https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4299
Summary: New: SocketCAN dissector patch
Product: Wireshark
Version: SVN
Platform: Other
OS/Version: Linux (other)
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: felix@xxxxxxxxxxxx
Created an attachment (id=4030)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=4030)
Dissector to dissect SocketCAN frames
Build Information:
Revision: 31184
Copyright 1998-2009 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled with GTK+ 2.18.3, with GLib 2.22.2, with libpcap 1.1-PRE-CVS, with
libz
1.2.3.3, with POSIX capabilities (Linux), with libpcre 7.8, with SMI 0.4.8,
with
c-ares 1.6.0, with Lua 5.1, without Python, with GnuTLS 2.8.3, with Gcrypt
1.4.4, with MIT Kerberos, with GeoIP, with PortAudio V19-devel (built Jun 20
2009 13:28:51), without AirPcap, with new_packet_list.
Running on Linux 2.6.31-15-generic, with libpcap version 1.1-PRE-CVS, GnuTLS
2.8.3, Gcrypt 1.4.4.
Built using gcc 4.4.1.
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
about:
This patch dissects CAN frames captured via a network interface provided by
SocketCAN ( http://developer.berlios.de/projects/socketcan/ )
Frame type is distinguished between standard, extended, remote transmission
request, error frame. Id and data bytes are shown in the info column. For the
payload data the default data dissector is called.
The dissector is implemented in epan/dissectors/packet-socketcan.c
Capture on the wire is done by libpcap. Libpcap needs to be patched with
SocketCAN support. That is submitted to the libpcap tracker:
http://sourceforge.net/tracker/?func=detail&aid=2872132&group_id=53067&atid=469579
This patch is not submitted to the libpcap tree.
testing:
For testing a virtual CAN interface can be used, thus no real CAN hardware is
needed. Setting up such a interface is described in
Documentation/networking/can.txt within the Linux source tree. The SocketCAN
project provides the so called can-utils to send frames with command line
tools. Test frames can be sent with the following commands:
# cansend vcan0 123#R
# cangen vcan -e
# cangen vcan
todos:
* add a check for can.h to confgure.in
* protect packet-socketcan.h with result for can.h check
* verify build for non-linux platforms
* tests for error frame behavior
* display CAN id in source or destination column
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.