You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1893 lines
70 KiB
1893 lines
70 KiB
diff --git a/epan/dissectors/CMakeLists.txt b/epan/dissectors/CMakeLists.txt |
|
index 11d2c89cd0..3c313d2c5e 100644 |
|
--- a/epan/dissectors/CMakeLists.txt |
|
+++ b/epan/dissectors/CMakeLists.txt |
|
@@ -1745,7 +1745,7 @@ set(DISSECTOR_SRC |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-smb-direct.c |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-smb.c |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-smb2.c |
|
- ${CMAKE_CURRENT_SOURCE_DIR}/packet-smcr.c |
|
+ ${CMAKE_CURRENT_SOURCE_DIR}/packet-smc.c |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-sml.c |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-smp.c |
|
${CMAKE_CURRENT_SOURCE_DIR}/packet-smpp.c |
|
diff --git a/epan/dissectors/packet-smcr.c b/epan/dissectors/packet-smc.c |
|
similarity index 56% |
|
rename from epan/dissectors/packet-smcr.c |
|
rename to epan/dissectors/packet-smc.c |
|
index 7096d1b0b0..bbfa9c07ef 100644 |
|
--- a/epan/dissectors/packet-smcr.c |
|
+++ b/epan/dissectors/packet-smc.c |
|
@@ -1,7 +1,8 @@ |
|
-/* packet-smcr.c |
|
- * SMC-R dissector for wireshark |
|
+/* packet-smc.c |
|
+ * SMC dissector for wireshark |
|
* By Joe Fowler <fowlerja@us.ibm.com> |
|
- * (c) Copyright IBM Corporation 2014 |
|
+ * By Guvenc Gulce <guvenc@linux.ibm.com> |
|
+ * (c) Copyright IBM Corporation 2014,2020 |
|
* LICENSE: GNU General Public License, version 2, or (at your option) any |
|
* version. http://opensource.org/licenses/gpl-2.0.php |
|
* |
|
@@ -13,6 +14,7 @@ |
|
* |
|
* Please refer to the following specs for protocol: |
|
* - ietf - draft-fox-tcpm-shared-memory-rdma-05 |
|
+ * - https://www.ibm.com/support/pages/node/6326337 |
|
*/ |
|
|
|
#include "config.h" |
|
@@ -20,25 +22,33 @@ |
|
#include <epan/packet.h> |
|
|
|
#include "packet-tcp.h" |
|
+#include <stdbool.h> |
|
|
|
-#define SMCR_TCP_MIN_HEADER_LENGTH 7 |
|
-#define CLC_MSG_START_OFFSET 7 |
|
+#define SMC_TCP_MIN_HEADER_LENGTH 7 |
|
+#define CLC_MSG_START_OFFSET 5 |
|
#define LLC_MSG_START_OFFSET 3 |
|
#define RMBE_CTRL_START_OFFSET 2 |
|
#define MAC_ADDR_LEN 6 |
|
+#define SMC_V2 2 |
|
#define GID_LEN 16 |
|
#define PEERID_LEN 8 |
|
+#define DIAG_INFO_LEN 4 |
|
+#define EID_LEN 32 |
|
+#define ISM_GID_LEN 8 |
|
+#define ISM_CHID_LEN 2 |
|
#define IPV4_SUBNET_MASK_LEN 4 |
|
-#define IPV6_PREFIX_LEN 4 |
|
+#define IPV6_PREFIX_LEN 16 |
|
#define ONE_BYTE_RESERVED 1 |
|
#define TWO_BYTE_RESERVED 2 |
|
#define QP_LEN 3 |
|
#define RKEY_LEN 4 |
|
#define VIRTUAL_ADDR_LEN 8 |
|
#define FLAG_BYTE_LEN 1 |
|
+#define LENGTH_BYTE_LEN 2 |
|
#define SEQNO_LEN 2 |
|
#define CURSOR_LEN 4 |
|
#define ALERT_TOKEN_LEN 4 |
|
+#define DMB_TOKEN_LEN 8 |
|
#define PSN_LEN 3 |
|
#define CONN_INDEX_LEN 1 |
|
#define SMCR_MSG_BYTE_0 0 |
|
@@ -52,6 +62,7 @@ |
|
#define LLC_CMD_RSP_OFFSET 3 |
|
#define ACCEPT_CONFIRM_QP_OFFSET 38 |
|
#define SMCR_CLC_ID 0xe2d4c3d9 /*EBCDIC 'SMCR' */ |
|
+#define SMCD_CLC_ID 0xe2d4c3c4 /*EBCDIC 'SMCD' */ |
|
#define SMC_CLC_V1 0x10 |
|
#define SMC_CLC_SMC_R 0x01 |
|
|
|
@@ -66,6 +77,52 @@ typedef enum { |
|
SMC_CLC_DECLINE = 4 |
|
} clc_message; |
|
|
|
+typedef enum { |
|
+ SMC_CLC_SMCR = 0, |
|
+ SMC_CLC_SMCD = 1, |
|
+ SMC_CLC_NONE = 2, |
|
+ SMC_CLC_BOTH = 3, |
|
+} clc_type_message; |
|
+ |
|
+typedef enum { |
|
+ SMC_CLC_OS_ZOS = 1, |
|
+ SMC_CLC_OS_LINUX = 2, |
|
+ SMC_CLC_OS_AIX = 3, |
|
+ SMC_CLC_OS_UNKOWN = 15, |
|
+} clc_os_message; |
|
+ |
|
+static const value_string smc_clc_os_message_txt[] = { |
|
+ { SMC_CLC_OS_ZOS, "z/OS" }, |
|
+ { SMC_CLC_OS_LINUX, "Linux" }, |
|
+ { SMC_CLC_OS_AIX, "AIX" }, |
|
+ { SMC_CLC_OS_UNKOWN, "Unknown" }, |
|
+ { 0, NULL } |
|
+}; |
|
+ |
|
+static const value_string smc_clc_type_message_txt[] = { |
|
+ { SMC_CLC_SMCR, "SMC-R" }, |
|
+ { SMC_CLC_SMCD, "SMC-D" }, |
|
+ { SMC_CLC_NONE, "NONE" }, |
|
+ { SMC_CLC_BOTH, "SMC-R/SMC-D" }, |
|
+ { 0, NULL } |
|
+}; |
|
+ |
|
+ |
|
+static const value_string smcv2_clc_col_info_message_txt[] = { |
|
+ { SMC_CLC_SMCR, "[SMC-R-Proposal]" }, |
|
+ { SMC_CLC_SMCD, "[SMC-Dv2-Proposal]" }, |
|
+ { SMC_CLC_NONE, "[NONE]" }, |
|
+ { SMC_CLC_BOTH, "[SMC-Dv2/SMC-R-Proposal]" }, |
|
+ { 0, NULL } |
|
+}; |
|
+ |
|
+static const value_string smc_clc_col_info_message_txt[] = { |
|
+ { SMC_CLC_SMCR, "[SMC-R-Proposal]" }, |
|
+ { SMC_CLC_SMCD, "[SMC-D-Proposal]" }, |
|
+ { SMC_CLC_NONE, "[NONE]" }, |
|
+ { SMC_CLC_BOTH, "[SMC-D/SMC-R-Proposal]" }, |
|
+ { 0, NULL } |
|
+}; |
|
|
|
static const value_string smcr_clc_message_txt[] = { |
|
{ SMC_CLC_PROPOSAL, "Proposal" }, |
|
@@ -104,22 +161,35 @@ static const value_string smcr_llc_message_txt[] = { |
|
{ 0, NULL } |
|
}; |
|
|
|
-static int proto_smcr = -1; |
|
+static int proto_smc = -1; |
|
static int ett_smcr = -1; |
|
static int hf_smcr_clc_msg = -1; |
|
static int hf_smcr_llc_msg = -1; |
|
|
|
-/* SMC-R Proposal */ |
|
+/* SMC Proposal for both SMC-D and SMC-R */ |
|
static int ett_proposal_flag = -1; |
|
+static int ett_proposal_ext_flag2 = -1; |
|
+static int hf_proposal_smc_version_release_number = -1; |
|
+static int hf_proposal_smc_version_seid = -1; |
|
static int hf_proposal_smc_version = -1; |
|
-static int hf_smcr_proposal_flags = -1; |
|
-static int hf_smcr_proposal_client_peer_id = -1; |
|
-static int hf_smcr_proposal_client_preferred_gid = -1; |
|
-static int hf_smcr_proposal_client_preferred_mac = -1; |
|
-static int hf_smcr_proposal_outgoing_interface_subnet_mask = -1; |
|
-static int hf_smcr_proposal_outgoing_subnet_mask_signifcant_bits = -1; |
|
-static int hf_smcr_proposal_ipv6_prefix = -1; |
|
-static int hf_smcr_proposal_ipv6_prefix_length = -1; |
|
+static int hf_proposal_smc_type = -1; |
|
+static int hf_proposal_smc_v2_type = -1; |
|
+static int hf_smc_length = -1; |
|
+static int hf_smc_proposal_smc_chid = -1; |
|
+static int hf_smc_proposal_flags = -1; |
|
+static int hf_smc_proposal_eid = -1; |
|
+static int hf_smc_proposal_system_eid = -1; |
|
+static int hf_smc_proposal_ext_flags = -1; |
|
+static int hf_smc_proposal_client_peer_id = -1; |
|
+static int hf_smc_proposal_ism_gid = -1; |
|
+static int hf_smc_proposal_client_preferred_gid = -1; |
|
+static int hf_smc_proposal_client_preferred_mac = -1; |
|
+static int hf_smc_proposal_outgoing_interface_subnet_mask = -1; |
|
+static int hf_smc_proposal_rocev2_gid_ipv4_addr = -1; |
|
+static int hf_smc_proposal_rocev2_gid_ipv6_addr = -1; |
|
+static int hf_smc_proposal_outgoing_subnet_mask_signifcant_bits = -1; |
|
+static int hf_smc_proposal_ipv6_prefix = -1; |
|
+static int hf_smc_proposal_ipv6_prefix_length = -1; |
|
|
|
/* SMC-R Accept */ |
|
static int ett_accept_flag = -1; |
|
@@ -158,10 +228,57 @@ static int hf_confirm_smc_version = -1; |
|
static int hf_confirm_rmb_buffer_size = -1; |
|
static int hf_confirm_qp_mtu_value = -1; |
|
|
|
+/* SMC-D Accept */ |
|
+static int hf_accept_smc_type = -1; |
|
+static int ett_smcd_accept_flag = -1; |
|
+static int ett_smcd_accept_fce_flag = -1; |
|
+static int ett_smcd_accept_flag2 = -1; |
|
+static int hf_smcd_accept_smc_version = -1; |
|
+static int hf_accept_os_type = -1; |
|
+static int hf_accept_smc_version_release_number = -1; |
|
+static int hf_smcd_accept_first_contact = -1; |
|
+static int hf_accept_dmb_buffer_size = -1; |
|
+static int hf_smcd_accept_flags = -1; |
|
+static int hf_smcd_accept_fce_flags = -1; |
|
+static int hf_smcd_accept_flags2 = -1; |
|
+static int hf_smcd_accept_server_peer_id = -1; |
|
+static int hf_smcd_accept_dmbe_conn_index = -1; |
|
+static int hf_smcd_accept_dmb_token = -1; |
|
+static int hf_smcd_accept_server_link_id = -1; |
|
+static int hf_smcd_accept_smc_chid = -1; |
|
+static int hf_smcd_accept_eid = -1; |
|
+static int hf_smcd_accept_peer_name = -1; |
|
+ |
|
+/* SMC-D Confirm */ |
|
+static int hf_confirm_smc_type = -1; |
|
+static int ett_smcd_confirm_flag = -1; |
|
+static int ett_smcd_confirm_fce_flag = -1; |
|
+static int ett_smcd_confirm_flag2 = -1; |
|
+static int hf_smcd_confirm_smc_version = -1; |
|
+static int hf_confirm_os_type = -1; |
|
+static int hf_smcd_confirm_flags = -1; |
|
+static int hf_smcd_confirm_flags2 = -1; |
|
+static int hf_smcd_confirm_first_contact = -1; |
|
+static int hf_smcd_confirm_client_peer_id = -1; |
|
+static int hf_smcd_confirm_dmb_token = -1; |
|
+static int hf_smcd_confirm_dmbe_conn_index = -1; |
|
+static int hf_smcd_confirm_client_link_id = -1; |
|
+static int hf_confirm_smc_version_release_number = -1; |
|
+static int hf_smcd_confirm_dmb_buffer_size = -1; |
|
+static int hf_smcd_confirm_smc_chid = -1; |
|
+static int hf_smcd_confirm_eid = -1; |
|
+static int hf_smcd_confirm_peer_name = -1; |
|
+ |
|
/* SMC-R Decline */ |
|
-static int hf_smcr_decline_flags = -1; |
|
-static int hf_smcr_decline_peer_id = -1; |
|
-static int hf_smcr_decline_diag_info = -1; |
|
+static int ett_decline_flag = -1; |
|
+static int ett_decline_flag2 = -1; |
|
+static int hf_smc_decline_flags = -1; |
|
+static int hf_smc_decline_flags2 = -1; |
|
+static int hf_smc_decline_peer_id = -1; |
|
+static int hf_smc_decline_diag_info = -1; |
|
+static int hf_decline_os_type = -1; |
|
+static int hf_decline_smc_version = -1; |
|
+static int hf_decline_out_of_sync = -1; |
|
|
|
/* SMC-R Confirm Link*/ |
|
static int ett_confirm_link_flag = -1; |
|
@@ -256,55 +373,300 @@ static int hf_smcr_rmbe_ctrl_peer_abnormal_close = -1; |
|
|
|
void proto_register_smcr(void); |
|
void proto_reg_handoff_smcr(void); |
|
-static dissector_handle_t smcr_tcp_handle; |
|
+static dissector_handle_t smc_tcp_handle; |
|
|
|
static void |
|
-disect_smcr_proposal(tvbuff_t *tvb, proto_tree *tree) |
|
+disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
{ |
|
- guint offset; |
|
- guint16 mask_offset; |
|
- guint8 ipv6_prefix_count; |
|
+ guint offset, suboffset; |
|
+ guint16 mask_offset, v2_ext_offset; |
|
+ guint16 v2_ext_pos = 0, smcd_v2_ext_offset = 0; |
|
+ guint16 smcd_v2_ext_pos = 0; |
|
+ guint8 ipv6_prefix_count, smc_version; |
|
+ guint8 smc_type, num_of_gids = 0, num_of_eids = 0; |
|
+ guint8 smc_type_v1 = 0, smc_type_v2 = 0; |
|
+ bool is_smc_v2, is_smcdv1, is_smcdv2; |
|
proto_item *proposal_flag_item; |
|
proto_tree *proposal_flag_tree; |
|
|
|
+ |
|
offset = CLC_MSG_START_OFFSET; |
|
- proposal_flag_item = proto_tree_add_item(tree, hf_smcr_proposal_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ proposal_flag_item = proto_tree_add_item(tree, hf_smc_proposal_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
proposal_flag_tree = proto_item_add_subtree(proposal_flag_item, ett_proposal_flag); |
|
proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_version, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ smc_version = tvb_get_guint8(tvb, offset); |
|
+ smc_type = tvb_get_guint8(tvb, offset); |
|
+ smc_version = ((smc_version >> 4) & 0x0F); |
|
+ is_smc_v2 = (smc_version >= SMC_V2); |
|
+ smc_type_v2 = ((smc_type >> 2) & 0x03); |
|
+ smc_type_v1 = (smc_type & 0x03); |
|
+ is_smcdv1 = ((smc_type_v1 == SMC_CLC_SMCD) || (smc_type_v1 == SMC_CLC_BOTH)); |
|
+ is_smcdv2 = ((smc_type_v2 == SMC_CLC_SMCD) || (smc_type_v2 == SMC_CLC_BOTH)); |
|
+ |
|
+ if (is_smc_v2) |
|
+ proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_v2_type, tvb, |
|
+ offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ |
|
+ proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_type, tvb, |
|
+ offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ |
|
offset += FLAG_BYTE_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_client_peer_id, tvb, offset, |
|
+ proto_tree_add_item(tree, hf_smc_proposal_client_peer_id, tvb, offset, |
|
PEERID_LEN, ENC_BIG_ENDIAN); |
|
offset += PEERID_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_client_preferred_gid, tvb, |
|
+ proto_tree_add_item(tree, hf_smc_proposal_client_preferred_gid, tvb, |
|
offset, GID_LEN, ENC_NA); |
|
offset += GID_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_client_preferred_mac, tvb, |
|
+ proto_tree_add_item(tree, hf_smc_proposal_client_preferred_mac, tvb, |
|
offset, MAC_ADDR_LEN, ENC_NA); |
|
offset += MAC_ADDR_LEN; |
|
mask_offset = tvb_get_ntohs(tvb, offset); |
|
- offset += 2 + mask_offset; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_outgoing_interface_subnet_mask, tvb, |
|
- offset, IPV4_SUBNET_MASK_LEN, ENC_BIG_ENDIAN); |
|
+ |
|
+ if (mask_offset != 0) { |
|
+ suboffset = offset; |
|
+ suboffset += TWO_BYTE_RESERVED; |
|
+ if (is_smcdv1 || is_smcdv2) { |
|
+ proto_tree_add_item(tree, hf_smc_proposal_ism_gid, tvb, |
|
+ suboffset, ISM_GID_LEN, ENC_NA); |
|
+ } |
|
+ suboffset += ISM_GID_LEN; |
|
+ if (is_smc_v2) { |
|
+ if (is_smcdv2) { |
|
+ proto_tree_add_item(tree, hf_smc_proposal_smc_chid, tvb, suboffset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ } |
|
+ suboffset += LENGTH_BYTE_LEN; |
|
+ v2_ext_offset = tvb_get_ntohs(tvb, suboffset); |
|
+ v2_ext_pos = suboffset + TWO_BYTE_RESERVED + v2_ext_offset; |
|
+ } |
|
+ } |
|
+ offset += TWO_BYTE_RESERVED + mask_offset; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smc_proposal_outgoing_interface_subnet_mask, tvb, |
|
+ offset, IPV4_SUBNET_MASK_LEN, ENC_BIG_ENDIAN); |
|
offset += IPV4_SUBNET_MASK_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_outgoing_subnet_mask_signifcant_bits, tvb, |
|
- offset, 1, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(tree, hf_smc_proposal_outgoing_subnet_mask_signifcant_bits, tvb, |
|
+ offset, 1, ENC_BIG_ENDIAN); |
|
offset += 1; |
|
/* Bump past reserved bytes */ |
|
offset += TWO_BYTE_RESERVED; |
|
ipv6_prefix_count = tvb_get_guint8(tvb, offset); |
|
- offset += 2; |
|
+ offset += 1; |
|
|
|
while (ipv6_prefix_count != 0) { |
|
- proto_tree_add_item(tree, hf_smcr_proposal_ipv6_prefix, tvb, |
|
+ proto_tree_add_item(tree, hf_smc_proposal_ipv6_prefix, tvb, |
|
offset, IPV6_PREFIX_LEN, ENC_NA); |
|
offset += IPV6_PREFIX_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_proposal_ipv6_prefix_length, tvb, |
|
+ proto_tree_add_item(tree, hf_smc_proposal_ipv6_prefix_length, tvb, |
|
offset, 1, ENC_BIG_ENDIAN); |
|
offset += 1; |
|
ipv6_prefix_count--; |
|
} |
|
+ |
|
+ if (v2_ext_pos >= offset) { |
|
+ offset = v2_ext_pos; |
|
+ num_of_eids = tvb_get_guint8(tvb, offset); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ num_of_gids = tvb_get_guint8(tvb, offset); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ /*Skip reserved flag 1*/ |
|
+ offset += 1; |
|
+ proposal_flag_item = proto_tree_add_item(tree, hf_smc_proposal_ext_flags, tvb, |
|
+ offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proposal_flag_tree = proto_item_add_subtree(proposal_flag_item, ett_proposal_ext_flag2); |
|
+ proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_version_release_number, |
|
+ tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_version_seid, tvb, |
|
+ offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ /*Skip not used 2 bytes*/ |
|
+ offset += 2; |
|
+ smcd_v2_ext_offset = tvb_get_ntohs(tvb, offset); |
|
+ offset += 2; |
|
+ smcd_v2_ext_pos = offset + smcd_v2_ext_offset; |
|
+ |
|
+ if (is_ipv6) { |
|
+ proto_tree_add_item(tree, hf_smc_proposal_rocev2_gid_ipv6_addr, tvb, |
|
+ offset, GID_LEN, ENC_NA); |
|
+ offset += GID_LEN; |
|
+ } |
|
+ else { |
|
+ offset += 12; |
|
+ proto_tree_add_item(tree, hf_smc_proposal_rocev2_gid_ipv4_addr, tvb, |
|
+ offset, IPV4_SUBNET_MASK_LEN, ENC_BIG_ENDIAN); |
|
+ offset += IPV4_SUBNET_MASK_LEN; |
|
+ } |
|
+ /*Skip reserved 16 bytes*/ |
|
+ offset += 16; |
|
+ while (num_of_eids != 0) { |
|
+ proto_tree_add_item(tree, hf_smc_proposal_eid, tvb, |
|
+ offset, EID_LEN, ENC_ASCII | ENC_NA); |
|
+ offset += EID_LEN; |
|
+ num_of_eids--; |
|
+ } |
|
+ if (smcd_v2_ext_pos >= offset) { |
|
+ offset = smcd_v2_ext_pos; |
|
+ proto_tree_add_item(tree, hf_smc_proposal_system_eid, tvb, |
|
+ offset, EID_LEN, ENC_ASCII | ENC_NA); |
|
+ offset += EID_LEN; |
|
+ /*Skip reserved 16 bytes*/ |
|
+ offset += 16; |
|
+ while (num_of_gids != 0) { |
|
+ proto_tree_add_item(tree, hf_smc_proposal_ism_gid, tvb, |
|
+ offset, ISM_GID_LEN, ENC_NA); |
|
+ offset += ISM_GID_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_proposal_smc_chid, tvb, offset, |
|
+ ISM_CHID_LEN, ENC_BIG_ENDIAN); |
|
+ offset += ISM_CHID_LEN; |
|
+ num_of_gids--; |
|
+ } |
|
+ } |
|
+ |
|
+ } |
|
+} |
|
+ |
|
+static void |
|
+disect_smcd_accept(tvbuff_t* tvb, proto_tree* tree) |
|
+{ |
|
+ guint offset; |
|
+ proto_item* accept_flag_item; |
|
+ proto_tree* accept_flag_tree; |
|
+ proto_item* accept_flag2_item; |
|
+ proto_tree* accept_flag2_tree; |
|
+ guint8 smc_version, first_contact = 0; |
|
+ |
|
+ offset = CLC_MSG_START_OFFSET; |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ accept_flag_item = proto_tree_add_item(tree, hf_smcd_accept_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ accept_flag_tree = proto_item_add_subtree(accept_flag_item, ett_smcd_accept_flag); |
|
+ proto_tree_add_item(accept_flag_tree, hf_smcd_accept_smc_version, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(accept_flag_tree, hf_smcd_accept_first_contact, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(accept_flag_tree, hf_accept_smc_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ smc_version = tvb_get_guint8(tvb, offset); |
|
+ first_contact = tvb_get_guint8(tvb, offset); |
|
+ smc_version = ((smc_version >> 4) & 0x0F); |
|
+ first_contact = ((first_contact >> 3) & 0x01); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smcd_accept_server_peer_id, tvb, offset, |
|
+ PEERID_LEN, ENC_BIG_ENDIAN); |
|
+ offset += PEERID_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_accept_dmb_token, tvb, |
|
+ offset, DMB_TOKEN_LEN, ENC_NA); |
|
+ offset += DMB_TOKEN_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_accept_dmbe_conn_index, tvb, |
|
+ offset, CONN_INDEX_LEN, ENC_BIG_ENDIAN); |
|
+ offset += CONN_INDEX_LEN; |
|
+ |
|
+ accept_flag2_item = proto_tree_add_item(tree, hf_smcd_accept_flags2, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ accept_flag2_tree = proto_item_add_subtree(accept_flag2_item, ett_smcd_accept_flag2); |
|
+ proto_tree_add_item(accept_flag2_tree, hf_accept_dmb_buffer_size, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ offset += TWO_BYTE_RESERVED; |
|
+ proto_tree_add_item(tree, hf_smcd_accept_server_link_id, tvb, |
|
+ offset, ALERT_TOKEN_LEN, ENC_BIG_ENDIAN); |
|
+ offset += ALERT_TOKEN_LEN; |
|
+ |
|
+ if (smc_version >= SMC_V2) { |
|
+ proto_tree_add_item(tree, hf_smcd_accept_smc_chid, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_accept_eid, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
+ offset += 32; |
|
+ /* Reserved bytes */ |
|
+ offset += 8; |
|
+ |
|
+ if (first_contact) { |
|
+ offset += ONE_BYTE_RESERVED; |
|
+ accept_flag_item = proto_tree_add_item(tree, hf_smcd_accept_fce_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ accept_flag_tree = proto_item_add_subtree(accept_flag_item, ett_smcd_accept_fce_flag); |
|
+ proto_tree_add_item(accept_flag_tree, hf_accept_os_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(accept_flag_tree, hf_accept_smc_version_release_number, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ offset += TWO_BYTE_RESERVED; |
|
+ proto_tree_add_item(tree, hf_smcd_accept_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
+ offset += 32; |
|
+ } |
|
+ } |
|
+} |
|
+ |
|
+static void |
|
+disect_smcd_confirm(tvbuff_t* tvb, proto_tree* tree) |
|
+{ |
|
+ guint offset; |
|
+ proto_item* confirm_flag_item; |
|
+ proto_tree* confirm_flag_tree; |
|
+ proto_item* confirm_flag2_item; |
|
+ proto_tree* confirm_flag2_tree; |
|
+ guint8 smc_version, first_contact = 0; |
|
+ |
|
+ offset = CLC_MSG_START_OFFSET; |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ confirm_flag_item = proto_tree_add_item(tree, hf_smcd_confirm_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ confirm_flag_tree = proto_item_add_subtree(confirm_flag_item, ett_smcd_confirm_flag); |
|
+ proto_tree_add_item(confirm_flag_tree, hf_smcd_confirm_smc_version, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(confirm_flag_tree, hf_smcd_confirm_first_contact, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(confirm_flag_tree, hf_confirm_smc_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ smc_version = tvb_get_guint8(tvb, offset); |
|
+ first_contact = tvb_get_guint8(tvb, offset); |
|
+ smc_version = ((smc_version >> 4) & 0x0F); |
|
+ first_contact = ((first_contact >> 3) & 0x01); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_client_peer_id, tvb, offset, |
|
+ PEERID_LEN, ENC_BIG_ENDIAN); |
|
+ offset += PEERID_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_dmb_token, tvb, |
|
+ offset, DMB_TOKEN_LEN, ENC_NA); |
|
+ offset += DMB_TOKEN_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_dmbe_conn_index, tvb, |
|
+ offset, CONN_INDEX_LEN, ENC_BIG_ENDIAN); |
|
+ offset += CONN_INDEX_LEN; |
|
+ |
|
+ confirm_flag2_item = proto_tree_add_item(tree, hf_smcd_confirm_flags2, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ confirm_flag2_tree = proto_item_add_subtree(confirm_flag2_item, ett_smcd_confirm_flag2); |
|
+ proto_tree_add_item(confirm_flag2_tree, hf_smcd_confirm_dmb_buffer_size, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ offset += TWO_BYTE_RESERVED; |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_client_link_id, tvb, |
|
+ offset, ALERT_TOKEN_LEN, ENC_BIG_ENDIAN); |
|
+ offset += ALERT_TOKEN_LEN; |
|
+ |
|
+ if (smc_version >= SMC_V2) { |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_smc_chid, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_eid, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
+ offset += 32; |
|
+ /* Reserved bytes */ |
|
+ offset += 8; |
|
+ |
|
+ if (first_contact) { |
|
+ offset += ONE_BYTE_RESERVED; |
|
+ confirm_flag_item = proto_tree_add_item(tree, hf_smcd_accept_fce_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ confirm_flag_tree = proto_item_add_subtree(confirm_flag_item, ett_smcd_confirm_fce_flag); |
|
+ proto_tree_add_item(confirm_flag_tree, hf_confirm_os_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(confirm_flag_tree, hf_confirm_smc_version_release_number, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += FLAG_BYTE_LEN; |
|
+ offset += TWO_BYTE_RESERVED; |
|
+ proto_tree_add_item(tree, hf_smcd_confirm_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
+ offset += 32; |
|
+ } |
|
+ } |
|
} |
|
|
|
+ |
|
static void |
|
disect_smcr_accept(tvbuff_t *tvb, proto_tree *tree) |
|
{ |
|
@@ -315,6 +677,9 @@ disect_smcr_accept(tvbuff_t *tvb, proto_tree *tree) |
|
proto_tree *accept_flag2_tree; |
|
|
|
offset = CLC_MSG_START_OFFSET; |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
accept_flag_item = proto_tree_add_item(tree, hf_smcr_accept_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
accept_flag_tree = proto_item_add_subtree(accept_flag_item, ett_accept_flag); |
|
proto_tree_add_item(accept_flag_tree, hf_accept_smc_version, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
@@ -367,6 +732,9 @@ disect_smcr_confirm(tvbuff_t *tvb, proto_tree *tree) |
|
proto_tree *confirm_flag2_tree; |
|
|
|
offset = CLC_MSG_START_OFFSET; |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
confirm_flag_item = proto_tree_add_item(tree, hf_smcr_confirm_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
confirm_flag_tree = proto_item_add_subtree(confirm_flag_item, ett_confirm_flag); |
|
proto_tree_add_item(confirm_flag_tree, hf_confirm_smc_version, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
@@ -411,17 +779,41 @@ disect_smcr_confirm(tvbuff_t *tvb, proto_tree *tree) |
|
static void |
|
disect_smcr_decline(tvbuff_t *tvb, proto_tree *tree) |
|
{ |
|
- guint offset; |
|
+ proto_item* decline_flag_item; |
|
+ proto_tree* decline_flag_tree; |
|
+ proto_item* decline_flag2_item; |
|
+ proto_tree* decline_flag2_tree; |
|
+ guint offset, smc_version; |
|
|
|
offset = CLC_MSG_START_OFFSET; |
|
- proto_tree_add_item(tree, hf_smcr_decline_flags, tvb, offset, |
|
+ proto_tree_add_item(tree, hf_smc_length, tvb, offset, |
|
+ LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ offset += LENGTH_BYTE_LEN; |
|
+ |
|
+ decline_flag_item = proto_tree_add_item(tree, hf_smc_decline_flags, tvb, offset, |
|
+ FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ decline_flag_tree = proto_item_add_subtree(decline_flag_item, ett_decline_flag); |
|
+ proto_tree_add_item(decline_flag_tree, hf_decline_smc_version, tvb, offset, |
|
+ FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(decline_flag_tree, hf_decline_out_of_sync, tvb, offset, |
|
FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ smc_version = tvb_get_guint8(tvb, offset); |
|
+ smc_version = ((smc_version >> 4) & 0x0F); |
|
+ |
|
offset += FLAG_BYTE_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_decline_peer_id, tvb, offset, |
|
+ proto_tree_add_item(tree, hf_smc_decline_peer_id, tvb, offset, |
|
PEERID_LEN, ENC_BIG_ENDIAN); |
|
offset += PEERID_LEN; |
|
- proto_tree_add_item(tree, hf_smcr_decline_diag_info, tvb, offset, |
|
- 4, ENC_BIG_ENDIAN); |
|
+ proto_tree_add_item(tree, hf_smc_decline_diag_info, tvb, offset, |
|
+ DIAG_INFO_LEN, ENC_BIG_ENDIAN); |
|
+ offset += DIAG_INFO_LEN; |
|
+ if (smc_version >= SMC_V2) { |
|
+ decline_flag2_item = proto_tree_add_item(tree, hf_smc_decline_flags2, tvb, offset, |
|
+ FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ decline_flag2_tree = proto_item_add_subtree(decline_flag2_item, ett_decline_flag2); |
|
+ proto_tree_add_item(decline_flag2_tree, hf_decline_os_type, tvb, offset, |
|
+ FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
+ } |
|
} |
|
|
|
static void |
|
@@ -730,50 +1122,126 @@ disect_smcr_rmbe_ctrl(tvbuff_t *tvb, proto_tree *tree) |
|
tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
} |
|
|
|
+static guint8 get_mixed_type(guint8 v1_type, guint8 v2_type) |
|
+{ |
|
+ if (v1_type == SMC_CLC_BOTH) |
|
+ return v1_type; |
|
+ |
|
+ if (v1_type == SMC_CLC_NONE) |
|
+ return v2_type; |
|
+ |
|
+ if (((v2_type == SMC_CLC_SMCD) && (v1_type == SMC_CLC_SMCR)) || |
|
+ ((v2_type == SMC_CLC_SMCR) && (v1_type == SMC_CLC_SMCD))) |
|
+ return SMC_CLC_BOTH; |
|
+ |
|
+ return v2_type; |
|
+} |
|
+ |
|
static int |
|
-dissect_smcr_tcp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
+dissect_smc_tcp_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
void *data _U_) |
|
{ |
|
gint offset; |
|
guint16 msg_len; |
|
+ guint8 smc_type, smc_v2_type = 0, smc_v1_type = 0, smc_version = 0; |
|
+ guint8 mixed_type; |
|
clc_message clc_msgid; |
|
proto_item *ti; |
|
- proto_tree *smcr_tree; |
|
+ proto_tree *smc_tree; |
|
+ bool is_ipv6, is_smc_v2, is_smcd = false; |
|
|
|
- col_set_str(pinfo->cinfo, COL_PROTOCOL, "SMC-R"); |
|
msg_len = tvb_get_ntohs(tvb, CLC_MSG_LEN_OFFSET); |
|
offset = 4; |
|
- clc_msgid = (clc_message) tvb_get_guint8(tvb, offset); |
|
- col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMC-R-%s],", |
|
- val_to_str_const((guint32)clc_msgid, |
|
- smcr_clc_message_txt, "Unknown Command")); |
|
+ clc_msgid = (clc_message)tvb_get_guint8(tvb, offset); |
|
|
|
- if ((clc_msgid == SMC_CLC_ACCEPT) || |
|
- (clc_msgid == SMC_CLC_CONFIRMATION)) { |
|
+ smc_version = tvb_get_guint8(tvb, offset + 3); |
|
+ smc_version = ((smc_version >> 4) & 0x0F); |
|
+ smc_type = tvb_get_guint8(tvb, offset + 3); |
|
+ is_smc_v2 = (smc_version >= SMC_V2); |
|
+ |
|
+ if (is_smc_v2 && (clc_msgid == SMC_CLC_PROPOSAL)) { |
|
+ smc_v1_type = (smc_type & 0x03); |
|
+ smc_v2_type = ((smc_type >> 2) & 0x03); |
|
+ } |
|
+ else if (clc_msgid != SMC_CLC_DECLINE) { |
|
+ smc_v2_type = (smc_type & 0x03); |
|
+ smc_v1_type = (smc_type & 0x03); |
|
+ } |
|
+ |
|
+ is_ipv6 = (pinfo->src.type == AT_IPv6); |
|
+ |
|
+ if (is_smc_v2) |
|
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "SMCv2"); |
|
+ else |
|
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "SMC"); |
|
+ |
|
+ if (clc_msgid == SMC_CLC_PROPOSAL) { |
|
+ if (is_smc_v2 && (smc_v2_type != SMC_CLC_NONE)) { |
|
+ mixed_type = get_mixed_type(smc_v1_type, smc_v2_type); |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "%s,", |
|
+ val_to_str_const((guint32)mixed_type, |
|
+ smcv2_clc_col_info_message_txt, "Unknown Command")); |
|
+ } else { |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "%s,", |
|
+ val_to_str_const((guint32)smc_v1_type, |
|
+ smc_clc_col_info_message_txt, "Unknown Command")); |
|
+ } |
|
+ } else if ((smc_v2_type == SMC_CLC_SMCR) && ((clc_msgid == SMC_CLC_ACCEPT) || |
|
+ (clc_msgid == SMC_CLC_CONFIRMATION))) { |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMC-R-%s],", |
|
+ val_to_str_const((guint32)clc_msgid, |
|
+ smcr_clc_message_txt, "Unknown Command")); |
|
col_append_fstr(pinfo->cinfo, COL_INFO, " QP=0x%06x", |
|
tvb_get_ntoh24(tvb, ACCEPT_CONFIRM_QP_OFFSET)); |
|
} |
|
+ else if ((smc_v2_type == SMC_CLC_SMCD) && ((clc_msgid == SMC_CLC_ACCEPT) || |
|
+ (clc_msgid == SMC_CLC_CONFIRMATION))) { |
|
+ is_smcd = true; |
|
+ if (is_smc_v2) |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMC-Dv2-%s],", |
|
+ val_to_str_const((guint32)clc_msgid, |
|
+ smcr_clc_message_txt, "Unknown Command")); |
|
+ else |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMC-D-%s],", |
|
+ val_to_str_const((guint32)clc_msgid, |
|
+ smcr_clc_message_txt, "Unknown Command")); |
|
+ } |
|
+ else { |
|
+ if (is_smc_v2) |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMCv2-%s],", |
|
+ val_to_str_const((guint32)clc_msgid, |
|
+ smcr_clc_message_txt, "Unknown Command")); |
|
+ else |
|
+ col_prepend_fstr(pinfo->cinfo, COL_INFO, "[SMC-%s],", |
|
+ val_to_str_const((guint32)clc_msgid, |
|
+ smcr_clc_message_txt, "Unknown Command")); |
|
+ } |
|
|
|
if (!tree) |
|
return tvb_reported_length(tvb); |
|
|
|
- ti = proto_tree_add_item(tree, proto_smcr, tvb, 0, msg_len, ENC_NA); |
|
- smcr_tree = proto_item_add_subtree(ti, ett_smcr); |
|
- proto_tree_add_item(smcr_tree, hf_smcr_clc_msg, tvb, offset, 1, |
|
+ ti = proto_tree_add_item(tree, proto_smc, tvb, 0, msg_len, ENC_NA); |
|
+ smc_tree = proto_item_add_subtree(ti, ett_smcr); |
|
+ proto_tree_add_item(smc_tree, hf_smcr_clc_msg, tvb, offset, 1, |
|
ENC_BIG_ENDIAN); |
|
- |
|
switch (clc_msgid) { |
|
case SMC_CLC_PROPOSAL: |
|
- disect_smcr_proposal(tvb, smcr_tree); |
|
+ disect_smc_proposal(tvb, smc_tree, is_ipv6); |
|
break; |
|
case SMC_CLC_ACCEPT: |
|
- disect_smcr_accept(tvb, smcr_tree); |
|
+ if (is_smcd) |
|
+ disect_smcd_accept(tvb, smc_tree); |
|
+ else |
|
+ disect_smcr_accept(tvb, smc_tree); |
|
break; |
|
case SMC_CLC_CONFIRMATION: |
|
- disect_smcr_confirm(tvb, smcr_tree); |
|
+ if (is_smcd) |
|
+ disect_smcd_confirm(tvb, smc_tree); |
|
+ else |
|
+ disect_smcr_confirm(tvb, smc_tree); |
|
break; |
|
case SMC_CLC_DECLINE: |
|
- disect_smcr_decline(tvb, smcr_tree); |
|
+ disect_smcr_decline(tvb, smc_tree); |
|
break; |
|
default: |
|
/* Unknown Command */ |
|
@@ -802,7 +1270,7 @@ dissect_smcr_infiniband(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, voi |
|
(tvb_get_guint8(tvb, LLC_CMD_RSP_OFFSET) & LLC_FLAG_RESP)) |
|
col_append_str(pinfo->cinfo, COL_INFO, "(Resp)"); |
|
|
|
- ti = proto_tree_add_item(tree, proto_smcr, tvb, 0, msg_len, ENC_NA); |
|
+ ti = proto_tree_add_item(tree, proto_smc, tvb, 0, msg_len, ENC_NA); |
|
smcr_tree = proto_item_add_subtree(ti, ett_smcr); |
|
proto_tree_add_item(smcr_tree, hf_smcr_llc_msg, tvb, 0, 1, |
|
ENC_BIG_ENDIAN); |
|
@@ -861,24 +1329,27 @@ get_smcr_pdu_length(packet_info *pinfo _U_, tvbuff_t *tvb, int offset, void *dat |
|
} |
|
|
|
static int |
|
-dissect_smcr_tcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
+dissect_smc_tcp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
void *data) |
|
{ |
|
- tcp_dissect_pdus(tvb, pinfo, tree, TRUE, SMCR_TCP_MIN_HEADER_LENGTH, |
|
- get_smcr_pdu_length, dissect_smcr_tcp_pdu, data); |
|
+ tcp_dissect_pdus(tvb, pinfo, tree, TRUE, SMC_TCP_MIN_HEADER_LENGTH, |
|
+ get_smcr_pdu_length, dissect_smc_tcp_pdu, data); |
|
return tvb_reported_length(tvb); |
|
} |
|
|
|
static gboolean |
|
-dissect_smcr_tcp_heur(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
+dissect_smc_tcp_heur(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, |
|
void *data) |
|
{ |
|
if (tvb_captured_length(tvb) < 4) { |
|
return FALSE; |
|
} |
|
|
|
- if (tvb_get_ntohl(tvb, CLC_MSG_BYTE_0) != SMCR_CLC_ID) return FALSE; |
|
- dissect_smcr_tcp(tvb, pinfo, tree, data); |
|
+ if ((tvb_get_ntohl(tvb, CLC_MSG_BYTE_0) != SMCR_CLC_ID) && |
|
+ (tvb_get_ntohl(tvb, CLC_MSG_BYTE_0) != SMCD_CLC_ID)) |
|
+ return FALSE; |
|
+ |
|
+ dissect_smc_tcp(tvb, pinfo, tree, data); |
|
return TRUE; |
|
} |
|
|
|
@@ -921,479 +1392,688 @@ proto_register_smcr(void) |
|
/* Setup list of header fields */ |
|
static hf_register_info hf[] = { |
|
{ &hf_smcr_clc_msg, { |
|
- "CLC Message", "smcr.clc_msg", |
|
+ "CLC Message", "smc.clc_msg", |
|
FT_UINT8, BASE_DEC, VALS(smcr_clc_message_txt), 0x0, |
|
NULL, HFILL}}, |
|
|
|
{ &hf_smcr_llc_msg, { |
|
- "LLC Message", "smcr.llc_msg", |
|
+ "LLC Message", "smc.llc_msg", |
|
FT_UINT8, BASE_DEC, VALS(smcr_llc_message_txt), 0x0, |
|
NULL, HFILL}}, |
|
|
|
+ { &hf_proposal_smc_version_release_number, { |
|
+ "SMC Version Release Number", "smc.proposal.smc.version.relnum", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL }}, |
|
+ |
|
+ { &hf_proposal_smc_version_seid, { |
|
+ "SEID Indicator", "smc.proposal.smc.seid", |
|
+ FT_BOOLEAN, 8, NULL, 0x01, NULL, HFILL } }, |
|
+ |
|
{ &hf_proposal_smc_version, { |
|
- "SMC Version", "smcr.proposal.smc.version", |
|
+ "SMC Version", "smc.proposal.smc.version", |
|
FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
|
|
+ { &hf_proposal_smc_type, { |
|
+ "SMC(v1) Type", "smc.proposal.smc.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_type_message_txt), |
|
+ 0x03, NULL, HFILL}}, |
|
+ |
|
+ { &hf_accept_smc_type, { |
|
+ "SMC Type", "smc.accept.smc.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_type_message_txt), |
|
+ 0x03, NULL, HFILL}}, |
|
+ |
|
+ { &hf_confirm_smc_type, { |
|
+ "SMC Type", "smc.confirm.smc.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_type_message_txt), |
|
+ 0x03, NULL, HFILL}}, |
|
+ |
|
+ { &hf_proposal_smc_v2_type, { |
|
+ "SMC(v2) Type", "smc.proposal.smcv2.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_type_message_txt), |
|
+ 0x0C, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smc_proposal_smc_chid, { |
|
+ "ISM CHID", "smc.proposal.smc.chid", |
|
+ FT_UINT16, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smc_length, { |
|
+ "SMC Length", "smc.length", |
|
+ FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL}}, |
|
+ |
|
{ &hf_accept_smc_version, { |
|
- "SMC Version", "smcr.proposal.smc.version", |
|
+ "SMC Version", "smc.proposal.smc.version", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smcd_accept_smc_version, { |
|
+ "SMC Version", "smc.proposal.smc.version", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smcd_confirm_smc_version, { |
|
+ "SMC Version", "smc.proposal.smc.version", |
|
FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
|
|
{ &hf_accept_first_contact, { |
|
- "First Contact", "smcr.proposal.first.contact", |
|
+ "First Contact", "smc.proposal.first.contact", |
|
FT_BOOLEAN, 8, NULL, 0x08, NULL, HFILL}}, |
|
|
|
{ &hf_confirm_smc_version, { |
|
- "SMC Version", "smcr.proposal.smc.version", |
|
+ "SMC Version", "smc.proposal.smc.version", |
|
FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
|
|
{ &hf_accept_rmb_buffer_size, { |
|
"Server RMB Buffers Size (Compressed Notation)", |
|
- "smcr.accept.rmb.buffer.size", |
|
+ "smc.accept.rmb.buffer.size", |
|
FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
|
|
{ &hf_accept_qp_mtu_value, { |
|
"QP MTU Value (enumerated value)", |
|
- "smcr.accept.qp.mtu.value", |
|
+ "smc.accept.qp.mtu.value", |
|
FT_UINT8, BASE_DEC, NULL, 0x0F, NULL, HFILL}}, |
|
|
|
{ &hf_confirm_rmb_buffer_size, { |
|
"Client RMB Buffers Size (Compressed Notation)", |
|
- "smcr.confirm.rmb.buffer.size", |
|
+ "smc.confirm.rmb.buffer.size", |
|
FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL}}, |
|
|
|
{ &hf_confirm_qp_mtu_value, { |
|
"QP MTU Value (enumerated value)", |
|
- "smcr.confirm.qp.mtu.value", |
|
+ "smc.confirm.qp.mtu.value", |
|
FT_UINT8, BASE_DEC, NULL, 0x0F, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_flags, { |
|
- "Flags", "smcr.proposal.flags", |
|
+ { &hf_smc_proposal_flags, { |
|
+ "Flags", "smc.proposal.flags", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smc_proposal_ext_flags, { |
|
+ "Flag 2", "smc.proposal.extflags.2", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_flags, { |
|
- "Flags", "smcr.accept.flags", |
|
+ "Flags", "smc.accept.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_flags2, { |
|
- "Flags 2", "smcr.accept.flags.2", |
|
+ "Flags 2", "smc.accept.flags.2", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_flags, { |
|
- "Flags", "smcr.confirm.flags", |
|
+ "Flags", "smc.confirm.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_decline_flags, { |
|
- "Flags", "smcr.decline.flags", |
|
+ { &hf_decline_smc_version, { |
|
+ "SMC Version", "smc.decline.smc.version", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_decline_out_of_sync, { |
|
+ "Out of Sync", "smc.decline.osync", |
|
+ FT_BOOLEAN, 8, NULL, 0x08, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smc_decline_flags2, { |
|
+ "Flags 2", "smc.decline.flags2", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
+ { &hf_smc_decline_flags, { |
|
+ "Flags", "smc.decline.flags", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
{ &hf_smcr_confirm_flags2, { |
|
- "Flags 2", "smcr.confirm.flags.2", |
|
+ "Flags 2", "smc.confirm.flags.2", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_client_peer_id, { |
|
- "Sender (Client) Peer ID", "smcr.proposal.sender.client.peer.id", |
|
+ { &hf_smc_proposal_client_peer_id, { |
|
+ "Sender (Client) Peer ID", "smc.proposal.sender.client.peer.id", |
|
+ FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smc_proposal_ism_gid, { |
|
+ "ISM GID", "smc.proposal.ism.gid", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_client_preferred_gid, { |
|
- "Client Preferred GID", "smcr.proposal.client.preferred.gid", |
|
+ { &hf_smc_proposal_client_preferred_gid, { |
|
+ "Client Preferred GID", "smc.proposal.client.preferred.gid", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_client_preferred_mac, { |
|
+ { &hf_smc_proposal_client_preferred_mac, { |
|
"Client Preferred MAC Address", |
|
- "smcr.proposal.client.preferred.mac", |
|
+ "smc.proposal.client.preferred.mac", |
|
FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_peer_id, { |
|
- "Sender (Server) Peer ID", "smcr.accept.sender.server.peer.id", |
|
+ "Sender (Server) Peer ID", "smc.accept.sender.server.peer.id", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_preferred_gid, { |
|
- "Server Preferred GID", "smcr.accept.server.preferred.gid", |
|
+ "Server Preferred GID", "smc.accept.server.preferred.gid", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_preferred_mac, { |
|
"Server Preferred MAC Address", |
|
- "smcr.accept.server.preferred.mac", |
|
+ "smc.accept.server.preferred.mac", |
|
FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_outgoing_interface_subnet_mask, { |
|
+ { &hf_smc_proposal_rocev2_gid_ipv6_addr, { |
|
+ "RoCEv2 GID IPv6 Address", |
|
+ "smc.proposal.rocev2.gid.ipv6", |
|
+ FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smc_proposal_rocev2_gid_ipv4_addr, { |
|
+ "RoCEv2 GID IPv4 Address", |
|
+ "smc.proposal.rocev2.gid.ipv4", |
|
+ FT_IPv4, BASE_NETMASK, NULL, 0x0, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smc_proposal_outgoing_interface_subnet_mask, { |
|
"Outgoing Interface Subnet Mask", |
|
- "smcr.outgoing.interface.subnet.mask", |
|
+ "smc.outgoing.interface.subnet.mask", |
|
FT_IPv4, BASE_NETMASK, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_outgoing_subnet_mask_signifcant_bits, { |
|
+ { &hf_smc_proposal_outgoing_subnet_mask_signifcant_bits, { |
|
"Outgoing Interface Subnet Mask Number of Significant Bits", |
|
- "smcr.outgoing.interface.subnet.mask.number.of.significant.bits", |
|
+ "smc.outgoing.interface.subnet.mask.number.of.significant.bits", |
|
FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_ipv6_prefix, { |
|
- "IPv6 Prefix Value","smcr.proposal.ipv6.prefix.value", |
|
+ { &hf_smc_proposal_ipv6_prefix, { |
|
+ "IPv6 Prefix Value","smc.proposal.ipv6.prefix.value", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_proposal_ipv6_prefix_length, { |
|
- "IPv6 Prefix Length", "smcr.proposal.ipv6.prefix.length", |
|
+ { &hf_smc_proposal_ipv6_prefix_length, { |
|
+ "IPv6 Prefix Length", "smc.proposal.ipv6.prefix.length", |
|
FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_qp_number, { |
|
- "Server QP Number","smcr.accept.server.qp.number", |
|
+ "Server QP Number","smc.accept.server.qp.number", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_rmb_rkey, { |
|
- "Server RMB Rkey","smcr.accept.server.rmb.rkey", |
|
+ "Server RMB Rkey","smc.accept.server.rmb.rkey", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_tcp_conn_index, { |
|
"Server TCP Connection Index", |
|
- "smcr.accept.server.tcp.conn.index", |
|
+ "smc.accept.server.tcp.conn.index", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_rmb_element_alert_token, { |
|
"Server RMB Element Alert Token", |
|
- "smcr.accept.server.rmb.element.alert.token", |
|
+ "smc.accept.server.rmb.element.alert.token", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_server_rmb_virtual_address, { |
|
"Server's RMB Virtual Address", |
|
- "smcr.accept.server.rmb.virtual.address", |
|
+ "smc.accept.server.rmb.virtual.address", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_accept_initial_psn, { |
|
- "Initial PSN","smcr.accept.initial.psn", |
|
+ "Initial PSN","smc.accept.initial.psn", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_peer_id, { |
|
"Sender (Client) Peer ID", |
|
- "smcr.confirm.sender.client.peer.id", |
|
+ "smc.confirm.sender.client.peer.id", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_gid, { |
|
- "Client GID", "smcr.client.gid", |
|
+ "Client GID", "smc.client.gid", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_mac, { |
|
- "Client MAC Address", "smcr.confirm.client.mac", |
|
+ "Client MAC Address", "smc.confirm.client.mac", |
|
FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_qp_number, { |
|
- "Client QP Number","smcr.confirm.client.qp.number", |
|
+ "Client QP Number","smc.confirm.client.qp.number", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_rmb_rkey, { |
|
- "Client RMB Rkey","smcr.confirm.client.rmb.rkey", |
|
+ "Client RMB Rkey","smc.confirm.client.rmb.rkey", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_tcp_conn_index, { |
|
"Client TCP Connection Index", |
|
- "smcr.confirm.client.tcp.conn.index", |
|
+ "smc.confirm.client.tcp.conn.index", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_rmb_element_alert_token, { |
|
"Client RMB Element Alert Token", |
|
- "smcr.client.rmb.element.alert.token", |
|
+ "smc.client.rmb.element.alert.token", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_client_rmb_virtual_address, { |
|
"Client's RMB Virtual Address", |
|
- "smcr.client.rmb.virtual.address", |
|
+ "smc.client.rmb.virtual.address", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_initial_psn, { |
|
- "Initial PSN","smcr.initial.psn", |
|
+ "Initial PSN","smc.initial.psn", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_decline_peer_id, { |
|
- "Sender Peer ID", "smcr.sender.peer.id", |
|
+ { &hf_smc_decline_peer_id, { |
|
+ "Sender Peer ID", "smc.sender.peer.id", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
- { &hf_smcr_decline_diag_info, { |
|
- "Peer Diagnosis Information", "smcr.peer.diag.info", |
|
+ { &hf_smc_decline_diag_info, { |
|
+ "Peer Diagnosis Information", "smc.peer.diag.info", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
+ { &hf_decline_os_type, { |
|
+ "OS Type", "smc.decline.os.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_os_message_txt), 0xF0, NULL, HFILL} }, |
|
+ |
|
{ &hf_smcr_confirm_link_gid, { |
|
- "Sender GID", "smcr.sender.gid", |
|
+ "Sender GID", "smc.sender.gid", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_mac, { |
|
- "Sender MAC Address", "smcr.confirm.link.sender.mac", |
|
+ "Sender MAC Address", "smc.confirm.link.sender.mac", |
|
FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_qp_number, { |
|
- "Sender QP Number","smcr.confirm.link.sender.qp.number", |
|
+ "Sender QP Number","smc.confirm.link.sender.qp.number", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_number, { |
|
- "Link Number", "smcr.confirm.link.number", |
|
+ "Link Number", "smc.confirm.link.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_userid, { |
|
"Sender Link User ID", |
|
- "smcr.confirm.link.sender.link.userid", |
|
+ "smc.confirm.link.sender.link.userid", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_max_links, { |
|
- "Max Links","smcr.confirm.link.max.links", |
|
+ "Max Links","smc.confirm.link.max.links", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_flags, { |
|
- "Flags", "smcr.confirm.link.flags", |
|
+ "Flags", "smc.confirm.link.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_link_response, { |
|
- "Response", "smcr.confirm.link.response", |
|
+ "Response", "smc.confirm.link.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_gid, { |
|
- "Sender GID", "smcr.add.link.sender.gid", |
|
+ "Sender GID", "smc.add.link.sender.gid", |
|
FT_IPv6, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_mac, { |
|
- "Sender MAC Address", "smcr.add.link.sender.mac", |
|
+ "Sender MAC Address", "smc.add.link.sender.mac", |
|
FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_qp_number, { |
|
- "Sender QP Number","smcr.add.link.sender.qp.number", |
|
+ "Sender QP Number","smc.add.link.sender.qp.number", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_number, { |
|
- "Link Number", "smcr.add.link.link.number", |
|
+ "Link Number", "smc.add.link.link.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_initial_psn, { |
|
- "Initial PSN", "smcr.add.link.initial.psn", |
|
+ "Initial PSN", "smc.add.link.initial.psn", |
|
FT_UINT24, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_flags, { |
|
- "Flags", "smcr.add.link.flags", |
|
+ "Flags", "smc.add.link.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_response, { |
|
- "Add Link Response", "smcr.add.link.response", |
|
+ "Add Link Response", "smc.add.link.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_response_rejected, { |
|
- "Add Link Rejected", "smcr.add.link.response.rejected", |
|
+ "Add Link Rejected", "smc.add.link.response.rejected", |
|
FT_BOOLEAN, 8, NULL, 0x40, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_flags2, { |
|
- "Flags", "smcr.add.link.flags2", |
|
+ "Flags", "smc.add.link.flags2", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL }}, |
|
|
|
{ &hf_smcr_add_link_qp_mtu_value, { |
|
- "QP MTU Value", "smcr.add.link.qp.mtu.value", |
|
+ "QP MTU Value", "smc.add.link.qp.mtu.value", |
|
FT_UINT8, BASE_HEX, NULL, 0x0F, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_flags, { |
|
- "Flags", "smcr.add.link.cont.flags", |
|
+ "Flags", "smc.add.link.cont.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_response, { |
|
- "Response", "smcr.add.link.cont.response", |
|
+ "Response", "smc.add.link.cont.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_link_number, { |
|
- "Link Number", "smcr.add.link.cont.link.number", |
|
+ "Link Number", "smc.add.link.cont.link.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_number_of_rkeys, { |
|
- "Number of Rkeys", "smcr.add.link.cont.rkey.number", |
|
+ "Number of Rkeys", "smc.add.link.cont.rkey.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p1_rkey, { |
|
"RMB RToken Pair 1 - Rkey as known on this SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok1.Rkey1", |
|
+ "smc.add.link.cont.rmb.RTok1.Rkey1", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p1_rkey2, { |
|
"RMB RToken Pair 1 - Equivalent Rkey for the new SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok1.Rkey2", |
|
+ "smc.add.link.cont.rmb.RTok1.Rkey2", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p1_virt_addr, { |
|
"RMB RToken Pair 1 Virtual Address for the new SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok1.virt", |
|
+ "smc.add.link.cont.rmb.RTok1.virt", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p2_rkey, { |
|
"RMB RToken Pair 2 - Rkey as known on this SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok2.Rkey1", |
|
+ "smc.add.link.cont.rmb.RTok2.Rkey1", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p2_rkey2, { |
|
"RMB RToken Pair 2 - Equivalent Rkey for the new SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok2.Rkey2", |
|
+ "smc.add.link.cont.rmb.RTok2.Rkey2", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_add_link_cont_p2_virt_addr, { |
|
"RMB RToken Pair 2 Virtual Address for the new SMC Link", |
|
- "smcr.add.link.cont.rmb.RTok1.virt", |
|
+ "smc.add.link.cont.rmb.RTok1.virt", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_flags, { |
|
- "Flags", "smcr.delete.link.flags", |
|
+ "Flags", "smc.delete.link.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_response, { |
|
- "Response", "smcr.delete.link.response", |
|
+ "Response", "smc.delete.link.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_all, { |
|
"Terminate All Links In The Link Group", |
|
- "smcr.delete.link.all", |
|
+ "smc.delete.link.all", |
|
FT_BOOLEAN, 8, NULL, 0x40, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_orderly, { |
|
- "Terminate Links Orderly", "smcr.delete.link.orderly", |
|
+ "Terminate Links Orderly", "smc.delete.link.orderly", |
|
FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_number, { |
|
- "Link Number For The Failed Link", "smcr.delete.link.number", |
|
+ "Link Number For The Failed Link", "smc.delete.link.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_link_reason_code, { |
|
- "Reason Code", "smcr.delete.link.reason.code", |
|
+ "Reason Code", "smc.delete.link.reason.code", |
|
FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_flags, { |
|
- "Flags", "smcr.confirm.rkey.flags", |
|
+ "Flags", "smc.confirm.rkey.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_response, { |
|
- "Response", "smcr.confirm.rkey.response", |
|
+ "Response", "smc.confirm.rkey.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_negative_response, { |
|
- "Negative Response", "smcr.confirm.rkey.negative.response", |
|
+ "Negative Response", "smc.confirm.rkey.negative.response", |
|
FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_retry_rkey_set, { |
|
- "Retry Rkey Set", "smcr.confirm.rkey.retry.rkey.set", |
|
+ "Retry Rkey Set", "smc.confirm.rkey.retry.rkey.set", |
|
FT_BOOLEAN, 8, NULL, 0x10, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_number, { |
|
- "Number of other QP", "smcr.confirm.rkey.number.qp", |
|
+ "Number of other QP", "smc.confirm.rkey.number.qp", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_new_rkey, { |
|
- "New Rkey for this link","smcr.confirm.rkey.new.rkey", |
|
+ "New Rkey for this link","smc.confirm.rkey.new.rkey", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_virtual_address, { |
|
"New RMB virtual address for this link", |
|
- "smcr.confirm.rkey.new.virt", |
|
+ "smc.confirm.rkey.new.virt", |
|
FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_confirm_rkey_link_number, { |
|
- "Link Number", "smcr.confirm.rkey.link.number", |
|
+ "Link Number", "smc.confirm.rkey.link.number", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_rkey_flags, { |
|
- "Flags", "smcr.delete.rkey.flags", |
|
+ "Flags", "smc.delete.rkey.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_rkey_response, { |
|
- "Response", "smcr.delete.rkey.response", |
|
+ "Response", "smc.delete.rkey.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_rkey_negative_response, { |
|
- "Negative Response", "smcr.delete.rkey.negative.response", |
|
+ "Negative Response", "smc.delete.rkey.negative.response", |
|
FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_rkey_mask, { |
|
- "Error Mask", "smcr.delete.rkey.error.mask", |
|
+ "Error Mask", "smc.delete.rkey.error.mask", |
|
FT_UINT8, BASE_HEX, NULL, 0x00, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_delete_rkey_deleted, { |
|
- "RMB Rkey to be deleted", "smcr.delete.rkey.deleted", |
|
+ "RMB Rkey to be deleted", "smc.delete.rkey.deleted", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_test_link_flags, { |
|
- "Flags", "smcr.test.link.flags", |
|
+ "Flags", "smc.test.link.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_test_link_response, { |
|
- "Response", "smcr.test.link.response", |
|
+ "Response", "smc.test.link.response", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_seqno, { |
|
- "Sequence Number", "smcr.rmbe.ctrl.seqno", |
|
+ "Sequence Number", "smc.rmbe.ctrl.seqno", |
|
FT_UINT16, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_alert_token, { |
|
- "Alert Token", "smcr.rmbe.ctrl.alert.token", |
|
+ "Alert Token", "smc.rmbe.ctrl.alert.token", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
+ { &hf_smc_proposal_eid, { |
|
+ "EID", "smc.proposal.eid", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smc_proposal_system_eid, { |
|
+ "SEID", "smc.proposal.system.eid", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
{ &hf_smcr_rmbe_ctrl_prod_wrap_seqno, { |
|
"Producer window wrap sequence number", |
|
- "smcr.rmbe.ctrl.prod.wrap.seq", |
|
+ "smc.rmbe.ctrl.prod.wrap.seq", |
|
FT_UINT16, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_prod_curs, { |
|
- "Peer Producer Cursor", "smcr.rmbe.ctrl.peer.prod.curs", |
|
+ "Peer Producer Cursor", "smc.rmbe.ctrl.peer.prod.curs", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL }}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_cons_wrap_seqno, { |
|
"Consumer window wrap sequence number", |
|
- "smcr.rmbe.ctrl.prod.wrap.seq", |
|
+ "smc.rmbe.ctrl.prod.wrap.seq", |
|
FT_UINT16, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_cons_curs, { |
|
- "Peer Consumer Cursor", "smcr.rmbe.ctrl.peer.prod.curs", |
|
+ "Peer Consumer Cursor", "smc.rmbe.ctrl.peer.prod.curs", |
|
FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_conn_rw_status_flags, { |
|
"Connection read/write status flags", |
|
- "smcr.rmbe.ctrl.conn.rw.status.flags", |
|
+ "smc.rmbe.ctrl.conn.rw.status.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_write_blocked, { |
|
- "Write Blocked", "smcr.rmbe.ctrl.write.blocked", |
|
+ "Write Blocked", "smc.rmbe.ctrl.write.blocked", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_urgent_pending, { |
|
- "Urgent Data Pending", "smcr.rmbe.ctrl.urgent.pending", |
|
+ "Urgent Data Pending", "smc.rmbe.ctrl.urgent.pending", |
|
FT_BOOLEAN, 8, NULL, 0x40, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_urgent_present, { |
|
- "Urgent Data Present", "smcr.rmbe.ctrl.urgent.present", |
|
+ "Urgent Data Present", "smc.rmbe.ctrl.urgent.present", |
|
FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_cons_update_requested, { |
|
"Consumer Cursor Update Requested", |
|
- "smcr.rmbe.ctrl.cons.update.requested", |
|
+ "smc.rmbe.ctrl.cons.update.requested", |
|
FT_BOOLEAN, 8, NULL, 0x10, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_failover_validation, { |
|
"Failover Validation Indicator", |
|
- "smcr.rmbe.ctrl.failover.validation", |
|
+ "smc.rmbe.ctrl.failover.validation", |
|
FT_BOOLEAN, 8, NULL, 0x08, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_conn_state_flags, { |
|
"Peer Connection State Flags", |
|
- "smcr.rmbe.ctrl.peer.conn.state.flags", |
|
+ "smc.rmbe.ctrl.peer.conn.state.flags", |
|
FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_sending_done, { |
|
- "Peer Sending Done", "smcr.rmbe.ctrl.peer.sending.done", |
|
+ "Peer Sending Done", "smc.rmbe.ctrl.peer.sending.done", |
|
FT_BOOLEAN, 8, NULL, 0x80, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_closed_conn, { |
|
- "Peer Closed Connection", "smcr.rmbe.ctrl.peer.closed.conn", |
|
+ "Peer Closed Connection", "smc.rmbe.ctrl.peer.closed.conn", |
|
FT_BOOLEAN, 8, NULL, 0x40, NULL, HFILL}}, |
|
|
|
{ &hf_smcr_rmbe_ctrl_peer_abnormal_close, { |
|
- "Peer Abnormal Close", "smcr.rmbe.ctrl.peer.abnormal.close", |
|
- FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}} |
|
+ "Peer Abnormal Close", "smc.rmbe.ctrl.peer.abnormal.close", |
|
+ FT_BOOLEAN, 8, NULL, 0x20, NULL, HFILL}}, |
|
+ |
|
+ { &hf_smcd_accept_eid, { |
|
+ "EID", "smc.accept.eid", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_eid, { |
|
+ "EID", "smc.confirm.eid", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_peer_name, { |
|
+ "Peer Host Name", "smc.accept.peer.host.name", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_peer_name, { |
|
+ "Peer Host Name", "smc.confirm.peer.host.name", |
|
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_first_contact, { |
|
+ "First Contact", "smc.accept.first.contact", |
|
+ FT_BOOLEAN, 8, NULL, 0x08, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_first_contact, { |
|
+ "First Contact", "smc.confirm.first.contact", |
|
+ FT_BOOLEAN, 8, NULL, 0x08, NULL, HFILL} }, |
|
+ |
|
+ { &hf_accept_smc_version_release_number, { |
|
+ "SMC Version Release Number", "smc.accept.smc.version.relnum", |
|
+ FT_UINT8, BASE_DEC, NULL, 0x0F, NULL, HFILL } }, |
|
+ |
|
+ { &hf_confirm_smc_version_release_number, { |
|
+ "SMC Version Release Number", "smc.confirm.smc.version.relnum", |
|
+ FT_UINT8, BASE_DEC, NULL, 0x0F, NULL, HFILL } }, |
|
+ |
|
+ { &hf_accept_os_type, { |
|
+ "OS Type", "smc.accept.os.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_os_message_txt), 0xF0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_confirm_os_type, { |
|
+ "OS Type", "smc.confirm.os.type", |
|
+ FT_UINT8, BASE_DEC, VALS(smc_clc_os_message_txt), 0xF0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_dmb_token, { |
|
+ "DMB Token", "smc.accept.dmb.token", |
|
+ FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_dmb_token, { |
|
+ "DMB Token", "smc.confirm.dmb.token", |
|
+ FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_accept_dmb_buffer_size, { |
|
+ "Server DMBE Buffers Size (Compressed Notation)", |
|
+ "smc.accept.dmbe.buffer.size", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_dmb_buffer_size, { |
|
+ "Client DMBE Buffers Size (Compressed Notation)", |
|
+ "smc.confirm.dmbe.buffer.size", |
|
+ FT_UINT8, BASE_DEC, NULL, 0xF0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_smc_chid, { |
|
+ "ISM CHID", "smc.accept.smc.chid", |
|
+ FT_UINT16, BASE_HEX, NULL, 0x00, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_smc_chid, { |
|
+ "ISM CHID", "smc.confirm.smc.chid", |
|
+ FT_UINT16, BASE_HEX, NULL, 0x00, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_server_peer_id, { |
|
+ "Sender (Server) ISM GID", "smc.accept.sender.server.ism.gid", |
|
+ FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_client_peer_id, { |
|
+ "Sender (Client) ISM GID", "smc.confirm.sender.client.ism.gid", |
|
+ FT_UINT64, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_dmbe_conn_index, { |
|
+ "DMBE Connection Index", |
|
+ "smc.accept.dmbe.conn.index", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_server_link_id, { |
|
+ "Server Link ID", |
|
+ "smc.accept.server.linkid", |
|
+ FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_dmbe_conn_index, { |
|
+ "DMBE Connection Index", |
|
+ "smc.confirm.dmbe.conn.index", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_client_link_id, { |
|
+ "Client Link ID", |
|
+ "smc.confirm.client.linkid", |
|
+ FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_flags, { |
|
+ "Flags", "smc.accept.flags", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_flags, { |
|
+ "Flags", "smc.confirm.flags", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_flags2, { |
|
+ "DMBE Size", "smc.accept.dmbe.size", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_confirm_flags2, { |
|
+ "DMBE Size", "smc.confirm.dmbe.size", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smcd_accept_fce_flags, { |
|
+ "Flags", "smc.accept.fce.flags", |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} } |
|
}; |
|
|
|
/* Setup protocol subtree arrays */ |
|
- static gint *ett[] = { |
|
+ static gint* ett[] = { |
|
&ett_smcr, |
|
&ett_proposal_flag, |
|
+ &ett_proposal_ext_flag2, |
|
&ett_accept_flag, |
|
&ett_accept_flag2, |
|
+ &ett_smcd_accept_flag, |
|
+ &ett_smcd_accept_flag2, |
|
+ &ett_smcd_accept_fce_flag, |
|
+ &ett_smcd_confirm_flag, |
|
+ &ett_smcd_confirm_fce_flag, |
|
+ &ett_smcd_confirm_flag2, |
|
&ett_confirm_flag, |
|
&ett_confirm_flag2, |
|
&ett_confirm_link_flag, |
|
+ &ett_decline_flag, |
|
+ &ett_decline_flag2, |
|
&ett_add_link_flag, |
|
&ett_add_link_flag2, |
|
&ett_add_link_cont_flag, |
|
@@ -1405,21 +2085,21 @@ proto_register_smcr(void) |
|
&ett_rmbe_ctrl_peer_conn_state_flag |
|
}; |
|
|
|
- proto_smcr = proto_register_protocol("Shared Memory Communications - RDMA", |
|
- "SMCR", "smcr"); |
|
+ proto_smc = proto_register_protocol("Shared Memory Communications", |
|
+ "SMC", "smc"); |
|
|
|
- proto_register_field_array(proto_smcr, hf, array_length(hf)); |
|
+ proto_register_field_array(proto_smc, hf, array_length(hf)); |
|
proto_register_subtree_array(ett, array_length(ett)); |
|
|
|
- smcr_tcp_handle = register_dissector("smcr", dissect_smcr_tcp, proto_smcr); |
|
+ smc_tcp_handle = register_dissector("smc", dissect_smc_tcp, proto_smc); |
|
} |
|
|
|
void |
|
proto_reg_handoff_smcr(void) |
|
{ |
|
- heur_dissector_add("tcp", dissect_smcr_tcp_heur, "Shared Memory Communications over TCP", "smcr_tcp", proto_smcr, HEURISTIC_ENABLE); |
|
- heur_dissector_add("infiniband.payload", dissect_smcr_infiniband_heur, "Shared Memory Communications Infiniband", "smcr_infiniband", proto_smcr, HEURISTIC_ENABLE); |
|
- dissector_add_for_decode_as("infiniband", create_dissector_handle( dissect_smcr_infiniband, proto_smcr ) ); |
|
+ heur_dissector_add("tcp", dissect_smc_tcp_heur, "Shared Memory Communications over TCP", "smc_tcp", proto_smc, HEURISTIC_ENABLE); |
|
+ heur_dissector_add("infiniband.payload", dissect_smcr_infiniband_heur, "Shared Memory Communications Infiniband", "smcr_infiniband", proto_smc, HEURISTIC_ENABLE); |
|
+ dissector_add_for_decode_as("infiniband", create_dissector_handle( dissect_smcr_infiniband, proto_smc ) ); |
|
} |
|
|
|
/* |
|
diff --git a/epan/dissectors/packet-smc.c b/epan/dissectors/packet-smc.c |
|
index bbfa9c07ef..0a4e96e055 100644 |
|
--- a/epan/dissectors/packet-smc.c |
|
+++ b/epan/dissectors/packet-smc.c |
|
@@ -592,7 +592,7 @@ disect_smcd_accept(tvbuff_t* tvb, proto_tree* tree) |
|
offset += FLAG_BYTE_LEN; |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcd_accept_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
- offset += 32; |
|
+ /* offset += 32; */ |
|
} |
|
} |
|
} |
|
@@ -661,7 +661,7 @@ disect_smcd_confirm(tvbuff_t* tvb, proto_tree* tree) |
|
offset += FLAG_BYTE_LEN; |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcd_confirm_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
- offset += 32; |
|
+ /* offset += 32; */ |
|
} |
|
} |
|
} |
|
diff --git a/epan/dissectors/packet-smc.c b/epan/dissectors/packet-smc.c |
|
index 0a4e96e055..6ede4690db 100644 |
|
--- a/epan/dissectors/packet-smc.c |
|
+++ b/epan/dissectors/packet-smc.c |
|
@@ -1,3 +1,6 @@ |
|
+ |
|
+ |
|
+ |
|
/* packet-smc.c |
|
* SMC dissector for wireshark |
|
* By Joe Fowler <fowlerja@us.ibm.com> |
|
@@ -191,6 +194,8 @@ static int hf_smc_proposal_outgoing_subnet_mask_signifcant_bits = -1; |
|
static int hf_smc_proposal_ipv6_prefix = -1; |
|
static int hf_smc_proposal_ipv6_prefix_length = -1; |
|
|
|
+static int hf_smc_reserved = -1; |
|
+ |
|
/* SMC-R Accept */ |
|
static int ett_accept_flag = -1; |
|
static int ett_accept_flag2 = -1; |
|
@@ -427,6 +432,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
|
|
if (mask_offset != 0) { |
|
suboffset = offset; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ suboffset, TWO_BYTE_RESERVED, ENC_NA); |
|
suboffset += TWO_BYTE_RESERVED; |
|
if (is_smcdv1 || is_smcdv2) { |
|
proto_tree_add_item(tree, hf_smc_proposal_ism_gid, tvb, |
|
@@ -439,6 +446,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
LENGTH_BYTE_LEN, ENC_BIG_ENDIAN); |
|
} |
|
suboffset += LENGTH_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ suboffset, TWO_BYTE_RESERVED, ENC_NA); |
|
v2_ext_offset = tvb_get_ntohs(tvb, suboffset); |
|
v2_ext_pos = suboffset + TWO_BYTE_RESERVED + v2_ext_offset; |
|
} |
|
@@ -451,7 +460,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
proto_tree_add_item(tree, hf_smc_proposal_outgoing_subnet_mask_signifcant_bits, tvb, |
|
offset, 1, ENC_BIG_ENDIAN); |
|
offset += 1; |
|
- /* Bump past reserved bytes */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
ipv6_prefix_count = tvb_get_guint8(tvb, offset); |
|
offset += 1; |
|
@@ -472,7 +482,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
offset += FLAG_BYTE_LEN; |
|
num_of_gids = tvb_get_guint8(tvb, offset); |
|
offset += FLAG_BYTE_LEN; |
|
- /*Skip reserved flag 1*/ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 1, ENC_NA); |
|
offset += 1; |
|
proposal_flag_item = proto_tree_add_item(tree, hf_smc_proposal_ext_flags, tvb, |
|
offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
@@ -482,7 +493,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
proto_tree_add_item(proposal_flag_tree, hf_proposal_smc_version_seid, tvb, |
|
offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
- /*Skip not used 2 bytes*/ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 2, ENC_NA); |
|
offset += 2; |
|
smcd_v2_ext_offset = tvb_get_ntohs(tvb, offset); |
|
offset += 2; |
|
@@ -499,7 +511,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
offset, IPV4_SUBNET_MASK_LEN, ENC_BIG_ENDIAN); |
|
offset += IPV4_SUBNET_MASK_LEN; |
|
} |
|
- /*Skip reserved 16 bytes*/ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 16, ENC_NA); |
|
offset += 16; |
|
while (num_of_eids != 0) { |
|
proto_tree_add_item(tree, hf_smc_proposal_eid, tvb, |
|
@@ -512,7 +525,8 @@ disect_smc_proposal(tvbuff_t *tvb, proto_tree *tree, bool is_ipv6) |
|
proto_tree_add_item(tree, hf_smc_proposal_system_eid, tvb, |
|
offset, EID_LEN, ENC_ASCII | ENC_NA); |
|
offset += EID_LEN; |
|
- /*Skip reserved 16 bytes*/ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 16, ENC_NA); |
|
offset += 16; |
|
while (num_of_gids != 0) { |
|
proto_tree_add_item(tree, hf_smc_proposal_ism_gid, tvb, |
|
@@ -580,16 +594,21 @@ disect_smcd_accept(tvbuff_t* tvb, proto_tree* tree) |
|
|
|
proto_tree_add_item(tree, hf_smcd_accept_eid, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
offset += 32; |
|
- /* Reserved bytes */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 8, ENC_NA); |
|
offset += 8; |
|
|
|
if (first_contact) { |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
accept_flag_item = proto_tree_add_item(tree, hf_smcd_accept_fce_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
accept_flag_tree = proto_item_add_subtree(accept_flag_item, ett_smcd_accept_fce_flag); |
|
proto_tree_add_item(accept_flag_tree, hf_accept_os_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
proto_tree_add_item(accept_flag_tree, hf_accept_smc_version_release_number, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcd_accept_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
/* offset += 32; */ |
|
@@ -637,6 +656,8 @@ disect_smcd_confirm(tvbuff_t* tvb, proto_tree* tree) |
|
confirm_flag2_tree = proto_item_add_subtree(confirm_flag2_item, ett_smcd_confirm_flag2); |
|
proto_tree_add_item(confirm_flag2_tree, hf_smcd_confirm_dmb_buffer_size, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcd_confirm_client_link_id, tvb, |
|
offset, ALERT_TOKEN_LEN, ENC_BIG_ENDIAN); |
|
@@ -649,16 +670,21 @@ disect_smcd_confirm(tvbuff_t* tvb, proto_tree* tree) |
|
|
|
proto_tree_add_item(tree, hf_smcd_confirm_eid, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
offset += 32; |
|
- /* Reserved bytes */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, 8, ENC_NA); |
|
offset += 8; |
|
|
|
if (first_contact) { |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
confirm_flag_item = proto_tree_add_item(tree, hf_smcd_accept_fce_flags, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
confirm_flag_tree = proto_item_add_subtree(confirm_flag_item, ett_smcd_confirm_fce_flag); |
|
proto_tree_add_item(confirm_flag_tree, hf_confirm_os_type, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
proto_tree_add_item(confirm_flag_tree, hf_confirm_smc_version_release_number, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcd_confirm_peer_name, tvb, offset, 32, ENC_ASCII | ENC_NA); |
|
/* offset += 32; */ |
|
@@ -711,12 +737,14 @@ disect_smcr_accept(tvbuff_t *tvb, proto_tree *tree) |
|
proto_tree_add_item(accept_flag2_tree, hf_accept_rmb_buffer_size, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
proto_tree_add_item(accept_flag2_tree, hf_accept_qp_mtu_value, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
- /* Bump past reserved byte */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_accept_server_rmb_virtual_address, tvb, |
|
offset, VIRTUAL_ADDR_LEN, ENC_BIG_ENDIAN); |
|
offset += VIRTUAL_ADDR_LEN; |
|
- /* Bump past reserved byte */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_accept_initial_psn, tvb, |
|
offset, PSN_LEN, ENC_BIG_ENDIAN); |
|
@@ -765,12 +793,14 @@ disect_smcr_confirm(tvbuff_t *tvb, proto_tree *tree) |
|
proto_tree_add_item(confirm_flag2_tree, hf_confirm_rmb_buffer_size, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
proto_tree_add_item(confirm_flag2_tree, hf_confirm_qp_mtu_value, tvb, offset, FLAG_BYTE_LEN, ENC_BIG_ENDIAN); |
|
offset += FLAG_BYTE_LEN; |
|
- /* Bump past reserved byte */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_confirm_client_rmb_virtual_address, tvb, |
|
offset, VIRTUAL_ADDR_LEN, ENC_BIG_ENDIAN); |
|
offset += VIRTUAL_ADDR_LEN; |
|
- /* Bump past reserved byte */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, ONE_BYTE_RESERVED, ENC_NA); |
|
offset += ONE_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_confirm_initial_psn, tvb, |
|
offset, PSN_LEN, ENC_BIG_ENDIAN); |
|
@@ -866,7 +896,8 @@ disect_smcr_add_link(tvbuff_t *tvb, proto_tree *tree) |
|
proto_tree_add_item(tree, hf_smcr_add_link_mac, tvb, |
|
offset, MAC_ADDR_LEN, ENC_NA); |
|
offset += MAC_ADDR_LEN; |
|
- /* Bump past reserved bytes */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, |
|
+ offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_add_link_gid, tvb, |
|
offset, GID_LEN, ENC_NA); |
|
@@ -1084,12 +1115,13 @@ disect_smcr_rmbe_ctrl(tvbuff_t *tvb, proto_tree *tree) |
|
offset += SEQNO_LEN; |
|
proto_tree_add_item(tree, hf_smcr_rmbe_ctrl_alert_token, tvb, offset, ALERT_TOKEN_LEN, ENC_BIG_ENDIAN); |
|
offset += ALERT_TOKEN_LEN; |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_rmbe_ctrl_prod_wrap_seqno, tvb, offset, SEQNO_LEN, ENC_BIG_ENDIAN); |
|
offset += SEQNO_LEN; |
|
proto_tree_add_item(tree, hf_smcr_rmbe_ctrl_peer_prod_curs, tvb, offset, CURSOR_LEN, ENC_BIG_ENDIAN); |
|
offset += CURSOR_LEN; |
|
- /* Bump past reserved bytes */ |
|
+ proto_tree_add_item(tree, hf_smc_reserved, tvb, offset, TWO_BYTE_RESERVED, ENC_NA); |
|
offset += TWO_BYTE_RESERVED; |
|
proto_tree_add_item(tree, hf_smcr_rmbe_ctrl_cons_wrap_seqno, tvb, offset, SEQNO_LEN, ENC_BIG_ENDIAN); |
|
offset += SEQNO_LEN; |
|
@@ -2053,7 +2085,11 @@ proto_register_smcr(void) |
|
|
|
{ &hf_smcd_accept_fce_flags, { |
|
"Flags", "smc.accept.fce.flags", |
|
- FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} } |
|
+ FT_UINT8, BASE_HEX, NULL, 0x0, NULL, HFILL} }, |
|
+ |
|
+ { &hf_smc_reserved, { |
|
+ "Reserved", "smc.reserved", |
|
+ FT_BYTES, BASE_NONE, NULL, 0x0, NULL, HFILL} } |
|
}; |
|
|
|
/* Setup protocol subtree arrays */
|
|
|