]> The Tcpdump Group git mirrors - tcpdump/blob - print-ether.c
Add more nd_print_trunc() calls
[tcpdump] / print-ether.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: Ethernet printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include "netdissect.h"
31 #include "extract.h"
32 #include "addrtoname.h"
33 #include "ethertype.h"
34
35 /*
36 * Structure of an Ethernet header.
37 */
38 struct ether_header {
39 nd_mac_addr ether_dhost;
40 nd_mac_addr ether_shost;
41 nd_uint16_t ether_length_type;
42 };
43
44 /*
45 * Length of an Ethernet header; note that some compilers may pad
46 * "struct ether_header" to a multiple of 4 bytes, for example, so
47 * "sizeof (struct ether_header)" may not give the right answer.
48 */
49 #define ETHER_HDRLEN 14
50
51 const struct tok ethertype_values[] = {
52 { ETHERTYPE_IP, "IPv4" },
53 { ETHERTYPE_MPLS, "MPLS unicast" },
54 { ETHERTYPE_MPLS_MULTI, "MPLS multicast" },
55 { ETHERTYPE_IPV6, "IPv6" },
56 { ETHERTYPE_8021Q, "802.1Q" },
57 { ETHERTYPE_8021Q9100, "802.1Q-9100" },
58 { ETHERTYPE_8021QinQ, "802.1Q-QinQ" },
59 { ETHERTYPE_8021Q9200, "802.1Q-9200" },
60 { ETHERTYPE_VMAN, "VMAN" },
61 { ETHERTYPE_PUP, "PUP" },
62 { ETHERTYPE_ARP, "ARP"},
63 { ETHERTYPE_REVARP, "Reverse ARP"},
64 { ETHERTYPE_NS, "NS" },
65 { ETHERTYPE_SPRITE, "Sprite" },
66 { ETHERTYPE_TRAIL, "Trail" },
67 { ETHERTYPE_MOPDL, "MOP DL" },
68 { ETHERTYPE_MOPRC, "MOP RC" },
69 { ETHERTYPE_DN, "DN" },
70 { ETHERTYPE_LAT, "LAT" },
71 { ETHERTYPE_SCA, "SCA" },
72 { ETHERTYPE_TEB, "TEB" },
73 { ETHERTYPE_LANBRIDGE, "Lanbridge" },
74 { ETHERTYPE_DECDNS, "DEC DNS" },
75 { ETHERTYPE_DECDTS, "DEC DTS" },
76 { ETHERTYPE_VEXP, "VEXP" },
77 { ETHERTYPE_VPROD, "VPROD" },
78 { ETHERTYPE_ATALK, "Appletalk" },
79 { ETHERTYPE_AARP, "Appletalk ARP" },
80 { ETHERTYPE_IPX, "IPX" },
81 { ETHERTYPE_PPP, "PPP" },
82 { ETHERTYPE_MPCP, "MPCP" },
83 { ETHERTYPE_SLOW, "Slow Protocols" },
84 { ETHERTYPE_PPPOED, "PPPoE D" },
85 { ETHERTYPE_PPPOES, "PPPoE S" },
86 { ETHERTYPE_EAPOL, "EAPOL" },
87 { ETHERTYPE_RRCP, "RRCP" },
88 { ETHERTYPE_MS_NLB_HB, "MS NLB heartbeat" },
89 { ETHERTYPE_JUMBO, "Jumbo" },
90 { ETHERTYPE_NSH, "NSH" },
91 { ETHERTYPE_LOOPBACK, "Loopback" },
92 { ETHERTYPE_ISO, "OSI" },
93 { ETHERTYPE_GRE_ISO, "GRE-OSI" },
94 { ETHERTYPE_CFM_OLD, "CFM (old)" },
95 { ETHERTYPE_CFM, "CFM" },
96 { ETHERTYPE_IEEE1905_1, "IEEE1905.1" },
97 { ETHERTYPE_LLDP, "LLDP" },
98 { ETHERTYPE_TIPC, "TIPC"},
99 { ETHERTYPE_GEONET_OLD, "GeoNet (old)"},
100 { ETHERTYPE_GEONET, "GeoNet"},
101 { ETHERTYPE_CALM_FAST, "CALM FAST"},
102 { ETHERTYPE_AOE, "AoE" },
103 { ETHERTYPE_MEDSA, "MEDSA" },
104 { 0, NULL}
105 };
106
107 static void
108 ether_hdr_print(netdissect_options *ndo,
109 const u_char *bp, u_int length)
110 {
111 const struct ether_header *ehp;
112 uint16_t length_type;
113
114 ehp = (const struct ether_header *)bp;
115
116 ND_PRINT("%s > %s",
117 etheraddr_string(ndo, ehp->ether_shost),
118 etheraddr_string(ndo, ehp->ether_dhost));
119
120 length_type = EXTRACT_BE_U_2(ehp->ether_length_type);
121 if (!ndo->ndo_qflag) {
122 if (length_type <= MAX_ETHERNET_LENGTH_VAL) {
123 ND_PRINT(", 802.3");
124 length = length_type;
125 } else
126 ND_PRINT(", ethertype %s (0x%04x)",
127 tok2str(ethertype_values,"Unknown", length_type),
128 length_type);
129 } else {
130 if (length_type <= MAX_ETHERNET_LENGTH_VAL) {
131 ND_PRINT(", 802.3");
132 length = length_type;
133 } else
134 ND_PRINT(", %s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", length_type));
135 }
136
137 ND_PRINT(", length %u: ", length);
138 }
139
140 /*
141 * Print an Ethernet frame.
142 * This might be encapsulated within another frame; we might be passed
143 * a pointer to a function that can print header information for that
144 * frame's protocol, and an argument to pass to that function.
145 *
146 * FIXME: caplen can and should be derived from ndo->ndo_snapend and p.
147 */
148 u_int
149 ether_print(netdissect_options *ndo,
150 const u_char *p, u_int length, u_int caplen,
151 void (*print_encap_header)(netdissect_options *ndo, const u_char *),
152 const u_char *encap_header_arg)
153 {
154 const struct ether_header *ehp;
155 u_int orig_length;
156 u_short length_type;
157 u_int hdrlen;
158 int llc_hdrlen;
159 struct lladdr_info src, dst;
160
161 ndo->ndo_protocol = "ether";
162 if (caplen < ETHER_HDRLEN) {
163 nd_print_trunc(ndo);
164 return (caplen);
165 }
166
167 if (ndo->ndo_eflag) {
168 if (print_encap_header != NULL)
169 (*print_encap_header)(ndo, encap_header_arg);
170 ether_hdr_print(ndo, p, length);
171 }
172 orig_length = length;
173
174 length -= ETHER_HDRLEN;
175 caplen -= ETHER_HDRLEN;
176 ehp = (const struct ether_header *)p;
177 p += ETHER_HDRLEN;
178 hdrlen = ETHER_HDRLEN;
179
180 src.addr = ehp->ether_shost;
181 src.addr_string = etheraddr_string;
182 dst.addr = ehp->ether_dhost;
183 dst.addr_string = etheraddr_string;
184 length_type = EXTRACT_BE_U_2(ehp->ether_length_type);
185
186 recurse:
187 /*
188 * Is it (gag) an 802.3 encapsulation?
189 */
190 if (length_type <= MAX_ETHERNET_LENGTH_VAL) {
191 /* Try to print the LLC-layer header & higher layers */
192 llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst);
193 if (llc_hdrlen < 0) {
194 /* packet type not known, print raw packet */
195 if (!ndo->ndo_suppress_default_print)
196 ND_DEFAULTPRINT(p, caplen);
197 llc_hdrlen = -llc_hdrlen;
198 }
199 hdrlen += llc_hdrlen;
200 } else if (length_type == ETHERTYPE_8021Q ||
201 length_type == ETHERTYPE_8021Q9100 ||
202 length_type == ETHERTYPE_8021Q9200 ||
203 length_type == ETHERTYPE_8021QinQ) {
204 /*
205 * Print VLAN information, and then go back and process
206 * the enclosed type field.
207 */
208 if (caplen < 4) {
209 ndo->ndo_protocol = "vlan";
210 nd_print_trunc(ndo);
211 return (hdrlen + caplen);
212 }
213 if (ndo->ndo_eflag) {
214 uint16_t tag = EXTRACT_BE_U_2(p);
215
216 ND_PRINT("%s, ", ieee8021q_tci_string(tag));
217 }
218
219 length_type = EXTRACT_BE_U_2(p + 2);
220 if (ndo->ndo_eflag && length_type > MAX_ETHERNET_LENGTH_VAL)
221 ND_PRINT("ethertype %s, ", tok2str(ethertype_values,"0x%04x", length_type));
222 p += 4;
223 length -= 4;
224 caplen -= 4;
225 hdrlen += 4;
226 goto recurse;
227 } else if (length_type == ETHERTYPE_JUMBO) {
228 /*
229 * Alteon jumbo frames.
230 * See
231 *
232 * http://tools.ietf.org/html/draft-ietf-isis-ext-eth-01
233 *
234 * which indicates that, following the type field,
235 * there's an LLC header and payload.
236 */
237 /* Try to print the LLC-layer header & higher layers */
238 llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst);
239 if (llc_hdrlen < 0) {
240 /* packet type not known, print raw packet */
241 if (!ndo->ndo_suppress_default_print)
242 ND_DEFAULTPRINT(p, caplen);
243 llc_hdrlen = -llc_hdrlen;
244 }
245 hdrlen += llc_hdrlen;
246 } else {
247 if (ethertype_print(ndo, length_type, p, length, caplen, &src, &dst) == 0) {
248 /* type not known, print raw packet */
249 if (!ndo->ndo_eflag) {
250 if (print_encap_header != NULL)
251 (*print_encap_header)(ndo, encap_header_arg);
252 ether_hdr_print(ndo, (const u_char *)ehp, orig_length);
253 }
254
255 if (!ndo->ndo_suppress_default_print)
256 ND_DEFAULTPRINT(p, caplen);
257 }
258 }
259 return (hdrlen);
260 }
261
262 /*
263 * This is the top level routine of the printer. 'p' points
264 * to the ether header of the packet, 'h->len' is the length
265 * of the packet off the wire, and 'h->caplen' is the number
266 * of bytes actually captured.
267 */
268 u_int
269 ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h,
270 const u_char *p)
271 {
272 ndo->ndo_protocol = "ether_if";
273 return (ether_print(ndo, p, h->len, h->caplen, NULL, NULL));
274 }
275
276 /*
277 * This is the top level routine of the printer. 'p' points
278 * to the ether header of the packet, 'h->len' is the length
279 * of the packet off the wire, and 'h->caplen' is the number
280 * of bytes actually captured.
281 *
282 * This is for DLT_NETANALYZER, which has a 4-byte pseudo-header
283 * before the Ethernet header.
284 */
285 u_int
286 netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h,
287 const u_char *p)
288 {
289 /*
290 * Fail if we don't have enough data for the Hilscher pseudo-header.
291 */
292 ndo->ndo_protocol = "netanalyzer_if";
293 if (h->caplen < 4) {
294 nd_print_trunc(ndo);
295 return (h->caplen);
296 }
297
298 /* Skip the pseudo-header. */
299 return (4 + ether_print(ndo, p + 4, h->len - 4, h->caplen - 4, NULL, NULL));
300 }
301
302 /*
303 * This is the top level routine of the printer. 'p' points
304 * to the ether header of the packet, 'h->len' is the length
305 * of the packet off the wire, and 'h->caplen' is the number
306 * of bytes actually captured.
307 *
308 * This is for DLT_NETANALYZER_TRANSPARENT, which has a 4-byte
309 * pseudo-header, a 7-byte Ethernet preamble, and a 1-byte Ethernet SOF
310 * before the Ethernet header.
311 */
312 u_int
313 netanalyzer_transparent_if_print(netdissect_options *ndo,
314 const struct pcap_pkthdr *h,
315 const u_char *p)
316 {
317 /*
318 * Fail if we don't have enough data for the Hilscher pseudo-header,
319 * preamble, and SOF.
320 */
321 ndo->ndo_protocol = "netanalyzer_transparent_if";
322 if (h->caplen < 12) {
323 nd_print_trunc(ndo);
324 return (h->caplen);
325 }
326
327 /* Skip the pseudo-header, preamble, and SOF. */
328 return (12 + ether_print(ndo, p + 12, h->len - 12, h->caplen - 12, NULL, NULL));
329 }
330
331 /*
332 * Prints the packet payload, given an Ethernet type code for the payload's
333 * protocol.
334 *
335 * Returns non-zero if it can do so, zero if the ethertype is unknown.
336 */
337
338 int
339 ethertype_print(netdissect_options *ndo,
340 u_short ether_type, const u_char *p,
341 u_int length, u_int caplen,
342 const struct lladdr_info *src, const struct lladdr_info *dst)
343 {
344 switch (ether_type) {
345
346 case ETHERTYPE_IP:
347 ip_print(ndo, p, length);
348 return (1);
349
350 case ETHERTYPE_IPV6:
351 ip6_print(ndo, p, length);
352 return (1);
353
354 case ETHERTYPE_ARP:
355 case ETHERTYPE_REVARP:
356 arp_print(ndo, p, length, caplen);
357 return (1);
358
359 case ETHERTYPE_DN:
360 decnet_print(ndo, p, length, caplen);
361 return (1);
362
363 case ETHERTYPE_ATALK:
364 if (ndo->ndo_vflag)
365 ND_PRINT("et1 ");
366 atalk_print(ndo, p, length);
367 return (1);
368
369 case ETHERTYPE_AARP:
370 aarp_print(ndo, p, length);
371 return (1);
372
373 case ETHERTYPE_IPX:
374 ND_PRINT("(NOV-ETHII) ");
375 ipx_print(ndo, p, length);
376 return (1);
377
378 case ETHERTYPE_ISO:
379 if (length == 0 || caplen == 0) {
380 ndo->ndo_protocol = "isoclns";
381 nd_print_trunc(ndo);
382 return (1);
383 }
384 isoclns_print(ndo, p + 1, length - 1);
385 return(1);
386
387 case ETHERTYPE_PPPOED:
388 case ETHERTYPE_PPPOES:
389 case ETHERTYPE_PPPOED2:
390 case ETHERTYPE_PPPOES2:
391 pppoe_print(ndo, p, length);
392 return (1);
393
394 case ETHERTYPE_EAPOL:
395 eap_print(ndo, p, length);
396 return (1);
397
398 case ETHERTYPE_RRCP:
399 rrcp_print(ndo, p, length, src, dst);
400 return (1);
401
402 case ETHERTYPE_PPP:
403 if (length) {
404 ND_PRINT(": ");
405 ppp_print(ndo, p, length);
406 }
407 return (1);
408
409 case ETHERTYPE_MPCP:
410 mpcp_print(ndo, p, length);
411 return (1);
412
413 case ETHERTYPE_SLOW:
414 slow_print(ndo, p, length);
415 return (1);
416
417 case ETHERTYPE_CFM:
418 case ETHERTYPE_CFM_OLD:
419 cfm_print(ndo, p, length);
420 return (1);
421
422 case ETHERTYPE_LLDP:
423 lldp_print(ndo, p, length);
424 return (1);
425
426 case ETHERTYPE_NSH:
427 nsh_print(ndo, p, length);
428 return (1);
429
430 case ETHERTYPE_LOOPBACK:
431 loopback_print(ndo, p, length);
432 return (1);
433
434 case ETHERTYPE_MPLS:
435 case ETHERTYPE_MPLS_MULTI:
436 mpls_print(ndo, p, length);
437 return (1);
438
439 case ETHERTYPE_TIPC:
440 tipc_print(ndo, p, length, caplen);
441 return (1);
442
443 case ETHERTYPE_MS_NLB_HB:
444 msnlb_print(ndo, p);
445 return (1);
446
447 case ETHERTYPE_GEONET_OLD:
448 case ETHERTYPE_GEONET:
449 geonet_print(ndo, p, length, src);
450 return (1);
451
452 case ETHERTYPE_CALM_FAST:
453 calm_fast_print(ndo, p, length, src);
454 return (1);
455
456 case ETHERTYPE_AOE:
457 aoe_print(ndo, p, length);
458 return (1);
459
460 case ETHERTYPE_MEDSA:
461 medsa_print(ndo, p, length, caplen, src, dst);
462 return (1);
463
464 case ETHERTYPE_LAT:
465 case ETHERTYPE_SCA:
466 case ETHERTYPE_MOPRC:
467 case ETHERTYPE_MOPDL:
468 case ETHERTYPE_IEEE1905_1:
469 /* default_print for now */
470 default:
471 return (0);
472 }
473 }