diff options
Diffstat (limited to 'epan/dissectors/packet-netlink.c')
-rw-r--r-- | epan/dissectors/packet-netlink.c | 698 |
1 files changed, 698 insertions, 0 deletions
diff --git a/epan/dissectors/packet-netlink.c b/epan/dissectors/packet-netlink.c new file mode 100644 index 00000000..b437ed34 --- /dev/null +++ b/epan/dissectors/packet-netlink.c @@ -0,0 +1,698 @@ +/* packet-netlink.c + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +/* http://www.tcpdump.org/linktypes/LINKTYPE_NETLINK.html */ + +#include "config.h" + +#include <epan/packet.h> +#include <epan/arptypes.h> +#include <epan/exceptions.h> +#include <wiretap/wtap.h> +#include <wsutil/ws_roundup.h> + +#include "packet-netlink.h" + +void proto_register_netlink(void); +void proto_reg_handoff_netlink(void); + +/* + * A DLT_LINUX_SLL fake link-layer header. + */ +#define SLL_HEADER_SIZE 16 /* total header length */ + +static const value_string netlink_family_vals[] = { + { WS_NETLINK_ROUTE, "Route" }, + { WS_NETLINK_UNUSED, "Unused" }, + { WS_NETLINK_USERSOCK, "User-mode socket protocols" }, + { WS_NETLINK_FIREWALL, "Unused (formerly: ip_queue)" }, + { WS_NETLINK_SOCK_DIAG, "Socket monitoring" }, + { WS_NETLINK_NFLOG, "Netfilter ULOG" }, + { WS_NETLINK_XFRM, "IPsec" }, + { WS_NETLINK_SELINUX, "SELinux events" }, + { WS_NETLINK_ISCSI, "Open-iSCSI" }, + { WS_NETLINK_AUDIT, "Auditing" }, + { WS_NETLINK_FIB_LOOKUP, "FIB lookup" }, + { WS_NETLINK_CONNECTOR, "Kernel connector" }, + { WS_NETLINK_NETFILTER, "Netfilter" }, + { WS_NETLINK_IP6_FW, "Unused (formerly: ip6_queue)" }, + { WS_NETLINK_DNRTMSG, "DECnet routing messages" }, + { WS_NETLINK_KOBJECT_UEVENT, "Kernel messages to userspace" }, + { WS_NETLINK_GENERIC, "Generic" }, + { WS_NETLINK_SCSITRANSPORT, "SCSI Transports" }, + { WS_NETLINK_ECRYPTFS, "ecryptfs" }, + { WS_NETLINK_RDMA, "RDMA" }, + { WS_NETLINK_CRYPTO, "Crypto layer" }, + { WS_NETLINK_SMC, "SMC monitoring" }, + { 0, NULL } +}; + +value_string_ext netlink_family_vals_ext = VALUE_STRING_EXT_INIT(netlink_family_vals); + +static const value_string type_vals[] = { + { WS_NLMSG_NOOP, "Nothing" }, + { WS_NLMSG_ERROR, "Error" }, + { WS_NLMSG_DONE, "End of a dump" }, + { WS_NLMSG_OVERRUN, "Data lost" }, + { 0, NULL } +}; + +static const value_string ha_types[] = { + { ARPHRD_NETLINK, "Netlink" }, + { 0, NULL } +}; + +extern value_string_ext linux_negative_errno_vals_ext; + +static dissector_handle_t netlink_handle; + +static int proto_netlink = -1; + +static int hf_netlink_attr_data = -1; +static int hf_netlink_attr_index = -1; +static int hf_netlink_attr_len = -1; +static int hf_netlink_attr_type = -1; +static int hf_netlink_attr_type_nested = -1; +static int hf_netlink_attr_type_net_byteorder = -1; +static int hf_netlink_error = -1; +static int hf_netlink_family = -1; +static int hf_netlink_hatype = -1; +static int hf_netlink_hdr_flag_ack = -1; +static int hf_netlink_hdr_flag_append = -1; +static int hf_netlink_hdr_flag_atomic = -1; +static int hf_netlink_hdr_flag_create = -1; +static int hf_netlink_hdr_flag_dumpfiltered = -1; +static int hf_netlink_hdr_flag_dumpintr = -1; +static int hf_netlink_hdr_flag_echo = -1; +static int hf_netlink_hdr_flag_excl = -1; +static int hf_netlink_hdr_flag_match = -1; +static int hf_netlink_hdr_flag_multi = -1; +static int hf_netlink_hdr_flag_replace = -1; +static int hf_netlink_hdr_flag_request = -1; +static int hf_netlink_hdr_flag_root = -1; +static int hf_netlink_hdr_flags = -1; +static int hf_netlink_hdr_len = -1; +static int hf_netlink_hdr_pid = -1; +static int hf_netlink_hdr_seq = -1; +static int hf_netlink_hdr_type = -1; + +static gint ett_netlink_cooked = -1; +static gint ett_netlink_msghdr = -1; +static gint ett_netlink_msg = -1; +static gint ett_netlink_hdr_flags = -1; +static gint ett_netlink_attr_type = -1; + +static dissector_table_t netlink_dissector_table; + + +static int * const netlink_header_get_flags[] = { + &hf_netlink_hdr_flag_request, + &hf_netlink_hdr_flag_multi, + &hf_netlink_hdr_flag_ack, + &hf_netlink_hdr_flag_echo, + &hf_netlink_hdr_flag_dumpintr, + &hf_netlink_hdr_flag_dumpfiltered, + + &hf_netlink_hdr_flag_root, + &hf_netlink_hdr_flag_match, + &hf_netlink_hdr_flag_atomic, + NULL +}; + +static int * const netlink_header_new_flags[] = { + &hf_netlink_hdr_flag_request, + &hf_netlink_hdr_flag_multi, + &hf_netlink_hdr_flag_ack, + &hf_netlink_hdr_flag_echo, + &hf_netlink_hdr_flag_dumpintr, + &hf_netlink_hdr_flag_dumpfiltered, + + &hf_netlink_hdr_flag_replace, + &hf_netlink_hdr_flag_excl, + &hf_netlink_hdr_flag_create, + &hf_netlink_hdr_flag_append, + NULL +}; + +static int * const netlink_header_standard_flags[] = { + &hf_netlink_hdr_flag_request, + &hf_netlink_hdr_flag_multi, + &hf_netlink_hdr_flag_ack, + &hf_netlink_hdr_flag_echo, + &hf_netlink_hdr_flag_dumpintr, + &hf_netlink_hdr_flag_dumpfiltered, + NULL +}; + + +static int +dissect_netlink_attributes_common(tvbuff_t *tvb, int hf_type, int ett_tree, int ett_attrib, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) +{ + int encoding; + int padding = (4 - offset) & 3; + guint data_length; + header_field_info *hfi_type; + + DISSECTOR_ASSERT(nl_data); + + encoding = nl_data->encoding; + + /* + * A "negative" length is really a very large positive + * length, which we presume to go past the end of the + * packet. + */ + if (length < 0) + THROW(ReportedBoundsError); + + /* align to 4 */ + offset += padding; + if (length < padding) + THROW(ReportedBoundsError); + length -= padding; + + data_length = length; + + while (data_length >= 4) { + guint rta_len, rta_type, type; + + proto_item *ti, *type_item; + proto_tree *attr_tree, *type_tree; + + rta_len = tvb_get_guint16(tvb, offset, encoding); + if (rta_len < 4) { + /* XXX invalid expert */ + break; + } + + /* XXX expert info when rta_len < data_length? */ + rta_len = MIN(rta_len, data_length); + + attr_tree = proto_tree_add_subtree(tree, tvb, offset, rta_len, ett_tree, &ti, "Attribute"); + + proto_tree_add_item(attr_tree, hf_netlink_attr_len, tvb, offset, 2, encoding); + offset += 2; + + rta_type = tvb_get_guint16(tvb, offset, encoding); + if (ett_attrib == -1) { + /* List of attributes */ + type = rta_type & NLA_TYPE_MASK; + type_item = proto_tree_add_item(attr_tree, hf_netlink_attr_type, tvb, offset, 2, encoding); + type_tree = proto_item_add_subtree(type_item, ett_netlink_attr_type); + proto_tree_add_item(type_tree, hf_netlink_attr_type_nested, tvb, offset, 2, encoding); + proto_tree_add_item(type_tree, hf_netlink_attr_type_net_byteorder, tvb, offset, 2, encoding); + /* The hf_type _must_ have NLA_TYPE_MASK in it's definition, otherwise the nested/net_byteorder + * flags influence the retrieved value. Since this is impossible to enforce (apart from using + * a nasty DISSECTOR_ASSERT perhaps) we'll just have to make sure to feed in the properly + * masked value. Luckily we already have it: 'type' is the value we need. + */ + proto_tree_add_uint(type_tree, hf_type, tvb, offset, 2, type); + offset += 2; + + if (rta_type & NLA_F_NESTED) + proto_item_append_text(type_item, ", Nested"); + + hfi_type = proto_registrar_get_nth(hf_type); + if (hfi_type->strings) { + /* XXX, export hf_try_val_to_str */ + const char *rta_str; + + if (hfi_type->display & BASE_EXT_STRING) { + rta_str = try_val_to_str_ext(type, (value_string_ext *)hfi_type->strings); + } else { + rta_str = try_val_to_str(type, (const value_string *) hfi_type->strings); + } + + if (rta_str) { + proto_item_append_text(type_item, ", %s (%d)", rta_str, type); + proto_item_append_text(ti, ": %s", rta_str); + } + } + + /* The callback needs to be passed the netlink_attr_type_net_byteorder as dissected, + * to properly dissect the attribute value, which byte order may differ from the + * capture host native byte order, as heuristically established in 'encoding'. + * We pass in the encoding through nl_data, so we temporarily modify it to match + * the NLA_F_NET_BYTEORDER flag. + */ + if (rta_type & NLA_F_NET_BYTEORDER) + nl_data->encoding = ENC_BIG_ENDIAN; + + if (!cb(tvb, data, nl_data, attr_tree, rta_type, offset, rta_len - 4)) { + proto_tree_add_item(attr_tree, hf_netlink_attr_data, tvb, offset, rta_len - 4, ENC_NA); + } + + /* Restore the originaly established encoding. */ + if (rta_type & NLA_F_NET_BYTEORDER) + nl_data->encoding = encoding; + } else { + /* + * Nested attributes, constructing an array (list of + * attributes where its type is the array index and its + * value is the actual list of interesting attributes). + */ + proto_tree_add_item(attr_tree, hf_netlink_attr_index, tvb, offset, 2, encoding); + offset += 2; + proto_item_append_text(ti, " %u", rta_type); + + dissect_netlink_attributes(tvb, hf_type, ett_attrib, data, nl_data, attr_tree, offset, rta_len - 4, cb); + } + + /* Assume offset already aligned, next offset is rta_len plus alignment. */ + rta_len = MIN(WS_ROUNDUP_4(rta_len), data_length); + offset += rta_len - 4; /* Header was already skipped */ + if (data_length < rta_len) + THROW(ReportedBoundsError); + data_length -= rta_len; + } + + return offset; +} + +int +dissect_netlink_attributes(tvbuff_t *tvb, int hf_type, int ett, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) +{ + return dissect_netlink_attributes_common(tvb, hf_type, ett, -1, data, nl_data, tree, offset, length, cb); +} + +int +dissect_netlink_attributes_to_end(tvbuff_t *tvb, int hf_type, int ett, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, netlink_attributes_cb_t cb) +{ + return dissect_netlink_attributes_common(tvb, hf_type, ett, -1, data, nl_data, tree, offset, tvb_ensure_reported_length_remaining(tvb, offset), cb); +} + +int +dissect_netlink_attributes_array(tvbuff_t *tvb, int hf_type, int ett_array, int ett_attrib, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) +{ + DISSECTOR_ASSERT(ett_attrib != -1); + return dissect_netlink_attributes_common(tvb, hf_type, ett_array, ett_attrib, data, nl_data, tree, offset, length, cb); +} + +int +dissect_netlink_header(tvbuff_t *tvb, proto_tree *tree, int offset, int encoding, int hf_type, proto_item **pi_type) +{ + guint16 hdr_flags; + guint16 hdr_type; + proto_tree *fh_hdr; + proto_item *pi; + header_field_info *hfi_type; + + fh_hdr = proto_tree_add_subtree(tree, tvb, offset, 16, ett_netlink_msghdr, NULL, "Netlink message header"); + + proto_tree_add_item(fh_hdr, hf_netlink_hdr_len, tvb, offset, 4, encoding); + offset += 4; + + hdr_type = tvb_get_guint16(tvb, offset, encoding); + if (hdr_type < WS_NLMSG_MIN_TYPE) { + /* Reserved control messages. */ + hf_type = hf_netlink_hdr_type; + pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); + } else { + if (hf_type != -1) { + pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); + } else { + hf_type = hf_netlink_hdr_type; + pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); + proto_item_set_text(pi, "Message type: Protocol-specific (0x%04x)", hdr_type); + } + } + hfi_type = proto_registrar_get_nth(hf_type); + + if (pi_type) { + *pi_type = pi; + } + /* TODO export hf_try_val_to_str? */ + if (hfi_type->strings && hfi_type->display & BASE_EXT_STRING) { + proto_item_append_text(fh_hdr, " (type: %s)", val_to_str_ext(hdr_type, (value_string_ext *)hfi_type->strings, "0x%04x")); + } else if (hfi_type->strings) { + proto_item_append_text(fh_hdr, " (type: %s)", val_to_str(hdr_type, (const value_string *)hfi_type->strings, "0x%04x")); + } else { + proto_item_append_text(fh_hdr, " (type: 0x%04x)", hdr_type); + } + offset += 2; + + hdr_flags = tvb_get_guint16(tvb, offset, encoding); + if ((hdr_flags & WS_NLM_F_REQUEST) && (hdr_flags & 0x0f00)) { + /* TODO detect based on the protocol family and message type + * whether this is a GET, NEW or regular request. */ + proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, + ett_netlink_hdr_flags, netlink_header_get_flags, encoding); + proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, + ett_netlink_hdr_flags, netlink_header_new_flags, encoding); + } else { + proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, + ett_netlink_hdr_flags, netlink_header_standard_flags, encoding); + } + + offset += 2; + + proto_tree_add_item(fh_hdr, hf_netlink_hdr_seq, tvb, offset, 4, encoding); + offset += 4; + + proto_tree_add_item(fh_hdr, hf_netlink_hdr_pid, tvb, offset, 4, encoding); + offset += 4; + + return offset; +} + +static void +dissect_netlink_error(tvbuff_t *tvb, proto_tree *tree, int offset, int encoding) +{ + /* + * XXX - this should make sure we don't run past the end of the + * message. + */ + + /* + * Assume sizeof(int) == 4; RFC 3549 doesn't say "32 bits", it + * says "integer (typically 32 bits)". + */ + proto_tree_add_item(tree, hf_netlink_error, tvb, offset, 4, encoding); + offset += 4; + + dissect_netlink_header(tvb, tree, offset, encoding, -1, NULL); +} + +static int +dissect_netlink(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_) +{ + guint16 protocol, hatype; + proto_item *ti; + tvbuff_t *next_tvb; + proto_tree *fh_tree; + + int offset = 0; + int encoding; + guint len_rem, len_le, len_be; + + hatype = tvb_get_ntohs(tvb, 2); + if (hatype != ARPHRD_NETLINK) + return 0; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "Netlink"); + col_clear(pinfo->cinfo, COL_INFO); + + ti = proto_tree_add_protocol_format(tree, proto_netlink, tvb, offset, + SLL_HEADER_SIZE, "Linux netlink (cooked header)"); + fh_tree = proto_item_add_subtree(ti, ett_netlink_cooked); + + /* Packet type + * Since this packet, coming from the monitor port, is always outgoing we skip this + */ + offset += 2; + + proto_tree_add_item(fh_tree, hf_netlink_hatype, tvb, offset, 2, ENC_BIG_ENDIAN); + offset += 2; + + /* Hardware address length plus spare space, unused 10B */ + offset += 10; + + /* Protocol, used as netlink family identifier */ + protocol = tvb_get_ntohs(tvb, offset); + proto_tree_add_item(fh_tree, hf_netlink_family, tvb, offset, 2, ENC_BIG_ENDIAN); + offset += 2; + + /* End of cooked header */ + + /* + * We do not know the endianness of the capture host, we have to guess. + * Compare the size of the message with the reported size of the TVB, + * take the endianness in which the messsage length is closer to + * the size of the TVB. Normally we have messages with less + * than 10KiB here so the sizes are very huge in the wrong endianness. + */ + len_rem = tvb_reported_length_remaining(tvb, offset); + len_le = tvb_get_letohl(tvb, offset); + len_be = tvb_get_ntohl(tvb, offset); + #define abs_diff(a, b) ((a) > (b) ? (a) - (b) : (b) - (a)) + if (abs_diff(len_be, len_rem) < abs_diff(len_le, len_rem)) { + encoding = ENC_BIG_ENDIAN; + } else { + encoding = ENC_LITTLE_ENDIAN; + } + + while (tvb_reported_length_remaining(tvb, offset) >= 16) { + int pkt_end_offset; + guint16 msg_type; + guint32 pkt_len; + guint32 port_id; + proto_tree *fh_msg; + gboolean dissected = FALSE; + + pkt_len = tvb_get_guint32(tvb, offset, encoding); + + pkt_end_offset = offset + pkt_len; + + if (pkt_len < 16) { + /* + * This field includes the length of the 16-byte header, + * so its value is invalid. Add it, report an error, + * and stop trying to dissect. + */ + proto_tree *fh_hdr; + + fh_hdr = proto_tree_add_subtree(tree, tvb, offset, 4, ett_netlink_msghdr, NULL, "Netlink message header"); + + proto_tree_add_item(fh_hdr, hf_netlink_hdr_len, tvb, offset, 4, encoding); + /* XXX invalid expert */ + break; + } + + /* message type field comes after length field. */ + msg_type = tvb_get_guint16(tvb, offset + 4, encoding); + port_id = tvb_get_guint32(tvb, offset + 12, encoding); + + /* Since we have no original direction in the packet coming from + * the monitor port we have to derive it from the port_id + */ + if (port_id == 0x00) + pinfo->p2p_dir = P2P_DIR_SENT; /* userspace -> kernel */ + else + pinfo->p2p_dir = P2P_DIR_RECV; /* userspace or kernel -> userspace */ + + /* + * Try to invoke subdissectors for non-control messages. + */ + if (msg_type >= WS_NLMSG_MIN_TYPE && pkt_len > 16) { + struct packet_netlink_data nl_data; + + nl_data.magic = PACKET_NETLINK_MAGIC; + nl_data.encoding = encoding; + nl_data.type = msg_type; + + next_tvb = tvb_new_subset_length(tvb, offset, pkt_len); + + if (dissector_try_uint_new(netlink_dissector_table, protocol, next_tvb, pinfo, tree, TRUE, &nl_data)) { + dissected = TRUE; + } + } + + if (!dissected) { + /* + * No subdissector was called, add a new layer with the + * header and the payload. Note that pkt_len>=16. + */ + fh_msg = proto_tree_add_subtree(tree, tvb, offset, pkt_len, ett_netlink_msg, NULL, "Netlink message"); + offset = dissect_netlink_header(tvb, fh_msg, offset, encoding, -1, NULL); + + if (msg_type == WS_NLMSG_ERROR) { + dissect_netlink_error(tvb, fh_msg, offset, encoding); + } else if (pkt_len > 16) { + next_tvb = tvb_new_subset_length(tvb, offset, pkt_len - 16); + call_data_dissector(next_tvb, pinfo, fh_msg); + } + } + + offset = pkt_end_offset; + } + + return offset; +} + +void +proto_register_netlink(void) +{ + static hf_register_info hf[] = { + { &hf_netlink_hatype, + { "Link-layer address type", "netlink.hatype", + FT_UINT16, BASE_DEC, VALS(ha_types), 0x0, + NULL, HFILL } + }, + { &hf_netlink_family, + { "Family", "netlink.family", + FT_UINT16, BASE_HEX | BASE_EXT_STRING, &netlink_family_vals_ext, 0x0, + NULL, HFILL } + }, + { &hf_netlink_hdr_len, + { "Length", "netlink.hdr_len", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Length of message including header", HFILL } + }, + { &hf_netlink_hdr_type, + { "Message type", "netlink.hdr_type", + FT_UINT16, BASE_HEX, VALS(type_vals), 0x0, + "Type of message content", HFILL } + }, + { &hf_netlink_hdr_flags, + { "Flags", "netlink.hdr_flags", + FT_UINT16, BASE_HEX, NULL, 0x0, + "Additional flags", HFILL } + }, + { &hf_netlink_hdr_flag_dumpfiltered, + { "Dump filtered", "netlink.hdr_flags.dump_filtered", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_DUMP_FILTERED, + "Dump was filtered as requested", HFILL } + }, + { &hf_netlink_hdr_flag_dumpintr, + { "Dump inconsistent", "netlink.hdr_flags.dump_intr", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_DUMP_INTR, + "Dump was inconsistent due to sequence change", HFILL } + }, + { &hf_netlink_hdr_flag_echo, + { "Echo", "netlink.hdr_flags.echo", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ECHO, + "Echo this request", HFILL } + }, + { &hf_netlink_hdr_flag_ack, + { "Ack", "netlink.hdr_flags.ack", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ACK, + "Asking for an ack", HFILL } + }, + { &hf_netlink_hdr_flag_multi, + { "Multipart message", "netlink.hdr_flags.multi", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_MULTI, + "Part of multi-part message terminated by NLMSG_DONE", HFILL } + }, + { &hf_netlink_hdr_flag_request, + { "Request", "netlink.hdr_flags.request", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_REQUEST, + "It is a request message", HFILL } + }, + { &hf_netlink_hdr_flag_root, + { "Specify tree root", "netlink.hdr_flags.root", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ROOT, + "Return the complete table instead of a single entry", HFILL } + }, + { &hf_netlink_hdr_flag_match, + { "Return all matching", "netlink.hdr_flags.match", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_MATCH, + "Return all entries matching criteria in request", HFILL } + }, + { &hf_netlink_hdr_flag_atomic, + { "Atomic", "netlink.hdr_flags.atomic", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ATOMIC, + "Return an atomic snapshot of the table", HFILL } + }, + { &hf_netlink_hdr_flag_replace, + { "Replace", "netlink.hdr_flags.replace", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_REPLACE, + "Replace existing objects", HFILL } + }, + { &hf_netlink_hdr_flag_excl, + { "Excl", "netlink.hdr_flags.excl", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_EXCL, + "Do not replace existing objects", HFILL } + }, + { &hf_netlink_hdr_flag_create, + { "Create", "netlink.hdr_flags.create", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_CREATE, + "Create objects if it does not already exist", HFILL } + }, + { &hf_netlink_hdr_flag_append, + { "Append", "netlink.hdr_flags.append", + FT_UINT16, BASE_DEC, NULL, WS_NLM_F_APPEND, + "Add to end of object list", HFILL } + }, + { &hf_netlink_hdr_seq, + { "Sequence", "netlink.hdr_seq", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Sequence number", HFILL } + }, + { &hf_netlink_hdr_pid, + { "Port ID", "netlink.hdr_pid", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Sender port ID", HFILL } + }, + { &hf_netlink_attr_len, + { "Len", "netlink.attr_len", + FT_UINT16, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + { &hf_netlink_attr_type, + { "Type", "netlink.attr_type", + FT_UINT16, BASE_HEX, NULL, 0x0, + "Netlink Attribute type", HFILL } + }, + { &hf_netlink_attr_type_nested, + { "Nested", "netlink.attr_type.nested", + FT_BOOLEAN, 16, NULL, NLA_F_NESTED, + "Carries nested attributes", HFILL } + }, + { &hf_netlink_attr_type_net_byteorder, + { "Network byte order", "netlink.attr_type.net_byteorder", + FT_BOOLEAN, 16, NULL, NLA_F_NET_BYTEORDER, + "Payload stored in host or network byte order", HFILL } + }, + { &hf_netlink_attr_index, + { "Index", "netlink.attr_index", + FT_UINT16, BASE_DEC, NULL, 0x0, + "Netlink Attribute type (array index)", HFILL } + }, + { &hf_netlink_attr_data, + { "Data", "netlink.attr_data", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + { &hf_netlink_error, + { "Error code", "netlink.error", + FT_INT32, BASE_DEC | BASE_EXT_STRING, &linux_negative_errno_vals_ext, 0x0, + "Negative errno or 0 for acknowledgements", HFILL } + }, + }; + + static gint *ett[] = { + &ett_netlink_cooked, + &ett_netlink_msghdr, + &ett_netlink_msg, + &ett_netlink_hdr_flags, + &ett_netlink_attr_type, + }; + + proto_netlink = proto_register_protocol("Linux netlink protocol", "NETLINK", "netlink" ); + proto_register_field_array(proto_netlink, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + + netlink_handle = register_dissector("netlink", dissect_netlink, proto_netlink); + + netlink_dissector_table = register_dissector_table( + "netlink.protocol", + "Linux netlink protocol type", + proto_netlink, FT_UINT16, + BASE_HEX + ); +} + +void +proto_reg_handoff_netlink(void) +{ + dissector_add_uint("wtap_encap", WTAP_ENCAP_NETLINK, netlink_handle); +} + +/* + * Editor modelines - https://www.wireshark.org/tools/modelines.html + * + * Local variables: + * c-basic-offset: 8 + * tab-width: 8 + * indent-tabs-mode: t + * End: + * + * vi: set shiftwidth=8 tabstop=8 noexpandtab: + * :indentSize=8:tabSize=8:noTabs=false: + */ |