]> The Tcpdump Group git mirrors - tcpdump/blob - print-nfs.c
The patches attached to this email are required to get a fully working tcpdump
[tcpdump] / print-nfs.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 #ifndef lint
23 static const char rcsid[] _U_ =
24 "@(#) $Header: /tcpdump/master/tcpdump/print-nfs.c,v 1.111 2007-12-22 03:08:04 guy Exp $ (LBL)";
25 #endif
26
27 #ifdef HAVE_CONFIG_H
28 #include "config.h"
29 #endif
30
31 #include <tcpdump-stdinc.h>
32
33 #include <pcap.h>
34 #include <stdio.h>
35 #include <string.h>
36
37 #include "interface.h"
38 #include "addrtoname.h"
39 #include "extract.h"
40
41 #include "nfs.h"
42 #include "nfsfh.h"
43
44 #include "ip.h"
45 #ifdef INET6
46 #include "ip6.h"
47 #endif
48 #include "rpc_auth.h"
49 #include "rpc_msg.h"
50
51 static void nfs_printfh(const u_int32_t *, const u_int);
52 static int xid_map_enter(const struct sunrpc_msg *, const u_char *);
53 static int32_t xid_map_find(const struct sunrpc_msg *, const u_char *,
54 u_int32_t *, u_int32_t *);
55 static void interp_reply(const struct sunrpc_msg *, u_int32_t, u_int32_t, int);
56 static const u_int32_t *parse_post_op_attr(const u_int32_t *, int);
57 static void print_sattr3(const struct nfsv3_sattr *sa3, int verbose);
58 static void print_nfsaddr(const u_char *, const char *, const char *);
59
60 /*
61 * Mapping of old NFS Version 2 RPC numbers to generic numbers.
62 */
63 u_int32_t nfsv3_procid[NFS_NPROCS] = {
64 NFSPROC_NULL,
65 NFSPROC_GETATTR,
66 NFSPROC_SETATTR,
67 NFSPROC_NOOP,
68 NFSPROC_LOOKUP,
69 NFSPROC_READLINK,
70 NFSPROC_READ,
71 NFSPROC_NOOP,
72 NFSPROC_WRITE,
73 NFSPROC_CREATE,
74 NFSPROC_REMOVE,
75 NFSPROC_RENAME,
76 NFSPROC_LINK,
77 NFSPROC_SYMLINK,
78 NFSPROC_MKDIR,
79 NFSPROC_RMDIR,
80 NFSPROC_READDIR,
81 NFSPROC_FSSTAT,
82 NFSPROC_NOOP,
83 NFSPROC_NOOP,
84 NFSPROC_NOOP,
85 NFSPROC_NOOP,
86 NFSPROC_NOOP,
87 NFSPROC_NOOP,
88 NFSPROC_NOOP,
89 NFSPROC_NOOP
90 };
91
92 /*
93 * NFS V2 and V3 status values.
94 *
95 * Some of these come from the RFCs for NFS V2 and V3, with the message
96 * strings taken from the FreeBSD C library "errlst.c".
97 *
98 * Others are errors that are not in the RFC but that I suspect some
99 * NFS servers could return; the values are FreeBSD errno values, as
100 * the first NFS server was the SunOS 2.0 one, and until 5.0 SunOS
101 * was primarily BSD-derived.
102 */
103 static struct tok status2str[] = {
104 { 1, "Operation not permitted" }, /* EPERM */
105 { 2, "No such file or directory" }, /* ENOENT */
106 { 5, "Input/output error" }, /* EIO */
107 { 6, "Device not configured" }, /* ENXIO */
108 { 11, "Resource deadlock avoided" }, /* EDEADLK */
109 { 12, "Cannot allocate memory" }, /* ENOMEM */
110 { 13, "Permission denied" }, /* EACCES */
111 { 17, "File exists" }, /* EEXIST */
112 { 18, "Cross-device link" }, /* EXDEV */
113 { 19, "Operation not supported by device" }, /* ENODEV */
114 { 20, "Not a directory" }, /* ENOTDIR */
115 { 21, "Is a directory" }, /* EISDIR */
116 { 22, "Invalid argument" }, /* EINVAL */
117 { 26, "Text file busy" }, /* ETXTBSY */
118 { 27, "File too large" }, /* EFBIG */
119 { 28, "No space left on device" }, /* ENOSPC */
120 { 30, "Read-only file system" }, /* EROFS */
121 { 31, "Too many links" }, /* EMLINK */
122 { 45, "Operation not supported" }, /* EOPNOTSUPP */
123 { 62, "Too many levels of symbolic links" }, /* ELOOP */
124 { 63, "File name too long" }, /* ENAMETOOLONG */
125 { 66, "Directory not empty" }, /* ENOTEMPTY */
126 { 69, "Disc quota exceeded" }, /* EDQUOT */
127 { 70, "Stale NFS file handle" }, /* ESTALE */
128 { 71, "Too many levels of remote in path" }, /* EREMOTE */
129 { 99, "Write cache flushed to disk" }, /* NFSERR_WFLUSH (not used) */
130 { 10001, "Illegal NFS file handle" }, /* NFS3ERR_BADHANDLE */
131 { 10002, "Update synchronization mismatch" }, /* NFS3ERR_NOT_SYNC */
132 { 10003, "READDIR/READDIRPLUS cookie is stale" }, /* NFS3ERR_BAD_COOKIE */
133 { 10004, "Operation not supported" }, /* NFS3ERR_NOTSUPP */
134 { 10005, "Buffer or request is too small" }, /* NFS3ERR_TOOSMALL */
135 { 10006, "Unspecified error on server" }, /* NFS3ERR_SERVERFAULT */
136 { 10007, "Object of that type not supported" }, /* NFS3ERR_BADTYPE */
137 { 10008, "Request couldn't be completed in time" }, /* NFS3ERR_JUKEBOX */
138 { 0, NULL }
139 };
140
141 static struct tok nfsv3_writemodes[] = {
142 { 0, "unstable" },
143 { 1, "datasync" },
144 { 2, "filesync" },
145 { 0, NULL }
146 };
147
148 static struct tok type2str[] = {
149 { NFNON, "NON" },
150 { NFREG, "REG" },
151 { NFDIR, "DIR" },
152 { NFBLK, "BLK" },
153 { NFCHR, "CHR" },
154 { NFLNK, "LNK" },
155 { NFFIFO, "FIFO" },
156 { 0, NULL }
157 };
158
159 static void
160 print_nfsaddr(const u_char *bp, const char *s, const char *d)
161 {
162 struct ip *ip;
163 #ifdef INET6
164 struct ip6_hdr *ip6;
165 char srcaddr[INET6_ADDRSTRLEN], dstaddr[INET6_ADDRSTRLEN];
166 #else
167 #ifndef INET_ADDRSTRLEN
168 #define INET_ADDRSTRLEN 16
169 #endif
170 char srcaddr[INET_ADDRSTRLEN], dstaddr[INET_ADDRSTRLEN];
171 #endif
172
173 srcaddr[0] = dstaddr[0] = '\0';
174 switch (IP_V((struct ip *)bp)) {
175 case 4:
176 ip = (struct ip *)bp;
177 strlcpy(srcaddr, ipaddr_string(&ip->ip_src), sizeof(srcaddr));
178 strlcpy(dstaddr, ipaddr_string(&ip->ip_dst), sizeof(dstaddr));
179 break;
180 #ifdef INET6
181 case 6:
182 ip6 = (struct ip6_hdr *)bp;
183 strlcpy(srcaddr, ip6addr_string(&ip6->ip6_src),
184 sizeof(srcaddr));
185 strlcpy(dstaddr, ip6addr_string(&ip6->ip6_dst),
186 sizeof(dstaddr));
187 break;
188 #endif
189 default:
190 strlcpy(srcaddr, "?", sizeof(srcaddr));
191 strlcpy(dstaddr, "?", sizeof(dstaddr));
192 break;
193 }
194
195 (void)printf("%s.%s > %s.%s: ", srcaddr, s, dstaddr, d);
196 }
197
198 static const u_int32_t *
199 parse_sattr3(const u_int32_t *dp, struct nfsv3_sattr *sa3)
200 {
201 TCHECK(dp[0]);
202 sa3->sa_modeset = EXTRACT_32BITS(dp);
203 dp++;
204 if (sa3->sa_modeset) {
205 TCHECK(dp[0]);
206 sa3->sa_mode = EXTRACT_32BITS(dp);
207 dp++;
208 }
209
210 TCHECK(dp[0]);
211 sa3->sa_uidset = EXTRACT_32BITS(dp);
212 dp++;
213 if (sa3->sa_uidset) {
214 TCHECK(dp[0]);
215 sa3->sa_uid = EXTRACT_32BITS(dp);
216 dp++;
217 }
218
219 TCHECK(dp[0]);
220 sa3->sa_gidset = EXTRACT_32BITS(dp);
221 dp++;
222 if (sa3->sa_gidset) {
223 TCHECK(dp[0]);
224 sa3->sa_gid = EXTRACT_32BITS(dp);
225 dp++;
226 }
227
228 TCHECK(dp[0]);
229 sa3->sa_sizeset = EXTRACT_32BITS(dp);
230 dp++;
231 if (sa3->sa_sizeset) {
232 TCHECK(dp[0]);
233 sa3->sa_size = EXTRACT_32BITS(dp);
234 dp++;
235 }
236
237 TCHECK(dp[0]);
238 sa3->sa_atimetype = EXTRACT_32BITS(dp);
239 dp++;
240 if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) {
241 TCHECK(dp[1]);
242 sa3->sa_atime.nfsv3_sec = EXTRACT_32BITS(dp);
243 dp++;
244 sa3->sa_atime.nfsv3_nsec = EXTRACT_32BITS(dp);
245 dp++;
246 }
247
248 TCHECK(dp[0]);
249 sa3->sa_mtimetype = EXTRACT_32BITS(dp);
250 dp++;
251 if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) {
252 TCHECK(dp[1]);
253 sa3->sa_mtime.nfsv3_sec = EXTRACT_32BITS(dp);
254 dp++;
255 sa3->sa_mtime.nfsv3_nsec = EXTRACT_32BITS(dp);
256 dp++;
257 }
258
259 return dp;
260 trunc:
261 return NULL;
262 }
263
264 static int nfserr; /* true if we error rather than trunc */
265
266 static void
267 print_sattr3(const struct nfsv3_sattr *sa3, int verbose)
268 {
269 if (sa3->sa_modeset)
270 printf(" mode %o", sa3->sa_mode);
271 if (sa3->sa_uidset)
272 printf(" uid %u", sa3->sa_uid);
273 if (sa3->sa_gidset)
274 printf(" gid %u", sa3->sa_gid);
275 if (verbose > 1) {
276 if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT)
277 printf(" atime %u.%06u", sa3->sa_atime.nfsv3_sec,
278 sa3->sa_atime.nfsv3_nsec);
279 if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT)
280 printf(" mtime %u.%06u", sa3->sa_mtime.nfsv3_sec,
281 sa3->sa_mtime.nfsv3_nsec);
282 }
283 }
284
285 void
286 nfsreply_print(register const u_char *bp, u_int length,
287 register const u_char *bp2)
288 {
289 register const struct sunrpc_msg *rp;
290 u_int32_t proc, vers, reply_stat;
291 char srcid[20], dstid[20]; /*fits 32bit*/
292 enum sunrpc_reject_stat rstat;
293 u_int32_t rlow;
294 u_int32_t rhigh;
295 enum sunrpc_auth_stat rwhy;
296
297 nfserr = 0; /* assume no error */
298 rp = (const struct sunrpc_msg *)bp;
299
300 TCHECK(rp->rm_xid);
301 if (!nflag) {
302 strlcpy(srcid, "nfs", sizeof(srcid));
303 snprintf(dstid, sizeof(dstid), "%u",
304 EXTRACT_32BITS(&rp->rm_xid));
305 } else {
306 snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
307 snprintf(dstid, sizeof(dstid), "%u",
308 EXTRACT_32BITS(&rp->rm_xid));
309 }
310 print_nfsaddr(bp2, srcid, dstid);
311 TCHECK(rp->rm_reply.rp_stat);
312 reply_stat = EXTRACT_32BITS(&rp->rm_reply.rp_stat);
313 switch (reply_stat) {
314
315 case SUNRPC_MSG_ACCEPTED:
316 (void)printf("reply ok %u", length);
317 if (xid_map_find(rp, bp2, &proc, &vers) >= 0)
318 interp_reply(rp, proc, vers, length);
319 break;
320
321 case SUNRPC_MSG_DENIED:
322 (void)printf("reply ERR %u: ", length);
323 TCHECK(rp->rm_reply.rp_reject.rj_stat);
324 rstat = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_stat);
325 switch (rstat) {
326
327 case SUNRPC_RPC_MISMATCH:
328 TCHECK(rp->rm_reply.rp_reject.rj_vers.high);
329 rlow = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.low);
330 rhigh = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.high);
331 (void)printf("RPC Version mismatch (%u-%u)",
332 rlow, rhigh);
333 break;
334
335 case SUNRPC_AUTH_ERROR:
336 TCHECK(rp->rm_reply.rp_reject.rj_why);
337 rwhy = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_why);
338 (void)printf("Auth ");
339 switch (rwhy) {
340
341 case SUNRPC_AUTH_OK:
342 (void)printf("OK");
343 break;
344
345 case SUNRPC_AUTH_BADCRED:
346 (void)printf("Bogus Credentials (seal broken)");
347 break;
348
349 case SUNRPC_AUTH_REJECTEDCRED:
350 (void)printf("Rejected Credentials (client should begin new session)");
351 break;
352
353 case SUNRPC_AUTH_BADVERF:
354 (void)printf("Bogus Verifier (seal broken)");
355 break;
356
357 case SUNRPC_AUTH_REJECTEDVERF:
358 (void)printf("Verifier expired or was replayed");
359 break;
360
361 case SUNRPC_AUTH_TOOWEAK:
362 (void)printf("Credentials are too weak");
363 break;
364
365 case SUNRPC_AUTH_INVALIDRESP:
366 (void)printf("Bogus response verifier");
367 break;
368
369 case SUNRPC_AUTH_FAILED:
370 (void)printf("Unknown failure");
371 break;
372
373 default:
374 (void)printf("Invalid failure code %u",
375 (unsigned int)rwhy);
376 break;
377 }
378 break;
379
380 default:
381 (void)printf("Unknown reason for rejecting rpc message %u",
382 (unsigned int)rstat);
383 break;
384 }
385 break;
386
387 default:
388 (void)printf("reply Unknown rpc response code=%u %u",
389 reply_stat, length);
390 break;
391 }
392 return;
393
394 trunc:
395 if (!nfserr)
396 fputs(" [|nfs]", stdout);
397 }
398
399 /*
400 * Return a pointer to the first file handle in the packet.
401 * If the packet was truncated, return 0.
402 */
403 static const u_int32_t *
404 parsereq(register const struct sunrpc_msg *rp, register u_int length)
405 {
406 register const u_int32_t *dp;
407 register u_int len;
408
409 /*
410 * find the start of the req data (if we captured it)
411 */
412 dp = (u_int32_t *)&rp->rm_call.cb_cred;
413 TCHECK(dp[1]);
414 len = EXTRACT_32BITS(&dp[1]);
415 if (len < length) {
416 dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
417 TCHECK(dp[1]);
418 len = EXTRACT_32BITS(&dp[1]);
419 if (len < length) {
420 dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
421 TCHECK2(dp[0], 0);
422 return (dp);
423 }
424 }
425 trunc:
426 return (NULL);
427 }
428
429 /*
430 * Print out an NFS file handle and return a pointer to following word.
431 * If packet was truncated, return 0.
432 */
433 static const u_int32_t *
434 parsefh(register const u_int32_t *dp, int v3)
435 {
436 u_int len;
437
438 if (v3) {
439 TCHECK(dp[0]);
440 len = EXTRACT_32BITS(dp) / 4;
441 dp++;
442 } else
443 len = NFSX_V2FH / 4;
444
445 if (TTEST2(*dp, len * sizeof(*dp))) {
446 nfs_printfh(dp, len);
447 return (dp + len);
448 }
449 trunc:
450 return (NULL);
451 }
452
453 /*
454 * Print out a file name and return pointer to 32-bit word past it.
455 * If packet was truncated, return 0.
456 */
457 static const u_int32_t *
458 parsefn(register const u_int32_t *dp)
459 {
460 register u_int32_t len;
461 register const u_char *cp;
462
463 /* Bail if we don't have the string length */
464 TCHECK(*dp);
465
466 /* Fetch string length; convert to host order */
467 len = *dp++;
468 NTOHL(len);
469
470 TCHECK2(*dp, ((len + 3) & ~3));
471
472 cp = (u_char *)dp;
473 /* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */
474 dp += ((len + 3) & ~3) / sizeof(*dp);
475 putchar('"');
476 if (fn_printn(cp, len, snapend)) {
477 putchar('"');
478 goto trunc;
479 }
480 putchar('"');
481
482 return (dp);
483 trunc:
484 return NULL;
485 }
486
487 /*
488 * Print out file handle and file name.
489 * Return pointer to 32-bit word past file name.
490 * If packet was truncated (or there was some other error), return 0.
491 */
492 static const u_int32_t *
493 parsefhn(register const u_int32_t *dp, int v3)
494 {
495 dp = parsefh(dp, v3);
496 if (dp == NULL)
497 return (NULL);
498 putchar(' ');
499 return (parsefn(dp));
500 }
501
502 void
503 nfsreq_print(register const u_char *bp, u_int length,
504 register const u_char *bp2)
505 {
506 register const struct sunrpc_msg *rp;
507 register const u_int32_t *dp;
508 nfs_type type;
509 int v3;
510 u_int32_t proc;
511 struct nfsv3_sattr sa3;
512 char srcid[20], dstid[20]; /*fits 32bit*/
513
514 nfserr = 0; /* assume no error */
515 rp = (const struct sunrpc_msg *)bp;
516
517 TCHECK(rp->rm_xid);
518 if (!nflag) {
519 snprintf(srcid, sizeof(srcid), "%u",
520 EXTRACT_32BITS(&rp->rm_xid));
521 strlcpy(dstid, "nfs", sizeof(dstid));
522 } else {
523 snprintf(srcid, sizeof(srcid), "%u",
524 EXTRACT_32BITS(&rp->rm_xid));
525 snprintf(dstid, sizeof(dstid), "%u", NFS_PORT);
526 }
527 print_nfsaddr(bp2, srcid, dstid);
528 (void)printf("%d", length);
529
530 if (!xid_map_enter(rp, bp2)) /* record proc number for later on */
531 goto trunc;
532
533 v3 = (EXTRACT_32BITS(&rp->rm_call.cb_vers) == NFS_VER3);
534 proc = EXTRACT_32BITS(&rp->rm_call.cb_proc);
535
536 if (!v3 && proc < NFS_NPROCS)
537 proc = nfsv3_procid[proc];
538
539 switch (proc) {
540 case NFSPROC_NOOP:
541 printf(" nop");
542 return;
543 case NFSPROC_NULL:
544 printf(" null");
545 return;
546
547 case NFSPROC_GETATTR:
548 printf(" getattr");
549 if ((dp = parsereq(rp, length)) != NULL &&
550 parsefh(dp, v3) != NULL)
551 return;
552 break;
553
554 case NFSPROC_SETATTR:
555 printf(" setattr");
556 if ((dp = parsereq(rp, length)) != NULL &&
557 parsefh(dp, v3) != NULL)
558 return;
559 break;
560
561 case NFSPROC_LOOKUP:
562 printf(" lookup");
563 if ((dp = parsereq(rp, length)) != NULL &&
564 parsefhn(dp, v3) != NULL)
565 return;
566 break;
567
568 case NFSPROC_ACCESS:
569 printf(" access");
570 if ((dp = parsereq(rp, length)) != NULL &&
571 (dp = parsefh(dp, v3)) != NULL) {
572 TCHECK(dp[0]);
573 printf(" %04x", EXTRACT_32BITS(&dp[0]));
574 return;
575 }
576 break;
577
578 case NFSPROC_READLINK:
579 printf(" readlink");
580 if ((dp = parsereq(rp, length)) != NULL &&
581 parsefh(dp, v3) != NULL)
582 return;
583 break;
584
585 case NFSPROC_READ:
586 printf(" read");
587 if ((dp = parsereq(rp, length)) != NULL &&
588 (dp = parsefh(dp, v3)) != NULL) {
589 if (v3) {
590 TCHECK(dp[2]);
591 printf(" %u bytes @ %" PRIu64,
592 EXTRACT_32BITS(&dp[2]),
593 EXTRACT_64BITS(&dp[0]));
594 } else {
595 TCHECK(dp[1]);
596 printf(" %u bytes @ %u",
597 EXTRACT_32BITS(&dp[1]),
598 EXTRACT_32BITS(&dp[0]));
599 }
600 return;
601 }
602 break;
603
604 case NFSPROC_WRITE:
605 printf(" write");
606 if ((dp = parsereq(rp, length)) != NULL &&
607 (dp = parsefh(dp, v3)) != NULL) {
608 if (v3) {
609 TCHECK(dp[2]);
610 printf(" %u (%u) bytes @ %" PRIu64,
611 EXTRACT_32BITS(&dp[4]),
612 EXTRACT_32BITS(&dp[2]),
613 EXTRACT_64BITS(&dp[0]));
614 if (vflag) {
615 dp += 3;
616 TCHECK(dp[0]);
617 printf(" <%s>",
618 tok2str(nfsv3_writemodes,
619 NULL, EXTRACT_32BITS(dp)));
620 }
621 } else {
622 TCHECK(dp[3]);
623 printf(" %u (%u) bytes @ %u (%u)",
624 EXTRACT_32BITS(&dp[3]),
625 EXTRACT_32BITS(&dp[2]),
626 EXTRACT_32BITS(&dp[1]),
627 EXTRACT_32BITS(&dp[0]));
628 }
629 return;
630 }
631 break;
632
633 case NFSPROC_CREATE:
634 printf(" create");
635 if ((dp = parsereq(rp, length)) != NULL &&
636 parsefhn(dp, v3) != NULL)
637 return;
638 break;
639
640 case NFSPROC_MKDIR:
641 printf(" mkdir");
642 if ((dp = parsereq(rp, length)) != 0 && parsefhn(dp, v3) != 0)
643 return;
644 break;
645
646 case NFSPROC_SYMLINK:
647 printf(" symlink");
648 if ((dp = parsereq(rp, length)) != 0 &&
649 (dp = parsefhn(dp, v3)) != 0) {
650 fputs(" ->", stdout);
651 if (v3 && (dp = parse_sattr3(dp, &sa3)) == 0)
652 break;
653 if (parsefn(dp) == 0)
654 break;
655 if (v3 && vflag)
656 print_sattr3(&sa3, vflag);
657 return;
658 }
659 break;
660
661 case NFSPROC_MKNOD:
662 printf(" mknod");
663 if ((dp = parsereq(rp, length)) != 0 &&
664 (dp = parsefhn(dp, v3)) != 0) {
665 TCHECK(*dp);
666 type = (nfs_type)EXTRACT_32BITS(dp);
667 dp++;
668 if ((dp = parse_sattr3(dp, &sa3)) == 0)
669 break;
670 printf(" %s", tok2str(type2str, "unk-ft %d", type));
671 if (vflag && (type == NFCHR || type == NFBLK)) {
672 TCHECK(dp[1]);
673 printf(" %u/%u",
674 EXTRACT_32BITS(&dp[0]),
675 EXTRACT_32BITS(&dp[1]));
676 dp += 2;
677 }
678 if (vflag)
679 print_sattr3(&sa3, vflag);
680 return;
681 }
682 break;
683
684 case NFSPROC_REMOVE:
685 printf(" remove");
686 if ((dp = parsereq(rp, length)) != NULL &&
687 parsefhn(dp, v3) != NULL)
688 return;
689 break;
690
691 case NFSPROC_RMDIR:
692 printf(" rmdir");
693 if ((dp = parsereq(rp, length)) != NULL &&
694 parsefhn(dp, v3) != NULL)
695 return;
696 break;
697
698 case NFSPROC_RENAME:
699 printf(" rename");
700 if ((dp = parsereq(rp, length)) != NULL &&
701 (dp = parsefhn(dp, v3)) != NULL) {
702 fputs(" ->", stdout);
703 if (parsefhn(dp, v3) != NULL)
704 return;
705 }
706 break;
707
708 case NFSPROC_LINK:
709 printf(" link");
710 if ((dp = parsereq(rp, length)) != NULL &&
711 (dp = parsefh(dp, v3)) != NULL) {
712 fputs(" ->", stdout);
713 if (parsefhn(dp, v3) != NULL)
714 return;
715 }
716 break;
717
718 case NFSPROC_READDIR:
719 printf(" readdir");
720 if ((dp = parsereq(rp, length)) != NULL &&
721 (dp = parsefh(dp, v3)) != NULL) {
722 if (v3) {
723 TCHECK(dp[4]);
724 /*
725 * We shouldn't really try to interpret the
726 * offset cookie here.
727 */
728 printf(" %u bytes @ %" PRId64,
729 EXTRACT_32BITS(&dp[4]),
730 EXTRACT_64BITS(&dp[0]));
731 if (vflag)
732 printf(" verf %08x%08x", dp[2],
733 dp[3]);
734 } else {
735 TCHECK(dp[1]);
736 /*
737 * Print the offset as signed, since -1 is
738 * common, but offsets > 2^31 aren't.
739 */
740 printf(" %u bytes @ %d",
741 EXTRACT_32BITS(&dp[1]),
742 EXTRACT_32BITS(&dp[0]));
743 }
744 return;
745 }
746 break;
747
748 case NFSPROC_READDIRPLUS:
749 printf(" readdirplus");
750 if ((dp = parsereq(rp, length)) != NULL &&
751 (dp = parsefh(dp, v3)) != NULL) {
752 TCHECK(dp[4]);
753 /*
754 * We don't try to interpret the offset
755 * cookie here.
756 */
757 printf(" %u bytes @ %" PRId64,
758 EXTRACT_32BITS(&dp[4]),
759 EXTRACT_64BITS(&dp[0]));
760 if (vflag) {
761 TCHECK(dp[5]);
762 printf(" max %u verf %08x%08x",
763 EXTRACT_32BITS(&dp[5]), dp[2], dp[3]);
764 }
765 return;
766 }
767 break;
768
769 case NFSPROC_FSSTAT:
770 printf(" fsstat");
771 if ((dp = parsereq(rp, length)) != NULL &&
772 parsefh(dp, v3) != NULL)
773 return;
774 break;
775
776 case NFSPROC_FSINFO:
777 printf(" fsinfo");
778 if ((dp = parsereq(rp, length)) != NULL &&
779 parsefh(dp, v3) != NULL)
780 return;
781 break;
782
783 case NFSPROC_PATHCONF:
784 printf(" pathconf");
785 if ((dp = parsereq(rp, length)) != NULL &&
786 parsefh(dp, v3) != NULL)
787 return;
788 break;
789
790 case NFSPROC_COMMIT:
791 printf(" commit");
792 if ((dp = parsereq(rp, length)) != NULL &&
793 (dp = parsefh(dp, v3)) != NULL) {
794 TCHECK(dp[2]);
795 printf(" %u bytes @ %" PRIu64,
796 EXTRACT_32BITS(&dp[2]),
797 EXTRACT_64BITS(&dp[0]));
798 return;
799 }
800 break;
801
802 default:
803 printf(" proc-%u", EXTRACT_32BITS(&rp->rm_call.cb_proc));
804 return;
805 }
806
807 trunc:
808 if (!nfserr)
809 fputs(" [|nfs]", stdout);
810 }
811
812 /*
813 * Print out an NFS file handle.
814 * We assume packet was not truncated before the end of the
815 * file handle pointed to by dp.
816 *
817 * Note: new version (using portable file-handle parser) doesn't produce
818 * generation number. It probably could be made to do that, with some
819 * additional hacking on the parser code.
820 */
821 static void
822 nfs_printfh(register const u_int32_t *dp, const u_int len)
823 {
824 my_fsid fsid;
825 ino_t ino;
826 const char *sfsname = NULL;
827 char *spacep;
828
829 if (uflag) {
830 u_int i;
831 char const *sep = "";
832
833 printf(" fh[");
834 for (i=0; i<len; i++) {
835 (void)printf("%s%x", sep, dp[i]);
836 sep = ":";
837 }
838 printf("]");
839 return;
840 }
841
842 Parse_fh((const u_char *)dp, len, &fsid, &ino, NULL, &sfsname, 0);
843
844 if (sfsname) {
845 /* file system ID is ASCII, not numeric, for this server OS */
846 static char temp[NFSX_V3FHMAX+1];
847
848 /* Make sure string is null-terminated */
849 strncpy(temp, sfsname, NFSX_V3FHMAX);
850 temp[sizeof(temp) - 1] = '\0';
851 /* Remove trailing spaces */
852 spacep = strchr(temp, ' ');
853 if (spacep)
854 *spacep = '\0';
855
856 (void)printf(" fh %s/", temp);
857 } else {
858 (void)printf(" fh %d,%d/",
859 fsid.Fsid_dev.Major, fsid.Fsid_dev.Minor);
860 }
861
862 if(fsid.Fsid_dev.Minor == 257)
863 /* Print the undecoded handle */
864 (void)printf("%s", fsid.Opaque_Handle);
865 else
866 (void)printf("%ld", (long) ino);
867 }
868
869 /*
870 * Maintain a small cache of recent client.XID.server/proc pairs, to allow
871 * us to match up replies with requests and thus to know how to parse
872 * the reply.
873 */
874
875 struct xid_map_entry {
876 u_int32_t xid; /* transaction ID (net order) */
877 int ipver; /* IP version (4 or 6) */
878 #ifdef INET6
879 struct in6_addr client; /* client IP address (net order) */
880 struct in6_addr server; /* server IP address (net order) */
881 #else
882 struct in_addr client; /* client IP address (net order) */
883 struct in_addr server; /* server IP address (net order) */
884 #endif
885 u_int32_t proc; /* call proc number (host order) */
886 u_int32_t vers; /* program version (host order) */
887 };
888
889 /*
890 * Map entries are kept in an array that we manage as a ring;
891 * new entries are always added at the tail of the ring. Initially,
892 * all the entries are zero and hence don't match anything.
893 */
894
895 #define XIDMAPSIZE 64
896
897 struct xid_map_entry xid_map[XIDMAPSIZE];
898
899 int xid_map_next = 0;
900 int xid_map_hint = 0;
901
902 static int
903 xid_map_enter(const struct sunrpc_msg *rp, const u_char *bp)
904 {
905 struct ip *ip = NULL;
906 #ifdef INET6
907 struct ip6_hdr *ip6 = NULL;
908 #endif
909 struct xid_map_entry *xmep;
910
911 if (!TTEST(rp->rm_call.cb_vers))
912 return (0);
913 switch (IP_V((struct ip *)bp)) {
914 case 4:
915 ip = (struct ip *)bp;
916 break;
917 #ifdef INET6
918 case 6:
919 ip6 = (struct ip6_hdr *)bp;
920 break;
921 #endif
922 default:
923 return (1);
924 }
925
926 xmep = &xid_map[xid_map_next];
927
928 if (++xid_map_next >= XIDMAPSIZE)
929 xid_map_next = 0;
930
931 xmep->xid = rp->rm_xid;
932 if (ip) {
933 xmep->ipver = 4;
934 memcpy(&xmep->client, &ip->ip_src, sizeof(ip->ip_src));
935 memcpy(&xmep->server, &ip->ip_dst, sizeof(ip->ip_dst));
936 }
937 #ifdef INET6
938 else if (ip6) {
939 xmep->ipver = 6;
940 memcpy(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src));
941 memcpy(&xmep->server, &ip6->ip6_dst, sizeof(ip6->ip6_dst));
942 }
943 #endif
944 xmep->proc = EXTRACT_32BITS(&rp->rm_call.cb_proc);
945 xmep->vers = EXTRACT_32BITS(&rp->rm_call.cb_vers);
946 return (1);
947 }
948
949 /*
950 * Returns 0 and puts NFSPROC_xxx in proc return and
951 * version in vers return, or returns -1 on failure
952 */
953 static int
954 xid_map_find(const struct sunrpc_msg *rp, const u_char *bp, u_int32_t *proc,
955 u_int32_t *vers)
956 {
957 int i;
958 struct xid_map_entry *xmep;
959 u_int32_t xid = rp->rm_xid;
960 struct ip *ip = (struct ip *)bp;
961 #ifdef INET6
962 struct ip6_hdr *ip6 = (struct ip6_hdr *)bp;
963 #endif
964 int cmp;
965
966 /* Start searching from where we last left off */
967 i = xid_map_hint;
968 do {
969 xmep = &xid_map[i];
970 cmp = 1;
971 if (xmep->ipver != IP_V(ip) || xmep->xid != xid)
972 goto nextitem;
973 switch (xmep->ipver) {
974 case 4:
975 if (memcmp(&ip->ip_src, &xmep->server,
976 sizeof(ip->ip_src)) != 0 ||
977 memcmp(&ip->ip_dst, &xmep->client,
978 sizeof(ip->ip_dst)) != 0) {
979 cmp = 0;
980 }
981 break;
982 #ifdef INET6
983 case 6:
984 if (memcmp(&ip6->ip6_src, &xmep->server,
985 sizeof(ip6->ip6_src)) != 0 ||
986 memcmp(&ip6->ip6_dst, &xmep->client,
987 sizeof(ip6->ip6_dst)) != 0) {
988 cmp = 0;
989 }
990 break;
991 #endif
992 default:
993 cmp = 0;
994 break;
995 }
996 if (cmp) {
997 /* match */
998 xid_map_hint = i;
999 *proc = xmep->proc;
1000 *vers = xmep->vers;
1001 return 0;
1002 }
1003 nextitem:
1004 if (++i >= XIDMAPSIZE)
1005 i = 0;
1006 } while (i != xid_map_hint);
1007
1008 /* search failed */
1009 return (-1);
1010 }
1011
1012 /*
1013 * Routines for parsing reply packets
1014 */
1015
1016 /*
1017 * Return a pointer to the beginning of the actual results.
1018 * If the packet was truncated, return 0.
1019 */
1020 static const u_int32_t *
1021 parserep(register const struct sunrpc_msg *rp, register u_int length)
1022 {
1023 register const u_int32_t *dp;
1024 u_int len;
1025 enum sunrpc_accept_stat astat;
1026
1027 /*
1028 * Portability note:
1029 * Here we find the address of the ar_verf credentials.
1030 * Originally, this calculation was
1031 * dp = (u_int32_t *)&rp->rm_reply.rp_acpt.ar_verf
1032 * On the wire, the rp_acpt field starts immediately after
1033 * the (32 bit) rp_stat field. However, rp_acpt (which is a
1034 * "struct accepted_reply") contains a "struct opaque_auth",
1035 * whose internal representation contains a pointer, so on a
1036 * 64-bit machine the compiler inserts 32 bits of padding
1037 * before rp->rm_reply.rp_acpt.ar_verf. So, we cannot use
1038 * the internal representation to parse the on-the-wire
1039 * representation. Instead, we skip past the rp_stat field,
1040 * which is an "enum" and so occupies one 32-bit word.
1041 */
1042 dp = ((const u_int32_t *)&rp->rm_reply) + 1;
1043 TCHECK(dp[1]);
1044 len = EXTRACT_32BITS(&dp[1]);
1045 if (len >= length)
1046 return (NULL);
1047 /*
1048 * skip past the ar_verf credentials.
1049 */
1050 dp += (len + (2*sizeof(u_int32_t) + 3)) / sizeof(u_int32_t);
1051 TCHECK2(dp[0], 0);
1052
1053 /*
1054 * now we can check the ar_stat field
1055 */
1056 astat = (enum sunrpc_accept_stat) EXTRACT_32BITS(dp);
1057 switch (astat) {
1058
1059 case SUNRPC_SUCCESS:
1060 break;
1061
1062 case SUNRPC_PROG_UNAVAIL:
1063 printf(" PROG_UNAVAIL");
1064 nfserr = 1; /* suppress trunc string */
1065 return (NULL);
1066
1067 case SUNRPC_PROG_MISMATCH:
1068 printf(" PROG_MISMATCH");
1069 nfserr = 1; /* suppress trunc string */
1070 return (NULL);
1071
1072 case SUNRPC_PROC_UNAVAIL:
1073 printf(" PROC_UNAVAIL");
1074 nfserr = 1; /* suppress trunc string */
1075 return (NULL);
1076
1077 case SUNRPC_GARBAGE_ARGS:
1078 printf(" GARBAGE_ARGS");
1079 nfserr = 1; /* suppress trunc string */
1080 return (NULL);
1081
1082 case SUNRPC_SYSTEM_ERR:
1083 printf(" SYSTEM_ERR");
1084 nfserr = 1; /* suppress trunc string */
1085 return (NULL);
1086
1087 default:
1088 printf(" ar_stat %d", astat);
1089 nfserr = 1; /* suppress trunc string */
1090 return (NULL);
1091 }
1092 /* successful return */
1093 TCHECK2(*dp, sizeof(astat));
1094 return ((u_int32_t *) (sizeof(astat) + ((char *)dp)));
1095 trunc:
1096 return (0);
1097 }
1098
1099 static const u_int32_t *
1100 parsestatus(const u_int32_t *dp, int *er)
1101 {
1102 int errnum;
1103
1104 TCHECK(dp[0]);
1105
1106 errnum = EXTRACT_32BITS(&dp[0]);
1107 if (er)
1108 *er = errnum;
1109 if (errnum != 0) {
1110 if (!qflag)
1111 printf(" ERROR: %s",
1112 tok2str(status2str, "unk %d", errnum));
1113 nfserr = 1;
1114 }
1115 return (dp + 1);
1116 trunc:
1117 return NULL;
1118 }
1119
1120 static const u_int32_t *
1121 parsefattr(const u_int32_t *dp, int verbose, int v3)
1122 {
1123 const struct nfs_fattr *fap;
1124
1125 fap = (const struct nfs_fattr *)dp;
1126 TCHECK(fap->fa_gid);
1127 if (verbose) {
1128 printf(" %s %o ids %d/%d",
1129 tok2str(type2str, "unk-ft %d ",
1130 EXTRACT_32BITS(&fap->fa_type)),
1131 EXTRACT_32BITS(&fap->fa_mode),
1132 EXTRACT_32BITS(&fap->fa_uid),
1133 EXTRACT_32BITS(&fap->fa_gid));
1134 if (v3) {
1135 TCHECK(fap->fa3_size);
1136 printf(" sz %" PRIu64,
1137 EXTRACT_64BITS((u_int32_t *)&fap->fa3_size));
1138 } else {
1139 TCHECK(fap->fa2_size);
1140 printf(" sz %d", EXTRACT_32BITS(&fap->fa2_size));
1141 }
1142 }
1143 /* print lots more stuff */
1144 if (verbose > 1) {
1145 if (v3) {
1146 TCHECK(fap->fa3_ctime);
1147 printf(" nlink %d rdev %d/%d",
1148 EXTRACT_32BITS(&fap->fa_nlink),
1149 EXTRACT_32BITS(&fap->fa3_rdev.specdata1),
1150 EXTRACT_32BITS(&fap->fa3_rdev.specdata2));
1151 printf(" fsid %" PRIx64,
1152 EXTRACT_64BITS((u_int32_t *)&fap->fa3_fsid));
1153 printf(" fileid %" PRIx64,
1154 EXTRACT_64BITS((u_int32_t *)&fap->fa3_fileid));
1155 printf(" a/m/ctime %u.%06u",
1156 EXTRACT_32BITS(&fap->fa3_atime.nfsv3_sec),
1157 EXTRACT_32BITS(&fap->fa3_atime.nfsv3_nsec));
1158 printf(" %u.%06u",
1159 EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_sec),
1160 EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_nsec));
1161 printf(" %u.%06u",
1162 EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_sec),
1163 EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_nsec));
1164 } else {
1165 TCHECK(fap->fa2_ctime);
1166 printf(" nlink %d rdev %x fsid %x nodeid %x a/m/ctime",
1167 EXTRACT_32BITS(&fap->fa_nlink),
1168 EXTRACT_32BITS(&fap->fa2_rdev),
1169 EXTRACT_32BITS(&fap->fa2_fsid),
1170 EXTRACT_32BITS(&fap->fa2_fileid));
1171 printf(" %u.%06u",
1172 EXTRACT_32BITS(&fap->fa2_atime.nfsv2_sec),
1173 EXTRACT_32BITS(&fap->fa2_atime.nfsv2_usec));
1174 printf(" %u.%06u",
1175 EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_sec),
1176 EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_usec));
1177 printf(" %u.%06u",
1178 EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_sec),
1179 EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_usec));
1180 }
1181 }
1182 return ((const u_int32_t *)((unsigned char *)dp +
1183 (v3 ? NFSX_V3FATTR : NFSX_V2FATTR)));
1184 trunc:
1185 return (NULL);
1186 }
1187
1188 static int
1189 parseattrstat(const u_int32_t *dp, int verbose, int v3)
1190 {
1191 int er;
1192
1193 dp = parsestatus(dp, &er);
1194 if (dp == NULL)
1195 return (0);
1196 if (er)
1197 return (1);
1198
1199 return (parsefattr(dp, verbose, v3) != NULL);
1200 }
1201
1202 static int
1203 parsediropres(const u_int32_t *dp)
1204 {
1205 int er;
1206
1207 if (!(dp = parsestatus(dp, &er)))
1208 return (0);
1209 if (er)
1210 return (1);
1211
1212 dp = parsefh(dp, 0);
1213 if (dp == NULL)
1214 return (0);
1215
1216 return (parsefattr(dp, vflag, 0) != NULL);
1217 }
1218
1219 static int
1220 parselinkres(const u_int32_t *dp, int v3)
1221 {
1222 int er;
1223
1224 dp = parsestatus(dp, &er);
1225 if (dp == NULL)
1226 return(0);
1227 if (er)
1228 return(1);
1229 if (v3 && !(dp = parse_post_op_attr(dp, vflag)))
1230 return (0);
1231 putchar(' ');
1232 return (parsefn(dp) != NULL);
1233 }
1234
1235 static int
1236 parsestatfs(const u_int32_t *dp, int v3)
1237 {
1238 const struct nfs_statfs *sfsp;
1239 int er;
1240
1241 dp = parsestatus(dp, &er);
1242 if (dp == NULL)
1243 return (0);
1244 if (!v3 && er)
1245 return (1);
1246
1247 if (qflag)
1248 return(1);
1249
1250 if (v3) {
1251 if (vflag)
1252 printf(" POST:");
1253 if (!(dp = parse_post_op_attr(dp, vflag)))
1254 return (0);
1255 }
1256
1257 TCHECK2(*dp, (v3 ? NFSX_V3STATFS : NFSX_V2STATFS));
1258
1259 sfsp = (const struct nfs_statfs *)dp;
1260
1261 if (v3) {
1262 printf(" tbytes %" PRIu64 " fbytes %" PRIu64 " abytes %" PRIu64,
1263 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_tbytes),
1264 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_fbytes),
1265 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_abytes));
1266 if (vflag) {
1267 printf(" tfiles %" PRIu64 " ffiles %" PRIu64 " afiles %" PRIu64 " invar %u",
1268 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_tfiles),
1269 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_ffiles),
1270 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_afiles),
1271 EXTRACT_32BITS(&sfsp->sf_invarsec));
1272 }
1273 } else {
1274 printf(" tsize %d bsize %d blocks %d bfree %d bavail %d",
1275 EXTRACT_32BITS(&sfsp->sf_tsize),
1276 EXTRACT_32BITS(&sfsp->sf_bsize),
1277 EXTRACT_32BITS(&sfsp->sf_blocks),
1278 EXTRACT_32BITS(&sfsp->sf_bfree),
1279 EXTRACT_32BITS(&sfsp->sf_bavail));
1280 }
1281
1282 return (1);
1283 trunc:
1284 return (0);
1285 }
1286
1287 static int
1288 parserddires(const u_int32_t *dp)
1289 {
1290 int er;
1291
1292 dp = parsestatus(dp, &er);
1293 if (dp == NULL)
1294 return (0);
1295 if (er)
1296 return (1);
1297 if (qflag)
1298 return (1);
1299
1300 TCHECK(dp[2]);
1301 printf(" offset %x size %d ",
1302 EXTRACT_32BITS(&dp[0]), EXTRACT_32BITS(&dp[1]));
1303 if (dp[2] != 0)
1304 printf(" eof");
1305
1306 return (1);
1307 trunc:
1308 return (0);
1309 }
1310
1311 static const u_int32_t *
1312 parse_wcc_attr(const u_int32_t *dp)
1313 {
1314 printf(" sz %" PRIu64, EXTRACT_64BITS(&dp[0]));
1315 printf(" mtime %u.%06u ctime %u.%06u",
1316 EXTRACT_32BITS(&dp[2]), EXTRACT_32BITS(&dp[3]),
1317 EXTRACT_32BITS(&dp[4]), EXTRACT_32BITS(&dp[5]));
1318 return (dp + 6);
1319 }
1320
1321 /*
1322 * Pre operation attributes. Print only if vflag > 1.
1323 */
1324 static const u_int32_t *
1325 parse_pre_op_attr(const u_int32_t *dp, int verbose)
1326 {
1327 TCHECK(dp[0]);
1328 if (!EXTRACT_32BITS(&dp[0]))
1329 return (dp + 1);
1330 dp++;
1331 TCHECK2(*dp, 24);
1332 if (verbose > 1) {
1333 return parse_wcc_attr(dp);
1334 } else {
1335 /* If not verbose enough, just skip over wcc_attr */
1336 return (dp + 6);
1337 }
1338 trunc:
1339 return (NULL);
1340 }
1341
1342 /*
1343 * Post operation attributes are printed if vflag >= 1
1344 */
1345 static const u_int32_t *
1346 parse_post_op_attr(const u_int32_t *dp, int verbose)
1347 {
1348 TCHECK(dp[0]);
1349 if (!EXTRACT_32BITS(&dp[0]))
1350 return (dp + 1);
1351 dp++;
1352 if (verbose) {
1353 return parsefattr(dp, verbose, 1);
1354 } else
1355 return (dp + (NFSX_V3FATTR / sizeof (u_int32_t)));
1356 trunc:
1357 return (NULL);
1358 }
1359
1360 static const u_int32_t *
1361 parse_wcc_data(const u_int32_t *dp, int verbose)
1362 {
1363 if (verbose > 1)
1364 printf(" PRE:");
1365 if (!(dp = parse_pre_op_attr(dp, verbose)))
1366 return (0);
1367
1368 if (verbose)
1369 printf(" POST:");
1370 return parse_post_op_attr(dp, verbose);
1371 }
1372
1373 static const u_int32_t *
1374 parsecreateopres(const u_int32_t *dp, int verbose)
1375 {
1376 int er;
1377
1378 if (!(dp = parsestatus(dp, &er)))
1379 return (0);
1380 if (er)
1381 dp = parse_wcc_data(dp, verbose);
1382 else {
1383 TCHECK(dp[0]);
1384 if (!EXTRACT_32BITS(&dp[0]))
1385 return (dp + 1);
1386 dp++;
1387 if (!(dp = parsefh(dp, 1)))
1388 return (0);
1389 if (verbose) {
1390 if (!(dp = parse_post_op_attr(dp, verbose)))
1391 return (0);
1392 if (vflag > 1) {
1393 printf(" dir attr:");
1394 dp = parse_wcc_data(dp, verbose);
1395 }
1396 }
1397 }
1398 return (dp);
1399 trunc:
1400 return (NULL);
1401 }
1402
1403 static int
1404 parsewccres(const u_int32_t *dp, int verbose)
1405 {
1406 int er;
1407
1408 if (!(dp = parsestatus(dp, &er)))
1409 return (0);
1410 return parse_wcc_data(dp, verbose) != 0;
1411 }
1412
1413 static const u_int32_t *
1414 parsev3rddirres(const u_int32_t *dp, int verbose)
1415 {
1416 int er;
1417
1418 if (!(dp = parsestatus(dp, &er)))
1419 return (0);
1420 if (vflag)
1421 printf(" POST:");
1422 if (!(dp = parse_post_op_attr(dp, verbose)))
1423 return (0);
1424 if (er)
1425 return dp;
1426 if (vflag) {
1427 TCHECK(dp[1]);
1428 printf(" verf %08x%08x", dp[0], dp[1]);
1429 dp += 2;
1430 }
1431 return dp;
1432 trunc:
1433 return (NULL);
1434 }
1435
1436 static int
1437 parsefsinfo(const u_int32_t *dp)
1438 {
1439 struct nfsv3_fsinfo *sfp;
1440 int er;
1441
1442 if (!(dp = parsestatus(dp, &er)))
1443 return (0);
1444 if (vflag)
1445 printf(" POST:");
1446 if (!(dp = parse_post_op_attr(dp, vflag)))
1447 return (0);
1448 if (er)
1449 return (1);
1450
1451 sfp = (struct nfsv3_fsinfo *)dp;
1452 TCHECK(*sfp);
1453 printf(" rtmax %u rtpref %u wtmax %u wtpref %u dtpref %u",
1454 EXTRACT_32BITS(&sfp->fs_rtmax),
1455 EXTRACT_32BITS(&sfp->fs_rtpref),
1456 EXTRACT_32BITS(&sfp->fs_wtmax),
1457 EXTRACT_32BITS(&sfp->fs_wtpref),
1458 EXTRACT_32BITS(&sfp->fs_dtpref));
1459 if (vflag) {
1460 printf(" rtmult %u wtmult %u maxfsz %" PRIu64,
1461 EXTRACT_32BITS(&sfp->fs_rtmult),
1462 EXTRACT_32BITS(&sfp->fs_wtmult),
1463 EXTRACT_64BITS((u_int32_t *)&sfp->fs_maxfilesize));
1464 printf(" delta %u.%06u ",
1465 EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_sec),
1466 EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_nsec));
1467 }
1468 return (1);
1469 trunc:
1470 return (0);
1471 }
1472
1473 static int
1474 parsepathconf(const u_int32_t *dp)
1475 {
1476 int er;
1477 struct nfsv3_pathconf *spp;
1478
1479 if (!(dp = parsestatus(dp, &er)))
1480 return (0);
1481 if (vflag)
1482 printf(" POST:");
1483 if (!(dp = parse_post_op_attr(dp, vflag)))
1484 return (0);
1485 if (er)
1486 return (1);
1487
1488 spp = (struct nfsv3_pathconf *)dp;
1489 TCHECK(*spp);
1490
1491 printf(" linkmax %u namemax %u %s %s %s %s",
1492 EXTRACT_32BITS(&spp->pc_linkmax),
1493 EXTRACT_32BITS(&spp->pc_namemax),
1494 EXTRACT_32BITS(&spp->pc_notrunc) ? "notrunc" : "",
1495 EXTRACT_32BITS(&spp->pc_chownrestricted) ? "chownres" : "",
1496 EXTRACT_32BITS(&spp->pc_caseinsensitive) ? "igncase" : "",
1497 EXTRACT_32BITS(&spp->pc_casepreserving) ? "keepcase" : "");
1498 return (1);
1499 trunc:
1500 return (0);
1501 }
1502
1503 static void
1504 interp_reply(const struct sunrpc_msg *rp, u_int32_t proc, u_int32_t vers, int length)
1505 {
1506 register const u_int32_t *dp;
1507 register int v3;
1508 int er;
1509
1510 v3 = (vers == NFS_VER3);
1511
1512 if (!v3 && proc < NFS_NPROCS)
1513 proc = nfsv3_procid[proc];
1514
1515 switch (proc) {
1516
1517 case NFSPROC_NOOP:
1518 printf(" nop");
1519 return;
1520
1521 case NFSPROC_NULL:
1522 printf(" null");
1523 return;
1524
1525 case NFSPROC_GETATTR:
1526 printf(" getattr");
1527 dp = parserep(rp, length);
1528 if (dp != NULL && parseattrstat(dp, !qflag, v3) != 0)
1529 return;
1530 break;
1531
1532 case NFSPROC_SETATTR:
1533 printf(" setattr");
1534 if (!(dp = parserep(rp, length)))
1535 return;
1536 if (v3) {
1537 if (parsewccres(dp, vflag))
1538 return;
1539 } else {
1540 if (parseattrstat(dp, !qflag, 0) != 0)
1541 return;
1542 }
1543 break;
1544
1545 case NFSPROC_LOOKUP:
1546 printf(" lookup");
1547 if (!(dp = parserep(rp, length)))
1548 break;
1549 if (v3) {
1550 if (!(dp = parsestatus(dp, &er)))
1551 break;
1552 if (er) {
1553 if (vflag > 1) {
1554 printf(" post dattr:");
1555 dp = parse_post_op_attr(dp, vflag);
1556 }
1557 } else {
1558 if (!(dp = parsefh(dp, v3)))
1559 break;
1560 if ((dp = parse_post_op_attr(dp, vflag)) &&
1561 vflag > 1) {
1562 printf(" post dattr:");
1563 dp = parse_post_op_attr(dp, vflag);
1564 }
1565 }
1566 if (dp)
1567 return;
1568 } else {
1569 if (parsediropres(dp) != 0)
1570 return;
1571 }
1572 break;
1573
1574 case NFSPROC_ACCESS:
1575 printf(" access");
1576 if (!(dp = parserep(rp, length)))
1577 break;
1578 if (!(dp = parsestatus(dp, &er)))
1579 break;
1580 if (vflag)
1581 printf(" attr:");
1582 if (!(dp = parse_post_op_attr(dp, vflag)))
1583 break;
1584 if (!er)
1585 printf(" c %04x", EXTRACT_32BITS(&dp[0]));
1586 return;
1587
1588 case NFSPROC_READLINK:
1589 printf(" readlink");
1590 dp = parserep(rp, length);
1591 if (dp != NULL && parselinkres(dp, v3) != 0)
1592 return;
1593 break;
1594
1595 case NFSPROC_READ:
1596 printf(" read");
1597 if (!(dp = parserep(rp, length)))
1598 break;
1599 if (v3) {
1600 if (!(dp = parsestatus(dp, &er)))
1601 break;
1602 if (!(dp = parse_post_op_attr(dp, vflag)))
1603 break;
1604 if (er)
1605 return;
1606 if (vflag) {
1607 TCHECK(dp[1]);
1608 printf(" %u bytes", EXTRACT_32BITS(&dp[0]));
1609 if (EXTRACT_32BITS(&dp[1]))
1610 printf(" EOF");
1611 }
1612 return;
1613 } else {
1614 if (parseattrstat(dp, vflag, 0) != 0)
1615 return;
1616 }
1617 break;
1618
1619 case NFSPROC_WRITE:
1620 printf(" write");
1621 if (!(dp = parserep(rp, length)))
1622 break;
1623 if (v3) {
1624 if (!(dp = parsestatus(dp, &er)))
1625 break;
1626 if (!(dp = parse_wcc_data(dp, vflag)))
1627 break;
1628 if (er)
1629 return;
1630 if (vflag) {
1631 TCHECK(dp[0]);
1632 printf(" %u bytes", EXTRACT_32BITS(&dp[0]));
1633 if (vflag > 1) {
1634 TCHECK(dp[1]);
1635 printf(" <%s>",
1636 tok2str(nfsv3_writemodes,
1637 NULL, EXTRACT_32BITS(&dp[1])));
1638 }
1639 return;
1640 }
1641 } else {
1642 if (parseattrstat(dp, vflag, v3) != 0)
1643 return;
1644 }
1645 break;
1646
1647 case NFSPROC_CREATE:
1648 printf(" create");
1649 if (!(dp = parserep(rp, length)))
1650 break;
1651 if (v3) {
1652 if (parsecreateopres(dp, vflag) != 0)
1653 return;
1654 } else {
1655 if (parsediropres(dp) != 0)
1656 return;
1657 }
1658 break;
1659
1660 case NFSPROC_MKDIR:
1661 printf(" mkdir");
1662 if (!(dp = parserep(rp, length)))
1663 break;
1664 if (v3) {
1665 if (parsecreateopres(dp, vflag) != 0)
1666 return;
1667 } else {
1668 if (parsediropres(dp) != 0)
1669 return;
1670 }
1671 break;
1672
1673 case NFSPROC_SYMLINK:
1674 printf(" symlink");
1675 if (!(dp = parserep(rp, length)))
1676 break;
1677 if (v3) {
1678 if (parsecreateopres(dp, vflag) != 0)
1679 return;
1680 } else {
1681 if (parsestatus(dp, &er) != 0)
1682 return;
1683 }
1684 break;
1685
1686 case NFSPROC_MKNOD:
1687 printf(" mknod");
1688 if (!(dp = parserep(rp, length)))
1689 break;
1690 if (parsecreateopres(dp, vflag) != 0)
1691 return;
1692 break;
1693
1694 case NFSPROC_REMOVE:
1695 printf(" remove");
1696 if (!(dp = parserep(rp, length)))
1697 break;
1698 if (v3) {
1699 if (parsewccres(dp, vflag))
1700 return;
1701 } else {
1702 if (parsestatus(dp, &er) != 0)
1703 return;
1704 }
1705 break;
1706
1707 case NFSPROC_RMDIR:
1708 printf(" rmdir");
1709 if (!(dp = parserep(rp, length)))
1710 break;
1711 if (v3) {
1712 if (parsewccres(dp, vflag))
1713 return;
1714 } else {
1715 if (parsestatus(dp, &er) != 0)
1716 return;
1717 }
1718 break;
1719
1720 case NFSPROC_RENAME:
1721 printf(" rename");
1722 if (!(dp = parserep(rp, length)))
1723 break;
1724 if (v3) {
1725 if (!(dp = parsestatus(dp, &er)))
1726 break;
1727 if (vflag) {
1728 printf(" from:");
1729 if (!(dp = parse_wcc_data(dp, vflag)))
1730 break;
1731 printf(" to:");
1732 if (!(dp = parse_wcc_data(dp, vflag)))
1733 break;
1734 }
1735 return;
1736 } else {
1737 if (parsestatus(dp, &er) != 0)
1738 return;
1739 }
1740 break;
1741
1742 case NFSPROC_LINK:
1743 printf(" link");
1744 if (!(dp = parserep(rp, length)))
1745 break;
1746 if (v3) {
1747 if (!(dp = parsestatus(dp, &er)))
1748 break;
1749 if (vflag) {
1750 printf(" file POST:");
1751 if (!(dp = parse_post_op_attr(dp, vflag)))
1752 break;
1753 printf(" dir:");
1754 if (!(dp = parse_wcc_data(dp, vflag)))
1755 break;
1756 return;
1757 }
1758 } else {
1759 if (parsestatus(dp, &er) != 0)
1760 return;
1761 }
1762 break;
1763
1764 case NFSPROC_READDIR:
1765 printf(" readdir");
1766 if (!(dp = parserep(rp, length)))
1767 break;
1768 if (v3) {
1769 if (parsev3rddirres(dp, vflag))
1770 return;
1771 } else {
1772 if (parserddires(dp) != 0)
1773 return;
1774 }
1775 break;
1776
1777 case NFSPROC_READDIRPLUS:
1778 printf(" readdirplus");
1779 if (!(dp = parserep(rp, length)))
1780 break;
1781 if (parsev3rddirres(dp, vflag))
1782 return;
1783 break;
1784
1785 case NFSPROC_FSSTAT:
1786 printf(" fsstat");
1787 dp = parserep(rp, length);
1788 if (dp != NULL && parsestatfs(dp, v3) != 0)
1789 return;
1790 break;
1791
1792 case NFSPROC_FSINFO:
1793 printf(" fsinfo");
1794 dp = parserep(rp, length);
1795 if (dp != NULL && parsefsinfo(dp) != 0)
1796 return;
1797 break;
1798
1799 case NFSPROC_PATHCONF:
1800 printf(" pathconf");
1801 dp = parserep(rp, length);
1802 if (dp != NULL && parsepathconf(dp) != 0)
1803 return;
1804 break;
1805
1806 case NFSPROC_COMMIT:
1807 printf(" commit");
1808 dp = parserep(rp, length);
1809 if (dp != NULL && parsewccres(dp, vflag) != 0)
1810 return;
1811 break;
1812
1813 default:
1814 printf(" proc-%u", proc);
1815 return;
1816 }
1817 trunc:
1818 if (!nfserr)
1819 fputs(" [|nfs]", stdout);
1820 }