Número estranho da porta da camada de transporte durante a conversação do nfs

0

Eu uso o autofs para montar compartilhamentos nfs, autofses part funciona bem, eu posso acessar as pastas folha, mas quando eu tento acessar essa pasta a seguinte troca de pacotes acontece e meu shell empilha, ele cai

[gm-web01]/net/arkive03/mnt/mfs> cd mfsbackup
-bash: cd: mfsbackup: No such file or directory
mensagem após cerca de um minuto. Olhe para as últimas duas linhas, como o número da porta pode ser maior do que o intervalo normal da camada de transporte?
[arkive03]~> tcpdump -i em1 -nn host 10.24.20.163
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on em1, link-type EN10MB (Ethernet), capture size 65535 bytes
11:33:48.598351 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [S], seq 2431214407, win 29200, options [mss 1460,sackOK,TS val 77231839 ecr 0,nop,wscale 7], length 0
11:33:48.598381 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [S.], seq 1732090298, ack 2431214408, win 28960, options [mss 1460,sackOK,TS val 2997710933 ecr 77231839,nop,wscale 7], length 0
11:33:48.602006 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [.], ack 1, win 229, options [nop,nop,TS val 77231840 ecr 2997710933], length 0
11:33:48.602043 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [P.], seq 1:45, ack 1, win 229, options [nop,nop,TS val 77231840 ecr 2997710933], length 44
11:33:48.602054 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [.], ack 45, win 227, options [nop,nop,TS val 2997710934 ecr 77231840], length 0
11:33:48.602288 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 2997710934 ecr 77231840], length 28
11:33:48.605756 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [.], ack 29, win 229, options [nop,nop,TS val 77231841 ecr 2997710934], length 0
11:33:48.605826 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [P.], seq 45:105, ack 29, win 229, options [nop,nop,TS val 77231841 ecr 2997710934], length 60
11:33:48.606038 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [P.], seq 29:61, ack 105, win 227, options [nop,nop,TS val 2997710935 ecr 77231841], length 32
11:33:48.609504 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [S], seq 1293458899, win 29200, options [mss 1460,sackOK,TS val 77231842 ecr 0,nop,wscale 7], length 0
11:33:48.609534 IP 10.44.20.137.2049 > 10.24.20.163.46403: Flags [S.], seq 2805863182, ack 1293458900, win 28960, options [mss 1460,sackOK,TS val 2997710935 ecr 77231842,nop,wscale 7], length 0
11:33:48.612993 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [.], ack 1, win 229, options [nop,nop,TS val 77231842 ecr 2997710935], length 0
11:33:48.613030 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [P.], seq 1:45, ack 1, win 229, options [nop,nop,TS val 77231842 ecr 2997710935], length 44: NFS request xid 916703790  null
11:33:48.613042 IP 10.44.20.137.2049 > 10.24.20.163.46403: Flags [.], ack 45, win 227, options [nop,nop,TS val 2997710936 ecr 77231842], length 0
11:33:48.613149 IP 10.44.20.137.2049 > 10.24.20.163.46403: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 2997710936 ecr 77231842], length 28: NFS reply xid 916703790 reply ok 24 null
11:33:48.616331 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [.], ack 29, win 229, options [nop,nop,TS val 77231843 ecr 2997710936], length 0
11:33:48.616402 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [P.], seq 105:149, ack 61, win 229, options [nop,nop,TS val 77231843 ecr 2997710935], length 44
11:33:48.616600 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [P.], seq 61:89, ack 149, win 227, options [nop,nop,TS val 2997710937 ecr 77231843], length 28
11:33:48.620262 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [P.], seq 149:209, ack 89, win 229, options [nop,nop,TS val 77231844 ecr 2997710937], length 60
11:33:48.620457 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [P.], seq 89:121, ack 209, win 227, options [nop,nop,TS val 2997710938 ecr 77231844], length 32
11:33:48.624021 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [P.], seq 45:89, ack 29, win 229, options [nop,nop,TS val 77231845 ecr 2997710936], length 44: NFS request xid 1081853030  null
11:33:48.624103 IP 10.44.20.137.2049 > 10.24.20.163.46403: Flags [P.], seq 29:57, ack 89, win 227, options [nop,nop,TS val 2997710939 ecr 77231845], length 28: NFS reply xid 1081853030 reply ok 24 null
11:33:48.627318 IP 10.24.20.163.53809 > 10.44.20.137.111: UDP, length 40
11:33:48.627507 IP 10.44.20.137.111 > 10.24.20.163.53809: UDP, length 24
11:33:48.627617 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [F.], seq 89, ack 57, win 229, options [nop,nop,TS val 77231846 ecr 2997710939], length 0
11:33:48.627687 IP 10.44.20.137.2049 > 10.24.20.163.46403: Flags [F.], seq 57, ack 90, win 227, options [nop,nop,TS val 2997710940 ecr 77231846], length 0
11:33:48.627706 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [F.], seq 209, ack 121, win 229, options [nop,nop,TS val 77231846 ecr 2997710938], length 0
11:33:48.627798 IP 10.44.20.137.111 > 10.24.20.163.55219: Flags [F.], seq 121, ack 210, win 227, options [nop,nop,TS val 2997710940 ecr 77231846], length 0
11:33:48.629818 IP 10.24.20.163.53809 > 10.44.20.137.111: UDP, length 56
11:33:48.630039 IP 10.44.20.137.111 > 10.24.20.163.53809: UDP, length 28
11:33:48.631031 IP 10.24.20.163.46403 > 10.44.20.137.2049: Flags [.], ack 58, win 229, options [nop,nop,TS val 77231847 ecr 2997710940], length 0
11:33:48.631111 IP 10.24.20.163.55219 > 10.44.20.137.111: Flags [.], ack 122, win 229, options [nop,nop,TS val 77231847 ecr 2997710940], length 0
11:33:48.632826 IP 10.24.20.163.2073489439 > 10.44.20.137.2049: 40 null
11:33:48.632921 IP 10.44.20.137.2049 > 10.24.20.163.2073489439: reply ok 24 null
11:33:48.635617 IP 10.24.20.163.53809 > 10.44.20.137.111: UDP, length 40
11:33:48.635807 IP 10.44.20.137.111 > 10.24.20.163.53809: UDP, length 24
11:33:48.638213 IP 10.24.20.163.53809 > 10.44.20.137.111: UDP, length 56
11:33:48.638404 IP 10.44.20.137.111 > 10.24.20.163.53809: UDP, length 28
11:33:48.641185 IP 10.24.20.163.**217782617** > 10.44.20.137.2049: 40 null
11:33:48.641280 IP 10.44.20.137.2049 > 10.24.20.163.**217782617**: reply ok 24 null


    
por Edik Mkoyan 12.10.2015 / 09:41

1 resposta

1

Tanto quanto eu posso dizer, isso não é um número de porta TCP nem UDP; é o ID da transação RPC. (Veja print-nfs.c:nfsreply_print em fontes tcpdump.)

O tcpdump às vezes tende a usar uma saída muito concisa; considere usar -v ou tshark.

    
por 12.10.2015 / 15:32