Merge tag 'perf-tools-fixes-for-v6.4-1-2023-05-20' of git://git.kernel.org/pub/scm...
[linux-block.git] / net / netfilter / nf_tables_trace.c
CommitLineData
d2912cb1 1// SPDX-License-Identifier: GPL-2.0-only
33d5a7b1
FW
2/*
3 * (C) 2015 Red Hat GmbH
4 * Author: Florian Westphal <fw@strlen.de>
33d5a7b1
FW
5 */
6
7#include <linux/module.h>
e639f7ab 8#include <linux/static_key.h>
33d5a7b1 9#include <linux/hash.h>
e34b9ed9 10#include <linux/siphash.h>
33d5a7b1
FW
11#include <linux/if_vlan.h>
12#include <linux/init.h>
13#include <linux/skbuff.h>
14#include <linux/netlink.h>
15#include <linux/netfilter.h>
16#include <linux/netfilter/nfnetlink.h>
17#include <linux/netfilter/nf_tables.h>
18#include <net/netfilter/nf_tables_core.h>
19#include <net/netfilter/nf_tables.h>
20
21#define NFT_TRACETYPE_LL_HSIZE 20
22#define NFT_TRACETYPE_NETWORK_HSIZE 40
23#define NFT_TRACETYPE_TRANSPORT_HSIZE 20
24
e639f7ab
FW
25DEFINE_STATIC_KEY_FALSE(nft_trace_enabled);
26EXPORT_SYMBOL_GPL(nft_trace_enabled);
27
33d5a7b1
FW
28static int trace_fill_header(struct sk_buff *nlskb, u16 type,
29 const struct sk_buff *skb,
30 int off, unsigned int len)
31{
32 struct nlattr *nla;
33
34 if (len == 0)
35 return 0;
36
37 nla = nla_reserve(nlskb, type, len);
38 if (!nla || skb_copy_bits(skb, off, nla_data(nla), len))
39 return -1;
40
41 return 0;
42}
43
44static int nf_trace_fill_ll_header(struct sk_buff *nlskb,
45 const struct sk_buff *skb)
46{
47 struct vlan_ethhdr veth;
48 int off;
49
50 BUILD_BUG_ON(sizeof(veth) > NFT_TRACETYPE_LL_HSIZE);
51
52 off = skb_mac_header(skb) - skb->data;
53 if (off != -ETH_HLEN)
54 return -1;
55
56 if (skb_copy_bits(skb, off, &veth, ETH_HLEN))
57 return -1;
58
59 veth.h_vlan_proto = skb->vlan_proto;
60 veth.h_vlan_TCI = htons(skb_vlan_tag_get(skb));
61 veth.h_vlan_encapsulated_proto = skb->protocol;
62
63 return nla_put(nlskb, NFTA_TRACE_LL_HEADER, sizeof(veth), &veth);
64}
65
66static int nf_trace_fill_dev_info(struct sk_buff *nlskb,
67 const struct net_device *indev,
68 const struct net_device *outdev)
69{
70 if (indev) {
71 if (nla_put_be32(nlskb, NFTA_TRACE_IIF,
72 htonl(indev->ifindex)))
73 return -1;
74
75 if (nla_put_be16(nlskb, NFTA_TRACE_IIFTYPE,
76 htons(indev->type)))
77 return -1;
78 }
79
80 if (outdev) {
81 if (nla_put_be32(nlskb, NFTA_TRACE_OIF,
82 htonl(outdev->ifindex)))
83 return -1;
84
85 if (nla_put_be16(nlskb, NFTA_TRACE_OIFTYPE,
86 htons(outdev->type)))
87 return -1;
88 }
89
90 return 0;
91}
92
93static int nf_trace_fill_pkt_info(struct sk_buff *nlskb,
94 const struct nft_pktinfo *pkt)
95{
96 const struct sk_buff *skb = pkt->skb;
33d5a7b1 97 int off = skb_network_offset(skb);
a20877b5 98 unsigned int len, nh_end;
33d5a7b1 99
b5bdc6f9 100 nh_end = pkt->flags & NFT_PKTINFO_L4PROTO ? nft_thoff(pkt) : skb->len;
a20877b5
LZ
101 len = min_t(unsigned int, nh_end - skb_network_offset(skb),
102 NFT_TRACETYPE_NETWORK_HSIZE);
33d5a7b1
FW
103 if (trace_fill_header(nlskb, NFTA_TRACE_NETWORK_HEADER, skb, off, len))
104 return -1;
105
b5bdc6f9 106 if (pkt->flags & NFT_PKTINFO_L4PROTO) {
2d7b4ace 107 len = min_t(unsigned int, skb->len - nft_thoff(pkt),
a20877b5
LZ
108 NFT_TRACETYPE_TRANSPORT_HSIZE);
109 if (trace_fill_header(nlskb, NFTA_TRACE_TRANSPORT_HEADER, skb,
2d7b4ace 110 nft_thoff(pkt), len))
a20877b5
LZ
111 return -1;
112 }
33d5a7b1
FW
113
114 if (!skb_mac_header_was_set(skb))
115 return 0;
116
117 if (skb_vlan_tag_get(skb))
118 return nf_trace_fill_ll_header(nlskb, skb);
119
120 off = skb_mac_header(skb) - skb->data;
121 len = min_t(unsigned int, -off, NFT_TRACETYPE_LL_HSIZE);
122 return trace_fill_header(nlskb, NFTA_TRACE_LL_HEADER,
123 skb, off, len);
124}
125
126static int nf_trace_fill_rule_info(struct sk_buff *nlskb,
0a202145 127 const struct nft_verdict *verdict,
46df4175 128 const struct nft_rule_dp *rule,
33d5a7b1
FW
129 const struct nft_traceinfo *info)
130{
46df4175 131 if (!rule || rule->is_last)
33d5a7b1
FW
132 return 0;
133
134 /* a continue verdict with ->type == RETURN means that this is
135 * an implicit return (end of chain reached).
136 *
137 * Since no rule matched, the ->rule pointer is invalid.
138 */
139 if (info->type == NFT_TRACETYPE_RETURN &&
0a202145 140 verdict->code == NFT_CONTINUE)
33d5a7b1
FW
141 return 0;
142
143 return nla_put_be64(nlskb, NFTA_TRACE_RULE_HANDLE,
46df4175 144 cpu_to_be64(rule->handle),
b46f6ded 145 NFTA_TRACE_PAD);
33d5a7b1
FW
146}
147
0a202145
FW
148static bool nft_trace_have_verdict_chain(const struct nft_verdict *verdict,
149 struct nft_traceinfo *info)
b7263e07
PS
150{
151 switch (info->type) {
152 case NFT_TRACETYPE_RETURN:
153 case NFT_TRACETYPE_RULE:
154 break;
155 default:
156 return false;
157 }
158
0a202145 159 switch (verdict->code) {
b7263e07
PS
160 case NFT_JUMP:
161 case NFT_GOTO:
162 break;
163 default:
164 return false;
165 }
166
167 return true;
168}
169
46df4175
FW
170static const struct nft_chain *nft_trace_get_chain(const struct nft_rule_dp *rule,
171 const struct nft_traceinfo *info)
63e9bbbc 172{
63e9bbbc
FW
173 const struct nft_rule_dp_last *last;
174
175 if (!rule)
176 return &info->basechain->chain;
177
178 while (!rule->is_last)
179 rule = nft_rule_next(rule);
180
181 last = (const struct nft_rule_dp_last *)rule;
182
183 if (WARN_ON_ONCE(!last->chain))
184 return &info->basechain->chain;
185
186 return last->chain;
187}
188
698bb828 189void nft_trace_notify(const struct nft_pktinfo *pkt,
0a202145 190 const struct nft_verdict *verdict,
46df4175 191 const struct nft_rule_dp *rule,
698bb828 192 struct nft_traceinfo *info)
33d5a7b1 193{
63e9bbbc 194 const struct nft_chain *chain;
33d5a7b1
FW
195 struct nlmsghdr *nlh;
196 struct sk_buff *skb;
197 unsigned int size;
e34b9ed9 198 u32 mark = 0;
dedb67c4 199 u16 event;
33d5a7b1 200
0e5a1c7e 201 if (!nfnetlink_has_listeners(nft_net(pkt), NFNLGRP_NFTRACE))
33d5a7b1
FW
202 return;
203
46df4175 204 chain = nft_trace_get_chain(rule, info);
63e9bbbc 205
33d5a7b1 206 size = nlmsg_total_size(sizeof(struct nfgenmsg)) +
63e9bbbc
FW
207 nla_total_size(strlen(chain->table->name)) +
208 nla_total_size(strlen(chain->name)) +
b46f6ded 209 nla_total_size_64bit(sizeof(__be64)) + /* rule handle */
33d5a7b1
FW
210 nla_total_size(sizeof(__be32)) + /* trace type */
211 nla_total_size(0) + /* VERDICT, nested */
212 nla_total_size(sizeof(u32)) + /* verdict code */
33d5a7b1
FW
213 nla_total_size(sizeof(u32)) + /* id */
214 nla_total_size(NFT_TRACETYPE_LL_HSIZE) +
215 nla_total_size(NFT_TRACETYPE_NETWORK_HSIZE) +
216 nla_total_size(NFT_TRACETYPE_TRANSPORT_HSIZE) +
217 nla_total_size(sizeof(u32)) + /* iif */
218 nla_total_size(sizeof(__be16)) + /* iiftype */
219 nla_total_size(sizeof(u32)) + /* oif */
220 nla_total_size(sizeof(__be16)) + /* oiftype */
221 nla_total_size(sizeof(u32)) + /* mark */
222 nla_total_size(sizeof(u32)) + /* nfproto */
223 nla_total_size(sizeof(u32)); /* policy */
224
0a202145
FW
225 if (nft_trace_have_verdict_chain(verdict, info))
226 size += nla_total_size(strlen(verdict->chain->name)); /* jump target */
b7263e07 227
33d5a7b1
FW
228 skb = nlmsg_new(size, GFP_ATOMIC);
229 if (!skb)
230 return;
231
dedb67c4 232 event = nfnl_msg_type(NFNL_SUBSYS_NFTABLES, NFT_MSG_TRACE);
19c28b13
PNA
233 nlh = nfnl_msg_put(skb, 0, 0, event, 0, info->basechain->type->family,
234 NFNETLINK_V0, 0);
33d5a7b1
FW
235 if (!nlh)
236 goto nla_put_failure;
237
0e5a1c7e 238 if (nla_put_be32(skb, NFTA_TRACE_NFPROTO, htonl(nft_pf(pkt))))
33d5a7b1
FW
239 goto nla_put_failure;
240
241 if (nla_put_be32(skb, NFTA_TRACE_TYPE, htonl(info->type)))
242 goto nla_put_failure;
243
e34b9ed9 244 if (nla_put_u32(skb, NFTA_TRACE_ID, info->skbid))
33d5a7b1
FW
245 goto nla_put_failure;
246
63e9bbbc 247 if (nla_put_string(skb, NFTA_TRACE_CHAIN, chain->name))
6e692678
PS
248 goto nla_put_failure;
249
63e9bbbc 250 if (nla_put_string(skb, NFTA_TRACE_TABLE, chain->table->name))
6e692678 251 goto nla_put_failure;
33d5a7b1 252
46df4175 253 if (nf_trace_fill_rule_info(skb, verdict, rule, info))
33d5a7b1
FW
254 goto nla_put_failure;
255
256 switch (info->type) {
257 case NFT_TRACETYPE_UNSPEC:
258 case __NFT_TRACETYPE_MAX:
259 break;
260 case NFT_TRACETYPE_RETURN:
261 case NFT_TRACETYPE_RULE:
0a202145 262 if (nft_verdict_dump(skb, NFTA_TRACE_VERDICT, verdict))
33d5a7b1 263 goto nla_put_failure;
e34b9ed9
FW
264
265 /* pkt->skb undefined iff NF_STOLEN, disable dump */
0a202145 266 if (verdict->code == NF_STOLEN)
e34b9ed9
FW
267 info->packet_dumped = true;
268 else
269 mark = pkt->skb->mark;
270
33d5a7b1
FW
271 break;
272 case NFT_TRACETYPE_POLICY:
e34b9ed9
FW
273 mark = pkt->skb->mark;
274
33d5a7b1 275 if (nla_put_be32(skb, NFTA_TRACE_POLICY,
5210d393 276 htonl(info->basechain->policy)))
33d5a7b1
FW
277 goto nla_put_failure;
278 break;
279 }
280
e34b9ed9 281 if (mark && nla_put_be32(skb, NFTA_TRACE_MARK, htonl(mark)))
33d5a7b1
FW
282 goto nla_put_failure;
283
284 if (!info->packet_dumped) {
0e5a1c7e 285 if (nf_trace_fill_dev_info(skb, nft_in(pkt), nft_out(pkt)))
33d5a7b1
FW
286 goto nla_put_failure;
287
288 if (nf_trace_fill_pkt_info(skb, pkt))
289 goto nla_put_failure;
290 info->packet_dumped = true;
291 }
292
293 nlmsg_end(skb, nlh);
0e5a1c7e 294 nfnetlink_send(skb, nft_net(pkt), 0, NFNLGRP_NFTRACE, 0, GFP_ATOMIC);
33d5a7b1
FW
295 return;
296
297 nla_put_failure:
298 WARN_ON_ONCE(1);
299 kfree_skb(skb);
300}
301
302void nft_trace_init(struct nft_traceinfo *info, const struct nft_pktinfo *pkt,
33d5a7b1
FW
303 const struct nft_chain *chain)
304{
e34b9ed9
FW
305 static siphash_key_t trace_key __read_mostly;
306 struct sk_buff *skb = pkt->skb;
307
33d5a7b1
FW
308 info->basechain = nft_base_chain(chain);
309 info->trace = true;
e34b9ed9 310 info->nf_trace = pkt->skb->nf_trace;
33d5a7b1 311 info->packet_dumped = false;
e34b9ed9
FW
312
313 net_get_random_once(&trace_key, sizeof(trace_key));
314
315 info->skbid = (u32)siphash_3u32(hash32_ptr(skb),
316 skb_get_hash(skb),
317 skb->skb_iif,
318 &trace_key);
33d5a7b1 319}