aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-nlm.c
diff options
context:
space:
mode:
Diffstat (limited to 'epan/dissectors/packet-nlm.c')
-rw-r--r--epan/dissectors/packet-nlm.c1237
1 files changed, 1237 insertions, 0 deletions
diff --git a/epan/dissectors/packet-nlm.c b/epan/dissectors/packet-nlm.c
new file mode 100644
index 0000000000..7aa352c082
--- /dev/null
+++ b/epan/dissectors/packet-nlm.c
@@ -0,0 +1,1237 @@
+/* packet-nlm.c
+ * Routines for nlm dissection
+ *
+ * $Id$
+ *
+ * Ethereal - Network traffic analyzer
+ * By Gerald Combs <gerald@ethereal.com>
+ * Copyright 1998 Gerald Combs
+ *
+ * Copied from packet-mount.c
+ *
+ * 2001-JAN Ronnie Sahlberg <See AUTHORS for email>
+ * Updates to version 1 of the protocol.
+ * Added version 3 of the protocol.
+ * Added version 4 of the protocol.
+ *
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ */
+
+
+#ifdef HAVE_CONFIG_H
+#include "config.h"
+#endif
+
+
+
+#include "packet-rpc.h"
+#include "packet-nfs.h"
+#include "packet-nlm.h"
+#include "prefs.h"
+#include <string.h>
+
+/*
+ * NFS Lock Manager protocol specs can only be found in actual
+ * implementations or in the nice book:
+ * Brent Callaghan: "NFS Illustrated", Addison-Wesley, ISBN 0-201-32570-5
+ * which I use here as reference (BC).
+ *
+ * They can also be found if you go to
+ *
+ * http://www.opengroup.org/publications/catalog/c702.htm
+ *
+ * and follow the links to the HTML version of the document.
+ */
+
+static int proto_nlm = -1;
+static int hf_nlm_procedure_v1 = -1;
+static int hf_nlm_procedure_v2 = -1;
+static int hf_nlm_procedure_v3 = -1;
+static int hf_nlm_procedure_v4 = -1;
+static int hf_nlm_cookie = -1;
+static int hf_nlm_block = -1;
+static int hf_nlm_exclusive = -1;
+static int hf_nlm_lock = -1;
+static int hf_nlm_lock_caller_name = -1;
+static int hf_nlm_lock_owner = -1;
+static int hf_nlm_lock_svid = -1;
+static int hf_nlm_lock_l_offset = -1;
+static int hf_nlm_lock_l_offset64 = -1;
+static int hf_nlm_lock_l_len = -1;
+static int hf_nlm_lock_l_len64 = -1;
+static int hf_nlm_reclaim = -1;
+static int hf_nlm_stat = -1;
+static int hf_nlm_state = -1;
+static int hf_nlm_test_stat = -1;
+static int hf_nlm_test_stat_stat = -1;
+static int hf_nlm_holder = -1;
+static int hf_nlm_share = -1;
+static int hf_nlm_share_mode = -1;
+static int hf_nlm_share_access = -1;
+static int hf_nlm_share_name = -1;
+static int hf_nlm_sequence = -1;
+static int hf_nlm_request_in = -1;
+static int hf_nlm_reply_in = -1;
+static int hf_nlm_time = -1;
+
+static gint ett_nlm = -1;
+static gint ett_nlm_lock = -1;
+
+
+
+/*
+ * stuff to match MSG and RES packets for async NLM
+ */
+
+static gboolean nlm_match_msgres = FALSE;
+static GHashTable *nlm_msg_res_unmatched = NULL;
+static GHashTable *nlm_msg_res_matched = NULL;
+
+/* XXX when matching the packets we should really check the conversation (only address
+ NOT ports) and command type as well. I am lazy and thinks the cookie itself is
+ good enough for now
+*/
+typedef struct _nlm_msg_res_unmatched_data {
+ int req_frame;
+ nstime_t ns;
+ int cookie_len;
+ const char *cookie;
+} nlm_msg_res_unmatched_data;
+
+typedef struct _nlm_msg_res_matched_data {
+ int req_frame;
+ int rep_frame;
+ nstime_t ns;
+} nlm_msg_res_matched_data;
+
+static gboolean
+nlm_msg_res_unmatched_free_all(gpointer key_arg _U_, gpointer value, gpointer user_data _U_)
+{
+ nlm_msg_res_unmatched_data *umd = (nlm_msg_res_unmatched_data *)value;
+
+ g_free((gpointer)umd->cookie);
+ g_free(umd);
+
+ return TRUE;
+}
+static gboolean
+nlm_msg_res_matched_free_all(gpointer key_arg _U_, gpointer value, gpointer user_data _U_)
+{
+ nlm_msg_res_matched_data *md = (nlm_msg_res_matched_data *)value;
+
+ g_free(md);
+
+ return TRUE;
+}
+
+static guint
+nlm_msg_res_unmatched_hash(gconstpointer k)
+{
+ const nlm_msg_res_unmatched_data *umd = (const nlm_msg_res_unmatched_data *)k;
+ guint8 hash=0;
+ int i;
+
+ for(i=0;i<umd->cookie_len;i++){
+ hash^=umd->cookie[i];
+ }
+
+ return hash;
+}
+static guint
+nlm_msg_res_matched_hash(gconstpointer k)
+{
+ guint hash = (guint)k;
+
+ return hash;
+}
+
+static gint
+nlm_msg_res_unmatched_equal(gconstpointer k1, gconstpointer k2)
+{
+ const nlm_msg_res_unmatched_data *umd1 = (const nlm_msg_res_unmatched_data *)k1;
+ const nlm_msg_res_unmatched_data *umd2 = (const nlm_msg_res_unmatched_data *)k2;
+
+ if(umd1->cookie_len!=umd2->cookie_len){
+ return 0;
+ }
+
+ return( !memcmp(umd1->cookie, umd2->cookie, umd1->cookie_len));
+}
+static gint
+nlm_msg_res_matched_equal(gconstpointer k1, gconstpointer k2)
+{
+ guint mk1 = (guint)k1;
+ guint mk2 = (guint)k2;
+
+ return( mk1==mk2 );
+}
+
+static void
+nlm_msg_res_match_init(void)
+{
+ if(nlm_msg_res_unmatched != NULL){
+ g_hash_table_foreach_remove(nlm_msg_res_unmatched,
+ nlm_msg_res_unmatched_free_all, NULL);
+ } else {
+ nlm_msg_res_unmatched=g_hash_table_new(nlm_msg_res_unmatched_hash,
+ nlm_msg_res_unmatched_equal);
+ }
+
+ if(nlm_msg_res_matched != NULL){
+ g_hash_table_foreach_remove(nlm_msg_res_matched,
+ nlm_msg_res_matched_free_all, NULL);
+ } else {
+ nlm_msg_res_matched=g_hash_table_new(nlm_msg_res_matched_hash,
+ nlm_msg_res_matched_equal);
+ }
+}
+
+static void
+nlm_print_msgres_reply(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb)
+{
+ nlm_msg_res_matched_data *md;
+
+ md=g_hash_table_lookup(nlm_msg_res_matched, (gconstpointer)pinfo->fd->num);
+ if(md){
+ nstime_t ns;
+ proto_tree_add_uint(tree, hf_nlm_request_in, tvb, 0, 0, md->req_frame);
+ ns.secs= pinfo->fd->abs_secs-md->ns.secs;
+ ns.nsecs=pinfo->fd->abs_usecs*1000-md->ns.nsecs;
+ if(ns.nsecs<0){
+ ns.nsecs+=1000000000;
+ ns.secs--;
+ }
+ proto_tree_add_time(tree, hf_nlm_time, tvb, 0, 0, &ns);
+
+ }
+}
+
+static void
+nlm_print_msgres_request(packet_info *pinfo, proto_tree *tree, tvbuff_t *tvb)
+{
+ nlm_msg_res_matched_data *md;
+
+ md=g_hash_table_lookup(nlm_msg_res_matched, (gconstpointer)pinfo->fd->num);
+ if(md){
+ proto_tree_add_uint(tree, hf_nlm_reply_in, tvb, 0, 0, md->rep_frame);
+ }
+}
+static void
+nlm_match_fhandle_reply(packet_info *pinfo, proto_tree *tree)
+{
+ nlm_msg_res_matched_data *md;
+
+ md=g_hash_table_lookup(nlm_msg_res_matched, (gconstpointer)pinfo->fd->num);
+ if(md && md->rep_frame){
+ nfs_fhandle_data_t *fhd;
+ fhd=(nfs_fhandle_data_t *)g_hash_table_lookup(
+ nfs_fhandle_frame_table,
+ (gconstpointer)md->req_frame);
+ if(fhd){
+ dissect_fhandle_hidden(pinfo,
+ tree, fhd);
+ }
+ }
+}
+static void
+nlm_match_fhandle_request(packet_info *pinfo, proto_tree *tree)
+{
+ nlm_msg_res_matched_data *md;
+
+ md=g_hash_table_lookup(nlm_msg_res_matched, (gconstpointer)pinfo->fd->num);
+ if(md && md->rep_frame){
+ nfs_fhandle_data_t *fhd;
+ fhd=(nfs_fhandle_data_t *)g_hash_table_lookup(
+ nfs_fhandle_frame_table,
+ (gconstpointer)md->rep_frame);
+ if(fhd){
+ dissect_fhandle_hidden(pinfo,
+ tree, fhd);
+ }
+ }
+}
+
+static void
+nlm_register_unmatched_res(packet_info *pinfo, tvbuff_t *tvb, int offset)
+{
+ nlm_msg_res_unmatched_data umd;
+ nlm_msg_res_unmatched_data *old_umd;
+
+ umd.cookie_len=tvb_get_ntohl(tvb, offset);
+ umd.cookie=(const char *)tvb_get_ptr(tvb, offset+4, -1);
+
+ /* have we seen this cookie before? */
+ old_umd=g_hash_table_lookup(nlm_msg_res_unmatched, (gconstpointer)&umd);
+ if(old_umd){
+ nlm_msg_res_matched_data *md;
+
+ md=g_malloc(sizeof(nlm_msg_res_matched_data));
+ md->req_frame=old_umd->req_frame;
+ md->rep_frame=pinfo->fd->num;
+ md->ns=old_umd->ns;
+ g_hash_table_insert(nlm_msg_res_matched, (gpointer)md->req_frame, (gpointer)md);
+ g_hash_table_insert(nlm_msg_res_matched, (gpointer)md->rep_frame, (gpointer)md);
+
+ g_hash_table_remove(nlm_msg_res_unmatched, (gconstpointer)old_umd);
+ g_free((gpointer)old_umd->cookie);
+ g_free(old_umd);
+ }
+}
+
+static void
+nlm_register_unmatched_msg(packet_info *pinfo, tvbuff_t *tvb, int offset)
+{
+ nlm_msg_res_unmatched_data *umd;
+ nlm_msg_res_unmatched_data *old_umd;
+
+ /* allocate and build the unmatched structure for this request */
+ umd=g_malloc(sizeof(nlm_msg_res_unmatched_data));
+ umd->req_frame=pinfo->fd->num;
+ umd->ns.secs=pinfo->fd->abs_secs;
+ umd->ns.nsecs=pinfo->fd->abs_usecs*1000;
+ umd->cookie_len=tvb_get_ntohl(tvb, offset);
+ umd->cookie=tvb_memdup(tvb, offset+4, umd->cookie_len);
+
+ /* remove any old duplicates */
+ old_umd=g_hash_table_lookup(nlm_msg_res_unmatched, (gconstpointer)umd);
+ if(old_umd){
+ g_hash_table_remove(nlm_msg_res_unmatched, (gconstpointer)old_umd);
+ g_free((gpointer)old_umd->cookie);
+ g_free(old_umd);
+ }
+
+ /* add new one */
+ g_hash_table_insert(nlm_msg_res_unmatched, (gpointer)umd, (gpointer)umd);
+}
+
+
+
+
+static const value_string names_nlm_stats[] =
+{
+ /* NLM_GRANTED is the function number 5 and the state code 0.
+ * So we use for the state the postfix _S.
+ */
+#define NLM_GRANTED_S 0
+ { NLM_GRANTED_S, "NLM_GRANTED" },
+#define NLM_DENIED 1
+ { NLM_DENIED, "NLM_DENIED" },
+#define NLM_DENIED_NOLOCKS 2
+ { NLM_DENIED_NOLOCKS, "NLM_DENIED_NOLOCKS" },
+#define NLM_BLOCKED 3
+ { NLM_BLOCKED, "NLM_BLOCKED" },
+#define NLM_DENIED_GRACE_PERIOD 4
+ { NLM_DENIED_GRACE_PERIOD, "NLM_DENIED_GRACE_PERIOD" },
+#define NLM_DEADLCK 5
+ { NLM_DEADLCK, "NLM_DEADLCK" },
+#define NLM_ROFS 6
+ { NLM_ROFS, "NLM_ROFS" },
+#define NLM_STALE_FH 7
+ { NLM_STALE_FH, "NLM_STALE_FH" },
+#define NLM_BIG 8
+ { NLM_BIG, "NLM_BIG" },
+#define NLM_FAILED 9
+ { NLM_FAILED, "NLM_FAILED" },
+ { 0, NULL }
+};
+
+
+static const value_string names_fsh_mode[] =
+{
+#define FSM_DN 0
+ { FSM_DN, "deny none" },
+#define FSM_DR 1
+ { FSM_DR, "deny read" },
+#define FSM_DW 2
+ { FSM_DW, "deny write" },
+#define FSM_DRW 3
+ { FSM_DRW, "deny read/write" },
+
+ { 0, NULL }
+};
+
+
+static const value_string names_fsh_access[] =
+{
+#define FSA_NONE 0
+ { FSA_NONE, "no access" },
+#define FSA_R 1
+ { FSA_R, "read-only" },
+#define FSA_W 2
+ { FSA_W, "write-only" },
+#define FSA_RW 3
+ { FSA_RW, "read/write" },
+ { 0, NULL }
+};
+
+
+
+
+
+
+/* **************************** */
+/* generic dissecting functions */
+/* **************************** */
+static int
+dissect_lock(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, int version, int offset)
+{
+ proto_item* lock_item = NULL;
+ proto_tree* lock_tree = NULL;
+
+ if (tree) {
+ lock_item = proto_tree_add_item(tree, hf_nlm_lock, tvb,
+ offset, -1, FALSE);
+ if (lock_item)
+ lock_tree = proto_item_add_subtree(lock_item, ett_nlm_lock);
+ }
+
+ offset = dissect_rpc_string(tvb,lock_tree,
+ hf_nlm_lock_caller_name, offset, NULL);
+ offset = dissect_nfs_fh3(tvb, offset, pinfo, lock_tree, "fh", NULL);
+
+ offset = dissect_rpc_data(tvb, lock_tree, hf_nlm_lock_owner, offset);
+
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_lock_svid, offset);
+
+ if (version == 4) {
+ offset = dissect_rpc_uint64(tvb, lock_tree, hf_nlm_lock_l_offset64, offset);
+ offset = dissect_rpc_uint64(tvb, lock_tree, hf_nlm_lock_l_len64, offset);
+ }
+ else {
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_lock_l_offset, offset);
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_lock_l_len, offset);
+ }
+
+ return offset;
+}
+
+
+static int
+dissect_nlm_test(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree, int version)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==6){ /* NLM_TEST_MSG */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_msg(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_request(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_request(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ dissect_rpc_bool(tvb, tree, hf_nlm_exclusive, offset);
+ offset += 4;
+ offset = dissect_lock(tvb, pinfo, tree, version, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_lock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree,int version)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==7){ /* NLM_LOCK_MSG */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_msg(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_request(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_request(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_block, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_exclusive, offset);
+ offset = dissect_lock(tvb, pinfo, tree, version, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_reclaim, offset);
+ offset = dissect_rpc_uint32(tvb, tree, hf_nlm_state, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_cancel(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree,int version)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==8){ /* NLM_CANCEL_MSG */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_msg(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_request(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_request(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_block, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_exclusive, offset);
+ offset = dissect_lock(tvb, pinfo, tree, version, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_unlock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree,int version)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==9){ /* NLM_UNLOCK_MSG */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_msg(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_request(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_request(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_lock(tvb, pinfo, tree, version, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_granted(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree,int version)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==10){ /* NLM_GRANTED_MSG */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_msg(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_request(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_request(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_exclusive, offset);
+ offset = dissect_lock(tvb, pinfo, tree, version, offset);
+ return offset;
+}
+
+
+static int
+dissect_nlm_test_res(tvbuff_t *tvb, int offset, packet_info *pinfo _U_,
+ proto_tree *tree,int version)
+{
+ proto_item* lock_item = NULL;
+ proto_tree* lock_tree = NULL;
+
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if(rpc_call->proc==11){ /* NLM_TEST_RES */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_res(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_reply(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_reply(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+
+ if (tree) {
+ lock_item = proto_tree_add_item(tree, hf_nlm_test_stat, tvb,
+ offset, -1, FALSE);
+ if (lock_item)
+ lock_tree = proto_item_add_subtree(lock_item,
+ ett_nlm_lock);
+ }
+
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_test_stat_stat,
+ offset);
+
+ /* last structure is optional, only supplied for stat==1 (LOCKED) */
+ if(tvb_reported_length_remaining(tvb, offset) == 0){
+ return offset;
+ }
+
+ if (tree) {
+ lock_item = proto_tree_add_item(lock_tree, hf_nlm_holder, tvb,
+ offset, -1, FALSE);
+ if (lock_item)
+ lock_tree = proto_item_add_subtree(lock_item,
+ ett_nlm_lock);
+ }
+
+ offset = dissect_rpc_bool(tvb, lock_tree, hf_nlm_exclusive,
+ offset);
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_lock_svid,
+ offset);
+ offset = dissect_rpc_data(tvb, lock_tree, hf_nlm_lock_owner,
+ offset);
+
+ if (version == 4) {
+ offset = dissect_rpc_uint64(tvb, lock_tree,
+ hf_nlm_lock_l_offset64, offset);
+ offset = dissect_rpc_uint64(tvb, lock_tree,
+ hf_nlm_lock_l_len64, offset);
+ }
+ else {
+ offset = dissect_rpc_uint32(tvb, lock_tree,
+ hf_nlm_lock_l_offset, offset);
+ offset = dissect_rpc_uint32(tvb, lock_tree,
+ hf_nlm_lock_l_len, offset);
+ }
+
+ return offset;
+}
+
+
+static int
+dissect_nlm_share(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree,int version _U_)
+{
+ proto_item* lock_item = NULL;
+ proto_tree* lock_tree = NULL;
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+
+ if (tree) {
+ lock_item = proto_tree_add_item(tree, hf_nlm_share, tvb,
+ offset, -1, FALSE);
+ if (lock_item)
+ lock_tree = proto_item_add_subtree(lock_item,
+ ett_nlm_lock);
+ }
+
+ offset = dissect_rpc_string(tvb,lock_tree,
+ hf_nlm_lock_caller_name, offset, NULL);
+
+ offset = dissect_nfs_fh3(tvb, offset, pinfo, lock_tree, "fh", NULL);
+
+ offset = dissect_rpc_data(tvb, lock_tree, hf_nlm_lock_owner, offset);
+
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_share_mode, offset);
+ offset = dissect_rpc_uint32(tvb, lock_tree, hf_nlm_share_access, offset);
+
+
+ offset = dissect_rpc_bool(tvb, tree, hf_nlm_reclaim, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_shareres(tvbuff_t *tvb, int offset, packet_info *pinfo _U_,
+ proto_tree *tree, int version _U_)
+{
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_rpc_uint32(tvb, tree, hf_nlm_stat, offset);
+ offset = dissect_rpc_uint32(tvb, tree, hf_nlm_sequence, offset);
+ return offset;
+}
+
+static int
+dissect_nlm_freeall(tvbuff_t *tvb, int offset, packet_info *pinfo _U_,
+ proto_tree *tree,int version _U_)
+{
+ offset = dissect_rpc_string(tvb,tree,
+ hf_nlm_share_name, offset, NULL);
+
+ offset = dissect_rpc_uint32(tvb, tree, hf_nlm_stat, offset);
+
+ return offset;
+}
+
+
+/* RPC functions */
+
+
+/* This function is identical for all NLM protocol versions (1-4)*/
+static int
+dissect_nlm_gen_reply(tvbuff_t *tvb, int offset, packet_info *pinfo _U_,
+ proto_tree *tree)
+{
+ if(nlm_match_msgres){
+ rpc_call_info_value *rpc_call=pinfo->private_data;
+ if((rpc_call->proc==12) /* NLM_LOCK_RES */
+ || (rpc_call->proc==13) /* NLM_CANCEL_RES */
+ || (rpc_call->proc==14) /* NLM_UNLOCK_RES */
+ || (rpc_call->proc==15) ){ /* NLM_GRENTED_RES */
+ if( (!pinfo->fd->flags.visited) ){
+ nlm_register_unmatched_res(pinfo, tvb, offset);
+ } else {
+ nlm_print_msgres_reply(pinfo, tree, tvb);
+ }
+ /* for the fhandle matching that finds both request and
+ response packet */
+ if(nfs_fhandle_reqrep_matching){
+ nlm_match_fhandle_reply(pinfo, tree);
+ }
+ }
+ }
+
+ offset = dissect_rpc_data(tvb, tree, hf_nlm_cookie, offset);
+ offset = dissect_rpc_uint32(tvb, tree, hf_nlm_stat, offset);
+ return offset;
+}
+
+static int
+dissect_nlm1_test(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_test(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_test(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_test(tvb,offset,pinfo,tree,4);
+}
+
+
+static int
+dissect_nlm1_lock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_lock(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_lock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_lock(tvb,offset,pinfo,tree,4);
+}
+
+
+static int
+dissect_nlm1_cancel(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_cancel(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_cancel(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_cancel(tvb,offset,pinfo,tree,4);
+}
+
+
+static int
+dissect_nlm1_unlock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_unlock(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_unlock(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_unlock(tvb,offset,pinfo,tree,4);
+}
+
+
+static int
+dissect_nlm1_granted(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_granted(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_granted(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_granted(tvb,offset,pinfo,tree,4);
+}
+
+
+static int
+dissect_nlm1_test_res(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_test_res(tvb,offset,pinfo,tree,1);
+}
+
+static int
+dissect_nlm4_test_res(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_test_res(tvb,offset,pinfo,tree,4);
+}
+
+static int
+dissect_nlm3_share(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_share(tvb,offset,pinfo,tree,3);
+}
+
+static int
+dissect_nlm4_share(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_share(tvb,offset,pinfo,tree,4);
+}
+
+static int
+dissect_nlm3_shareres(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_shareres(tvb,offset,pinfo,tree,3);
+}
+
+static int
+dissect_nlm4_shareres(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_shareres(tvb,offset,pinfo,tree,4);
+}
+
+static int
+dissect_nlm3_freeall(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_freeall(tvb,offset,pinfo,tree,3);
+}
+
+static int
+dissect_nlm4_freeall(tvbuff_t *tvb, int offset, packet_info *pinfo,
+ proto_tree *tree)
+{
+ return dissect_nlm_freeall(tvb,offset,pinfo,tree,4);
+}
+
+
+
+
+/* proc number, "proc name", dissect_request, dissect_reply */
+/* NULL as function pointer means: type of arguments is "void". */
+/* NLM protocol version 1 */
+static const vsff nlm1_proc[] = {
+ { NLM_NULL, "NULL",
+ NULL, NULL },
+ { NLM_TEST, "TEST",
+ dissect_nlm1_test, dissect_nlm1_test_res },
+ { NLM_LOCK, "LOCK",
+ dissect_nlm1_lock, dissect_nlm_gen_reply },
+ { NLM_CANCEL, "CANCEL",
+ dissect_nlm1_cancel, dissect_nlm_gen_reply },
+ { NLM_UNLOCK, "UNLOCK",
+ dissect_nlm1_unlock, dissect_nlm_gen_reply },
+ { NLM_GRANTED, "GRANTED",
+ dissect_nlm1_granted, dissect_nlm_gen_reply },
+ { NLM_TEST_MSG, "TEST_MSG",
+ dissect_nlm1_test, NULL },
+ { NLM_LOCK_MSG, "LOCK_MSG",
+ dissect_nlm1_lock, NULL },
+ { NLM_CANCEL_MSG, "CANCEL_MSG",
+ dissect_nlm1_cancel, NULL },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG",
+ dissect_nlm1_unlock, NULL },
+ { NLM_GRANTED_MSG, "GRANTED_MSG",
+ dissect_nlm1_granted, NULL },
+ { NLM_TEST_RES, "TEST_RES",
+ dissect_nlm1_test_res, NULL },
+ { NLM_LOCK_RES, "LOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_CANCEL_RES, "CANCEL_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_UNLOCK_RES, "UNLOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_GRANTED_RES, "GRANTED_RES",
+ dissect_nlm_gen_reply, NULL },
+ { 0, NULL,
+ NULL, NULL }
+};
+static const value_string nlm1_proc_vals[] = {
+ { NLM_NULL, "NULL" },
+ { NLM_TEST, "TEST" },
+ { NLM_LOCK, "LOCK" },
+ { NLM_CANCEL, "CANCEL" },
+ { NLM_UNLOCK, "UNLOCK" },
+ { NLM_GRANTED, "GRANTED" },
+ { NLM_TEST_MSG, "TEST_MSG" },
+ { NLM_LOCK_MSG, "LOCK_MSG" },
+ { NLM_CANCEL_MSG, "CANCEL_MSG" },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG" },
+ { NLM_GRANTED_MSG, "GRANTED_MSG" },
+ { NLM_TEST_RES, "TEST_RES" },
+ { NLM_LOCK_RES, "LOCK_RES" },
+ { NLM_CANCEL_RES, "CANCEL_RES" },
+ { NLM_UNLOCK_RES, "UNLOCK_RES" },
+ { NLM_GRANTED_RES, "GRANTED_RES" },
+ { 0, NULL }
+};
+/* end of NLM protocol version 1 */
+
+/* NLM protocol version 2 */
+static const vsff nlm2_proc[] = {
+ { NLM_NULL, "NULL",
+ NULL, NULL },
+ { NLM_TEST, "TEST",
+ dissect_nlm1_test, dissect_nlm1_test_res },
+ { NLM_LOCK, "LOCK",
+ dissect_nlm1_lock, dissect_nlm_gen_reply },
+ { NLM_CANCEL, "CANCEL",
+ dissect_nlm1_cancel, dissect_nlm_gen_reply },
+ { NLM_UNLOCK, "UNLOCK",
+ dissect_nlm1_unlock, dissect_nlm_gen_reply },
+ { NLM_GRANTED, "GRANTED",
+ dissect_nlm1_granted, dissect_nlm_gen_reply },
+ { NLM_TEST_MSG, "TEST_MSG",
+ dissect_nlm1_test, NULL },
+ { NLM_LOCK_MSG, "LOCK_MSG",
+ dissect_nlm1_lock, NULL },
+ { NLM_CANCEL_MSG, "CANCEL_MSG",
+ dissect_nlm1_cancel, NULL },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG",
+ dissect_nlm1_unlock, NULL },
+ { NLM_GRANTED_MSG, "GRANTED_MSG",
+ dissect_nlm1_granted, NULL },
+ { NLM_TEST_RES, "TEST_RES",
+ dissect_nlm1_test_res, NULL },
+ { NLM_LOCK_RES, "LOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_CANCEL_RES, "CANCEL_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_UNLOCK_RES, "UNLOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_GRANTED_RES, "GRANTED_RES",
+ dissect_nlm_gen_reply, NULL },
+ { 0, NULL,
+ NULL, NULL }
+};
+static const value_string nlm2_proc_vals[] = {
+ { NLM_NULL, "NULL" },
+ { NLM_TEST, "TEST" },
+ { NLM_LOCK, "LOCK" },
+ { NLM_CANCEL, "CANCEL" },
+ { NLM_UNLOCK, "UNLOCK" },
+ { NLM_GRANTED, "GRANTED" },
+ { NLM_TEST_MSG, "TEST_MSG" },
+ { NLM_LOCK_MSG, "LOCK_MSG" },
+ { NLM_CANCEL_MSG, "CANCEL_MSG" },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG" },
+ { NLM_GRANTED_MSG, "GRANTED_MSG" },
+ { NLM_TEST_RES, "TEST_RES" },
+ { NLM_LOCK_RES, "LOCK_RES" },
+ { NLM_CANCEL_RES, "CANCEL_RES" },
+ { NLM_UNLOCK_RES, "UNLOCK_RES" },
+ { NLM_GRANTED_RES, "GRANTED_RES" },
+ { 0, NULL }
+};
+/* end of NLM protocol version 2 */
+
+/* NLM protocol version 3 */
+static const vsff nlm3_proc[] = {
+ { NLM_NULL, "NULL",
+ NULL, NULL },
+ { NLM_TEST, "TEST",
+ dissect_nlm1_test, dissect_nlm1_test_res },
+ { NLM_LOCK, "LOCK",
+ dissect_nlm1_lock, dissect_nlm_gen_reply },
+ { NLM_CANCEL, "CANCEL",
+ dissect_nlm1_cancel, dissect_nlm_gen_reply },
+ { NLM_UNLOCK, "UNLOCK",
+ dissect_nlm1_unlock, dissect_nlm_gen_reply },
+ { NLM_GRANTED, "GRANTED",
+ dissect_nlm1_granted, dissect_nlm_gen_reply },
+ { NLM_TEST_MSG, "TEST_MSG",
+ dissect_nlm1_test, NULL },
+ { NLM_LOCK_MSG, "LOCK_MSG",
+ dissect_nlm1_lock, NULL },
+ { NLM_CANCEL_MSG, "CANCEL_MSG",
+ dissect_nlm1_cancel, NULL },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG",
+ dissect_nlm1_unlock, NULL },
+ { NLM_GRANTED_MSG, "GRANTED_MSG",
+ dissect_nlm1_granted, NULL },
+ { NLM_TEST_RES, "TEST_RES",
+ dissect_nlm1_test_res, NULL },
+ { NLM_LOCK_RES, "LOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_CANCEL_RES, "CANCEL_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_UNLOCK_RES, "UNLOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_GRANTED_RES, "GRANTED_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_SHARE, "SHARE",
+ dissect_nlm3_share, dissect_nlm3_shareres },
+ { NLM_UNSHARE, "UNSHARE",
+ dissect_nlm3_share, dissect_nlm3_shareres },
+ { NLM_NM_LOCK, "NM_LOCK",
+ dissect_nlm1_lock, dissect_nlm_gen_reply },
+ { NLM_FREE_ALL, "FREE_ALL",
+ dissect_nlm3_freeall, NULL },
+ { 0, NULL,
+ NULL, NULL }
+};
+static const value_string nlm3_proc_vals[] = {
+ { NLM_NULL, "NULL" },
+ { NLM_TEST, "TEST" },
+ { NLM_LOCK, "LOCK" },
+ { NLM_CANCEL, "CANCEL" },
+ { NLM_UNLOCK, "UNLOCK" },
+ { NLM_GRANTED, "GRANTED" },
+ { NLM_TEST_MSG, "TEST_MSG" },
+ { NLM_LOCK_MSG, "LOCK_MSG" },
+ { NLM_CANCEL_MSG, "CANCEL_MSG" },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG" },
+ { NLM_GRANTED_MSG, "GRANTED_MSG" },
+ { NLM_TEST_RES, "TEST_RES" },
+ { NLM_LOCK_RES, "LOCK_RES" },
+ { NLM_CANCEL_RES, "CANCEL_RES" },
+ { NLM_UNLOCK_RES, "UNLOCK_RES" },
+ { NLM_GRANTED_RES, "GRANTED_RES" },
+ { NLM_SHARE, "SHARE" },
+ { NLM_UNSHARE, "UNSHARE" },
+ { NLM_NM_LOCK, "NM_LOCK" },
+ { NLM_FREE_ALL, "FREE_ALL" },
+ { 0, NULL }
+};
+/* end of NLM protocol version 3 */
+
+
+/* NLM protocol version 4 */
+static const vsff nlm4_proc[] = {
+ { NLM_NULL, "NULL",
+ NULL, NULL },
+ { NLM_TEST, "TEST",
+ dissect_nlm4_test, dissect_nlm4_test_res },
+ { NLM_LOCK, "LOCK",
+ dissect_nlm4_lock, dissect_nlm_gen_reply },
+ { NLM_CANCEL, "CANCEL",
+ dissect_nlm4_cancel, dissect_nlm_gen_reply },
+ { NLM_UNLOCK, "UNLOCK",
+ dissect_nlm4_unlock, dissect_nlm_gen_reply },
+ { NLM_GRANTED, "GRANTED",
+ dissect_nlm4_granted, dissect_nlm_gen_reply },
+ { NLM_TEST_MSG, "TEST_MSG",
+ dissect_nlm4_test, NULL },
+ { NLM_LOCK_MSG, "LOCK_MSG",
+ dissect_nlm4_lock, NULL },
+ { NLM_CANCEL_MSG, "CANCEL_MSG",
+ dissect_nlm4_cancel, NULL },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG",
+ dissect_nlm4_unlock, NULL },
+ { NLM_GRANTED_MSG, "GRANTED_MSG",
+ dissect_nlm4_granted, NULL },
+ { NLM_TEST_RES, "TEST_RES",
+ dissect_nlm4_test_res, NULL },
+ { NLM_LOCK_RES, "LOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_CANCEL_RES, "CANCEL_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_UNLOCK_RES, "UNLOCK_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_GRANTED_RES, "GRANTED_RES",
+ dissect_nlm_gen_reply, NULL },
+ { NLM_SHARE, "SHARE",
+ dissect_nlm4_share, dissect_nlm4_shareres },
+ { NLM_UNSHARE, "UNSHARE",
+ dissect_nlm4_share, dissect_nlm4_shareres },
+ { NLM_NM_LOCK, "NM_LOCK",
+ dissect_nlm4_lock, dissect_nlm_gen_reply },
+ { NLM_FREE_ALL, "FREE_ALL",
+ dissect_nlm4_freeall, NULL },
+ { 0, NULL,
+ NULL, NULL }
+};
+static const value_string nlm4_proc_vals[] = {
+ { NLM_NULL, "NULL" },
+ { NLM_TEST, "TEST" },
+ { NLM_LOCK, "LOCK" },
+ { NLM_CANCEL, "CANCEL" },
+ { NLM_UNLOCK, "UNLOCK" },
+ { NLM_GRANTED, "GRANTED" },
+ { NLM_TEST_MSG, "TEST_MSG" },
+ { NLM_LOCK_MSG, "LOCK_MSG" },
+ { NLM_CANCEL_MSG, "CANCEL_MSG" },
+ { NLM_UNLOCK_MSG, "UNLOCK_MSG" },
+ { NLM_GRANTED_MSG, "GRANTED_MSG" },
+ { NLM_TEST_RES, "TEST_RES" },
+ { NLM_LOCK_RES, "LOCK_RES" },
+ { NLM_CANCEL_RES, "CANCEL_RES" },
+ { NLM_UNLOCK_RES, "UNLOCK_RES" },
+ { NLM_GRANTED_RES, "GRANTED_RES" },
+ { NLM_SHARE, "SHARE" },
+ { NLM_UNSHARE, "UNSHARE" },
+ { NLM_NM_LOCK, "NM_LOCK" },
+ { NLM_FREE_ALL, "FREE_ALL" },
+ { 0, NULL }
+};
+/* end of NLM protocol version 4 */
+
+
+static struct true_false_string yesno = { "Yes", "No" };
+
+
+void
+proto_register_nlm(void)
+{
+ static hf_register_info hf[] = {
+ { &hf_nlm_procedure_v1, {
+ "V1 Procedure", "nlm.procedure_v1", FT_UINT32, BASE_DEC,
+ VALS(nlm1_proc_vals), 0, "V1 Procedure", HFILL }},
+ { &hf_nlm_procedure_v2, {
+ "V2 Procedure", "nlm.procedure_v2", FT_UINT32, BASE_DEC,
+ VALS(nlm2_proc_vals), 0, "V2 Procedure", HFILL }},
+ { &hf_nlm_procedure_v3, {
+ "V3 Procedure", "nlm.procedure_v3", FT_UINT32, BASE_DEC,
+ VALS(nlm3_proc_vals), 0, "V3 Procedure", HFILL }},
+ { &hf_nlm_procedure_v4, {
+ "V4 Procedure", "nlm.procedure_v4", FT_UINT32, BASE_DEC,
+ VALS(nlm4_proc_vals), 0, "V4 Procedure", HFILL }},
+ { &hf_nlm_cookie, {
+ "cookie", "nlm.cookie", FT_BYTES, BASE_DEC,
+ NULL, 0, "cookie", HFILL }},
+ { &hf_nlm_block, {
+ "block", "nlm.block", FT_BOOLEAN, BASE_NONE,
+ &yesno, 0, "block", HFILL }},
+ { &hf_nlm_exclusive, {
+ "exclusive", "nlm.exclusive", FT_BOOLEAN, BASE_NONE,
+ &yesno, 0, "exclusive", HFILL }},
+ { &hf_nlm_lock, {
+ "lock", "nlm.lock", FT_NONE, 0,
+ NULL, 0, "lock", HFILL }},
+ { &hf_nlm_lock_caller_name, {
+ "caller_name", "nlm.lock.caller_name", FT_STRING, BASE_NONE,
+ NULL, 0, "caller_name", HFILL }},
+ { &hf_nlm_lock_owner, {
+ "owner", "nlm.lock.owner", FT_BYTES, BASE_DEC,
+ NULL, 0, "owner", HFILL }},
+ { &hf_nlm_lock_svid, {
+ "svid", "nlm.lock.svid", FT_UINT32, BASE_DEC,
+ NULL, 0, "svid", HFILL }},
+ { &hf_nlm_lock_l_offset64, {
+ "l_offset", "nlm.lock.l_offset", FT_UINT64, BASE_DEC,
+ NULL, 0, "l_offset", HFILL }},
+ { &hf_nlm_lock_l_offset, {
+ "l_offset", "nlm.lock.l_offset", FT_UINT32, BASE_DEC,
+ NULL, 0, "l_offset", HFILL }},
+ { &hf_nlm_lock_l_len64, {
+ "l_len", "nlm.lock.l_len", FT_UINT64, BASE_DEC,
+ NULL, 0, "l_len", HFILL }},
+ { &hf_nlm_lock_l_len, {
+ "l_len", "nlm.lock.l_len", FT_UINT32, BASE_DEC,
+ NULL, 0, "l_len", HFILL }},
+ { &hf_nlm_reclaim, {
+ "reclaim", "nlm.reclaim", FT_BOOLEAN, BASE_NONE,
+ &yesno, 0, "reclaim", HFILL }},
+ { &hf_nlm_state, {
+ "state", "nlm.state", FT_UINT32, BASE_DEC,
+ NULL, 0, "STATD state", HFILL }},
+ { &hf_nlm_stat, {
+ "stat", "nlm.stat", FT_UINT32, BASE_DEC,
+ VALS(names_nlm_stats), 0, "stat", HFILL }},
+ { &hf_nlm_test_stat, {
+ "test_stat", "nlm.test_stat", FT_NONE, 0,
+ NULL, 0, "test_stat", HFILL }},
+ { &hf_nlm_test_stat_stat, {
+ "stat", "nlm.test_stat.stat", FT_UINT32, BASE_DEC,
+ VALS(names_nlm_stats), 0, "stat", HFILL }},
+ { &hf_nlm_holder, {
+ "holder", "nlm.holder", FT_NONE, 0,
+ NULL, 0, "holder", HFILL }},
+ { &hf_nlm_share, {
+ "share", "nlm.share", FT_NONE, 0,
+ NULL, 0, "share", HFILL }},
+ { &hf_nlm_share_mode, {
+ "mode", "nlm.share.mode", FT_UINT32, BASE_DEC,
+ VALS(names_fsh_mode), 0, "mode", HFILL }},
+ { &hf_nlm_share_access, {
+ "access", "nlm.share.access", FT_UINT32, BASE_DEC,
+ VALS(names_fsh_access), 0, "access", HFILL }},
+ { &hf_nlm_share_name, {
+ "name", "nlm.share.name", FT_STRING, BASE_NONE,
+ NULL, 0, "name", HFILL }},
+ { &hf_nlm_sequence, {
+ "sequence", "nlm.sequence", FT_INT32, BASE_DEC,
+ NULL, 0, "sequence", HFILL }},
+ { &hf_nlm_request_in, {
+ "Request MSG in", "nlm.msg_in", FT_UINT32, BASE_DEC,
+ NULL, 0, "The RES packet is a response to the MSG in this packet", HFILL }},
+ { &hf_nlm_reply_in, {
+ "Reply RES in", "nlm.res_in", FT_UINT32, BASE_DEC,
+ NULL, 0, "The response to this MSG packet is in this packet", HFILL }},
+ { &hf_nlm_time, {
+ "Time from request", "nlm.time", FT_RELATIVE_TIME, BASE_NONE,
+ NULL, 0, "Time between Request and Reply for async NLM calls", HFILL }},
+
+ };
+
+ static gint *ett[] = {
+ &ett_nlm,
+ &ett_nlm_lock,
+ };
+ module_t *nlm_module;
+
+ proto_nlm = proto_register_protocol("Network Lock Manager Protocol",
+ "NLM", "nlm");
+ proto_register_field_array(proto_nlm, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+
+ nlm_module = prefs_register_protocol(proto_nlm, NULL);
+ prefs_register_bool_preference(nlm_module, "msg_res_matching",
+ "Match MSG/RES packets for async NLM",
+ "Whether the dissector will track and match MSG and RES calls for asynchronous NLM",
+ &nlm_match_msgres);
+ register_init_routine(nlm_msg_res_match_init);
+}
+
+void
+proto_reg_handoff_nlm(void)
+{
+ /* Register the protocol as RPC */
+ rpc_init_prog(proto_nlm, NLM_PROGRAM, ett_nlm);
+ /* Register the procedure tables */
+ rpc_init_proc_table(NLM_PROGRAM, 1, nlm1_proc, hf_nlm_procedure_v1);
+ rpc_init_proc_table(NLM_PROGRAM, 2, nlm2_proc, hf_nlm_procedure_v2);
+ rpc_init_proc_table(NLM_PROGRAM, 3, nlm3_proc, hf_nlm_procedure_v3);
+ rpc_init_proc_table(NLM_PROGRAM, 4, nlm4_proc, hf_nlm_procedure_v4);
+}