};
static void
-print_nfsaddr(netdissect_options *ndo,
+nfsaddr_print(netdissect_options *ndo,
const u_char *bp, const char *s, const char *d)
{
const struct ip *ip;
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip *)bp;
- strlcpy(srcaddr, ipaddr_string(ndo, ip->ip_src), sizeof(srcaddr));
- strlcpy(dstaddr, ipaddr_string(ndo, ip->ip_dst), sizeof(dstaddr));
+ strlcpy(srcaddr, GET_IPADDR_STRING(ip->ip_src), sizeof(srcaddr));
+ strlcpy(dstaddr, GET_IPADDR_STRING(ip->ip_dst), sizeof(dstaddr));
break;
case 6:
ip6 = (const struct ip6_hdr *)bp;
- strlcpy(srcaddr, ip6addr_string(ndo, ip6->ip6_src),
+ strlcpy(srcaddr, GET_IP6ADDR_STRING(ip6->ip6_src),
sizeof(srcaddr));
- strlcpy(dstaddr, ip6addr_string(ndo, ip6->ip6_dst),
+ strlcpy(dstaddr, GET_IP6ADDR_STRING(ip6->ip6_dst),
sizeof(dstaddr));
break;
default:
parse_sattr3(netdissect_options *ndo,
const uint32_t *dp, struct nfsv3_sattr *sa3)
{
- ND_TCHECK_4(dp);
sa3->sa_modeset = GET_BE_U_4(dp);
dp++;
if (sa3->sa_modeset) {
- ND_TCHECK_4(dp);
sa3->sa_mode = GET_BE_U_4(dp);
dp++;
}
- ND_TCHECK_4(dp);
sa3->sa_uidset = GET_BE_U_4(dp);
dp++;
if (sa3->sa_uidset) {
- ND_TCHECK_4(dp);
sa3->sa_uid = GET_BE_U_4(dp);
dp++;
}
- ND_TCHECK_4(dp);
sa3->sa_gidset = GET_BE_U_4(dp);
dp++;
if (sa3->sa_gidset) {
- ND_TCHECK_4(dp);
sa3->sa_gid = GET_BE_U_4(dp);
dp++;
}
- ND_TCHECK_4(dp);
sa3->sa_sizeset = GET_BE_U_4(dp);
dp++;
if (sa3->sa_sizeset) {
- ND_TCHECK_4(dp);
sa3->sa_size = GET_BE_U_4(dp);
dp++;
}
- ND_TCHECK_4(dp);
sa3->sa_atimetype = GET_BE_U_4(dp);
dp++;
if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) {
- ND_TCHECK_4(dp + 1);
sa3->sa_atime.nfsv3_sec = GET_BE_U_4(dp);
dp++;
sa3->sa_atime.nfsv3_nsec = GET_BE_U_4(dp);
dp++;
}
- ND_TCHECK_4(dp);
sa3->sa_mtimetype = GET_BE_U_4(dp);
dp++;
if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) {
- ND_TCHECK_4(dp + 1);
sa3->sa_mtime.nfsv3_sec = GET_BE_U_4(dp);
dp++;
sa3->sa_mtime.nfsv3_nsec = GET_BE_U_4(dp);
}
return dp;
-trunc:
- return NULL;
}
static void
ndo->ndo_protocol = "nfs";
rp = (const struct sunrpc_msg *)bp;
- ND_TCHECK_4(rp->rm_xid);
if (!ndo->ndo_nflag) {
strlcpy(srcid, "nfs", sizeof(srcid));
- nd_snprintf(dstid, sizeof(dstid), "%u",
+ snprintf(dstid, sizeof(dstid), "%u",
GET_BE_U_4(rp->rm_xid));
} else {
- nd_snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
- nd_snprintf(dstid, sizeof(dstid), "%u",
+ snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
+ snprintf(dstid, sizeof(dstid), "%u",
GET_BE_U_4(rp->rm_xid));
}
- print_nfsaddr(ndo, bp2, srcid, dstid);
+ nfsaddr_print(ndo, bp2, srcid, dstid);
nfsreply_noaddr_print(ndo, bp, length, bp2);
- return;
-
-trunc:
- nd_print_trunc(ndo);
}
void
dp = (const uint32_t *)&rp->rm_call.cb_cred;
if (length < 2 * sizeof(*dp))
goto trunc;
- ND_TCHECK_4(dp + 1);
len = GET_BE_U_4(dp + 1);
rounded_len = roundup2(len, 4);
ND_TCHECK_LEN(dp + 2, rounded_len);
*/
if (length < 2 * sizeof(*dp))
goto trunc;
- ND_TCHECK_4(dp + 1);
len = GET_BE_U_4(dp + 1);
rounded_len = roundup2(len, 4);
ND_TCHECK_LEN(dp + 2, rounded_len);
u_int len;
if (v3) {
- ND_TCHECK_4(dp);
len = GET_BE_U_4(dp) / 4;
dp++;
} else
if (ND_TTEST_LEN(dp, len * sizeof(*dp))) {
nfs_printfh(ndo, dp, len);
return (dp + len);
- }
-trunc:
- return (NULL);
+ } else
+ return NULL;
}
/*
parsefn(netdissect_options *ndo,
const uint32_t *dp)
{
- uint32_t len;
+ uint32_t len, rounded_len;
const u_char *cp;
- /* Bail if we don't have the string length */
- ND_TCHECK_4(dp);
-
/* Fetch big-endian string length */
len = GET_BE_U_4(dp);
dp++;
return NULL;
}
- ND_TCHECK_LEN(dp, ((len + 3) & ~3));
+ rounded_len = roundup2(len, 4);
+ ND_TCHECK_LEN(dp, rounded_len);
cp = (const u_char *)dp;
/* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */
- dp += ((len + 3) & ~3) / sizeof(*dp);
+ dp += rounded_len / sizeof(*dp);
ND_PRINT("\"");
if (nd_printn(ndo, cp, len, ndo->ndo_snapend)) {
ND_PRINT("\"");
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
- ND_TCHECK_4(dp);
access_flags = GET_BE_U_4(dp);
if (access_flags & ~NFSV3ACCESS_FULL) {
/* NFSV3ACCESS definitions aren't up to date */
if (dp == NULL)
goto trunc;
if (v3) {
- ND_TCHECK_4(dp + 2);
ND_PRINT(" %u bytes @ %" PRIu64,
GET_BE_U_4(dp + 2),
GET_BE_U_8(dp));
} else {
- ND_TCHECK_4(dp + 1);
ND_PRINT(" %u bytes @ %u",
GET_BE_U_4(dp + 1),
GET_BE_U_4(dp));
if (dp == NULL)
goto trunc;
if (v3) {
- ND_TCHECK_4(dp + 4);
ND_PRINT(" %u (%u) bytes @ %" PRIu64,
GET_BE_U_4(dp + 4),
GET_BE_U_4(dp + 2),
NULL, GET_BE_U_4(dp + 3)));
}
} else {
- ND_TCHECK_4(dp + 3);
ND_PRINT(" %u (%u) bytes @ %u (%u)",
GET_BE_U_4(dp + 3),
GET_BE_U_4(dp + 2),
dp = parsefhn(ndo, dp, v3);
if (dp == NULL)
goto trunc;
- ND_TCHECK_4(dp);
type = (nfs_type) GET_BE_U_4(dp);
dp++;
dp = parse_sattr3(ndo, dp, &sa3);
goto trunc;
ND_PRINT(" %s", tok2str(type2str, "unk-ft %u", type));
if (ndo->ndo_vflag && (type == NFCHR || type == NFBLK)) {
- ND_TCHECK_4(dp + 1);
ND_PRINT(" %u/%u",
GET_BE_U_4(dp),
GET_BE_U_4(dp + 1));
if (dp == NULL)
goto trunc;
if (v3) {
- ND_TCHECK_4(dp + 4);
/*
* We shouldn't really try to interpret the
* offset cookie here.
GET_BE_U_4(dp + 3));
}
} else {
- ND_TCHECK_4(dp + 1);
/*
* Print the offset as signed, since -1 is
* common, but offsets > 2^31 aren't.
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
- ND_TCHECK_4(dp + 4);
/*
* We don't try to interpret the offset
* cookie here.
GET_BE_U_4(dp + 4),
GET_BE_U_8(dp));
if (ndo->ndo_vflag) {
- ND_TCHECK_4(dp + 5);
/*
* This displays the 8 bytes
* of the verifier in order,
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
- ND_TCHECK_4(dp + 2);
ND_PRINT(" %u bytes @ %" PRIu64,
GET_BE_U_4(dp + 2),
GET_BE_U_8(dp));
/* Print the undecoded handle */
ND_PRINT("%s", fsid.Opaque_Handle);
else
- ND_PRINT("%ld", (long) ino);
+ ND_PRINT("%u", ino);
}
/*
struct xid_map_entry {
uint32_t xid; /* transaction ID (net order) */
int ipver; /* IP version (4 or 6) */
- struct in6_addr client; /* client IP address (net order) */
- struct in6_addr server; /* server IP address (net order) */
+ nd_ipv6 client; /* client IP address (net order) */
+ nd_ipv6 server; /* server IP address (net order) */
uint32_t proc; /* call proc number (host order) */
uint32_t vers; /* program version (host order) */
};
* which is an "enum" and so occupies one 32-bit word.
*/
dp = ((const uint32_t *)&rp->rm_reply) + 1;
- ND_TCHECK_4(dp + 1);
len = GET_BE_U_4(dp + 1);
if (len >= length)
return (NULL);
/*
* now we can check the ar_stat field
*/
- ND_TCHECK_4(dp);
astat = (enum sunrpc_accept_stat) GET_BE_U_4(dp);
if (astat != SUNRPC_SUCCESS) {
ND_PRINT(" %s", tok2str(sunrpc_str, "ar_stat %u", astat));
{
u_int errnum;
- ND_TCHECK_4(dp);
-
errnum = GET_BE_U_4(dp);
if (er)
*er = errnum;
*nfserrp = 1;
}
return (dp + 1);
-trunc:
- return NULL;
}
static const uint32_t *
GET_BE_S_4(fap->fa_uid),
GET_BE_S_4(fap->fa_gid));
if (v3) {
- ND_TCHECK_8(fap->fa3_size);
ND_PRINT(" sz %" PRIu64,
GET_BE_U_8(fap->fa3_size));
} else {
- ND_TCHECK_4(fap->fa2_size);
ND_PRINT(" sz %u", GET_BE_U_4(fap->fa2_size));
}
}
if (ndo->ndo_qflag)
return (1);
- ND_TCHECK_4(dp + 2);
ND_PRINT(" offset 0x%x size %u ",
GET_BE_U_4(dp), GET_BE_U_4(dp + 1));
if (GET_BE_U_4(dp + 2) != 0)
ND_PRINT(" eof");
return (1);
-trunc:
- return (0);
}
static const uint32_t *
parse_pre_op_attr(netdissect_options *ndo,
const uint32_t *dp, int verbose)
{
- ND_TCHECK_4(dp);
if (!GET_BE_U_4(dp))
return (dp + 1);
dp++;
parse_post_op_attr(netdissect_options *ndo,
const uint32_t *dp, int verbose)
{
- ND_TCHECK_4(dp);
if (!GET_BE_U_4(dp))
return (dp + 1);
dp++;
return parsefattr(ndo, dp, verbose, 1);
} else
return (dp + (NFSX_V3FATTR / sizeof (uint32_t)));
-trunc:
- return (NULL);
}
static const uint32_t *
if (er)
dp = parse_wcc_data(ndo, dp, verbose);
else {
- ND_TCHECK_4(dp);
if (!GET_BE_U_4(dp))
return (dp + 1);
dp++;
}
}
return (dp);
-trunc:
- return (NULL);
}
static const uint32_t *
if (er)
return dp;
if (ndo->ndo_vflag) {
- ND_TCHECK_4(dp + 1);
/*
* This displays the 8 bytes of the verifier in order,
* from the low-order byte to the high-order byte.
dp += 2;
}
return dp;
-trunc:
- return (NULL);
}
static int
if (dp == NULL)
goto trunc;
if (!er) {
- ND_TCHECK_4(dp);
ND_PRINT(" c %04x", GET_BE_U_4(dp));
}
break;
goto trunc;
if (!er) {
if (ndo->ndo_vflag) {
- ND_TCHECK_4(dp + 1);
ND_PRINT(" %u bytes", GET_BE_U_4(dp));
if (GET_BE_U_4(dp + 1))
ND_PRINT(" EOF");
goto trunc;
if (!er) {
if (ndo->ndo_vflag) {
- ND_TCHECK_4(dp);
ND_PRINT(" %u bytes", GET_BE_U_4(dp));
if (ndo->ndo_vflag > 1) {
- ND_TCHECK_4(dp + 1);
ND_PRINT(" <%s>",
tok2str(nfsv3_writemodes,
NULL, GET_BE_U_4(dp + 1)));
/* write-verf-cookie */
- ND_TCHECK_8(dp + 2);
ND_PRINT(" verf %" PRIx64,
GET_BE_U_8(dp + 2));
}
goto trunc;
if (ndo->ndo_vflag > 1) {
/* write-verf-cookie */
- ND_TCHECK_8(dp);
ND_PRINT(" verf %" PRIx64, GET_BE_U_8(dp));
}
break;