]> The Tcpdump Group git mirrors - tcpdump/blobdiff - print-nfs.c
Revert partially the commit 21b1273
[tcpdump] / print-nfs.c
index 21703ba957ad91382d0ef9bf7cfd6ccf482a05fc..20b0cfcef4d8260537b2a3aa690c7cd88b9dab87 100644 (file)
  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  */
 
-#ifndef lint
-static const char rcsid[] =
-    "@(#) $Header: /tcpdump/master/tcpdump/print-nfs.c,v 1.66 1999-10-17 21:37:14 mcr Exp $ (LBL)";
-#endif
-
-#include <sys/param.h>
-#include <sys/time.h>
-#include <sys/socket.h>
+/* \summary: Network File System (NFS) printer */
 
-#if __STDC__
-struct mbuf;
-struct rtentry;
+#ifdef HAVE_CONFIG_H
+#include <config.h>
 #endif
-#include <net/if.h>
-
-#include <netinet/in.h>
-#include <netinet/if_ether.h>
-#include <netinet/in_systm.h>
-#include <netinet/ip.h>
 
-#include <rpc/rpc.h>
+#include "netdissect-stdinc.h"
 
-#include <ctype.h>
-#include <pcap.h>
 #include <stdio.h>
 #include <string.h>
+#include <limits.h>
 
-#include "interface.h"
+#include "netdissect.h"
 #include "addrtoname.h"
+#include "extract.h"
 
-#include "nfsv2.h"
+#include "nfs.h"
 #include "nfsfh.h"
 
-static void nfs_printfh(const u_int32_t *);
-static void xid_map_enter(const struct rpc_msg *, const struct ip *);
-static u_int32_t xid_map_find(const struct rpc_msg *, const struct ip *,
-    u_int32_t *);
-static void interp_reply(const struct rpc_msg *, u_int32_t, u_int);
+#include "ip.h"
+#include "ip6.h"
+#include "rpc_auth.h"
+#include "rpc_msg.h"
+
+
+static void nfs_printfh(netdissect_options *, const uint32_t *, const u_int);
+static int xid_map_enter(netdissect_options *, const struct sunrpc_msg *, const u_char *);
+static int xid_map_find(netdissect_options *, const struct sunrpc_msg *, const u_char *, uint32_t *, uint32_t *);
+static void interp_reply(netdissect_options *, const struct sunrpc_msg *, uint32_t, uint32_t, int);
+static const uint32_t *parse_post_op_attr(netdissect_options *, const uint32_t *, int);
+
+/*
+ * Mapping of old NFS Version 2 RPC numbers to generic numbers.
+ */
+static uint32_t nfsv3_procid[NFS_NPROCS] = {
+       NFSPROC_NULL,
+       NFSPROC_GETATTR,
+       NFSPROC_SETATTR,
+       NFSPROC_NOOP,
+       NFSPROC_LOOKUP,
+       NFSPROC_READLINK,
+       NFSPROC_READ,
+       NFSPROC_NOOP,
+       NFSPROC_WRITE,
+       NFSPROC_CREATE,
+       NFSPROC_REMOVE,
+       NFSPROC_RENAME,
+       NFSPROC_LINK,
+       NFSPROC_SYMLINK,
+       NFSPROC_MKDIR,
+       NFSPROC_RMDIR,
+       NFSPROC_READDIR,
+       NFSPROC_FSSTAT,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP,
+       NFSPROC_NOOP
+};
+
+static const struct tok nfsproc_str[] = {
+       { NFSPROC_NOOP,        "nop"         },
+       { NFSPROC_NULL,        "null"        },
+       { NFSPROC_GETATTR,     "getattr"     },
+       { NFSPROC_SETATTR,     "setattr"     },
+       { NFSPROC_LOOKUP,      "lookup"      },
+       { NFSPROC_ACCESS,      "access"      },
+       { NFSPROC_READLINK,    "readlink"    },
+       { NFSPROC_READ,        "read"        },
+       { NFSPROC_WRITE,       "write"       },
+       { NFSPROC_CREATE,      "create"      },
+       { NFSPROC_MKDIR,       "mkdir"       },
+       { NFSPROC_SYMLINK,     "symlink"     },
+       { NFSPROC_MKNOD,       "mknod"       },
+       { NFSPROC_REMOVE,      "remove"      },
+       { NFSPROC_RMDIR,       "rmdir"       },
+       { NFSPROC_RENAME,      "rename"      },
+       { NFSPROC_LINK,        "link"        },
+       { NFSPROC_READDIR,     "readdir"     },
+       { NFSPROC_READDIRPLUS, "readdirplus" },
+       { NFSPROC_FSSTAT,      "fsstat"      },
+       { NFSPROC_FSINFO,      "fsinfo"      },
+       { NFSPROC_PATHCONF,    "pathconf"    },
+       { NFSPROC_COMMIT,      "commit"      },
+       { 0, NULL }
+};
+
+/*
+ * NFS V2 and V3 status values.
+ *
+ * Some of these come from the RFCs for NFS V2 and V3, with the message
+ * strings taken from the FreeBSD C library "errlst.c".
+ *
+ * Others are errors that are not in the RFC but that I suspect some
+ * NFS servers could return; the values are FreeBSD errno values, as
+ * the first NFS server was the SunOS 2.0 one, and until 5.0 SunOS
+ * was primarily BSD-derived.
+ */
+static const struct tok status2str[] = {
+       { 1,     "Operation not permitted" },   /* EPERM */
+       { 2,     "No such file or directory" }, /* ENOENT */
+       { 5,     "Input/output error" },        /* EIO */
+       { 6,     "Device not configured" },     /* ENXIO */
+       { 11,    "Resource deadlock avoided" }, /* EDEADLK */
+       { 12,    "Cannot allocate memory" },    /* ENOMEM */
+       { 13,    "Permission denied" },         /* EACCES */
+       { 17,    "File exists" },               /* EEXIST */
+       { 18,    "Cross-device link" },         /* EXDEV */
+       { 19,    "Operation not supported by device" }, /* ENODEV */
+       { 20,    "Not a directory" },           /* ENOTDIR */
+       { 21,    "Is a directory" },            /* EISDIR */
+       { 22,    "Invalid argument" },          /* EINVAL */
+       { 26,    "Text file busy" },            /* ETXTBSY */
+       { 27,    "File too large" },            /* EFBIG */
+       { 28,    "No space left on device" },   /* ENOSPC */
+       { 30,    "Read-only file system" },     /* EROFS */
+       { 31,    "Too many links" },            /* EMLINK */
+       { 45,    "Operation not supported" },   /* EOPNOTSUPP */
+       { 62,    "Too many levels of symbolic links" }, /* ELOOP */
+       { 63,    "File name too long" },        /* ENAMETOOLONG */
+       { 66,    "Directory not empty" },       /* ENOTEMPTY */
+       { 69,    "Disc quota exceeded" },       /* EDQUOT */
+       { 70,    "Stale NFS file handle" },     /* ESTALE */
+       { 71,    "Too many levels of remote in path" }, /* EREMOTE */
+       { 99,    "Write cache flushed to disk" }, /* NFSERR_WFLUSH (not used) */
+       { 10001, "Illegal NFS file handle" },   /* NFS3ERR_BADHANDLE */
+       { 10002, "Update synchronization mismatch" }, /* NFS3ERR_NOT_SYNC */
+       { 10003, "READDIR/READDIRPLUS cookie is stale" }, /* NFS3ERR_BAD_COOKIE */
+       { 10004, "Operation not supported" },   /* NFS3ERR_NOTSUPP */
+       { 10005, "Buffer or request is too small" }, /* NFS3ERR_TOOSMALL */
+       { 10006, "Unspecified error on server" }, /* NFS3ERR_SERVERFAULT */
+       { 10007, "Object of that type not supported" }, /* NFS3ERR_BADTYPE */
+       { 10008, "Request couldn't be completed in time" }, /* NFS3ERR_JUKEBOX */
+       { 0,     NULL }
+};
+
+static const struct tok nfsv3_writemodes[] = {
+       { 0,            "unstable" },
+       { 1,            "datasync" },
+       { 2,            "filesync" },
+       { 0,            NULL }
+};
+
+static const struct tok type2str[] = {
+       { NFNON,        "NON" },
+       { NFREG,        "REG" },
+       { NFDIR,        "DIR" },
+       { NFBLK,        "BLK" },
+       { NFCHR,        "CHR" },
+       { NFLNK,        "LNK" },
+       { NFFIFO,       "FIFO" },
+       { 0,            NULL }
+};
+
+static const struct tok sunrpc_auth_str[] = {
+       { SUNRPC_AUTH_OK,           "OK"                                                     },
+       { SUNRPC_AUTH_BADCRED,      "Bogus Credentials (seal broken)"                        },
+       { SUNRPC_AUTH_REJECTEDCRED, "Rejected Credentials (client should begin new session)" },
+       { SUNRPC_AUTH_BADVERF,      "Bogus Verifier (seal broken)"                           },
+       { SUNRPC_AUTH_REJECTEDVERF, "Verifier expired or was replayed"                       },
+       { SUNRPC_AUTH_TOOWEAK,      "Credentials are too weak"                               },
+       { SUNRPC_AUTH_INVALIDRESP,  "Bogus response verifier"                                },
+       { SUNRPC_AUTH_FAILED,       "Unknown failure"                                        },
+       { 0, NULL }
+};
+
+static const struct tok sunrpc_str[] = {
+       { SUNRPC_PROG_UNAVAIL,  "PROG_UNAVAIL"  },
+       { SUNRPC_PROG_MISMATCH, "PROG_MISMATCH" },
+       { SUNRPC_PROC_UNAVAIL,  "PROC_UNAVAIL"  },
+       { SUNRPC_GARBAGE_ARGS,  "GARBAGE_ARGS"  },
+       { SUNRPC_SYSTEM_ERR,    "SYSTEM_ERR"    },
+       { 0, NULL }
+};
+
+static void
+print_nfsaddr(netdissect_options *ndo,
+              const u_char *bp, const char *s, const char *d)
+{
+       const struct ip *ip;
+       const struct ip6_hdr *ip6;
+       char srcaddr[INET6_ADDRSTRLEN], dstaddr[INET6_ADDRSTRLEN];
+
+       srcaddr[0] = dstaddr[0] = '\0';
+       switch (IP_V((const struct ip *)bp)) {
+       case 4:
+               ip = (const struct ip *)bp;
+               strlcpy(srcaddr, GET_IPADDR_STRING(ip->ip_src), sizeof(srcaddr));
+               strlcpy(dstaddr, GET_IPADDR_STRING(ip->ip_dst), sizeof(dstaddr));
+               break;
+       case 6:
+               ip6 = (const struct ip6_hdr *)bp;
+               strlcpy(srcaddr, GET_IP6ADDR_STRING(ip6->ip6_src),
+                   sizeof(srcaddr));
+               strlcpy(dstaddr, GET_IP6ADDR_STRING(ip6->ip6_dst),
+                   sizeof(dstaddr));
+               break;
+       default:
+               strlcpy(srcaddr, "?", sizeof(srcaddr));
+               strlcpy(dstaddr, "?", sizeof(dstaddr));
+               break;
+       }
+
+       ND_PRINT("%s.%s > %s.%s: ", srcaddr, s, dstaddr, d);
+}
+
+/*
+ * NFS Version 3 sattr3 structure for the new node creation case.
+ * This does not have a fixed layout on the network, so this
+ * structure does not correspond to the layout of the data on
+ * the network; it's used to store the data when the sattr3
+ * is parsed for use when it's later printed.
+ */
+struct nfsv3_sattr {
+       uint32_t sa_modeset;
+       uint32_t sa_mode;
+       uint32_t sa_uidset;
+       uint32_t sa_uid;
+       uint32_t sa_gidset;
+       uint32_t sa_gid;
+       uint32_t sa_sizeset;
+       uint32_t sa_size;
+       uint32_t sa_atimetype;
+       struct {
+               uint32_t nfsv3_sec;
+               uint32_t nfsv3_nsec;
+       }        sa_atime;
+       uint32_t sa_mtimetype;
+       struct {
+               uint32_t nfsv3_sec;
+               uint32_t nfsv3_nsec;
+       }        sa_mtime;
+};
+
+static const uint32_t *
+parse_sattr3(netdissect_options *ndo,
+             const uint32_t *dp, struct nfsv3_sattr *sa3)
+{
+       sa3->sa_modeset = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_modeset) {
+               sa3->sa_mode = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       sa3->sa_uidset = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_uidset) {
+               sa3->sa_uid = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       sa3->sa_gidset = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_gidset) {
+               sa3->sa_gid = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       sa3->sa_sizeset = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_sizeset) {
+               sa3->sa_size = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       sa3->sa_atimetype = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) {
+               sa3->sa_atime.nfsv3_sec = GET_BE_U_4(dp);
+               dp++;
+               sa3->sa_atime.nfsv3_nsec = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       sa3->sa_mtimetype = GET_BE_U_4(dp);
+       dp++;
+       if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) {
+               sa3->sa_mtime.nfsv3_sec = GET_BE_U_4(dp);
+               dp++;
+               sa3->sa_mtime.nfsv3_nsec = GET_BE_U_4(dp);
+               dp++;
+       }
+
+       return dp;
+}
+
+static void
+print_sattr3(netdissect_options *ndo,
+             const struct nfsv3_sattr *sa3, int verbose)
+{
+       if (sa3->sa_modeset)
+               ND_PRINT(" mode %o", sa3->sa_mode);
+       if (sa3->sa_uidset)
+               ND_PRINT(" uid %u", sa3->sa_uid);
+       if (sa3->sa_gidset)
+               ND_PRINT(" gid %u", sa3->sa_gid);
+       if (verbose > 1) {
+               if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT)
+                       ND_PRINT(" atime %u.%06u", sa3->sa_atime.nfsv3_sec,
+                              sa3->sa_atime.nfsv3_nsec);
+               if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT)
+                       ND_PRINT(" mtime %u.%06u", sa3->sa_mtime.nfsv3_sec,
+                              sa3->sa_mtime.nfsv3_nsec);
+       }
+}
+
+void
+nfsreply_print(netdissect_options *ndo,
+               const u_char *bp, u_int length,
+               const u_char *bp2)
+{
+       const struct sunrpc_msg *rp;
+       char srcid[20], dstid[20];      /*fits 32bit*/
 
-static int nfserr;             /* true if we error rather than trunc */
+       ndo->ndo_protocol = "nfs";
+       rp = (const struct sunrpc_msg *)bp;
+
+       if (!ndo->ndo_nflag) {
+               strlcpy(srcid, "nfs", sizeof(srcid));
+               snprintf(dstid, sizeof(dstid), "%u",
+                   GET_BE_U_4(rp->rm_xid));
+       } else {
+               snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
+               snprintf(dstid, sizeof(dstid), "%u",
+                   GET_BE_U_4(rp->rm_xid));
+       }
+       print_nfsaddr(ndo, bp2, srcid, dstid);
+
+       nfsreply_noaddr_print(ndo, bp, length, bp2);
+}
 
 void
-nfsreply_print(register const u_char *bp, u_int length,
-              register const u_char *bp2)
+nfsreply_noaddr_print(netdissect_options *ndo,
+                      const u_char *bp, u_int length,
+                      const u_char *bp2)
 {
-       register const struct rpc_msg *rp;
-       register const struct ip *ip;
-       u_int32_t proc;
-
-       nfserr = 0;             /* assume no error */
-       rp = (const struct rpc_msg *)bp;
-       ip = (const struct ip *)bp2;
-
-       if (!nflag)
-               (void)printf("%s.nfs > %s.%u: reply %s %d",
-                            ipaddr_string(&ip->ip_src),
-                            ipaddr_string(&ip->ip_dst),
-                            (u_int32_t)ntohl(rp->rm_xid),
-                            ntohl(rp->rm_reply.rp_stat) == MSG_ACCEPTED?
-                                    "ok":"ERR",
-                            length);
-       else
-               (void)printf("%s.%u > %s.%u: reply %s %d",
-                            ipaddr_string(&ip->ip_src),
-                            NFS_PORT,
-                            ipaddr_string(&ip->ip_dst),
-                            (u_int32_t)ntohl(rp->rm_xid),
-                            ntohl(rp->rm_reply.rp_stat) == MSG_ACCEPTED?
-                               "ok":"ERR",
-                            length);
-
-       if (xid_map_find(rp, ip, &proc))
-               interp_reply(rp, proc, length);
+       const struct sunrpc_msg *rp;
+       uint32_t proc, vers, reply_stat;
+       enum sunrpc_reject_stat rstat;
+       uint32_t rlow;
+       uint32_t rhigh;
+       enum sunrpc_auth_stat rwhy;
+
+       ndo->ndo_protocol = "nfs";
+       rp = (const struct sunrpc_msg *)bp;
+
+       ND_TCHECK_4(rp->rm_reply.rp_stat);
+       reply_stat = GET_BE_U_4(&rp->rm_reply.rp_stat);
+       switch (reply_stat) {
+
+       case SUNRPC_MSG_ACCEPTED:
+               ND_PRINT("reply ok %u", length);
+               if (xid_map_find(ndo, rp, bp2, &proc, &vers) >= 0)
+                       interp_reply(ndo, rp, proc, vers, length);
+               break;
+
+       case SUNRPC_MSG_DENIED:
+               ND_PRINT("reply ERR %u: ", length);
+               ND_TCHECK_4(rp->rm_reply.rp_reject.rj_stat);
+               rstat = GET_BE_U_4(&rp->rm_reply.rp_reject.rj_stat);
+               switch (rstat) {
+
+               case SUNRPC_RPC_MISMATCH:
+                       ND_TCHECK_4(rp->rm_reply.rp_reject.rj_vers.high);
+                       rlow = GET_BE_U_4(&rp->rm_reply.rp_reject.rj_vers.low);
+                       rhigh = GET_BE_U_4(&rp->rm_reply.rp_reject.rj_vers.high);
+                       ND_PRINT("RPC Version mismatch (%u-%u)", rlow, rhigh);
+                       break;
+
+               case SUNRPC_AUTH_ERROR:
+                       ND_TCHECK_4(rp->rm_reply.rp_reject.rj_why);
+                       rwhy = GET_BE_U_4(&rp->rm_reply.rp_reject.rj_why);
+                       ND_PRINT("Auth %s", tok2str(sunrpc_auth_str, "Invalid failure code %u", rwhy));
+                       break;
+
+               default:
+                       ND_PRINT("Unknown reason for rejecting rpc message %u", (unsigned int)rstat);
+                       break;
+               }
+               break;
+
+       default:
+               ND_PRINT("reply Unknown rpc response code=%u %u", reply_stat, length);
+               break;
+       }
+       return;
+
+trunc:
+       nd_print_trunc(ndo);
 }
 
 /*
  * Return a pointer to the first file handle in the packet.
  * If the packet was truncated, return 0.
  */
-static const u_int32_t *
-parsereq(register const struct rpc_msg *rp, register u_int length)
+static const uint32_t *
+parsereq(netdissect_options *ndo,
+         const struct sunrpc_msg *rp, u_int length)
 {
-       register const u_int32_t *dp;
-       register u_int len;
+       const uint32_t *dp;
+       u_int len, rounded_len;
 
        /*
-        * find the start of the req data (if we captured it)
+        * Find the start of the req data (if we captured it).
+        * First, get the length of the credentials, and make sure
+        * we have all of the opaque part of the credentials.
         */
-       dp = (u_int32_t *)&rp->rm_call.cb_cred;
-       TCHECK(dp[1]);
-       len = ntohl(dp[1]);
-       if (len < length) {
+       dp = (const uint32_t *)&rp->rm_call.cb_cred;
+       if (length < 2 * sizeof(*dp))
+               goto trunc;
+       len = GET_BE_U_4(dp + 1);
+       rounded_len = roundup2(len, 4);
+       ND_TCHECK_LEN(dp + 2, rounded_len);
+       if (2 * sizeof(*dp) + rounded_len <= length) {
+               /*
+                * We have all of the credentials.  Skip past them; they
+                * consist of 4 bytes of flavor, 4 bytes of length,
+                * and len-rounded-up-to-a-multiple-of-4 bytes of
+                * data.
+                */
                dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
-               TCHECK(dp[1]);
-               len = ntohl(dp[1]);
-               if (len < length) {
+               length -= 2 * sizeof(*dp) + rounded_len;
+
+               /*
+                * Now get the length of the verifier, and make sure
+                * we have all of the opaque part of the verifier.
+                */
+               if (length < 2 * sizeof(*dp))
+                       goto trunc;
+               len = GET_BE_U_4(dp + 1);
+               rounded_len = roundup2(len, 4);
+               ND_TCHECK_LEN(dp + 2, rounded_len);
+               if (2 * sizeof(*dp) + rounded_len < length) {
+                       /*
+                        * We have all of the verifier.  Skip past it;
+                        * it consists of 4 bytes of flavor, 4 bytes of
+                        * length, and len-rounded-up-to-a-multiple-of-4
+                        * bytes of data.
+                        */
                        dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
-                       TCHECK2(dp[0], 0);
                        return (dp);
                }
        }
@@ -128,45 +474,62 @@ trunc:
  * Print out an NFS file handle and return a pointer to following word.
  * If packet was truncated, return 0.
  */
-static const u_int32_t *
-parsefh(register const u_int32_t *dp)
+static const uint32_t *
+parsefh(netdissect_options *ndo,
+        const uint32_t *dp, int v3)
 {
-       if (dp + 8 <= (u_int32_t *)snapend) {
-               nfs_printfh(dp);
-               return (dp + 8);
-       }
-       return (NULL);
+       u_int len;
+
+       if (v3) {
+               len = GET_BE_U_4(dp) / 4;
+               dp++;
+       } else
+               len = NFSX_V2FH / 4;
+
+       if (ND_TTEST_LEN(dp, len * sizeof(*dp))) {
+               nfs_printfh(ndo, dp, len);
+               return (dp + len);
+       } else
+               return NULL;
 }
 
 /*
  * Print out a file name and return pointer to 32-bit word past it.
  * If packet was truncated, return 0.
  */
-static const u_int32_t *
-parsefn(register const u_int32_t *dp)
+static const uint32_t *
+parsefn(netdissect_options *ndo,
+        const uint32_t *dp)
 {
-       register u_int32_t len;
-       register const u_char *cp;
+       uint32_t len, rounded_len;
+       const u_char *cp;
 
-       /* Bail if we don't have the string length */
-       if ((u_char *)dp > snapend - sizeof(*dp))
-               return (NULL);
+       /* Fetch big-endian string length */
+       len = GET_BE_U_4(dp);
+       dp++;
 
-       /* Fetch string length; convert to host order */
-       len = *dp++;
-       NTOHL(len);
+       if (UINT_MAX - len < 3) {
+               ND_PRINT("[cannot pad to 32-bit boundaries]");
+               nd_print_invalid(ndo);
+               return NULL;
+       }
+
+       rounded_len = roundup2(len, 4);
+       ND_TCHECK_LEN(dp, rounded_len);
 
-       cp = (u_char *)dp;
+       cp = (const u_char *)dp;
        /* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */
-       dp += ((len + 3) & ~3) / sizeof(*dp);
-       if ((u_char *)dp > snapend)
-               return (NULL);
-       /* XXX seems like we should be checking the length */
-       putchar('"');
-       (void) fn_printn(cp, len, NULL);
-       putchar('"');
+       dp += rounded_len / sizeof(*dp);
+       ND_PRINT("\"");
+       if (nd_printn(ndo, cp, len, ndo->ndo_snapend)) {
+               ND_PRINT("\"");
+               goto trunc;
+       }
+       ND_PRINT("\"");
 
        return (dp);
+trunc:
+       return NULL;
 }
 
 /*
@@ -174,208 +537,302 @@ parsefn(register const u_int32_t *dp)
  * Return pointer to 32-bit word past file name.
  * If packet was truncated (or there was some other error), return 0.
  */
-static const u_int32_t *
-parsefhn(register const u_int32_t *dp)
+static const uint32_t *
+parsefhn(netdissect_options *ndo,
+         const uint32_t *dp, int v3)
 {
-       dp = parsefh(dp);
+       dp = parsefh(ndo, dp, v3);
        if (dp == NULL)
                return (NULL);
-       putchar(' ');
-       return (parsefn(dp));
+       ND_PRINT(" ");
+       return (parsefn(ndo, dp));
 }
 
 void
-nfsreq_print(register const u_char *bp, u_int length,
-    register const u_char *bp2)
+nfsreq_noaddr_print(netdissect_options *ndo,
+                    const u_char *bp, u_int length,
+                    const u_char *bp2)
 {
-       register const struct rpc_msg *rp;
-       register const struct ip *ip;
-       register const u_int32_t *dp;
-
-       nfserr = 0;             /* assume no error */
-       rp = (const struct rpc_msg *)bp;
-       ip = (const struct ip *)bp2;
-       if (!nflag)
-               (void)printf("%s.%u > %s.nfs: %d",
-                            ipaddr_string(&ip->ip_src),
-                            (u_int32_t)ntohl(rp->rm_xid),
-                            ipaddr_string(&ip->ip_dst),
-                            length);
-       else
-               (void)printf("%s.%u > %s.%u: %d",
-                            ipaddr_string(&ip->ip_src),
-                            (u_int32_t)ntohl(rp->rm_xid),
-                            ipaddr_string(&ip->ip_dst),
-                            NFS_PORT,
-                            length);
-
-       xid_map_enter(rp, ip);  /* record proc number for later on */
-
-       switch (ntohl(rp->rm_call.cb_proc)) {
-#ifdef NFSPROC_NOOP
-       case NFSPROC_NOOP:
-               printf(" nop");
-               return;
-#else
-#define NFSPROC_NOOP -1
-#endif
-       case NFSPROC_NULL:
-               printf(" null");
-               return;
+       const struct sunrpc_msg *rp;
+       const uint32_t *dp;
+       nfs_type type;
+       int v3;
+       uint32_t proc;
+       uint32_t access_flags;
+       struct nfsv3_sattr sa3;
 
-       case NFSPROC_GETATTR:
-               printf(" getattr");
-               if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL)
-                       return;
-               break;
+       ndo->ndo_protocol = "nfs";
+       ND_PRINT("%u", length);
+       rp = (const struct sunrpc_msg *)bp;
+
+       if (!xid_map_enter(ndo, rp, bp2))       /* record proc number for later on */
+               goto trunc;
+
+       v3 = (GET_BE_U_4(&rp->rm_call.cb_vers) == NFS_VER3);
+       proc = GET_BE_U_4(&rp->rm_call.cb_proc);
+
+       if (!v3 && proc < NFS_NPROCS)
+               proc =  nfsv3_procid[proc];
+
+       ND_PRINT(" %s", tok2str(nfsproc_str, "proc-%u", proc));
+       switch (proc) {
 
+       case NFSPROC_GETATTR:
        case NFSPROC_SETATTR:
-               printf(" setattr");
-               if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL)
-                       return;
+       case NFSPROC_READLINK:
+       case NFSPROC_FSSTAT:
+       case NFSPROC_FSINFO:
+       case NFSPROC_PATHCONF:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsefh(ndo, dp, v3) == NULL)
+                       goto trunc;
                break;
 
-#if NFSPROC_ROOT != NFSPROC_NOOP
-       case NFSPROC_ROOT:
-               printf(" root");
-               break;
-#endif
        case NFSPROC_LOOKUP:
-               printf(" lookup");
-               if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL)
-                       return;
+       case NFSPROC_CREATE:
+       case NFSPROC_MKDIR:
+       case NFSPROC_REMOVE:
+       case NFSPROC_RMDIR:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsefhn(ndo, dp, v3) == NULL)
+                       goto trunc;
                break;
 
-       case NFSPROC_READLINK:
-               printf(" readlink");
-               if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL)
-                       return;
+       case NFSPROC_ACCESS:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               access_flags = GET_BE_U_4(dp);
+               if (access_flags & ~NFSV3ACCESS_FULL) {
+                       /* NFSV3ACCESS definitions aren't up to date */
+                       ND_PRINT(" %04x", access_flags);
+               } else if ((access_flags & NFSV3ACCESS_FULL) == NFSV3ACCESS_FULL) {
+                       ND_PRINT(" NFS_ACCESS_FULL");
+               } else {
+                       char separator = ' ';
+                       if (access_flags & NFSV3ACCESS_READ) {
+                               ND_PRINT(" NFS_ACCESS_READ");
+                               separator = '|';
+                       }
+                       if (access_flags & NFSV3ACCESS_LOOKUP) {
+                               ND_PRINT("%cNFS_ACCESS_LOOKUP", separator);
+                               separator = '|';
+                       }
+                       if (access_flags & NFSV3ACCESS_MODIFY) {
+                               ND_PRINT("%cNFS_ACCESS_MODIFY", separator);
+                               separator = '|';
+                       }
+                       if (access_flags & NFSV3ACCESS_EXTEND) {
+                               ND_PRINT("%cNFS_ACCESS_EXTEND", separator);
+                               separator = '|';
+                       }
+                       if (access_flags & NFSV3ACCESS_DELETE) {
+                               ND_PRINT("%cNFS_ACCESS_DELETE", separator);
+                               separator = '|';
+                       }
+                       if (access_flags & NFSV3ACCESS_EXECUTE)
+                               ND_PRINT("%cNFS_ACCESS_EXECUTE", separator);
+               }
                break;
 
        case NFSPROC_READ:
-               printf(" read");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefh(dp)) != NULL) {
-                       TCHECK2(dp[0], 3 * sizeof(*dp));
-                       printf(" %u bytes @ %u",
-                           (u_int32_t)ntohl(dp[1]),
-                           (u_int32_t)ntohl(dp[0]));
-                       return;
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       ND_PRINT(" %u bytes @ %" PRIu64,
+                              GET_BE_U_4(dp + 2),
+                              GET_BE_U_8(dp));
+               } else {
+                       ND_PRINT(" %u bytes @ %u",
+                           GET_BE_U_4(dp + 1),
+                           GET_BE_U_4(dp));
                }
                break;
 
-#if NFSPROC_WRITECACHE != NFSPROC_NOOP
-       case NFSPROC_WRITECACHE:
-               printf(" writecache");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefh(dp)) != NULL) {
-                       TCHECK2(dp[0], 4 * sizeof(*dp));
-                       printf(" %u (%u) bytes @ %u (%u)",
-                           (u_int32_t)ntohl(dp[3]),
-                           (u_int32_t)ntohl(dp[2]),
-                           (u_int32_t)ntohl(dp[1]),
-                           (u_int32_t)ntohl(dp[0]));
-                       return;
-               }
-               break;
-#endif
        case NFSPROC_WRITE:
-               printf(" write");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefh(dp)) != NULL) {
-                       TCHECK2(dp[0], 4 * sizeof(*dp));
-                       printf(" %u (%u) bytes @ %u (%u)",
-                           (u_int32_t)ntohl(dp[3]),
-                           (u_int32_t)ntohl(dp[2]),
-                           (u_int32_t)ntohl(dp[1]),
-                           (u_int32_t)ntohl(dp[0]));
-                       return;
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       ND_PRINT(" %u (%u) bytes @ %" PRIu64,
+                                       GET_BE_U_4(dp + 4),
+                                       GET_BE_U_4(dp + 2),
+                                       GET_BE_U_8(dp));
+                       if (ndo->ndo_vflag) {
+                               ND_PRINT(" <%s>",
+                                       tok2str(nfsv3_writemodes,
+                                               NULL, GET_BE_U_4(dp + 3)));
+                       }
+               } else {
+                       ND_PRINT(" %u (%u) bytes @ %u (%u)",
+                                       GET_BE_U_4(dp + 3),
+                                       GET_BE_U_4(dp + 2),
+                                       GET_BE_U_4(dp + 1),
+                                       GET_BE_U_4(dp));
                }
                break;
 
-       case NFSPROC_CREATE:
-               printf(" create");
-               if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL)
-                       return;
+       case NFSPROC_SYMLINK:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefhn(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               ND_PRINT(" ->");
+               if (v3 && (dp = parse_sattr3(ndo, dp, &sa3)) == NULL)
+                       goto trunc;
+               if (parsefn(ndo, dp) == NULL)
+                       goto trunc;
+               if (v3 && ndo->ndo_vflag)
+                       print_sattr3(ndo, &sa3, ndo->ndo_vflag);
                break;
 
-       case NFSPROC_REMOVE:
-               printf(" remove");
-               if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL)
-                       return;
+       case NFSPROC_MKNOD:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefhn(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               type = (nfs_type) GET_BE_U_4(dp);
+               dp++;
+               dp = parse_sattr3(ndo, dp, &sa3);
+               if (dp == NULL)
+                       goto trunc;
+               ND_PRINT(" %s", tok2str(type2str, "unk-ft %u", type));
+               if (ndo->ndo_vflag && (type == NFCHR || type == NFBLK)) {
+                       ND_PRINT(" %u/%u",
+                              GET_BE_U_4(dp),
+                              GET_BE_U_4(dp + 1));
+                       dp += 2;
+               }
+               if (ndo->ndo_vflag)
+                       print_sattr3(ndo, &sa3, ndo->ndo_vflag);
                break;
 
        case NFSPROC_RENAME:
-               printf(" rename");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefhn(dp)) != NULL) {
-                       fputs(" ->", stdout);
-                       if (parsefhn(dp) != NULL)
-                               return;
-               }
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefhn(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               ND_PRINT(" ->");
+               if (parsefhn(ndo, dp, v3) == NULL)
+                       goto trunc;
                break;
 
        case NFSPROC_LINK:
-               printf(" link");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefh(dp)) != NULL) {
-                       fputs(" ->", stdout);
-                       if (parsefhn(dp) != NULL)
-                               return;
-               }
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               ND_PRINT(" ->");
+               if (parsefhn(ndo, dp, v3) == NULL)
+                       goto trunc;
                break;
 
-       case NFSPROC_SYMLINK:
-               printf(" symlink");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefhn(dp)) != NULL) {
-                       fputs(" -> ", stdout);
-                       if (parsefn(dp) != NULL)
-                               return;
+       case NFSPROC_READDIR:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       /*
+                        * We shouldn't really try to interpret the
+                        * offset cookie here.
+                        */
+                       ND_PRINT(" %u bytes @ %" PRId64,
+                           GET_BE_U_4(dp + 4),
+                           GET_BE_U_8(dp));
+                       if (ndo->ndo_vflag) {
+                               /*
+                                * This displays the 8 bytes
+                                * of the verifier in order,
+                                * from the low-order byte
+                                * to the high-order byte.
+                                */
+                               ND_PRINT(" verf %08x%08x",
+                                         GET_BE_U_4(dp + 2),
+                                         GET_BE_U_4(dp + 3));
+                       }
+               } else {
+                       /*
+                        * Print the offset as signed, since -1 is
+                        * common, but offsets > 2^31 aren't.
+                        */
+                       ND_PRINT(" %u bytes @ %u",
+                           GET_BE_U_4(dp + 1),
+                           GET_BE_U_4(dp));
                }
                break;
 
-       case NFSPROC_MKDIR:
-               printf(" mkdir");
-               if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL)
-                       return;
-               break;
-
-       case NFSPROC_RMDIR:
-               printf(" rmdir");
-               if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL)
-                       return;
-               break;
-
-       case NFSPROC_READDIR:
-               printf(" readdir");
-               if ((dp = parsereq(rp, length)) != NULL &&
-                   (dp = parsefh(dp)) != NULL) {
-                       TCHECK2(dp[0], 2 * sizeof(*dp));
+       case NFSPROC_READDIRPLUS:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               /*
+                * We don't try to interpret the offset
+                * cookie here.
+                */
+               ND_PRINT(" %u bytes @ %" PRId64,
+                       GET_BE_U_4(dp + 4),
+                       GET_BE_U_8(dp));
+               if (ndo->ndo_vflag) {
                        /*
-                        * Print the offset as signed, since -1 is common,
-                        * but offsets > 2^31 aren't.
+                        * This displays the 8 bytes
+                        * of the verifier in order,
+                        * from the low-order byte
+                        * to the high-order byte.
                         */
-                       printf(" %u bytes @ %d",
-                           (u_int32_t)ntohl(dp[1]),
-                           (u_int32_t)ntohl(dp[0]));
-                       return;
+                       ND_PRINT(" max %u verf %08x%08x",
+                                 GET_BE_U_4(dp + 5),
+                                 GET_BE_U_4(dp + 2),
+                                 GET_BE_U_4(dp + 3));
                }
                break;
 
-       case NFSPROC_STATFS:
-               printf(" statfs");
-               if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL)
-                       return;
+       case NFSPROC_COMMIT:
+               dp = parsereq(ndo, rp, length);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsefh(ndo, dp, v3);
+               if (dp == NULL)
+                       goto trunc;
+               ND_PRINT(" %u bytes @ %" PRIu64,
+                       GET_BE_U_4(dp + 2),
+                       GET_BE_U_8(dp));
                break;
 
        default:
-               printf(" proc-%u", (u_int32_t)ntohl(rp->rm_call.cb_proc));
-               return;
+               break;
        }
+       return;
+
 trunc:
-       if (!nfserr)
-               fputs(" [|nfs]", stdout);
+       nd_print_trunc(ndo);
 }
 
 /*
@@ -388,30 +845,68 @@ trunc:
  * additional hacking on the parser code.
  */
 static void
-nfs_printfh(register const u_int32_t *dp)
+nfs_printfh(netdissect_options *ndo,
+            const uint32_t *dp, const u_int len)
 {
        my_fsid fsid;
-       ino_t ino;
-       char *sfsname = NULL;
+       uint32_t ino;
+       const char *sfsname = NULL;
+       char *spacep;
+
+       if (ndo->ndo_uflag) {
+               u_int i;
+               char const *sep = "";
 
-       Parse_fh((caddr_t *)dp, &fsid, &ino, NULL, &sfsname, 0);
+               ND_PRINT(" fh[");
+               for (i=0; i<len; i++) {
+                       /*
+                        * This displays 4 bytes in big-endian byte
+                        * order.  That's as good a choice as little-
+                        * endian, as there's no guarantee that the
+                        * server is big-endian or little-endian or
+                        * that the file handle contains 4-byte
+                        * integral fields, and is better than "the
+                        * byte order of the host running tcpdump", as
+                        * the latter means that different hosts
+                        * running tcpdump may show the same file
+                        * handle in different ways.
+                        */
+                       ND_PRINT("%s%x", sep, GET_BE_U_4(dp + i));
+                       sep = ":";
+               }
+               ND_PRINT("]");
+               return;
+       }
+
+       Parse_fh(ndo, (const u_char *)dp, len, &fsid, &ino, NULL, &sfsname, 0);
 
        if (sfsname) {
                /* file system ID is ASCII, not numeric, for this server OS */
-               static char temp[NFS_FHSIZE+1];
+               char temp[NFSX_V3FHMAX+1];
+               u_int stringlen;
 
                /* Make sure string is null-terminated */
-               strncpy(temp, sfsname, NFS_FHSIZE);
+               stringlen = len;
+               if (stringlen > NFSX_V3FHMAX)
+                       stringlen = NFSX_V3FHMAX;
+               strncpy(temp, sfsname, stringlen);
+               temp[stringlen] = '\0';
                /* Remove trailing spaces */
-               sfsname = strchr(temp, ' ');
-               if (sfsname)
-                       *sfsname = 0;
+               spacep = strchr(temp, ' ');
+               if (spacep)
+                       *spacep = '\0';
 
-               (void)printf(" fh %s/%u", temp, (u_int32_t)ino);
+               ND_PRINT(" fh %s/", temp);
        } else {
-               (void)printf(" fh %u,%u/%u",
-                   fsid.Fsid_dev.Major, fsid.Fsid_dev.Minor, (u_int32_t)ino);
+               ND_PRINT(" fh %u,%u/",
+                            fsid.Fsid_dev.Major, fsid.Fsid_dev.Minor);
        }
+
+       if(fsid.Fsid_dev.Minor == 257)
+               /* Print the undecoded handle */
+               ND_PRINT("%s", fsid.Opaque_Handle);
+       else
+               ND_PRINT("%ld", (long) ino);
 }
 
 /*
@@ -421,10 +916,12 @@ nfs_printfh(register const u_int32_t *dp)
  */
 
 struct xid_map_entry {
-       u_int32_t               xid;            /* transaction ID (net order) */
-       struct in_addr  client;         /* client IP address (net order) */
-       struct in_addr  server;         /* server IP address (net order) */
-       u_int32_t               proc;           /* call proc number (host order) */
+       uint32_t        xid;            /* transaction ID (net order) */
+       int ipver;                      /* IP version (4 or 6) */
+       nd_ipv6 client;                 /* client IP address (net order) */
+       nd_ipv6 server;                 /* server IP address (net order) */
+       uint32_t        proc;           /* call proc number (host order) */
+       uint32_t        vers;           /* program version (host order) */
 };
 
 /*
@@ -435,54 +932,115 @@ struct xid_map_entry {
 
 #define        XIDMAPSIZE      64
 
-struct xid_map_entry xid_map[XIDMAPSIZE];
+static struct xid_map_entry xid_map[XIDMAPSIZE];
 
-int    xid_map_next = 0;
-int    xid_map_hint = 0;
+static int xid_map_next = 0;
+static int xid_map_hint = 0;
 
-static void
-xid_map_enter(const struct rpc_msg *rp, const struct ip *ip)
+static int
+xid_map_enter(netdissect_options *ndo,
+              const struct sunrpc_msg *rp, const u_char *bp)
 {
+       const struct ip *ip = NULL;
+       const struct ip6_hdr *ip6 = NULL;
        struct xid_map_entry *xmep;
 
+       if (!ND_TTEST_4(rp->rm_call.cb_proc))
+               return (0);
+       switch (IP_V((const struct ip *)bp)) {
+       case 4:
+               ip = (const struct ip *)bp;
+               break;
+       case 6:
+               ip6 = (const struct ip6_hdr *)bp;
+               break;
+       default:
+               return (1);
+       }
+
        xmep = &xid_map[xid_map_next];
 
        if (++xid_map_next >= XIDMAPSIZE)
                xid_map_next = 0;
 
-       xmep->xid = rp->rm_xid;
-       xmep->client = ip->ip_src;
-       xmep->server = ip->ip_dst;
-       xmep->proc = ntohl(rp->rm_call.cb_proc);
+       UNALIGNED_MEMCPY(&xmep->xid, &rp->rm_xid, sizeof(xmep->xid));
+       if (ip) {
+               xmep->ipver = 4;
+               UNALIGNED_MEMCPY(&xmep->client, ip->ip_src,
+                                sizeof(ip->ip_src));
+               UNALIGNED_MEMCPY(&xmep->server, ip->ip_dst,
+                                sizeof(ip->ip_dst));
+       }
+       else if (ip6) {
+               xmep->ipver = 6;
+               UNALIGNED_MEMCPY(&xmep->client, ip6->ip6_src,
+                                sizeof(ip6->ip6_src));
+               UNALIGNED_MEMCPY(&xmep->server, ip6->ip6_dst,
+                                sizeof(ip6->ip6_dst));
+       }
+       xmep->proc = GET_BE_U_4(&rp->rm_call.cb_proc);
+       xmep->vers = GET_BE_U_4(&rp->rm_call.cb_vers);
+       return (1);
 }
 
-/* Returns true and sets proc success or false on failure */
-static u_int32_t
-xid_map_find(const struct rpc_msg *rp, const struct ip *ip, u_int32_t *proc)
+/*
+ * Returns 0 and puts NFSPROC_xxx in proc return and
+ * version in vers return, or returns -1 on failure
+ */
+static int
+xid_map_find(netdissect_options *ndo, const struct sunrpc_msg *rp,
+            const u_char *bp, uint32_t *proc, uint32_t *vers)
 {
        int i;
        struct xid_map_entry *xmep;
-       u_int32_t xid = rp->rm_xid;
-       u_int32_t clip = ip->ip_dst.s_addr;
-       u_int32_t sip = ip->ip_src.s_addr;
+       uint32_t xid;
+       const struct ip *ip = (const struct ip *)bp;
+       const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp;
+       int cmp;
 
+       UNALIGNED_MEMCPY(&xid, &rp->rm_xid, sizeof(xmep->xid));
        /* Start searching from where we last left off */
        i = xid_map_hint;
        do {
                xmep = &xid_map[i];
-               if (xmep->xid == xid && xmep->client.s_addr == clip &&
-                   xmep->server.s_addr == sip) {
+               cmp = 1;
+               if (xmep->ipver != IP_V(ip) || xmep->xid != xid)
+                       goto nextitem;
+               switch (xmep->ipver) {
+               case 4:
+                       if (UNALIGNED_MEMCMP(ip->ip_src, &xmep->server,
+                                            sizeof(ip->ip_src)) != 0 ||
+                           UNALIGNED_MEMCMP(ip->ip_dst, &xmep->client,
+                                            sizeof(ip->ip_dst)) != 0) {
+                               cmp = 0;
+                       }
+                       break;
+               case 6:
+                       if (UNALIGNED_MEMCMP(ip6->ip6_src, &xmep->server,
+                                            sizeof(ip6->ip6_src)) != 0 ||
+                           UNALIGNED_MEMCMP(ip6->ip6_dst, &xmep->client,
+                                            sizeof(ip6->ip6_dst)) != 0) {
+                               cmp = 0;
+                       }
+                       break;
+               default:
+                       cmp = 0;
+                       break;
+               }
+               if (cmp) {
                        /* match */
                        xid_map_hint = i;
                        *proc = xmep->proc;
-                       return (1);
+                       *vers = xmep->vers;
+                       return 0;
                }
+       nextitem:
                if (++i >= XIDMAPSIZE)
                        i = 0;
        } while (i != xid_map_hint);
 
        /* search failed */
-       return (0);
+       return (-1);
 }
 
 /*
@@ -493,18 +1051,19 @@ xid_map_find(const struct rpc_msg *rp, const struct ip *ip, u_int32_t *proc)
  * Return a pointer to the beginning of the actual results.
  * If the packet was truncated, return 0.
  */
-static const u_int32_t *
-parserep(register const struct rpc_msg *rp, register u_int length)
+static const uint32_t *
+parserep(netdissect_options *ndo,
+         const struct sunrpc_msg *rp, u_int length, int *nfserrp)
 {
-       register const u_int32_t *dp;
+       const uint32_t *dp;
        u_int len;
-       enum accept_stat astat;
+       enum sunrpc_accept_stat astat;
 
        /*
         * Portability note:
         * Here we find the address of the ar_verf credentials.
         * Originally, this calculation was
-        *      dp = (u_int32_t *)&rp->rm_reply.rp_acpt.ar_verf
+        *      dp = (uint32_t *)&rp->rm_reply.rp_acpt.ar_verf
         * On the wire, the rp_acpt field starts immediately after
         * the (32 bit) rp_stat field.  However, rp_acpt (which is a
         * "struct accepted_reply") contains a "struct opaque_auth",
@@ -515,189 +1074,223 @@ parserep(register const struct rpc_msg *rp, register u_int length)
         * representation.  Instead, we skip past the rp_stat field,
         * which is an "enum" and so occupies one 32-bit word.
         */
-       dp = ((const u_int32_t *)&rp->rm_reply) + 1;
-       TCHECK2(dp[0], 1);
-       len = ntohl(dp[1]);
+       dp = ((const uint32_t *)&rp->rm_reply) + 1;
+       len = GET_BE_U_4(dp + 1);
        if (len >= length)
                return (NULL);
        /*
         * skip past the ar_verf credentials.
         */
-       dp += (len + (2*sizeof(u_int32_t) + 3)) / sizeof(u_int32_t);
-       TCHECK2(dp[0], 0);
+       dp += (len + (2*sizeof(uint32_t) + 3)) / sizeof(uint32_t);
 
        /*
         * now we can check the ar_stat field
         */
-       astat = ntohl(*(enum accept_stat *)dp);
-       switch (astat) {
-
-       case SUCCESS:
-               break;
-
-       case PROG_UNAVAIL:
-               printf(" PROG_UNAVAIL");
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
-
-       case PROG_MISMATCH:
-               printf(" PROG_MISMATCH");
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
-
-       case PROC_UNAVAIL:
-               printf(" PROC_UNAVAIL");
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
-
-       case GARBAGE_ARGS:
-               printf(" GARBAGE_ARGS");
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
-
-       case SYSTEM_ERR:
-               printf(" SYSTEM_ERR");
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
-
-       default:
-               printf(" ar_stat %d", astat);
-               nfserr = 1;             /* suppress trunc string */
+       astat = (enum sunrpc_accept_stat) GET_BE_U_4(dp);
+       if (astat != SUNRPC_SUCCESS) {
+               ND_PRINT(" %s", tok2str(sunrpc_str, "ar_stat %u", astat));
+               *nfserrp = 1;           /* suppress trunc string */
                return (NULL);
        }
        /* successful return */
-       if ((sizeof(astat) + ((u_char *)dp)) < snapend)
-               return ((u_int32_t *) (sizeof(astat) + ((char *)dp)));
-
+       ND_TCHECK_LEN(dp, sizeof(astat));
+       return ((const uint32_t *) (sizeof(astat) + ((const char *)dp)));
 trunc:
-       return (NULL);
+       return (0);
 }
 
-static const u_int32_t *
-parsestatus(const u_int32_t *dp)
+static const uint32_t *
+parsestatus(netdissect_options *ndo,
+            const uint32_t *dp, u_int *er, int *nfserrp)
 {
-       register int errnum;
+       u_int errnum;
 
-       TCHECK(dp[0]);
-       errnum = ntohl(dp[0]);
+       errnum = GET_BE_U_4(dp);
+       if (er)
+               *er = errnum;
        if (errnum != 0) {
-               if (!qflag)
-                       printf(" ERROR: %s", pcap_strerror(errnum));
-               nfserr = 1;             /* suppress trunc string */
-               return (NULL);
+               if (!ndo->ndo_qflag)
+                       ND_PRINT(" ERROR: %s",
+                           tok2str(status2str, "unk %u", errnum));
+               *nfserrp = 1;
        }
        return (dp + 1);
-trunc:
-       return (NULL);
 }
 
-static struct tok type2str[] = {
-       { NFNON,        "NON" },
-       { NFREG,        "REG" },
-       { NFDIR,        "DIR" },
-       { NFBLK,        "BLK" },
-       { NFCHR,        "CHR" },
-       { NFLNK,        "LNK" },
-       { 0,            NULL }
-};
-
-static const u_int32_t *
-parsefattr(const u_int32_t *dp, int verbose)
+static const uint32_t *
+parsefattr(netdissect_options *ndo,
+           const uint32_t *dp, int verbose, int v3)
 {
-       const struct nfsv2_fattr *fap;
+       const struct nfs_fattr *fap;
 
-       fap = (const struct nfsv2_fattr *)dp;
+       fap = (const struct nfs_fattr *)dp;
+       ND_TCHECK_4(fap->fa_gid);
        if (verbose) {
-               TCHECK(fap->fa_nfssize);
-               printf(" %s %o ids %u/%u sz %u ",
-                   tok2str(type2str, "unk-ft %d ",
-                   (u_int32_t)ntohl(fap->fa_type)),
-                   (u_int32_t)ntohl(fap->fa_mode),
-                   (u_int32_t)ntohl(fap->fa_uid),
-                   (u_int32_t)ntohl(fap->fa_gid),
-                   (u_int32_t)ntohl(fap->fa_nfssize));
+               /*
+                * XXX - UIDs and GIDs are unsigned in NFS and in
+                * at least some UN*Xes, but we'll show them as
+                * signed because -2 has traditionally been the
+                * UID for "nobody", rather than 4294967294.
+                */
+               ND_PRINT(" %s %o ids %d/%d",
+                   tok2str(type2str, "unk-ft %u ",
+                   GET_BE_U_4(fap->fa_type)),
+                   GET_BE_U_4(fap->fa_mode),
+                   GET_BE_S_4(fap->fa_uid),
+                   GET_BE_S_4(fap->fa_gid));
+               if (v3) {
+                       ND_PRINT(" sz %" PRIu64,
+                               GET_BE_U_8(fap->fa3_size));
+               } else {
+                       ND_PRINT(" sz %u", GET_BE_U_4(fap->fa2_size));
+               }
        }
        /* print lots more stuff */
        if (verbose > 1) {
-               TCHECK(fap->fa_nfsfileid);
-               printf("nlink %u rdev %x fsid %x nodeid %x a/m/ctime ",
-                   (u_int32_t)ntohl(fap->fa_nlink),
-                   (u_int32_t)ntohl(fap->fa_nfsrdev),
-                   (u_int32_t)ntohl(fap->fa_nfsfsid),
-                   (u_int32_t)ntohl(fap->fa_nfsfileid));
-               TCHECK(fap->fa_nfsatime);
-               printf("%u.%06u ",
-                   (u_int32_t)ntohl(fap->fa_nfsatime.nfs_sec),
-                   (u_int32_t)ntohl(fap->fa_nfsatime.nfs_usec));
-               TCHECK(fap->fa_nfsmtime);
-               printf("%u.%06u ",
-                   (u_int32_t)ntohl(fap->fa_nfsmtime.nfs_sec),
-                   (u_int32_t)ntohl(fap->fa_nfsmtime.nfs_usec));
-               TCHECK(fap->fa_nfsctime);
-               printf("%u.%06u ",
-                   (u_int32_t)ntohl(fap->fa_nfsctime.nfs_sec),
-                   (u_int32_t)ntohl(fap->fa_nfsctime.nfs_usec));
+               if (v3) {
+                       ND_TCHECK_8(&fap->fa3_ctime);
+                       ND_PRINT(" nlink %u rdev %u/%u",
+                              GET_BE_U_4(fap->fa_nlink),
+                              GET_BE_U_4(fap->fa3_rdev.specdata1),
+                              GET_BE_U_4(fap->fa3_rdev.specdata2));
+                       ND_PRINT(" fsid %" PRIx64,
+                               GET_BE_U_8(fap->fa3_fsid));
+                       ND_PRINT(" fileid %" PRIx64,
+                               GET_BE_U_8(fap->fa3_fileid));
+                       ND_PRINT(" a/m/ctime %u.%06u",
+                              GET_BE_U_4(fap->fa3_atime.nfsv3_sec),
+                              GET_BE_U_4(fap->fa3_atime.nfsv3_nsec));
+                       ND_PRINT(" %u.%06u",
+                              GET_BE_U_4(fap->fa3_mtime.nfsv3_sec),
+                              GET_BE_U_4(fap->fa3_mtime.nfsv3_nsec));
+                       ND_PRINT(" %u.%06u",
+                              GET_BE_U_4(fap->fa3_ctime.nfsv3_sec),
+                              GET_BE_U_4(fap->fa3_ctime.nfsv3_nsec));
+               } else {
+                       ND_TCHECK_8(&fap->fa2_ctime);
+                       ND_PRINT(" nlink %u rdev 0x%x fsid 0x%x nodeid 0x%x a/m/ctime",
+                              GET_BE_U_4(fap->fa_nlink),
+                              GET_BE_U_4(fap->fa2_rdev),
+                              GET_BE_U_4(fap->fa2_fsid),
+                              GET_BE_U_4(fap->fa2_fileid));
+                       ND_PRINT(" %u.%06u",
+                              GET_BE_U_4(fap->fa2_atime.nfsv2_sec),
+                              GET_BE_U_4(fap->fa2_atime.nfsv2_usec));
+                       ND_PRINT(" %u.%06u",
+                              GET_BE_U_4(fap->fa2_mtime.nfsv2_sec),
+                              GET_BE_U_4(fap->fa2_mtime.nfsv2_usec));
+                       ND_PRINT(" %u.%06u",
+                              GET_BE_U_4(fap->fa2_ctime.nfsv2_sec),
+                              GET_BE_U_4(fap->fa2_ctime.nfsv2_usec));
+               }
        }
-       return ((const u_int32_t *)&fap[1]);
+       return ((const uint32_t *)((const unsigned char *)dp +
+               (v3 ? NFSX_V3FATTR : NFSX_V2FATTR)));
 trunc:
        return (NULL);
 }
 
 static int
-parseattrstat(const u_int32_t *dp, int verbose)
+parseattrstat(netdissect_options *ndo,
+              const uint32_t *dp, int verbose, int v3, int *nfserrp)
 {
+       u_int er;
 
-       dp = parsestatus(dp);
+       dp = parsestatus(ndo, dp, &er, nfserrp);
        if (dp == NULL)
                return (0);
+       if (er)
+               return (1);
 
-       return (parsefattr(dp, verbose) != NULL);
+       return (parsefattr(ndo, dp, verbose, v3) != NULL);
 }
 
 static int
-parsediropres(const u_int32_t *dp)
+parsediropres(netdissect_options *ndo,
+              const uint32_t *dp, int *nfserrp)
 {
+       u_int er;
 
-       dp = parsestatus(dp);
+       dp = parsestatus(ndo, dp, &er, nfserrp);
        if (dp == NULL)
                return (0);
+       if (er)
+               return (1);
 
-       dp = parsefh(dp);
+       dp = parsefh(ndo, dp, 0);
        if (dp == NULL)
                return (0);
 
-       return (parsefattr(dp, vflag) != NULL);
+       return (parsefattr(ndo, dp, ndo->ndo_vflag, 0) != NULL);
 }
 
 static int
-parselinkres(const u_int32_t *dp)
+parselinkres(netdissect_options *ndo,
+             const uint32_t *dp, int v3, int *nfserrp)
 {
-       dp = parsestatus(dp);
-       if (dp == NULL)
-               return (0);
+       u_int er;
 
-       putchar(' ');
-       return (parsefn(dp) != NULL);
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return(0);
+       if (er)
+               return(1);
+       if (v3) {
+               dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+               if (dp == NULL)
+                       return (0);
+       }
+       ND_PRINT(" ");
+       return (parsefn(ndo, dp) != NULL);
 }
 
 static int
-parsestatfs(const u_int32_t *dp)
+parsestatfs(netdissect_options *ndo,
+            const uint32_t *dp, int v3, int *nfserrp)
 {
-       const struct nfsv2_statfs *sfsp;
+       const struct nfs_statfs *sfsp;
+       u_int er;
 
-       dp = parsestatus(dp);
+       dp = parsestatus(ndo, dp, &er, nfserrp);
        if (dp == NULL)
                return (0);
+       if (!v3 && er)
+               return (1);
+
+       if (ndo->ndo_qflag)
+               return(1);
+
+       if (v3) {
+               if (ndo->ndo_vflag)
+                       ND_PRINT(" POST:");
+               dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+               if (dp == NULL)
+                       return (0);
+       }
 
-       if (!qflag) {
-               sfsp = (const struct nfsv2_statfs *)dp;
-               TCHECK(sfsp->sf_bavail);
-               printf(" tsize %u bsize %u blocks %u bfree %u bavail %u",
-                   (u_int32_t)ntohl(sfsp->sf_tsize),
-                   (u_int32_t)ntohl(sfsp->sf_bsize),
-                   (u_int32_t)ntohl(sfsp->sf_blocks),
-                   (u_int32_t)ntohl(sfsp->sf_bfree),
-                   (u_int32_t)ntohl(sfsp->sf_bavail));
+       ND_TCHECK_LEN(dp, (v3 ? NFSX_V3STATFS : NFSX_V2STATFS));
+
+       sfsp = (const struct nfs_statfs *)dp;
+
+       if (v3) {
+               ND_PRINT(" tbytes %" PRIu64 " fbytes %" PRIu64 " abytes %" PRIu64,
+                       GET_BE_U_8(sfsp->sf_tbytes),
+                       GET_BE_U_8(sfsp->sf_fbytes),
+                       GET_BE_U_8(sfsp->sf_abytes));
+               if (ndo->ndo_vflag) {
+                       ND_PRINT(" tfiles %" PRIu64 " ffiles %" PRIu64 " afiles %" PRIu64 " invar %u",
+                              GET_BE_U_8(sfsp->sf_tfiles),
+                              GET_BE_U_8(sfsp->sf_ffiles),
+                              GET_BE_U_8(sfsp->sf_afiles),
+                              GET_BE_U_4(sfsp->sf_invarsec));
+               }
+       } else {
+               ND_PRINT(" tsize %u bsize %u blocks %u bfree %u bavail %u",
+                       GET_BE_U_4(sfsp->sf_tsize),
+                       GET_BE_U_4(sfsp->sf_bsize),
+                       GET_BE_U_4(sfsp->sf_blocks),
+                       GET_BE_U_4(sfsp->sf_bfree),
+                       GET_BE_U_4(sfsp->sf_bavail));
        }
 
        return (1);
@@ -706,163 +1299,552 @@ trunc:
 }
 
 static int
-parserddires(const u_int32_t *dp)
+parserddires(netdissect_options *ndo,
+             const uint32_t *dp, int *nfserrp)
+{
+       u_int er;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return (0);
+       if (er)
+               return (1);
+       if (ndo->ndo_qflag)
+               return (1);
+
+       ND_PRINT(" offset 0x%x size %u ",
+              GET_BE_U_4(dp), GET_BE_U_4(dp + 1));
+       if (GET_BE_U_4(dp + 2) != 0)
+               ND_PRINT(" eof");
+
+       return (1);
+}
+
+static const uint32_t *
+parse_wcc_attr(netdissect_options *ndo,
+               const uint32_t *dp)
+{
+       /* Our caller has already checked this */
+       ND_PRINT(" sz %" PRIu64, GET_BE_U_8(dp));
+       ND_PRINT(" mtime %u.%06u ctime %u.%06u",
+              GET_BE_U_4(dp + 2), GET_BE_U_4(dp + 3),
+              GET_BE_U_4(dp + 4), GET_BE_U_4(dp + 5));
+       return (dp + 6);
+}
+
+/*
+ * Pre operation attributes. Print only if vflag > 1.
+ */
+static const uint32_t *
+parse_pre_op_attr(netdissect_options *ndo,
+                  const uint32_t *dp, int verbose)
+{
+       if (!GET_BE_U_4(dp))
+               return (dp + 1);
+       dp++;
+       ND_TCHECK_LEN(dp, 24);
+       if (verbose > 1) {
+               return parse_wcc_attr(ndo, dp);
+       } else {
+               /* If not verbose enough, just skip over wcc_attr */
+               return (dp + 6);
+       }
+trunc:
+       return (NULL);
+}
+
+/*
+ * Post operation attributes are printed if vflag >= 1
+ */
+static const uint32_t *
+parse_post_op_attr(netdissect_options *ndo,
+                   const uint32_t *dp, int verbose)
+{
+       if (!GET_BE_U_4(dp))
+               return (dp + 1);
+       dp++;
+       if (verbose) {
+               return parsefattr(ndo, dp, verbose, 1);
+       } else
+               return (dp + (NFSX_V3FATTR / sizeof (uint32_t)));
+}
+
+static const uint32_t *
+parse_wcc_data(netdissect_options *ndo,
+               const uint32_t *dp, int verbose)
+{
+       if (verbose > 1)
+               ND_PRINT(" PRE:");
+       dp = parse_pre_op_attr(ndo, dp, verbose);
+       if (dp == NULL)
+               return (0);
+
+       if (verbose)
+               ND_PRINT(" POST:");
+       return parse_post_op_attr(ndo, dp, verbose);
+}
+
+static const uint32_t *
+parsecreateopres(netdissect_options *ndo,
+                 const uint32_t *dp, int verbose, int *nfserrp)
 {
-       dp = parsestatus(dp);
+       u_int er;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
        if (dp == NULL)
                return (0);
-       if (!qflag) {
-               TCHECK(dp[0]);
-               printf(" offset %x", (u_int32_t)ntohl(dp[0]));
-               TCHECK(dp[1]);
-               printf(" size %u", (u_int32_t)ntohl(dp[1]));
-               TCHECK(dp[2]);
-               if (dp[2] != 0)
-                       printf(" eof");
+       if (er)
+               dp = parse_wcc_data(ndo, dp, verbose);
+       else {
+               if (!GET_BE_U_4(dp))
+                       return (dp + 1);
+               dp++;
+               dp = parsefh(ndo, dp, 1);
+               if (dp == NULL)
+                       return (0);
+               if (verbose) {
+                       dp = parse_post_op_attr(ndo, dp, verbose);
+                       if (dp == NULL)
+                               return (0);
+                       if (ndo->ndo_vflag > 1) {
+                               ND_PRINT(" dir attr:");
+                               dp = parse_wcc_data(ndo, dp, verbose);
+                       }
+               }
        }
+       return (dp);
+}
 
+static const uint32_t *
+parsewccres(netdissect_options *ndo,
+            const uint32_t *dp, int verbose, int *nfserrp)
+{
+       u_int er;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return (0);
+       return parse_wcc_data(ndo, dp, verbose);
+}
+
+static const uint32_t *
+parsev3rddirres(netdissect_options *ndo,
+                const uint32_t *dp, int verbose, int *nfserrp)
+{
+       u_int er;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return (0);
+       if (ndo->ndo_vflag)
+               ND_PRINT(" POST:");
+       dp = parse_post_op_attr(ndo, dp, verbose);
+       if (dp == NULL)
+               return (0);
+       if (er)
+               return dp;
+       if (ndo->ndo_vflag) {
+               /*
+                * This displays the 8 bytes of the verifier in order,
+                * from the low-order byte to the high-order byte.
+                */
+               ND_PRINT(" verf %08x%08x",
+                         GET_BE_U_4(dp), GET_BE_U_4(dp + 1));
+               dp += 2;
+       }
+       return dp;
+}
+
+static int
+parsefsinfo(netdissect_options *ndo,
+            const uint32_t *dp, int *nfserrp)
+{
+       const struct nfsv3_fsinfo *sfp;
+       u_int er;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return (0);
+       if (ndo->ndo_vflag)
+               ND_PRINT(" POST:");
+       dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+       if (dp == NULL)
+               return (0);
+       if (er)
+               return (1);
+
+       sfp = (const struct nfsv3_fsinfo *)dp;
+       ND_TCHECK_SIZE(sfp);
+       ND_PRINT(" rtmax %u rtpref %u wtmax %u wtpref %u dtpref %u",
+              GET_BE_U_4(sfp->fs_rtmax),
+              GET_BE_U_4(sfp->fs_rtpref),
+              GET_BE_U_4(sfp->fs_wtmax),
+              GET_BE_U_4(sfp->fs_wtpref),
+              GET_BE_U_4(sfp->fs_dtpref));
+       if (ndo->ndo_vflag) {
+               ND_PRINT(" rtmult %u wtmult %u maxfsz %" PRIu64,
+                      GET_BE_U_4(sfp->fs_rtmult),
+                      GET_BE_U_4(sfp->fs_wtmult),
+                      GET_BE_U_8(sfp->fs_maxfilesize));
+               ND_PRINT(" delta %u.%06u ",
+                      GET_BE_U_4(sfp->fs_timedelta.nfsv3_sec),
+                      GET_BE_U_4(sfp->fs_timedelta.nfsv3_nsec));
+       }
+       return (1);
+trunc:
+       return (0);
+}
+
+static int
+parsepathconf(netdissect_options *ndo,
+              const uint32_t *dp, int *nfserrp)
+{
+       u_int er;
+       const struct nfsv3_pathconf *spp;
+
+       dp = parsestatus(ndo, dp, &er, nfserrp);
+       if (dp == NULL)
+               return (0);
+       if (ndo->ndo_vflag)
+               ND_PRINT(" POST:");
+       dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+       if (dp == NULL)
+               return (0);
+       if (er)
+               return (1);
+
+       spp = (const struct nfsv3_pathconf *)dp;
+       ND_TCHECK_SIZE(spp);
+
+       ND_PRINT(" linkmax %u namemax %u %s %s %s %s",
+              GET_BE_U_4(spp->pc_linkmax),
+              GET_BE_U_4(spp->pc_namemax),
+              GET_BE_U_4(spp->pc_notrunc) ? "notrunc" : "",
+              GET_BE_U_4(spp->pc_chownrestricted) ? "chownres" : "",
+              GET_BE_U_4(spp->pc_caseinsensitive) ? "igncase" : "",
+              GET_BE_U_4(spp->pc_casepreserving) ? "keepcase" : "");
        return (1);
 trunc:
        return (0);
 }
 
 static void
-interp_reply(const struct rpc_msg *rp, u_int32_t proc, u_int length)
+interp_reply(netdissect_options *ndo,
+             const struct sunrpc_msg *rp, uint32_t proc, uint32_t vers,
+             int length)
 {
-       register const u_int32_t *dp;
+       const uint32_t *dp;
+       int v3;
+       u_int er;
+       int nfserr = 0;
 
-       switch (proc) {
+       v3 = (vers == NFS_VER3);
 
-#ifdef NFSPROC_NOOP
-       case NFSPROC_NOOP:
-               printf(" nop");
-               return;
-#else
-#define NFSPROC_NOOP -1
-#endif
-       case NFSPROC_NULL:
-               printf(" null");
-               return;
+       if (!v3 && proc < NFS_NPROCS)
+               proc = nfsv3_procid[proc];
+
+       ND_PRINT(" %s", tok2str(nfsproc_str, "proc-%u", proc));
+       switch (proc) {
 
        case NFSPROC_GETATTR:
-               printf(" getattr");
-               dp = parserep(rp, length);
-               if (dp != NULL && parseattrstat(dp, !qflag) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parseattrstat(ndo, dp, !ndo->ndo_qflag, v3, &nfserr) == 0)
+                       goto trunc;
                break;
 
        case NFSPROC_SETATTR:
-               printf(" setattr");
-               dp = parserep(rp, length);
-               if (dp != NULL && parseattrstat(dp, !qflag) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       if (parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr) == 0)
+                               goto trunc;
+               } else {
+                       if (parseattrstat(ndo, dp, !ndo->ndo_qflag, 0, &nfserr) == 0)
+                               goto trunc;
+               }
                break;
 
-#if NFSPROC_ROOT != NFSPROC_NOOP
-       case NFSPROC_ROOT:
-               printf(" root");
-               break;
-#endif
        case NFSPROC_LOOKUP:
-               printf(" lookup");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsediropres(dp) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       dp = parsestatus(ndo, dp, &er, &nfserr);
+                       if (dp == NULL)
+                               goto trunc;
+                       if (er) {
+                               if (ndo->ndo_vflag > 1) {
+                                       ND_PRINT(" post dattr:");
+                                       dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+                                       if (dp == NULL)
+                                               goto trunc;
+                               }
+                       } else {
+                               dp = parsefh(ndo, dp, v3);
+                               if (dp == NULL)
+                                       goto trunc;
+                               dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+                               if (dp == NULL)
+                                       goto trunc;
+                               if (ndo->ndo_vflag > 1) {
+                                       ND_PRINT(" post dattr:");
+                                       dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+                                       if (dp == NULL)
+                                               goto trunc;
+                               }
+                       }
+               } else {
+                       if (parsediropres(ndo, dp, &nfserr) == 0)
+                               goto trunc;
+               }
+               break;
+
+       case NFSPROC_ACCESS:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsestatus(ndo, dp, &er, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (ndo->ndo_vflag)
+                       ND_PRINT(" attr:");
+               dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+               if (dp == NULL)
+                       goto trunc;
+               if (!er) {
+                       ND_PRINT(" c %04x", GET_BE_U_4(dp));
+               }
                break;
 
        case NFSPROC_READLINK:
-               printf(" readlink");
-               dp = parserep(rp, length);
-               if (dp != NULL && parselinkres(dp) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parselinkres(ndo, dp, v3, &nfserr) == 0)
+                       goto trunc;
                break;
 
        case NFSPROC_READ:
-               printf(" read");
-               dp = parserep(rp, length);
-               if (dp != NULL && parseattrstat(dp, vflag) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       dp = parsestatus(ndo, dp, &er, &nfserr);
+                       if (dp == NULL)
+                               goto trunc;
+                       dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+                       if (dp == NULL)
+                               goto trunc;
+                       if (!er) {
+                               if (ndo->ndo_vflag) {
+                                       ND_PRINT(" %u bytes", GET_BE_U_4(dp));
+                                       if (GET_BE_U_4(dp + 1))
+                                               ND_PRINT(" EOF");
+                               }
+                       }
+               } else {
+                       if (parseattrstat(ndo, dp, ndo->ndo_vflag, 0, &nfserr) == 0)
+                               goto trunc;
+               }
                break;
 
-#if NFSPROC_WRITECACHE != NFSPROC_NOOP
-       case NFSPROC_WRITECACHE:
-               printf(" writecache");
-               break;
-#endif
        case NFSPROC_WRITE:
-               printf(" write");
-               dp = parserep(rp, length);
-               if (dp != NULL && parseattrstat(dp, vflag) != 0)
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       dp = parsestatus(ndo, dp, &er, &nfserr);
+                       if (dp == NULL)
+                               goto trunc;
+                       dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
+                       if (dp == NULL)
+                               goto trunc;
+                       if (!er) {
+                               if (ndo->ndo_vflag) {
+                                       ND_PRINT(" %u bytes", GET_BE_U_4(dp));
+                                       if (ndo->ndo_vflag > 1) {
+                                               ND_PRINT(" <%s>",
+                                                       tok2str(nfsv3_writemodes,
+                                                               NULL, GET_BE_U_4(dp + 1)));
+
+                                               /* write-verf-cookie */
+                                               ND_PRINT(" verf %" PRIx64,
+                                                        GET_BE_U_8(dp + 2));
+                                       }
+                               }
+                       }
                        return;
+               } else {
+                       if (parseattrstat(ndo, dp, ndo->ndo_vflag, v3, &nfserr) == 0)
+                               goto trunc;
+               }
                break;
 
        case NFSPROC_CREATE:
-               printf(" create");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsediropres(dp) != 0)
-                       return;
+       case NFSPROC_MKDIR:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                               goto trunc;
+               } else {
+                       if (parsediropres(ndo, dp, &nfserr) == 0)
+                               goto trunc;
+               }
+               break;
+
+       case NFSPROC_SYMLINK:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                               goto trunc;
+               } else {
+                       if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
+                               goto trunc;
+               }
+               break;
+
+       case NFSPROC_MKNOD:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                       goto trunc;
                break;
 
        case NFSPROC_REMOVE:
-               printf(" remove");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatus(dp) != 0)
-                       return;
+       case NFSPROC_RMDIR:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       if (parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                               goto trunc;
+               } else {
+                       if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
+                               goto trunc;
+               }
                break;
 
        case NFSPROC_RENAME:
-               printf(" rename");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatus(dp) != 0)
-                       return;
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       dp = parsestatus(ndo, dp, &er, &nfserr);
+                       if (dp == NULL)
+                               goto trunc;
+                       if (ndo->ndo_vflag) {
+                               ND_PRINT(" from:");
+                               dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
+                               if (dp == NULL)
+                                       goto trunc;
+                               ND_PRINT(" to:");
+                               dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
+                               if (dp == NULL)
+                                       goto trunc;
+                       }
+               } else {
+                       if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
+                               goto trunc;
+               }
                break;
 
        case NFSPROC_LINK:
-               printf(" link");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatus(dp) != 0)
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       dp = parsestatus(ndo, dp, &er, &nfserr);
+                       if (dp == NULL)
+                               goto trunc;
+                       if (ndo->ndo_vflag) {
+                               ND_PRINT(" file POST:");
+                               dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
+                               if (dp == NULL)
+                                       goto trunc;
+                               ND_PRINT(" dir:");
+                               dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
+                               if (dp == NULL)
+                                       goto trunc;
+                       }
                        return;
+               } else {
+                       if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
+                               goto trunc;
+               }
                break;
 
-       case NFSPROC_SYMLINK:
-               printf(" symlink");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatus(dp) != 0)
-                       return;
+       case NFSPROC_READDIR:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (v3) {
+                       if (parsev3rddirres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                               goto trunc;
+               } else {
+                       if (parserddires(ndo, dp, &nfserr) == 0)
+                               goto trunc;
+               }
                break;
 
-       case NFSPROC_MKDIR:
-               printf(" mkdir");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsediropres(dp) != 0)
-                       return;
+       case NFSPROC_READDIRPLUS:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsev3rddirres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
+                       goto trunc;
                break;
 
-       case NFSPROC_RMDIR:
-               printf(" rmdir");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatus(dp) != 0)
-                       return;
+       case NFSPROC_FSSTAT:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsestatfs(ndo, dp, v3, &nfserr) == 0)
+                       goto trunc;
                break;
 
-       case NFSPROC_READDIR:
-               printf(" readdir");
-               dp = parserep(rp, length);
-               if (dp != NULL && parserddires(dp) != 0)
-                       return;
+       case NFSPROC_FSINFO:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsefsinfo(ndo, dp, &nfserr) == 0)
+                       goto trunc;
                break;
 
-       case NFSPROC_STATFS:
-               printf(" statfs");
-               dp = parserep(rp, length);
-               if (dp != NULL && parsestatfs(dp) != 0)
-                       return;
+       case NFSPROC_PATHCONF:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (parsepathconf(ndo, dp, &nfserr) == 0)
+                       goto trunc;
+               break;
+
+       case NFSPROC_COMMIT:
+               dp = parserep(ndo, rp, length, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               dp = parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr);
+               if (dp == NULL)
+                       goto trunc;
+               if (ndo->ndo_vflag > 1) {
+                       /* write-verf-cookie */
+                       ND_PRINT(" verf %" PRIx64, GET_BE_U_8(dp));
+               }
                break;
 
        default:
-               printf(" proc-%u", proc);
-               return;
+               break;
        }
+       return;
+
+trunc:
        if (!nfserr)
-               fputs(" [|nfs]", stdout);
+               nd_print_trunc(ndo);
 }