iwcap.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. /*
  2. * iwcap.c - A simply radiotap capture utility outputting pcap dumps
  3. *
  4. * Copyright 2012 Jo-Philipp Wich <[email protected]>
  5. *
  6. * Licensed under the Apache License, Version 2.0 (the "License");
  7. * you may not use this file except in compliance with the License.
  8. * You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. *
  18. */
  19. #include <stdio.h>
  20. #include <stdint.h>
  21. #include <stdlib.h>
  22. #include <stdarg.h>
  23. #include <unistd.h>
  24. #include <string.h>
  25. #include <signal.h>
  26. #include <syslog.h>
  27. #include <errno.h>
  28. #include <sys/stat.h>
  29. #include <sys/time.h>
  30. #include <sys/ioctl.h>
  31. #include <sys/socket.h>
  32. #include <net/ethernet.h>
  33. #include <net/if.h>
  34. #include <netinet/in.h>
  35. #include <linux/if_packet.h>
  36. #define ARPHRD_IEEE80211_RADIOTAP 803
  37. #define DLT_IEEE802_11_RADIO 127
  38. #define LEN_IEEE802_11_HDR 32
  39. #define FRAMETYPE_MASK 0xFC
  40. #define FRAMETYPE_BEACON 0x80
  41. #define FRAMETYPE_DATA 0x08
  42. #if __BYTE_ORDER == __BIG_ENDIAN
  43. #define le16(x) __bswap_16(x)
  44. #else
  45. #define le16(x) (x)
  46. #endif
  47. uint8_t run_dump = 0;
  48. uint8_t run_stop = 0;
  49. uint8_t run_daemon = 0;
  50. uint32_t frames_captured = 0;
  51. uint32_t frames_filtered = 0;
  52. int capture_sock = -1;
  53. const char *ifname = NULL;
  54. struct ringbuf {
  55. uint32_t len; /* number of slots */
  56. uint32_t fill; /* last used slot */
  57. uint32_t slen; /* slot size */
  58. void *buf; /* ring memory */
  59. };
  60. struct ringbuf_entry {
  61. uint32_t len; /* used slot memory */
  62. uint32_t olen; /* original data size */
  63. uint32_t sec; /* epoch of slot creation */
  64. uint32_t usec; /* epoch microseconds */
  65. };
  66. typedef struct pcap_hdr_s {
  67. uint32_t magic_number; /* magic number */
  68. uint16_t version_major; /* major version number */
  69. uint16_t version_minor; /* minor version number */
  70. int32_t thiszone; /* GMT to local correction */
  71. uint32_t sigfigs; /* accuracy of timestamps */
  72. uint32_t snaplen; /* max length of captured packets, in octets */
  73. uint32_t network; /* data link type */
  74. } pcap_hdr_t;
  75. typedef struct pcaprec_hdr_s {
  76. uint32_t ts_sec; /* timestamp seconds */
  77. uint32_t ts_usec; /* timestamp microseconds */
  78. uint32_t incl_len; /* number of octets of packet saved in file */
  79. uint32_t orig_len; /* actual length of packet */
  80. } pcaprec_hdr_t;
  81. typedef struct ieee80211_radiotap_header {
  82. u_int8_t it_version; /* set to 0 */
  83. u_int8_t it_pad;
  84. u_int16_t it_len; /* entire length */
  85. u_int32_t it_present; /* fields present */
  86. } __attribute__((__packed__)) radiotap_hdr_t;
  87. int check_type(void)
  88. {
  89. struct ifreq ifr;
  90. strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
  91. if (ioctl(capture_sock, SIOCGIFHWADDR, &ifr) < 0)
  92. return -1;
  93. return (ifr.ifr_hwaddr.sa_family == ARPHRD_IEEE80211_RADIOTAP);
  94. }
  95. int set_promisc(int on)
  96. {
  97. struct ifreq ifr;
  98. strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
  99. if (ioctl(capture_sock, SIOCGIFFLAGS, &ifr) < 0)
  100. return -1;
  101. if (on && !(ifr.ifr_flags & IFF_PROMISC))
  102. {
  103. ifr.ifr_flags |= IFF_PROMISC;
  104. if (ioctl(capture_sock, SIOCSIFFLAGS, &ifr))
  105. return -1;
  106. return 1;
  107. }
  108. else if (!on && (ifr.ifr_flags & IFF_PROMISC))
  109. {
  110. ifr.ifr_flags &= ~IFF_PROMISC;
  111. if (ioctl(capture_sock, SIOCSIFFLAGS, &ifr))
  112. return -1;
  113. return 1;
  114. }
  115. return 0;
  116. }
  117. void sig_dump(int sig)
  118. {
  119. run_dump = 1;
  120. }
  121. void sig_teardown(int sig)
  122. {
  123. run_stop = 1;
  124. }
  125. void write_pcap_header(FILE *o)
  126. {
  127. pcap_hdr_t ghdr = {
  128. .magic_number = 0xa1b2c3d4,
  129. .version_major = 2,
  130. .version_minor = 4,
  131. .thiszone = 0,
  132. .sigfigs = 0,
  133. .snaplen = 0xFFFF,
  134. .network = DLT_IEEE802_11_RADIO
  135. };
  136. fwrite(&ghdr, 1, sizeof(ghdr), o);
  137. }
  138. void write_pcap_frame(FILE *o, uint32_t *sec, uint32_t *usec,
  139. uint16_t len, uint16_t olen)
  140. {
  141. struct timeval tv;
  142. pcaprec_hdr_t fhdr;
  143. if (!sec || !usec)
  144. {
  145. gettimeofday(&tv, NULL);
  146. }
  147. else
  148. {
  149. tv.tv_sec = *sec;
  150. tv.tv_usec = *usec;
  151. }
  152. fhdr.ts_sec = tv.tv_sec;
  153. fhdr.ts_usec = tv.tv_usec;
  154. fhdr.incl_len = len;
  155. fhdr.orig_len = olen;
  156. fwrite(&fhdr, 1, sizeof(fhdr), o);
  157. }
  158. struct ringbuf * ringbuf_init(uint32_t num_item, uint16_t len_item)
  159. {
  160. static struct ringbuf r;
  161. if (len_item <= 0)
  162. return NULL;
  163. r.buf = malloc(num_item * (len_item + sizeof(struct ringbuf_entry)));
  164. if (r.buf)
  165. {
  166. r.len = num_item;
  167. r.fill = 0;
  168. r.slen = (len_item + sizeof(struct ringbuf_entry));
  169. memset(r.buf, 0, num_item * len_item);
  170. return &r;
  171. }
  172. return NULL;
  173. }
  174. struct ringbuf_entry * ringbuf_add(struct ringbuf *r)
  175. {
  176. struct timeval t;
  177. struct ringbuf_entry *e;
  178. gettimeofday(&t, NULL);
  179. e = r->buf + (r->fill++ * r->slen);
  180. r->fill %= r->len;
  181. memset(e, 0, r->slen);
  182. e->sec = t.tv_sec;
  183. e->usec = t.tv_usec;
  184. return e;
  185. }
  186. struct ringbuf_entry * ringbuf_get(struct ringbuf *r, int i)
  187. {
  188. struct ringbuf_entry *e = r->buf + (((r->fill + i) % r->len) * r->slen);
  189. if (e->len > 0)
  190. return e;
  191. return NULL;
  192. }
  193. void ringbuf_free(struct ringbuf *r)
  194. {
  195. free(r->buf);
  196. memset(r, 0, sizeof(*r));
  197. }
  198. void msg(const char *fmt, ...)
  199. {
  200. va_list ap;
  201. va_start(ap, fmt);
  202. if (run_daemon)
  203. vsyslog(LOG_INFO | LOG_USER, fmt, ap);
  204. else
  205. vfprintf(stderr, fmt, ap);
  206. va_end(ap);
  207. }
  208. int main(int argc, char **argv)
  209. {
  210. int i, n;
  211. struct ringbuf *ring;
  212. struct ringbuf_entry *e;
  213. struct sockaddr_ll local = {
  214. .sll_family = AF_PACKET,
  215. .sll_protocol = htons(ETH_P_ALL)
  216. };
  217. radiotap_hdr_t *rhdr;
  218. uint8_t frametype;
  219. uint8_t pktbuf[0xFFFF];
  220. ssize_t pktlen;
  221. FILE *o;
  222. int opt;
  223. uint8_t promisc = 0;
  224. uint8_t streaming = 0;
  225. uint8_t foreground = 0;
  226. uint8_t filter_data = 0;
  227. uint8_t filter_beacon = 0;
  228. uint8_t header_written = 0;
  229. uint32_t ringsz = 1024 * 1024; /* 1 Mbyte ring buffer */
  230. uint16_t pktcap = 256; /* truncate frames after 265KB */
  231. const char *output = NULL;
  232. while ((opt = getopt(argc, argv, "i:r:c:o:sfhBD")) != -1)
  233. {
  234. switch (opt)
  235. {
  236. case 'i':
  237. ifname = optarg;
  238. if (!(local.sll_ifindex = if_nametoindex(ifname)))
  239. {
  240. msg("Unknown interface '%s'\n", ifname);
  241. return 2;
  242. }
  243. break;
  244. case 'r':
  245. ringsz = atoi(optarg);
  246. if (ringsz < (3 * pktcap))
  247. {
  248. msg("Ring size of %d bytes is too short, "
  249. "must be at least %d bytes\n", ringsz, 3 * pktcap);
  250. return 3;
  251. }
  252. break;
  253. case 'c':
  254. pktcap = atoi(optarg);
  255. if (pktcap <= (sizeof(radiotap_hdr_t) + LEN_IEEE802_11_HDR))
  256. {
  257. msg("Packet truncate after %d bytes is too short, "
  258. "must be at least %d bytes\n",
  259. pktcap, sizeof(radiotap_hdr_t) + LEN_IEEE802_11_HDR);
  260. return 4;
  261. }
  262. break;
  263. case 's':
  264. streaming = 1;
  265. break;
  266. case 'o':
  267. output = optarg;
  268. break;
  269. case 'B':
  270. filter_beacon = 1;
  271. break;
  272. case 'D':
  273. filter_data = 1;
  274. break;
  275. case 'f':
  276. foreground = 1;
  277. break;
  278. case 'h':
  279. msg(
  280. "Usage:\n"
  281. " %s -i {iface} -s [-b] [-d]\n"
  282. " %s -i {iface} -o {file} [-r len] [-c len] [-B] [-D] [-f]\n"
  283. "\n"
  284. " -i iface\n"
  285. " Specify interface to use, must be in monitor mode and\n"
  286. " produce IEEE 802.11 Radiotap headers.\n\n"
  287. " -s\n"
  288. " Stream to stdout instead of Dumping to file on USR1.\n\n"
  289. " -o file\n"
  290. " Write current ringbuffer contents to given output file\n"
  291. " on receipt of SIGUSR1.\n\n"
  292. " -r len\n"
  293. " Specify the amount of bytes to use for the ringbuffer.\n"
  294. " The default length is %d bytes.\n\n"
  295. " -c len\n"
  296. " Truncate captured packets after given amount of bytes.\n"
  297. " The default size limit is %d bytes.\n\n"
  298. " -B\n"
  299. " Don't store beacon frames in ring, default is keep.\n\n"
  300. " -D\n"
  301. " Don't store data frames in ring, default is keep.\n\n"
  302. " -f\n"
  303. " Do not daemonize but keep running in foreground.\n\n"
  304. " -h\n"
  305. " Display this help.\n\n",
  306. argv[0], argv[0], ringsz, pktcap);
  307. return 1;
  308. }
  309. }
  310. if (!streaming && !output)
  311. {
  312. msg("No output file specified\n");
  313. return 1;
  314. }
  315. if (streaming && output)
  316. {
  317. msg("The -s and -o options are exclusive\n");
  318. return 1;
  319. }
  320. if (streaming && isatty(1))
  321. {
  322. msg("Refusing to stream into a terminal\n");
  323. return 1;
  324. }
  325. if (!local.sll_ifindex)
  326. {
  327. msg("No interface specified\n");
  328. return 2;
  329. }
  330. if (!check_type())
  331. {
  332. msg("Bad interface: not ARPHRD_IEEE80211_RADIOTAP\n");
  333. return 2;
  334. }
  335. if ((capture_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL))) < 0)
  336. {
  337. msg("Unable to create raw socket: %s\n",
  338. strerror(errno));
  339. return 6;
  340. }
  341. if (bind(capture_sock, (struct sockaddr *)&local, sizeof(local)) == -1)
  342. {
  343. msg("Unable to bind to interface: %s\n",
  344. strerror(errno));
  345. return 7;
  346. }
  347. if (!streaming)
  348. {
  349. if (!foreground)
  350. {
  351. switch (fork())
  352. {
  353. case -1:
  354. msg("Unable to fork: %s\n", strerror(errno));
  355. return 8;
  356. case 0:
  357. umask(0077);
  358. chdir("/");
  359. freopen("/dev/null", "r", stdin);
  360. freopen("/dev/null", "w", stdout);
  361. freopen("/dev/null", "w", stderr);
  362. run_daemon = 1;
  363. break;
  364. default:
  365. msg("Daemon launched ...\n");
  366. return 0;
  367. }
  368. }
  369. msg("Monitoring interface %s ...\n", ifname);
  370. if (!(ring = ringbuf_init(ringsz / pktcap, pktcap)))
  371. {
  372. msg("Unable to allocate ring buffer: %s\n",
  373. strerror(errno));
  374. return 5;
  375. }
  376. msg(" * Using %d bytes ringbuffer with %d slots\n", ringsz, ring->len);
  377. msg(" * Truncating frames at %d bytes\n", pktcap);
  378. msg(" * Dumping data to file %s\n", output);
  379. signal(SIGUSR1, sig_dump);
  380. }
  381. else
  382. {
  383. msg("Monitoring interface %s ...\n", ifname);
  384. msg(" * Streaming data to stdout\n");
  385. }
  386. msg(" * Beacon frames are %sfiltered\n", filter_beacon ? "" : "not ");
  387. msg(" * Data frames are %sfiltered\n", filter_data ? "" : "not ");
  388. signal(SIGINT, sig_teardown);
  389. signal(SIGTERM, sig_teardown);
  390. promisc = set_promisc(1);
  391. /* capture loop */
  392. while (1)
  393. {
  394. if (run_stop)
  395. {
  396. msg("Shutting down ...\n");
  397. if (promisc)
  398. set_promisc(0);
  399. if (ring)
  400. ringbuf_free(ring);
  401. return 0;
  402. }
  403. else if (run_dump)
  404. {
  405. msg("Dumping ring to %s ...\n", output);
  406. if (!(o = fopen(output, "w")))
  407. {
  408. msg("Unable to open %s: %s\n",
  409. output, strerror(errno));
  410. }
  411. else
  412. {
  413. write_pcap_header(o);
  414. /* sig_dump packet buffer */
  415. for (i = 0, n = 0; i < ring->len; i++)
  416. {
  417. if (!(e = ringbuf_get(ring, i)))
  418. continue;
  419. write_pcap_frame(o, &(e->sec), &(e->usec), e->len, e->olen);
  420. fwrite((void *)e + sizeof(*e), 1, e->len, o);
  421. n++;
  422. }
  423. fclose(o);
  424. msg(" * %d frames captured\n", frames_captured);
  425. msg(" * %d frames filtered\n", frames_filtered);
  426. msg(" * %d frames dumped\n", n);
  427. }
  428. run_dump = 0;
  429. }
  430. pktlen = recvfrom(capture_sock, pktbuf, sizeof(pktbuf), 0, NULL, 0);
  431. frames_captured++;
  432. /* check received frametype, if we should filter it, rewind the ring */
  433. rhdr = (radiotap_hdr_t *)pktbuf;
  434. if (pktlen <= sizeof(radiotap_hdr_t) || le16(rhdr->it_len) >= pktlen)
  435. {
  436. frames_filtered++;
  437. continue;
  438. }
  439. frametype = *(uint8_t *)(pktbuf + le16(rhdr->it_len));
  440. if ((filter_data && (frametype & FRAMETYPE_MASK) == FRAMETYPE_DATA) ||
  441. (filter_beacon && (frametype & FRAMETYPE_MASK) == FRAMETYPE_BEACON))
  442. {
  443. frames_filtered++;
  444. continue;
  445. }
  446. if (streaming)
  447. {
  448. if (!header_written)
  449. {
  450. write_pcap_header(stdout);
  451. header_written = 1;
  452. }
  453. write_pcap_frame(stdout, NULL, NULL, pktlen, pktlen);
  454. fwrite(pktbuf, 1, pktlen, stdout);
  455. fflush(stdout);
  456. }
  457. else
  458. {
  459. e = ringbuf_add(ring);
  460. e->olen = pktlen;
  461. e->len = (pktlen > pktcap) ? pktcap : pktlen;
  462. memcpy((void *)e + sizeof(*e), pktbuf, e->len);
  463. }
  464. }
  465. return 0;
  466. }