2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
25 static const char rcsid[] _U_ =
26 "@(#) $Header: /tcpdump/master/tcpdump/print-nfs.c,v 1.111 2007-12-22 03:08:04 guy Exp $ (LBL)";
33 #include <tcpdump-stdinc.h>
39 #include "interface.h"
40 #include "addrtoname.h"
53 static void nfs_printfh(const u_int32_t *, const u_int);
54 static int xid_map_enter(const struct sunrpc_msg *, const u_char *);
55 static int32_t xid_map_find(const struct sunrpc_msg *, const u_char *,
56 u_int32_t *, u_int32_t *);
57 static void interp_reply(const struct sunrpc_msg *, u_int32_t, u_int32_t, int);
58 static const u_int32_t *parse_post_op_attr(const u_int32_t *, int);
59 static void print_sattr3(const struct nfsv3_sattr *sa3, int verbose);
60 static void print_nfsaddr(const u_char *, const char *, const char *);
63 * Mapping of old NFS Version 2 RPC numbers to generic numbers.
65 u_int32_t nfsv3_procid[NFS_NPROCS] = {
95 * NFS V2 and V3 status values.
97 * Some of these come from the RFCs for NFS V2 and V3, with the message
98 * strings taken from the FreeBSD C library "errlst.c".
100 * Others are errors that are not in the RFC but that I suspect some
101 * NFS servers could return; the values are FreeBSD errno values, as
102 * the first NFS server was the SunOS 2.0 one, and until 5.0 SunOS
103 * was primarily BSD-derived.
105 static struct tok status2str[] = {
106 { 1, "Operation not permitted" }, /* EPERM */
107 { 2, "No such file or directory" }, /* ENOENT */
108 { 5, "Input/output error" }, /* EIO */
109 { 6, "Device not configured" }, /* ENXIO */
110 { 11, "Resource deadlock avoided" }, /* EDEADLK */
111 { 12, "Cannot allocate memory" }, /* ENOMEM */
112 { 13, "Permission denied" }, /* EACCES */
113 { 17, "File exists" }, /* EEXIST */
114 { 18, "Cross-device link" }, /* EXDEV */
115 { 19, "Operation not supported by device" }, /* ENODEV */
116 { 20, "Not a directory" }, /* ENOTDIR */
117 { 21, "Is a directory" }, /* EISDIR */
118 { 22, "Invalid argument" }, /* EINVAL */
119 { 26, "Text file busy" }, /* ETXTBSY */
120 { 27, "File too large" }, /* EFBIG */
121 { 28, "No space left on device" }, /* ENOSPC */
122 { 30, "Read-only file system" }, /* EROFS */
123 { 31, "Too many links" }, /* EMLINK */
124 { 45, "Operation not supported" }, /* EOPNOTSUPP */
125 { 62, "Too many levels of symbolic links" }, /* ELOOP */
126 { 63, "File name too long" }, /* ENAMETOOLONG */
127 { 66, "Directory not empty" }, /* ENOTEMPTY */
128 { 69, "Disc quota exceeded" }, /* EDQUOT */
129 { 70, "Stale NFS file handle" }, /* ESTALE */
130 { 71, "Too many levels of remote in path" }, /* EREMOTE */
131 { 99, "Write cache flushed to disk" }, /* NFSERR_WFLUSH (not used) */
132 { 10001, "Illegal NFS file handle" }, /* NFS3ERR_BADHANDLE */
133 { 10002, "Update synchronization mismatch" }, /* NFS3ERR_NOT_SYNC */
134 { 10003, "READDIR/READDIRPLUS cookie is stale" }, /* NFS3ERR_BAD_COOKIE */
135 { 10004, "Operation not supported" }, /* NFS3ERR_NOTSUPP */
136 { 10005, "Buffer or request is too small" }, /* NFS3ERR_TOOSMALL */
137 { 10006, "Unspecified error on server" }, /* NFS3ERR_SERVERFAULT */
138 { 10007, "Object of that type not supported" }, /* NFS3ERR_BADTYPE */
139 { 10008, "Request couldn't be completed in time" }, /* NFS3ERR_JUKEBOX */
143 static struct tok nfsv3_writemodes[] = {
150 static struct tok type2str[] = {
162 print_nfsaddr(const u_char *bp, const char *s, const char *d)
167 char srcaddr[INET6_ADDRSTRLEN], dstaddr[INET6_ADDRSTRLEN];
169 #ifndef INET_ADDRSTRLEN
170 #define INET_ADDRSTRLEN 16
172 char srcaddr[INET_ADDRSTRLEN], dstaddr[INET_ADDRSTRLEN];
175 srcaddr[0] = dstaddr[0] = '\0';
176 switch (IP_V((struct ip *)bp)) {
178 ip = (struct ip *)bp;
179 strlcpy(srcaddr, ipaddr_string(&ip->ip_src), sizeof(srcaddr));
180 strlcpy(dstaddr, ipaddr_string(&ip->ip_dst), sizeof(dstaddr));
184 ip6 = (struct ip6_hdr *)bp;
185 strlcpy(srcaddr, ip6addr_string(&ip6->ip6_src),
187 strlcpy(dstaddr, ip6addr_string(&ip6->ip6_dst),
192 strlcpy(srcaddr, "?", sizeof(srcaddr));
193 strlcpy(dstaddr, "?", sizeof(dstaddr));
197 (void)printf("%s.%s > %s.%s: ", srcaddr, s, dstaddr, d);
200 static const u_int32_t *
201 parse_sattr3(const u_int32_t *dp, struct nfsv3_sattr *sa3)
204 sa3->sa_modeset = EXTRACT_32BITS(dp);
206 if (sa3->sa_modeset) {
208 sa3->sa_mode = EXTRACT_32BITS(dp);
213 sa3->sa_uidset = EXTRACT_32BITS(dp);
215 if (sa3->sa_uidset) {
217 sa3->sa_uid = EXTRACT_32BITS(dp);
222 sa3->sa_gidset = EXTRACT_32BITS(dp);
224 if (sa3->sa_gidset) {
226 sa3->sa_gid = EXTRACT_32BITS(dp);
231 sa3->sa_sizeset = EXTRACT_32BITS(dp);
233 if (sa3->sa_sizeset) {
235 sa3->sa_size = EXTRACT_32BITS(dp);
240 sa3->sa_atimetype = EXTRACT_32BITS(dp);
242 if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT) {
244 sa3->sa_atime.nfsv3_sec = EXTRACT_32BITS(dp);
246 sa3->sa_atime.nfsv3_nsec = EXTRACT_32BITS(dp);
251 sa3->sa_mtimetype = EXTRACT_32BITS(dp);
253 if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT) {
255 sa3->sa_mtime.nfsv3_sec = EXTRACT_32BITS(dp);
257 sa3->sa_mtime.nfsv3_nsec = EXTRACT_32BITS(dp);
266 static int nfserr; /* true if we error rather than trunc */
269 print_sattr3(const struct nfsv3_sattr *sa3, int verbose)
272 printf(" mode %o", sa3->sa_mode);
274 printf(" uid %u", sa3->sa_uid);
276 printf(" gid %u", sa3->sa_gid);
278 if (sa3->sa_atimetype == NFSV3SATTRTIME_TOCLIENT)
279 printf(" atime %u.%06u", sa3->sa_atime.nfsv3_sec,
280 sa3->sa_atime.nfsv3_nsec);
281 if (sa3->sa_mtimetype == NFSV3SATTRTIME_TOCLIENT)
282 printf(" mtime %u.%06u", sa3->sa_mtime.nfsv3_sec,
283 sa3->sa_mtime.nfsv3_nsec);
288 nfsreply_print(register const u_char *bp, u_int length,
289 register const u_char *bp2)
291 register const struct sunrpc_msg *rp;
292 u_int32_t proc, vers, reply_stat;
293 char srcid[20], dstid[20]; /*fits 32bit*/
294 enum sunrpc_reject_stat rstat;
297 enum sunrpc_auth_stat rwhy;
299 nfserr = 0; /* assume no error */
300 rp = (const struct sunrpc_msg *)bp;
304 strlcpy(srcid, "nfs", sizeof(srcid));
305 snprintf(dstid, sizeof(dstid), "%u",
306 EXTRACT_32BITS(&rp->rm_xid));
308 snprintf(srcid, sizeof(srcid), "%u", NFS_PORT);
309 snprintf(dstid, sizeof(dstid), "%u",
310 EXTRACT_32BITS(&rp->rm_xid));
312 print_nfsaddr(bp2, srcid, dstid);
313 TCHECK(rp->rm_reply.rp_stat);
314 reply_stat = EXTRACT_32BITS(&rp->rm_reply.rp_stat);
315 switch (reply_stat) {
317 case SUNRPC_MSG_ACCEPTED:
318 (void)printf("reply ok %u", length);
319 if (xid_map_find(rp, bp2, &proc, &vers) >= 0)
320 interp_reply(rp, proc, vers, length);
323 case SUNRPC_MSG_DENIED:
324 (void)printf("reply ERR %u: ", length);
325 TCHECK(rp->rm_reply.rp_reject.rj_stat);
326 rstat = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_stat);
329 case SUNRPC_RPC_MISMATCH:
330 TCHECK(rp->rm_reply.rp_reject.rj_vers.high);
331 rlow = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.low);
332 rhigh = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_vers.high);
333 (void)printf("RPC Version mismatch (%u-%u)",
337 case SUNRPC_AUTH_ERROR:
338 TCHECK(rp->rm_reply.rp_reject.rj_why);
339 rwhy = EXTRACT_32BITS(&rp->rm_reply.rp_reject.rj_why);
340 (void)printf("Auth ");
347 case SUNRPC_AUTH_BADCRED:
348 (void)printf("Bogus Credentials (seal broken)");
351 case SUNRPC_AUTH_REJECTEDCRED:
352 (void)printf("Rejected Credentials (client should begin new session)");
355 case SUNRPC_AUTH_BADVERF:
356 (void)printf("Bogus Verifier (seal broken)");
359 case SUNRPC_AUTH_REJECTEDVERF:
360 (void)printf("Verifier expired or was replayed");
363 case SUNRPC_AUTH_TOOWEAK:
364 (void)printf("Credentials are too weak");
367 case SUNRPC_AUTH_INVALIDRESP:
368 (void)printf("Bogus response verifier");
371 case SUNRPC_AUTH_FAILED:
372 (void)printf("Unknown failure");
376 (void)printf("Invalid failure code %u",
383 (void)printf("Unknown reason for rejecting rpc message %u",
384 (unsigned int)rstat);
390 (void)printf("reply Unknown rpc response code=%u %u",
398 fputs(" [|nfs]", stdout);
402 * Return a pointer to the first file handle in the packet.
403 * If the packet was truncated, return 0.
405 static const u_int32_t *
406 parsereq(register const struct sunrpc_msg *rp, register u_int length)
408 register const u_int32_t *dp;
412 * find the start of the req data (if we captured it)
414 dp = (u_int32_t *)&rp->rm_call.cb_cred;
416 len = EXTRACT_32BITS(&dp[1]);
418 dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
420 len = EXTRACT_32BITS(&dp[1]);
422 dp += (len + (2 * sizeof(*dp) + 3)) / sizeof(*dp);
432 * Print out an NFS file handle and return a pointer to following word.
433 * If packet was truncated, return 0.
435 static const u_int32_t *
436 parsefh(register const u_int32_t *dp, int v3)
442 len = EXTRACT_32BITS(dp) / 4;
447 if (TTEST2(*dp, len * sizeof(*dp))) {
448 nfs_printfh(dp, len);
456 * Print out a file name and return pointer to 32-bit word past it.
457 * If packet was truncated, return 0.
459 static const u_int32_t *
460 parsefn(register const u_int32_t *dp)
462 register u_int32_t len;
463 register const u_char *cp;
465 /* Bail if we don't have the string length */
468 /* Fetch string length; convert to host order */
472 TCHECK2(*dp, ((len + 3) & ~3));
475 /* Update 32-bit pointer (NFS filenames padded to 32-bit boundaries) */
476 dp += ((len + 3) & ~3) / sizeof(*dp);
478 if (fn_printn(cp, len, snapend)) {
490 * Print out file handle and file name.
491 * Return pointer to 32-bit word past file name.
492 * If packet was truncated (or there was some other error), return 0.
494 static const u_int32_t *
495 parsefhn(register const u_int32_t *dp, int v3)
497 dp = parsefh(dp, v3);
501 return (parsefn(dp));
505 nfsreq_print(register const u_char *bp, u_int length,
506 register const u_char *bp2)
508 register const struct sunrpc_msg *rp;
509 register const u_int32_t *dp;
513 u_int32_t access_flags;
514 struct nfsv3_sattr sa3;
515 char srcid[20], dstid[20]; /*fits 32bit*/
517 nfserr = 0; /* assume no error */
518 rp = (const struct sunrpc_msg *)bp;
522 snprintf(srcid, sizeof(srcid), "%u",
523 EXTRACT_32BITS(&rp->rm_xid));
524 strlcpy(dstid, "nfs", sizeof(dstid));
526 snprintf(srcid, sizeof(srcid), "%u",
527 EXTRACT_32BITS(&rp->rm_xid));
528 snprintf(dstid, sizeof(dstid), "%u", NFS_PORT);
530 print_nfsaddr(bp2, srcid, dstid);
531 (void)printf("%d", length);
533 if (!xid_map_enter(rp, bp2)) /* record proc number for later on */
536 v3 = (EXTRACT_32BITS(&rp->rm_call.cb_vers) == NFS_VER3);
537 proc = EXTRACT_32BITS(&rp->rm_call.cb_proc);
539 if (!v3 && proc < NFS_NPROCS)
540 proc = nfsv3_procid[proc];
550 case NFSPROC_GETATTR:
552 if ((dp = parsereq(rp, length)) != NULL &&
553 parsefh(dp, v3) != NULL)
557 case NFSPROC_SETATTR:
559 if ((dp = parsereq(rp, length)) != NULL &&
560 parsefh(dp, v3) != NULL)
566 if ((dp = parsereq(rp, length)) != NULL &&
567 parsefhn(dp, v3) != NULL)
573 if ((dp = parsereq(rp, length)) != NULL &&
574 (dp = parsefh(dp, v3)) != NULL) {
576 access_flags = EXTRACT_32BITS(&dp[0]);
577 if (access_flags & ~NFSV3ACCESS_FULL) {
578 /* NFSV3ACCESS definitions aren't up to date */
579 printf(" %04x", access_flags);
580 } else if ((access_flags & NFSV3ACCESS_FULL) == NFSV3ACCESS_FULL) {
581 printf(" NFS_ACCESS_FULL");
583 char separator = ' ';
584 if (access_flags & NFSV3ACCESS_READ) {
585 printf(" NFS_ACCESS_READ");
588 if (access_flags & NFSV3ACCESS_LOOKUP) {
589 printf("%cNFS_ACCESS_LOOKUP", separator);
592 if (access_flags & NFSV3ACCESS_MODIFY) {
593 printf("%cNFS_ACCESS_MODIFY", separator);
596 if (access_flags & NFSV3ACCESS_EXTEND) {
597 printf("%cNFS_ACCESS_EXTEND", separator);
600 if (access_flags & NFSV3ACCESS_DELETE) {
601 printf("%cNFS_ACCESS_DELETE", separator);
604 if (access_flags & NFSV3ACCESS_EXECUTE)
605 printf("%cNFS_ACCESS_EXECUTE", separator);
611 case NFSPROC_READLINK:
613 if ((dp = parsereq(rp, length)) != NULL &&
614 parsefh(dp, v3) != NULL)
620 if ((dp = parsereq(rp, length)) != NULL &&
621 (dp = parsefh(dp, v3)) != NULL) {
624 printf(" %u bytes @ %" PRIu64,
625 EXTRACT_32BITS(&dp[2]),
626 EXTRACT_64BITS(&dp[0]));
629 printf(" %u bytes @ %u",
630 EXTRACT_32BITS(&dp[1]),
631 EXTRACT_32BITS(&dp[0]));
639 if ((dp = parsereq(rp, length)) != NULL &&
640 (dp = parsefh(dp, v3)) != NULL) {
643 printf(" %u (%u) bytes @ %" PRIu64,
644 EXTRACT_32BITS(&dp[4]),
645 EXTRACT_32BITS(&dp[2]),
646 EXTRACT_64BITS(&dp[0]));
651 tok2str(nfsv3_writemodes,
652 NULL, EXTRACT_32BITS(dp)));
656 printf(" %u (%u) bytes @ %u (%u)",
657 EXTRACT_32BITS(&dp[3]),
658 EXTRACT_32BITS(&dp[2]),
659 EXTRACT_32BITS(&dp[1]),
660 EXTRACT_32BITS(&dp[0]));
668 if ((dp = parsereq(rp, length)) != NULL &&
669 parsefhn(dp, v3) != NULL)
675 if ((dp = parsereq(rp, length)) != 0 && parsefhn(dp, v3) != 0)
679 case NFSPROC_SYMLINK:
681 if ((dp = parsereq(rp, length)) != 0 &&
682 (dp = parsefhn(dp, v3)) != 0) {
683 fputs(" ->", stdout);
684 if (v3 && (dp = parse_sattr3(dp, &sa3)) == 0)
686 if (parsefn(dp) == 0)
689 print_sattr3(&sa3, vflag);
696 if ((dp = parsereq(rp, length)) != 0 &&
697 (dp = parsefhn(dp, v3)) != 0) {
699 type = (nfs_type)EXTRACT_32BITS(dp);
701 if ((dp = parse_sattr3(dp, &sa3)) == 0)
703 printf(" %s", tok2str(type2str, "unk-ft %d", type));
704 if (vflag && (type == NFCHR || type == NFBLK)) {
707 EXTRACT_32BITS(&dp[0]),
708 EXTRACT_32BITS(&dp[1]));
712 print_sattr3(&sa3, vflag);
719 if ((dp = parsereq(rp, length)) != NULL &&
720 parsefhn(dp, v3) != NULL)
726 if ((dp = parsereq(rp, length)) != NULL &&
727 parsefhn(dp, v3) != NULL)
733 if ((dp = parsereq(rp, length)) != NULL &&
734 (dp = parsefhn(dp, v3)) != NULL) {
735 fputs(" ->", stdout);
736 if (parsefhn(dp, v3) != NULL)
743 if ((dp = parsereq(rp, length)) != NULL &&
744 (dp = parsefh(dp, v3)) != NULL) {
745 fputs(" ->", stdout);
746 if (parsefhn(dp, v3) != NULL)
751 case NFSPROC_READDIR:
753 if ((dp = parsereq(rp, length)) != NULL &&
754 (dp = parsefh(dp, v3)) != NULL) {
758 * We shouldn't really try to interpret the
759 * offset cookie here.
761 printf(" %u bytes @ %" PRId64,
762 EXTRACT_32BITS(&dp[4]),
763 EXTRACT_64BITS(&dp[0]));
765 printf(" verf %08x%08x", dp[2],
770 * Print the offset as signed, since -1 is
771 * common, but offsets > 2^31 aren't.
773 printf(" %u bytes @ %d",
774 EXTRACT_32BITS(&dp[1]),
775 EXTRACT_32BITS(&dp[0]));
781 case NFSPROC_READDIRPLUS:
782 printf(" readdirplus");
783 if ((dp = parsereq(rp, length)) != NULL &&
784 (dp = parsefh(dp, v3)) != NULL) {
787 * We don't try to interpret the offset
790 printf(" %u bytes @ %" PRId64,
791 EXTRACT_32BITS(&dp[4]),
792 EXTRACT_64BITS(&dp[0]));
795 printf(" max %u verf %08x%08x",
796 EXTRACT_32BITS(&dp[5]), dp[2], dp[3]);
804 if ((dp = parsereq(rp, length)) != NULL &&
805 parsefh(dp, v3) != NULL)
811 if ((dp = parsereq(rp, length)) != NULL &&
812 parsefh(dp, v3) != NULL)
816 case NFSPROC_PATHCONF:
818 if ((dp = parsereq(rp, length)) != NULL &&
819 parsefh(dp, v3) != NULL)
825 if ((dp = parsereq(rp, length)) != NULL &&
826 (dp = parsefh(dp, v3)) != NULL) {
828 printf(" %u bytes @ %" PRIu64,
829 EXTRACT_32BITS(&dp[2]),
830 EXTRACT_64BITS(&dp[0]));
836 printf(" proc-%u", EXTRACT_32BITS(&rp->rm_call.cb_proc));
842 fputs(" [|nfs]", stdout);
846 * Print out an NFS file handle.
847 * We assume packet was not truncated before the end of the
848 * file handle pointed to by dp.
850 * Note: new version (using portable file-handle parser) doesn't produce
851 * generation number. It probably could be made to do that, with some
852 * additional hacking on the parser code.
855 nfs_printfh(register const u_int32_t *dp, const u_int len)
859 const char *sfsname = NULL;
864 char const *sep = "";
867 for (i=0; i<len; i++) {
868 (void)printf("%s%x", sep, dp[i]);
875 Parse_fh((const u_char *)dp, len, &fsid, &ino, NULL, &sfsname, 0);
878 /* file system ID is ASCII, not numeric, for this server OS */
879 static char temp[NFSX_V3FHMAX+1];
881 /* Make sure string is null-terminated */
882 strncpy(temp, sfsname, NFSX_V3FHMAX);
883 temp[sizeof(temp) - 1] = '\0';
884 /* Remove trailing spaces */
885 spacep = strchr(temp, ' ');
889 (void)printf(" fh %s/", temp);
891 (void)printf(" fh %d,%d/",
892 fsid.Fsid_dev.Major, fsid.Fsid_dev.Minor);
895 if(fsid.Fsid_dev.Minor == 257)
896 /* Print the undecoded handle */
897 (void)printf("%s", fsid.Opaque_Handle);
899 (void)printf("%ld", (long) ino);
903 * Maintain a small cache of recent client.XID.server/proc pairs, to allow
904 * us to match up replies with requests and thus to know how to parse
908 struct xid_map_entry {
909 u_int32_t xid; /* transaction ID (net order) */
910 int ipver; /* IP version (4 or 6) */
912 struct in6_addr client; /* client IP address (net order) */
913 struct in6_addr server; /* server IP address (net order) */
915 struct in_addr client; /* client IP address (net order) */
916 struct in_addr server; /* server IP address (net order) */
918 u_int32_t proc; /* call proc number (host order) */
919 u_int32_t vers; /* program version (host order) */
923 * Map entries are kept in an array that we manage as a ring;
924 * new entries are always added at the tail of the ring. Initially,
925 * all the entries are zero and hence don't match anything.
928 #define XIDMAPSIZE 64
930 struct xid_map_entry xid_map[XIDMAPSIZE];
932 int xid_map_next = 0;
933 int xid_map_hint = 0;
936 xid_map_enter(const struct sunrpc_msg *rp, const u_char *bp)
938 struct ip *ip = NULL;
940 struct ip6_hdr *ip6 = NULL;
942 struct xid_map_entry *xmep;
944 if (!TTEST(rp->rm_call.cb_vers))
946 switch (IP_V((struct ip *)bp)) {
948 ip = (struct ip *)bp;
952 ip6 = (struct ip6_hdr *)bp;
959 xmep = &xid_map[xid_map_next];
961 if (++xid_map_next >= XIDMAPSIZE)
964 xmep->xid = rp->rm_xid;
967 memcpy(&xmep->client, &ip->ip_src, sizeof(ip->ip_src));
968 memcpy(&xmep->server, &ip->ip_dst, sizeof(ip->ip_dst));
973 memcpy(&xmep->client, &ip6->ip6_src, sizeof(ip6->ip6_src));
974 memcpy(&xmep->server, &ip6->ip6_dst, sizeof(ip6->ip6_dst));
977 xmep->proc = EXTRACT_32BITS(&rp->rm_call.cb_proc);
978 xmep->vers = EXTRACT_32BITS(&rp->rm_call.cb_vers);
983 * Returns 0 and puts NFSPROC_xxx in proc return and
984 * version in vers return, or returns -1 on failure
987 xid_map_find(const struct sunrpc_msg *rp, const u_char *bp, u_int32_t *proc,
991 struct xid_map_entry *xmep;
992 u_int32_t xid = rp->rm_xid;
993 struct ip *ip = (struct ip *)bp;
995 struct ip6_hdr *ip6 = (struct ip6_hdr *)bp;
999 /* Start searching from where we last left off */
1004 if (xmep->ipver != IP_V(ip) || xmep->xid != xid)
1006 switch (xmep->ipver) {
1008 if (memcmp(&ip->ip_src, &xmep->server,
1009 sizeof(ip->ip_src)) != 0 ||
1010 memcmp(&ip->ip_dst, &xmep->client,
1011 sizeof(ip->ip_dst)) != 0) {
1017 if (memcmp(&ip6->ip6_src, &xmep->server,
1018 sizeof(ip6->ip6_src)) != 0 ||
1019 memcmp(&ip6->ip6_dst, &xmep->client,
1020 sizeof(ip6->ip6_dst)) != 0) {
1037 if (++i >= XIDMAPSIZE)
1039 } while (i != xid_map_hint);
1046 * Routines for parsing reply packets
1050 * Return a pointer to the beginning of the actual results.
1051 * If the packet was truncated, return 0.
1053 static const u_int32_t *
1054 parserep(register const struct sunrpc_msg *rp, register u_int length)
1056 register const u_int32_t *dp;
1058 enum sunrpc_accept_stat astat;
1062 * Here we find the address of the ar_verf credentials.
1063 * Originally, this calculation was
1064 * dp = (u_int32_t *)&rp->rm_reply.rp_acpt.ar_verf
1065 * On the wire, the rp_acpt field starts immediately after
1066 * the (32 bit) rp_stat field. However, rp_acpt (which is a
1067 * "struct accepted_reply") contains a "struct opaque_auth",
1068 * whose internal representation contains a pointer, so on a
1069 * 64-bit machine the compiler inserts 32 bits of padding
1070 * before rp->rm_reply.rp_acpt.ar_verf. So, we cannot use
1071 * the internal representation to parse the on-the-wire
1072 * representation. Instead, we skip past the rp_stat field,
1073 * which is an "enum" and so occupies one 32-bit word.
1075 dp = ((const u_int32_t *)&rp->rm_reply) + 1;
1077 len = EXTRACT_32BITS(&dp[1]);
1081 * skip past the ar_verf credentials.
1083 dp += (len + (2*sizeof(u_int32_t) + 3)) / sizeof(u_int32_t);
1087 * now we can check the ar_stat field
1089 astat = (enum sunrpc_accept_stat) EXTRACT_32BITS(dp);
1092 case SUNRPC_SUCCESS:
1095 case SUNRPC_PROG_UNAVAIL:
1096 printf(" PROG_UNAVAIL");
1097 nfserr = 1; /* suppress trunc string */
1100 case SUNRPC_PROG_MISMATCH:
1101 printf(" PROG_MISMATCH");
1102 nfserr = 1; /* suppress trunc string */
1105 case SUNRPC_PROC_UNAVAIL:
1106 printf(" PROC_UNAVAIL");
1107 nfserr = 1; /* suppress trunc string */
1110 case SUNRPC_GARBAGE_ARGS:
1111 printf(" GARBAGE_ARGS");
1112 nfserr = 1; /* suppress trunc string */
1115 case SUNRPC_SYSTEM_ERR:
1116 printf(" SYSTEM_ERR");
1117 nfserr = 1; /* suppress trunc string */
1121 printf(" ar_stat %d", astat);
1122 nfserr = 1; /* suppress trunc string */
1125 /* successful return */
1126 TCHECK2(*dp, sizeof(astat));
1127 return ((u_int32_t *) (sizeof(astat) + ((char *)dp)));
1132 static const u_int32_t *
1133 parsestatus(const u_int32_t *dp, int *er)
1139 errnum = EXTRACT_32BITS(&dp[0]);
1144 printf(" ERROR: %s",
1145 tok2str(status2str, "unk %d", errnum));
1153 static const u_int32_t *
1154 parsefattr(const u_int32_t *dp, int verbose, int v3)
1156 const struct nfs_fattr *fap;
1158 fap = (const struct nfs_fattr *)dp;
1159 TCHECK(fap->fa_gid);
1161 printf(" %s %o ids %d/%d",
1162 tok2str(type2str, "unk-ft %d ",
1163 EXTRACT_32BITS(&fap->fa_type)),
1164 EXTRACT_32BITS(&fap->fa_mode),
1165 EXTRACT_32BITS(&fap->fa_uid),
1166 EXTRACT_32BITS(&fap->fa_gid));
1168 TCHECK(fap->fa3_size);
1169 printf(" sz %" PRIu64,
1170 EXTRACT_64BITS((u_int32_t *)&fap->fa3_size));
1172 TCHECK(fap->fa2_size);
1173 printf(" sz %d", EXTRACT_32BITS(&fap->fa2_size));
1176 /* print lots more stuff */
1179 TCHECK(fap->fa3_ctime);
1180 printf(" nlink %d rdev %d/%d",
1181 EXTRACT_32BITS(&fap->fa_nlink),
1182 EXTRACT_32BITS(&fap->fa3_rdev.specdata1),
1183 EXTRACT_32BITS(&fap->fa3_rdev.specdata2));
1184 printf(" fsid %" PRIx64,
1185 EXTRACT_64BITS((u_int32_t *)&fap->fa3_fsid));
1186 printf(" fileid %" PRIx64,
1187 EXTRACT_64BITS((u_int32_t *)&fap->fa3_fileid));
1188 printf(" a/m/ctime %u.%06u",
1189 EXTRACT_32BITS(&fap->fa3_atime.nfsv3_sec),
1190 EXTRACT_32BITS(&fap->fa3_atime.nfsv3_nsec));
1192 EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_sec),
1193 EXTRACT_32BITS(&fap->fa3_mtime.nfsv3_nsec));
1195 EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_sec),
1196 EXTRACT_32BITS(&fap->fa3_ctime.nfsv3_nsec));
1198 TCHECK(fap->fa2_ctime);
1199 printf(" nlink %d rdev %x fsid %x nodeid %x a/m/ctime",
1200 EXTRACT_32BITS(&fap->fa_nlink),
1201 EXTRACT_32BITS(&fap->fa2_rdev),
1202 EXTRACT_32BITS(&fap->fa2_fsid),
1203 EXTRACT_32BITS(&fap->fa2_fileid));
1205 EXTRACT_32BITS(&fap->fa2_atime.nfsv2_sec),
1206 EXTRACT_32BITS(&fap->fa2_atime.nfsv2_usec));
1208 EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_sec),
1209 EXTRACT_32BITS(&fap->fa2_mtime.nfsv2_usec));
1211 EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_sec),
1212 EXTRACT_32BITS(&fap->fa2_ctime.nfsv2_usec));
1215 return ((const u_int32_t *)((unsigned char *)dp +
1216 (v3 ? NFSX_V3FATTR : NFSX_V2FATTR)));
1222 parseattrstat(const u_int32_t *dp, int verbose, int v3)
1226 dp = parsestatus(dp, &er);
1232 return (parsefattr(dp, verbose, v3) != NULL);
1236 parsediropres(const u_int32_t *dp)
1240 if (!(dp = parsestatus(dp, &er)))
1245 dp = parsefh(dp, 0);
1249 return (parsefattr(dp, vflag, 0) != NULL);
1253 parselinkres(const u_int32_t *dp, int v3)
1257 dp = parsestatus(dp, &er);
1262 if (v3 && !(dp = parse_post_op_attr(dp, vflag)))
1265 return (parsefn(dp) != NULL);
1269 parsestatfs(const u_int32_t *dp, int v3)
1271 const struct nfs_statfs *sfsp;
1274 dp = parsestatus(dp, &er);
1286 if (!(dp = parse_post_op_attr(dp, vflag)))
1290 TCHECK2(*dp, (v3 ? NFSX_V3STATFS : NFSX_V2STATFS));
1292 sfsp = (const struct nfs_statfs *)dp;
1295 printf(" tbytes %" PRIu64 " fbytes %" PRIu64 " abytes %" PRIu64,
1296 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_tbytes),
1297 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_fbytes),
1298 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_abytes));
1300 printf(" tfiles %" PRIu64 " ffiles %" PRIu64 " afiles %" PRIu64 " invar %u",
1301 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_tfiles),
1302 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_ffiles),
1303 EXTRACT_64BITS((u_int32_t *)&sfsp->sf_afiles),
1304 EXTRACT_32BITS(&sfsp->sf_invarsec));
1307 printf(" tsize %d bsize %d blocks %d bfree %d bavail %d",
1308 EXTRACT_32BITS(&sfsp->sf_tsize),
1309 EXTRACT_32BITS(&sfsp->sf_bsize),
1310 EXTRACT_32BITS(&sfsp->sf_blocks),
1311 EXTRACT_32BITS(&sfsp->sf_bfree),
1312 EXTRACT_32BITS(&sfsp->sf_bavail));
1321 parserddires(const u_int32_t *dp)
1325 dp = parsestatus(dp, &er);
1334 printf(" offset %x size %d ",
1335 EXTRACT_32BITS(&dp[0]), EXTRACT_32BITS(&dp[1]));
1344 static const u_int32_t *
1345 parse_wcc_attr(const u_int32_t *dp)
1347 printf(" sz %" PRIu64, EXTRACT_64BITS(&dp[0]));
1348 printf(" mtime %u.%06u ctime %u.%06u",
1349 EXTRACT_32BITS(&dp[2]), EXTRACT_32BITS(&dp[3]),
1350 EXTRACT_32BITS(&dp[4]), EXTRACT_32BITS(&dp[5]));
1355 * Pre operation attributes. Print only if vflag > 1.
1357 static const u_int32_t *
1358 parse_pre_op_attr(const u_int32_t *dp, int verbose)
1361 if (!EXTRACT_32BITS(&dp[0]))
1366 return parse_wcc_attr(dp);
1368 /* If not verbose enough, just skip over wcc_attr */
1376 * Post operation attributes are printed if vflag >= 1
1378 static const u_int32_t *
1379 parse_post_op_attr(const u_int32_t *dp, int verbose)
1382 if (!EXTRACT_32BITS(&dp[0]))
1386 return parsefattr(dp, verbose, 1);
1388 return (dp + (NFSX_V3FATTR / sizeof (u_int32_t)));
1393 static const u_int32_t *
1394 parse_wcc_data(const u_int32_t *dp, int verbose)
1398 if (!(dp = parse_pre_op_attr(dp, verbose)))
1403 return parse_post_op_attr(dp, verbose);
1406 static const u_int32_t *
1407 parsecreateopres(const u_int32_t *dp, int verbose)
1411 if (!(dp = parsestatus(dp, &er)))
1414 dp = parse_wcc_data(dp, verbose);
1417 if (!EXTRACT_32BITS(&dp[0]))
1420 if (!(dp = parsefh(dp, 1)))
1423 if (!(dp = parse_post_op_attr(dp, verbose)))
1426 printf(" dir attr:");
1427 dp = parse_wcc_data(dp, verbose);
1437 parsewccres(const u_int32_t *dp, int verbose)
1441 if (!(dp = parsestatus(dp, &er)))
1443 return parse_wcc_data(dp, verbose) != 0;
1446 static const u_int32_t *
1447 parsev3rddirres(const u_int32_t *dp, int verbose)
1451 if (!(dp = parsestatus(dp, &er)))
1455 if (!(dp = parse_post_op_attr(dp, verbose)))
1461 printf(" verf %08x%08x", dp[0], dp[1]);
1470 parsefsinfo(const u_int32_t *dp)
1472 struct nfsv3_fsinfo *sfp;
1475 if (!(dp = parsestatus(dp, &er)))
1479 if (!(dp = parse_post_op_attr(dp, vflag)))
1484 sfp = (struct nfsv3_fsinfo *)dp;
1486 printf(" rtmax %u rtpref %u wtmax %u wtpref %u dtpref %u",
1487 EXTRACT_32BITS(&sfp->fs_rtmax),
1488 EXTRACT_32BITS(&sfp->fs_rtpref),
1489 EXTRACT_32BITS(&sfp->fs_wtmax),
1490 EXTRACT_32BITS(&sfp->fs_wtpref),
1491 EXTRACT_32BITS(&sfp->fs_dtpref));
1493 printf(" rtmult %u wtmult %u maxfsz %" PRIu64,
1494 EXTRACT_32BITS(&sfp->fs_rtmult),
1495 EXTRACT_32BITS(&sfp->fs_wtmult),
1496 EXTRACT_64BITS((u_int32_t *)&sfp->fs_maxfilesize));
1497 printf(" delta %u.%06u ",
1498 EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_sec),
1499 EXTRACT_32BITS(&sfp->fs_timedelta.nfsv3_nsec));
1507 parsepathconf(const u_int32_t *dp)
1510 struct nfsv3_pathconf *spp;
1512 if (!(dp = parsestatus(dp, &er)))
1516 if (!(dp = parse_post_op_attr(dp, vflag)))
1521 spp = (struct nfsv3_pathconf *)dp;
1524 printf(" linkmax %u namemax %u %s %s %s %s",
1525 EXTRACT_32BITS(&spp->pc_linkmax),
1526 EXTRACT_32BITS(&spp->pc_namemax),
1527 EXTRACT_32BITS(&spp->pc_notrunc) ? "notrunc" : "",
1528 EXTRACT_32BITS(&spp->pc_chownrestricted) ? "chownres" : "",
1529 EXTRACT_32BITS(&spp->pc_caseinsensitive) ? "igncase" : "",
1530 EXTRACT_32BITS(&spp->pc_casepreserving) ? "keepcase" : "");
1537 interp_reply(const struct sunrpc_msg *rp, u_int32_t proc, u_int32_t vers, int length)
1539 register const u_int32_t *dp;
1543 v3 = (vers == NFS_VER3);
1545 if (!v3 && proc < NFS_NPROCS)
1546 proc = nfsv3_procid[proc];
1558 case NFSPROC_GETATTR:
1560 dp = parserep(rp, length);
1561 if (dp != NULL && parseattrstat(dp, !qflag, v3) != 0)
1565 case NFSPROC_SETATTR:
1567 if (!(dp = parserep(rp, length)))
1570 if (parsewccres(dp, vflag))
1573 if (parseattrstat(dp, !qflag, 0) != 0)
1578 case NFSPROC_LOOKUP:
1580 if (!(dp = parserep(rp, length)))
1583 if (!(dp = parsestatus(dp, &er)))
1587 printf(" post dattr:");
1588 dp = parse_post_op_attr(dp, vflag);
1591 if (!(dp = parsefh(dp, v3)))
1593 if ((dp = parse_post_op_attr(dp, vflag)) &&
1595 printf(" post dattr:");
1596 dp = parse_post_op_attr(dp, vflag);
1602 if (parsediropres(dp) != 0)
1607 case NFSPROC_ACCESS:
1609 if (!(dp = parserep(rp, length)))
1611 if (!(dp = parsestatus(dp, &er)))
1615 if (!(dp = parse_post_op_attr(dp, vflag)))
1618 printf(" c %04x", EXTRACT_32BITS(&dp[0]));
1621 case NFSPROC_READLINK:
1622 printf(" readlink");
1623 dp = parserep(rp, length);
1624 if (dp != NULL && parselinkres(dp, v3) != 0)
1630 if (!(dp = parserep(rp, length)))
1633 if (!(dp = parsestatus(dp, &er)))
1635 if (!(dp = parse_post_op_attr(dp, vflag)))
1641 printf(" %u bytes", EXTRACT_32BITS(&dp[0]));
1642 if (EXTRACT_32BITS(&dp[1]))
1647 if (parseattrstat(dp, vflag, 0) != 0)
1654 if (!(dp = parserep(rp, length)))
1657 if (!(dp = parsestatus(dp, &er)))
1659 if (!(dp = parse_wcc_data(dp, vflag)))
1665 printf(" %u bytes", EXTRACT_32BITS(&dp[0]));
1669 tok2str(nfsv3_writemodes,
1670 NULL, EXTRACT_32BITS(&dp[1])));
1675 if (parseattrstat(dp, vflag, v3) != 0)
1680 case NFSPROC_CREATE:
1682 if (!(dp = parserep(rp, length)))
1685 if (parsecreateopres(dp, vflag) != 0)
1688 if (parsediropres(dp) != 0)
1695 if (!(dp = parserep(rp, length)))
1698 if (parsecreateopres(dp, vflag) != 0)
1701 if (parsediropres(dp) != 0)
1706 case NFSPROC_SYMLINK:
1708 if (!(dp = parserep(rp, length)))
1711 if (parsecreateopres(dp, vflag) != 0)
1714 if (parsestatus(dp, &er) != 0)
1721 if (!(dp = parserep(rp, length)))
1723 if (parsecreateopres(dp, vflag) != 0)
1727 case NFSPROC_REMOVE:
1729 if (!(dp = parserep(rp, length)))
1732 if (parsewccres(dp, vflag))
1735 if (parsestatus(dp, &er) != 0)
1742 if (!(dp = parserep(rp, length)))
1745 if (parsewccres(dp, vflag))
1748 if (parsestatus(dp, &er) != 0)
1753 case NFSPROC_RENAME:
1755 if (!(dp = parserep(rp, length)))
1758 if (!(dp = parsestatus(dp, &er)))
1762 if (!(dp = parse_wcc_data(dp, vflag)))
1765 if (!(dp = parse_wcc_data(dp, vflag)))
1770 if (parsestatus(dp, &er) != 0)
1777 if (!(dp = parserep(rp, length)))
1780 if (!(dp = parsestatus(dp, &er)))
1783 printf(" file POST:");
1784 if (!(dp = parse_post_op_attr(dp, vflag)))
1787 if (!(dp = parse_wcc_data(dp, vflag)))
1792 if (parsestatus(dp, &er) != 0)
1797 case NFSPROC_READDIR:
1799 if (!(dp = parserep(rp, length)))
1802 if (parsev3rddirres(dp, vflag))
1805 if (parserddires(dp) != 0)
1810 case NFSPROC_READDIRPLUS:
1811 printf(" readdirplus");
1812 if (!(dp = parserep(rp, length)))
1814 if (parsev3rddirres(dp, vflag))
1818 case NFSPROC_FSSTAT:
1820 dp = parserep(rp, length);
1821 if (dp != NULL && parsestatfs(dp, v3) != 0)
1825 case NFSPROC_FSINFO:
1827 dp = parserep(rp, length);
1828 if (dp != NULL && parsefsinfo(dp) != 0)
1832 case NFSPROC_PATHCONF:
1833 printf(" pathconf");
1834 dp = parserep(rp, length);
1835 if (dp != NULL && parsepathconf(dp) != 0)
1839 case NFSPROC_COMMIT:
1841 dp = parserep(rp, length);
1842 if (dp != NULL && parsewccres(dp, vflag) != 0)
1847 printf(" proc-%u", proc);
1852 fputs(" [|nfs]", stdout);