7468db30c5243861a33660b8b508295ca3199815
[obnox/wireshark/wip.git] / epan / dissectors / packet-ipvs-syncd.c
1 /* packet-ipvs-syncd.c   2001 Ronnie Sahlberg <See AUTHORS for email>
2  * Routines for IGMP packet disassembly
3  *
4  * $Id$
5  *
6  * Wireshark - Network traffic analyzer
7  * By Gerald Combs <gerald@wireshark.org>
8  * Copyright 1998 Gerald Combs
9  *
10  * This program is free software; you can redistribute it and/or
11  * modify it under the terms of the GNU General Public License
12  * as published by the Free Software Foundation; either version 2
13  * of the License, or (at your option) any later version.
14  *
15  * This program is distributed in the hope that it will be useful,
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18  * GNU General Public License for more details.
19  *
20  * You should have received a copy of the GNU General Public License
21  * along with this program; if not, write to the Free Software
22  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
23  */
24
25 #ifdef HAVE_CONFIG_H
26 # include "config.h"
27 #endif
28
29 #include <stdio.h>
30 #include <string.h>
31 #include <glib.h>
32
33 #include <epan/packet.h>
34 #include <epan/ipproto.h>
35 #include <epan/in_cksum.h>
36
37 static int proto_ipvs_syncd = -1;
38 static int hf_conn_count = -1;
39 static int hf_syncid = -1;
40 static int hf_size = -1;
41 static int hf_resv8 = -1;
42 static int hf_proto = -1;
43 static int hf_cport = -1;
44 static int hf_vport = -1;
45 static int hf_dport = -1;
46 static int hf_caddr = -1;
47 static int hf_vaddr = -1;
48 static int hf_daddr = -1;
49 static int hf_flags = -1;
50 static int hf_state = -1;
51 static int hf_in_seq_init = -1;
52 static int hf_in_seq_delta = -1;
53 static int hf_in_seq_pdelta = -1;
54 static int hf_out_seq_init = -1;
55 static int hf_out_seq_delta = -1;
56 static int hf_out_seq_pdelta = -1;
57
58 static int ett_ipvs_syncd = -1;
59 static int ett_conn = -1;
60 static int ett_flags = -1;
61
62 #define IPVS_SYNCD_MC_GROUP "224.0.0.18"
63 #define IPVS_SYNCD_PORT 8848
64
65 static const value_string proto_strings[] = {
66         {0x06, "UDP"},
67         {0x11, "TCP"},
68         {0x00, NULL},
69 };
70
71 static const value_string state_strings[] = {
72         {0x00, "Input"},
73         {0x04, "Output"},
74         {0x08, "Input Only"},
75         {0x00, NULL},
76 };
77
78 /*
79  *  IPVS Connection Flags
80  *  Pulled from include/net/ip_vs.h in linux kernel source
81  */
82 #define IP_VS_CONN_F_FWD_MASK         0x0007    /* mask for the fwd methods */
83 #define IP_VS_CONN_F_MASQ             0x0000    /* masquerading */
84 #define IP_VS_CONN_F_LOCALNODE        0x0001    /* local node */
85 #define IP_VS_CONN_F_TUNNEL           0x0002    /* tunneling */
86 #define IP_VS_CONN_F_DROUTE           0x0003    /* direct routing */
87 #define IP_VS_CONN_F_BYPASS           0x0004    /* cache bypass */
88 #define IP_VS_CONN_F_HASHED           0x0040    /* hashed entry */
89 #define IP_VS_CONN_F_NOOUTPUT         0x0080    /* no output packets */
90 #define IP_VS_CONN_F_INACTIVE         0x0100    /* not established */
91 #define IP_VS_CONN_F_OUT_SEQ          0x0200    /* must do output seq adjust */
92 #define IP_VS_CONN_F_IN_SEQ           0x0400    /* must do input seq adjust */
93 #define IP_VS_CONN_F_SEQ_MASK         0x0600    /* in/out sequence mask */
94 #define IP_VS_CONN_F_NO_CPORT         0x0800    /* no client port set yet */
95
96
97 static void
98 dissect_ipvs_syncd(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree)
99 {
100         proto_tree *tree;
101         proto_item *item;
102         int offset = 0;
103         guint8 cnt = 0;
104         int conn = 0;
105
106         item = proto_tree_add_item(parent_tree, proto_ipvs_syncd, tvb, offset, -1, FALSE);
107         tree = proto_item_add_subtree(item, ett_ipvs_syncd);
108
109
110         if (check_col(pinfo->cinfo, COL_PROTOCOL)) {
111                 col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPVS");
112         }
113         if (check_col(pinfo->cinfo, COL_INFO)) {
114                 col_clear(pinfo->cinfo, COL_INFO);
115         }
116
117         cnt = tvb_get_guint8(tvb, offset);
118         proto_tree_add_item(tree, hf_conn_count, tvb, offset, 1, FALSE);
119         offset += 1;
120
121         proto_tree_add_item(tree, hf_syncid, tvb, offset, 1, FALSE);
122         offset += 1;
123
124         proto_tree_add_item(tree, hf_size, tvb, offset, 2, TRUE);
125         offset += 2;
126
127         for (conn = 0; conn < cnt; conn++)
128         {
129                 proto_tree *ctree, *ti; 
130                 proto_tree *ftree, *fi;
131                 guint16 flags; 
132
133                 ti = proto_tree_add_text(tree, tvb, offset, 24, "Connection #%d", conn+1);
134                 ctree = proto_item_add_subtree(ti, ett_conn);
135
136                 proto_tree_add_item(ctree, hf_resv8, tvb, offset, 1, FALSE);
137                 offset += 1;
138                 
139                 proto_tree_add_item(ctree, hf_proto, tvb, offset, 1, FALSE);
140                 offset += 1;
141                 
142                 proto_tree_add_item(ctree, hf_cport, tvb, offset, 2, FALSE);
143                 offset += 2;
144                 
145                 proto_tree_add_item(ctree, hf_vport, tvb, offset, 2, FALSE);
146                 offset += 2;
147                 
148                 proto_tree_add_item(ctree, hf_dport, tvb, offset, 2, FALSE);
149                 offset += 2;
150                 
151                 proto_tree_add_item(ctree, hf_caddr, tvb, offset, 4, FALSE);
152                 offset += 4;
153                 
154                 proto_tree_add_item(ctree, hf_vaddr, tvb, offset, 4, FALSE);
155                 offset += 4;
156                 
157                 proto_tree_add_item(ctree, hf_daddr, tvb, offset, 4, FALSE);
158                 offset += 4;
159                 
160                 flags = tvb_get_ntohs(tvb, offset);
161                 fi = proto_tree_add_item(ctree, hf_flags, tvb, offset, 2, FALSE);
162                 ftree = proto_item_add_subtree(fi, ett_flags);
163
164                 if ( (flags & 0x0F) == IP_VS_CONN_F_MASQ )
165                 {
166                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Connection Type: Masquerade");
167                 }
168                 else if ( (flags & 0x0F) == IP_VS_CONN_F_LOCALNODE )
169                 {
170                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Connection Type: Local Node");
171                 }
172                 else if ( (flags & 0x0F) == IP_VS_CONN_F_TUNNEL )
173                 {
174                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Connection Type: Tunnel");
175                 }
176                 else if ( (flags & 0x0F) == IP_VS_CONN_F_DROUTE )
177                 {
178                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Connection Type: Direct Routing");
179                 }
180                 else
181                 {
182                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Connection Type: Unknown (%d)", 
183                                 flags & IP_VS_CONN_F_FWD_MASK);
184                 }
185
186                 if ( flags & IP_VS_CONN_F_HASHED )
187                 {
188                         proto_tree_add_text(ftree, tvb, offset+1, 1, "Hashed Entry");
189                 }
190
191                 if ( flags & IP_VS_CONN_F_NOOUTPUT )
192                 {
193                         proto_tree_add_text(ftree, tvb, offset+1, 1, "No Output Packets");
194                 }
195
196                 if ( flags & IP_VS_CONN_F_INACTIVE )
197                 {
198                         proto_tree_add_text(ftree, tvb, offset, 1, "Connection Not Established");
199                 }
200
201                 if ( flags & IP_VS_CONN_F_OUT_SEQ )
202                 {
203                         proto_tree_add_text(ftree, tvb, offset, 1, "Adjust Output Sequence");
204                 }
205
206                 if ( flags & IP_VS_CONN_F_IN_SEQ )
207                 {
208                         proto_tree_add_text(ftree, tvb, offset, 1, "Adjust Input Sequence");
209                 }
210
211                 if ( flags & IP_VS_CONN_F_NO_CPORT )
212                 {
213                         proto_tree_add_text(ftree, tvb, offset, 1, "No Client Port Set");
214                 }
215                 
216                 offset += 2;
217                 
218                 proto_tree_add_item(ctree, hf_state, tvb, offset, 2, FALSE);
219                 offset += 2;
220                 
221                 /* we have full connection info */
222                 if ( flags & IP_VS_CONN_F_SEQ_MASK )
223                 {
224                         proto_tree_add_item(ctree, hf_in_seq_init, tvb, offset, 4, FALSE);
225                         offset += 4;
226                 
227                         proto_tree_add_item(ctree, hf_in_seq_delta, tvb, offset, 4, FALSE);
228                         offset += 4;
229                 
230                         proto_tree_add_item(ctree, hf_in_seq_pdelta, tvb, offset, 4, FALSE);
231                         offset += 4;
232                 
233                         proto_tree_add_item(ctree, hf_out_seq_init, tvb, offset, 4, FALSE);
234                         offset += 4;
235                 
236                         proto_tree_add_item(ctree, hf_out_seq_delta, tvb, offset, 4, FALSE);
237                         offset += 4;
238                 
239                         proto_tree_add_item(ctree, hf_out_seq_pdelta, tvb, offset, 4, FALSE);
240                         offset += 4;
241                 }
242                 
243         }
244 }
245
246 void
247 proto_register_ipvs_syncd(void)
248 {
249         static hf_register_info hf[] = {
250                 { &hf_conn_count,
251                         { "Connection Count", "ipvs.conncount", FT_UINT8, BASE_DEC,
252                           NULL, 0, "Connection Count", HFILL }},
253
254                 { &hf_syncid,
255                         { "Synchronization ID", "ipvs.syncid", FT_UINT8, BASE_DEC,
256                           NULL, 0, "Syncronization ID", HFILL }},
257
258                 { &hf_size,
259                         { "Size", "ipvs.size", FT_UINT16, BASE_DEC,
260                           NULL, 0, "Size", HFILL }},
261
262                 { &hf_resv8,
263                         { "Reserved", "ipvs.resv8", FT_UINT8, BASE_HEX,
264                           NULL, 0, "Reserved", HFILL }},
265
266                 { &hf_proto,
267                         { "Protocol", "ipvs.proto", FT_UINT8, BASE_HEX,
268                           VALS(&proto_strings), 0, "Protocol", HFILL }},
269
270                 { &hf_cport,
271                         { "Client Port", "ipvs.cport", FT_UINT16, BASE_DEC,
272                           NULL, 0, "Client Port", HFILL }},
273
274                 { &hf_vport,
275                         { "Virtual Port", "ipvs.vport", FT_UINT16, BASE_DEC,
276                           NULL, 0, "Virtual Port", HFILL }},
277
278                 { &hf_dport,
279                         { "Destination Port", "ipvs.dport", FT_UINT16, BASE_DEC,
280                           NULL, 0, "Destination Port", HFILL }},
281
282                 { &hf_caddr,
283                         { "Client Address", "ipvs.caddr", FT_IPv4, BASE_HEX,
284                           NULL, 0, "Client Address", HFILL }},
285
286                 { &hf_vaddr,
287                         { "Virtual Address", "ipvs.vaddr", FT_IPv4, BASE_HEX,
288                           NULL, 0, "Virtual Address", HFILL }},
289
290                 { &hf_daddr,
291                         { "Destination Address", "ipvs.daddr", FT_IPv4, BASE_HEX,
292                           NULL, 0, "Destination Address", HFILL }},
293
294                 { &hf_flags,
295                         { "Flags", "ipvs.flags", FT_UINT16, BASE_HEX,
296                           NULL, 0, "Flags", HFILL }},
297
298                 { &hf_state,
299                         { "State", "ipvs.state", FT_UINT16, BASE_HEX,
300                           VALS(&state_strings), 0, "State", HFILL }},
301         
302                 { &hf_in_seq_init,
303                         { "Input Sequence (Initial)", "ipvs.in_seq.initial", FT_UINT32, 
304                                 BASE_HEX, NULL, 0, "Input Sequence (Initial)", HFILL }},
305         
306                 { &hf_in_seq_delta,
307                         { "Input Sequence (Delta)", "ipvs.in_seq.delta", FT_UINT32, 
308                                 BASE_HEX, NULL, 0, "Input Sequence (Delta)", HFILL }},
309         
310                 { &hf_in_seq_pdelta,
311                         { "Input Sequence (Previous Delta)", "ipvs.in_seq.pdelta", FT_UINT32, 
312                                 BASE_HEX, NULL, 0, "Input Sequence (Previous Delta)", HFILL }},
313         
314                 { &hf_out_seq_init,
315                         { "Output Sequence (Initial)", "ipvs.out_seq.initial", FT_UINT32, 
316                                 BASE_HEX, NULL, 0, "Output Sequence (Initial)", HFILL }},
317         
318                 { &hf_out_seq_delta,
319                         { "Output Sequence (Delta)", "ipvs.out_seq.delta", FT_UINT32, 
320                                 BASE_HEX, NULL, 0, "Output Sequence (Delta)", HFILL }},
321         
322                 { &hf_out_seq_pdelta,
323                         { "Output Sequence (Previous Delta)", "ipvs.out_seq.pdelta", FT_UINT32, 
324                                 BASE_HEX, NULL, 0, "Output Sequence (Previous Delta)", HFILL }},
325         
326
327
328
329         };
330         static gint *ett[] = {
331                 &ett_ipvs_syncd,
332                 &ett_conn,
333                 &ett_flags,
334         };
335
336         proto_ipvs_syncd = proto_register_protocol("IP Virtual Services Sync Daemon",
337             "IPVS", "ipvs");
338         proto_register_field_array(proto_ipvs_syncd, hf, array_length(hf));
339         proto_register_subtree_array(ett, array_length(ett));
340 }
341
342 void
343 proto_reg_handoff_ipvs_syncd(void)
344 {
345         dissector_handle_t ipvs_syncd_handle;
346
347         ipvs_syncd_handle = create_dissector_handle(dissect_ipvs_syncd, proto_ipvs_syncd);
348         dissector_add("udp.port", IPVS_SYNCD_PORT, ipvs_syncd_handle);
349 }