/* packet-netlink.c * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * SPDX-License-Identifier: GPL-2.0-or-later */ /* http://www.tcpdump.org/linktypes/LINKTYPE_NETLINK.html */ #include "config.h" #include #include #include #include #include #include "packet-netlink.h" void proto_register_netlink(void); void proto_reg_handoff_netlink(void); /* * A DLT_LINUX_SLL fake link-layer header. */ #define SLL_HEADER_SIZE 16 /* total header length */ static const value_string netlink_family_vals[] = { { WS_NETLINK_ROUTE, "Route" }, { WS_NETLINK_UNUSED, "Unused" }, { WS_NETLINK_USERSOCK, "User-mode socket protocols" }, { WS_NETLINK_FIREWALL, "Unused (formerly: ip_queue)" }, { WS_NETLINK_SOCK_DIAG, "Socket monitoring" }, { WS_NETLINK_NFLOG, "Netfilter ULOG" }, { WS_NETLINK_XFRM, "IPsec" }, { WS_NETLINK_SELINUX, "SELinux events" }, { WS_NETLINK_ISCSI, "Open-iSCSI" }, { WS_NETLINK_AUDIT, "Auditing" }, { WS_NETLINK_FIB_LOOKUP, "FIB lookup" }, { WS_NETLINK_CONNECTOR, "Kernel connector" }, { WS_NETLINK_NETFILTER, "Netfilter" }, { WS_NETLINK_IP6_FW, "Unused (formerly: ip6_queue)" }, { WS_NETLINK_DNRTMSG, "DECnet routing messages" }, { WS_NETLINK_KOBJECT_UEVENT, "Kernel messages to userspace" }, { WS_NETLINK_GENERIC, "Generic" }, { WS_NETLINK_SCSITRANSPORT, "SCSI Transports" }, { WS_NETLINK_ECRYPTFS, "ecryptfs" }, { WS_NETLINK_RDMA, "RDMA" }, { WS_NETLINK_CRYPTO, "Crypto layer" }, { WS_NETLINK_SMC, "SMC monitoring" }, { 0, NULL } }; value_string_ext netlink_family_vals_ext = VALUE_STRING_EXT_INIT(netlink_family_vals); static const value_string type_vals[] = { { WS_NLMSG_NOOP, "Nothing" }, { WS_NLMSG_ERROR, "Error" }, { WS_NLMSG_DONE, "End of a dump" }, { WS_NLMSG_OVERRUN, "Data lost" }, { 0, NULL } }; static const value_string ha_types[] = { { ARPHRD_NETLINK, "Netlink" }, { 0, NULL } }; extern value_string_ext linux_negative_errno_vals_ext; static dissector_handle_t netlink_handle; static int proto_netlink = -1; static int hf_netlink_attr_data = -1; static int hf_netlink_attr_index = -1; static int hf_netlink_attr_len = -1; static int hf_netlink_attr_type = -1; static int hf_netlink_attr_type_nested = -1; static int hf_netlink_attr_type_net_byteorder = -1; static int hf_netlink_error = -1; static int hf_netlink_family = -1; static int hf_netlink_hatype = -1; static int hf_netlink_hdr_flag_ack = -1; static int hf_netlink_hdr_flag_append = -1; static int hf_netlink_hdr_flag_atomic = -1; static int hf_netlink_hdr_flag_create = -1; static int hf_netlink_hdr_flag_dumpfiltered = -1; static int hf_netlink_hdr_flag_dumpintr = -1; static int hf_netlink_hdr_flag_echo = -1; static int hf_netlink_hdr_flag_excl = -1; static int hf_netlink_hdr_flag_match = -1; static int hf_netlink_hdr_flag_multi = -1; static int hf_netlink_hdr_flag_replace = -1; static int hf_netlink_hdr_flag_request = -1; static int hf_netlink_hdr_flag_root = -1; static int hf_netlink_hdr_flags = -1; static int hf_netlink_hdr_len = -1; static int hf_netlink_hdr_pid = -1; static int hf_netlink_hdr_seq = -1; static int hf_netlink_hdr_type = -1; static gint ett_netlink_cooked = -1; static gint ett_netlink_msghdr = -1; static gint ett_netlink_msg = -1; static gint ett_netlink_hdr_flags = -1; static gint ett_netlink_attr_type = -1; static dissector_table_t netlink_dissector_table; static int * const netlink_header_get_flags[] = { &hf_netlink_hdr_flag_request, &hf_netlink_hdr_flag_multi, &hf_netlink_hdr_flag_ack, &hf_netlink_hdr_flag_echo, &hf_netlink_hdr_flag_dumpintr, &hf_netlink_hdr_flag_dumpfiltered, &hf_netlink_hdr_flag_root, &hf_netlink_hdr_flag_match, &hf_netlink_hdr_flag_atomic, NULL }; static int * const netlink_header_new_flags[] = { &hf_netlink_hdr_flag_request, &hf_netlink_hdr_flag_multi, &hf_netlink_hdr_flag_ack, &hf_netlink_hdr_flag_echo, &hf_netlink_hdr_flag_dumpintr, &hf_netlink_hdr_flag_dumpfiltered, &hf_netlink_hdr_flag_replace, &hf_netlink_hdr_flag_excl, &hf_netlink_hdr_flag_create, &hf_netlink_hdr_flag_append, NULL }; static int * const netlink_header_standard_flags[] = { &hf_netlink_hdr_flag_request, &hf_netlink_hdr_flag_multi, &hf_netlink_hdr_flag_ack, &hf_netlink_hdr_flag_echo, &hf_netlink_hdr_flag_dumpintr, &hf_netlink_hdr_flag_dumpfiltered, NULL }; static int dissect_netlink_attributes_common(tvbuff_t *tvb, int hf_type, int ett_tree, int ett_attrib, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) { int encoding; int padding = (4 - offset) & 3; guint data_length; header_field_info *hfi_type; DISSECTOR_ASSERT(nl_data); encoding = nl_data->encoding; /* * A "negative" length is really a very large positive * length, which we presume to go past the end of the * packet. */ if (length < 0) THROW(ReportedBoundsError); /* align to 4 */ offset += padding; if (length < padding) THROW(ReportedBoundsError); length -= padding; data_length = length; while (data_length >= 4) { guint rta_len, rta_type, type; proto_item *ti, *type_item; proto_tree *attr_tree, *type_tree; rta_len = tvb_get_guint16(tvb, offset, encoding); if (rta_len < 4) { /* XXX invalid expert */ break; } /* XXX expert info when rta_len < data_length? */ rta_len = MIN(rta_len, data_length); attr_tree = proto_tree_add_subtree(tree, tvb, offset, rta_len, ett_tree, &ti, "Attribute"); proto_tree_add_item(attr_tree, hf_netlink_attr_len, tvb, offset, 2, encoding); offset += 2; rta_type = tvb_get_guint16(tvb, offset, encoding); if (ett_attrib == -1) { /* List of attributes */ type = rta_type & NLA_TYPE_MASK; type_item = proto_tree_add_item(attr_tree, hf_netlink_attr_type, tvb, offset, 2, encoding); type_tree = proto_item_add_subtree(type_item, ett_netlink_attr_type); proto_tree_add_item(type_tree, hf_netlink_attr_type_nested, tvb, offset, 2, encoding); proto_tree_add_item(type_tree, hf_netlink_attr_type_net_byteorder, tvb, offset, 2, encoding); /* The hf_type _must_ have NLA_TYPE_MASK in it's definition, otherwise the nested/net_byteorder * flags influence the retrieved value. Since this is impossible to enforce (apart from using * a nasty DISSECTOR_ASSERT perhaps) we'll just have to make sure to feed in the properly * masked value. Luckily we already have it: 'type' is the value we need. */ proto_tree_add_uint(type_tree, hf_type, tvb, offset, 2, type); offset += 2; if (rta_type & NLA_F_NESTED) proto_item_append_text(type_item, ", Nested"); hfi_type = proto_registrar_get_nth(hf_type); if (hfi_type->strings) { /* XXX, export hf_try_val_to_str */ const char *rta_str; if (hfi_type->display & BASE_EXT_STRING) { rta_str = try_val_to_str_ext(type, (value_string_ext *)hfi_type->strings); } else { rta_str = try_val_to_str(type, (const value_string *) hfi_type->strings); } if (rta_str) { proto_item_append_text(type_item, ", %s (%d)", rta_str, type); proto_item_append_text(ti, ": %s", rta_str); } } /* The callback needs to be passed the netlink_attr_type_net_byteorder as dissected, * to properly dissect the attribute value, which byte order may differ from the * capture host native byte order, as heuristically established in 'encoding'. * We pass in the encoding through nl_data, so we temporarily modify it to match * the NLA_F_NET_BYTEORDER flag. */ if (rta_type & NLA_F_NET_BYTEORDER) nl_data->encoding = ENC_BIG_ENDIAN; if (!cb(tvb, data, nl_data, attr_tree, rta_type, offset, rta_len - 4)) { proto_tree_add_item(attr_tree, hf_netlink_attr_data, tvb, offset, rta_len - 4, ENC_NA); } /* Restore the originaly established encoding. */ if (rta_type & NLA_F_NET_BYTEORDER) nl_data->encoding = encoding; } else { /* * Nested attributes, constructing an array (list of * attributes where its type is the array index and its * value is the actual list of interesting attributes). */ proto_tree_add_item(attr_tree, hf_netlink_attr_index, tvb, offset, 2, encoding); offset += 2; proto_item_append_text(ti, " %u", rta_type); dissect_netlink_attributes(tvb, hf_type, ett_attrib, data, nl_data, attr_tree, offset, rta_len - 4, cb); } /* Assume offset already aligned, next offset is rta_len plus alignment. */ rta_len = MIN(WS_ROUNDUP_4(rta_len), data_length); offset += rta_len - 4; /* Header was already skipped */ if (data_length < rta_len) THROW(ReportedBoundsError); data_length -= rta_len; } return offset; } int dissect_netlink_attributes(tvbuff_t *tvb, int hf_type, int ett, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) { return dissect_netlink_attributes_common(tvb, hf_type, ett, -1, data, nl_data, tree, offset, length, cb); } int dissect_netlink_attributes_to_end(tvbuff_t *tvb, int hf_type, int ett, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, netlink_attributes_cb_t cb) { return dissect_netlink_attributes_common(tvb, hf_type, ett, -1, data, nl_data, tree, offset, tvb_ensure_reported_length_remaining(tvb, offset), cb); } int dissect_netlink_attributes_array(tvbuff_t *tvb, int hf_type, int ett_array, int ett_attrib, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int offset, int length, netlink_attributes_cb_t cb) { DISSECTOR_ASSERT(ett_attrib != -1); return dissect_netlink_attributes_common(tvb, hf_type, ett_array, ett_attrib, data, nl_data, tree, offset, length, cb); } int dissect_netlink_header(tvbuff_t *tvb, proto_tree *tree, int offset, int encoding, int hf_type, proto_item **pi_type) { guint16 hdr_flags; guint16 hdr_type; proto_tree *fh_hdr; proto_item *pi; header_field_info *hfi_type; fh_hdr = proto_tree_add_subtree(tree, tvb, offset, 16, ett_netlink_msghdr, NULL, "Netlink message header"); proto_tree_add_item(fh_hdr, hf_netlink_hdr_len, tvb, offset, 4, encoding); offset += 4; hdr_type = tvb_get_guint16(tvb, offset, encoding); if (hdr_type < WS_NLMSG_MIN_TYPE) { /* Reserved control messages. */ hf_type = hf_netlink_hdr_type; pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); } else { if (hf_type != -1) { pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); } else { hf_type = hf_netlink_hdr_type; pi = proto_tree_add_item(fh_hdr, hf_type, tvb, offset, 2, encoding); proto_item_set_text(pi, "Message type: Protocol-specific (0x%04x)", hdr_type); } } hfi_type = proto_registrar_get_nth(hf_type); if (pi_type) { *pi_type = pi; } /* TODO export hf_try_val_to_str? */ if (hfi_type->strings && hfi_type->display & BASE_EXT_STRING) { proto_item_append_text(fh_hdr, " (type: %s)", val_to_str_ext(hdr_type, (value_string_ext *)hfi_type->strings, "0x%04x")); } else if (hfi_type->strings) { proto_item_append_text(fh_hdr, " (type: %s)", val_to_str(hdr_type, (const value_string *)hfi_type->strings, "0x%04x")); } else { proto_item_append_text(fh_hdr, " (type: 0x%04x)", hdr_type); } offset += 2; hdr_flags = tvb_get_guint16(tvb, offset, encoding); if ((hdr_flags & WS_NLM_F_REQUEST) && (hdr_flags & 0x0f00)) { /* TODO detect based on the protocol family and message type * whether this is a GET, NEW or regular request. */ proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, ett_netlink_hdr_flags, netlink_header_get_flags, encoding); proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, ett_netlink_hdr_flags, netlink_header_new_flags, encoding); } else { proto_tree_add_bitmask(fh_hdr, tvb, offset, hf_netlink_hdr_flags, ett_netlink_hdr_flags, netlink_header_standard_flags, encoding); } offset += 2; proto_tree_add_item(fh_hdr, hf_netlink_hdr_seq, tvb, offset, 4, encoding); offset += 4; proto_tree_add_item(fh_hdr, hf_netlink_hdr_pid, tvb, offset, 4, encoding); offset += 4; return offset; } static void dissect_netlink_error(tvbuff_t *tvb, proto_tree *tree, int offset, int encoding) { /* * XXX - this should make sure we don't run past the end of the * message. */ /* * Assume sizeof(int) == 4; RFC 3549 doesn't say "32 bits", it * says "integer (typically 32 bits)". */ proto_tree_add_item(tree, hf_netlink_error, tvb, offset, 4, encoding); offset += 4; dissect_netlink_header(tvb, tree, offset, encoding, -1, NULL); } static int dissect_netlink(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_) { guint16 protocol, hatype; proto_item *ti; tvbuff_t *next_tvb; proto_tree *fh_tree; int offset = 0; int encoding; guint len_rem, len_le, len_be; hatype = tvb_get_ntohs(tvb, 2); if (hatype != ARPHRD_NETLINK) return 0; col_set_str(pinfo->cinfo, COL_PROTOCOL, "Netlink"); col_clear(pinfo->cinfo, COL_INFO); ti = proto_tree_add_protocol_format(tree, proto_netlink, tvb, offset, SLL_HEADER_SIZE, "Linux netlink (cooked header)"); fh_tree = proto_item_add_subtree(ti, ett_netlink_cooked); /* Packet type * Since this packet, coming from the monitor port, is always outgoing we skip this */ offset += 2; proto_tree_add_item(fh_tree, hf_netlink_hatype, tvb, offset, 2, ENC_BIG_ENDIAN); offset += 2; /* Hardware address length plus spare space, unused 10B */ offset += 10; /* Protocol, used as netlink family identifier */ protocol = tvb_get_ntohs(tvb, offset); proto_tree_add_item(fh_tree, hf_netlink_family, tvb, offset, 2, ENC_BIG_ENDIAN); offset += 2; /* End of cooked header */ /* * We do not know the endianness of the capture host, we have to guess. * Compare the size of the message with the reported size of the TVB, * take the endianness in which the messsage length is closer to * the size of the TVB. Normally we have messages with less * than 10KiB here so the sizes are very huge in the wrong endianness. */ len_rem = tvb_reported_length_remaining(tvb, offset); len_le = tvb_get_letohl(tvb, offset); len_be = tvb_get_ntohl(tvb, offset); #define abs_diff(a, b) ((a) > (b) ? (a) - (b) : (b) - (a)) if (abs_diff(len_be, len_rem) < abs_diff(len_le, len_rem)) { encoding = ENC_BIG_ENDIAN; } else { encoding = ENC_LITTLE_ENDIAN; } while (tvb_reported_length_remaining(tvb, offset) >= 16) { int pkt_end_offset; guint16 msg_type; guint32 pkt_len; guint32 port_id; proto_tree *fh_msg; gboolean dissected = FALSE; pkt_len = tvb_get_guint32(tvb, offset, encoding); pkt_end_offset = offset + pkt_len; if (pkt_len < 16) { /* * This field includes the length of the 16-byte header, * so its value is invalid. Add it, report an error, * and stop trying to dissect. */ proto_tree *fh_hdr; fh_hdr = proto_tree_add_subtree(tree, tvb, offset, 4, ett_netlink_msghdr, NULL, "Netlink message header"); proto_tree_add_item(fh_hdr, hf_netlink_hdr_len, tvb, offset, 4, encoding); /* XXX invalid expert */ break; } /* message type field comes after length field. */ msg_type = tvb_get_guint16(tvb, offset + 4, encoding); port_id = tvb_get_guint32(tvb, offset + 12, encoding); /* Since we have no original direction in the packet coming from * the monitor port we have to derive it from the port_id */ if (port_id == 0x00) pinfo->p2p_dir = P2P_DIR_SENT; /* userspace -> kernel */ else pinfo->p2p_dir = P2P_DIR_RECV; /* userspace or kernel -> userspace */ /* * Try to invoke subdissectors for non-control messages. */ if (msg_type >= WS_NLMSG_MIN_TYPE && pkt_len > 16) { struct packet_netlink_data nl_data; nl_data.magic = PACKET_NETLINK_MAGIC; nl_data.encoding = encoding; nl_data.type = msg_type; next_tvb = tvb_new_subset_length(tvb, offset, pkt_len); if (dissector_try_uint_new(netlink_dissector_table, protocol, next_tvb, pinfo, tree, TRUE, &nl_data)) { dissected = TRUE; } } if (!dissected) { /* * No subdissector was called, add a new layer with the * header and the payload. Note that pkt_len>=16. */ fh_msg = proto_tree_add_subtree(tree, tvb, offset, pkt_len, ett_netlink_msg, NULL, "Netlink message"); offset = dissect_netlink_header(tvb, fh_msg, offset, encoding, -1, NULL); if (msg_type == WS_NLMSG_ERROR) { dissect_netlink_error(tvb, fh_msg, offset, encoding); } else if (pkt_len > 16) { next_tvb = tvb_new_subset_length(tvb, offset, pkt_len - 16); call_data_dissector(next_tvb, pinfo, fh_msg); } } offset = pkt_end_offset; } return offset; } void proto_register_netlink(void) { static hf_register_info hf[] = { { &hf_netlink_hatype, { "Link-layer address type", "netlink.hatype", FT_UINT16, BASE_DEC, VALS(ha_types), 0x0, NULL, HFILL } }, { &hf_netlink_family, { "Family", "netlink.family", FT_UINT16, BASE_HEX | BASE_EXT_STRING, &netlink_family_vals_ext, 0x0, NULL, HFILL } }, { &hf_netlink_hdr_len, { "Length", "netlink.hdr_len", FT_UINT32, BASE_DEC, NULL, 0x0, "Length of message including header", HFILL } }, { &hf_netlink_hdr_type, { "Message type", "netlink.hdr_type", FT_UINT16, BASE_HEX, VALS(type_vals), 0x0, "Type of message content", HFILL } }, { &hf_netlink_hdr_flags, { "Flags", "netlink.hdr_flags", FT_UINT16, BASE_HEX, NULL, 0x0, "Additional flags", HFILL } }, { &hf_netlink_hdr_flag_dumpfiltered, { "Dump filtered", "netlink.hdr_flags.dump_filtered", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_DUMP_FILTERED, "Dump was filtered as requested", HFILL } }, { &hf_netlink_hdr_flag_dumpintr, { "Dump inconsistent", "netlink.hdr_flags.dump_intr", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_DUMP_INTR, "Dump was inconsistent due to sequence change", HFILL } }, { &hf_netlink_hdr_flag_echo, { "Echo", "netlink.hdr_flags.echo", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ECHO, "Echo this request", HFILL } }, { &hf_netlink_hdr_flag_ack, { "Ack", "netlink.hdr_flags.ack", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ACK, "Asking for an ack", HFILL } }, { &hf_netlink_hdr_flag_multi, { "Multipart message", "netlink.hdr_flags.multi", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_MULTI, "Part of multi-part message terminated by NLMSG_DONE", HFILL } }, { &hf_netlink_hdr_flag_request, { "Request", "netlink.hdr_flags.request", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_REQUEST, "It is a request message", HFILL } }, { &hf_netlink_hdr_flag_root, { "Specify tree root", "netlink.hdr_flags.root", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ROOT, "Return the complete table instead of a single entry", HFILL } }, { &hf_netlink_hdr_flag_match, { "Return all matching", "netlink.hdr_flags.match", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_MATCH, "Return all entries matching criteria in request", HFILL } }, { &hf_netlink_hdr_flag_atomic, { "Atomic", "netlink.hdr_flags.atomic", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_ATOMIC, "Return an atomic snapshot of the table", HFILL } }, { &hf_netlink_hdr_flag_replace, { "Replace", "netlink.hdr_flags.replace", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_REPLACE, "Replace existing objects", HFILL } }, { &hf_netlink_hdr_flag_excl, { "Excl", "netlink.hdr_flags.excl", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_EXCL, "Do not replace existing objects", HFILL } }, { &hf_netlink_hdr_flag_create, { "Create", "netlink.hdr_flags.create", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_CREATE, "Create objects if it does not already exist", HFILL } }, { &hf_netlink_hdr_flag_append, { "Append", "netlink.hdr_flags.append", FT_UINT16, BASE_DEC, NULL, WS_NLM_F_APPEND, "Add to end of object list", HFILL } }, { &hf_netlink_hdr_seq, { "Sequence", "netlink.hdr_seq", FT_UINT32, BASE_DEC, NULL, 0x0, "Sequence number", HFILL } }, { &hf_netlink_hdr_pid, { "Port ID", "netlink.hdr_pid", FT_UINT32, BASE_DEC, NULL, 0x0, "Sender port ID", HFILL } }, { &hf_netlink_attr_len, { "Len", "netlink.attr_len", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL } }, { &hf_netlink_attr_type, { "Type", "netlink.attr_type", FT_UINT16, BASE_HEX, NULL, 0x0, "Netlink Attribute type", HFILL } }, { &hf_netlink_attr_type_nested, { "Nested", "netlink.attr_type.nested", FT_BOOLEAN, 16, NULL, NLA_F_NESTED, "Carries nested attributes", HFILL } }, { &hf_netlink_attr_type_net_byteorder, { "Network byte order", "netlink.attr_type.net_byteorder", FT_BOOLEAN, 16, NULL, NLA_F_NET_BYTEORDER, "Payload stored in host or network byte order", HFILL } }, { &hf_netlink_attr_index, { "Index", "netlink.attr_index", FT_UINT16, BASE_DEC, NULL, 0x0, "Netlink Attribute type (array index)", HFILL } }, { &hf_netlink_attr_data, { "Data", "netlink.attr_data", FT_BYTES, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_netlink_error, { "Error code", "netlink.error", FT_INT32, BASE_DEC | BASE_EXT_STRING, &linux_negative_errno_vals_ext, 0x0, "Negative errno or 0 for acknowledgements", HFILL } }, }; static gint *ett[] = { &ett_netlink_cooked, &ett_netlink_msghdr, &ett_netlink_msg, &ett_netlink_hdr_flags, &ett_netlink_attr_type, }; proto_netlink = proto_register_protocol("Linux netlink protocol", "NETLINK", "netlink" ); proto_register_field_array(proto_netlink, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); netlink_handle = register_dissector("netlink", dissect_netlink, proto_netlink); netlink_dissector_table = register_dissector_table( "netlink.protocol", "Linux netlink protocol type", proto_netlink, FT_UINT16, BASE_HEX ); } void proto_reg_handoff_netlink(void) { dissector_add_uint("wtap_encap", WTAP_ENCAP_NETLINK, netlink_handle); } /* * Editor modelines - https://www.wireshark.org/tools/modelines.html * * Local variables: * c-basic-offset: 8 * tab-width: 8 * indent-tabs-mode: t * End: * * vi: set shiftwidth=8 tabstop=8 noexpandtab: * :indentSize=8:tabSize=8:noTabs=false: */