mirror of
https://github.com/the-tcpdump-group/tcpdump.git
synced 2024-11-27 12:03:44 +08:00
f75e3df13d
Print the protocol name early, report an undersized packet as invalid instead of truncated and print fields one at a time as soon as they become available.
143 lines
4.3 KiB
C
143 lines
4.3 KiB
C
/*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code
|
|
* distributions retain the above copyright notice and this paragraph
|
|
* in its entirety, and (2) distributions including binary code include
|
|
* the above copyright notice and this paragraph in its entirety in
|
|
* the documentation or other materials provided with the distribution.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND
|
|
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
|
|
* LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE.
|
|
*
|
|
* Original code by Francesco Fondelli (francesco dot fondelli, gmail dot com)
|
|
*/
|
|
|
|
/* \summary: Autosar SOME/IP Protocol printer */
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include "netdissect-stdinc.h"
|
|
#include "netdissect.h"
|
|
#include "extract.h"
|
|
#include "udp.h"
|
|
|
|
/*
|
|
* SOMEIP Header (R19-11)
|
|
*
|
|
* 0 1 2 3
|
|
* 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Message ID (Service ID/Method ID) |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Length |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Request ID (Client ID/Session ID) |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Protocol Ver | Interface Ver | Message Type | Return Code |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Payload |
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
*/
|
|
|
|
static const struct tok message_type_values[] = {
|
|
{ 0x00, "REQUEST" },
|
|
{ 0x01, "REQUEST_NO_RETURN" },
|
|
{ 0x02, "NOTIFICATION" },
|
|
{ 0x80, "RESPONSE" },
|
|
{ 0x81, "ERROR" },
|
|
{ 0x20, "TP_REQUEST" },
|
|
{ 0x21, "TP_REQUEST_NO_RETURN" },
|
|
{ 0x22, "TP_NOTIFICATION" },
|
|
{ 0xa0, "TP_RESPONSE" },
|
|
{ 0xa1, "TP_ERROR" },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
static const struct tok return_code_values[] = {
|
|
{ 0x00, "E_OK" },
|
|
{ 0x01, "E_NOT_OK" },
|
|
{ 0x02, "E_UNKNOWN_SERVICE" },
|
|
{ 0x03, "E_UNKNOWN_METHOD" },
|
|
{ 0x04, "E_NOT_READY" },
|
|
{ 0x05, "E_NOT_REACHABLE" },
|
|
{ 0x06, "E_TIMEOUT" },
|
|
{ 0x07, "E_WRONG_PROTOCOL_VERSION" },
|
|
{ 0x08, "E_WRONG_INTERFACE_VERSION" },
|
|
{ 0x09, "E_MALFORMED_MESSAGE" },
|
|
{ 0x0a, "E_WRONG_MESSAGE_TYPE" },
|
|
{ 0x0b, "E_E2E_REPEATED" },
|
|
{ 0x0c, "E_E2E_WRONG_SEQUENCE" },
|
|
{ 0x0d, "E_E2E" },
|
|
{ 0x0e, "E_E2E_NOT_AVAILABLE" },
|
|
{ 0x0f, "E_E2E_NO_NEW_DATA" },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
void
|
|
someip_print(netdissect_options *ndo, const u_char *bp, const u_int len)
|
|
{
|
|
uint32_t message_id;
|
|
uint16_t service_id;
|
|
uint16_t method_or_event_id;
|
|
uint8_t event_flag;
|
|
uint32_t message_len;
|
|
uint32_t request_id;
|
|
uint16_t client_id;
|
|
uint16_t session_id;
|
|
uint8_t protocol_version;
|
|
uint8_t interface_version;
|
|
uint8_t message_type;
|
|
uint8_t return_code;
|
|
|
|
ndo->ndo_protocol = "someip";
|
|
nd_print_protocol_caps(ndo);
|
|
|
|
if (len < 16) {
|
|
goto invalid;
|
|
}
|
|
|
|
message_id = GET_BE_U_4(bp);
|
|
service_id = message_id >> 16;
|
|
event_flag = (message_id & 0x00008000) >> 15;
|
|
method_or_event_id = message_id & 0x00007FFF;
|
|
bp += 4;
|
|
ND_PRINT(", service %u, %s %u",
|
|
service_id, event_flag ? "event" : "method", method_or_event_id);
|
|
|
|
message_len = GET_BE_U_4(bp);
|
|
bp += 4;
|
|
ND_PRINT(", len %u", message_len);
|
|
|
|
request_id = GET_BE_U_4(bp);
|
|
client_id = request_id >> 16;
|
|
session_id = request_id & 0x0000FFFF;
|
|
bp += 4;
|
|
ND_PRINT(", client %u, session %u", client_id, session_id);
|
|
|
|
protocol_version = GET_U_1(bp);
|
|
bp += 1;
|
|
ND_PRINT(", pver %u", protocol_version);
|
|
|
|
interface_version = GET_U_1(bp);
|
|
bp += 1;
|
|
ND_PRINT(", iver %u", interface_version);
|
|
|
|
message_type = GET_U_1(bp);
|
|
bp += 1;
|
|
ND_PRINT(", msgtype %s",
|
|
tok2str(message_type_values, "Unknown", message_type));
|
|
|
|
return_code = GET_U_1(bp);
|
|
bp += 1;
|
|
ND_PRINT(", retcode %s\n",
|
|
tok2str(return_code_values, "Unknown", return_code));
|
|
|
|
return;
|
|
|
|
invalid:
|
|
nd_print_invalid(ndo);
|
|
}
|