ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 4299] New: New: SocketCAN dissector patch

Date: Sun, 6 Dec 2009 11:14:19 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4299

           Summary: New: SocketCAN dissector patch
           Product: Wireshark
           Version: SVN
          Platform: Other
        OS/Version: Linux (other)
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: felix@xxxxxxxxxxxx


Created an attachment (id=4030)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4030)
Dissector to dissect SocketCAN frames

Build Information:
Revision: 31184

Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GTK+ 2.18.3, with GLib 2.22.2, with libpcap 1.1-PRE-CVS, with
libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, with SMI 0.4.8,
with
c-ares 1.6.0, with Lua 5.1, without Python, with GnuTLS 2.8.3, with Gcrypt
1.4.4, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Jun 20
2009 13:28:51), without AirPcap, with new_packet_list.

Running on Linux 2.6.31-15-generic, with libpcap version 1.1-PRE-CVS, GnuTLS
2.8.3, Gcrypt 1.4.4.

Built using gcc 4.4.1.

Wireshark is Open Source Software released under the GNU General Public
License.

Check the man page and http://www.wireshark.org for more information.
--
about:

This patch dissects CAN frames captured via a network interface provided by
SocketCAN (  http://developer.berlios.de/projects/socketcan/ )
Frame type is distinguished between standard, extended, remote transmission
request, error frame. Id and data bytes are shown in the info column. For the
payload data the default data dissector is called.

The dissector is implemented in epan/dissectors/packet-socketcan.c


Capture on the wire is done by libpcap. Libpcap needs to be patched with
SocketCAN support. That is submitted to the libpcap tracker:
http://sourceforge.net/tracker/?func=detail&aid=2872132&group_id=53067&atid=469579
This patch is not submitted to the libpcap tree.

testing:

For testing a virtual CAN interface can be used, thus no real CAN hardware is
needed. Setting up such a interface is described in
Documentation/networking/can.txt within the Linux source tree. The SocketCAN
project provides the so called can-utils to send frames with command line
tools. Test frames can be sent with the following commands:

# cansend vcan0 123#R
# cangen vcan -e
# cangen vcan


todos:

 * add a check for can.h to confgure.in
 * protect packet-socketcan.h with result for can.h check
 * verify build for non-linux platforms
 * tests for error frame behavior
 * display CAN id in source or destination column

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.