Wireshark-bugs: [Wireshark-bugs] [Bug 12687] SocketCAN dissector does not support CAN FD
Comment # 23
on bug 12687
from Oliver Hartkopp
(In reply to Michael Mann from comment #22)
> (In reply to Michael Mann from comment #21)
> > I should have something posted today.
>
> Done.
You patch has at least two issues:
1. The frame_type_vals still contain RTR. Please check my patch to fix this up.
2. Don't know what canfd_actual_length() is for. Wireshark uses libpcap.
libpcap uses PF_CAN raw sockets. PF_CAN raw sockets and CAN network interfaces
provide a plain length value and no data length _code_ (DLC) - so there's no
need to do any DLC-to-length conversion anywhere in userspace (see my provided
PDF slides).
> Only potential outstanding issue is how to handle SLL frames. Since
> CANFD has it's own "type" within SLL, will it still set the "CANFD" flag
> (0x4), or will its dissection need to be tweaked?
I'm not sure about this either.
Picking up the stuff above: Wireshark uses libpcap. libpcap uses PF_CAN raw
sockets. As you can see from the libpcap patch the CAN RAW socket just can
handle both types of CAN frames (CAN / CAN FD). To distinguish CAN and CAN FD
I'm setting the CANFD_USE bit in the provided content which is used by
wireshark.
Alternatively we might split this traffic into two separate paths?!?
Having different SSL definitions was intended for PF_PACKET users to make clear
which kind of frame is provided. But when libpcap is mandatory for Wireshark -
where do you see the SSL types then?
You are receiving this mail because:
- You are watching all bug changes.