X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/f555c163f90c9de17ebcef8313f86404c5174ca9..d6aacc676d8540f31d1df72b12b43fc9cde93df6:/print-nfs.c diff --git a/print-nfs.c b/print-nfs.c index ceaa5aa5..84884aa5 100644 --- a/print-nfs.c +++ b/print-nfs.c @@ -19,105 +19,419 @@ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ -#ifndef lint -static const char rcsid[] = - "@(#) $Header: /tcpdump/master/tcpdump/print-nfs.c,v 1.65 1999-10-07 23:47:12 mcr Exp $ (LBL)"; +#ifdef HAVE_CONFIG_H +#include "config.h" #endif -#include -#include -#include +#include -#if __STDC__ -struct mbuf; -struct rtentry; -#endif -#include - -#include -#include -#include -#include -#include - -#include - -#include -#include #include #include -#include "interface.h" +#include "netdissect.h" #include "addrtoname.h" +#include "extract.h" -#include "nfsv2.h" +#include "nfs.h" #include "nfsfh.h" -static void nfs_printfh(const u_int32_t *); -static void xid_map_enter(const struct rpc_msg *, const struct ip *); -static u_int32_t xid_map_find(const struct rpc_msg *, const struct ip *, - u_int32_t *); -static void interp_reply(const struct rpc_msg *, u_int32_t, u_int); +#include "ip.h" +#include "ip6.h" +#include "rpc_auth.h" +#include "rpc_msg.h" + +static const char tstr[] = " [|nfs]"; + +static void nfs_printfh(netdissect_options *, const uint32_t *, const u_int); +static int xid_map_enter(netdissect_options *, const struct sunrpc_msg *, const u_char *); +static int xid_map_find(const struct sunrpc_msg *, const u_char *, + uint32_t *, uint32_t *); +static void interp_reply(netdissect_options *, const struct sunrpc_msg *, uint32_t, uint32_t, int); +static const uint32_t *parse_post_op_attr(netdissect_options *, const uint32_t *, int); + +/* + * Mapping of old NFS Version 2 RPC numbers to generic numbers. + */ +uint32_t nfsv3_procid[NFS_NPROCS] = { + NFSPROC_NULL, + NFSPROC_GETATTR, + NFSPROC_SETATTR, + NFSPROC_NOOP, + NFSPROC_LOOKUP, + NFSPROC_READLINK, + NFSPROC_READ, + NFSPROC_NOOP, + NFSPROC_WRITE, + NFSPROC_CREATE, + NFSPROC_REMOVE, + NFSPROC_RENAME, + NFSPROC_LINK, + NFSPROC_SYMLINK, + NFSPROC_MKDIR, + NFSPROC_RMDIR, + NFSPROC_READDIR, + NFSPROC_FSSTAT, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP, + NFSPROC_NOOP +}; + +static const struct tok nfsproc_str[] = { + { NFSPROC_NOOP, "nop" }, + { NFSPROC_NULL, "null" }, + { NFSPROC_GETATTR, "getattr" }, + { NFSPROC_SETATTR, "setattr" }, + { NFSPROC_LOOKUP, "lookup" }, + { NFSPROC_ACCESS, "access" }, + { NFSPROC_READLINK, "readlink" }, + { NFSPROC_READ, "read" }, + { NFSPROC_WRITE, "write" }, + { NFSPROC_CREATE, "create" }, + { NFSPROC_MKDIR, "mkdir" }, + { NFSPROC_SYMLINK, "symlink" }, + { NFSPROC_MKNOD, "mknod" }, + { NFSPROC_REMOVE, "remove" }, + { NFSPROC_RMDIR, "rmdir" }, + { NFSPROC_RENAME, "rename" }, + { NFSPROC_LINK, "link" }, + { NFSPROC_READDIR, "readdir" }, + { NFSPROC_READDIRPLUS, "readdirplus" }, + { NFSPROC_FSSTAT, "fsstat" }, + { NFSPROC_FSINFO, "fsinfo" }, + { NFSPROC_PATHCONF, "pathconf" }, + { NFSPROC_COMMIT, "commit" }, + { 0, NULL } +}; + +/* + * NFS V2 and V3 status values. + * + * Some of these come from the RFCs for NFS V2 and V3, with the message + * strings taken from the FreeBSD C library "errlst.c". + * + * Others are errors that are not in the RFC but that I suspect some + * NFS servers could return; the values are FreeBSD errno values, as + * the first NFS server was the SunOS 2.0 one, and until 5.0 SunOS + * was primarily BSD-derived. + */ +static const struct tok status2str[] = { + { 1, "Operation not permitted" }, /* EPERM */ + { 2, "No such file or directory" }, /* ENOENT */ + { 5, "Input/output error" }, /* EIO */ + { 6, "Device not configured" }, /* ENXIO */ + { 11, "Resource deadlock avoided" }, /* EDEADLK */ + { 12, "Cannot allocate memory" }, /* ENOMEM */ + { 13, "Permission denied" }, /* EACCES */ + { 17, "File exists" }, /* EEXIST */ + { 18, "Cross-device link" }, /* EXDEV */ + { 19, "Operation not supported by device" }, /* ENODEV */ + { 20, "Not a directory" }, /* ENOTDIR */ + { 21, "Is a directory" }, /* EISDIR */ + { 22, "Invalid argument" }, /* EINVAL */ + { 26, "Text file busy" }, /* ETXTBSY */ + { 27, "File too large" }, /* EFBIG */ + { 28, "No space left on device" }, /* ENOSPC */ + { 30, "Read-only file system" }, /* EROFS */ + { 31, "Too many links" }, /* EMLINK */ + { 45, "Operation not supported" }, /* EOPNOTSUPP */ + { 62, "Too many levels of symbolic links" }, /* ELOOP */ + { 63, "File name too long" }, /* ENAMETOOLONG */ + { 66, "Directory not empty" }, /* ENOTEMPTY */ + { 69, "Disc quota exceeded" }, /* EDQUOT */ + { 70, "Stale NFS file handle" }, /* ESTALE */ + { 71, "Too many levels of remote in path" }, /* EREMOTE */ + { 99, "Write cache flushed to disk" }, /* NFSERR_WFLUSH (not used) */ + { 10001, "Illegal NFS file handle" }, /* NFS3ERR_BADHANDLE */ + { 10002, "Update synchronization mismatch" }, /* NFS3ERR_NOT_SYNC */ + { 10003, "READDIR/READDIRPLUS cookie is stale" }, /* NFS3ERR_BAD_COOKIE */ + { 10004, "Operation not supported" }, /* NFS3ERR_NOTSUPP */ + { 10005, "Buffer or request is too small" }, /* NFS3ERR_TOOSMALL */ + { 10006, "Unspecified error on server" }, /* NFS3ERR_SERVERFAULT */ + { 10007, "Object of that type not supported" }, /* NFS3ERR_BADTYPE */ + { 10008, "Request couldn't be completed in time" }, /* NFS3ERR_JUKEBOX */ + { 0, NULL } +}; + +static const struct tok nfsv3_writemodes[] = { + { 0, "unstable" }, + { 1, "datasync" }, + { 2, "filesync" }, + { 0, NULL } +}; + +static const struct tok type2str[] = { + { NFNON, "NON" }, + { NFREG, "REG" }, + { NFDIR, "DIR" }, + { NFBLK, "BLK" }, + { NFCHR, "CHR" }, + { NFLNK, "LNK" }, + { NFFIFO, "FIFO" }, + { 0, NULL } +}; + +static const struct tok sunrpc_auth_str[] = { + { SUNRPC_AUTH_OK, "OK" }, + { SUNRPC_AUTH_BADCRED, "Bogus Credentials (seal broken)" }, + { SUNRPC_AUTH_REJECTEDCRED, "Rejected Credentials (client should begin new session)" }, + { SUNRPC_AUTH_BADVERF, "Bogus Verifier (seal broken)" }, + { SUNRPC_AUTH_REJECTEDVERF, "Verifier expired or was replayed" }, + { SUNRPC_AUTH_TOOWEAK, "Credentials are too weak" }, + { SUNRPC_AUTH_INVALIDRESP, "Bogus response verifier" }, + { SUNRPC_AUTH_FAILED, "Unknown failure" }, + { 0, NULL } +}; + +static const struct tok sunrpc_str[] = { + { SUNRPC_PROG_UNAVAIL, "PROG_UNAVAIL" }, + { SUNRPC_PROG_MISMATCH, "PROG_MISMATCH" }, + { SUNRPC_PROC_UNAVAIL, "PROC_UNAVAIL" }, + { SUNRPC_GARBAGE_ARGS, "GARBAGE_ARGS" }, + { SUNRPC_SYSTEM_ERR, "SYSTEM_ERR" }, + { 0, NULL } +}; + +static void +print_nfsaddr(netdissect_options *ndo, + const u_char *bp, const char *s, const char *d) +{ + const struct ip *ip; + const struct ip6_hdr *ip6; + char srcaddr[INET6_ADDRSTRLEN], dstaddr[INET6_ADDRSTRLEN]; + + srcaddr[0] = dstaddr[0] = '\0'; + switch (IP_V((const struct ip *)bp)) { + case 4: + ip = (const struct ip *)bp; + strlcpy(srcaddr, ipaddr_string(ndo, &ip->ip_src), sizeof(srcaddr)); + strlcpy(dstaddr, ipaddr_string(ndo, &ip->ip_dst), sizeof(dstaddr)); + break; + case 6: + ip6 = (const struct ip6_hdr *)bp; + strlcpy(srcaddr, ip6addr_string(ndo, &ip6->ip6_src), + sizeof(srcaddr)); + strlcpy(dstaddr, ip6addr_string(ndo, &ip6->ip6_dst), + sizeof(dstaddr)); + break; + default: + strlcpy(srcaddr, "?", sizeof(srcaddr)); + strlcpy(dstaddr, "?", sizeof(dstaddr)); + break; + } + + ND_PRINT((ndo, "%s.%s > %s.%s: ", srcaddr, s, dstaddr, d)); +} + +static const uint32_t * +parse_sattr3(netdissect_options *ndo, + const uint32_t *dp, struct nfsv3_sattr *sa3) +{ + ND_TCHECK(dp[0]); + sa3->sa_modeset = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_modeset) { + ND_TCHECK(dp[0]); + sa3->sa_mode = EXTRACT_32BITS(dp); + dp++; + } + + ND_TCHECK(dp[0]); + sa3->sa_uidset = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_uidset) { + ND_TCHECK(dp[0]); + sa3->sa_uid = EXTRACT_32BITS(dp); + dp++; + } + + ND_TCHECK(dp[0]); + sa3->sa_gidset = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_gidset) { + ND_TCHECK(dp[0]); + sa3->sa_gid = EXTRACT_32BITS(dp); + dp++; + } + + ND_TCHECK(dp[0]); + sa3->sa_sizeset = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_sizeset) { + ND_TCHECK(dp[0]); + sa3->sa_size = EXTRACT_32BITS(dp); + dp++; + } + + ND_TCHECK(dp[0]); + sa3->sa_atimetype = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) { + ND_TCHECK(dp[1]); + sa3->sa_atime.nfsv3_sec = EXTRACT_32BITS(dp); + dp++; + sa3->sa_atime.nfsv3_nsec = EXTRACT_32BITS(dp); + dp++; + } + + ND_TCHECK(dp[0]); + sa3->sa_mtimetype = EXTRACT_32BITS(dp); + dp++; + if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) { + ND_TCHECK(dp[1]); + sa3->sa_mtime.nfsv3_sec = EXTRACT_32BITS(dp); + dp++; + sa3->sa_mtime.nfsv3_nsec = EXTRACT_32BITS(dp); + dp++; + } + + return dp; +trunc: + return NULL; +} static int nfserr; /* true if we error rather than trunc */ +static void +print_sattr3(netdissect_options *ndo, + const struct nfsv3_sattr *sa3, int verbose) +{ + if (sa3->sa_modeset) + ND_PRINT((ndo, " mode %o", sa3->sa_mode)); + if (sa3->sa_uidset) + ND_PRINT((ndo, " uid %u", sa3->sa_uid)); + if (sa3->sa_gidset) + ND_PRINT((ndo, " gid %u", sa3->sa_gid)); + if (verbose > 1) { + if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) + ND_PRINT((ndo, " atime %u.%06u", sa3->sa_atime.nfsv3_sec, + sa3->sa_atime.nfsv3_nsec)); + if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) + ND_PRINT((ndo, " mtime %u.%06u", sa3->sa_mtime.nfsv3_sec, + sa3->sa_mtime.nfsv3_nsec)); + } +} + void -nfsreply_print(register const u_char *bp, u_int length, - register const u_char *bp2) +nfsreply_print(netdissect_options *ndo, + register const u_char *bp, u_int length, + register const u_char *bp2) { - register const struct rpc_msg *rp; - register const struct ip *ip; - u_int32_t proc; + register const struct sunrpc_msg *rp; + char srcid[20], dstid[20]; /*fits 32bit*/ nfserr = 0; /* assume no error */ - rp = (const struct rpc_msg *)bp; - ip = (const struct ip *)bp2; - - if (!nflag) - (void)printf("%s.nfs > %s.%u: reply %s %d", - ipaddr_string(&ip->ip_src), - ipaddr_string(&ip->ip_dst), - (u_int32_t)ntohl(rp->rm_xid), - ntohl(rp->rm_reply.rp_stat) == MSG_ACCEPTED? - "ok":"ERR", - length); - else - (void)printf("%s.%u > %s.%u: reply %s %d", - ipaddr_string(&ip->ip_src), - NFS_PORT, - ipaddr_string(&ip->ip_dst), - (u_int32_t)ntohl(rp->rm_xid), - ntohl(rp->rm_reply.rp_stat) == MSG_ACCEPTED? - "ok":"ERR", - length); - - if (xid_map_find(rp, ip, &proc)) - interp_reply(rp, proc, length); + rp = (const struct sunrpc_msg *)bp; + + ND_TCHECK(rp->rm_xid); + if (!ndo->ndo_nflag) { + strlcpy(srcid, "nfs", sizeof(srcid)); + snprintf(dstid, sizeof(dstid), "%u", + EXTRACT_32BITS(&rp->rm_xid)); + } else { + snprintf(srcid, sizeof(srcid), "%u", NFS_PORT); + snprintf(dstid, sizeof(dstid), "%u", + EXTRACT_32BITS(&rp->rm_xid)); + } + print_nfsaddr(ndo, bp2, srcid, dstid); + + nfsreply_print_noaddr(ndo, bp, length, bp2); + return; + +trunc: + if (!nfserr) + ND_PRINT((ndo, "%s", tstr)); +} + +void +nfsreply_print_noaddr(netdissect_options *ndo, + register const u_char *bp, u_int length, + register const u_char *bp2) +{ + register const struct sunrpc_msg *rp; + uint32_t proc, vers, reply_stat; + enum sunrpc_reject_stat rstat; + uint32_t rlow; + uint32_t rhigh; + enum sunrpc_auth_stat rwhy; + + nfserr = 0; /* assume no error */ + rp = (const struct sunrpc_msg *)bp; + + ND_TCHECK(rp->rm_reply.rp_stat); + reply_stat = EXTRACT_32BITS(&rp->rm_reply.rp_stat); + switch (reply_stat) { + + case SUNRPC_MSG_ACCEPTED: + ND_PRINT((ndo, "reply ok %u", length)); + if (xid_map_find(rp, bp2, &proc, &vers) >= 0) + interp_reply(ndo, rp, proc, vers, length); + break; + + case SUNRPC_MSG_DENIED: + ND_PRINT((ndo, "reply ERR %u: ", length)); + ND_TCHECK(rp->rm_reply.rp_reject.rj_stat); + rstat = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_stat); + switch (rstat) { + + case SUNRPC_RPC_MISMATCH: + ND_TCHECK(rp->rm_reply.rp_reject.rj_vers.high); + rlow = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.low); + rhigh = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.high); + ND_PRINT((ndo, "RPC Version mismatch (%u-%u)", rlow, rhigh)); + break; + + case SUNRPC_AUTH_ERROR: + ND_TCHECK(rp->rm_reply.rp_reject.rj_why); + rwhy = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_why); + ND_PRINT((ndo, "Auth %s", tok2str(sunrpc_auth_str, "Invalid failure code %u", rwhy))); + break; + + default: + ND_PRINT((ndo, "Unknown reason for rejecting rpc message %u", (unsigned int)rstat)); + break; + } + break; + + default: + ND_PRINT((ndo, "reply Unknown rpc response code=%u %u", reply_stat, length)); + break; + } + return; + +trunc: + if (!nfserr) + ND_PRINT((ndo, "%s", tstr)); } /* * Return a pointer to the first file handle in the packet. * If the packet was truncated, return 0. */ -static const u_int32_t * -parsereq(register const struct rpc_msg *rp, register u_int length) +static const uint32_t * +parsereq(netdissect_options *ndo, + register const struct sunrpc_msg *rp, register u_int length) { - register const u_int32_t *dp; + register const uint32_t *dp; register u_int len; /* * find the start of the req data (if we captured it) */ - dp = (u_int32_t *)&rp->rm_call.cb_cred; - TCHECK(dp[1]); - len = ntohl(dp[1]); + dp = (const uint32_t *)&rp->rm_call.cb_cred; + ND_TCHECK(dp[1]); + len = EXTRACT_32BITS(&dp[1]); if (len < length) { dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp); - TCHECK(dp[1]); - len = ntohl(dp[1]); + ND_TCHECK(dp[1]); + len = EXTRACT_32BITS(&dp[1]); if (len < length) { dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp); - TCHECK2(dp[0], 0); + ND_TCHECK2(dp[0], 0); return (dp); } } @@ -129,13 +443,24 @@ trunc: * Print out an NFS file handle and return a pointer to following word. * If packet was truncated, return 0. */ -static const u_int32_t * -parsefh(register const u_int32_t *dp) +static const uint32_t * +parsefh(netdissect_options *ndo, + register const uint32_t *dp, int v3) { - if (dp + 8 <= (u_int32_t *)snapend) { - nfs_printfh(dp); - return (dp + 8); + u_int len; + + if (v3) { + ND_TCHECK(dp[0]); + len = EXTRACT_32BITS(dp) / 4; + dp++; + } else + len = NFSX_V2FH / 4; + + if (ND_TTEST2(*dp, len * sizeof(*dp))) { + nfs_printfh(ndo, dp, len); + return (dp + len); } +trunc: return (NULL); } @@ -143,31 +468,35 @@ parsefh(register const u_int32_t *dp) * Print out a file name and return pointer to 32-bit word past it. * If packet was truncated, return 0. */ -static const u_int32_t * -parsefn(register const u_int32_t *dp) +static const uint32_t * +parsefn(netdissect_options *ndo, + register const uint32_t *dp) { - register u_int32_t len; + register uint32_t len; register const u_char *cp; /* Bail if we don't have the string length */ - if ((u_char *)dp > snapend - sizeof(*dp)) - return (NULL); + ND_TCHECK(*dp); /* Fetch string length; convert to host order */ len = *dp++; NTOHL(len); - cp = (u_char *)dp; + ND_TCHECK2(*dp, ((len + 3) & ~3)); + + cp = (const u_char *)dp; /* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */ dp += ((len + 3) & ~3) / sizeof(*dp); - if ((u_char *)dp > snapend) - return (NULL); - /* XXX seems like we should be checking the length */ - putchar('"'); - (void) fn_printn(cp, len, NULL); - putchar('"'); + ND_PRINT((ndo, "\"")); + if (fn_printn(ndo, cp, len, ndo->ndo_snapend)) { + ND_PRINT((ndo, "\"")); + goto trunc; + } + ND_PRINT((ndo, "\"")); return (dp); +trunc: + return NULL; } /* @@ -175,208 +504,272 @@ parsefn(register const u_int32_t *dp) * Return pointer to 32-bit word past file name. * If packet was truncated (or there was some other error), return 0. */ -static const u_int32_t * -parsefhn(register const u_int32_t *dp) +static const uint32_t * +parsefhn(netdissect_options *ndo, + register const uint32_t *dp, int v3) { - dp = parsefh(dp); + dp = parsefh(ndo, dp, v3); if (dp == NULL) return (NULL); - putchar(' '); - return (parsefn(dp)); + ND_PRINT((ndo, " ")); + return (parsefn(ndo, dp)); } void -nfsreq_print(register const u_char *bp, u_int length, - register const u_char *bp2) +nfsreq_print_noaddr(netdissect_options *ndo, + register const u_char *bp, u_int length, + register const u_char *bp2) { - register const struct rpc_msg *rp; - register const struct ip *ip; - register const u_int32_t *dp; - + register const struct sunrpc_msg *rp; + register const uint32_t *dp; + nfs_type type; + int v3; + uint32_t proc; + uint32_t access_flags; + struct nfsv3_sattr sa3; + + ND_PRINT((ndo, "%d", length)); nfserr = 0; /* assume no error */ - rp = (const struct rpc_msg *)bp; - ip = (const struct ip *)bp2; - if (!nflag) - (void)printf("%s.%u > %s.nfs: %d", - ipaddr_string(&ip->ip_src), - (u_int32_t)ntohl(rp->rm_xid), - ipaddr_string(&ip->ip_dst), - length); - else - (void)printf("%s.%u > %s.%u: %d", - ipaddr_string(&ip->ip_src), - (u_int32_t)ntohl(rp->rm_xid), - ipaddr_string(&ip->ip_dst), - NFS_PORT, - length); - - xid_map_enter(rp, ip); /* record proc number for later on */ - - switch (ntohl(rp->rm_call.cb_proc)) { -#ifdef NFSPROC_NOOP - case NFSPROC_NOOP: - printf(" nop"); - return; -#else -#define NFSPROC_NOOP -1 -#endif - case NFSPROC_NULL: - printf(" null"); - return; + rp = (const struct sunrpc_msg *)bp; - case NFSPROC_GETATTR: - printf(" getattr"); - if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL) - return; - break; + if (!xid_map_enter(ndo, rp, bp2)) /* record proc number for later on */ + goto trunc; + + v3 = (EXTRACT_32BITS(&rp->rm_call.cb_vers) == NFS_VER3); + proc = EXTRACT_32BITS(&rp->rm_call.cb_proc); + + if (!v3 && proc < NFS_NPROCS) + proc = nfsv3_procid[proc]; + ND_PRINT((ndo, " %s", tok2str(nfsproc_str, "proc-%u", proc))); + switch (proc) { + + case NFSPROC_GETATTR: case NFSPROC_SETATTR: - printf(" setattr"); - if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL) + case NFSPROC_READLINK: + case NFSPROC_FSSTAT: + case NFSPROC_FSINFO: + case NFSPROC_PATHCONF: + if ((dp = parsereq(ndo, rp, length)) != NULL && + parsefh(ndo, dp, v3) != NULL) return; break; -#if NFSPROC_ROOT != NFSPROC_NOOP - case NFSPROC_ROOT: - printf(" root"); - break; -#endif case NFSPROC_LOOKUP: - printf(" lookup"); - if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL) + case NFSPROC_CREATE: + case NFSPROC_MKDIR: + case NFSPROC_REMOVE: + case NFSPROC_RMDIR: + if ((dp = parsereq(ndo, rp, length)) != NULL && + parsefhn(ndo, dp, v3) != NULL) return; break; - case NFSPROC_READLINK: - printf(" readlink"); - if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL) + case NFSPROC_ACCESS: + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + ND_TCHECK(dp[0]); + access_flags = EXTRACT_32BITS(&dp[0]); + if (access_flags & ~NFSV3ACCESS_FULL) { + /* NFSV3ACCESS definitions aren't up to date */ + ND_PRINT((ndo, " %04x", access_flags)); + } else if ((access_flags & NFSV3ACCESS_FULL) == NFSV3ACCESS_FULL) { + ND_PRINT((ndo, " NFS_ACCESS_FULL")); + } else { + char separator = ' '; + if (access_flags & NFSV3ACCESS_READ) { + ND_PRINT((ndo, " NFS_ACCESS_READ")); + separator = '|'; + } + if (access_flags & NFSV3ACCESS_LOOKUP) { + ND_PRINT((ndo, "%cNFS_ACCESS_LOOKUP", separator)); + separator = '|'; + } + if (access_flags & NFSV3ACCESS_MODIFY) { + ND_PRINT((ndo, "%cNFS_ACCESS_MODIFY", separator)); + separator = '|'; + } + if (access_flags & NFSV3ACCESS_EXTEND) { + ND_PRINT((ndo, "%cNFS_ACCESS_EXTEND", separator)); + separator = '|'; + } + if (access_flags & NFSV3ACCESS_DELETE) { + ND_PRINT((ndo, "%cNFS_ACCESS_DELETE", separator)); + separator = '|'; + } + if (access_flags & NFSV3ACCESS_EXECUTE) + ND_PRINT((ndo, "%cNFS_ACCESS_EXECUTE", separator)); + } return; + } break; case NFSPROC_READ: - printf(" read"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefh(dp)) != NULL) { - TCHECK2(dp[0], 3 * sizeof(*dp)); - printf(" %u bytes @ %u", - (u_int32_t)ntohl(dp[1]), - (u_int32_t)ntohl(dp[0])); + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + if (v3) { + ND_TCHECK(dp[2]); + ND_PRINT((ndo, " %u bytes @ %" PRIu64, + EXTRACT_32BITS(&dp[2]), + EXTRACT_64BITS(&dp[0]))); + } else { + ND_TCHECK(dp[1]); + ND_PRINT((ndo, " %u bytes @ %u", + EXTRACT_32BITS(&dp[1]), + EXTRACT_32BITS(&dp[0]))); + } return; } break; -#if NFSPROC_WRITECACHE != NFSPROC_NOOP - case NFSPROC_WRITECACHE: - printf(" writecache"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefh(dp)) != NULL) { - TCHECK2(dp[0], 4 * sizeof(*dp)); - printf(" %u (%u) bytes @ %u (%u)", - (u_int32_t)ntohl(dp[3]), - (u_int32_t)ntohl(dp[2]), - (u_int32_t)ntohl(dp[1]), - (u_int32_t)ntohl(dp[0])); - return; - } - break; -#endif case NFSPROC_WRITE: - printf(" write"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefh(dp)) != NULL) { - TCHECK2(dp[0], 4 * sizeof(*dp)); - printf(" %u (%u) bytes @ %u (%u)", - (u_int32_t)ntohl(dp[3]), - (u_int32_t)ntohl(dp[2]), - (u_int32_t)ntohl(dp[1]), - (u_int32_t)ntohl(dp[0])); + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + if (v3) { + ND_TCHECK(dp[2]); + ND_PRINT((ndo, " %u (%u) bytes @ %" PRIu64, + EXTRACT_32BITS(&dp[4]), + EXTRACT_32BITS(&dp[2]), + EXTRACT_64BITS(&dp[0]))); + if (ndo->ndo_vflag) { + dp += 3; + ND_TCHECK(dp[0]); + ND_PRINT((ndo, " <%s>", + tok2str(nfsv3_writemodes, + NULL, EXTRACT_32BITS(dp)))); + } + } else { + ND_TCHECK(dp[3]); + ND_PRINT((ndo, " %u (%u) bytes @ %u (%u)", + EXTRACT_32BITS(&dp[3]), + EXTRACT_32BITS(&dp[2]), + EXTRACT_32BITS(&dp[1]), + EXTRACT_32BITS(&dp[0]))); + } return; } break; - case NFSPROC_CREATE: - printf(" create"); - if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL) + case NFSPROC_SYMLINK: + if ((dp = parsereq(ndo, rp, length)) != 0 && + (dp = parsefhn(ndo, dp, v3)) != 0) { + ND_PRINT((ndo, " ->")); + if (v3 && (dp = parse_sattr3(ndo, dp, &sa3)) == 0) + break; + if (parsefn(ndo, dp) == 0) + break; + if (v3 && ndo->ndo_vflag) + print_sattr3(ndo, &sa3, ndo->ndo_vflag); return; + } break; - case NFSPROC_REMOVE: - printf(" remove"); - if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL) + case NFSPROC_MKNOD: + if ((dp = parsereq(ndo, rp, length)) != 0 && + (dp = parsefhn(ndo, dp, v3)) != 0) { + ND_TCHECK(*dp); + type = (nfs_type)EXTRACT_32BITS(dp); + dp++; + if ((dp = parse_sattr3(ndo, dp, &sa3)) == 0) + break; + ND_PRINT((ndo, " %s", tok2str(type2str, "unk-ft %d", type))); + if (ndo->ndo_vflag && (type == NFCHR || type == NFBLK)) { + ND_TCHECK(dp[1]); + ND_PRINT((ndo, " %u/%u", + EXTRACT_32BITS(&dp[0]), + EXTRACT_32BITS(&dp[1]))); + dp += 2; + } + if (ndo->ndo_vflag) + print_sattr3(ndo, &sa3, ndo->ndo_vflag); return; + } break; case NFSPROC_RENAME: - printf(" rename"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefhn(dp)) != NULL) { - fputs(" ->", stdout); - if (parsefhn(dp) != NULL) + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefhn(ndo, dp, v3)) != NULL) { + ND_PRINT((ndo, " ->")); + if (parsefhn(ndo, dp, v3) != NULL) return; } break; case NFSPROC_LINK: - printf(" link"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefh(dp)) != NULL) { - fputs(" ->", stdout); - if (parsefhn(dp) != NULL) + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + ND_PRINT((ndo, " ->")); + if (parsefhn(ndo, dp, v3) != NULL) return; } break; - case NFSPROC_SYMLINK: - printf(" symlink"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefhn(dp)) != NULL) { - fputs(" -> ", stdout); - if (parsefn(dp) != NULL) - return; - } - break; - - case NFSPROC_MKDIR: - printf(" mkdir"); - if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL) - return; - break; - - case NFSPROC_RMDIR: - printf(" rmdir"); - if ((dp = parsereq(rp, length)) != NULL && parsefhn(dp) != NULL) + case NFSPROC_READDIR: + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + if (v3) { + ND_TCHECK(dp[4]); + /* + * We shouldn't really try to interpret the + * offset cookie here. + */ + ND_PRINT((ndo, " %u bytes @ %" PRId64, + EXTRACT_32BITS(&dp[4]), + EXTRACT_64BITS(&dp[0]))); + if (ndo->ndo_vflag) + ND_PRINT((ndo, " verf %08x%08x", dp[2], dp[3])); + } else { + ND_TCHECK(dp[1]); + /* + * Print the offset as signed, since -1 is + * common, but offsets > 2^31 aren't. + */ + ND_PRINT((ndo, " %u bytes @ %d", + EXTRACT_32BITS(&dp[1]), + EXTRACT_32BITS(&dp[0]))); + } return; + } break; - case NFSPROC_READDIR: - printf(" readdir"); - if ((dp = parsereq(rp, length)) != NULL && - (dp = parsefh(dp)) != NULL) { - TCHECK2(dp[0], 2 * sizeof(*dp)); + case NFSPROC_READDIRPLUS: + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + ND_TCHECK(dp[4]); /* - * Print the offset as signed, since -1 is common, - * but offsets > 2^31 aren't. + * We don't try to interpret the offset + * cookie here. */ - printf(" %u bytes @ %d", - (u_int32_t)ntohl(dp[1]), - (u_int32_t)ntohl(dp[0])); + ND_PRINT((ndo, " %u bytes @ %" PRId64, + EXTRACT_32BITS(&dp[4]), + EXTRACT_64BITS(&dp[0]))); + if (ndo->ndo_vflag) { + ND_TCHECK(dp[5]); + ND_PRINT((ndo, " max %u verf %08x%08x", + EXTRACT_32BITS(&dp[5]), dp[2], dp[3])); + } return; } break; - case NFSPROC_STATFS: - printf(" statfs"); - if ((dp = parsereq(rp, length)) != NULL && parsefh(dp) != NULL) + case NFSPROC_COMMIT: + if ((dp = parsereq(ndo, rp, length)) != NULL && + (dp = parsefh(ndo, dp, v3)) != NULL) { + ND_TCHECK(dp[2]); + ND_PRINT((ndo, " %u bytes @ %" PRIu64, + EXTRACT_32BITS(&dp[2]), + EXTRACT_64BITS(&dp[0]))); return; + } break; default: - printf(" proc-%u", (u_int32_t)ntohl(rp->rm_call.cb_proc)); return; } + trunc: if (!nfserr) - fputs(" [|nfs]", stdout); + ND_PRINT((ndo, "%s", tstr)); } /* @@ -389,30 +782,52 @@ trunc: * additional hacking on the parser code. */ static void -nfs_printfh(register const u_int32_t *dp) +nfs_printfh(netdissect_options *ndo, + register const uint32_t *dp, const u_int len) { my_fsid fsid; - ino_t ino; - char *sfsname = NULL; + uint32_t ino; + const char *sfsname = NULL; + char *spacep; + + if (ndo->ndo_uflag) { + u_int i; + char const *sep = ""; + + ND_PRINT((ndo, " fh[")); + for (i=0; irm_call.cb_vers)) + return (0); + switch (IP_V((const struct ip *)bp)) { + case 4: + ip = (const struct ip *)bp; + break; + case 6: + ip6 = (const struct ip6_hdr *)bp; + break; + default: + return (1); + } + xmep = &xid_map[xid_map_next]; if (++xid_map_next >= XIDMAPSIZE) xid_map_next = 0; - xmep->xid = rp->rm_xid; - xmep->client = ip->ip_src; - xmep->server = ip->ip_dst; - xmep->proc = ntohl(rp->rm_call.cb_proc); + UNALIGNED_MEMCPY(&xmep->xid, &rp->rm_xid, sizeof(xmep->xid)); + if (ip) { + xmep->ipver = 4; + UNALIGNED_MEMCPY(&xmep->client, &ip->ip_src, sizeof(ip->ip_src)); + UNALIGNED_MEMCPY(&xmep->server, &ip->ip_dst, sizeof(ip->ip_dst)); + } + else if (ip6) { + xmep->ipver = 6; + UNALIGNED_MEMCPY(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src)); + UNALIGNED_MEMCPY(&xmep->server, &ip6->ip6_dst, sizeof(ip6->ip6_dst)); + } + xmep->proc = EXTRACT_32BITS(&rp->rm_call.cb_proc); + xmep->vers = EXTRACT_32BITS(&rp->rm_call.cb_vers); + return (1); } -/* Returns true and sets proc success or false on failure */ -static u_int32_t -xid_map_find(const struct rpc_msg *rp, const struct ip *ip, u_int32_t *proc) +/* + * Returns 0 and puts NFSPROC_xxx in proc return and + * version in vers return, or returns -1 on failure + */ +static int +xid_map_find(const struct sunrpc_msg *rp, const u_char *bp, uint32_t *proc, + uint32_t *vers) { int i; struct xid_map_entry *xmep; - u_int32_t xid = rp->rm_xid; - u_int32_t clip = ip->ip_dst.s_addr; - u_int32_t sip = ip->ip_src.s_addr; + uint32_t xid; + const struct ip *ip = (const struct ip *)bp; + const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp; + int cmp; + UNALIGNED_MEMCPY(&xid, &rp->rm_xid, sizeof(xmep->xid)); /* Start searching from where we last left off */ i = xid_map_hint; do { xmep = &xid_map[i]; - if (xmep->xid == xid && xmep->client.s_addr == clip && - xmep->server.s_addr == sip) { + cmp = 1; + if (xmep->ipver != IP_V(ip) || xmep->xid != xid) + goto nextitem; + switch (xmep->ipver) { + case 4: + if (UNALIGNED_MEMCMP(&ip->ip_src, &xmep->server, + sizeof(ip->ip_src)) != 0 || + UNALIGNED_MEMCMP(&ip->ip_dst, &xmep->client, + sizeof(ip->ip_dst)) != 0) { + cmp = 0; + } + break; + case 6: + if (UNALIGNED_MEMCMP(&ip6->ip6_src, &xmep->server, + sizeof(ip6->ip6_src)) != 0 || + UNALIGNED_MEMCMP(&ip6->ip6_dst, &xmep->client, + sizeof(ip6->ip6_dst)) != 0) { + cmp = 0; + } + break; + default: + cmp = 0; + break; + } + if (cmp) { /* match */ xid_map_hint = i; *proc = xmep->proc; - return (1); + *vers = xmep->vers; + return 0; } + nextitem: if (++i >= XIDMAPSIZE) i = 0; } while (i != xid_map_hint); /* search failed */ - return (0); + return (-1); } /* @@ -494,18 +968,19 @@ xid_map_find(const struct rpc_msg *rp, const struct ip *ip, u_int32_t *proc) * Return a pointer to the beginning of the actual results. * If the packet was truncated, return 0. */ -static const u_int32_t * -parserep(register const struct rpc_msg *rp, register u_int length) +static const uint32_t * +parserep(netdissect_options *ndo, + register const struct sunrpc_msg *rp, register u_int length) { - register const u_int32_t *dp; + register const uint32_t *dp; u_int len; - enum accept_stat astat; + enum sunrpc_accept_stat astat; /* * Portability note: * Here we find the address of the ar_verf credentials. * Originally, this calculation was - * dp = (u_int32_t *)&rp->rm_reply.rp_acpt.ar_verf + * dp = (uint32_t *)&rp->rm_reply.rp_acpt.ar_verf * On the wire, the rp_acpt field starts immediately after * the (32 bit) rp_stat field. However, rp_acpt (which is a * "struct accepted_reply") contains a "struct opaque_auth", @@ -516,189 +991,220 @@ parserep(register const struct rpc_msg *rp, register u_int length) * representation. Instead, we skip past the rp_stat field, * which is an "enum" and so occupies one 32-bit word. */ - dp = ((const u_int32_t *)&rp->rm_reply) + 1; - TCHECK2(dp[0], 1); - len = ntohl(dp[1]); + dp = ((const uint32_t *)&rp->rm_reply) + 1; + ND_TCHECK(dp[1]); + len = EXTRACT_32BITS(&dp[1]); if (len >= length) return (NULL); /* * skip past the ar_verf credentials. */ - dp += (len + (2*sizeof(u_int32_t) + 3)) / sizeof(u_int32_t); - TCHECK2(dp[0], 0); + dp += (len + (2*sizeof(uint32_t) + 3)) / sizeof(uint32_t); + ND_TCHECK2(dp[0], 0); /* * now we can check the ar_stat field */ - astat = ntohl(*(enum accept_stat *)dp); - switch (astat) { - - case SUCCESS: - break; - - case PROG_UNAVAIL: - printf(" PROG_UNAVAIL"); - nfserr = 1; /* suppress trunc string */ - return (NULL); - - case PROG_MISMATCH: - printf(" PROG_MISMATCH"); - nfserr = 1; /* suppress trunc string */ - return (NULL); - - case PROC_UNAVAIL: - printf(" PROC_UNAVAIL"); - nfserr = 1; /* suppress trunc string */ - return (NULL); - - case GARBAGE_ARGS: - printf(" GARBAGE_ARGS"); - nfserr = 1; /* suppress trunc string */ - return (NULL); - - case SYSTEM_ERR: - printf(" SYSTEM_ERR"); - nfserr = 1; /* suppress trunc string */ - return (NULL); - - default: - printf(" ar_stat %d", astat); + astat = (enum sunrpc_accept_stat) EXTRACT_32BITS(dp); + if (astat != SUNRPC_SUCCESS) { + ND_PRINT((ndo, " %s", tok2str(sunrpc_str, "ar_stat %d", astat))); nfserr = 1; /* suppress trunc string */ return (NULL); } /* successful return */ - if ((sizeof(astat) + ((u_char *)dp)) < snapend) - return ((u_int32_t *) (sizeof(astat) + ((char *)dp))); - + ND_TCHECK2(*dp, sizeof(astat)); + return ((const uint32_t *) (sizeof(astat) + ((const char *)dp))); trunc: - return (NULL); + return (0); } -static const u_int32_t * -parsestatus(const u_int32_t *dp) +static const uint32_t * +parsestatus(netdissect_options *ndo, + const uint32_t *dp, int *er) { - register int errnum; + int errnum; - TCHECK(dp[0]); - errnum = ntohl(dp[0]); + ND_TCHECK(dp[0]); + + errnum = EXTRACT_32BITS(&dp[0]); + if (er) + *er = errnum; if (errnum != 0) { - if (!qflag) - printf(" ERROR: %s", pcap_strerror(errnum)); - nfserr = 1; /* suppress trunc string */ - return (NULL); + if (!ndo->ndo_qflag) + ND_PRINT((ndo, " ERROR: %s", + tok2str(status2str, "unk %d", errnum))); + nfserr = 1; } return (dp + 1); trunc: - return (NULL); + return NULL; } -static struct tok type2str[] = { - { NFNON, "NON" }, - { NFREG, "REG" }, - { NFDIR, "DIR" }, - { NFBLK, "BLK" }, - { NFCHR, "CHR" }, - { NFLNK, "LNK" }, - { 0, NULL } -}; - -static const u_int32_t * -parsefattr(const u_int32_t *dp, int verbose) +static const uint32_t * +parsefattr(netdissect_options *ndo, + const uint32_t *dp, int verbose, int v3) { - const struct nfsv2_fattr *fap; + const struct nfs_fattr *fap; - fap = (const struct nfsv2_fattr *)dp; + fap = (const struct nfs_fattr *)dp; + ND_TCHECK(fap->fa_gid); if (verbose) { - TCHECK(fap->fa_nfssize); - printf(" %s %o ids %u/%u sz %u ", + ND_PRINT((ndo, " %s %o ids %d/%d", tok2str(type2str, "unk-ft %d ", - (u_int32_t)ntohl(fap->fa_type)), - (u_int32_t)ntohl(fap->fa_mode), - (u_int32_t)ntohl(fap->fa_uid), - (u_int32_t)ntohl(fap->fa_gid), - (u_int32_t)ntohl(fap->fa_nfssize)); + EXTRACT_32BITS(&fap->fa_type)), + EXTRACT_32BITS(&fap->fa_mode), + EXTRACT_32BITS(&fap->fa_uid), + EXTRACT_32BITS(&fap->fa_gid))); + if (v3) { + ND_TCHECK(fap->fa3_size); + ND_PRINT((ndo, " sz %" PRIu64, + EXTRACT_64BITS((const uint32_t *)&fap->fa3_size))); + } else { + ND_TCHECK(fap->fa2_size); + ND_PRINT((ndo, " sz %d", EXTRACT_32BITS(&fap->fa2_size))); + } } /* print lots more stuff */ if (verbose > 1) { - TCHECK(fap->fa_nfsfileid); - printf("nlink %u rdev %x fsid %x nodeid %x a/m/ctime ", - (u_int32_t)ntohl(fap->fa_nlink), - (u_int32_t)ntohl(fap->fa_nfsrdev), - (u_int32_t)ntohl(fap->fa_nfsfsid), - (u_int32_t)ntohl(fap->fa_nfsfileid)); - TCHECK(fap->fa_nfsatime); - printf("%u.%06u ", - (u_int32_t)ntohl(fap->fa_nfsatime.nfs_sec), - (u_int32_t)ntohl(fap->fa_nfsatime.nfs_usec)); - TCHECK(fap->fa_nfsmtime); - printf("%u.%06u ", - (u_int32_t)ntohl(fap->fa_nfsmtime.nfs_sec), - (u_int32_t)ntohl(fap->fa_nfsmtime.nfs_usec)); - TCHECK(fap->fa_nfsctime); - printf("%u.%06u ", - (u_int32_t)ntohl(fap->fa_nfsctime.nfs_sec), - (u_int32_t)ntohl(fap->fa_nfsctime.nfs_usec)); + if (v3) { + ND_TCHECK(fap->fa3_ctime); + ND_PRINT((ndo, " nlink %d rdev %d/%d", + EXTRACT_32BITS(&fap->fa_nlink), + EXTRACT_32BITS(&fap->fa3_rdev.specdata1), + EXTRACT_32BITS(&fap->fa3_rdev.specdata2))); + ND_PRINT((ndo, " fsid %" PRIx64, + EXTRACT_64BITS((const uint32_t *)&fap->fa3_fsid))); + ND_PRINT((ndo, " fileid %" PRIx64, + EXTRACT_64BITS((const uint32_t *)&fap->fa3_fileid))); + ND_PRINT((ndo, " a/m/ctime %u.%06u", + EXTRACT_32BITS(&fap->fa3_atime.nfsv3_sec), + EXTRACT_32BITS(&fap->fa3_atime.nfsv3_nsec))); + ND_PRINT((ndo, " %u.%06u", + EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_sec), + EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_nsec))); + ND_PRINT((ndo, " %u.%06u", + EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_sec), + EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_nsec))); + } else { + ND_TCHECK(fap->fa2_ctime); + ND_PRINT((ndo, " nlink %d rdev 0x%x fsid 0x%x nodeid 0x%x a/m/ctime", + EXTRACT_32BITS(&fap->fa_nlink), + EXTRACT_32BITS(&fap->fa2_rdev), + EXTRACT_32BITS(&fap->fa2_fsid), + EXTRACT_32BITS(&fap->fa2_fileid))); + ND_PRINT((ndo, " %u.%06u", + EXTRACT_32BITS(&fap->fa2_atime.nfsv2_sec), + EXTRACT_32BITS(&fap->fa2_atime.nfsv2_usec))); + ND_PRINT((ndo, " %u.%06u", + EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_sec), + EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_usec))); + ND_PRINT((ndo, " %u.%06u", + EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_sec), + EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_usec))); + } } - return ((const u_int32_t *)&fap[1]); + return ((const uint32_t *)((const unsigned char *)dp + + (v3 ? NFSX_V3FATTR : NFSX_V2FATTR))); trunc: return (NULL); } static int -parseattrstat(const u_int32_t *dp, int verbose) +parseattrstat(netdissect_options *ndo, + const uint32_t *dp, int verbose, int v3) { + int er; - dp = parsestatus(dp); + dp = parsestatus(ndo, dp, &er); if (dp == NULL) return (0); + if (er) + return (1); - return (parsefattr(dp, verbose) != NULL); + return (parsefattr(ndo, dp, verbose, v3) != NULL); } static int -parsediropres(const u_int32_t *dp) +parsediropres(netdissect_options *ndo, + const uint32_t *dp) { + int er; - dp = parsestatus(dp); - if (dp == NULL) + if (!(dp = parsestatus(ndo, dp, &er))) return (0); + if (er) + return (1); - dp = parsefh(dp); + dp = parsefh(ndo, dp, 0); if (dp == NULL) return (0); - return (parsefattr(dp, vflag) != NULL); + return (parsefattr(ndo, dp, ndo->ndo_vflag, 0) != NULL); } static int -parselinkres(const u_int32_t *dp) +parselinkres(netdissect_options *ndo, + const uint32_t *dp, int v3) { - dp = parsestatus(dp); + int er; + + dp = parsestatus(ndo, dp, &er); if (dp == NULL) + return(0); + if (er) + return(1); + if (v3 && !(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) return (0); - - putchar(' '); - return (parsefn(dp) != NULL); + ND_PRINT((ndo, " ")); + return (parsefn(ndo, dp) != NULL); } static int -parsestatfs(const u_int32_t *dp) +parsestatfs(netdissect_options *ndo, + const uint32_t *dp, int v3) { - const struct nfsv2_statfs *sfsp; + const struct nfs_statfs *sfsp; + int er; - dp = parsestatus(dp); + dp = parsestatus(ndo, dp, &er); if (dp == NULL) return (0); + if (!v3 && er) + return (1); + + if (ndo->ndo_qflag) + return(1); - if (!qflag) { - sfsp = (const struct nfsv2_statfs *)dp; - TCHECK(sfsp->sf_bavail); - printf(" tsize %u bsize %u blocks %u bfree %u bavail %u", - (u_int32_t)ntohl(sfsp->sf_tsize), - (u_int32_t)ntohl(sfsp->sf_bsize), - (u_int32_t)ntohl(sfsp->sf_blocks), - (u_int32_t)ntohl(sfsp->sf_bfree), - (u_int32_t)ntohl(sfsp->sf_bavail)); + if (v3) { + if (ndo->ndo_vflag) + ND_PRINT((ndo, " POST:")); + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + return (0); + } + + ND_TCHECK2(*dp, (v3 ? NFSX_V3STATFS : NFSX_V2STATFS)); + + sfsp = (const struct nfs_statfs *)dp; + + if (v3) { + ND_PRINT((ndo, " tbytes %" PRIu64 " fbytes %" PRIu64 " abytes %" PRIu64, + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_tbytes), + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_fbytes), + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_abytes))); + if (ndo->ndo_vflag) { + ND_PRINT((ndo, " tfiles %" PRIu64 " ffiles %" PRIu64 " afiles %" PRIu64 " invar %u", + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_tfiles), + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_ffiles), + EXTRACT_64BITS((const uint32_t *)&sfsp->sf_afiles), + EXTRACT_32BITS(&sfsp->sf_invarsec))); + } + } else { + ND_PRINT((ndo, " tsize %d bsize %d blocks %d bfree %d bavail %d", + EXTRACT_32BITS(&sfsp->sf_tsize), + EXTRACT_32BITS(&sfsp->sf_bsize), + EXTRACT_32BITS(&sfsp->sf_blocks), + EXTRACT_32BITS(&sfsp->sf_bfree), + EXTRACT_32BITS(&sfsp->sf_bavail))); } return (1); @@ -707,163 +1213,496 @@ trunc: } static int -parserddires(const u_int32_t *dp) +parserddires(netdissect_options *ndo, + const uint32_t *dp) { - dp = parsestatus(dp); + int er; + + dp = parsestatus(ndo, dp, &er); if (dp == NULL) return (0); - if (!qflag) { - TCHECK(dp[0]); - printf(" offset %x", (u_int32_t)ntohl(dp[0])); - TCHECK(dp[1]); - printf(" size %u", (u_int32_t)ntohl(dp[1])); - TCHECK(dp[2]); - if (dp[2] != 0) - printf(" eof"); + if (er) + return (1); + if (ndo->ndo_qflag) + return (1); + + ND_TCHECK(dp[2]); + ND_PRINT((ndo, " offset 0x%x size %d ", + EXTRACT_32BITS(&dp[0]), EXTRACT_32BITS(&dp[1]))); + if (dp[2] != 0) + ND_PRINT((ndo, " eof")); + + return (1); +trunc: + return (0); +} + +static const uint32_t * +parse_wcc_attr(netdissect_options *ndo, + const uint32_t *dp) +{ + ND_PRINT((ndo, " sz %" PRIu64, EXTRACT_64BITS(&dp[0]))); + ND_PRINT((ndo, " mtime %u.%06u ctime %u.%06u", + EXTRACT_32BITS(&dp[2]), EXTRACT_32BITS(&dp[3]), + EXTRACT_32BITS(&dp[4]), EXTRACT_32BITS(&dp[5]))); + return (dp + 6); +} + +/* + * Pre operation attributes. Print only if vflag > 1. + */ +static const uint32_t * +parse_pre_op_attr(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + ND_TCHECK(dp[0]); + if (!EXTRACT_32BITS(&dp[0])) + return (dp + 1); + dp++; + ND_TCHECK2(*dp, 24); + if (verbose > 1) { + return parse_wcc_attr(ndo, dp); + } else { + /* If not verbose enough, just skip over wcc_attr */ + return (dp + 6); + } +trunc: + return (NULL); +} + +/* + * Post operation attributes are printed if vflag >= 1 + */ +static const uint32_t * +parse_post_op_attr(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + ND_TCHECK(dp[0]); + if (!EXTRACT_32BITS(&dp[0])) + return (dp + 1); + dp++; + if (verbose) { + return parsefattr(ndo, dp, verbose, 1); + } else + return (dp + (NFSX_V3FATTR / sizeof (uint32_t))); +trunc: + return (NULL); +} + +static const uint32_t * +parse_wcc_data(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + if (verbose > 1) + ND_PRINT((ndo, " PRE:")); + if (!(dp = parse_pre_op_attr(ndo, dp, verbose))) + return (0); + + if (verbose) + ND_PRINT((ndo, " POST:")); + return parse_post_op_attr(ndo, dp, verbose); +} + +static const uint32_t * +parsecreateopres(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + int er; + + if (!(dp = parsestatus(ndo, dp, &er))) + return (0); + if (er) + dp = parse_wcc_data(ndo, dp, verbose); + else { + ND_TCHECK(dp[0]); + if (!EXTRACT_32BITS(&dp[0])) + return (dp + 1); + dp++; + if (!(dp = parsefh(ndo, dp, 1))) + return (0); + if (verbose) { + if (!(dp = parse_post_op_attr(ndo, dp, verbose))) + return (0); + if (ndo->ndo_vflag > 1) { + ND_PRINT((ndo, " dir attr:")); + dp = parse_wcc_data(ndo, dp, verbose); + } + } + } + return (dp); +trunc: + return (NULL); +} + +static int +parsewccres(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + int er; + + if (!(dp = parsestatus(ndo, dp, &er))) + return (0); + return parse_wcc_data(ndo, dp, verbose) != 0; +} + +static const uint32_t * +parsev3rddirres(netdissect_options *ndo, + const uint32_t *dp, int verbose) +{ + int er; + + if (!(dp = parsestatus(ndo, dp, &er))) + return (0); + if (ndo->ndo_vflag) + ND_PRINT((ndo, " POST:")); + if (!(dp = parse_post_op_attr(ndo, dp, verbose))) + return (0); + if (er) + return dp; + if (ndo->ndo_vflag) { + ND_TCHECK(dp[1]); + ND_PRINT((ndo, " verf %08x%08x", dp[0], dp[1])); + dp += 2; + } + return dp; +trunc: + return (NULL); +} + +static int +parsefsinfo(netdissect_options *ndo, + const uint32_t *dp) +{ + const struct nfsv3_fsinfo *sfp; + int er; + + if (!(dp = parsestatus(ndo, dp, &er))) + return (0); + if (ndo->ndo_vflag) + ND_PRINT((ndo, " POST:")); + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + return (0); + if (er) + return (1); + + sfp = (const struct nfsv3_fsinfo *)dp; + ND_TCHECK(*sfp); + ND_PRINT((ndo, " rtmax %u rtpref %u wtmax %u wtpref %u dtpref %u", + EXTRACT_32BITS(&sfp->fs_rtmax), + EXTRACT_32BITS(&sfp->fs_rtpref), + EXTRACT_32BITS(&sfp->fs_wtmax), + EXTRACT_32BITS(&sfp->fs_wtpref), + EXTRACT_32BITS(&sfp->fs_dtpref))); + if (ndo->ndo_vflag) { + ND_PRINT((ndo, " rtmult %u wtmult %u maxfsz %" PRIu64, + EXTRACT_32BITS(&sfp->fs_rtmult), + EXTRACT_32BITS(&sfp->fs_wtmult), + EXTRACT_64BITS((const uint32_t *)&sfp->fs_maxfilesize))); + ND_PRINT((ndo, " delta %u.%06u ", + EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_sec), + EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_nsec))); } + return (1); +trunc: + return (0); +} + +static int +parsepathconf(netdissect_options *ndo, + const uint32_t *dp) +{ + int er; + const struct nfsv3_pathconf *spp; + if (!(dp = parsestatus(ndo, dp, &er))) + return (0); + if (ndo->ndo_vflag) + ND_PRINT((ndo, " POST:")); + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + return (0); + if (er) + return (1); + + spp = (const struct nfsv3_pathconf *)dp; + ND_TCHECK(*spp); + + ND_PRINT((ndo, " linkmax %u namemax %u %s %s %s %s", + EXTRACT_32BITS(&spp->pc_linkmax), + EXTRACT_32BITS(&spp->pc_namemax), + EXTRACT_32BITS(&spp->pc_notrunc) ? "notrunc" : "", + EXTRACT_32BITS(&spp->pc_chownrestricted) ? "chownres" : "", + EXTRACT_32BITS(&spp->pc_caseinsensitive) ? "igncase" : "", + EXTRACT_32BITS(&spp->pc_casepreserving) ? "keepcase" : "")); return (1); trunc: return (0); } static void -interp_reply(const struct rpc_msg *rp, u_int32_t proc, u_int length) +interp_reply(netdissect_options *ndo, + const struct sunrpc_msg *rp, uint32_t proc, uint32_t vers, int length) { - register const u_int32_t *dp; + register const uint32_t *dp; + register int v3; + int er; - switch (proc) { + v3 = (vers == NFS_VER3); -#ifdef NFSPROC_NOOP - case NFSPROC_NOOP: - printf(" nop"); - return; -#else -#define NFSPROC_NOOP -1 -#endif - case NFSPROC_NULL: - printf(" null"); - return; + if (!v3 && proc < NFS_NPROCS) + proc = nfsv3_procid[proc]; + + ND_PRINT((ndo, " %s", tok2str(nfsproc_str, "proc-%u", proc))); + switch (proc) { case NFSPROC_GETATTR: - printf(" getattr"); - dp = parserep(rp, length); - if (dp != NULL && parseattrstat(dp, !qflag) != 0) + dp = parserep(ndo, rp, length); + if (dp != NULL && parseattrstat(ndo, dp, !ndo->ndo_qflag, v3) != 0) return; break; case NFSPROC_SETATTR: - printf(" setattr"); - dp = parserep(rp, length); - if (dp != NULL && parseattrstat(dp, !qflag) != 0) + if (!(dp = parserep(ndo, rp, length))) return; + if (v3) { + if (parsewccres(ndo, dp, ndo->ndo_vflag)) + return; + } else { + if (parseattrstat(ndo, dp, !ndo->ndo_qflag, 0) != 0) + return; + } break; -#if NFSPROC_ROOT != NFSPROC_NOOP - case NFSPROC_ROOT: - printf(" root"); - break; -#endif case NFSPROC_LOOKUP: - printf(" lookup"); - dp = parserep(rp, length); - if (dp != NULL && parsediropres(dp) != 0) - return; + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (er) { + if (ndo->ndo_vflag > 1) { + ND_PRINT((ndo, " post dattr:")); + dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag); + } + } else { + if (!(dp = parsefh(ndo, dp, v3))) + break; + if ((dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag)) && + ndo->ndo_vflag > 1) { + ND_PRINT((ndo, " post dattr:")); + dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag); + } + } + if (dp) + return; + } else { + if (parsediropres(ndo, dp) != 0) + return; + } break; + case NFSPROC_ACCESS: + if (!(dp = parserep(ndo, rp, length))) + break; + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (ndo->ndo_vflag) + ND_PRINT((ndo, " attr:")); + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + break; + if (!er) + ND_PRINT((ndo, " c %04x", EXTRACT_32BITS(&dp[0]))); + return; + case NFSPROC_READLINK: - printf(" readlink"); - dp = parserep(rp, length); - if (dp != NULL && parselinkres(dp) != 0) + dp = parserep(ndo, rp, length); + if (dp != NULL && parselinkres(ndo, dp, v3) != 0) return; break; case NFSPROC_READ: - printf(" read"); - dp = parserep(rp, length); - if (dp != NULL && parseattrstat(dp, vflag) != 0) + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + break; + if (er) + return; + if (ndo->ndo_vflag) { + ND_TCHECK(dp[1]); + ND_PRINT((ndo, " %u bytes", EXTRACT_32BITS(&dp[0]))); + if (EXTRACT_32BITS(&dp[1])) + ND_PRINT((ndo, " EOF")); + } return; + } else { + if (parseattrstat(ndo, dp, ndo->ndo_vflag, 0) != 0) + return; + } break; -#if NFSPROC_WRITECACHE != NFSPROC_NOOP - case NFSPROC_WRITECACHE: - printf(" writecache"); - break; -#endif case NFSPROC_WRITE: - printf(" write"); - dp = parserep(rp, length); - if (dp != NULL && parseattrstat(dp, vflag) != 0) - return; + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (!(dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag))) + break; + if (er) + return; + if (ndo->ndo_vflag) { + ND_TCHECK(dp[0]); + ND_PRINT((ndo, " %u bytes", EXTRACT_32BITS(&dp[0]))); + if (ndo->ndo_vflag > 1) { + ND_TCHECK(dp[1]); + ND_PRINT((ndo, " <%s>", + tok2str(nfsv3_writemodes, + NULL, EXTRACT_32BITS(&dp[1])))); + } + return; + } + } else { + if (parseattrstat(ndo, dp, ndo->ndo_vflag, v3) != 0) + return; + } break; case NFSPROC_CREATE: - printf(" create"); - dp = parserep(rp, length); - if (dp != NULL && parsediropres(dp) != 0) + case NFSPROC_MKDIR: + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (parsecreateopres(ndo, dp, ndo->ndo_vflag) != 0) + return; + } else { + if (parsediropres(ndo, dp) != 0) + return; + } + break; + + case NFSPROC_SYMLINK: + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (parsecreateopres(ndo, dp, ndo->ndo_vflag) != 0) + return; + } else { + if (parsestatus(ndo, dp, &er) != 0) + return; + } + break; + + case NFSPROC_MKNOD: + if (!(dp = parserep(ndo, rp, length))) + break; + if (parsecreateopres(ndo, dp, ndo->ndo_vflag) != 0) return; break; case NFSPROC_REMOVE: - printf(" remove"); - dp = parserep(rp, length); - if (dp != NULL && parsestatus(dp) != 0) - return; + case NFSPROC_RMDIR: + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (parsewccres(ndo, dp, ndo->ndo_vflag)) + return; + } else { + if (parsestatus(ndo, dp, &er) != 0) + return; + } break; case NFSPROC_RENAME: - printf(" rename"); - dp = parserep(rp, length); - if (dp != NULL && parsestatus(dp) != 0) + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (ndo->ndo_vflag) { + ND_PRINT((ndo, " from:")); + if (!(dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag))) + break; + ND_PRINT((ndo, " to:")); + if (!(dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag))) + break; + } return; + } else { + if (parsestatus(ndo, dp, &er) != 0) + return; + } break; case NFSPROC_LINK: - printf(" link"); - dp = parserep(rp, length); - if (dp != NULL && parsestatus(dp) != 0) - return; + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (!(dp = parsestatus(ndo, dp, &er))) + break; + if (ndo->ndo_vflag) { + ND_PRINT((ndo, " file POST:")); + if (!(dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag))) + break; + ND_PRINT((ndo, " dir:")); + if (!(dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag))) + break; + return; + } + } else { + if (parsestatus(ndo, dp, &er) != 0) + return; + } break; - case NFSPROC_SYMLINK: - printf(" symlink"); - dp = parserep(rp, length); - if (dp != NULL && parsestatus(dp) != 0) + case NFSPROC_READDIR: + if (!(dp = parserep(ndo, rp, length))) + break; + if (v3) { + if (parsev3rddirres(ndo, dp, ndo->ndo_vflag)) + return; + } else { + if (parserddires(ndo, dp) != 0) + return; + } + break; + + case NFSPROC_READDIRPLUS: + if (!(dp = parserep(ndo, rp, length))) + break; + if (parsev3rddirres(ndo, dp, ndo->ndo_vflag)) return; break; - case NFSPROC_MKDIR: - printf(" mkdir"); - dp = parserep(rp, length); - if (dp != NULL && parsediropres(dp) != 0) + case NFSPROC_FSSTAT: + dp = parserep(ndo, rp, length); + if (dp != NULL && parsestatfs(ndo, dp, v3) != 0) return; break; - case NFSPROC_RMDIR: - printf(" rmdir"); - dp = parserep(rp, length); - if (dp != NULL && parsestatus(dp) != 0) + case NFSPROC_FSINFO: + dp = parserep(ndo, rp, length); + if (dp != NULL && parsefsinfo(ndo, dp) != 0) return; break; - case NFSPROC_READDIR: - printf(" readdir"); - dp = parserep(rp, length); - if (dp != NULL && parserddires(dp) != 0) + case NFSPROC_PATHCONF: + dp = parserep(ndo, rp, length); + if (dp != NULL && parsepathconf(ndo, dp) != 0) return; break; - case NFSPROC_STATFS: - printf(" statfs"); - dp = parserep(rp, length); - if (dp != NULL && parsestatfs(dp) != 0) + case NFSPROC_COMMIT: + dp = parserep(ndo, rp, length); + if (dp != NULL && parsewccres(ndo, dp, ndo->ndo_vflag) != 0) return; break; default: - printf(" proc-%u", proc); return; } +trunc: if (!nfserr) - fputs(" [|nfs]", stdout); + ND_PRINT((ndo, "%s", tstr)); }