tcpdump/print-nfs.c
Guy Harris 3eec801c5a Reorganize the dissection code a bit.
Get rid of the global nfserr variable and, instead, have it be local to
interp_reply().  That means one less global variable, which may be good
if any multi-threaded program tries to use libnetdissect in more than
one thread (there are still global variables that would have to be
removed), and gets rid of some cases where we didn't need to set it.

Don't bundle multiple operations inside an if clause.  This squelches
some warnings from MSVC, and makes the code a bit more uniform and a bit
easier to understand (and, in the process of doing that, found a bug
that was fixed in 596aca3d93).
2018-09-18 00:07:24 -07:00

1908 lines
46 KiB
C

/*
* Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code distributions
* retain the above copyright notice and this paragraph in its entirety, (2)
* distributions including binary code include the above copyright notice and
* this paragraph in its entirety in the documentation or other materials
* provided with the distribution, and (3) all advertising materials mentioning
* features or use of this software display the following acknowledgement:
* ``This product includes software developed by the University of California,
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
* the University nor the names of its contributors may be used to endorse
* or promote products derived from this software without specific prior
* written permission.
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*/
/* \summary: Network File System (NFS) printer */
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include "netdissect-stdinc.h"
#include <stdio.h>
#include <string.h>
#include "netdissect.h"
#include "addrtoname.h"
#include "extract.h"
#include "nfs.h"
#include "nfsfh.h"
#include "ip.h"
#include "ip6.h"
#include "rpc_auth.h"
#include "rpc_msg.h"
static void nfs_printfh(netdissect_options *, const uint32_t *, const u_int);
static int xid_map_enter(netdissect_options *, const struct sunrpc_msg *, const u_char *);
static int xid_map_find(const struct sunrpc_msg *, const u_char *,
uint32_t *, uint32_t *);
static void interp_reply(netdissect_options *, const struct sunrpc_msg *, uint32_t, uint32_t, int);
static const uint32_t *parse_post_op_attr(netdissect_options *, const uint32_t *, int);
/*
* Mapping of old NFS Version 2 RPC numbers to generic numbers.
*/
static uint32_t nfsv3_procid[NFS_NPROCS] = {
NFSPROC_NULL,
NFSPROC_GETATTR,
NFSPROC_SETATTR,
NFSPROC_NOOP,
NFSPROC_LOOKUP,
NFSPROC_READLINK,
NFSPROC_READ,
NFSPROC_NOOP,
NFSPROC_WRITE,
NFSPROC_CREATE,
NFSPROC_REMOVE,
NFSPROC_RENAME,
NFSPROC_LINK,
NFSPROC_SYMLINK,
NFSPROC_MKDIR,
NFSPROC_RMDIR,
NFSPROC_READDIR,
NFSPROC_FSSTAT,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP,
NFSPROC_NOOP
};
static const struct tok nfsproc_str[] = {
{ NFSPROC_NOOP, "nop" },
{ NFSPROC_NULL, "null" },
{ NFSPROC_GETATTR, "getattr" },
{ NFSPROC_SETATTR, "setattr" },
{ NFSPROC_LOOKUP, "lookup" },
{ NFSPROC_ACCESS, "access" },
{ NFSPROC_READLINK, "readlink" },
{ NFSPROC_READ, "read" },
{ NFSPROC_WRITE, "write" },
{ NFSPROC_CREATE, "create" },
{ NFSPROC_MKDIR, "mkdir" },
{ NFSPROC_SYMLINK, "symlink" },
{ NFSPROC_MKNOD, "mknod" },
{ NFSPROC_REMOVE, "remove" },
{ NFSPROC_RMDIR, "rmdir" },
{ NFSPROC_RENAME, "rename" },
{ NFSPROC_LINK, "link" },
{ NFSPROC_READDIR, "readdir" },
{ NFSPROC_READDIRPLUS, "readdirplus" },
{ NFSPROC_FSSTAT, "fsstat" },
{ NFSPROC_FSINFO, "fsinfo" },
{ NFSPROC_PATHCONF, "pathconf" },
{ NFSPROC_COMMIT, "commit" },
{ 0, NULL }
};
/*
* NFS V2 and V3 status values.
*
* Some of these come from the RFCs for NFS V2 and V3, with the message
* strings taken from the FreeBSD C library "errlst.c".
*
* Others are errors that are not in the RFC but that I suspect some
* NFS servers could return; the values are FreeBSD errno values, as
* the first NFS server was the SunOS 2.0 one, and until 5.0 SunOS
* was primarily BSD-derived.
*/
static const struct tok status2str[] = {
{ 1, "Operation not permitted" }, /* EPERM */
{ 2, "No such file or directory" }, /* ENOENT */
{ 5, "Input/output error" }, /* EIO */
{ 6, "Device not configured" }, /* ENXIO */
{ 11, "Resource deadlock avoided" }, /* EDEADLK */
{ 12, "Cannot allocate memory" }, /* ENOMEM */
{ 13, "Permission denied" }, /* EACCES */
{ 17, "File exists" }, /* EEXIST */
{ 18, "Cross-device link" }, /* EXDEV */
{ 19, "Operation not supported by device" }, /* ENODEV */
{ 20, "Not a directory" }, /* ENOTDIR */
{ 21, "Is a directory" }, /* EISDIR */
{ 22, "Invalid argument" }, /* EINVAL */
{ 26, "Text file busy" }, /* ETXTBSY */
{ 27, "File too large" }, /* EFBIG */
{ 28, "No space left on device" }, /* ENOSPC */
{ 30, "Read-only file system" }, /* EROFS */
{ 31, "Too many links" }, /* EMLINK */
{ 45, "Operation not supported" }, /* EOPNOTSUPP */
{ 62, "Too many levels of symbolic links" }, /* ELOOP */
{ 63, "File name too long" }, /* ENAMETOOLONG */
{ 66, "Directory not empty" }, /* ENOTEMPTY */
{ 69, "Disc quota exceeded" }, /* EDQUOT */
{ 70, "Stale NFS file handle" }, /* ESTALE */
{ 71, "Too many levels of remote in path" }, /* EREMOTE */
{ 99, "Write cache flushed to disk" }, /* NFSERR_WFLUSH (not used) */
{ 10001, "Illegal NFS file handle" }, /* NFS3ERR_BADHANDLE */
{ 10002, "Update synchronization mismatch" }, /* NFS3ERR_NOT_SYNC */
{ 10003, "READDIR/READDIRPLUS cookie is stale" }, /* NFS3ERR_BAD_COOKIE */
{ 10004, "Operation not supported" }, /* NFS3ERR_NOTSUPP */
{ 10005, "Buffer or request is too small" }, /* NFS3ERR_TOOSMALL */
{ 10006, "Unspecified error on server" }, /* NFS3ERR_SERVERFAULT */
{ 10007, "Object of that type not supported" }, /* NFS3ERR_BADTYPE */
{ 10008, "Request couldn't be completed in time" }, /* NFS3ERR_JUKEBOX */
{ 0, NULL }
};
static const struct tok nfsv3_writemodes[] = {
{ 0, "unstable" },
{ 1, "datasync" },
{ 2, "filesync" },
{ 0, NULL }
};
static const struct tok type2str[] = {
{ NFNON, "NON" },
{ NFREG, "REG" },
{ NFDIR, "DIR" },
{ NFBLK, "BLK" },
{ NFCHR, "CHR" },
{ NFLNK, "LNK" },
{ NFFIFO, "FIFO" },
{ 0, NULL }
};
static const struct tok sunrpc_auth_str[] = {
{ SUNRPC_AUTH_OK, "OK" },
{ SUNRPC_AUTH_BADCRED, "Bogus Credentials (seal broken)" },
{ SUNRPC_AUTH_REJECTEDCRED, "Rejected Credentials (client should begin new session)" },
{ SUNRPC_AUTH_BADVERF, "Bogus Verifier (seal broken)" },
{ SUNRPC_AUTH_REJECTEDVERF, "Verifier expired or was replayed" },
{ SUNRPC_AUTH_TOOWEAK, "Credentials are too weak" },
{ SUNRPC_AUTH_INVALIDRESP, "Bogus response verifier" },
{ SUNRPC_AUTH_FAILED, "Unknown failure" },
{ 0, NULL }
};
static const struct tok sunrpc_str[] = {
{ SUNRPC_PROG_UNAVAIL, "PROG_UNAVAIL" },
{ SUNRPC_PROG_MISMATCH, "PROG_MISMATCH" },
{ SUNRPC_PROC_UNAVAIL, "PROC_UNAVAIL" },
{ SUNRPC_GARBAGE_ARGS, "GARBAGE_ARGS" },
{ SUNRPC_SYSTEM_ERR, "SYSTEM_ERR" },
{ 0, NULL }
};
static void
print_nfsaddr(netdissect_options *ndo,
const u_char *bp, const char *s, const char *d)
{
const struct ip *ip;
const struct ip6_hdr *ip6;
char srcaddr[INET6_ADDRSTRLEN], dstaddr[INET6_ADDRSTRLEN];
srcaddr[0] = dstaddr[0] = '\0';
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip *)bp;
strlcpy(srcaddr, ipaddr_string(ndo, ip->ip_src), sizeof(srcaddr));
strlcpy(dstaddr, ipaddr_string(ndo, ip->ip_dst), sizeof(dstaddr));
break;
case 6:
ip6 = (const struct ip6_hdr *)bp;
strlcpy(srcaddr, ip6addr_string(ndo, ip6->ip6_src),
sizeof(srcaddr));
strlcpy(dstaddr, ip6addr_string(ndo, ip6->ip6_dst),
sizeof(dstaddr));
break;
default:
strlcpy(srcaddr, "?", sizeof(srcaddr));
strlcpy(dstaddr, "?", sizeof(dstaddr));
break;
}
ND_PRINT("%s.%s > %s.%s: ", srcaddr, s, dstaddr, d);
}
/*
* NFS Version 3 sattr3 structure for the new node creation case.
* This does not have a fixed layout on the network, so this
* structure does not correspond to the layout of the data on
* the network; it's used to store the data when the sattr3
* is parsed for use when it's later printed.
*/
struct nfsv3_sattr {
uint32_t sa_modeset;
uint32_t sa_mode;
uint32_t sa_uidset;
uint32_t sa_uid;
uint32_t sa_gidset;
uint32_t sa_gid;
uint32_t sa_sizeset;
uint32_t sa_size;
uint32_t sa_atimetype;
struct {
uint32_t nfsv3_sec;
uint32_t nfsv3_nsec;
} sa_atime;
uint32_t sa_mtimetype;
struct {
uint32_t nfsv3_sec;
uint32_t nfsv3_nsec;
} sa_mtime;
};
static const uint32_t *
parse_sattr3(netdissect_options *ndo,
const uint32_t *dp, struct nfsv3_sattr *sa3)
{
ND_TCHECK_4(dp);
sa3->sa_modeset = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_modeset) {
ND_TCHECK_4(dp);
sa3->sa_mode = EXTRACT_BE_U_4(dp);
dp++;
}
ND_TCHECK_4(dp);
sa3->sa_uidset = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_uidset) {
ND_TCHECK_4(dp);
sa3->sa_uid = EXTRACT_BE_U_4(dp);
dp++;
}
ND_TCHECK_4(dp);
sa3->sa_gidset = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_gidset) {
ND_TCHECK_4(dp);
sa3->sa_gid = EXTRACT_BE_U_4(dp);
dp++;
}
ND_TCHECK_4(dp);
sa3->sa_sizeset = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_sizeset) {
ND_TCHECK_4(dp);
sa3->sa_size = EXTRACT_BE_U_4(dp);
dp++;
}
ND_TCHECK_4(dp);
sa3->sa_atimetype = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) {
ND_TCHECK_4(dp + 1);
sa3->sa_atime.nfsv3_sec = EXTRACT_BE_U_4(dp);
dp++;
sa3->sa_atime.nfsv3_nsec = EXTRACT_BE_U_4(dp);
dp++;
}
ND_TCHECK_4(dp);
sa3->sa_mtimetype = EXTRACT_BE_U_4(dp);
dp++;
if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) {
ND_TCHECK_4(dp + 1);
sa3->sa_mtime.nfsv3_sec = EXTRACT_BE_U_4(dp);
dp++;
sa3->sa_mtime.nfsv3_nsec = EXTRACT_BE_U_4(dp);
dp++;
}
return dp;
trunc:
return NULL;
}
static void
print_sattr3(netdissect_options *ndo,
const struct nfsv3_sattr *sa3, int verbose)
{
if (sa3->sa_modeset)
ND_PRINT(" mode %o", sa3->sa_mode);
if (sa3->sa_uidset)
ND_PRINT(" uid %u", sa3->sa_uid);
if (sa3->sa_gidset)
ND_PRINT(" gid %u", sa3->sa_gid);
if (verbose > 1) {
if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT)
ND_PRINT(" atime %u.%06u", sa3->sa_atime.nfsv3_sec,
sa3->sa_atime.nfsv3_nsec);
if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT)
ND_PRINT(" mtime %u.%06u", sa3->sa_mtime.nfsv3_sec,
sa3->sa_mtime.nfsv3_nsec);
}
}
void
nfsreply_print(netdissect_options *ndo,
const u_char *bp, u_int length,
const u_char *bp2)
{
const struct sunrpc_msg *rp;
char srcid[20], dstid[20]; /*fits 32bit*/
ndo->ndo_protocol = "nfs";
rp = (const struct sunrpc_msg *)bp;
ND_TCHECK_4(rp->rm_xid);
if (!ndo->ndo_nflag) {
strlcpy(srcid, "nfs", sizeof(srcid));
nd_snprintf(dstid, sizeof(dstid), "%u",
EXTRACT_BE_U_4(rp->rm_xid));
} else {
nd_snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
nd_snprintf(dstid, sizeof(dstid), "%u",
EXTRACT_BE_U_4(rp->rm_xid));
}
print_nfsaddr(ndo, bp2, srcid, dstid);
nfsreply_noaddr_print(ndo, bp, length, bp2);
return;
trunc:
nd_print_trunc(ndo);
}
void
nfsreply_noaddr_print(netdissect_options *ndo,
const u_char *bp, u_int length,
const u_char *bp2)
{
const struct sunrpc_msg *rp;
uint32_t proc, vers, reply_stat;
enum sunrpc_reject_stat rstat;
uint32_t rlow;
uint32_t rhigh;
enum sunrpc_auth_stat rwhy;
ndo->ndo_protocol = "nfs";
rp = (const struct sunrpc_msg *)bp;
ND_TCHECK_4(rp->rm_reply.rp_stat);
reply_stat = EXTRACT_BE_U_4(&rp->rm_reply.rp_stat);
switch (reply_stat) {
case SUNRPC_MSG_ACCEPTED:
ND_PRINT("reply ok %u", length);
if (xid_map_find(rp, bp2, &proc, &vers) >= 0)
interp_reply(ndo, rp, proc, vers, length);
break;
case SUNRPC_MSG_DENIED:
ND_PRINT("reply ERR %u: ", length);
ND_TCHECK_4(rp->rm_reply.rp_reject.rj_stat);
rstat = EXTRACT_BE_U_4(&rp->rm_reply.rp_reject.rj_stat);
switch (rstat) {
case SUNRPC_RPC_MISMATCH:
ND_TCHECK_4(rp->rm_reply.rp_reject.rj_vers.high);
rlow = EXTRACT_BE_U_4(&rp->rm_reply.rp_reject.rj_vers.low);
rhigh = EXTRACT_BE_U_4(&rp->rm_reply.rp_reject.rj_vers.high);
ND_PRINT("RPC Version mismatch (%u-%u)", rlow, rhigh);
break;
case SUNRPC_AUTH_ERROR:
ND_TCHECK_4(rp->rm_reply.rp_reject.rj_why);
rwhy = EXTRACT_BE_U_4(&rp->rm_reply.rp_reject.rj_why);
ND_PRINT("Auth %s", tok2str(sunrpc_auth_str, "Invalid failure code %u", rwhy));
break;
default:
ND_PRINT("Unknown reason for rejecting rpc message %u", (unsigned int)rstat);
break;
}
break;
default:
ND_PRINT("reply Unknown rpc response code=%u %u", reply_stat, length);
break;
}
return;
trunc:
nd_print_trunc(ndo);
}
/*
* Return a pointer to the first file handle in the packet.
* If the packet was truncated, return 0.
*/
static const uint32_t *
parsereq(netdissect_options *ndo,
const struct sunrpc_msg *rp, u_int length)
{
const uint32_t *dp;
u_int len, rounded_len;
/*
* Find the start of the req data (if we captured it).
* First, get the length of the credentials, and make sure
* we have all of the opaque part of the credentials.
*/
dp = (const uint32_t *)&rp->rm_call.cb_cred;
if (length < 2 * sizeof(*dp))
goto trunc;
ND_TCHECK_4(dp + 1);
len = EXTRACT_BE_U_4(dp + 1);
rounded_len = roundup2(len, 4);
ND_TCHECK_LEN(dp + 2, rounded_len);
if (2 * sizeof(*dp) + rounded_len <= length) {
/*
* We have all of the credentials. Skip past them; they
* consist of 4 bytes of flavor, 4 bytes of length,
* and len-rounded-up-to-a-multiple-of-4 bytes of
* data.
*/
dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
length -= 2 * sizeof(*dp) + rounded_len;
/*
* Now get the length of the verifier, and make sure
* we have all of the opaque part of the verifier.
*/
if (length < 2 * sizeof(*dp))
goto trunc;
ND_TCHECK_4(dp + 1);
len = EXTRACT_BE_U_4(dp + 1);
rounded_len = roundup2(len, 4);
ND_TCHECK_LEN(dp + 2, rounded_len);
if (2 * sizeof(*dp) + rounded_len < length) {
/*
* We have all of the verifier. Skip past it;
* it consists of 4 bytes of flavor, 4 bytes of
* length, and len-rounded-up-to-a-multiple-of-4
* bytes of data.
*/
dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
return (dp);
}
}
trunc:
return (NULL);
}
/*
* Print out an NFS file handle and return a pointer to following word.
* If packet was truncated, return 0.
*/
static const uint32_t *
parsefh(netdissect_options *ndo,
const uint32_t *dp, int v3)
{
u_int len;
if (v3) {
ND_TCHECK_4(dp);
len = EXTRACT_BE_U_4(dp) / 4;
dp++;
} else
len = NFSX_V2FH / 4;
if (ND_TTEST_LEN(dp, len * sizeof(*dp))) {
nfs_printfh(ndo, dp, len);
return (dp + len);
}
trunc:
return (NULL);
}
/*
* Print out a file name and return pointer to 32-bit word past it.
* If packet was truncated, return 0.
*/
static const uint32_t *
parsefn(netdissect_options *ndo,
const uint32_t *dp)
{
uint32_t len;
const u_char *cp;
/* Bail if we don't have the string length */
ND_TCHECK_4(dp);
/* Fetch big-endian string length */
len = EXTRACT_BE_U_4(dp);
dp++;
ND_TCHECK_LEN(dp, ((len + 3) & ~3));
cp = (const u_char *)dp;
/* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */
dp += ((len + 3) & ~3) / sizeof(*dp);
ND_PRINT("\"");
if (nd_printn(ndo, cp, len, ndo->ndo_snapend)) {
ND_PRINT("\"");
goto trunc;
}
ND_PRINT("\"");
return (dp);
trunc:
return NULL;
}
/*
* Print out file handle and file name.
* Return pointer to 32-bit word past file name.
* If packet was truncated (or there was some other error), return 0.
*/
static const uint32_t *
parsefhn(netdissect_options *ndo,
const uint32_t *dp, int v3)
{
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
return (NULL);
ND_PRINT(" ");
return (parsefn(ndo, dp));
}
void
nfsreq_noaddr_print(netdissect_options *ndo,
const u_char *bp, u_int length,
const u_char *bp2)
{
const struct sunrpc_msg *rp;
const uint32_t *dp;
nfs_type type;
int v3;
uint32_t proc;
uint32_t access_flags;
struct nfsv3_sattr sa3;
ndo->ndo_protocol = "nfs";
ND_PRINT("%u", length);
rp = (const struct sunrpc_msg *)bp;
if (!xid_map_enter(ndo, rp, bp2)) /* record proc number for later on */
goto trunc;
v3 = (EXTRACT_BE_U_4(&rp->rm_call.cb_vers) == NFS_VER3);
proc = EXTRACT_BE_U_4(&rp->rm_call.cb_proc);
if (!v3 && proc < NFS_NPROCS)
proc = nfsv3_procid[proc];
ND_PRINT(" %s", tok2str(nfsproc_str, "proc-%u", proc));
switch (proc) {
case NFSPROC_GETATTR:
case NFSPROC_SETATTR:
case NFSPROC_READLINK:
case NFSPROC_FSSTAT:
case NFSPROC_FSINFO:
case NFSPROC_PATHCONF:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
if (parsefh(ndo, dp, v3) == NULL)
goto trunc;
break;
case NFSPROC_LOOKUP:
case NFSPROC_CREATE:
case NFSPROC_MKDIR:
case NFSPROC_REMOVE:
case NFSPROC_RMDIR:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
if (parsefhn(ndo, dp, v3) == NULL)
goto trunc;
break;
case NFSPROC_ACCESS:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_TCHECK_4(dp);
access_flags = EXTRACT_BE_U_4(dp);
if (access_flags & ~NFSV3ACCESS_FULL) {
/* NFSV3ACCESS definitions aren't up to date */
ND_PRINT(" %04x", access_flags);
} else if ((access_flags & NFSV3ACCESS_FULL) == NFSV3ACCESS_FULL) {
ND_PRINT(" NFS_ACCESS_FULL");
} else {
char separator = ' ';
if (access_flags & NFSV3ACCESS_READ) {
ND_PRINT(" NFS_ACCESS_READ");
separator = '|';
}
if (access_flags & NFSV3ACCESS_LOOKUP) {
ND_PRINT("%cNFS_ACCESS_LOOKUP", separator);
separator = '|';
}
if (access_flags & NFSV3ACCESS_MODIFY) {
ND_PRINT("%cNFS_ACCESS_MODIFY", separator);
separator = '|';
}
if (access_flags & NFSV3ACCESS_EXTEND) {
ND_PRINT("%cNFS_ACCESS_EXTEND", separator);
separator = '|';
}
if (access_flags & NFSV3ACCESS_DELETE) {
ND_PRINT("%cNFS_ACCESS_DELETE", separator);
separator = '|';
}
if (access_flags & NFSV3ACCESS_EXECUTE)
ND_PRINT("%cNFS_ACCESS_EXECUTE", separator);
}
break;
case NFSPROC_READ:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
if (v3) {
ND_TCHECK_4(dp + 2);
ND_PRINT(" %u bytes @ %" PRIu64,
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_8(dp));
} else {
ND_TCHECK_4(dp + 1);
ND_PRINT(" %u bytes @ %u",
EXTRACT_BE_U_4(dp + 1),
EXTRACT_BE_U_4(dp));
}
break;
case NFSPROC_WRITE:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
if (v3) {
ND_TCHECK_4(dp + 4);
ND_PRINT(" %u (%u) bytes @ %" PRIu64,
EXTRACT_BE_U_4(dp + 4),
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_8(dp));
if (ndo->ndo_vflag) {
ND_PRINT(" <%s>",
tok2str(nfsv3_writemodes,
NULL, EXTRACT_BE_U_4(dp + 3)));
}
} else {
ND_TCHECK_4(dp + 3);
ND_PRINT(" %u (%u) bytes @ %u (%u)",
EXTRACT_BE_U_4(dp + 3),
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_4(dp + 1),
EXTRACT_BE_U_4(dp));
}
break;
case NFSPROC_SYMLINK:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefhn(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_PRINT(" ->");
if (v3 && (dp = parse_sattr3(ndo, dp, &sa3)) == NULL)
goto trunc;
if (parsefn(ndo, dp) == NULL)
goto trunc;
if (v3 && ndo->ndo_vflag)
print_sattr3(ndo, &sa3, ndo->ndo_vflag);
break;
case NFSPROC_MKNOD:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefhn(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_TCHECK_4(dp);
type = (nfs_type) EXTRACT_BE_U_4(dp);
dp++;
dp = parse_sattr3(ndo, dp, &sa3);
if (dp == NULL)
goto trunc;
ND_PRINT(" %s", tok2str(type2str, "unk-ft %u", type));
if (ndo->ndo_vflag && (type == NFCHR || type == NFBLK)) {
ND_TCHECK_4(dp + 1);
ND_PRINT(" %u/%u",
EXTRACT_BE_U_4(dp),
EXTRACT_BE_U_4(dp + 1));
dp += 2;
}
if (ndo->ndo_vflag)
print_sattr3(ndo, &sa3, ndo->ndo_vflag);
break;
case NFSPROC_RENAME:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefhn(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_PRINT(" ->");
if (parsefhn(ndo, dp, v3) == NULL)
goto trunc;
break;
case NFSPROC_LINK:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_PRINT(" ->");
if (parsefhn(ndo, dp, v3) == NULL)
goto trunc;
break;
case NFSPROC_READDIR:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
if (v3) {
ND_TCHECK_4(dp + 4);
/*
* We shouldn't really try to interpret the
* offset cookie here.
*/
ND_PRINT(" %u bytes @ %" PRId64,
EXTRACT_BE_U_4(dp + 4),
EXTRACT_BE_U_8(dp));
if (ndo->ndo_vflag) {
/*
* This displays the 8 bytes
* of the verifier in order,
* from the low-order byte
* to the high-order byte.
*/
ND_PRINT(" verf %08x%08x",
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_4(dp + 3));
}
} else {
ND_TCHECK_4(dp + 1);
/*
* Print the offset as signed, since -1 is
* common, but offsets > 2^31 aren't.
*/
ND_PRINT(" %u bytes @ %u",
EXTRACT_BE_U_4(dp + 1),
EXTRACT_BE_U_4(dp));
}
break;
case NFSPROC_READDIRPLUS:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_TCHECK_4(dp + 4);
/*
* We don't try to interpret the offset
* cookie here.
*/
ND_PRINT(" %u bytes @ %" PRId64,
EXTRACT_BE_U_4(dp + 4),
EXTRACT_BE_U_8(dp));
if (ndo->ndo_vflag) {
ND_TCHECK_4(dp + 5);
/*
* This displays the 8 bytes
* of the verifier in order,
* from the low-order byte
* to the high-order byte.
*/
ND_PRINT(" max %u verf %08x%08x",
EXTRACT_BE_U_4(dp + 5),
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_4(dp + 3));
}
break;
case NFSPROC_COMMIT:
dp = parsereq(ndo, rp, length);
if (dp == NULL)
goto trunc;
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
ND_TCHECK_4(dp + 2);
ND_PRINT(" %u bytes @ %" PRIu64,
EXTRACT_BE_U_4(dp + 2),
EXTRACT_BE_U_8(dp));
break;
default:
break;
}
return;
trunc:
nd_print_trunc(ndo);
}
/*
* Print out an NFS file handle.
* We assume packet was not truncated before the end of the
* file handle pointed to by dp.
*
* Note: new version (using portable file-handle parser) doesn't produce
* generation number. It probably could be made to do that, with some
* additional hacking on the parser code.
*/
static void
nfs_printfh(netdissect_options *ndo,
const uint32_t *dp, const u_int len)
{
my_fsid fsid;
uint32_t ino;
const char *sfsname = NULL;
char *spacep;
if (ndo->ndo_uflag) {
u_int i;
char const *sep = "";
ND_PRINT(" fh[");
for (i=0; i<len; i++) {
/*
* This displays 4 bytes in big-endian byte
* order. That's as good a choice as little-
* endian, as there's no guarantee that the
* server is big-endian or little-endian or
* that the file handle contains 4-byte
* integral fields, and is better than "the
* byte order of the host running tcpdump", as
* the latter means that different hosts
* running tcpdump may show the same file
* handle in different ways.
*/
ND_PRINT("%s%x", sep, EXTRACT_BE_U_4(dp + i));
sep = ":";
}
ND_PRINT("]");
return;
}
Parse_fh((const u_char *)dp, len, &fsid, &ino, NULL, &sfsname, 0);
if (sfsname) {
/* file system ID is ASCII, not numeric, for this server OS */
char temp[NFSX_V3FHMAX+1];
u_int stringlen;
/* Make sure string is null-terminated */
stringlen = len;
if (stringlen > NFSX_V3FHMAX)
stringlen = NFSX_V3FHMAX;
strncpy(temp, sfsname, stringlen);
temp[stringlen] = '\0';
/* Remove trailing spaces */
spacep = strchr(temp, ' ');
if (spacep)
*spacep = '\0';
ND_PRINT(" fh %s/", temp);
} else {
ND_PRINT(" fh %u,%u/",
fsid.Fsid_dev.Major, fsid.Fsid_dev.Minor);
}
if(fsid.Fsid_dev.Minor == 257)
/* Print the undecoded handle */
ND_PRINT("%s", fsid.Opaque_Handle);
else
ND_PRINT("%ld", (long) ino);
}
/*
* Maintain a small cache of recent client.XID.server/proc pairs, to allow
* us to match up replies with requests and thus to know how to parse
* the reply.
*/
struct xid_map_entry {
uint32_t xid; /* transaction ID (net order) */
int ipver; /* IP version (4 or 6) */
struct in6_addr client; /* client IP address (net order) */
struct in6_addr server; /* server IP address (net order) */
uint32_t proc; /* call proc number (host order) */
uint32_t vers; /* program version (host order) */
};
/*
* Map entries are kept in an array that we manage as a ring;
* new entries are always added at the tail of the ring. Initially,
* all the entries are zero and hence don't match anything.
*/
#define XIDMAPSIZE 64
static struct xid_map_entry xid_map[XIDMAPSIZE];
static int xid_map_next = 0;
static int xid_map_hint = 0;
static int
xid_map_enter(netdissect_options *ndo,
const struct sunrpc_msg *rp, const u_char *bp)
{
const struct ip *ip = NULL;
const struct ip6_hdr *ip6 = NULL;
struct xid_map_entry *xmep;
if (!ND_TTEST_4(rp->rm_call.cb_proc))
return (0);
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip *)bp;
break;
case 6:
ip6 = (const struct ip6_hdr *)bp;
break;
default:
return (1);
}
xmep = &xid_map[xid_map_next];
if (++xid_map_next >= XIDMAPSIZE)
xid_map_next = 0;
UNALIGNED_MEMCPY(&xmep->xid, &rp->rm_xid, sizeof(xmep->xid));
if (ip) {
xmep->ipver = 4;
UNALIGNED_MEMCPY(&xmep->client, ip->ip_src,
sizeof(ip->ip_src));
UNALIGNED_MEMCPY(&xmep->server, ip->ip_dst,
sizeof(ip->ip_dst));
}
else if (ip6) {
xmep->ipver = 6;
UNALIGNED_MEMCPY(&xmep->client, ip6->ip6_src,
sizeof(ip6->ip6_src));
UNALIGNED_MEMCPY(&xmep->server, ip6->ip6_dst,
sizeof(ip6->ip6_dst));
}
xmep->proc = EXTRACT_BE_U_4(&rp->rm_call.cb_proc);
xmep->vers = EXTRACT_BE_U_4(&rp->rm_call.cb_vers);
return (1);
}
/*
* Returns 0 and puts NFSPROC_xxx in proc return and
* version in vers return, or returns -1 on failure
*/
static int
xid_map_find(const struct sunrpc_msg *rp, const u_char *bp, uint32_t *proc,
uint32_t *vers)
{
int i;
struct xid_map_entry *xmep;
uint32_t xid;
const struct ip *ip = (const struct ip *)bp;
const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp;
int cmp;
UNALIGNED_MEMCPY(&xid, &rp->rm_xid, sizeof(xmep->xid));
/* Start searching from where we last left off */
i = xid_map_hint;
do {
xmep = &xid_map[i];
cmp = 1;
if (xmep->ipver != IP_V(ip) || xmep->xid != xid)
goto nextitem;
switch (xmep->ipver) {
case 4:
if (UNALIGNED_MEMCMP(ip->ip_src, &xmep->server,
sizeof(ip->ip_src)) != 0 ||
UNALIGNED_MEMCMP(ip->ip_dst, &xmep->client,
sizeof(ip->ip_dst)) != 0) {
cmp = 0;
}
break;
case 6:
if (UNALIGNED_MEMCMP(ip6->ip6_src, &xmep->server,
sizeof(ip6->ip6_src)) != 0 ||
UNALIGNED_MEMCMP(ip6->ip6_dst, &xmep->client,
sizeof(ip6->ip6_dst)) != 0) {
cmp = 0;
}
break;
default:
cmp = 0;
break;
}
if (cmp) {
/* match */
xid_map_hint = i;
*proc = xmep->proc;
*vers = xmep->vers;
return 0;
}
nextitem:
if (++i >= XIDMAPSIZE)
i = 0;
} while (i != xid_map_hint);
/* search failed */
return (-1);
}
/*
* Routines for parsing reply packets
*/
/*
* Return a pointer to the beginning of the actual results.
* If the packet was truncated, return 0.
*/
static const uint32_t *
parserep(netdissect_options *ndo,
const struct sunrpc_msg *rp, u_int length, int *nfserrp)
{
const uint32_t *dp;
u_int len;
enum sunrpc_accept_stat astat;
/*
* Portability note:
* Here we find the address of the ar_verf credentials.
* Originally, this calculation was
* dp = (uint32_t *)&rp->rm_reply.rp_acpt.ar_verf
* On the wire, the rp_acpt field starts immediately after
* the (32 bit) rp_stat field. However, rp_acpt (which is a
* "struct accepted_reply") contains a "struct opaque_auth",
* whose internal representation contains a pointer, so on a
* 64-bit machine the compiler inserts 32 bits of padding
* before rp->rm_reply.rp_acpt.ar_verf. So, we cannot use
* the internal representation to parse the on-the-wire
* representation. Instead, we skip past the rp_stat field,
* which is an "enum" and so occupies one 32-bit word.
*/
dp = ((const uint32_t *)&rp->rm_reply) + 1;
ND_TCHECK_4(dp + 1);
len = EXTRACT_BE_U_4(dp + 1);
if (len >= length)
return (NULL);
/*
* skip past the ar_verf credentials.
*/
dp += (len + (2*sizeof(uint32_t) + 3)) / sizeof(uint32_t);
/*
* now we can check the ar_stat field
*/
ND_TCHECK_4(dp);
astat = (enum sunrpc_accept_stat) EXTRACT_BE_U_4(dp);
if (astat != SUNRPC_SUCCESS) {
ND_PRINT(" %s", tok2str(sunrpc_str, "ar_stat %u", astat));
*nfserrp = 1; /* suppress trunc string */
return (NULL);
}
/* successful return */
ND_TCHECK_LEN(dp, sizeof(astat));
return ((const uint32_t *) (sizeof(astat) + ((const char *)dp)));
trunc:
return (0);
}
static const uint32_t *
parsestatus(netdissect_options *ndo,
const uint32_t *dp, u_int *er, int *nfserrp)
{
u_int errnum;
ND_TCHECK_4(dp);
errnum = EXTRACT_BE_U_4(dp);
if (er)
*er = errnum;
if (errnum != 0) {
if (!ndo->ndo_qflag)
ND_PRINT(" ERROR: %s",
tok2str(status2str, "unk %u", errnum));
*nfserrp = 1;
}
return (dp + 1);
trunc:
return NULL;
}
static const uint32_t *
parsefattr(netdissect_options *ndo,
const uint32_t *dp, int verbose, int v3)
{
const struct nfs_fattr *fap;
fap = (const struct nfs_fattr *)dp;
ND_TCHECK_4(fap->fa_gid);
if (verbose) {
/*
* XXX - UIDs and GIDs are unsigned in NFS and in
* at least some UN*Xes, but we'll show them as
* signed because -2 has traditionally been the
* UID for "nobody", rather than 4294967294.
*/
ND_PRINT(" %s %o ids %d/%d",
tok2str(type2str, "unk-ft %u ",
EXTRACT_BE_U_4(fap->fa_type)),
EXTRACT_BE_U_4(fap->fa_mode),
EXTRACT_BE_S_4(fap->fa_uid),
EXTRACT_BE_S_4(fap->fa_gid));
if (v3) {
ND_TCHECK_8(fap->fa3_size);
ND_PRINT(" sz %" PRIu64,
EXTRACT_BE_U_8(fap->fa3_size));
} else {
ND_TCHECK_4(fap->fa2_size);
ND_PRINT(" sz %u", EXTRACT_BE_U_4(fap->fa2_size));
}
}
/* print lots more stuff */
if (verbose > 1) {
if (v3) {
ND_TCHECK_8(&fap->fa3_ctime);
ND_PRINT(" nlink %u rdev %u/%u",
EXTRACT_BE_U_4(fap->fa_nlink),
EXTRACT_BE_U_4(fap->fa3_rdev.specdata1),
EXTRACT_BE_U_4(fap->fa3_rdev.specdata2));
ND_PRINT(" fsid %" PRIx64,
EXTRACT_BE_U_8(fap->fa3_fsid));
ND_PRINT(" fileid %" PRIx64,
EXTRACT_BE_U_8(fap->fa3_fileid));
ND_PRINT(" a/m/ctime %u.%06u",
EXTRACT_BE_U_4(fap->fa3_atime.nfsv3_sec),
EXTRACT_BE_U_4(fap->fa3_atime.nfsv3_nsec));
ND_PRINT(" %u.%06u",
EXTRACT_BE_U_4(fap->fa3_mtime.nfsv3_sec),
EXTRACT_BE_U_4(fap->fa3_mtime.nfsv3_nsec));
ND_PRINT(" %u.%06u",
EXTRACT_BE_U_4(fap->fa3_ctime.nfsv3_sec),
EXTRACT_BE_U_4(fap->fa3_ctime.nfsv3_nsec));
} else {
ND_TCHECK_8(&fap->fa2_ctime);
ND_PRINT(" nlink %u rdev 0x%x fsid 0x%x nodeid 0x%x a/m/ctime",
EXTRACT_BE_U_4(fap->fa_nlink),
EXTRACT_BE_U_4(fap->fa2_rdev),
EXTRACT_BE_U_4(fap->fa2_fsid),
EXTRACT_BE_U_4(fap->fa2_fileid));
ND_PRINT(" %u.%06u",
EXTRACT_BE_U_4(fap->fa2_atime.nfsv2_sec),
EXTRACT_BE_U_4(fap->fa2_atime.nfsv2_usec));
ND_PRINT(" %u.%06u",
EXTRACT_BE_U_4(fap->fa2_mtime.nfsv2_sec),
EXTRACT_BE_U_4(fap->fa2_mtime.nfsv2_usec));
ND_PRINT(" %u.%06u",
EXTRACT_BE_U_4(fap->fa2_ctime.nfsv2_sec),
EXTRACT_BE_U_4(fap->fa2_ctime.nfsv2_usec));
}
}
return ((const uint32_t *)((const unsigned char *)dp +
(v3 ? NFSX_V3FATTR : NFSX_V2FATTR)));
trunc:
return (NULL);
}
static int
parseattrstat(netdissect_options *ndo,
const uint32_t *dp, int verbose, int v3, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (er)
return (1);
return (parsefattr(ndo, dp, verbose, v3) != NULL);
}
static int
parsediropres(netdissect_options *ndo,
const uint32_t *dp, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (er)
return (1);
dp = parsefh(ndo, dp, 0);
if (dp == NULL)
return (0);
return (parsefattr(ndo, dp, ndo->ndo_vflag, 0) != NULL);
}
static int
parselinkres(netdissect_options *ndo,
const uint32_t *dp, int v3, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return(0);
if (er)
return(1);
if (v3) {
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
return (0);
}
ND_PRINT(" ");
return (parsefn(ndo, dp) != NULL);
}
static int
parsestatfs(netdissect_options *ndo,
const uint32_t *dp, int v3, int *nfserrp)
{
const struct nfs_statfs *sfsp;
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (!v3 && er)
return (1);
if (ndo->ndo_qflag)
return(1);
if (v3) {
if (ndo->ndo_vflag)
ND_PRINT(" POST:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
return (0);
}
ND_TCHECK_LEN(dp, (v3 ? NFSX_V3STATFS : NFSX_V2STATFS));
sfsp = (const struct nfs_statfs *)dp;
if (v3) {
ND_PRINT(" tbytes %" PRIu64 " fbytes %" PRIu64 " abytes %" PRIu64,
EXTRACT_BE_U_8(sfsp->sf_tbytes),
EXTRACT_BE_U_8(sfsp->sf_fbytes),
EXTRACT_BE_U_8(sfsp->sf_abytes));
if (ndo->ndo_vflag) {
ND_PRINT(" tfiles %" PRIu64 " ffiles %" PRIu64 " afiles %" PRIu64 " invar %u",
EXTRACT_BE_U_8(sfsp->sf_tfiles),
EXTRACT_BE_U_8(sfsp->sf_ffiles),
EXTRACT_BE_U_8(sfsp->sf_afiles),
EXTRACT_BE_U_4(sfsp->sf_invarsec));
}
} else {
ND_PRINT(" tsize %u bsize %u blocks %u bfree %u bavail %u",
EXTRACT_BE_U_4(sfsp->sf_tsize),
EXTRACT_BE_U_4(sfsp->sf_bsize),
EXTRACT_BE_U_4(sfsp->sf_blocks),
EXTRACT_BE_U_4(sfsp->sf_bfree),
EXTRACT_BE_U_4(sfsp->sf_bavail));
}
return (1);
trunc:
return (0);
}
static int
parserddires(netdissect_options *ndo,
const uint32_t *dp, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (er)
return (1);
if (ndo->ndo_qflag)
return (1);
ND_TCHECK_4(dp + 2);
ND_PRINT(" offset 0x%x size %u ",
EXTRACT_BE_U_4(dp), EXTRACT_BE_U_4(dp + 1));
if (EXTRACT_BE_U_4(dp + 2) != 0)
ND_PRINT(" eof");
return (1);
trunc:
return (0);
}
static const uint32_t *
parse_wcc_attr(netdissect_options *ndo,
const uint32_t *dp)
{
/* Our caller has already checked this */
ND_PRINT(" sz %" PRIu64, EXTRACT_BE_U_8(dp));
ND_PRINT(" mtime %u.%06u ctime %u.%06u",
EXTRACT_BE_U_4(dp + 2), EXTRACT_BE_U_4(dp + 3),
EXTRACT_BE_U_4(dp + 4), EXTRACT_BE_U_4(dp + 5));
return (dp + 6);
}
/*
* Pre operation attributes. Print only if vflag > 1.
*/
static const uint32_t *
parse_pre_op_attr(netdissect_options *ndo,
const uint32_t *dp, int verbose)
{
ND_TCHECK_4(dp);
if (!EXTRACT_BE_U_4(dp))
return (dp + 1);
dp++;
ND_TCHECK_LEN(dp, 24);
if (verbose > 1) {
return parse_wcc_attr(ndo, dp);
} else {
/* If not verbose enough, just skip over wcc_attr */
return (dp + 6);
}
trunc:
return (NULL);
}
/*
* Post operation attributes are printed if vflag >= 1
*/
static const uint32_t *
parse_post_op_attr(netdissect_options *ndo,
const uint32_t *dp, int verbose)
{
ND_TCHECK_4(dp);
if (!EXTRACT_BE_U_4(dp))
return (dp + 1);
dp++;
if (verbose) {
return parsefattr(ndo, dp, verbose, 1);
} else
return (dp + (NFSX_V3FATTR / sizeof (uint32_t)));
trunc:
return (NULL);
}
static const uint32_t *
parse_wcc_data(netdissect_options *ndo,
const uint32_t *dp, int verbose)
{
if (verbose > 1)
ND_PRINT(" PRE:");
dp = parse_pre_op_attr(ndo, dp, verbose);
if (dp == NULL)
return (0);
if (verbose)
ND_PRINT(" POST:");
return parse_post_op_attr(ndo, dp, verbose);
}
static const uint32_t *
parsecreateopres(netdissect_options *ndo,
const uint32_t *dp, int verbose, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (er)
dp = parse_wcc_data(ndo, dp, verbose);
else {
ND_TCHECK_4(dp);
if (!EXTRACT_BE_U_4(dp))
return (dp + 1);
dp++;
dp = parsefh(ndo, dp, 1);
if (dp == NULL)
return (0);
if (verbose) {
dp = parse_post_op_attr(ndo, dp, verbose);
if (dp == NULL)
return (0);
if (ndo->ndo_vflag > 1) {
ND_PRINT(" dir attr:");
dp = parse_wcc_data(ndo, dp, verbose);
}
}
}
return (dp);
trunc:
return (NULL);
}
static const uint32_t *
parsewccres(netdissect_options *ndo,
const uint32_t *dp, int verbose, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
return parse_wcc_data(ndo, dp, verbose);
}
static const uint32_t *
parsev3rddirres(netdissect_options *ndo,
const uint32_t *dp, int verbose, int *nfserrp)
{
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (ndo->ndo_vflag)
ND_PRINT(" POST:");
dp = parse_post_op_attr(ndo, dp, verbose);
if (dp == NULL)
return (0);
if (er)
return dp;
if (ndo->ndo_vflag) {
ND_TCHECK_4(dp + 1);
/*
* This displays the 8 bytes of the verifier in order,
* from the low-order byte to the high-order byte.
*/
ND_PRINT(" verf %08x%08x",
EXTRACT_BE_U_4(dp), EXTRACT_BE_U_4(dp + 1));
dp += 2;
}
return dp;
trunc:
return (NULL);
}
static int
parsefsinfo(netdissect_options *ndo,
const uint32_t *dp, int *nfserrp)
{
const struct nfsv3_fsinfo *sfp;
u_int er;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (ndo->ndo_vflag)
ND_PRINT(" POST:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
return (0);
if (er)
return (1);
sfp = (const struct nfsv3_fsinfo *)dp;
ND_TCHECK_SIZE(sfp);
ND_PRINT(" rtmax %u rtpref %u wtmax %u wtpref %u dtpref %u",
EXTRACT_BE_U_4(sfp->fs_rtmax),
EXTRACT_BE_U_4(sfp->fs_rtpref),
EXTRACT_BE_U_4(sfp->fs_wtmax),
EXTRACT_BE_U_4(sfp->fs_wtpref),
EXTRACT_BE_U_4(sfp->fs_dtpref));
if (ndo->ndo_vflag) {
ND_PRINT(" rtmult %u wtmult %u maxfsz %" PRIu64,
EXTRACT_BE_U_4(sfp->fs_rtmult),
EXTRACT_BE_U_4(sfp->fs_wtmult),
EXTRACT_BE_U_8(sfp->fs_maxfilesize));
ND_PRINT(" delta %u.%06u ",
EXTRACT_BE_U_4(sfp->fs_timedelta.nfsv3_sec),
EXTRACT_BE_U_4(sfp->fs_timedelta.nfsv3_nsec));
}
return (1);
trunc:
return (0);
}
static int
parsepathconf(netdissect_options *ndo,
const uint32_t *dp, int *nfserrp)
{
u_int er;
const struct nfsv3_pathconf *spp;
dp = parsestatus(ndo, dp, &er, nfserrp);
if (dp == NULL)
return (0);
if (ndo->ndo_vflag)
ND_PRINT(" POST:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
return (0);
if (er)
return (1);
spp = (const struct nfsv3_pathconf *)dp;
ND_TCHECK_SIZE(spp);
ND_PRINT(" linkmax %u namemax %u %s %s %s %s",
EXTRACT_BE_U_4(spp->pc_linkmax),
EXTRACT_BE_U_4(spp->pc_namemax),
EXTRACT_BE_U_4(spp->pc_notrunc) ? "notrunc" : "",
EXTRACT_BE_U_4(spp->pc_chownrestricted) ? "chownres" : "",
EXTRACT_BE_U_4(spp->pc_caseinsensitive) ? "igncase" : "",
EXTRACT_BE_U_4(spp->pc_casepreserving) ? "keepcase" : "");
return (1);
trunc:
return (0);
}
static void
interp_reply(netdissect_options *ndo,
const struct sunrpc_msg *rp, uint32_t proc, uint32_t vers,
int length)
{
const uint32_t *dp;
int v3;
u_int er;
int nfserr = 0;
v3 = (vers == NFS_VER3);
if (!v3 && proc < NFS_NPROCS)
proc = nfsv3_procid[proc];
ND_PRINT(" %s", tok2str(nfsproc_str, "proc-%u", proc));
switch (proc) {
case NFSPROC_GETATTR:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parseattrstat(ndo, dp, !ndo->ndo_qflag, v3, &nfserr) == 0)
goto trunc;
break;
case NFSPROC_SETATTR:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
if (parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr) == 0)
goto trunc;
} else {
if (parseattrstat(ndo, dp, !ndo->ndo_qflag, 0, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_LOOKUP:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
if (er) {
if (ndo->ndo_vflag > 1) {
ND_PRINT(" post dattr:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
}
} else {
dp = parsefh(ndo, dp, v3);
if (dp == NULL)
goto trunc;
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
if (ndo->ndo_vflag > 1) {
ND_PRINT(" post dattr:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
}
}
} else {
if (parsediropres(ndo, dp, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_ACCESS:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
if (ndo->ndo_vflag)
ND_PRINT(" attr:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
if (!er) {
ND_TCHECK_4(dp);
ND_PRINT(" c %04x", EXTRACT_BE_U_4(dp));
}
break;
case NFSPROC_READLINK:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parselinkres(ndo, dp, v3, &nfserr) == 0)
goto trunc;
break;
case NFSPROC_READ:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
if (!er) {
if (ndo->ndo_vflag) {
ND_TCHECK_4(dp + 1);
ND_PRINT(" %u bytes", EXTRACT_BE_U_4(dp));
if (EXTRACT_BE_U_4(dp + 1))
ND_PRINT(" EOF");
}
}
} else {
if (parseattrstat(ndo, dp, ndo->ndo_vflag, 0, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_WRITE:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
if (!er) {
if (ndo->ndo_vflag) {
ND_TCHECK_4(dp);
ND_PRINT(" %u bytes", EXTRACT_BE_U_4(dp));
if (ndo->ndo_vflag > 1) {
ND_TCHECK_4(dp + 1);
ND_PRINT(" <%s>",
tok2str(nfsv3_writemodes,
NULL, EXTRACT_BE_U_4(dp + 1)));
/* write-verf-cookie */
ND_TCHECK_8(dp + 2);
ND_PRINT(" verf %" PRIx64, EXTRACT_BE_U_8(dp + 2));
}
}
}
return;
} else {
if (parseattrstat(ndo, dp, ndo->ndo_vflag, v3, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_CREATE:
case NFSPROC_MKDIR:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
} else {
if (parsediropres(ndo, dp, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_SYMLINK:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
} else {
if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
goto trunc;
}
break;
case NFSPROC_MKNOD:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parsecreateopres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
break;
case NFSPROC_REMOVE:
case NFSPROC_RMDIR:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
if (parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
} else {
if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
goto trunc;
}
break;
case NFSPROC_RENAME:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
if (ndo->ndo_vflag) {
ND_PRINT(" from:");
dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
ND_PRINT(" to:");
dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
}
} else {
if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
goto trunc;
}
break;
case NFSPROC_LINK:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
dp = parsestatus(ndo, dp, &er, &nfserr);
if (dp == NULL)
goto trunc;
if (ndo->ndo_vflag) {
ND_PRINT(" file POST:");
dp = parse_post_op_attr(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
ND_PRINT(" dir:");
dp = parse_wcc_data(ndo, dp, ndo->ndo_vflag);
if (dp == NULL)
goto trunc;
}
return;
} else {
if (parsestatus(ndo, dp, &er, &nfserr) == NULL)
goto trunc;
}
break;
case NFSPROC_READDIR:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (v3) {
if (parsev3rddirres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
} else {
if (parserddires(ndo, dp, &nfserr) == 0)
goto trunc;
}
break;
case NFSPROC_READDIRPLUS:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parsev3rddirres(ndo, dp, ndo->ndo_vflag, &nfserr) == NULL)
goto trunc;
break;
case NFSPROC_FSSTAT:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parsestatfs(ndo, dp, v3, &nfserr) == 0)
goto trunc;
break;
case NFSPROC_FSINFO:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parsefsinfo(ndo, dp, &nfserr) == 0)
goto trunc;
break;
case NFSPROC_PATHCONF:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
if (parsepathconf(ndo, dp, &nfserr) == 0)
goto trunc;
break;
case NFSPROC_COMMIT:
dp = parserep(ndo, rp, length, &nfserr);
if (dp == NULL)
goto trunc;
dp = parsewccres(ndo, dp, ndo->ndo_vflag, &nfserr);
if (dp == NULL)
goto trunc;
if (ndo->ndo_vflag > 1) {
/* write-verf-cookie */
ND_TCHECK_8(dp);
ND_PRINT(" verf %" PRIx64, EXTRACT_BE_U_8(dp));
}
break;
default:
break;
}
return;
trunc:
if (!nfserr)
nd_print_trunc(ndo);
}