]> sigrok.org Git - libsigrok.git/blame_incremental - src/session_file.c
input/raw_analog: Prevent "duplicate const decl specifier" warning
[libsigrok.git] / src / session_file.c
... / ...
CommitLineData
1/*
2 * This file is part of the libsigrok project.
3 *
4 * Copyright (C) 2013 Bert Vermeulen <bert@biot.com>
5 *
6 * This program is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
18 */
19
20#include <config.h>
21#include <string.h>
22#include <stdlib.h>
23#include <zip.h>
24#include <errno.h>
25#include <glib.h>
26#include <glib/gstdio.h>
27#include <libsigrok/libsigrok.h>
28#include "libsigrok-internal.h"
29
30/** @cond PRIVATE */
31#define LOG_PREFIX "session-file"
32/** @endcond */
33
34/**
35 * @file
36 *
37 * Loading and saving libsigrok session files.
38 */
39
40/**
41 * @addtogroup grp_session
42 *
43 * @{
44 */
45
46extern SR_PRIV struct sr_dev_driver session_driver;
47static int session_driver_initialized = 0;
48
49#if !HAVE_ZIP_DISCARD
50/* Replacement for zip_discard() if it isn't available.
51 */
52SR_PRIV void sr_zip_discard(struct zip *archive)
53{
54 if (zip_unchange_all(archive) < 0 || zip_close(archive) < 0)
55 sr_err("Failed to discard ZIP archive: %s", zip_strerror(archive));
56}
57#endif
58
59/** Read metadata entries from a session archive.
60 * @param[in] archive An open ZIP archive.
61 * @param[in] entry Stat buffer filled in for the metadata archive member.
62 * @return A new key/value store containing the session metadata.
63 */
64SR_PRIV GKeyFile *sr_sessionfile_read_metadata(struct zip *archive,
65 const struct zip_stat *entry)
66{
67 GKeyFile *keyfile;
68 GError *error;
69 struct zip_file *zf;
70 char *metabuf;
71 int metalen;
72
73 if (entry->size > G_MAXINT || !(metabuf = g_try_malloc(entry->size))) {
74 sr_err("Metadata buffer allocation failed.");
75 return NULL;
76 }
77 zf = zip_fopen_index(archive, entry->index, 0);
78 if (!zf) {
79 sr_err("Failed to open metadata: %s", zip_strerror(archive));
80 g_free(metabuf);
81 return NULL;
82 }
83 metalen = zip_fread(zf, metabuf, entry->size);
84 if (metalen < 0) {
85 sr_err("Failed to read metadata: %s", zip_file_strerror(zf));
86 zip_fclose(zf);
87 g_free(metabuf);
88 return NULL;
89 }
90 zip_fclose(zf);
91
92 keyfile = g_key_file_new();
93 error = NULL;
94 g_key_file_load_from_data(keyfile, metabuf, metalen,
95 G_KEY_FILE_NONE, &error);
96 g_free(metabuf);
97
98 if (error) {
99 sr_err("Failed to parse metadata: %s", error->message);
100 g_error_free(error);
101 g_key_file_free(keyfile);
102 return NULL;
103 }
104 return keyfile;
105}
106
107/** @private */
108SR_PRIV int sr_sessionfile_check(const char *filename)
109{
110 struct zip *archive;
111 struct zip_file *zf;
112 struct zip_stat zs;
113 uint64_t version;
114 int ret;
115 char s[11];
116
117 if (!filename)
118 return SR_ERR_ARG;
119
120 if (!g_file_test(filename, G_FILE_TEST_IS_REGULAR)) {
121 sr_err("Not a regular file: %s.", filename);
122 return SR_ERR;
123 }
124
125 if (!(archive = zip_open(filename, 0, NULL)))
126 /* No logging: this can be used just to check if it's
127 * a sigrok session file or not. */
128 return SR_ERR;
129
130 /* check "version" */
131 if (!(zf = zip_fopen(archive, "version", 0))) {
132 sr_dbg("Not a sigrok session file: no version found.");
133 zip_discard(archive);
134 return SR_ERR;
135 }
136 ret = zip_fread(zf, s, sizeof(s) - 1);
137 if (ret < 0) {
138 sr_err("Failed to read version file: %s",
139 zip_file_strerror(zf));
140 zip_fclose(zf);
141 zip_discard(archive);
142 return SR_ERR;
143 }
144 zip_fclose(zf);
145 s[ret] = '\0';
146 version = g_ascii_strtoull(s, NULL, 10);
147 if (version == 0 || version > 2) {
148 sr_dbg("Cannot handle sigrok session file version %" PRIu64 ".",
149 version);
150 zip_discard(archive);
151 return SR_ERR;
152 }
153 sr_spew("Detected sigrok session file version %" PRIu64 ".", version);
154
155 /* read "metadata" */
156 if (zip_stat(archive, "metadata", 0, &zs) < 0) {
157 sr_dbg("Not a valid sigrok session file.");
158 zip_discard(archive);
159 return SR_ERR;
160 }
161 zip_discard(archive);
162
163 return SR_OK;
164}
165
166/**
167 * Load the session from the specified filename.
168 *
169 * @param ctx The context in which to load the session.
170 * @param filename The name of the session file to load.
171 * @param session The session to load the file into.
172 *
173 * @retval SR_OK Success
174 * @retval SR_ERR_MALLOC Memory allocation error
175 * @retval SR_ERR_DATA Malformed session file
176 * @retval SR_ERR This is not a session file
177 */
178SR_API int sr_session_load(struct sr_context *ctx, const char *filename,
179 struct sr_session **session)
180{
181 GKeyFile *kf;
182 GError *error;
183 struct zip *archive;
184 struct zip_stat zs;
185 struct sr_dev_inst *sdi;
186 struct sr_channel *ch;
187 int ret, i, j;
188 uint64_t tmp_u64;
189 int total_channels, total_analog, k;
190 GSList *l;
191 int unitsize;
192 char **sections, **keys, *val;
193 char channelname[SR_MAX_CHANNELNAME_LEN + 1];
194
195 if ((ret = sr_sessionfile_check(filename)) != SR_OK)
196 return ret;
197
198 if (!(archive = zip_open(filename, 0, NULL)))
199 return SR_ERR;
200
201 if (zip_stat(archive, "metadata", 0, &zs) < 0) {
202 zip_discard(archive);
203 return SR_ERR;
204 }
205 kf = sr_sessionfile_read_metadata(archive, &zs);
206 zip_discard(archive);
207 if (!kf)
208 return SR_ERR_DATA;
209
210 if ((ret = sr_session_new(ctx, session)) != SR_OK) {
211 g_key_file_free(kf);
212 return ret;
213 }
214
215 error = NULL;
216 ret = SR_OK;
217 sections = g_key_file_get_groups(kf, NULL);
218 for (i = 0; sections[i] && ret == SR_OK; i++) {
219 if (!strcmp(sections[i], "global"))
220 /* nothing really interesting in here yet */
221 continue;
222 if (!strncmp(sections[i], "device ", 7)) {
223 /* device section */
224 sdi = NULL;
225 keys = g_key_file_get_keys(kf, sections[i], NULL, NULL);
226 for (j = 0; keys[j]; j++) {
227 if (!strcmp(keys[j], "capturefile")) {
228 val = g_key_file_get_string(kf, sections[i],
229 keys[j], &error);
230 if (!val) {
231 ret = SR_ERR_DATA;
232 break;
233 }
234 sdi = g_malloc0(sizeof(struct sr_dev_inst));
235 sdi->driver = &session_driver;
236 sdi->status = SR_ST_ACTIVE;
237 if (!session_driver_initialized) {
238 /* first device, init the driver */
239 session_driver_initialized = 1;
240 sdi->driver->init(sdi->driver, NULL);
241 }
242 sr_dev_open(sdi);
243 sr_session_dev_add(*session, sdi);
244 (*session)->owned_devs = g_slist_append(
245 (*session)->owned_devs, sdi);
246 sr_config_set(sdi, NULL, SR_CONF_SESSIONFILE,
247 g_variant_new_string(filename));
248 sr_config_set(sdi, NULL, SR_CONF_CAPTUREFILE,
249 g_variant_new_string(val));
250 g_free(val);
251 } else if (!strcmp(keys[j], "samplerate")) {
252 val = g_key_file_get_string(kf, sections[i],
253 keys[j], &error);
254 if (!sdi || !val || sr_parse_sizestring(val,
255 &tmp_u64) != SR_OK) {
256 g_free(val);
257 ret = SR_ERR_DATA;
258 break;
259 }
260 g_free(val);
261 sr_config_set(sdi, NULL, SR_CONF_SAMPLERATE,
262 g_variant_new_uint64(tmp_u64));
263 } else if (!strcmp(keys[j], "unitsize")) {
264 unitsize = g_key_file_get_integer(kf, sections[i],
265 keys[j], &error);
266 if (!sdi || unitsize <= 0 || error) {
267 ret = SR_ERR_DATA;
268 break;
269 }
270 sr_config_set(sdi, NULL, SR_CONF_CAPTURE_UNITSIZE,
271 g_variant_new_uint64(unitsize));
272 } else if (!strcmp(keys[j], "total probes")) {
273 total_channels = g_key_file_get_integer(kf,
274 sections[i], keys[j], &error);
275 if (!sdi || total_channels < 0 || error) {
276 ret = SR_ERR_DATA;
277 break;
278 }
279 sr_config_set(sdi, NULL, SR_CONF_NUM_LOGIC_CHANNELS,
280 g_variant_new_int32(total_channels));
281 for (k = 0; k < total_channels; k++) {
282 g_snprintf(channelname, sizeof(channelname),
283 "%d", k);
284 sr_channel_new(sdi, k, SR_CHANNEL_LOGIC,
285 FALSE, channelname);
286 }
287 } else if (!strcmp(keys[j], "total analog")) {
288 total_analog = g_key_file_get_integer(kf,
289 sections[i], keys[j], &error);
290 if (!sdi || total_analog < 0 || error) {
291 ret = SR_ERR_DATA;
292 break;
293 }
294 sr_config_set(sdi, NULL, SR_CONF_NUM_ANALOG_CHANNELS,
295 g_variant_new_int32(total_analog));
296 for (k = 0; k < total_analog; k++) {
297 g_snprintf(channelname, sizeof(channelname),
298 "%d", k);
299 sr_channel_new(sdi, k, SR_CHANNEL_ANALOG,
300 FALSE, channelname);
301 }
302 } else if (!strncmp(keys[j], "probe", 5)) {
303 tmp_u64 = g_ascii_strtoull(keys[j] + 5, NULL, 10);
304 if (!sdi || tmp_u64 == 0 || tmp_u64 > G_MAXINT) {
305 ret = SR_ERR_DATA;
306 break;
307 }
308 ch = g_slist_nth_data(sdi->channels, tmp_u64 - 1);
309 if (!ch) {
310 ret = SR_ERR_DATA;
311 break;
312 }
313 val = g_key_file_get_string(kf, sections[i],
314 keys[j], &error);
315 if (!val) {
316 ret = SR_ERR_DATA;
317 break;
318 }
319 /* sr_session_save() */
320 sr_dev_channel_name_set(ch, val);
321 g_free(val);
322 sr_dev_channel_enable(ch, TRUE);
323 } else if (!strncmp(keys[j], "analog", 6)) {
324 tmp_u64 = g_ascii_strtoull(keys[j]+6, NULL, 10);
325 if (!sdi || tmp_u64 == 0 || tmp_u64 > G_MAXINT) {
326 ret = SR_ERR_DATA;
327 break;
328 }
329 ch = NULL;
330 for (l = sdi->channels; l; l = l->next) {
331 ch = l->data;
332 if ((guint64)ch->index == tmp_u64 - 1)
333 break;
334 else
335 ch = NULL;
336 }
337 if (!ch) {
338 ret = SR_ERR_DATA;
339 break;
340 }
341 val = g_key_file_get_string(kf, sections[i],
342 keys[j], &error);
343 if (!val) {
344 ret = SR_ERR_DATA;
345 break;
346 }
347 /* sr_session_save() */
348 sr_dev_channel_name_set(ch, val);
349 g_free(val);
350 sr_dev_channel_enable(ch, TRUE);
351 }
352 }
353 g_strfreev(keys);
354 }
355 }
356 g_strfreev(sections);
357 g_key_file_free(kf);
358
359 if (error) {
360 sr_err("Failed to parse metadata: %s", error->message);
361 g_error_free(error);
362 }
363 return ret;
364}
365
366/** @} */