X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/fb2479d733dbe8a991d11909b319341f7db62ab1..d338a0a1a95d021e9654b4c80ee64fb4d3e40827:/print-ether.c diff --git a/print-ether.c b/print-ether.c index 73947a05..4e0d6f0f 100644 --- a/print-ether.c +++ b/print-ether.c @@ -100,45 +100,50 @@ const struct tok ethertype_values[] = { { ETHERTYPE_GEONET, "GeoNet"}, { ETHERTYPE_CALM_FAST, "CALM FAST"}, { ETHERTYPE_AOE, "AoE" }, - { ETHERTYPE_MEDSA, "MEDSA" }, { 0, NULL} }; -static inline void +static void ether_hdr_print(netdissect_options *ndo, - const u_char *bp, u_int length) + const u_char *bp, u_int length, + u_int hdrlen) { - const struct ether_header *ep; + const struct ether_header *ehp; uint16_t length_type; - ep = (const struct ether_header *)bp; + ehp = (const struct ether_header *)bp; ND_PRINT("%s > %s", - etheraddr_string(ndo, ep->ether_shost), - etheraddr_string(ndo, ep->ether_dhost)); + etheraddr_string(ndo, ehp->ether_shost), + etheraddr_string(ndo, ehp->ether_dhost)); - length_type = EXTRACT_BE_U_2(ep->ether_length_type); - if (!ndo->ndo_qflag) { - if (length_type <= MAX_ETHERNET_LENGTH_VAL) { - ND_PRINT(", 802.3"); - length = length_type; - } else - ND_PRINT(", ethertype %s (0x%04x)", - tok2str(ethertype_values,"Unknown", length_type), - length_type); - } else { - if (length_type <= MAX_ETHERNET_LENGTH_VAL) { - ND_PRINT(", 802.3"); - length = length_type; - } else - ND_PRINT(", %s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", length_type)); - } - - ND_PRINT(", length %u: ", length); + length_type = GET_BE_U_2(bp + (hdrlen - sizeof(ehp->ether_length_type))); + if (length_type <= MAX_ETHERNET_LENGTH_VAL) { + /* + * It's a length field. + */ + ND_PRINT(", 802.3, length %u", length_type); + if (length_type > length - hdrlen) + ND_PRINT(" (too large, > %u)", length - hdrlen); + ND_PRINT(": "); + } else { + /* + * It's a type field. + */ + if (!ndo->ndo_qflag) + ND_PRINT(", ethertype %s (0x%04x), length %u: ", + tok2str(ethertype_values,"Unknown", length_type), + length_type, length); + else + ND_PRINT(", %s, length %u: ", + tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", length_type), + length); + } } /* - * Print an Ethernet frame. + * Print an Ethernet frame while specyfing a non-standard Ethernet header + * length. * This might be encapsulated within another frame; we might be passed * a pointer to a function that can print header information for that * frame's protocol, and an argument to pass to that function. @@ -146,50 +151,73 @@ ether_hdr_print(netdissect_options *ndo, * FIXME: caplen can and should be derived from ndo->ndo_snapend and p. */ u_int -ether_print(netdissect_options *ndo, - const u_char *p, u_int length, u_int caplen, - void (*print_encap_header)(netdissect_options *ndo, const u_char *), const u_char *encap_header_arg) +ether_hdr_len_print(netdissect_options *ndo, + const u_char *p, u_int length, u_int caplen, + void (*print_encap_header)(netdissect_options *ndo, const u_char *), + const u_char *encap_header_arg, u_int hdrlen) { - const struct ether_header *ep; + const struct ether_header *ehp; u_int orig_length; u_short length_type; - u_int hdrlen; int llc_hdrlen; struct lladdr_info src, dst; - if (caplen < ETHER_HDRLEN) { - ND_PRINT("[|ether]"); + /* Unless specified otherwise, assume a standard Ethernet header */ + if (hdrlen == ETHER_HDRLEN) + ndo->ndo_protocol = "ether"; + + if (caplen < hdrlen) { + nd_print_trunc(ndo); return (caplen); } - if (length < ETHER_HDRLEN) { - ND_PRINT("[|ether]"); + if (length < hdrlen) { + nd_print_trunc(ndo); return (length); } + /* If the offset is set, then the upper printer is responsible for + * printing the relevant part of the Ethernet header. + */ if (ndo->ndo_eflag) { if (print_encap_header != NULL) (*print_encap_header)(ndo, encap_header_arg); - ether_hdr_print(ndo, p, length); + ether_hdr_print(ndo, p, length, hdrlen); } + orig_length = length; - length -= ETHER_HDRLEN; - caplen -= ETHER_HDRLEN; - ep = (const struct ether_header *)p; - p += ETHER_HDRLEN; - hdrlen = ETHER_HDRLEN; + length -= hdrlen; + caplen -= hdrlen; + ehp = (const struct ether_header *)p; + p += hdrlen; - src.addr = ep->ether_shost; + src.addr = ehp->ether_shost; src.addr_string = etheraddr_string; - dst.addr = ep->ether_dhost; + dst.addr = ehp->ether_dhost; dst.addr_string = etheraddr_string; - length_type = EXTRACT_BE_U_2(ep->ether_length_type); + length_type = GET_BE_U_2((const u_char *)ehp + (hdrlen - sizeof(ehp->ether_length_type))); recurse: /* * Is it (gag) an 802.3 encapsulation? */ if (length_type <= MAX_ETHERNET_LENGTH_VAL) { + /* + * The length/type field contains the length of the + * remaining payload; use it as such, as long as + * it's not too large (bigger than the actual payload). + */ + if (length_type < length) { + length = length_type; + if (caplen > length) + caplen = length; + } + + /* + * Cut off the snapshot length to the end of the payload. + */ + nd_push_snapend(ndo, p + length); + /* Try to print the LLC-layer header & higher layers */ llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst); if (llc_hdrlen < 0) { @@ -199,31 +227,42 @@ recurse: llc_hdrlen = -llc_hdrlen; } hdrlen += llc_hdrlen; + nd_pop_packet_info(ndo); + return (hdrlen); } else if (length_type == ETHERTYPE_8021Q || - length_type == ETHERTYPE_8021Q9100 || - length_type == ETHERTYPE_8021Q9200 || - length_type == ETHERTYPE_8021QinQ) { + length_type == ETHERTYPE_8021Q9100 || + length_type == ETHERTYPE_8021Q9200 || + length_type == ETHERTYPE_8021QinQ) { /* * Print VLAN information, and then go back and process * the enclosed type field. */ if (caplen < 4) { - ND_PRINT("[|vlan]"); + ndo->ndo_protocol = "vlan"; + nd_print_trunc(ndo); return (hdrlen + caplen); } if (length < 4) { - ND_PRINT("[|vlan]"); + ndo->ndo_protocol = "vlan"; + nd_print_trunc(ndo); return (hdrlen + length); } - if (ndo->ndo_eflag) { - uint16_t tag = EXTRACT_BE_U_2(p); + if (ndo->ndo_eflag) { + uint16_t tag = GET_BE_U_2(p); ND_PRINT("%s, ", ieee8021q_tci_string(tag)); } - length_type = EXTRACT_BE_U_2(p + 2); - if (ndo->ndo_eflag && length_type > MAX_ETHERNET_LENGTH_VAL) - ND_PRINT("ethertype %s, ", tok2str(ethertype_values,"0x%04x", length_type)); + length_type = GET_BE_U_2(p + 2); + if (ndo->ndo_eflag && length_type > MAX_ETHERNET_LENGTH_VAL) { + if (!ndo->ndo_qflag) + ND_PRINT("ethertype %s (0x%04x), ", + tok2str(ethertype_values,"Unknown", length_type), + length_type); + else + ND_PRINT("%s, ", + tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", length_type)); + } p += 4; length -= 4; caplen -= 4; @@ -254,7 +293,8 @@ recurse: if (!ndo->ndo_eflag) { if (print_encap_header != NULL) (*print_encap_header)(ndo, encap_header_arg); - ether_hdr_print(ndo, (const u_char *)ep, orig_length); + ether_hdr_print(ndo, (const u_char *)ehp, orig_length, + hdrlen); } if (!ndo->ndo_suppress_default_print) @@ -264,6 +304,25 @@ recurse: return (hdrlen); } +/* + * Print an Ethernet frame. + * This might be encapsulated within another frame; we might be passed + * a pointer to a function that can print header information for that + * frame's protocol, and an argument to pass to that function. + * + * FIXME: caplen can and should be derived from ndo->ndo_snapend and p. + */ +u_int +ether_print(netdissect_options *ndo, + const u_char *p, u_int length, u_int caplen, + void (*print_encap_header)(netdissect_options *ndo, const u_char *), + const u_char *encap_header_arg) +{ + return (ether_hdr_len_print(ndo, p, length, caplen, + print_encap_header, encap_header_arg, + ETHER_HDRLEN)); +} + /* * This is the top level routine of the printer. 'p' points * to the ether header of the packet, 'h->len' is the length @@ -272,8 +331,9 @@ recurse: */ u_int ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, - const u_char *p) + const u_char *p) { + ndo->ndo_protocol = "ether_if"; return (ether_print(ndo, p, h->len, h->caplen, NULL, NULL)); } @@ -288,13 +348,14 @@ ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, */ u_int netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, - const u_char *p) + const u_char *p) { /* * Fail if we don't have enough data for the Hilscher pseudo-header. */ - if (h->len < 4 || h->caplen < 4) { - ND_PRINT("[|netanalyzer]"); + ndo->ndo_protocol = "netanalyzer_if"; + if (h->caplen < 4) { + nd_print_trunc(ndo); return (h->caplen); } @@ -314,15 +375,16 @@ netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, */ u_int netanalyzer_transparent_if_print(netdissect_options *ndo, - const struct pcap_pkthdr *h, - const u_char *p) + const struct pcap_pkthdr *h, + const u_char *p) { /* * Fail if we don't have enough data for the Hilscher pseudo-header, * preamble, and SOF. */ - if (h->len < 12 || h->caplen < 12) { - ND_PRINT("[|netanalyzer-transparent]"); + ndo->ndo_protocol = "netanalyzer_transparent_if"; + if (h->caplen < 12) { + nd_print_trunc(ndo); return (h->caplen); } @@ -339,14 +401,14 @@ netanalyzer_transparent_if_print(netdissect_options *ndo, int ethertype_print(netdissect_options *ndo, - u_short ether_type, const u_char *p, - u_int length, u_int caplen, - const struct lladdr_info *src, const struct lladdr_info *dst) + u_short ether_type, const u_char *p, + u_int length, u_int caplen, + const struct lladdr_info *src, const struct lladdr_info *dst) { switch (ether_type) { case ETHERTYPE_IP: - ip_print(ndo, p, length); + ip_print(ndo, p, length); return (1); case ETHERTYPE_IPV6: @@ -355,7 +417,7 @@ ethertype_print(netdissect_options *ndo, case ETHERTYPE_ARP: case ETHERTYPE_REVARP: - arp_print(ndo, p, length, caplen); + arp_print(ndo, p, length, caplen); return (1); case ETHERTYPE_DN: @@ -379,7 +441,8 @@ ethertype_print(netdissect_options *ndo, case ETHERTYPE_ISO: if (length == 0 || caplen == 0) { - ND_PRINT(" [|osi]"); + ndo->ndo_protocol = "isoclns"; + nd_print_trunc(ndo); return (1); } isoclns_print(ndo, p + 1, length - 1); @@ -393,11 +456,11 @@ ethertype_print(netdissect_options *ndo, return (1); case ETHERTYPE_EAPOL: - eap_print(ndo, p, length); + eap_print(ndo, p, length); return (1); case ETHERTYPE_RRCP: - rrcp_print(ndo, p, length, src, dst); + rrcp_print(ndo, p, length, src, dst); return (1); case ETHERTYPE_PPP: @@ -408,11 +471,11 @@ ethertype_print(netdissect_options *ndo, return (1); case ETHERTYPE_MPCP: - mpcp_print(ndo, p, length); + mpcp_print(ndo, p, length); return (1); case ETHERTYPE_SLOW: - slow_print(ndo, p, length); + slow_print(ndo, p, length); return (1); case ETHERTYPE_CFM: @@ -424,13 +487,13 @@ ethertype_print(netdissect_options *ndo, lldp_print(ndo, p, length); return (1); - case ETHERTYPE_NSH: - nsh_print(ndo, p, length); - return (1); + case ETHERTYPE_NSH: + nsh_print(ndo, p, length); + return (1); - case ETHERTYPE_LOOPBACK: + case ETHERTYPE_LOOPBACK: loopback_print(ndo, p, length); - return (1); + return (1); case ETHERTYPE_MPLS: case ETHERTYPE_MPLS_MULTI: @@ -445,23 +508,19 @@ ethertype_print(netdissect_options *ndo, msnlb_print(ndo, p); return (1); - case ETHERTYPE_GEONET_OLD: - case ETHERTYPE_GEONET: - geonet_print(ndo, p, length, src); - return (1); + case ETHERTYPE_GEONET_OLD: + case ETHERTYPE_GEONET: + geonet_print(ndo, p, length, src); + return (1); - case ETHERTYPE_CALM_FAST: - calm_fast_print(ndo, p, length, src); - return (1); + case ETHERTYPE_CALM_FAST: + calm_fast_print(ndo, p, length, src); + return (1); case ETHERTYPE_AOE: aoe_print(ndo, p, length); return (1); - case ETHERTYPE_MEDSA: - medsa_print(ndo, p, length, caplen, src, dst); - return (1); - case ETHERTYPE_LAT: case ETHERTYPE_SCA: case ETHERTYPE_MOPRC: @@ -472,12 +531,3 @@ ethertype_print(netdissect_options *ndo, return (0); } } - - -/* - * Local Variables: - * c-style: whitesmith - * c-basic-offset: 8 - * End: - */ -