of bytes
1295                          * transmitted or received; it doesn't include
1296                          * isochronous descriptors.
1297                          *
1298                          * The kernel may give us more data than the
1299                          * snaplen; if it did, reduce the data length
1300                          * so that the total number of bytes we
1301                          * tell our client we have is not greater than
1302                          * the snaplen.
1303                          */
1304                         clen = max_clen;
1305                         if (hdr->data_len < clen)
1306                                 clen = hdr->data_len;
1307                         pkth.caplen = sizeof(pcap_usb_header_mmapped) + clen;
1308                         if (hdr->data_flag) {
1309                                 /*
1310                                  * No data; just base the on-the-wire length
1311                                  * on hdr->data_len (so that it's >= the
1312                                  * captured length).
1313                                  */
1314                                 pkth.len = sizeof(pcap_usb_header_mmapped) +
1315                                     hdr->data_len;
1316                         } else {
1317                                 /*
1318                                  * We got data; base the on-the-wire length
1319                                  * on hdr->urb_len, so that it includes
1320                                  * data discarded by the USB monitor device
1321                                  * due to its buffer being too small.
1322                                  */
1323                                 pkth.len = sizeof(pcap_usb_header_mmapped) +
1324                                     (hdr->ndesc * sizeof (usb_isodesc)) + hdr->urb_len;
1325                         }
1326                         pkth.ts.tv_sec = hdr->ts_sec;
1327                         pkth.ts.tv_usec = hdr->ts_usec;
1328
1329                         if (handle->fcode.bf_insns == NULL ||
1330                             bpf_filter(handle->fcode.bf_insns, (u_char*) hdr,
1331                               pkth.len, pkth.caplen)) {
1332                                 handlep->packets_read++;
1333                                 callback(user, &pkth, (u_char*) hdr);
1334                                 packets++;
1335                         }
1336                 }
1337
1338                 /* with max_packets specifying "unlimited" we stop afer the first chunk*/
1339                 if (PACKET_COUNT_IS_UNLIMITED(max_packets) || (packets == max_packets))
1340                         break;
1341         }
1342
1343         /* flush pending events*/
1344         if (ioctl(handle->fd, MON_IOCH_MFLUSH, nflush) == -1) {
1345                 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE,
1346                     errno, "Can't mflush fd %d", handle->fd);
1347                 return -1;
1348         }
1349         return packets;
1350 }
1351
1352 static void
1353 usb_cleanup_linux_mmap(pcap_t* handle)
1354 {
1355         struct pcap_usb_linux *handlep = handle->priv;
1356
1357         /* if we have a memory-mapped buffer, unmap it */
1358         if (handlep->mmapbuf != NULL) {
1359                 munmap(handlep->mmapbuf, handlep->mmapbuflen);
1360                 handlep->mmapbuf = NULL;
1361         }
1362         pcap_cleanup_live_common(handle);
1363 }