Google Summer of Code 2010 Project
- Student: Nicolas Boichat
- Mentors: Hunyue Yau, Frans Meulenbroeks
BeagleBoard project: usbsniffer
Project at gitorious.org: http://gitorious.org/beagleboard-usbsniffer
The goal of this project is to use the BeagleBoard as an USB sniffer. The host computer would be connected to the slave USB port of the BeagleBoard, and the device to be sniffed on the host USB port.
The BeagleBoard would then forward USB data, while logging it. In basic terms, there is a proxy driver running on the BeagleBoard, that acts both as a USB slave, and claims a USB device. According to the device descriptor, endpoints are activated on the USB slave controller, and packets are then forwarded back and forth between the host and the device.
This presents the following advantages over a software-based solution: No software modification is required; support of proprietary OSes; allows debugging of new USB stacks... However, this doesn't allow low-level debugging of USB transactions, that a hardware solution would allow. Also, the solution can only be as reliable as the USB host controller driver (which is well tested), and as the USB device controller driver (the MUSB driver in the Linux still has some bugs).
Latest recommended branches:
- Kernel tree:
- Helper scripts: stable-20100730 .
To get the proxy driver to work, you need to follow these steps:
- Clone my kernel git tree. This can be done using the following commands:
git clone git://gitorious.org/beagleboard-usbsniffer/beagleboard-usbsniffer-kernel.git cd beagleboard-usbsniffer-kernel git checkout origin/branch -b branch
- Do not reconfigure the kernel (unless you need some extra modules): the git tree comes with a ready-made .config.
- Compile and install the kernel.
- Make sure your environment is set properly (at least CROSS_COMPILE=arm-angstrom-linux-gnueabi- and ARCH=arm should be set)
- Run make uImage.
- Copy the resulting uImage on the SD card.
- Compile and install the kernel modules
- make modules
- To install the modules, the easiest is probably to set INSTALL_MOD_PATH to some directory on your host computer, run make modules_install, and copy the modules to the SD card, or via the network.
- Note: in some cases, I had problem with the kernel not finding modules. In that case, run depmod -a on the BeagleBoard, and reboot.
- Install libpcap-1.1.1 and tcpdump-4.1.1.
- If you don't have a recent enough OpenEmbedded install, the recipes can be found in these 2 commits:  and : apply these 2 commits, or update your OpenEmbedded distribution to the latest git.
- Build libpcap and tcpdump, this can be done with a command like bitbake libpcap tcpdump provided you have the environment set properly (i.e., source ~/.oe/environment or use oebb.sh).
- The 2 packages can be found in $OE_BASE/build/tmp-angstrom_2008_1/deploy/glibc/ipk/armv7a: libpcap_1.1.1-r1.5_armv7a.ipk and tcpdump_4.1.1-r1.5_armv7a.ipk.
- Copy these on the BeagleBoard, and run opkg install name.ipk for both packages.
- Clone the helper scripts git tree:
git clone git://gitorious.org/beagleboard-usbsniffer/helper-scripts.git cd helper-scripts/ git checkout origin/branch -b branch
- Copy the content of the arm directory to the BeagleBoard
Then, you have 2 options, the automatic way:
- Plug your device (through a USB hub if it is a low/full-speed device).
- Run ./sniff, and follow the instructions. Data transfers will be logged to /media/ram/dump. This resulting file can be displayed using wireshark.
- Use the device, it should work, and packets are captured.
or the manual way (mostly for testing purpose, as it does not log packets):
- Run ./setup on the BeagleBoard, this will unload the g_ether gadget driver.
- Plug your device (through a USB hub if it is a low/full-speed device).
- Plug your PC to the BeagleBoard USB slave port (this can be done earlier as well).
- Run ./unbind: This will unbind the device from the normal Linux driver.
- Run ./load: this will (re)load the g_proxy driver.
- Use the device, it should work.
|Device||USB ID||Speed||Endpoints & types||Status||Branch||Notes|
|Logitech (M-BJ58/M-BJ69) Optical Wheel Mouse||046d:c00e/046d:c018||LS||
|Logitech Internet Keyboard||046d:c309||LS||
|FTDI FT232 USB-Serial (on Arduino)||0403:6001||FS||
||OK||>=stable-20100618||Programming + bidirectional serial communication|
|CSR Bluetooth Dongle||0a12:0001||FS||
||OK||>=stable-20100618||Scanning devices (hcitool -i hci1 scan), and file transfers (odp and ussp-push) work. Didn't check anything that would use isochronous endpoints.|
|Imation 4GB Flash Drive||0718:0348||HS||
||OK||>=stable-20100702||Works hdparm -t --direct /dev/sdX. On PC: 19.76 MB/sec; on BeagleBoard: 17.64 MB/sec; on PC through the BeagleBoard proxy: 19.18 MB/sec.|
|AVerMedia Volar DVB-T dongle||07ca:b808||HS||
||OK||>=stable-20100618||No visible problem.|
|Logitech, Inc. QuickCam Messanger (sic)||046d:08da||FS||
(audio+video at the same time doesn't work)
|>stable-20100717||No visible problem (video 640x480 OR audio). Needs musb_hdrc parameter fifo_mode=6. The FIFO mode is required, because EP1 needs 768 bytes per packet (and the default is only 512). The DMA has been fixed to handle ISO packets properly.|
Enabling both video + audio at the same time doesn't work (bandwidth allocation problem, but this is probably an USB hub problem).
|Logitech, Inc. Premium Stereo USB Headset 350||046d:0a02||FS||
||OK||>stable-20100717||aplay -D default:CARD=Headset - works). Needs musb_hdrc parameter fifo_mode=7. The FIFO mode is required, because EP4 needs 96 bytes per packet (and the default is only 32).|
|FPGA4U, without firmware (Cypress Semiconductor Corp. CY7C68013 EZ-USB FX2 USB 2.0 Development Kit)||04b4:8613||HS||
||OK||>=stable-20100809||Firmware loading using fxload works. The device then resets, and appears as a new device on the BeagleBoard. Restarting sniff claims the new device.|
|FPGA4U, with firmware (Altera compatible)||09fb:6001||HS||
One major problem with the device emulation model, using a proxy driver, is about bandwidth allocation.
The USB is polling-based, that is, the controller regularly interrogates all the endpoints of all the devices attached to it.
When a new USB device is added, some bandwidth is allocated for each of its endpoints, depending on some polling interval and packet size defined in the device descriptor. This bandwidth allocation defines the polling schedule, across all the endpoints, for all the devices present on the bus.
If insufficient bandwidth is available, the device may not work. For isochronous endpoints, the device usually defines several interfaces, with different bandwidth requirements (i.e., different packet sizes), and the driver can choose the appropriate interface, according to the bandwidth available on the bus.
One of the problems that could occur with our proxy driver, is that the host may decide to allocate more bandwidth than the bandwidth available on the USB host controller of the BeagleBoard. In that case, bandwidth allocation may fail on the BeagleBoard (with an ENOSPC, or -28 error), and transfers on the affected endpoint would not work. From my experience, this seems to happen only with full-speed devices, that cannot be connected directly to the BeagleBoard, and need an intermediate USB hub.
MUSB testing code
Some instructions on how to use the code to trigger the MUSB bug with short isochronous packets:
Checkout . There are 2 directories: host, and device.
For the device side (on the beagleboard), you need to cross-compile usbtest. You need libaio, which can be built using Angstrom, and gadgetfs in the Linux kernel. Then, the gadgetfs driver is loaded as follows:
modprobe gadgetfs mkdir /dev/gadget/ -p mount -t gadgetfs none /dev/gadget ./usbtest -v -s 512 -p 2 -a 1 -I0 -x 18
The host code must be run on your host PC. It requires the usbtest module (CONFIG_USB_TEST=m), then isochronous IN transfers are tested with the following command:
./testusb -a -t 16 -g 1 -c 10
While running the test, you can monitor the USB traffic using usbmon, you should see isochronous packets of length 18, i.e., something like this:
... S Zi:2:100:1 -115:8:5232 1 -18:0:512 512 < ... C Zi:2:100:1 0:8:5240:0 1 0:0:18 18 = e6010203 e6050607 e6090a0b e60d0e0f e611
Every 4 bytes contains some kind of packet id (incrementing), the rest of the bytes are given by a mod 63 counter.
Bulk transfers can also be tested, with the following commands (device and host):
./usbtest -a 5 -s 514 ./testusb -a -t 4 -c 10 -s 1024
testusb will complain, since the packet is short (514 instead of 1024), but usbmon still shows that the transfer has been done correctly:
... S Bi:2:101:1 -115 1024 < ... C Bi:2:101:1 -121 514 = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000