Blame view
net/netfilter/nf_tables_trace.c
7.39 KB
d2912cb15 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
33d5a7b14 netfilter: nf_tab... |
2 3 4 |
/* * (C) 2015 Red Hat GmbH * Author: Florian Westphal <fw@strlen.de> |
33d5a7b14 netfilter: nf_tab... |
5 6 7 |
*/ #include <linux/module.h> |
e639f7ab0 netfilter: nf_tab... |
8 |
#include <linux/static_key.h> |
33d5a7b14 netfilter: nf_tab... |
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 |
#include <linux/hash.h> #include <linux/jhash.h> #include <linux/if_vlan.h> #include <linux/init.h> #include <linux/skbuff.h> #include <linux/netlink.h> #include <linux/netfilter.h> #include <linux/netfilter/nfnetlink.h> #include <linux/netfilter/nf_tables.h> #include <net/netfilter/nf_tables_core.h> #include <net/netfilter/nf_tables.h> #define NFT_TRACETYPE_LL_HSIZE 20 #define NFT_TRACETYPE_NETWORK_HSIZE 40 #define NFT_TRACETYPE_TRANSPORT_HSIZE 20 |
e639f7ab0 netfilter: nf_tab... |
24 25 |
DEFINE_STATIC_KEY_FALSE(nft_trace_enabled); EXPORT_SYMBOL_GPL(nft_trace_enabled); |
33d5a7b14 netfilter: nf_tab... |
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 |
static int trace_fill_id(struct sk_buff *nlskb, struct sk_buff *skb) { __be32 id; /* using skb address as ID results in a limited number of * values (and quick reuse). * * So we attempt to use as many skb members that will not * change while skb is with netfilter. */ id = (__be32)jhash_2words(hash32_ptr(skb), skb_get_hash(skb), skb->skb_iif); return nla_put_be32(nlskb, NFTA_TRACE_ID, id); } static int trace_fill_header(struct sk_buff *nlskb, u16 type, const struct sk_buff *skb, int off, unsigned int len) { struct nlattr *nla; if (len == 0) return 0; nla = nla_reserve(nlskb, type, len); if (!nla || skb_copy_bits(skb, off, nla_data(nla), len)) return -1; return 0; } static int nf_trace_fill_ll_header(struct sk_buff *nlskb, const struct sk_buff *skb) { struct vlan_ethhdr veth; int off; BUILD_BUG_ON(sizeof(veth) > NFT_TRACETYPE_LL_HSIZE); off = skb_mac_header(skb) - skb->data; if (off != -ETH_HLEN) return -1; if (skb_copy_bits(skb, off, &veth, ETH_HLEN)) return -1; veth.h_vlan_proto = skb->vlan_proto; veth.h_vlan_TCI = htons(skb_vlan_tag_get(skb)); veth.h_vlan_encapsulated_proto = skb->protocol; return nla_put(nlskb, NFTA_TRACE_LL_HEADER, sizeof(veth), &veth); } static int nf_trace_fill_dev_info(struct sk_buff *nlskb, const struct net_device *indev, const struct net_device *outdev) { if (indev) { if (nla_put_be32(nlskb, NFTA_TRACE_IIF, htonl(indev->ifindex))) return -1; if (nla_put_be16(nlskb, NFTA_TRACE_IIFTYPE, htons(indev->type))) return -1; } if (outdev) { if (nla_put_be32(nlskb, NFTA_TRACE_OIF, htonl(outdev->ifindex))) return -1; if (nla_put_be16(nlskb, NFTA_TRACE_OIFTYPE, htons(outdev->type))) return -1; } return 0; } static int nf_trace_fill_pkt_info(struct sk_buff *nlskb, const struct nft_pktinfo *pkt) { const struct sk_buff *skb = pkt->skb; |
33d5a7b14 netfilter: nf_tab... |
111 |
int off = skb_network_offset(skb); |
a20877b5e netfilter: nf_tab... |
112 |
unsigned int len, nh_end; |
33d5a7b14 netfilter: nf_tab... |
113 |
|
a20877b5e netfilter: nf_tab... |
114 115 116 |
nh_end = pkt->tprot_set ? pkt->xt.thoff : skb->len; len = min_t(unsigned int, nh_end - skb_network_offset(skb), NFT_TRACETYPE_NETWORK_HSIZE); |
33d5a7b14 netfilter: nf_tab... |
117 118 |
if (trace_fill_header(nlskb, NFTA_TRACE_NETWORK_HEADER, skb, off, len)) return -1; |
a20877b5e netfilter: nf_tab... |
119 120 121 122 123 124 125 |
if (pkt->tprot_set) { len = min_t(unsigned int, skb->len - pkt->xt.thoff, NFT_TRACETYPE_TRANSPORT_HSIZE); if (trace_fill_header(nlskb, NFTA_TRACE_TRANSPORT_HEADER, skb, pkt->xt.thoff, len)) return -1; } |
33d5a7b14 netfilter: nf_tab... |
126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 |
if (!skb_mac_header_was_set(skb)) return 0; if (skb_vlan_tag_get(skb)) return nf_trace_fill_ll_header(nlskb, skb); off = skb_mac_header(skb) - skb->data; len = min_t(unsigned int, -off, NFT_TRACETYPE_LL_HSIZE); return trace_fill_header(nlskb, NFTA_TRACE_LL_HEADER, skb, off, len); } static int nf_trace_fill_rule_info(struct sk_buff *nlskb, const struct nft_traceinfo *info) { if (!info->rule) return 0; /* a continue verdict with ->type == RETURN means that this is * an implicit return (end of chain reached). * * Since no rule matched, the ->rule pointer is invalid. */ if (info->type == NFT_TRACETYPE_RETURN && info->verdict->code == NFT_CONTINUE) return 0; return nla_put_be64(nlskb, NFTA_TRACE_RULE_HANDLE, |
b46f6ded9 libnl: nla_put_be... |
155 156 |
cpu_to_be64(info->rule->handle), NFTA_TRACE_PAD); |
33d5a7b14 netfilter: nf_tab... |
157 |
} |
b7263e071 netfilter: nf_tab... |
158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 |
static bool nft_trace_have_verdict_chain(struct nft_traceinfo *info) { switch (info->type) { case NFT_TRACETYPE_RETURN: case NFT_TRACETYPE_RULE: break; default: return false; } switch (info->verdict->code) { case NFT_JUMP: case NFT_GOTO: break; default: return false; } return true; } |
33d5a7b14 netfilter: nf_tab... |
178 179 180 181 182 183 184 |
void nft_trace_notify(struct nft_traceinfo *info) { const struct nft_pktinfo *pkt = info->pkt; struct nfgenmsg *nfmsg; struct nlmsghdr *nlh; struct sk_buff *skb; unsigned int size; |
dedb67c4b netfilter: Add nf... |
185 |
u16 event; |
33d5a7b14 netfilter: nf_tab... |
186 |
|
0e5a1c7eb netfilter: nf_tab... |
187 |
if (!nfnetlink_has_listeners(nft_net(pkt), NFNLGRP_NFTRACE)) |
33d5a7b14 netfilter: nf_tab... |
188 189 190 |
return; size = nlmsg_total_size(sizeof(struct nfgenmsg)) + |
e46abbcc0 netfilter: nf_tab... |
191 |
nla_total_size(strlen(info->chain->table->name)) + |
b7263e071 netfilter: nf_tab... |
192 |
nla_total_size(strlen(info->chain->name)) + |
b46f6ded9 libnl: nla_put_be... |
193 |
nla_total_size_64bit(sizeof(__be64)) + /* rule handle */ |
33d5a7b14 netfilter: nf_tab... |
194 195 196 |
nla_total_size(sizeof(__be32)) + /* trace type */ nla_total_size(0) + /* VERDICT, nested */ nla_total_size(sizeof(u32)) + /* verdict code */ |
33d5a7b14 netfilter: nf_tab... |
197 198 199 200 201 202 203 204 205 206 207 |
nla_total_size(sizeof(u32)) + /* id */ nla_total_size(NFT_TRACETYPE_LL_HSIZE) + nla_total_size(NFT_TRACETYPE_NETWORK_HSIZE) + nla_total_size(NFT_TRACETYPE_TRANSPORT_HSIZE) + nla_total_size(sizeof(u32)) + /* iif */ nla_total_size(sizeof(__be16)) + /* iiftype */ nla_total_size(sizeof(u32)) + /* oif */ nla_total_size(sizeof(__be16)) + /* oiftype */ nla_total_size(sizeof(u32)) + /* mark */ nla_total_size(sizeof(u32)) + /* nfproto */ nla_total_size(sizeof(u32)); /* policy */ |
b7263e071 netfilter: nf_tab... |
208 209 |
if (nft_trace_have_verdict_chain(info)) size += nla_total_size(strlen(info->verdict->chain->name)); /* jump target */ |
33d5a7b14 netfilter: nf_tab... |
210 211 212 |
skb = nlmsg_new(size, GFP_ATOMIC); if (!skb) return; |
dedb67c4b netfilter: Add nf... |
213 |
event = nfnl_msg_type(NFNL_SUBSYS_NFTABLES, NFT_MSG_TRACE); |
33d5a7b14 netfilter: nf_tab... |
214 215 216 217 218 219 220 221 |
nlh = nlmsg_put(skb, 0, 0, event, sizeof(struct nfgenmsg), 0); if (!nlh) goto nla_put_failure; nfmsg = nlmsg_data(nlh); nfmsg->nfgen_family = info->basechain->type->family; nfmsg->version = NFNETLINK_V0; nfmsg->res_id = 0; |
0e5a1c7eb netfilter: nf_tab... |
222 |
if (nla_put_be32(skb, NFTA_TRACE_NFPROTO, htonl(nft_pf(pkt)))) |
33d5a7b14 netfilter: nf_tab... |
223 224 225 226 227 228 229 |
goto nla_put_failure; if (nla_put_be32(skb, NFTA_TRACE_TYPE, htonl(info->type))) goto nla_put_failure; if (trace_fill_id(skb, pkt->skb)) goto nla_put_failure; |
6e692678d netfilter: nf_tab... |
230 231 232 233 234 |
if (nla_put_string(skb, NFTA_TRACE_CHAIN, info->chain->name)) goto nla_put_failure; if (nla_put_string(skb, NFTA_TRACE_TABLE, info->chain->table->name)) goto nla_put_failure; |
33d5a7b14 netfilter: nf_tab... |
235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 |
if (nf_trace_fill_rule_info(skb, info)) goto nla_put_failure; switch (info->type) { case NFT_TRACETYPE_UNSPEC: case __NFT_TRACETYPE_MAX: break; case NFT_TRACETYPE_RETURN: case NFT_TRACETYPE_RULE: if (nft_verdict_dump(skb, NFTA_TRACE_VERDICT, info->verdict)) goto nla_put_failure; break; case NFT_TRACETYPE_POLICY: if (nla_put_be32(skb, NFTA_TRACE_POLICY, |
5210d393e netfilter: nf_tab... |
250 |
htonl(info->basechain->policy))) |
33d5a7b14 netfilter: nf_tab... |
251 252 253 254 255 256 257 258 259 |
goto nla_put_failure; break; } if (pkt->skb->mark && nla_put_be32(skb, NFTA_TRACE_MARK, htonl(pkt->skb->mark))) goto nla_put_failure; if (!info->packet_dumped) { |
0e5a1c7eb netfilter: nf_tab... |
260 |
if (nf_trace_fill_dev_info(skb, nft_in(pkt), nft_out(pkt))) |
33d5a7b14 netfilter: nf_tab... |
261 262 263 264 265 266 267 268 |
goto nla_put_failure; if (nf_trace_fill_pkt_info(skb, pkt)) goto nla_put_failure; info->packet_dumped = true; } nlmsg_end(skb, nlh); |
0e5a1c7eb netfilter: nf_tab... |
269 |
nfnetlink_send(skb, nft_net(pkt), 0, NFNLGRP_NFTRACE, 0, GFP_ATOMIC); |
33d5a7b14 netfilter: nf_tab... |
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 |
return; nla_put_failure: WARN_ON_ONCE(1); kfree_skb(skb); } void nft_trace_init(struct nft_traceinfo *info, const struct nft_pktinfo *pkt, const struct nft_verdict *verdict, const struct nft_chain *chain) { info->basechain = nft_base_chain(chain); info->trace = true; info->packet_dumped = false; info->pkt = pkt; info->verdict = verdict; } |