Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 12687] SocketCAN dissector does not support CAN FD

Date: Tue, 02 Aug 2016 19:13:55 +0000

Comment # 14 on bug 12687 from
(In reply to Michael Mann from comment #12)


> I actually have a new patch that's a little better, but I was still using
> this conversation to refine it.

Can you share it?

>  The original patch was intended mostly as a
> talking point to give you hints on where I was coming from to try to narrow
> the "language gap" we have when talking about the different technologies.
> 
> Wireshark has no influence on the pcap file being written for capture,
> that's all in the vcan0 driver.  You could set a byte in the CANFD structure
> (in the reserved fields) and that should show up in the Wireshark capture
> (undissected just like the current CANFD flag field).
> The socketCAN dissector could then look at that field to determine CANFD vs
> CAN.  If we can agree on the value there, that I can put in an updated patch
> and you should get better results.

I suggested this bit to be set somewhere in Wiresharks data flow.
I don't see this flag being introduced into the Linux kernel as Wiresharks CAN
FD functionality would become Linux version dependent.

I still have a question about your perception of "that's all in the vcan0
driver".
Where can I find this "vcan0 driver"? Is it part of Wireshark?
How does Wireshark get the network traffic? Via netlink sockets?


You are receiving this mail because:
  • You are watching all bug changes.