/* capture.c
* Routines for packet capture windows
*
- * $Id: capture.c,v 1.124 2000/09/14 22:59:00 grahamb Exp $
+ * $Id: capture.c,v 1.172 2002/04/08 09:09:47 guy Exp $
*
* Ethereal - Network traffic analyzer
- * By Gerald Combs <gerald@zing.org>
+ * By Gerald Combs <gerald@ethereal.com>
* Copyright 1998 Gerald Combs
- *
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
-
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#ifdef HAVE_SYS_WAIT_H
# include <sys/wait.h>
#endif
+
+#ifndef _WIN32
+/*
+ * Define various POSIX macros (and, in the case of WCOREDUMP, non-POSIX
+ * macros) on UNIX systems that don't have them.
+ */
+#ifndef WIFEXITED
+# define WIFEXITED(status) (((status) & 0177) == 0)
+#endif
+#ifndef WIFSTOPPED
+# define WIFSTOPPED(status) (((status) & 0177) == 0177)
+#endif
+#ifndef WIFSIGNALED
+# define WIFSIGNALED(status) (!WIFSTOPPED(status) && !WIFEXITED(status))
+#endif
+#ifndef WEXITSTATUS
+# define WEXITSTATUS(status) ((status) >> 8)
+#endif
+#ifndef WTERMSIG
+# define WTERMSIG(status) ((status) & 0177)
+#endif
+#ifndef WCOREDUMP
+# define WCOREDUMP(status) ((status) & 0200)
+#endif
+#ifndef WSTOPSIG
+# define WSTOPSIG(status) ((status) >> 8)
+#endif
+#endif /* _WIN32 */
+
#ifdef HAVE_IO_H
-#include <io.h>
+# include <io.h>
#endif
#include <gtk/gtk.h>
#include <sys/ioctl.h>
#endif
-#ifdef HAVE_NET_IF_H
-#include <net/if.h>
-#endif
-
#include <signal.h>
#include <errno.h>
+#include <pcap.h>
+
#ifdef NEED_SNPRINTF_H
# include "snprintf.h"
#endif
-#ifndef lib_pcap_h
-#include <pcap.h>
-#endif
-
#ifdef _WIN32
#include <process.h> /* For spawning child process */
#endif
+/*
+ * XXX - the various BSDs appear to define BSD in <sys/param.h>; we don't
+ * want to include it if it's not present on this platform, however.
+ */
+#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__bsdi__)
+#ifndef BSD
+#define BSD
+#endif /* BSD */
+#endif /* defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__bsdi__) */
+
+/*
+ * We don't want to do a "select()" on the pcap_t's file descriptor on
+ * BSD (because "select()" doesn't work correctly on BPF devices on at
+ * least some releases of some flavors of BSD), and we don't want to do
+ * it on Windows (because "select()" is something for sockets, not for
+ * arbitrary handles).
+ *
+ * We *do* want to do it on other platforms, as, on other platforms (with
+ * the possible exception of Ultrix and Digital UNIX), the read timeout
+ * doesn't expire if no packets have arrived, so a "pcap_dispatch()" call
+ * will block until packets arrive, causing the UI to hang.
+ */
+#if !defined(BSD) && !defined(_WIN32)
+# define MUST_DO_SELECT
+#endif
+
#include "gtk/main.h"
#include "gtk/gtkglobals.h"
-#include "packet.h"
+#include <epan/packet.h>
#include "file.h"
#include "capture.h"
#include "util.h"
+#include "pcap-util.h"
#include "simple_dialog.h"
#include "prefs.h"
#include "globals.h"
+#include "conditions.h"
+#include "capture_stop_conditions.h"
+#include "ringbuffer.h"
#include "wiretap/libpcap.h"
#include "wiretap/wtap.h"
+#include "packet-atalk.h"
#include "packet-clip.h"
#include "packet-eth.h"
#include "packet-fddi.h"
#include "packet-null.h"
#include "packet-ppp.h"
#include "packet-raw.h"
+#include "packet-sll.h"
#include "packet-tr.h"
+#include "packet-ieee80211.h"
+#include "packet-chdlc.h"
+#include "packet-prism.h"
+
+#ifdef WIN32
+#include "capture-wpcap.h"
+#endif
+
+/*
+ * Capture options.
+ */
+capture_options capture_opts;
-int sync_mode; /* fork a child to do the capture, and sync between them */
static int sync_pipe[2]; /* used to sync father */
enum PIPES { READ, WRITE }; /* Constants 0 and 1 for READ and WRITE */
int quit_after_cap; /* Makes a "capture only mode". Implies -k */
gboolean capture_child; /* if this is the child for "-S" */
-static int fork_child; /* In parent, process ID of child */
+static int fork_child = -1; /* If not -1, in parent, process ID of child */
static guint cap_input_id;
+/*
+ * Indications sent out on the sync pipe.
+ */
+#define SP_CAPSTART ';' /* capture start message */
+#define SP_PACKET_COUNT '*' /* followed by count of packets captured since last message */
+#define SP_ERROR_MSG '!' /* followed by length of error message that follows */
+#define SP_DROPS '#' /* followed by count of packets dropped in capture */
+
#ifdef _WIN32
static guint cap_timer_id;
static int cap_timer_cb(gpointer); /* Win32 kludge to check for pipe input */
#endif
static void cap_file_input_cb(gpointer, gint, GdkInputCondition);
+static void wait_for_child(gboolean);
+#ifndef _WIN32
+static char *signame(int);
+#endif
static void capture_delete_cb(GtkWidget *, GdkEvent *, gpointer);
static void capture_stop_cb(GtkWidget *, gpointer);
static void capture_pcap_cb(u_char *, const struct pcap_pkthdr *,
const u_char *);
+static void get_capture_file_io_error(char *, int, const char *, int, gboolean);
static void send_errmsg_to_parent(const char *);
static float pct(gint, gint);
+static void stop_capture(int signo);
typedef struct _loop_data {
- gint go;
- gint max;
+ gboolean go; /* TRUE as long as we're supposed to keep capturing */
+ gint max; /* Number of packets we're supposed to capture - 0 means infinite */
+ int err; /* if non-zero, error seen while capturing */
gint linktype;
gint sync_packets;
+ gboolean pcap_err; /* TRUE if error from pcap */
gboolean from_pipe; /* TRUE if we are capturing data from a pipe */
gboolean modified; /* TRUE if data in the pipe uses modified pcap headers */
gboolean byte_swapped; /* TRUE if data in the pipe is byte swapped */
int child_process;
#endif
+/* Add a string pointer to a NULL-terminated array of string pointers. */
+static char **
+add_arg(char **args, int *argc, char *arg)
+{
+ /* Grow the array; "*argc" currently contains the number of string
+ pointers, *not* counting the NULL pointer at the end, so we have
+ to add 2 in order to get the new size of the array, including the
+ new pointer and the terminating NULL pointer. */
+ args = g_realloc(args, (*argc + 2) * sizeof (char *));
+
+ /* Stuff the pointer into the penultimate element of the array, which
+ is the one at the index specified by "*argc". */
+ args[*argc] = arg;
+
+ /* Now bump the count. */
+ (*argc)++;
+
+ /* We overwrite the NULL pointer; put it back right after the
+ element we added. */
+ args[*argc] = NULL;
+
+ return args;
+}
+
+#ifdef _WIN32
+/* Given a string, return a pointer to a quote-encapsulated version of
+ the string, so we can pass it as an argument with "spawnvp" even
+ if it contains blanks. */
+char *
+quote_encapsulate(const char *string)
+{
+ char *encapsulated_string;
+
+ encapsulated_string = g_new(char, strlen(string) + 3);
+ sprintf(encapsulated_string, "\"%s\"", string);
+ return encapsulated_string;
+}
+#endif
+
/* Open a specified file, or create a temporary file, and start a capture
to the file in question. */
void
char *msg;
int err;
int capture_succeeded;
+ gboolean stats_known;
+ struct pcap_stat stats;
if (capfile_name != NULL) {
- /* Try to open/create the specified file for use as a capture buffer. */
- cfile.save_file_fd = open(capfile_name, O_RDWR|O_BINARY|O_TRUNC|O_CREAT, 0600);
+ if (capture_opts.ringbuffer_on) {
+ /* ringbuffer is enabled */
+ cfile.save_file_fd = ringbuf_init(capfile_name,
+ capture_opts.ringbuffer_num_files);
+ } else {
+ /* Try to open/create the specified file for use as a capture buffer. */
+ cfile.save_file_fd = open(capfile_name, O_RDWR|O_BINARY|O_TRUNC|O_CREAT,
+ 0600);
+ }
is_tempfile = FALSE;
} else {
/* Choose a random name for the capture buffer */
"The temporary file to which the capture would be saved (\"%s\")"
"could not be opened: %s.", capfile_name, strerror(errno));
} else {
+ if (capture_opts.ringbuffer_on) {
+ ringbuf_error_cleanup();
+ }
simple_dialog(ESD_TYPE_CRIT, NULL,
file_open_error_message(errno, TRUE), capfile_name);
}
return;
}
- close_cap_file(&cfile, info_bar);
+ close_cap_file(&cfile);
g_assert(cfile.save_file == NULL);
cfile.save_file = capfile_name;
- if (sync_mode) { /* do the capture in a child process */
+ if (capture_opts.sync_mode) { /* do the capture in a child process */
char ssnap[24];
- char scount[24]; /* need a constant for len of numbers */
+ char scount[24]; /* need a constant for len of numbers */
+ char sautostop_filesize[24]; /* need a constant for len of numbers */
+ char sautostop_duration[24]; /* need a constant for len of numbers */
char save_file_fd[24];
char errmsg[1024+1];
int error;
+ int argc;
+ char **argv;
#ifdef _WIN32
char sync_pipe_fd[24];
+ char *fontstring;
char *filterstring;
#endif
- sprintf(ssnap,"%d",cfile.snap); /* in lieu of itoa */
- sprintf(scount,"%d",cfile.count);
- sprintf(save_file_fd,"%d",cfile.save_file_fd);
+ /* Allocate the string pointer array with enough space for the
+ terminating NULL pointer. */
+ argc = 0;
+ argv = g_malloc(sizeof (char *));
+ *argv = NULL;
+
+ /* Now add those arguments used on all platforms. */
+ argv = add_arg(argv, &argc, CHILD_NAME);
+
+ argv = add_arg(argv, &argc, "-i");
+ argv = add_arg(argv, &argc, cfile.iface);
+
+ argv = add_arg(argv, &argc, "-w");
+ argv = add_arg(argv, &argc, cfile.save_file);
+
+ argv = add_arg(argv, &argc, "-W");
+ sprintf(save_file_fd,"%d",cfile.save_file_fd); /* in lieu of itoa */
+ argv = add_arg(argv, &argc, save_file_fd);
+
+ if (capture_opts.has_autostop_count) {
+ argv = add_arg(argv, &argc, "-c");
+ sprintf(scount,"%d",capture_opts.autostop_count);
+ argv = add_arg(argv, &argc, scount);
+ }
+
+ if (capture_opts.has_snaplen) {
+ argv = add_arg(argv, &argc, "-s");
+ sprintf(ssnap,"%d",capture_opts.snaplen);
+ argv = add_arg(argv, &argc, ssnap);
+ }
+
+ if (capture_opts.has_autostop_filesize) {
+ argv = add_arg(argv, &argc, "-a");
+ sprintf(sautostop_filesize,"filesize:%d",capture_opts.autostop_filesize);
+ argv = add_arg(argv, &argc, sautostop_filesize);
+ }
+
+ if (capture_opts.has_autostop_duration) {
+ argv = add_arg(argv, &argc, "-a");
+ sprintf(sautostop_duration,"duration:%d",capture_opts.autostop_duration);
+ argv = add_arg(argv, &argc, sautostop_duration);
+ }
+
+ if (!capture_opts.promisc_mode)
+ argv = add_arg(argv, &argc, "-p");
#ifdef _WIN32
/* Create a pipe for the child process */
return;
}
+ /* Convert font name to a quote-encapsulated string and pass to child */
+ argv = add_arg(argv, &argc, "-m");
+ fontstring = quote_encapsulate(prefs.gui_font_name);
+ argv = add_arg(argv, &argc, fontstring);
+
/* Convert pipe write handle to a string and pass to child */
+ argv = add_arg(argv, &argc, "-Z");
itoa(sync_pipe[WRITE], sync_pipe_fd, 10);
- /* Convert filter string to a quote delimited string */
- filterstring = g_new(char, strlen(cfile.cfilter) + 3);
- sprintf(filterstring, "\"%s\"", cfile.cfilter);
- filterstring[strlen(cfile.cfilter) + 2] = 0;
+ argv = add_arg(argv, &argc, sync_pipe_fd);
+
+ /* Convert filter string to a quote delimited string and pass to child */
+ if (cfile.cfilter != NULL && strlen(cfile.cfilter) != 0) {
+ argv = add_arg(argv, &argc, "-f");
+ filterstring = quote_encapsulate(cfile.cfilter);
+ argv = add_arg(argv, &argc, filterstring);
+ }
+
/* Spawn process */
- fork_child = spawnlp(_P_NOWAIT, ethereal_path, CHILD_NAME, "-i", cfile.iface,
- "-w", cfile.save_file, "-W", save_file_fd,
- "-c", scount, "-s", ssnap,
- "-Z", sync_pipe_fd,
- strlen(cfile.cfilter) == 0 ? (const char *)NULL : "-f",
- strlen(cfile.cfilter) == 0 ? (const char *)NULL : filterstring,
- (const char *)NULL);
+ fork_child = spawnvp(_P_NOWAIT, ethereal_path, argv);
+ g_free(fontstring);
g_free(filterstring);
/* Keep a copy for later evaluation by _cwait() */
child_process = fork_child;
strerror(error));
return;
}
+
+ argv = add_arg(argv, &argc, "-m");
+ argv = add_arg(argv, &argc, prefs.gui_font_name);
+
+ if (cfile.cfilter != NULL && strlen(cfile.cfilter) != 0) {
+ argv = add_arg(argv, &argc, "-f");
+ argv = add_arg(argv, &argc, cfile.cfilter);
+ }
+
if ((fork_child = fork()) == 0) {
/*
* Child process - run Ethereal with the right arguments to make
close(1);
dup(sync_pipe[WRITE]);
close(sync_pipe[READ]);
- execlp(ethereal_path, CHILD_NAME, "-i", cfile.iface,
- "-w", cfile.save_file, "-W", save_file_fd,
- "-c", scount, "-s", ssnap,
- "-m", prefs.gui_font_name,
- (cfile.cfilter == NULL)? 0 : "-f",
- (cfile.cfilter == NULL)? 0 : cfile.cfilter,
- (const char *)NULL);
+ execvp(ethereal_path, argv);
snprintf(errmsg, sizeof errmsg, "Couldn't run %s in child process: %s",
ethereal_path, strerror(errno));
send_errmsg_to_parent(errmsg);
/* Parent process - read messages from the child process over the
sync pipe. */
+ g_free(argv); /* free up arg array */
/* Close the write side of the pipe, so that only the child has it
open, and thus it completely closes, and thus returns to us
if (i == 0) {
/* EOF - the child process died.
Close the read side of the sync pipe, remove the capture file,
- and report the failure.
- XXX - reap the child process and report the status in detail. */
+ and report the failure. */
close(sync_pipe[READ]);
unlink(cfile.save_file);
g_free(cfile.save_file);
cfile.save_file = NULL;
- simple_dialog(ESD_TYPE_WARN, NULL, "Capture child process died");
+ wait_for_child(TRUE);
return;
}
- if (c == ';')
+ if (c == SP_CAPSTART || c == SP_ERROR_MSG)
break;
if (!isdigit(c)) {
/* Child process handed us crap.
}
byte_count = byte_count*10 + c - '0';
}
- if (byte_count == 0) {
+ if (c == SP_CAPSTART) {
/* Success. Open the capture file, and set up to read it. */
err = start_tail_cap_file(cfile.save_file, is_tempfile, &cfile);
if (err == 0) {
} else {
/* Failure - the child process sent us a message indicating
what the problem was. */
- msg = g_malloc(byte_count + 1);
- if (msg == NULL) {
+ if (byte_count == 0) {
+ /* Zero-length message? */
simple_dialog(ESD_TYPE_WARN, NULL,
- "Capture child process failed, but its error message was too big.");
+ "Capture child process failed, but its error message was empty.");
} else {
- i = read(sync_pipe[READ], msg, byte_count);
- if (i < 0) {
+ msg = g_malloc(byte_count + 1);
+ if (msg == NULL) {
simple_dialog(ESD_TYPE_WARN, NULL,
+ "Capture child process failed, but its error message was too big.");
+ } else {
+ i = read(sync_pipe[READ], msg, byte_count);
+ msg[byte_count] = '\0';
+ if (i < 0) {
+ simple_dialog(ESD_TYPE_WARN, NULL,
"Capture child process failed: Error %s reading its error message.",
strerror(errno));
- } else if (i == 0) {
- simple_dialog(ESD_TYPE_WARN, NULL,
+ } else if (i == 0) {
+ simple_dialog(ESD_TYPE_WARN, NULL,
"Capture child process failed: EOF reading its error message.");
- } else
- simple_dialog(ESD_TYPE_WARN, NULL, msg);
- g_free(msg);
+ wait_for_child(FALSE);
+ } else
+ simple_dialog(ESD_TYPE_WARN, NULL, msg);
+ g_free(msg);
+ }
/* Close the sync pipe. */
close(sync_pipe[READ]);
}
} else {
/* Not sync mode. */
- capture_succeeded = capture();
+ capture_succeeded = capture(&stats_known, &stats);
if (quit_after_cap) {
/* DON'T unlink the save file. Presumably someone wants it. */
gtk_exit(0);
if ((err = open_cap_file(cfile.save_file, is_tempfile, &cfile)) == 0) {
/* Set the read filter to NULL. */
cfile.rfcode = NULL;
+
+ /* Get the packet-drop statistics.
+
+ XXX - there are currently no packet-drop statistics stored
+ in libpcap captures, and that's what we're reading.
+
+ At some point, we will add support in Wiretap to return
+ packet-drop statistics for capture file formats that store it,
+ and will make "read_cap_file()" get those statistics from
+ Wiretap. We clear the statistics (marking them as "not known")
+ in "open_cap_file()", and "read_cap_file()" will only fetch
+ them and mark them as known if Wiretap supplies them, so if
+ we get the statistics now, after calling "open_cap_file()" but
+ before calling "read_cap_file()", the values we store will
+ be used by "read_cap_file()".
+
+ If a future libpcap capture file format stores the statistics,
+ we'll put them into the capture file that we write, and will
+ thus not have to set them here - "read_cap_file()" will get
+ them from the file and use them. */
+ if (stats_known) {
+ cfile.drops_known = TRUE;
+
+ /* XXX - on some systems, libpcap doesn't bother filling in
+ "ps_ifdrop" - it doesn't even set it to zero - so we don't
+ bother looking at it.
+
+ Ideally, libpcap would have an interface that gave us
+ several statistics - perhaps including various interface
+ error statistics - and would tell us which of them it
+ supplies, allowing us to display only the ones it does. */
+ cfile.drops = stats.ps_drop;
+ }
switch (read_cap_file(&cfile, &err)) {
case READ_SUCCESS:
}
/* We're not doing a capture any more, so we don't have a save
file. */
- g_free(cfile.save_file);
+ if (capture_opts.ringbuffer_on) {
+ ringbuf_free();
+ } else {
+ g_free(cfile.save_file);
+ }
cfile.save_file = NULL;
}
}
cap_file_input_cb(gpointer data, gint source, GdkInputCondition condition)
{
capture_file *cf = (capture_file *)data;
- char buffer[256+1], *p = buffer, *q = buffer;
- int nread;
+#define BUFSIZE 4096
+ char buffer[BUFSIZE+1], *p = buffer, *q = buffer, *msg, *r;
+ int nread, msglen, chars_to_copy;
int to_read = 0;
- gboolean exit_loop = FALSE;
int err;
- int wstatus;
- int wsignal;
- char *msg;
- char *sigmsg;
- char sigmsg_buf[6+1+3+1];
- char *coredumped;
#ifndef _WIN32
/* avoid reentrancy problems and stack overflow */
gtk_input_remove(cap_input_id);
#endif
- if ((nread = read(sync_pipe[READ], buffer, 256)) <= 0) {
+ if ((nread = read(sync_pipe[READ], buffer, BUFSIZE)) <= 0) {
/* The child has closed the sync pipe, meaning it's not going to be
capturing any more packets. Pick up its exit status, and
- complain if it died of a signal. */
-#ifdef _WIN32
- /* XXX - analyze the wait stuatus and display more information
- in the dialog box? */
- if (_cwait(&wstatus, child_process, _WAIT_CHILD) == -1) {
- simple_dialog(ESD_TYPE_WARN, NULL, "Child capture process stopped unexpectedly");
- }
-#else
- if (wait(&wstatus) != -1) {
- /* XXX - are there any platforms on which we can run that *don't*
- support POSIX.1's <sys/wait.h> and macros therein? */
- wsignal = wstatus & 0177;
- coredumped = "";
- if (wstatus == 0177) {
- /* It stopped, rather than exiting. "Should not happen." */
- msg = "stopped";
- wsignal = (wstatus >> 8) & 0xFF;
- } else {
- msg = "terminated";
- if (wstatus & 0200)
- coredumped = " - core dumped";
- }
- if (wsignal != 0) {
- switch (wsignal) {
-
- case SIGHUP:
- sigmsg = "Hangup";
- break;
-
- case SIGINT:
- sigmsg = "Interrupted";
- break;
-
- case SIGQUIT:
- sigmsg = "Quit";
- break;
-
- case SIGILL:
- sigmsg = "Illegal instruction";
- break;
-
- case SIGTRAP:
- sigmsg = "Trace trap";
- break;
-
- case SIGABRT:
- sigmsg = "Abort";
- break;
-
- case SIGFPE:
- sigmsg = "Arithmetic exception";
- break;
-
- case SIGKILL:
- sigmsg = "Killed";
- break;
-
- case SIGBUS:
- sigmsg = "Bus error";
- break;
-
- case SIGSEGV:
- sigmsg = "Segmentation violation";
- break;
-
- /* http://metalab.unc.edu/pub/Linux/docs/HOWTO/GCC-HOWTO
- Linux is POSIX compliant. These are not POSIX-defined signals ---
- ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990), paragraph B.3.3.1.1 sez:
-
- ``The signals SIGBUS, SIGEMT, SIGIOT, SIGTRAP, and SIGSYS
- were omitted from POSIX.1 because their behavior is
- implementation dependent and could not be adequately catego-
- rized. Conforming implementations may deliver these sig-
- nals, but must document the circumstances under which they
- are delivered and note any restrictions concerning their
- delivery.''
- */
-
- #ifdef SIGSYS
- case SIGSYS:
- sigmsg = "Bad system call";
- break;
- #endif
-
- case SIGPIPE:
- sigmsg = "Broken pipe";
- break;
-
- case SIGALRM:
- sigmsg = "Alarm clock";
- break;
-
- case SIGTERM:
- sigmsg = "Terminated";
- break;
-
- default:
- sprintf(sigmsg_buf, "Signal %d", wsignal);
- sigmsg = sigmsg_buf;
- break;
- }
- simple_dialog(ESD_TYPE_WARN, NULL,
- "Child capture process %s: %s%s", msg, sigmsg, coredumped);
- }
- }
-#endif
+ complain if it did anything other than exit with status 0. */
+ wait_for_child(FALSE);
/* Read what remains of the capture file, and finish the capture.
XXX - do something if this fails? */
buffer[nread] = '\0';
- while(!exit_loop) {
- /* look for (possibly multiple) '*' */
+ while (nread != 0) {
+ /* look for (possibly multiple) indications */
switch (*q) {
- case '*' :
+ case SP_PACKET_COUNT :
to_read += atoi(p);
- p = q + 1;
+ p = q + 1;
+ q++;
+ nread--;
+ break;
+ case SP_DROPS :
+ cf->drops_known = TRUE;
+ cf->drops = atoi(p);
+ p = q + 1;
q++;
+ nread--;
break;
- case '\0' :
- /* XXX should handle the case of a pipe full (i.e. no star found) */
- exit_loop = TRUE;
+ case SP_ERROR_MSG :
+ msglen = atoi(p);
+ p = q + 1;
+ q++;
+ nread--;
+
+ /* Read the entire message.
+ XXX - if the child hasn't sent it all yet, this could cause us
+ to hang until they do. */
+ msg = g_malloc(msglen + 1);
+ r = msg;
+ while (msglen != 0) {
+ if (nread == 0) {
+ /* Read more. */
+ if ((nread = read(sync_pipe[READ], buffer, BUFSIZE)) <= 0)
+ break;
+ p = buffer;
+ q = buffer;
+ }
+ chars_to_copy = MIN(msglen, nread);
+ memcpy(r, q, chars_to_copy);
+ r += chars_to_copy;
+ q += chars_to_copy;
+ nread -= chars_to_copy;
+ msglen -= chars_to_copy;
+ }
+ *r = '\0';
+ simple_dialog(ESD_TYPE_WARN, NULL, msg);
+ g_free(msg);
break;
default :
q++;
+ nread--;
break;
}
}
#endif
}
+static void
+wait_for_child(gboolean always_report)
+{
+ int wstatus;
+
+#ifdef _WIN32
+ /* XXX - analyze the wait stuatus and display more information
+ in the dialog box? */
+ if (_cwait(&wstatus, child_process, _WAIT_CHILD) == -1) {
+ simple_dialog(ESD_TYPE_WARN, NULL, "Child capture process stopped unexpectedly");
+ }
+#else
+ if (wait(&wstatus) != -1) {
+ if (WIFEXITED(wstatus)) {
+ /* The child exited; display its exit status, if it's not zero,
+ and even if it's zero if "always_report" is true. */
+ if (always_report || WEXITSTATUS(wstatus) != 0) {
+ simple_dialog(ESD_TYPE_WARN, NULL,
+ "Child capture process exited: exit status %d",
+ WEXITSTATUS(wstatus));
+ }
+ } else if (WIFSTOPPED(wstatus)) {
+ /* It stopped, rather than exiting. "Should not happen." */
+ simple_dialog(ESD_TYPE_WARN, NULL,
+ "Child capture process stopped: %s",
+ signame(WSTOPSIG(wstatus)));
+ } else if (WIFSIGNALED(wstatus)) {
+ /* It died with a signal. */
+ simple_dialog(ESD_TYPE_WARN, NULL,
+ "Child capture process died: %s%s",
+ signame(WTERMSIG(wstatus)),
+ WCOREDUMP(wstatus) ? " - core dumped" : "");
+ } else {
+ /* What? It had to either have exited, or stopped, or died with
+ a signal; what happened here? */
+ simple_dialog(ESD_TYPE_WARN, NULL,
+ "Child capture process died: wait status %#o", wstatus);
+ }
+ }
+
+ /* No more child process. */
+ fork_child = -1;
+#endif
+}
+
+#ifndef _WIN32
+static char *
+signame(int sig)
+{
+ char *sigmsg;
+ static char sigmsg_buf[6+1+3+1];
+
+ switch (sig) {
+
+ case SIGHUP:
+ sigmsg = "Hangup";
+ break;
+
+ case SIGINT:
+ sigmsg = "Interrupted";
+ break;
+
+ case SIGQUIT:
+ sigmsg = "Quit";
+ break;
+
+ case SIGILL:
+ sigmsg = "Illegal instruction";
+ break;
+
+ case SIGTRAP:
+ sigmsg = "Trace trap";
+ break;
+
+ case SIGABRT:
+ sigmsg = "Abort";
+ break;
+
+ case SIGFPE:
+ sigmsg = "Arithmetic exception";
+ break;
+
+ case SIGKILL:
+ sigmsg = "Killed";
+ break;
+
+ case SIGBUS:
+ sigmsg = "Bus error";
+ break;
+
+ case SIGSEGV:
+ sigmsg = "Segmentation violation";
+ break;
+
+ /* http://metalab.unc.edu/pub/Linux/docs/HOWTO/GCC-HOWTO
+ Linux is POSIX compliant. These are not POSIX-defined signals ---
+ ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990), paragraph B.3.3.1.1 sez:
+
+ ``The signals SIGBUS, SIGEMT, SIGIOT, SIGTRAP, and SIGSYS
+ were omitted from POSIX.1 because their behavior is
+ implementation dependent and could not be adequately catego-
+ rized. Conforming implementations may deliver these sig-
+ nals, but must document the circumstances under which they
+ are delivered and note any restrictions concerning their
+ delivery.''
+
+ So we only check for SIGSYS on those systems that happen to
+ implement them (a system can be POSIX-compliant and implement
+ them, it's just that POSIX doesn't *require* a POSIX-compliant
+ system to implement them).
+ */
+
+#ifdef SIGSYS
+ case SIGSYS:
+ sigmsg = "Bad system call";
+ break;
+#endif
+
+ case SIGPIPE:
+ sigmsg = "Broken pipe";
+ break;
+
+ case SIGALRM:
+ sigmsg = "Alarm clock";
+ break;
+
+ case SIGTERM:
+ sigmsg = "Terminated";
+ break;
+
+ default:
+ sprintf(sigmsg_buf, "Signal %d", sig);
+ sigmsg = sigmsg_buf;
+ break;
+ }
+ return sigmsg;
+}
+#endif
+
/*
* Timeout, in milliseconds, for reads from the stream of captured packets.
+ *
+ * XXX - Michael Tuexen says MacOS X's BPF appears to be broken, in that
+ * if you use a timeout of 250 in "pcap_open_live()", you don't see
+ * packets until a large number of packets arrive; the timeout doesn't
+ * cause a smaller number of packets to be delivered. Perhaps a timeout
+ * that's less than 1 second acts like no timeout at all, so that you
+ * don't see packets until the BPF buffer fills up?
+ *
+ * The workaround is to use a timeout of 1000 seconds on MacOS X.
*/
+#ifdef __APPLE__
+#define CAP_READ_TIMEOUT 1000
+#else
#define CAP_READ_TIMEOUT 250
+#endif
#ifndef _WIN32
/* Take carre of byte order in the libpcap headers read from pipes.
close(fd);
return -1;
}
- while (bytes_read < sizeof(struct pcap_hdr))
+ while ((unsigned) bytes_read < sizeof(struct pcap_hdr))
{
b = read(fd, ((char *)&hdr)+bytes_read, sizeof(struct pcap_hdr) - bytes_read);
if (b <= 0) {
ld->go = FALSE;
return 0;
}
- while (bytes_read < rechdr.hdr.incl_len)
+ while ((unsigned) bytes_read < rechdr.hdr.incl_len)
{
b = read(fd, pd+bytes_read, rechdr.hdr.incl_len - bytes_read);
if (b <= 0) {
whdr.pkt_encap = ld->linktype;
wtap_dump(ld->pdh, &whdr, NULL, pd, &err);
- /* Set the initial payload to the packet length, and the initial
- captured payload to the capture length (other protocols may
- reduce them if their headers say they're less). */
- pi.len = whdr.len;
- pi.captured_len = whdr.caplen;
-
/* update capture statistics */
switch (ld->linktype) {
case WTAP_ENCAP_ETHERNET:
- capture_eth(pd, 0, &ld->counts);
+ capture_eth(pd, 0, whdr.caplen, &ld->counts);
break;
case WTAP_ENCAP_FDDI:
case WTAP_ENCAP_FDDI_BITSWAPPED:
- capture_fddi(pd, &ld->counts);
+ capture_fddi(pd, whdr.caplen, &ld->counts);
break;
- case WTAP_ENCAP_TR:
- capture_tr(pd, 0, &ld->counts);
+ case WTAP_ENCAP_PRISM_HEADER:
+ capture_prism(pd, 0, whdr.caplen, &ld->counts);
+ break;
+ case WTAP_ENCAP_TOKEN_RING:
+ capture_tr(pd, 0, whdr.caplen, &ld->counts);
break;
case WTAP_ENCAP_NULL:
- capture_null(pd, &ld->counts);
+ capture_null(pd, whdr.caplen, &ld->counts);
break;
case WTAP_ENCAP_PPP:
- capture_ppp(pd, 0, &ld->counts);
+ capture_ppp_hdlc(pd, 0, whdr.caplen, &ld->counts);
break;
case WTAP_ENCAP_RAW_IP:
- capture_raw(pd, &ld->counts);
+ capture_raw(pd, whdr.caplen, &ld->counts);
break;
case WTAP_ENCAP_LINUX_ATM_CLIP:
- capture_clip(pd, &ld->counts);
+ capture_clip(pd, whdr.caplen, &ld->counts);
+ break;
+ case WTAP_ENCAP_IEEE_802_11:
+ case WTAP_ENCAP_IEEE_802_11_WITH_RADIO:
+ capture_ieee80211(pd, 0, whdr.caplen, &ld->counts);
+ break;
+ case WTAP_ENCAP_CHDLC:
+ capture_chdlc(pd, 0, whdr.caplen, &ld->counts);
+ break;
+ case WTAP_ENCAP_LOCALTALK:
+ capture_llap(pd, whdr.caplen, &ld->counts);
break;
/* XXX - FreeBSD may append 4-byte ATM pseudo-header to DLT_ATM_RFC1483,
with LLC header following; we should implement it at some
}
#endif
+/*
+ * This needs to be static, so that the SIGUSR1 handler can clear the "go"
+ * flag.
+ */
+static loop_data ld;
+
/* Do the low-level work of a capture.
Returns TRUE if it succeeds, FALSE otherwise. */
int
-capture(void)
+capture(gboolean *stats_known, struct pcap_stat *stats)
{
- GtkWidget *cap_w, *main_vb, *count_lb, *sctp_lb, *tcp_lb, *udp_lb, *icmp_lb,
- *ospf_lb, *gre_lb, *netbios_lb, *ipx_lb, *vines_lb, *other_lb, *stop_bt;
+ GtkWidget *cap_w, *main_vb, *stop_bt, *counts_tb;
pcap_t *pch;
int pcap_encap;
- int snaplen;
- gchar err_str[PCAP_ERRBUF_SIZE], label_str[64];
- loop_data ld;
+ int file_snaplen;
+ gchar open_err_str[PCAP_ERRBUF_SIZE];
+ gchar lookup_net_err_str[PCAP_ERRBUF_SIZE];
+ gchar label_str[64];
bpf_u_int32 netnum, netmask;
+ struct bpf_program fcode;
time_t upd_time, cur_time;
int err, inpkts;
+ condition *cnd_stop_capturesize = NULL;
+ condition *cnd_stop_timeout = NULL;
+ unsigned int i;
+ static const char capstart_msg = SP_CAPSTART;
char errmsg[4096+1];
+ gboolean dump_ok;
#ifndef _WIN32
static const char ppamsg[] = "can't find PPA for ";
char *libpcap_warn;
#endif
fd_set set1;
struct timeval timeout;
-#ifdef linux
+#ifdef MUST_DO_SELECT
int pcap_fd = 0;
#endif
#ifdef _WIN32
int pipe_fd = -1;
struct pcap_hdr hdr;
#endif
+ struct {
+ const gchar *title;
+ gint *value_ptr;
+ GtkWidget *label, *value, *percent;
+ } counts[] = {
+ { "Total", &ld.counts.total, NULL, NULL, NULL },
+ { "SCTP", &ld.counts.sctp, NULL, NULL, NULL },
+ { "TCP", &ld.counts.tcp, NULL, NULL, NULL },
+ { "UDP", &ld.counts.udp, NULL, NULL, NULL },
+ { "ICMP", &ld.counts.icmp, NULL, NULL, NULL },
+ { "OSPF", &ld.counts.ospf, NULL, NULL, NULL },
+ { "GRE", &ld.counts.gre, NULL, NULL, NULL },
+ { "NetBIOS", &ld.counts.netbios, NULL, NULL, NULL },
+ { "IPX", &ld.counts.ipx, NULL, NULL, NULL },
+ { "VINES", &ld.counts.vines, NULL, NULL, NULL },
+ { "Other", &ld.counts.other, NULL, NULL, NULL }
+ };
+
+#define N_COUNTS (sizeof counts / sizeof counts[0])
/* Initialize Windows Socket if we are in a WIN32 OS
This needs to be done before querying the interface for network/netmask */
ld.go = TRUE;
ld.counts.total = 0;
- ld.max = cfile.count;
+ if (capture_opts.has_autostop_count)
+ ld.max = capture_opts.autostop_count;
+ else
+ ld.max = 0; /* no limit */
+ ld.err = 0; /* no error seen yet */
ld.linktype = WTAP_ENCAP_UNKNOWN;
+ ld.pcap_err = FALSE;
ld.from_pipe = FALSE;
ld.sync_packets = 0;
ld.counts.sctp = 0;
ld.counts.other = 0;
ld.pdh = NULL;
- /* Open the network interface to capture from it. */
- pch = pcap_open_live(cfile.iface, cfile.snap, 1, CAP_READ_TIMEOUT, err_str);
+ /* We haven't yet gotten the capture statistics. */
+ *stats_known = FALSE;
+
+ /* Open the network interface to capture from it.
+ Some versions of libpcap may put warnings into the error buffer
+ if they succeed; to tell if that's happened, we have to clear
+ the error buffer, and check if it's still a null string. */
+ open_err_str[0] = '\0';
+ pch = pcap_open_live(cfile.iface,
+ capture_opts.has_snaplen ? capture_opts.snaplen :
+ WTAP_MAX_PACKET_SIZE,
+ capture_opts.promisc_mode, CAP_READ_TIMEOUT,
+ open_err_str);
if (pch == NULL) {
#ifdef _WIN32
/* On Win32 OSes, the capture devices are probably available to all
users; don't warn about permissions problems.
- Do, however, warn that Token Ring and PPP devices aren't supported. */
+ Do, however, warn that WAN devices aren't supported. */
snprintf(errmsg, sizeof errmsg,
"The capture session could not be initiated (%s).\n"
"Please check that you have the proper interface specified.\n"
"\n"
"Note that the driver Ethereal uses for packet capture on Windows\n"
- "doesn't support capturing on Token Ring interfaces, and doesn't\n"
- "support capturing on PPP/WAN interfaces in Windows NT/2000.\n",
- err_str);
+ "doesn't support capturing on PPP/WAN interfaces in Windows NT/2000.\n",
+ open_err_str);
goto error;
#else
/* try to open cfile.iface as a pipe */
- pipe_fd = pipe_open_live(cfile.iface, &hdr, &ld, err_str);
+ pipe_fd = pipe_open_live(cfile.iface, &hdr, &ld, open_err_str);
if (pipe_fd == -1) {
/* Well, we couldn't start the capture.
/* If we got a "can't find PPA for XXX" message, warn the user (who
is running Ethereal on HP-UX) that they don't have a version
- of libpcap patched to properly handle HP-UX (the patched version
- says "can't find /dev/dlpi PPA for XXX" rather than "can't find
- PPA for XXX"). */
- if (strncmp(err_str, ppamsg, sizeof ppamsg - 1) == 0)
+ of libpcap that properly handles HP-UX (libpcap 0.6.x and later
+ versions, which properly handle HP-UX, say "can't find /dev/dlpi
+ PPA for XXX" rather than "can't find PPA for XXX"). */
+ if (strncmp(open_err_str, ppamsg, sizeof ppamsg - 1) == 0)
libpcap_warn =
"\n\n"
"You are running Ethereal with a version of the libpcap library\n"
"that doesn't handle HP-UX network devices well; this means that\n"
"Ethereal may not be able to capture packets.\n"
"\n"
- "To fix this, you will need to download the source to Ethereal\n"
- "from ethereal.zing.org if you have not already done so, read\n"
- "the instructions in the \"README.hpux\" file in the source\n"
- "distribution, download the source to libpcap if you have not\n"
- "already done so, patch libpcap as per the instructions, rebuild\n"
- "and install libpcap, and then build Ethereal (if you have already\n"
- "built Ethereal from source, do a \"make distclean\" and re-run\n"
- "configure before building).";
+ "To fix this, you should install libpcap 0.6.2, or a later version\n"
+ "of libpcap, rather than libpcap 0.4 or 0.5.x. It is available in\n"
+ "packaged binary form from the Software Porting And Archive Centre\n"
+ "for HP-UX; the Centre is at http://hpux.connect.org.uk/ - the page\n"
+ "at the URL lists a number of mirror sites.";
else
libpcap_warn = "";
snprintf(errmsg, sizeof errmsg,
"The capture session could not be initiated (%s).\n"
"Please check to make sure you have sufficient permissions, and that\n"
- "you have the proper interface or pipe specified.%s", err_str,
+ "you have the proper interface or pipe specified.%s", open_err_str,
libpcap_warn);
goto error;
}
/* capture filters only work on real interfaces */
if (cfile.cfilter && !ld.from_pipe) {
/* A capture filter was specified; set it up. */
- if (pcap_lookupnet (cfile.iface, &netnum, &netmask, err_str) < 0) {
- snprintf(errmsg, sizeof errmsg,
- "Can't use filter: Couldn't obtain netmask info (%s).", err_str);
- goto error;
+ if (pcap_lookupnet(cfile.iface, &netnum, &netmask, lookup_net_err_str) < 0) {
+ /*
+ * Well, we can't get the netmask for this interface; it's used
+ * only for filters that check for broadcast IP addresses, so
+ * we just punt and use 0. It might be nice to warn the user,
+ * but that's a pain in a GUI application, as it'd involve popping
+ * up a message box, and it's not clear how often this would make
+ * a difference (only filters that check for IP broadcast addresses
+ * use the netmask).
+ */
+ netmask = 0;
}
- if (pcap_compile(pch, &cfile.fcode, cfile.cfilter, 1, netmask) < 0) {
+ if (pcap_compile(pch, &fcode, cfile.cfilter, 1, netmask) < 0) {
snprintf(errmsg, sizeof errmsg, "Unable to parse filter string (%s).",
pcap_geterr(pch));
goto error;
}
- if (pcap_setfilter(pch, &cfile.fcode) < 0) {
+ if (pcap_setfilter(pch, &fcode) < 0) {
snprintf(errmsg, sizeof errmsg, "Can't install filter (%s).",
pcap_geterr(pch));
goto error;
#ifndef _WIN32
if (ld.from_pipe) {
pcap_encap = hdr.network;
- snaplen = hdr.snaplen;
+ file_snaplen = hdr.snaplen;
} else
#endif
{
- pcap_encap = pcap_datalink(pch);
- snaplen = pcap_snapshot(pch);
+ pcap_encap = get_pcap_linktype(pch, cfile.iface);
+ file_snaplen = pcap_snapshot(pch);
}
ld.linktype = wtap_pcap_encap_to_wtap_encap(pcap_encap);
if (ld.linktype == WTAP_ENCAP_UNKNOWN) {
" that Ethereal doesn't support (data link type %d).", pcap_encap);
goto error;
}
- ld.pdh = wtap_dump_fdopen(cfile.save_file_fd, WTAP_FILE_PCAP,
- ld.linktype, snaplen, &err);
+ if (capture_opts.ringbuffer_on) {
+ ld.pdh = ringbuf_init_wtap_dump_fdopen(WTAP_FILE_PCAP, ld.linktype,
+ file_snaplen, &err);
+ } else {
+ ld.pdh = wtap_dump_fdopen(cfile.save_file_fd, WTAP_FILE_PCAP,
+ ld.linktype, file_snaplen, &err);
+ }
if (ld.pdh == NULL) {
/* We couldn't set up to write to the capture file. */
goto error;
}
+ /* Does "open_err_str" contain a non-empty string? If so, "pcap_open_live()"
+ returned a warning; print it, but keep capturing. */
+ if (open_err_str[0] != '\0')
+ g_warning("%s.", open_err_str);
+
/* XXX - capture SIGTERM and close the capture, in case we're on a
Linux 2.0[.x] system and you have to explicitly close the capture
stream in order to turn promiscuous mode off? We need to do that
update its windows to indicate that we have a live capture in
progress. */
fflush(wtap_dump_file(ld.pdh));
- write(1, "0;", 2);
+ write(1, &capstart_msg, 1);
}
cap_w = gtk_window_new(GTK_WINDOW_TOPLEVEL);
gtk_container_add(GTK_CONTAINER(cap_w), main_vb);
gtk_widget_show(main_vb);
- count_lb = gtk_label_new("Count: 0");
- gtk_box_pack_start(GTK_BOX(main_vb), count_lb, FALSE, FALSE, 3);
- gtk_widget_show(count_lb);
-
- sctp_lb = gtk_label_new("SCTP: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), sctp_lb, FALSE, FALSE, 3);
- gtk_widget_show(sctp_lb);
-
- tcp_lb = gtk_label_new("TCP: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), tcp_lb, FALSE, FALSE, 3);
- gtk_widget_show(tcp_lb);
+ /* Individual statistic elements */
+ counts_tb = gtk_table_new(N_COUNTS, 3, TRUE);
+ gtk_box_pack_start(GTK_BOX(main_vb), counts_tb, TRUE, TRUE, 3);
+ gtk_widget_show(counts_tb);
- udp_lb = gtk_label_new("UDP: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), udp_lb, FALSE, FALSE, 3);
- gtk_widget_show(udp_lb);
+ for (i = 0; i < N_COUNTS; i++) {
+ counts[i].label = gtk_label_new(counts[i].title);
+ gtk_misc_set_alignment(GTK_MISC(counts[i].label), 0.0f, 0.0f);
- icmp_lb = gtk_label_new("ICMP: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), icmp_lb, FALSE, FALSE, 3);
- gtk_widget_show(icmp_lb);
+ counts[i].value = gtk_label_new("0");
+ gtk_misc_set_alignment(GTK_MISC(counts[i].value), 0.0f, 0.0f);
- ospf_lb = gtk_label_new("OSPF: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), ospf_lb, FALSE, FALSE, 3);
- gtk_widget_show(ospf_lb);
+ counts[i].percent = gtk_label_new("0.0%");
+ gtk_misc_set_alignment(GTK_MISC(counts[i].percent), 0.0f, 0.0f);
- gre_lb = gtk_label_new("GRE: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), gre_lb, FALSE, FALSE, 3);
- gtk_widget_show(gre_lb);
+ gtk_table_attach_defaults(GTK_TABLE(counts_tb),
+ counts[i].label, 0, 1, i, i + 1);
- netbios_lb = gtk_label_new("NetBIOS: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), netbios_lb, FALSE, FALSE, 3);
- gtk_widget_show(netbios_lb);
+ gtk_table_attach(GTK_TABLE(counts_tb),
+ counts[i].value,
+ 1, 2, i, i + 1, 0, 0, 5, 0);
- ipx_lb = gtk_label_new("IPX: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), ipx_lb, FALSE, FALSE, 3);
- gtk_widget_show(ipx_lb);
+ gtk_table_attach_defaults(GTK_TABLE(counts_tb),
+ counts[i].percent, 2, 3, i, i + 1);
- vines_lb = gtk_label_new("VINES: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), vines_lb, FALSE, FALSE, 3);
- gtk_widget_show(vines_lb);
-
- other_lb = gtk_label_new("Other: 0 (0.0%)");
- gtk_box_pack_start(GTK_BOX(main_vb), other_lb, FALSE, FALSE, 3);
- gtk_widget_show(other_lb);
+ gtk_widget_show(counts[i].label);
+ gtk_widget_show(counts[i].value);
+ gtk_widget_show(counts[i].percent);
+ }
/* allow user to either click a stop button, or the close button on
the window to stop a capture in progress. */
gtk_widget_show(cap_w);
upd_time = time(NULL);
-#ifdef linux
+#ifdef MUST_DO_SELECT
if (!ld.from_pipe) pcap_fd = pcap_fileno(pch);
#endif
+
+#ifndef _WIN32
+ /*
+ * Catch SIGUSR1, so that we exit cleanly if the parent process
+ * kills us with it due to the user selecting "Capture->Stop".
+ */
+ signal(SIGUSR1, stop_capture);
+#endif
+ /* initialize capture stop conditions */
+ init_capture_stop_conditions();
+ /* create stop conditions */
+ if (capture_opts.has_autostop_filesize)
+ cnd_stop_capturesize =
+ cnd_new(CND_CLASS_CAPTURESIZE,(long)capture_opts.autostop_filesize * 1000);
+ if (capture_opts.has_autostop_duration)
+ cnd_stop_timeout =
+ cnd_new(CND_CLASS_TIMEOUT,(gint32)capture_opts.autostop_duration);
+
while (ld.go) {
while (gtk_events_pending()) gtk_main_iteration();
else
#endif
{
-#ifdef linux
+#ifdef MUST_DO_SELECT
/*
* Sigh. The semantics of the read timeout argument to
* "pcap_open_live()" aren't particularly well specified by
* until the buffer fills or a timer expires - and the Linux
* libpcap doesn't actually support it, so we can't use it
* to break out of the "pcap_dispatch()" every 1/4 of a second
- * or so.
+ * or so. Linux's libpcap is not the only libpcap that doesn't
+ * support the read timeout.
+ *
+ * Furthermore, at least on Solaris, the bufmod STREAMS module's
+ * read timeout won't go off if no data has arrived, i.e. it cannot
+ * be used to guarantee that a read from a DLPI stream will return
+ * within a specified amount of time regardless of whether any
+ * data arrives or not.
*
- * Thus, on Linux, we do a "select()" on the file descriptor for the
- * capture, with a timeout of CAP_READ_TIMEOUT milliseconds, or
- * CAP_READ_TIMEOUT*1000 microseconds.
+ * Thus, on all platforms other than BSD, we do a "select()" on the
+ * file descriptor for the capture, with a timeout of CAP_READ_TIMEOUT
+ * milliseconds, or CAP_READ_TIMEOUT*1000 microseconds.
+ *
+ * "select()", on BPF devices, doesn't work as you might expect;
+ * at least on some versions of some flavors of BSD, the timer
+ * doesn't start until a read is done, so it won't expire if
+ * only a "select()" or "poll()" is posted.
*/
FD_ZERO(&set1);
FD_SET(pcap_fd, &set1);
* it.
*/
inpkts = pcap_dispatch(pch, 1, capture_pcap_cb, (u_char *) &ld);
+ if (inpkts < 0) {
+ ld.pcap_err = TRUE;
+ ld.go = FALSE;
+ }
} else
inpkts = 0;
#else
inpkts = pcap_dispatch(pch, 1, capture_pcap_cb, (u_char *) &ld);
+ if (inpkts < 0) {
+ ld.pcap_err = TRUE;
+ ld.go = FALSE;
+ }
#endif
}
if (inpkts > 0)
ld.sync_packets += inpkts;
+ /* check capture stop conditons */
+ if (cnd_stop_timeout != NULL && cnd_eval(cnd_stop_timeout)) {
+ /* The specified capture time has elapsed; stop the capture. */
+ ld.go = FALSE;
+ } else if (cnd_stop_capturesize != NULL && cnd_eval(cnd_stop_capturesize,
+ (guint32)wtap_get_bytes_dumped(ld.pdh))){
+ /* Capture file reached its maximum size. */
+ if (capture_opts.ringbuffer_on) {
+ /* Switch to the next ringbuffer file */
+ if (ringbuf_switch_file(&cfile, &ld.pdh, &ld.err)) {
+ /* File switch succeeded: reset the condition */
+ cnd_reset(cnd_stop_capturesize);
+ } else {
+ /* File switch failed: stop here */
+ ld.go = FALSE;
+ continue;
+ }
+ } else {
+ /* no ringbuffer - just stop */
+ ld.go = FALSE;
+ }
+ }
/* Only update once a second so as not to overload slow displays */
cur_time = time(NULL);
if (cur_time > upd_time) {
upd_time = cur_time;
- sprintf(label_str, "Count: %d", ld.counts.total);
- gtk_label_set(GTK_LABEL(count_lb), label_str);
-
- sprintf(label_str, "SCTP: %d (%.1f%%)", ld.counts.sctp,
- pct(ld.counts.sctp, ld.counts.total));
- gtk_label_set(GTK_LABEL(sctp_lb), label_str);
-
- sprintf(label_str, "TCP: %d (%.1f%%)", ld.counts.tcp,
- pct(ld.counts.tcp, ld.counts.total));
- gtk_label_set(GTK_LABEL(tcp_lb), label_str);
-
- sprintf(label_str, "UDP: %d (%.1f%%)", ld.counts.udp,
- pct(ld.counts.udp, ld.counts.total));
- gtk_label_set(GTK_LABEL(udp_lb), label_str);
-
- sprintf(label_str, "ICMP: %d (%.1f%%)", ld.counts.icmp,
- pct(ld.counts.icmp, ld.counts.total));
- gtk_label_set(GTK_LABEL(icmp_lb), label_str);
+ for (i = 0; i < N_COUNTS; i++) {
+ snprintf(label_str, sizeof(label_str), "%d",
+ *counts[i].value_ptr);
- sprintf(label_str, "OSPF: %d (%.1f%%)", ld.counts.ospf,
- pct(ld.counts.ospf, ld.counts.total));
- gtk_label_set(GTK_LABEL(ospf_lb), label_str);
+ gtk_label_set(GTK_LABEL(counts[i].value), label_str);
- sprintf(label_str, "GRE: %d (%.1f%%)", ld.counts.gre,
- pct(ld.counts.gre, ld.counts.total));
- gtk_label_set(GTK_LABEL(gre_lb), label_str);
+ snprintf(label_str, sizeof(label_str), "(%.1f%%)",
+ pct(*counts[i].value_ptr, ld.counts.total));
- sprintf(label_str, "NetBIOS: %d (%.1f%%)", ld.counts.netbios,
- pct(ld.counts.netbios, ld.counts.total));
- gtk_label_set(GTK_LABEL(netbios_lb), label_str);
-
- sprintf(label_str, "IPX: %d (%.1f%%)", ld.counts.ipx,
- pct(ld.counts.ipx, ld.counts.total));
- gtk_label_set(GTK_LABEL(ipx_lb), label_str);
-
- sprintf(label_str, "VINES: %d (%.1f%%)", ld.counts.vines,
- pct(ld.counts.vines, ld.counts.total));
- gtk_label_set(GTK_LABEL(vines_lb), label_str);
-
- sprintf(label_str, "Other: %d (%.1f%%)", ld.counts.other,
- pct(ld.counts.other, ld.counts.total));
- gtk_label_set(GTK_LABEL(other_lb), label_str);
+ gtk_label_set(GTK_LABEL(counts[i].percent), label_str);
+ }
/* do sync here, too */
fflush(wtap_dump_file(ld.pdh));
our parent a message saying we've written out "ld.sync_packets"
packets to the capture file. */
char tmp[20];
- sprintf(tmp, "%d*", ld.sync_packets);
+ sprintf(tmp, "%d%c", ld.sync_packets, SP_PACKET_COUNT);
write(1, tmp, strlen(tmp));
ld.sync_packets = 0;
}
}
}
- if (!wtap_dump_close(ld.pdh, &err)) {
- /* XXX - in fork mode, this may not pop up, or, if it does,
- it may disappear as soon as we exit.
-
- We should have the parent process, while it's reading
- the packet count update messages, catch error messages
- and pop up a message box if it sees one. */
- switch (err) {
-
- case WTAP_ERR_CANT_CLOSE:
- simple_dialog(ESD_TYPE_WARN, NULL,
- "The file to which the capture was being saved"
- " couldn't be closed for some unknown reason.");
- break;
+ /* delete stop conditions */
+ if (cnd_stop_capturesize != NULL)
+ cnd_delete(cnd_stop_capturesize);
+ if (cnd_stop_timeout != NULL)
+ cnd_delete(cnd_stop_timeout);
+
+ if (ld.pcap_err) {
+ snprintf(errmsg, sizeof(errmsg), "Error while capturing packets: %s",
+ pcap_geterr(pch));
+ if (capture_child) {
+ /* Tell the parent, so that they can pop up the message;
+ we're going to exit, so if we try to pop it up, either
+ it won't pop up or it'll disappear as soon as we exit. */
+ send_errmsg_to_parent(errmsg);
+ } else {
+ /* Just pop up the message ourselves. */
+ simple_dialog(ESD_TYPE_WARN, NULL, "%s", errmsg);
+ }
+ }
- case WTAP_ERR_SHORT_WRITE:
- simple_dialog(ESD_TYPE_WARN, NULL,
- "Not all the data could be written to the file"
- " to which the capture was being saved.");
- break;
+ if (ld.err != 0) {
+ get_capture_file_io_error(errmsg, sizeof(errmsg), cfile.save_file, ld.err,
+ FALSE);
+ if (capture_child) {
+ /* Tell the parent, so that they can pop up the message;
+ we're going to exit, so if we try to pop it up, either
+ it won't pop up or it'll disappear as soon as we exit. */
+ send_errmsg_to_parent(errmsg);
+ } else {
+ /* Just pop up the message ourselves. */
+ simple_dialog(ESD_TYPE_WARN, NULL, "%s", errmsg);
+ }
- default:
- simple_dialog(ESD_TYPE_WARN, NULL,
- "The file to which the capture was being"
- " saved (\"%s\") could not be closed: %s.",
- cfile.save_file, wtap_strerror(err));
- break;
+ /* A write failed, so we've already told the user there's a problem;
+ if the close fails, there's no point in telling them about that
+ as well. */
+ if (capture_opts.ringbuffer_on) {
+ ringbuf_wtap_dump_close(&cfile, &err);
+ } else {
+ wtap_dump_close(ld.pdh, &err);
+ }
+ } else {
+ if (capture_opts.ringbuffer_on) {
+ dump_ok = ringbuf_wtap_dump_close(&cfile, &err);
+ } else {
+ dump_ok = wtap_dump_close(ld.pdh, &err);
+ }
+ if (!dump_ok) {
+ get_capture_file_io_error(errmsg, sizeof(errmsg), cfile.save_file, err,
+ TRUE);
+ if (capture_child) {
+ /* Tell the parent, so that they can pop up the message;
+ we're going to exit, so if we try to pop it up, either
+ it won't pop up or it'll disappear as soon as we exit. */
+ send_errmsg_to_parent(errmsg);
+ } else {
+ /* Just pop up the message ourselves. */
+ simple_dialog(ESD_TYPE_WARN, NULL, "%s", errmsg);
+ }
}
}
#ifndef _WIN32
close(pipe_fd);
else
#endif
+ {
+ /* Get the capture statistics, so we know how many packets were
+ dropped. */
+ if (pcap_stats(pch, stats) >= 0) {
+ *stats_known = TRUE;
+ if (capture_child) {
+ /* Let the parent process know. */
+ char tmp[20];
+ sprintf(tmp, "%d%c", stats->ps_drop, SP_DROPS);
+ write(1, tmp, strlen(tmp));
+ }
+ } else {
+ snprintf(errmsg, sizeof(errmsg),
+ "Can't get packet-drop statistics: %s",
+ pcap_geterr(pch));
+ if (capture_child) {
+ /* Tell the parent, so that they can pop up the message;
+ we're going to exit, so if we try to pop it up, either
+ it won't pop up or it'll disappear as soon as we exit. */
+ send_errmsg_to_parent(errmsg);
+ } else {
+ /* Just pop up the message ourselves. */
+ simple_dialog(ESD_TYPE_WARN, NULL, "%s", errmsg);
+ }
+ }
pcap_close(pch);
+ }
#ifdef WIN32
/* Shut down windows sockets */
return TRUE;
error:
- /* We can't use the save file, and we have no wtap_dump stream
- to close in order to close it, so close the FD directly. */
- close(cfile.save_file_fd);
-
- /* We couldn't even start the capture, so get rid of the capture
- file. */
- unlink(cfile.save_file); /* silently ignore error */
- g_free(cfile.save_file);
+ if (capture_opts.ringbuffer_on) {
+ /* cleanup ringbuffer */
+ ringbuf_error_cleanup();
+ } else {
+ /* We can't use the save file, and we have no wtap_dump stream
+ to close in order to close it, so close the FD directly. */
+ close(cfile.save_file_fd);
+
+ /* We couldn't even start the capture, so get rid of the capture
+ file. */
+ unlink(cfile.save_file); /* silently ignore error */
+ g_free(cfile.save_file);
+ }
cfile.save_file = NULL;
if (capture_child) {
/* This is the child process for a sync mode capture.
send_errmsg_to_parent(errmsg);
} else {
/* Display the dialog box ourselves; there's no parent. */
- simple_dialog(ESD_TYPE_CRIT, NULL, errmsg);
+ simple_dialog(ESD_TYPE_CRIT, NULL, "%s", errmsg);
}
if (pch != NULL && !ld.from_pipe)
pcap_close(pch);
return FALSE;
}
+static void
+get_capture_file_io_error(char *errmsg, int errmsglen, const char *fname,
+ int err, gboolean is_close)
+{
+ switch (err) {
+
+ case ENOSPC:
+ snprintf(errmsg, errmsglen,
+ "Not all the packets could be written to the file"
+ " to which the capture was being saved\n"
+ "(\"%s\") because there is no space left on the file system\n"
+ "on which that file resides.",
+ fname);
+ break;
+
+#ifdef EDQUOT
+ case EDQUOT:
+ snprintf(errmsg, errmsglen,
+ "Not all the packets could be written to the file"
+ " to which the capture was being saved\n"
+ "(\"%s\") because you are too close to, or over,"
+ " your disk quota\n"
+ "on the file system on which that file resides.",
+ fname);
+ break;
+#endif
+
+ case WTAP_ERR_CANT_CLOSE:
+ snprintf(errmsg, errmsglen,
+ "The file to which the capture was being saved"
+ " couldn't be closed for some unknown reason.");
+ break;
+
+ case WTAP_ERR_SHORT_WRITE:
+ snprintf(errmsg, errmsglen,
+ "Not all the packets could be written to the file"
+ " to which the capture was being saved\n"
+ "(\"%s\").",
+ fname);
+ break;
+
+ default:
+ if (is_close) {
+ snprintf(errmsg, errmsglen,
+ "The file to which the capture was being saved\n"
+ "(\"%s\") could not be closed: %s.",
+ fname, wtap_strerror(err));
+ } else {
+ snprintf(errmsg, errmsglen,
+ "An error occurred while writing to the file"
+ " to which the capture was being saved\n"
+ "(\"%s\"): %s.",
+ fname, wtap_strerror(err));
+ }
+ break;
+ }
+}
+
static void
send_errmsg_to_parent(const char *errmsg)
{
int msglen = strlen(errmsg);
char lenbuf[10+1+1];
- sprintf(lenbuf, "%u;", msglen);
+ sprintf(lenbuf, "%u%c", msglen, SP_ERROR_MSG);
write(1, lenbuf, strlen(lenbuf));
write(1, errmsg, msglen);
}
}
}
+static void
+stop_capture(int signo)
+{
+ ld.go = FALSE;
+}
+
static void
capture_delete_cb(GtkWidget *w, GdkEvent *event, gpointer data) {
capture_stop_cb(NULL, data);
ld->go = FALSE;
}
+void
+capture_stop(void)
+{
+ /*
+ * XXX - find some way of signaling the child in Win32.
+ */
+#ifndef _WIN32
+ if (fork_child != -1)
+ kill(fork_child, SIGUSR1);
+#endif
+}
+
+void
+kill_capture_child(void)
+{
+ /*
+ * XXX - find some way of signaling the child in Win32.
+ */
+#ifndef _WIN32
+ if (fork_child != -1)
+ kill(fork_child, SIGTERM); /* SIGTERM so it can clean up if necessary */
+#endif
+}
+
static void
capture_pcap_cb(u_char *user, const struct pcap_pkthdr *phdr,
const u_char *pd) {
whdr.len = phdr->len;
whdr.pkt_encap = ld->linktype;
- /* XXX - do something if this fails */
- wtap_dump(ld->pdh, &whdr, NULL, pd, &err);
+ /* If this fails, set "ld->go" to FALSE, to stop the capture, and set
+ "ld->err" to the error. */
+ if (!wtap_dump(ld->pdh, &whdr, NULL, pd, &err)) {
+ ld->go = FALSE;
+ ld->err = err;
+ }
}
- /* Set the initial payload to the packet length, and the initial
- captured payload to the capture length (other protocols may
- reduce them if their headers say they're less). */
- pi.len = phdr->len;
- pi.captured_len = phdr->caplen;
-
switch (ld->linktype) {
case WTAP_ENCAP_ETHERNET:
- capture_eth(pd, 0, &ld->counts);
+ capture_eth(pd, 0, phdr->len, &ld->counts);
break;
case WTAP_ENCAP_FDDI:
case WTAP_ENCAP_FDDI_BITSWAPPED:
- capture_fddi(pd, &ld->counts);
+ capture_fddi(pd, phdr->len, &ld->counts);
+ break;
+ case WTAP_ENCAP_PRISM_HEADER:
+ capture_prism(pd, 0, phdr->len, &ld->counts);
break;
- case WTAP_ENCAP_TR:
- capture_tr(pd, 0, &ld->counts);
+ case WTAP_ENCAP_TOKEN_RING:
+ capture_tr(pd, 0, phdr->len, &ld->counts);
break;
case WTAP_ENCAP_NULL:
- capture_null(pd, &ld->counts);
+ capture_null(pd, phdr->len, &ld->counts);
break;
case WTAP_ENCAP_PPP:
- capture_ppp(pd, 0, &ld->counts);
+ capture_ppp_hdlc(pd, 0, phdr->len, &ld->counts);
break;
case WTAP_ENCAP_RAW_IP:
- capture_raw(pd, &ld->counts);
+ capture_raw(pd, phdr->len, &ld->counts);
+ break;
+ case WTAP_ENCAP_SLL:
+ capture_sll(pd, phdr->len, &ld->counts);
break;
case WTAP_ENCAP_LINUX_ATM_CLIP:
- capture_clip(pd, &ld->counts);
+ capture_clip(pd, phdr->len, &ld->counts);
+ break;
+ case WTAP_ENCAP_LOCALTALK:
+ capture_llap(pd, phdr->len, &ld->counts);
break;
/* XXX - FreeBSD may append 4-byte ATM pseudo-header to DLT_ATM_RFC1483,
with LLC header following; we should implement it at some