2014-05-14 07:45:23 +00:00
|
|
|
/* logcat_text.c
|
|
|
|
*
|
|
|
|
* Copyright 2014, Michal Orynicz for Tieto Corporation
|
|
|
|
* Copyright 2014, Michal Labedzki for Tieto Corporation
|
|
|
|
*
|
2018-02-07 11:26:45 +00:00
|
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
2014-05-14 07:45:23 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "wtap-int.h"
|
|
|
|
#include "file_wrappers.h"
|
|
|
|
|
|
|
|
#include "logcat_text.h"
|
|
|
|
#include "logcat.h"
|
|
|
|
|
|
|
|
struct dumper_t {
|
|
|
|
int type;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Returns '?' for invalid priorities */
|
|
|
|
static gchar get_priority(const guint8 priority) {
|
|
|
|
static gchar priorities[] = "??VDIWEFS";
|
|
|
|
|
|
|
|
if (priority >= (guint8) sizeof(priorities))
|
|
|
|
return '?';
|
|
|
|
|
|
|
|
return priorities[priority];
|
|
|
|
}
|
|
|
|
|
|
|
|
static gint buffered_detect_version(const guint8 *pd)
|
|
|
|
{
|
2014-07-23 10:26:05 +00:00
|
|
|
const struct logger_entry *log_entry;
|
|
|
|
const struct logger_entry_v2 *log_entry_v2;
|
2014-05-14 07:45:23 +00:00
|
|
|
gint version;
|
2014-07-23 10:26:05 +00:00
|
|
|
const guint8 *msg_payload = NULL;
|
2014-05-14 07:45:23 +00:00
|
|
|
guint8 *msg_part;
|
|
|
|
guint8 *msg_end;
|
|
|
|
guint16 msg_len;
|
|
|
|
|
2014-09-22 08:25:32 +00:00
|
|
|
log_entry = (const struct logger_entry *)(const void *) pd;
|
|
|
|
log_entry_v2 = (const struct logger_entry_v2 *)(const void *) pd;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
|
|
|
/* must contain at least priority and two nulls as separator */
|
|
|
|
if (log_entry->len < 3)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* payload length may not exceed the maximum payload size */
|
|
|
|
if (log_entry->len > LOGGER_ENTRY_MAX_PAYLOAD)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* cannot rely on __pad being 0 for v1, use heuristics to find out what
|
|
|
|
* version is in use. First assume the smallest msg. */
|
|
|
|
for (version = 1; version <= 2; ++version) {
|
|
|
|
if (version == 1) {
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_payload = (const guint8 *) (log_entry + 1);
|
2014-05-14 07:45:23 +00:00
|
|
|
} else if (version == 2) {
|
|
|
|
/* v2 is 4 bytes longer */
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_payload = (const guint8 *) (log_entry_v2 + 1);
|
2014-05-14 07:45:23 +00:00
|
|
|
if (log_entry_v2->hdr_size != sizeof(*log_entry_v2))
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* A v2 msg has a 32-bit userid instead of v1 priority */
|
|
|
|
if (get_priority(msg_payload[0]) == '?')
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Is there a terminating '\0' for the tag? */
|
|
|
|
msg_part = (guint8 *) memchr(msg_payload, '\0', log_entry->len - 1);
|
|
|
|
if (msg_part == NULL)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* if msg is '\0'-terminated, is it equal to the payload len? */
|
|
|
|
++msg_part;
|
|
|
|
msg_len = (guint16)(log_entry->len - (msg_part - msg_payload));
|
|
|
|
msg_end = (guint8 *) memchr(msg_part, '\0', msg_len);
|
|
|
|
/* is the end of the buffer (-1) equal to the end of msg? */
|
|
|
|
if (msg_end && (msg_payload + log_entry->len - 1 != msg_end))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
return version;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static gchar *logcat_log(const struct dumper_t *dumper, guint32 seconds,
|
|
|
|
gint milliseconds, gint pid, gint tid, gchar priority, const gchar *tag,
|
|
|
|
const gchar *log)
|
|
|
|
{
|
|
|
|
gchar time_buffer[15];
|
|
|
|
time_t datetime;
|
2016-10-22 02:18:15 +00:00
|
|
|
struct tm *tm;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
|
|
|
datetime = (time_t) seconds;
|
|
|
|
|
|
|
|
switch (dumper->type) {
|
|
|
|
case WTAP_ENCAP_LOGCAT_BRIEF:
|
|
|
|
return g_strdup_printf("%c/%-8s(%5i): %s\n",
|
|
|
|
priority, tag, pid, log);
|
|
|
|
case WTAP_ENCAP_LOGCAT_PROCESS:
|
|
|
|
/* NOTE: Last parameter should be "process name", not tag;
|
|
|
|
Unfortunately, we do not have process name */
|
|
|
|
return g_strdup_printf("%c(%5i) %s (%s)\n",
|
|
|
|
priority, pid, log, "");
|
|
|
|
case WTAP_ENCAP_LOGCAT_TAG:
|
|
|
|
return g_strdup_printf("%c/%-8s: %s\n",
|
|
|
|
priority, tag, log);
|
|
|
|
case WTAP_ENCAP_LOGCAT_THREAD:
|
|
|
|
return g_strdup_printf("%c(%5i:%5i) %s\n",
|
|
|
|
priority, pid, tid, log);
|
|
|
|
case WTAP_ENCAP_LOGCAT_TIME:
|
2016-10-22 02:18:15 +00:00
|
|
|
tm = gmtime(&datetime);
|
|
|
|
if (tm != NULL) {
|
|
|
|
strftime(time_buffer, sizeof(time_buffer), "%m-%d %H:%M:%S",
|
|
|
|
tm);
|
|
|
|
return g_strdup_printf("%s.%03i %c/%-8s(%5i): %s\n",
|
|
|
|
time_buffer, milliseconds, priority, tag, pid, log);
|
|
|
|
} else {
|
|
|
|
return g_strdup_printf("Not representable %c/%-8s(%5i): %s\n",
|
|
|
|
priority, tag, pid, log);
|
|
|
|
}
|
2014-05-14 07:45:23 +00:00
|
|
|
case WTAP_ENCAP_LOGCAT_THREADTIME:
|
2016-10-22 02:18:15 +00:00
|
|
|
tm = gmtime(&datetime);
|
|
|
|
if (tm != NULL) {
|
|
|
|
strftime(time_buffer, sizeof(time_buffer), "%m-%d %H:%M:%S",
|
|
|
|
tm);
|
|
|
|
return g_strdup_printf("%s.%03i %5i %5i %c %-8s: %s\n",
|
|
|
|
time_buffer, milliseconds, pid, tid, priority, tag, log);
|
|
|
|
} else {
|
|
|
|
return g_strdup_printf("Not representable %5i %5i %c %-8s: %s\n",
|
|
|
|
pid, tid, priority, tag, log);
|
|
|
|
}
|
2014-05-14 07:45:23 +00:00
|
|
|
case WTAP_ENCAP_LOGCAT_LONG:
|
2016-10-22 02:18:15 +00:00
|
|
|
tm = gmtime(&datetime);
|
|
|
|
if (tm != NULL) {
|
|
|
|
strftime(time_buffer, sizeof(time_buffer), "%m-%d %H:%M:%S",
|
|
|
|
tm);
|
|
|
|
return g_strdup_printf("[ %s.%03i %5i:%5i %c/%-8s ]\n%s\n\n",
|
|
|
|
time_buffer, milliseconds, pid, tid, priority, tag, log);
|
|
|
|
} else {
|
|
|
|
return g_strdup_printf("[ Not representable %5i:%5i %c/%-8s ]\n%s\n\n",
|
|
|
|
pid, tid, priority, tag, log);
|
|
|
|
}
|
2014-05-14 07:45:23 +00:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
static void get_time(gchar *string, wtap_rec *rec) {
|
2014-08-08 07:06:38 +00:00
|
|
|
gint ms;
|
|
|
|
struct tm date;
|
|
|
|
time_t seconds;
|
|
|
|
|
|
|
|
if (6 == sscanf(string, "%d-%d %d:%d:%d.%d", &date.tm_mon, &date.tm_mday, &date.tm_hour,
|
|
|
|
&date.tm_min, &date.tm_sec, &ms)) {
|
|
|
|
date.tm_year = 70;
|
|
|
|
date.tm_mon -= 1;
|
2018-05-09 16:31:44 +00:00
|
|
|
date.tm_isdst = -1;
|
2014-08-08 07:06:38 +00:00
|
|
|
seconds = mktime(&date);
|
2019-01-04 13:12:45 +00:00
|
|
|
rec->ts.secs = seconds;
|
2018-02-09 00:19:12 +00:00
|
|
|
rec->ts.nsecs = (int) (ms * 1e6);
|
|
|
|
rec->presence_flags = WTAP_HAS_TS;
|
2014-05-14 07:45:23 +00:00
|
|
|
} else {
|
2018-02-09 00:19:12 +00:00
|
|
|
rec->presence_flags = 0;
|
|
|
|
rec->ts.secs = (time_t) 0;
|
2019-01-04 13:12:45 +00:00
|
|
|
rec->ts.nsecs = 0;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
static gboolean logcat_text_read_packet(FILE_T fh, wtap_rec *rec,
|
2014-05-14 07:45:23 +00:00
|
|
|
Buffer *buf, gint file_type) {
|
|
|
|
gint8 *pd;
|
2017-03-27 21:02:05 +00:00
|
|
|
gchar *cbuff;
|
2014-05-14 07:45:23 +00:00
|
|
|
gchar *ret = NULL;
|
|
|
|
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
cbuff = (gchar*)g_malloc(WTAP_MAX_PACKET_SIZE_STANDARD);
|
2014-05-14 07:45:23 +00:00
|
|
|
do {
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
ret = file_gets(cbuff, WTAP_MAX_PACKET_SIZE_STANDARD, fh);
|
2014-05-14 07:45:23 +00:00
|
|
|
} while (NULL != ret && 3 > strlen(cbuff) && !file_eof(fh));
|
|
|
|
|
|
|
|
if (NULL == ret || 3 > strlen(cbuff)) {
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(cbuff);
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (WTAP_FILE_TYPE_SUBTYPE_LOGCAT_LONG == file_type &&
|
2019-02-08 17:24:40 +00:00
|
|
|
!g_regex_match_simple(SPECIAL_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW), G_REGEX_MATCH_NOTEMPTY)) {
|
2014-05-14 07:45:23 +00:00
|
|
|
gint64 file_off = 0;
|
2017-03-27 21:02:05 +00:00
|
|
|
gchar *lbuff;
|
2014-05-14 07:45:23 +00:00
|
|
|
int err;
|
|
|
|
gchar *ret2 = NULL;
|
|
|
|
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
lbuff = (gchar*)g_malloc(WTAP_MAX_PACKET_SIZE_STANDARD);
|
2014-05-14 07:45:23 +00:00
|
|
|
file_off = file_tell(fh);
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
ret2 = file_gets(lbuff,WTAP_MAX_PACKET_SIZE_STANDARD, fh);
|
2014-05-14 07:45:23 +00:00
|
|
|
while (NULL != ret2 && 2 < strlen(lbuff) && !file_eof(fh)) {
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
g_strlcat(cbuff,lbuff,WTAP_MAX_PACKET_SIZE_STANDARD);
|
2014-05-14 07:45:23 +00:00
|
|
|
file_off = file_tell(fh);
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
ret2 = file_gets(lbuff,WTAP_MAX_PACKET_SIZE_STANDARD, fh);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if(NULL == ret2 || 2 < strlen(lbuff)) {
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(cbuff);
|
|
|
|
g_free(lbuff);
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
file_seek(fh,file_off,SEEK_SET,&err);
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(lbuff);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
rec->rec_type = REC_TYPE_PACKET;
|
|
|
|
rec->rec_header.packet_header.caplen = (guint32)strlen(cbuff);
|
|
|
|
rec->rec_header.packet_header.len = rec->rec_header.packet_header.caplen;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
ws_buffer_assure_space(buf, rec->rec_header.packet_header.caplen + 1);
|
2014-05-14 07:45:23 +00:00
|
|
|
pd = ws_buffer_start_ptr(buf);
|
|
|
|
if ((WTAP_FILE_TYPE_SUBTYPE_LOGCAT_TIME == file_type
|
|
|
|
|| WTAP_FILE_TYPE_SUBTYPE_LOGCAT_THREADTIME == file_type
|
|
|
|
|| WTAP_FILE_TYPE_SUBTYPE_LOGCAT_LONG == file_type)
|
|
|
|
&& '-' != cbuff[0]) { /* the last part filters out the -- beginning of... lines */
|
|
|
|
if (WTAP_FILE_TYPE_SUBTYPE_LOGCAT_LONG == file_type) {
|
2018-02-09 00:19:12 +00:00
|
|
|
get_time(cbuff+2, rec);
|
2014-05-14 07:45:23 +00:00
|
|
|
} else {
|
2018-02-09 00:19:12 +00:00
|
|
|
get_time(cbuff, rec);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
} else {
|
2018-02-09 00:19:12 +00:00
|
|
|
rec->presence_flags = 0;
|
|
|
|
rec->ts.secs = (time_t) 0;
|
2019-01-04 13:12:45 +00:00
|
|
|
rec->ts.nsecs = 0;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
2018-02-09 00:19:12 +00:00
|
|
|
memcpy(pd, cbuff, rec->rec_header.packet_header.caplen + 1);
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(cbuff);
|
2014-05-14 07:45:23 +00:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2019-04-05 01:56:27 +00:00
|
|
|
static gboolean logcat_text_read(wtap *wth, wtap_rec *rec,
|
|
|
|
Buffer *buf, int *err _U_ , gchar **err_info _U_, gint64 *data_offset) {
|
2014-05-14 07:45:23 +00:00
|
|
|
*data_offset = file_tell(wth->fh);
|
|
|
|
|
2019-04-05 01:56:27 +00:00
|
|
|
return logcat_text_read_packet(wth->fh, rec, buf, wth->file_type_subtype);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean logcat_text_seek_read(wtap *wth, gint64 seek_off,
|
2018-02-09 00:19:12 +00:00
|
|
|
wtap_rec *rec, Buffer *buf, int *err, gchar **err_info _U_) {
|
2014-05-14 07:45:23 +00:00
|
|
|
if (file_seek(wth->random_fh, seek_off, SEEK_SET, err) == -1)
|
|
|
|
return FALSE;
|
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
if (!logcat_text_read_packet(wth->random_fh, rec, buf,
|
2014-05-14 07:45:23 +00:00
|
|
|
wth->file_type_subtype)) {
|
|
|
|
if (*err == 0)
|
|
|
|
*err = WTAP_ERR_SHORT_READ;
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2014-10-09 23:44:15 +00:00
|
|
|
wtap_open_return_val logcat_text_open(wtap *wth, int *err, gchar **err_info _U_) {
|
2017-03-27 21:02:05 +00:00
|
|
|
gchar *cbuff;
|
2014-05-14 07:45:23 +00:00
|
|
|
gchar *ret = NULL;
|
|
|
|
|
|
|
|
if (file_seek(wth->fh, 0, SEEK_SET, err) == -1)
|
2014-10-09 23:44:15 +00:00
|
|
|
return WTAP_OPEN_ERROR;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
cbuff = (gchar*)g_malloc(WTAP_MAX_PACKET_SIZE_STANDARD);
|
2014-05-14 07:45:23 +00:00
|
|
|
do {
|
Allow bigger snapshot lengths for D-Bus captures.
Use WTAP_MAX_PACKET_SIZE_STANDARD, set to 256KB, for everything except
for D-Bus captures. Use WTAP_MAX_PACKET_SIZE_DBUS, set to 128MB, for
them, because that's the largest possible D-Bus message size. See
https://bugs.freedesktop.org/show_bug.cgi?id=100220
for an example of the problems caused by limiting the snapshot length to
256KB for D-Bus.
Have a snapshot length of 0 in a capture_file structure mean "there is
no snapshot length for the file"; we don't need the has_snap field in
that case, a value of 0 mean "no, we don't have a snapshot length".
In dumpcap, start out with a pipe buffer size of 2KB, and grow it as
necessary. When checking for a too-big packet from a pipe, check
against the appropriate maximum - 128MB for DLT_DBUS, 256KB for
everything else.
Change-Id: Ib2ce7a0cf37b971fbc0318024fd011e18add8b20
Reviewed-on: https://code.wireshark.org/review/21952
Petri-Dish: Guy Harris <guy@alum.mit.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2017-06-05 01:58:40 +00:00
|
|
|
ret = file_gets(cbuff, WTAP_MAX_PACKET_SIZE_STANDARD, wth->fh);
|
2014-05-14 07:45:23 +00:00
|
|
|
} while (NULL != ret && !file_eof(wth->fh)
|
|
|
|
&& ((3 > strlen(cbuff))
|
2019-02-08 17:24:40 +00:00
|
|
|
|| g_regex_match_simple(SPECIAL_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)));
|
|
|
|
|
2019-02-08 17:24:40 +00:00
|
|
|
if (g_regex_match_simple(BRIEF_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_BRIEF;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_BRIEF;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(TAG_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_TAG;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_TAG;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(PROCESS_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_PROCESS;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_PROCESS;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(TIME_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_TIME;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_TIME;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(THREAD_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_THREAD;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_THREAD;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(THREADTIME_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_THREADTIME;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_THREADTIME;
|
2019-02-08 17:24:40 +00:00
|
|
|
} else if (g_regex_match_simple(LONG_STRING, cbuff, (GRegexCompileFlags)(G_REGEX_ANCHORED | G_REGEX_RAW),
|
2014-05-14 07:45:23 +00:00
|
|
|
G_REGEX_MATCH_NOTEMPTY)) {
|
|
|
|
wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_LOGCAT_LONG;
|
|
|
|
wth->file_encap = WTAP_ENCAP_LOGCAT_LONG;
|
|
|
|
} else {
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(cbuff);
|
2014-10-09 23:44:15 +00:00
|
|
|
return WTAP_OPEN_NOT_MINE;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2017-03-27 21:02:05 +00:00
|
|
|
if (file_seek(wth->fh, 0, SEEK_SET, err) == -1) {
|
|
|
|
g_free(cbuff);
|
2014-10-09 23:44:15 +00:00
|
|
|
return WTAP_OPEN_ERROR;
|
2017-03-27 21:02:05 +00:00
|
|
|
}
|
2014-05-14 07:45:23 +00:00
|
|
|
wth->snapshot_length = 0;
|
|
|
|
|
|
|
|
wth->subtype_read = logcat_text_read;
|
|
|
|
wth->subtype_seek_read = logcat_text_seek_read;
|
2014-09-28 18:37:06 +00:00
|
|
|
wth->file_tsprec = WTAP_TSPREC_USEC;
|
2017-03-27 21:02:05 +00:00
|
|
|
g_free(cbuff);
|
2014-10-09 23:44:15 +00:00
|
|
|
return WTAP_OPEN_MINE;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_brief_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_BRIEF:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_process_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_PROCESS:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_tag_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_TAG:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_time_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_TIME:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_thread_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_THREAD:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_threadtime_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_THREADTIME:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int logcat_text_long_dump_can_write_encap(int encap) {
|
|
|
|
if (encap == WTAP_ENCAP_PER_PACKET)
|
|
|
|
return WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
|
|
|
|
switch (encap) {
|
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
case WTAP_ENCAP_LOGCAT_LONG:
|
2014-09-18 08:47:41 +00:00
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2014-05-14 07:45:23 +00:00
|
|
|
return 0;
|
|
|
|
default:
|
2014-12-17 06:40:45 +00:00
|
|
|
return WTAP_ERR_UNWRITABLE_ENCAP;
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean logcat_text_dump_text(wtap_dumper *wdh,
|
2018-02-09 00:19:12 +00:00
|
|
|
const wtap_rec *rec,
|
2014-12-18 00:02:50 +00:00
|
|
|
const guint8 *pd, int *err, gchar **err_info)
|
2014-05-14 07:45:23 +00:00
|
|
|
{
|
|
|
|
gchar *buf;
|
|
|
|
gint length;
|
|
|
|
gchar priority;
|
|
|
|
const struct logger_entry *log_entry;
|
|
|
|
const struct logger_entry_v2 *log_entry_v2;
|
|
|
|
gint payload_length;
|
|
|
|
const gchar *tag;
|
|
|
|
gint32 pid;
|
|
|
|
gint32 tid;
|
|
|
|
gint32 seconds;
|
|
|
|
gint32 milliseconds;
|
2014-07-23 10:26:05 +00:00
|
|
|
const guint8 *msg_payload = NULL;
|
2014-05-14 07:45:23 +00:00
|
|
|
const gchar *msg_begin;
|
|
|
|
gint msg_pre_skip;
|
|
|
|
gchar *log;
|
|
|
|
gchar *log_part;
|
|
|
|
gchar *log_next;
|
|
|
|
gint logcat_version;
|
|
|
|
const struct dumper_t *dumper = (const struct dumper_t *) wdh->priv;
|
|
|
|
|
|
|
|
/* We can only write packet records. */
|
2018-02-09 00:19:12 +00:00
|
|
|
if (rec->rec_type != REC_TYPE_PACKET) {
|
2014-12-18 00:31:49 +00:00
|
|
|
*err = WTAP_ERR_UNWRITABLE_REC_TYPE;
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
Catch attempts to write multiple encapsulation types if unsupported.
If, in the process of opening the input file, we determine that it has
packets of more than one link-layer type, we can catch attempts to write
that file to a file of a format that doesn't support more than one
link-layer type at the time we try to open the output file.
If, however, we don't discover that the file has more than one
link-layer type until we've already created the output file - for
example, if we have a pcapng file with a new IDB, with a different
link-layer type from previous IDBs, after packet blocks for the earlier
interfces - we can't catch that until we try to write the packet.
Currently, that causes the packet's data to be written out as is, so the
output file claims it's of the file's link-layer type, causing programs
reading the file to misdissect the packet.
Report WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on the write attempt
instead, and have a nicer error message for
WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED on a write.
Change-Id: Ic41f2e4367cfe5667eb30c88cc6d3bfe422462f6
Reviewed-on: https://code.wireshark.org/review/30617
Reviewed-by: Guy Harris <guy@alum.mit.edu>
2018-11-14 03:38:12 +00:00
|
|
|
/*
|
|
|
|
* Make sure this packet doesn't have a link-layer type that
|
|
|
|
* differs from the one for the file.
|
|
|
|
*/
|
|
|
|
if (wdh->encap != rec->rec_header.packet_header.pkt_encap) {
|
|
|
|
*err = WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED;
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2014-05-14 07:45:23 +00:00
|
|
|
switch (wdh->encap) {
|
|
|
|
case WTAP_ENCAP_WIRESHARK_UPPER_PDU:
|
2016-01-12 13:28:47 +00:00
|
|
|
{
|
|
|
|
gint skipped_length;
|
|
|
|
|
|
|
|
skipped_length = logcat_exported_pdu_length(pd);
|
|
|
|
pd += skipped_length;
|
|
|
|
|
2018-02-09 00:19:12 +00:00
|
|
|
if (!wtap_dump_file_write(wdh, (const gchar*) pd, rec->rec_header.packet_header.caplen - skipped_length, err)) {
|
2016-01-12 13:28:47 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2014-05-14 07:45:23 +00:00
|
|
|
case WTAP_ENCAP_LOGCAT:
|
|
|
|
/* Skip EXPORTED_PDU*/
|
|
|
|
if (wdh->encap == WTAP_ENCAP_WIRESHARK_UPPER_PDU) {
|
|
|
|
gint skipped_length;
|
|
|
|
|
|
|
|
skipped_length = logcat_exported_pdu_length(pd);
|
|
|
|
pd += skipped_length;
|
|
|
|
|
|
|
|
logcat_version = buffered_detect_version(pd);
|
|
|
|
} else {
|
2018-02-09 00:19:12 +00:00
|
|
|
const union wtap_pseudo_header *pseudo_header = &rec->rec_header.packet_header.pseudo_header;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
|
|
|
logcat_version = pseudo_header->logcat.version;
|
|
|
|
}
|
|
|
|
|
2014-09-22 08:25:32 +00:00
|
|
|
log_entry = (const struct logger_entry *)(const void *) pd;
|
|
|
|
log_entry_v2 = (const struct logger_entry_v2 *)(const void *) pd;
|
2014-05-14 07:45:23 +00:00
|
|
|
|
|
|
|
payload_length = GINT32_FROM_LE(log_entry->len);
|
|
|
|
pid = GINT32_FROM_LE(log_entry->pid);
|
|
|
|
tid = GINT32_FROM_LE(log_entry->tid);
|
|
|
|
seconds = GINT32_FROM_LE(log_entry->sec);
|
|
|
|
milliseconds = GINT32_FROM_LE(log_entry->nsec) / 1000000;
|
|
|
|
|
|
|
|
/* msg: <prio:1><tag:N>\0<msg:N>\0 with N >= 0, last \0 can be missing */
|
|
|
|
if (logcat_version == 1) {
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_payload = (const guint8 *) (log_entry + 1);
|
|
|
|
|
|
|
|
priority = get_priority(msg_payload[0]);
|
|
|
|
tag = msg_payload + 1;
|
2014-05-14 07:45:23 +00:00
|
|
|
msg_pre_skip = 1 + (gint) strlen(tag) + 1;
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_begin = msg_payload + msg_pre_skip;
|
2014-05-14 07:45:23 +00:00
|
|
|
} else if (logcat_version == 2) {
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_payload = (const guint8 *) (log_entry_v2 + 1);
|
|
|
|
|
|
|
|
priority = get_priority(msg_payload[0]);
|
|
|
|
tag = msg_payload + 1;
|
2014-05-14 07:45:23 +00:00
|
|
|
msg_pre_skip = 1 + (gint) strlen(tag) + 1;
|
2014-07-23 10:26:05 +00:00
|
|
|
msg_begin = msg_payload + msg_pre_skip;
|
2014-05-14 07:45:23 +00:00
|
|
|
} else {
|
2014-12-18 00:02:50 +00:00
|
|
|
*err = WTAP_ERR_UNWRITABLE_REC_DATA;
|
|
|
|
*err_info = g_strdup_printf("logcat: version %d isn't supported",
|
|
|
|
logcat_version);
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* copy the message part. If a nul byte was missing, it will be added. */
|
|
|
|
log = g_strndup(msg_begin, payload_length - msg_pre_skip);
|
|
|
|
|
|
|
|
/* long format: display one header followed by the whole message (which may
|
|
|
|
* contain new lines). Other formats: include tag, etc. with each line */
|
|
|
|
log_next = log;
|
|
|
|
do {
|
|
|
|
log_part = log_next;
|
|
|
|
if (dumper->type == WTAP_ENCAP_LOGCAT_LONG) {
|
|
|
|
/* read until end, there is no next string */
|
|
|
|
log_next = NULL;
|
|
|
|
} else {
|
|
|
|
/* read until next newline */
|
|
|
|
log_next = strchr(log_part, '\n');
|
|
|
|
if (log_next != NULL) {
|
|
|
|
*log_next = '\0';
|
|
|
|
++log_next;
|
|
|
|
/* ignore trailing newline */
|
|
|
|
if (*log_next == '\0') {
|
|
|
|
log_next = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
buf = logcat_log(dumper, seconds, milliseconds, pid, tid, priority, tag, log_part);
|
|
|
|
if (!buf) {
|
|
|
|
g_free(log);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
length = (guint32) strlen(buf);
|
|
|
|
|
|
|
|
if (!wtap_dump_file_write(wdh, buf, length, err)) {
|
|
|
|
g_free(log);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
wdh->bytes_dumped += length;
|
|
|
|
} while (log_next != NULL );
|
|
|
|
|
|
|
|
g_free(log);
|
|
|
|
|
|
|
|
break;
|
|
|
|
case WTAP_ENCAP_LOGCAT_BRIEF:
|
|
|
|
case WTAP_ENCAP_LOGCAT_TAG:
|
|
|
|
case WTAP_ENCAP_LOGCAT_PROCESS:
|
|
|
|
case WTAP_ENCAP_LOGCAT_TIME:
|
|
|
|
case WTAP_ENCAP_LOGCAT_THREAD:
|
|
|
|
case WTAP_ENCAP_LOGCAT_THREADTIME:
|
|
|
|
case WTAP_ENCAP_LOGCAT_LONG:
|
|
|
|
if (dumper->type == wdh->encap) {
|
2018-02-09 00:19:12 +00:00
|
|
|
if (!wtap_dump_file_write(wdh, (const gchar*) pd, rec->rec_header.packet_header.caplen, err)) {
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
} else {
|
2014-12-17 08:29:31 +00:00
|
|
|
*err = WTAP_ERR_UNWRITABLE_FILE_TYPE;
|
2014-05-14 07:45:23 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
static gboolean logcat_text_dump_open(wtap_dumper *wdh, guint dump_type) {
|
2014-05-14 07:45:23 +00:00
|
|
|
struct dumper_t *dumper;
|
|
|
|
|
|
|
|
dumper = (struct dumper_t *) g_malloc(sizeof(struct dumper_t));
|
|
|
|
dumper->type = dump_type;
|
|
|
|
|
|
|
|
wdh->priv = dumper;
|
|
|
|
wdh->subtype_write = logcat_text_dump_text;
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_brief_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_BRIEF);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_process_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_PROCESS);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_tag_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_TAG);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_time_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_TIME);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_thread_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_THREAD);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_threadtime_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_THREADTIME);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
2020-10-14 01:48:46 +00:00
|
|
|
gboolean logcat_text_long_dump_open(wtap_dumper *wdh, int *err _U_, gchar **err_info _U_) {
|
|
|
|
return logcat_text_dump_open(wdh, WTAP_ENCAP_LOGCAT_LONG);
|
2014-05-14 07:45:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2019-07-26 18:43:17 +00:00
|
|
|
* Editor modelines - https://www.wireshark.org/tools/modelines.html
|
2014-05-14 07:45:23 +00:00
|
|
|
*
|
|
|
|
* Local variables:
|
|
|
|
* c-basic-offset: 4
|
|
|
|
* tab-width: 8
|
|
|
|
* indent-tabs-mode: nil
|
|
|
|
* End:
|
|
|
|
*
|
|
|
|
* vi: set shiftwidth=4 tabstop=8 expandtab:
|
|
|
|
* :indentSize=4:tabSize=8:noTabs=true:
|
|
|
|
*/
|