iwcap.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583
  1. /*
  2. * iwcap.c - A simply radiotap capture utility outputting pcap dumps
  3. *
  4. * Copyright 2012 Jo-Philipp Wich <[email protected]>
  5. *
  6. * Licensed under the Apache License, Version 2.0 (the "License");
  7. * you may not use this file except in compliance with the License.
  8. * You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. *
  18. */
  19. #include <stdio.h>
  20. #include <stdint.h>
  21. #include <stdlib.h>
  22. #include <stdarg.h>
  23. #include <unistd.h>
  24. #include <string.h>
  25. #include <signal.h>
  26. #include <syslog.h>
  27. #include <errno.h>
  28. #include <byteswap.h>
  29. #include <sys/stat.h>
  30. #include <sys/time.h>
  31. #include <sys/ioctl.h>
  32. #include <sys/socket.h>
  33. #include <net/ethernet.h>
  34. #include <net/if.h>
  35. #include <netinet/in.h>
  36. #include <linux/if_packet.h>
  37. #define ARPHRD_IEEE80211_RADIOTAP 803
  38. #define DLT_IEEE802_11_RADIO 127
  39. #define LEN_IEEE802_11_HDR 32
  40. #define FRAMETYPE_MASK 0xFC
  41. #define FRAMETYPE_BEACON 0x80
  42. #define FRAMETYPE_DATA 0x08
  43. #if __BYTE_ORDER == __BIG_ENDIAN
  44. #define le16(x) __bswap_16(x)
  45. #else
  46. #define le16(x) (x)
  47. #endif
  48. uint8_t run_dump = 0;
  49. uint8_t run_stop = 0;
  50. uint8_t run_daemon = 0;
  51. uint32_t frames_captured = 0;
  52. uint32_t frames_filtered = 0;
  53. int capture_sock = -1;
  54. const char *ifname = NULL;
  55. struct ringbuf {
  56. uint32_t len; /* number of slots */
  57. uint32_t fill; /* last used slot */
  58. uint32_t slen; /* slot size */
  59. void *buf; /* ring memory */
  60. };
  61. struct ringbuf_entry {
  62. uint32_t len; /* used slot memory */
  63. uint32_t olen; /* original data size */
  64. uint32_t sec; /* epoch of slot creation */
  65. uint32_t usec; /* epoch microseconds */
  66. };
  67. typedef struct pcap_hdr_s {
  68. uint32_t magic_number; /* magic number */
  69. uint16_t version_major; /* major version number */
  70. uint16_t version_minor; /* minor version number */
  71. int32_t thiszone; /* GMT to local correction */
  72. uint32_t sigfigs; /* accuracy of timestamps */
  73. uint32_t snaplen; /* max length of captured packets, in octets */
  74. uint32_t network; /* data link type */
  75. } pcap_hdr_t;
  76. typedef struct pcaprec_hdr_s {
  77. uint32_t ts_sec; /* timestamp seconds */
  78. uint32_t ts_usec; /* timestamp microseconds */
  79. uint32_t incl_len; /* number of octets of packet saved in file */
  80. uint32_t orig_len; /* actual length of packet */
  81. } pcaprec_hdr_t;
  82. typedef struct ieee80211_radiotap_header {
  83. u_int8_t it_version; /* set to 0 */
  84. u_int8_t it_pad;
  85. u_int16_t it_len; /* entire length */
  86. u_int32_t it_present; /* fields present */
  87. } __attribute__((__packed__)) radiotap_hdr_t;
  88. int check_type(void)
  89. {
  90. struct ifreq ifr;
  91. strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
  92. if (ioctl(capture_sock, SIOCGIFHWADDR, &ifr) < 0)
  93. return -1;
  94. return (ifr.ifr_hwaddr.sa_family == ARPHRD_IEEE80211_RADIOTAP);
  95. }
  96. int set_promisc(int on)
  97. {
  98. struct ifreq ifr;
  99. strncpy(ifr.ifr_name, ifname, IFNAMSIZ);
  100. if (ioctl(capture_sock, SIOCGIFFLAGS, &ifr) < 0)
  101. return -1;
  102. if (on && !(ifr.ifr_flags & IFF_PROMISC))
  103. {
  104. ifr.ifr_flags |= IFF_PROMISC;
  105. if (ioctl(capture_sock, SIOCSIFFLAGS, &ifr))
  106. return -1;
  107. return 1;
  108. }
  109. else if (!on && (ifr.ifr_flags & IFF_PROMISC))
  110. {
  111. ifr.ifr_flags &= ~IFF_PROMISC;
  112. if (ioctl(capture_sock, SIOCSIFFLAGS, &ifr))
  113. return -1;
  114. return 1;
  115. }
  116. return 0;
  117. }
  118. void sig_dump(int sig)
  119. {
  120. run_dump = 1;
  121. }
  122. void sig_teardown(int sig)
  123. {
  124. run_stop = 1;
  125. }
  126. void write_pcap_header(FILE *o)
  127. {
  128. pcap_hdr_t ghdr = {
  129. .magic_number = 0xa1b2c3d4,
  130. .version_major = 2,
  131. .version_minor = 4,
  132. .thiszone = 0,
  133. .sigfigs = 0,
  134. .snaplen = 0xFFFF,
  135. .network = DLT_IEEE802_11_RADIO
  136. };
  137. fwrite(&ghdr, 1, sizeof(ghdr), o);
  138. }
  139. void write_pcap_frame(FILE *o, uint32_t *sec, uint32_t *usec,
  140. uint16_t len, uint16_t olen)
  141. {
  142. struct timeval tv;
  143. pcaprec_hdr_t fhdr;
  144. if (!sec || !usec)
  145. {
  146. gettimeofday(&tv, NULL);
  147. }
  148. else
  149. {
  150. tv.tv_sec = *sec;
  151. tv.tv_usec = *usec;
  152. }
  153. fhdr.ts_sec = tv.tv_sec;
  154. fhdr.ts_usec = tv.tv_usec;
  155. fhdr.incl_len = len;
  156. fhdr.orig_len = olen;
  157. fwrite(&fhdr, 1, sizeof(fhdr), o);
  158. }
  159. struct ringbuf * ringbuf_init(uint32_t num_item, uint16_t len_item)
  160. {
  161. static struct ringbuf r;
  162. if (len_item <= 0)
  163. return NULL;
  164. r.buf = malloc(num_item * (len_item + sizeof(struct ringbuf_entry)));
  165. if (r.buf)
  166. {
  167. r.len = num_item;
  168. r.fill = 0;
  169. r.slen = (len_item + sizeof(struct ringbuf_entry));
  170. memset(r.buf, 0, num_item * len_item);
  171. return &r;
  172. }
  173. return NULL;
  174. }
  175. struct ringbuf_entry * ringbuf_add(struct ringbuf *r)
  176. {
  177. struct timeval t;
  178. struct ringbuf_entry *e;
  179. gettimeofday(&t, NULL);
  180. e = r->buf + (r->fill++ * r->slen);
  181. r->fill %= r->len;
  182. memset(e, 0, r->slen);
  183. e->sec = t.tv_sec;
  184. e->usec = t.tv_usec;
  185. return e;
  186. }
  187. struct ringbuf_entry * ringbuf_get(struct ringbuf *r, int i)
  188. {
  189. struct ringbuf_entry *e = r->buf + (((r->fill + i) % r->len) * r->slen);
  190. if (e->len > 0)
  191. return e;
  192. return NULL;
  193. }
  194. void ringbuf_free(struct ringbuf *r)
  195. {
  196. free(r->buf);
  197. memset(r, 0, sizeof(*r));
  198. }
  199. void msg(const char *fmt, ...)
  200. {
  201. va_list ap;
  202. va_start(ap, fmt);
  203. if (run_daemon)
  204. vsyslog(LOG_INFO | LOG_USER, fmt, ap);
  205. else
  206. vfprintf(stderr, fmt, ap);
  207. va_end(ap);
  208. }
  209. int main(int argc, char **argv)
  210. {
  211. int i, n;
  212. struct ringbuf *ring;
  213. struct ringbuf_entry *e;
  214. struct sockaddr_ll local = {
  215. .sll_family = AF_PACKET,
  216. .sll_protocol = htons(ETH_P_ALL)
  217. };
  218. radiotap_hdr_t *rhdr;
  219. uint8_t frametype;
  220. uint8_t pktbuf[0xFFFF];
  221. ssize_t pktlen;
  222. FILE *o;
  223. int opt;
  224. uint8_t promisc = 0;
  225. uint8_t streaming = 0;
  226. uint8_t foreground = 0;
  227. uint8_t filter_data = 0;
  228. uint8_t filter_beacon = 0;
  229. uint8_t header_written = 0;
  230. uint32_t ringsz = 1024 * 1024; /* 1 Mbyte ring buffer */
  231. uint16_t pktcap = 256; /* truncate frames after 265KB */
  232. const char *output = NULL;
  233. while ((opt = getopt(argc, argv, "i:r:c:o:sfhBD")) != -1)
  234. {
  235. switch (opt)
  236. {
  237. case 'i':
  238. ifname = optarg;
  239. if (!(local.sll_ifindex = if_nametoindex(ifname)))
  240. {
  241. msg("Unknown interface '%s'\n", ifname);
  242. return 2;
  243. }
  244. break;
  245. case 'r':
  246. ringsz = atoi(optarg);
  247. if (ringsz < (3 * pktcap))
  248. {
  249. msg("Ring size of %d bytes is too short, "
  250. "must be at least %d bytes\n", ringsz, 3 * pktcap);
  251. return 3;
  252. }
  253. break;
  254. case 'c':
  255. pktcap = atoi(optarg);
  256. if (pktcap <= (sizeof(radiotap_hdr_t) + LEN_IEEE802_11_HDR))
  257. {
  258. msg("Packet truncate after %d bytes is too short, "
  259. "must be at least %d bytes\n",
  260. pktcap, sizeof(radiotap_hdr_t) + LEN_IEEE802_11_HDR);
  261. return 4;
  262. }
  263. break;
  264. case 's':
  265. streaming = 1;
  266. break;
  267. case 'o':
  268. output = optarg;
  269. break;
  270. case 'B':
  271. filter_beacon = 1;
  272. break;
  273. case 'D':
  274. filter_data = 1;
  275. break;
  276. case 'f':
  277. foreground = 1;
  278. break;
  279. case 'h':
  280. msg(
  281. "Usage:\n"
  282. " %s -i {iface} -s [-b] [-d]\n"
  283. " %s -i {iface} -o {file} [-r len] [-c len] [-B] [-D] [-f]\n"
  284. "\n"
  285. " -i iface\n"
  286. " Specify interface to use, must be in monitor mode and\n"
  287. " produce IEEE 802.11 Radiotap headers.\n\n"
  288. " -s\n"
  289. " Stream to stdout instead of Dumping to file on USR1.\n\n"
  290. " -o file\n"
  291. " Write current ringbuffer contents to given output file\n"
  292. " on receipt of SIGUSR1.\n\n"
  293. " -r len\n"
  294. " Specify the amount of bytes to use for the ringbuffer.\n"
  295. " The default length is %d bytes.\n\n"
  296. " -c len\n"
  297. " Truncate captured packets after given amount of bytes.\n"
  298. " The default size limit is %d bytes.\n\n"
  299. " -B\n"
  300. " Don't store beacon frames in ring, default is keep.\n\n"
  301. " -D\n"
  302. " Don't store data frames in ring, default is keep.\n\n"
  303. " -f\n"
  304. " Do not daemonize but keep running in foreground.\n\n"
  305. " -h\n"
  306. " Display this help.\n\n",
  307. argv[0], argv[0], ringsz, pktcap);
  308. return 1;
  309. }
  310. }
  311. if (!streaming && !output)
  312. {
  313. msg("No output file specified\n");
  314. return 1;
  315. }
  316. if (streaming && output)
  317. {
  318. msg("The -s and -o options are exclusive\n");
  319. return 1;
  320. }
  321. if (streaming && isatty(1))
  322. {
  323. msg("Refusing to stream into a terminal\n");
  324. return 1;
  325. }
  326. if (!local.sll_ifindex)
  327. {
  328. msg("No interface specified\n");
  329. return 2;
  330. }
  331. if (!check_type())
  332. {
  333. msg("Bad interface: not ARPHRD_IEEE80211_RADIOTAP\n");
  334. return 2;
  335. }
  336. if ((capture_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL))) < 0)
  337. {
  338. msg("Unable to create raw socket: %s\n",
  339. strerror(errno));
  340. return 6;
  341. }
  342. if (bind(capture_sock, (struct sockaddr *)&local, sizeof(local)) == -1)
  343. {
  344. msg("Unable to bind to interface: %s\n",
  345. strerror(errno));
  346. return 7;
  347. }
  348. if (!streaming)
  349. {
  350. if (!foreground)
  351. {
  352. switch (fork())
  353. {
  354. case -1:
  355. msg("Unable to fork: %s\n", strerror(errno));
  356. return 8;
  357. case 0:
  358. umask(0077);
  359. chdir("/");
  360. freopen("/dev/null", "r", stdin);
  361. freopen("/dev/null", "w", stdout);
  362. freopen("/dev/null", "w", stderr);
  363. run_daemon = 1;
  364. break;
  365. default:
  366. msg("Daemon launched ...\n");
  367. return 0;
  368. }
  369. }
  370. msg("Monitoring interface %s ...\n", ifname);
  371. if (!(ring = ringbuf_init(ringsz / pktcap, pktcap)))
  372. {
  373. msg("Unable to allocate ring buffer: %s\n",
  374. strerror(errno));
  375. return 5;
  376. }
  377. msg(" * Using %d bytes ringbuffer with %d slots\n", ringsz, ring->len);
  378. msg(" * Truncating frames at %d bytes\n", pktcap);
  379. msg(" * Dumping data to file %s\n", output);
  380. signal(SIGUSR1, sig_dump);
  381. }
  382. else
  383. {
  384. msg("Monitoring interface %s ...\n", ifname);
  385. msg(" * Streaming data to stdout\n");
  386. }
  387. msg(" * Beacon frames are %sfiltered\n", filter_beacon ? "" : "not ");
  388. msg(" * Data frames are %sfiltered\n", filter_data ? "" : "not ");
  389. signal(SIGINT, sig_teardown);
  390. signal(SIGTERM, sig_teardown);
  391. promisc = set_promisc(1);
  392. /* capture loop */
  393. while (1)
  394. {
  395. if (run_dump)
  396. {
  397. msg("Dumping ring to %s ...\n", output);
  398. if (!(o = fopen(output, "w")))
  399. {
  400. msg("Unable to open %s: %s\n",
  401. output, strerror(errno));
  402. }
  403. else
  404. {
  405. write_pcap_header(o);
  406. /* sig_dump packet buffer */
  407. for (i = 0, n = 0; i < ring->len; i++)
  408. {
  409. if (!(e = ringbuf_get(ring, i)))
  410. continue;
  411. write_pcap_frame(o, &(e->sec), &(e->usec), e->len, e->olen);
  412. fwrite((void *)e + sizeof(*e), 1, e->len, o);
  413. n++;
  414. }
  415. fclose(o);
  416. msg(" * %d frames captured\n", frames_captured);
  417. msg(" * %d frames filtered\n", frames_filtered);
  418. msg(" * %d frames dumped\n", n);
  419. }
  420. run_dump = 0;
  421. }
  422. if (run_stop)
  423. {
  424. msg("Shutting down ...\n");
  425. if (promisc)
  426. set_promisc(0);
  427. if (ring)
  428. ringbuf_free(ring);
  429. return 0;
  430. }
  431. pktlen = recvfrom(capture_sock, pktbuf, sizeof(pktbuf), 0, NULL, 0);
  432. frames_captured++;
  433. /* check received frametype, if we should filter it, rewind the ring */
  434. rhdr = (radiotap_hdr_t *)pktbuf;
  435. if (pktlen <= sizeof(radiotap_hdr_t) || le16(rhdr->it_len) >= pktlen)
  436. {
  437. frames_filtered++;
  438. continue;
  439. }
  440. frametype = *(uint8_t *)(pktbuf + le16(rhdr->it_len));
  441. if ((filter_data && (frametype & FRAMETYPE_MASK) == FRAMETYPE_DATA) ||
  442. (filter_beacon && (frametype & FRAMETYPE_MASK) == FRAMETYPE_BEACON))
  443. {
  444. frames_filtered++;
  445. continue;
  446. }
  447. if (streaming)
  448. {
  449. if (!header_written)
  450. {
  451. write_pcap_header(stdout);
  452. header_written = 1;
  453. }
  454. write_pcap_frame(stdout, NULL, NULL, pktlen, pktlen);
  455. fwrite(pktbuf, 1, pktlen, stdout);
  456. fflush(stdout);
  457. }
  458. else
  459. {
  460. e = ringbuf_add(ring);
  461. e->olen = pktlen;
  462. e->len = (pktlen > pktcap) ? pktcap : pktlen;
  463. memcpy((void *)e + sizeof(*e), pktbuf, e->len);
  464. }
  465. }
  466. return 0;
  467. }