diff options
author | Dan Williams <dcbw@redhat.com> | 2011-12-30 20:36:01 -0600 |
---|---|---|
committer | Dan Williams <dcbw@redhat.com> | 2011-12-30 20:42:51 -0600 |
commit | c9d0dea5b09f2b6ad3b6f199a32a5c282d3716bc (patch) | |
tree | 0e549f587e3437d2737127a0d317a7a853ec94c0 /decode/qmux.py | |
parent | a2b578d755e51f820bbe015431ef02266454e66b (diff) |
decode: add some python tools to decode SniffUSB dumps
decode.py will read SniffUSB logs of communication with
QMUX or WMC speaking devices. It will dump the packets
in both hex and ASCII. If you know something about the
device then you can tell it to decode the packets. For
example, we know the Pantech UML290's WMC port speaks
WMC using Bulk Transfers, so we can:
decode.py --transfer=wmc <path to sniffusb logs>
or we know the UML290's "rmnet" port speaks raw IP in
the Bulk Transfers and QMUX in the Control Transfers, so:
decode.py --control=qmux <path to sniffusb logs>
qmiprotgen.py takes a path to an Entities.txt file and
dumps out the protocol entities and services in
Python code which is used by qmux.py.
xml2ascii.py and analyze.py dump out UsbSnoopy XML logs
but these are not as usable as the SniffUSB logs (they
do not provide good direction information).
http://www.wingmanteam.com/usbsnoopy/
http://www.pcausa.com/Utilities/UsbSnoop/
Diffstat (limited to 'decode/qmux.py')
-rw-r--r-- | decode/qmux.py | 187 |
1 files changed, 187 insertions, 0 deletions
diff --git a/decode/qmux.py b/decode/qmux.py new file mode 100644 index 00000000..36a2f302 --- /dev/null +++ b/decode/qmux.py @@ -0,0 +1,187 @@ +#!/usr/bin/python +# -*- Mode: python; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details: +# +# Copyright (C) 2011 Red Hat, Inc. +# + +import binascii +import defs +import struct + +from qmiprotocol import services + +TP_REQUEST = 0x00 +TP_RESPONSE = 0x02 +TP_INDICATION = 0x04 + +def unpack(data, direction): + return binascii.unhexlify(data) + +def service_to_string(s): + try: + return services[s][0] + except KeyError: + return "" + +def qmi_cmd_to_string(cmdno, service): + (name, cmds) = services[service] + return cmds[cmdno][0] + +class Tlv: + def __init__(self, tlvid, size, data, service, cmdno, direction): + self.id = tlvid + self.size = size + self.data = data + if size != len(data): + raise ValueError("Mismatched TLV size! (got %d expected %d)" % (len(data), size)) + self.service = service + self.cmdno = cmdno + self.direction = direction + + def show_data(self, prefix): + line = "" + for i in self.data: + line += " %02x" % ord(i) + print prefix + " Data: %s" % line + + def show(self, prefix): + svc = services[self.service] + cmd = svc[1][self.cmdno] + tlvlist = None + if self.direction == TP_REQUEST: + tlvlist = cmd[1] + elif self.direction == TP_RESPONSE: + tlvlist = cmd[2] + elif self.direction == TP_INDICATION: + tlvlist = cmd[3] + else: + raise ValueError("Unknown TLV dir0ection %s" % self.direction) + + tlvname = "!!! UNKNOWN !!!" + if self.service == 1 and self.cmdno == 77: # WDS/SET_IP_FAMILY + tlvname = "WDS/Set IP Family/IP Family !!! NOT DEFINED !!!" + else: + try: + tlvname = tlvlist[self.id] + except KeyError: + pass + + print prefix + " TLV: 0x%02x (%s)" % (self.id, tlvname) + print prefix + " Size: 0x%04x" % self.size + if self.id == 2: + # Status response + (status, error) = struct.unpack("<HH", self.data) + if status == 0: + sstatus = "SUCCESS" + else: + sstatus = "ERROR" + print prefix + " Status: %d (%s)" % (status, sstatus) + + print prefix + " Error: %d" % error + else: + self.show_data(prefix) + print "" + +def get_tlvs(data, service, cmdno, direction): + tlvs = [] + while len(data) >= 3: + (tlvid, size) = struct.unpack("<BH", data[:3]) + if size > len(data) - 3: + raise ValueError("Malformed TLV ID %d size %d (len left %d)" % (tlvid, size, len(data))) + tlvs.append(Tlv(tlvid, size, data[3:3 + size], service, cmdno, direction)) + data = data[size + 3:] + if len(data) != 0: + raise ValueError("leftover data parsing tlvs") + return tlvs + +def show(data, prefix, direction): + if len(data) < 7: + return + + qmuxfmt = "<BHBBB" + sz = struct.calcsize(qmuxfmt) + (ifc, l, sender, service, cid) = struct.unpack(qmuxfmt, data[:sz]) + + if ifc != 0x01: + raise ValueError("Packet not QMUX") + + print prefix + "QMUX Header:" + print prefix + " len: 0x%04x" % l + + ssender = "" + if sender == 0x00: + ssender = "(client)" + elif sender == 0x80: + ssender = "(service)" + print prefix + " sender: 0x%02x %s" % (sender, ssender) + + sservice = service_to_string(service) + print prefix + " svc: 0x%02x (%s)" % (service, sservice) + + scid = "" + if cid == 0xff: + scid = "(broadcast)" + print prefix + " cid: 0x%02x %s" % (cid, scid) + + print "" + + # QMI header + data = data[sz:] + if service == 0: + qmifmt = "<BBHH" + else: + qmifmt = "<BHHH" + + sz = struct.calcsize(qmifmt) + (flags, txnid, cmdno, size) = struct.unpack(qmifmt, data[:sz]) + + print prefix + "QMI Header:" + + sflags = "" + if service == 0: + # Besides the CTL service header being shorter, the flags are different + if flags == 0x00: + flags = TP_REQUEST + elif flags == 0x01: + flags = TP_RESPONSE + elif flags == 0x02: + flags = TP_INDICATION + + if flags == TP_REQUEST: + sflags = "(request)" + elif flags == TP_RESPONSE: + sflags = "(response)" + elif flags == TP_INDICATION: + sflags = "(indication)" + else: + raise ValueError("Unknown flags %d" % flags) + print prefix + " Flags: 0x%02x %s" % (flags, sflags) + + print prefix + " TXN: 0x%04x" % txnid + + scmd = qmi_cmd_to_string(cmdno, service) + print prefix + " Cmd: 0x%04x (%s)" % (cmdno, scmd) + + print prefix + " Size: 0x%04x" % size + print "" + + data = data[sz:] + tlvs = get_tlvs(data, service, cmdno, flags) + for tlv in tlvs: + tlv.show(prefix) + + print "" + +def get_funcs(): + return (unpack, show) + |