xref: /aosp_15_r20/external/tcpdump/print-someip.c (revision 05b00f6010a2396e3db2409989fc67270046269f)
1*05b00f60SXin Li /*
2*05b00f60SXin Li  * Redistribution and use in source and binary forms, with or without
3*05b00f60SXin Li  * modification, are permitted provided that: (1) source code
4*05b00f60SXin Li  * distributions retain the above copyright notice and this paragraph
5*05b00f60SXin Li  * in its entirety, and (2) distributions including binary code include
6*05b00f60SXin Li  * the above copyright notice and this paragraph in its entirety in
7*05b00f60SXin Li  * the documentation or other materials provided with the distribution.
8*05b00f60SXin Li  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9*05b00f60SXin Li  * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10*05b00f60SXin Li  * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11*05b00f60SXin Li  * FOR A PARTICULAR PURPOSE.
12*05b00f60SXin Li  *
13*05b00f60SXin Li  * Original code by Francesco Fondelli (francesco dot fondelli, gmail dot com)
14*05b00f60SXin Li  */
15*05b00f60SXin Li 
16*05b00f60SXin Li /* \summary: Autosar SOME/IP Protocol printer */
17*05b00f60SXin Li 
18*05b00f60SXin Li #ifdef HAVE_CONFIG_H
19*05b00f60SXin Li #include <config.h>
20*05b00f60SXin Li #endif
21*05b00f60SXin Li 
22*05b00f60SXin Li #include "netdissect-stdinc.h"
23*05b00f60SXin Li #include "netdissect.h"
24*05b00f60SXin Li #include "extract.h"
25*05b00f60SXin Li #include "udp.h"
26*05b00f60SXin Li 
27*05b00f60SXin Li /*
28*05b00f60SXin Li  * SOMEIP Header (R19-11)
29*05b00f60SXin Li  *
30*05b00f60SXin Li  *     0                   1                   2                   3
31*05b00f60SXin Li  *     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
32*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
33*05b00f60SXin Li  *    |               Message ID (Service ID/Method ID)               |
34*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
35*05b00f60SXin Li  *    |                           Length                              |
36*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
37*05b00f60SXin Li  *    |               Request ID (Client ID/Session ID)               |
38*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39*05b00f60SXin Li  *    | Protocol Ver  | Interface Ver | Message Type  |  Return Code  |
40*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
41*05b00f60SXin Li  *    |                            Payload                            |
42*05b00f60SXin Li  *    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
43*05b00f60SXin Li  */
44*05b00f60SXin Li 
45*05b00f60SXin Li static const struct tok message_type_values[] = {
46*05b00f60SXin Li     { 0x00, "REQUEST" },
47*05b00f60SXin Li     { 0x01, "REQUEST_NO_RETURN" },
48*05b00f60SXin Li     { 0x02, "NOTIFICATION" },
49*05b00f60SXin Li     { 0x80, "RESPONSE" },
50*05b00f60SXin Li     { 0x81, "ERROR" },
51*05b00f60SXin Li     { 0x20, "TP_REQUEST" },
52*05b00f60SXin Li     { 0x21, "TP_REQUEST_NO_RETURN" },
53*05b00f60SXin Li     { 0x22, "TP_NOTIFICATION" },
54*05b00f60SXin Li     { 0xa0, "TP_RESPONSE" },
55*05b00f60SXin Li     { 0xa1, "TP_ERROR" },
56*05b00f60SXin Li     { 0, NULL }
57*05b00f60SXin Li };
58*05b00f60SXin Li 
59*05b00f60SXin Li static const struct tok return_code_values[] = {
60*05b00f60SXin Li     { 0x00, "E_OK" },
61*05b00f60SXin Li     { 0x01, "E_NOT_OK" },
62*05b00f60SXin Li     { 0x02, "E_UNKNOWN_SERVICE" },
63*05b00f60SXin Li     { 0x03, "E_UNKNOWN_METHOD" },
64*05b00f60SXin Li     { 0x04, "E_NOT_READY" },
65*05b00f60SXin Li     { 0x05, "E_NOT_REACHABLE" },
66*05b00f60SXin Li     { 0x06, "E_TIMEOUT" },
67*05b00f60SXin Li     { 0x07, "E_WRONG_PROTOCOL_VERSION" },
68*05b00f60SXin Li     { 0x08, "E_WRONG_INTERFACE_VERSION" },
69*05b00f60SXin Li     { 0x09, "E_MALFORMED_MESSAGE" },
70*05b00f60SXin Li     { 0x0a, "E_WRONG_MESSAGE_TYPE" },
71*05b00f60SXin Li     { 0x0b, "E_E2E_REPEATED" },
72*05b00f60SXin Li     { 0x0c, "E_E2E_WRONG_SEQUENCE" },
73*05b00f60SXin Li     { 0x0d, "E_E2E" },
74*05b00f60SXin Li     { 0x0e, "E_E2E_NOT_AVAILABLE" },
75*05b00f60SXin Li     { 0x0f, "E_E2E_NO_NEW_DATA" },
76*05b00f60SXin Li     { 0, NULL }
77*05b00f60SXin Li };
78*05b00f60SXin Li 
79*05b00f60SXin Li void
someip_print(netdissect_options * ndo,const u_char * bp,const u_int len)80*05b00f60SXin Li someip_print(netdissect_options *ndo, const u_char *bp, const u_int len)
81*05b00f60SXin Li {
82*05b00f60SXin Li     uint32_t message_id;
83*05b00f60SXin Li     uint16_t service_id;
84*05b00f60SXin Li     uint16_t method_or_event_id;
85*05b00f60SXin Li     uint8_t event_flag;
86*05b00f60SXin Li     uint32_t message_len;
87*05b00f60SXin Li     uint32_t request_id;
88*05b00f60SXin Li     uint16_t client_id;
89*05b00f60SXin Li     uint16_t session_id;
90*05b00f60SXin Li     uint8_t protocol_version;
91*05b00f60SXin Li     uint8_t interface_version;
92*05b00f60SXin Li     uint8_t message_type;
93*05b00f60SXin Li     uint8_t return_code;
94*05b00f60SXin Li 
95*05b00f60SXin Li     ndo->ndo_protocol = "someip";
96*05b00f60SXin Li     nd_print_protocol_caps(ndo);
97*05b00f60SXin Li 
98*05b00f60SXin Li     if (len < 16) {
99*05b00f60SXin Li         goto invalid;
100*05b00f60SXin Li     }
101*05b00f60SXin Li 
102*05b00f60SXin Li     message_id = GET_BE_U_4(bp);
103*05b00f60SXin Li     service_id = message_id >> 16;
104*05b00f60SXin Li     event_flag = (message_id & 0x00008000) >> 15;
105*05b00f60SXin Li     method_or_event_id = message_id & 0x00007FFF;
106*05b00f60SXin Li     bp += 4;
107*05b00f60SXin Li     ND_PRINT(", service %u, %s %u",
108*05b00f60SXin Li              service_id, event_flag ? "event" : "method", method_or_event_id);
109*05b00f60SXin Li 
110*05b00f60SXin Li     message_len = GET_BE_U_4(bp);
111*05b00f60SXin Li     bp += 4;
112*05b00f60SXin Li     ND_PRINT(", len %u", message_len);
113*05b00f60SXin Li 
114*05b00f60SXin Li     request_id = GET_BE_U_4(bp);
115*05b00f60SXin Li     client_id = request_id >> 16;
116*05b00f60SXin Li     session_id = request_id & 0x0000FFFF;
117*05b00f60SXin Li     bp += 4;
118*05b00f60SXin Li     ND_PRINT(", client %u, session %u", client_id, session_id);
119*05b00f60SXin Li 
120*05b00f60SXin Li     protocol_version = GET_U_1(bp);
121*05b00f60SXin Li     bp += 1;
122*05b00f60SXin Li     ND_PRINT(", pver %u", protocol_version);
123*05b00f60SXin Li 
124*05b00f60SXin Li     interface_version = GET_U_1(bp);
125*05b00f60SXin Li     bp += 1;
126*05b00f60SXin Li     ND_PRINT(", iver %u", interface_version);
127*05b00f60SXin Li 
128*05b00f60SXin Li     message_type = GET_U_1(bp);
129*05b00f60SXin Li     bp += 1;
130*05b00f60SXin Li     ND_PRINT(", msgtype %s",
131*05b00f60SXin Li              tok2str(message_type_values, "Unknown", message_type));
132*05b00f60SXin Li 
133*05b00f60SXin Li     return_code = GET_U_1(bp);
134*05b00f60SXin Li     bp += 1;
135*05b00f60SXin Li     ND_PRINT(", retcode %s\n",
136*05b00f60SXin Li 	     tok2str(return_code_values, "Unknown", return_code));
137*05b00f60SXin Li 
138*05b00f60SXin Li     return;
139*05b00f60SXin Li 
140*05b00f60SXin Li invalid:
141*05b00f60SXin Li     nd_print_invalid(ndo);
142*05b00f60SXin Li }
143