]> granicus.if.org Git - strace/blobdiff - netlink.c
mem: decode hugetlb page size in mmap flags
[strace] / netlink.c
index 947e52dff59c1cec824c6766fbebcaa18b376801..6b9a1f5cc1a9749d54155c9100deba509aa7bc14 100644 (file)
--- a/netlink.c
+++ b/netlink.c
 #include <linux/rtnetlink.h>
 #include <linux/xfrm.h>
 #include "xlat/netlink_ack_flags.h"
+#include "xlat/netlink_delete_flags.h"
 #include "xlat/netlink_flags.h"
 #include "xlat/netlink_get_flags.h"
 #include "xlat/netlink_new_flags.h"
 #include "xlat/netlink_protocols.h"
 #include "xlat/netlink_types.h"
+#include "xlat/nf_acct_msg_types.h"
+#include "xlat/nf_cthelper_msg_types.h"
+#include "xlat/nf_ctnetlink_exp_msg_types.h"
+#include "xlat/nf_ctnetlink_msg_types.h"
+#include "xlat/nf_cttimeout_msg_types.h"
+#include "xlat/nf_ipset_msg_types.h"
+#include "xlat/nf_nft_compat_msg_types.h"
+#include "xlat/nf_nftables_msg_types.h"
+#include "xlat/nf_osf_msg_types.h"
+#include "xlat/nf_queue_msg_types.h"
+#include "xlat/nf_ulog_msg_types.h"
 #include "xlat/nl_audit_types.h"
 #include "xlat/nl_crypto_types.h"
 #include "xlat/nl_netfilter_msg_types.h"
 #include "xlat/nl_netfilter_subsys_ids.h"
-#include "xlat/nl_route_types.h"
 #include "xlat/nl_selinux_types.h"
 #include "xlat/nl_sock_diag_types.h"
 #include "xlat/nl_xfrm_types.h"
@@ -67,25 +78,20 @@ fetch_nlmsghdr(struct tcb *const tcp, struct nlmsghdr *const nlmsghdr,
        return true;
 }
 
-enum {
-       NL_FAMILY_ERROR = -1,
-       NL_FAMILY_DEFAULT = -2
-};
-
 static int
 get_fd_nl_family(struct tcb *const tcp, const int fd)
 {
        const unsigned long inode = getfdinode(tcp, fd);
        if (!inode)
-               return NL_FAMILY_ERROR;
+               return -1;
 
        const char *const details = get_sockaddr_by_inode(tcp, fd, inode);
        if (!details)
-               return NL_FAMILY_ERROR;
+               return -1;
 
        const char *const nl_details = STR_STRIP_PREFIX(details, "NETLINK:[");
        if (nl_details == details)
-               return NL_FAMILY_ERROR;
+               return -1;
 
        const struct xlat *xlats = netlink_protocols;
        for (; xlats->str; ++xlats) {
@@ -97,7 +103,7 @@ get_fd_nl_family(struct tcb *const tcp, const int fd)
        if (*nl_details >= '0' && *nl_details <= '9')
                return atoi(nl_details);
 
-       return NL_FAMILY_ERROR;
+       return -1;
 }
 
 static void
@@ -116,6 +122,38 @@ decode_nlmsg_type_generic(const struct xlat *const xlat,
        printxval(genl_families_xlat(), type, dflt);
 }
 
+static const struct {
+       const struct xlat *const xlat;
+       const char *const dflt;
+} nf_nlmsg_types[] = {
+       [NFNL_SUBSYS_CTNETLINK] = {
+               nf_ctnetlink_msg_types,
+               "IPCTNL_MSG_CT_???"
+       },
+       [NFNL_SUBSYS_CTNETLINK_EXP] = {
+               nf_ctnetlink_exp_msg_types,
+               "IPCTNL_MSG_EXP_???"
+       },
+       [NFNL_SUBSYS_QUEUE] = { nf_queue_msg_types, "NFQNL_MSG_???" },
+       [NFNL_SUBSYS_ULOG] = { nf_ulog_msg_types, "NFULNL_MSG_???" },
+       [NFNL_SUBSYS_OSF] = { nf_osf_msg_types, "OSF_MSG_???" },
+       [NFNL_SUBSYS_IPSET] = { nf_ipset_msg_types, "IPSET_CMD_???" },
+       [NFNL_SUBSYS_ACCT] = { nf_acct_msg_types, "NFNL_MSG_ACCT_???" },
+       [NFNL_SUBSYS_CTNETLINK_TIMEOUT] = {
+               nf_cttimeout_msg_types,
+               "IPCTNL_MSG_TIMEOUT_???"
+       },
+       [NFNL_SUBSYS_CTHELPER] = {
+               nf_cthelper_msg_types,
+               "NFNL_MSG_CTHELPER_???"
+       },
+       [NFNL_SUBSYS_NFTABLES] = { nf_nftables_msg_types, "NFT_MSG_???" },
+       [NFNL_SUBSYS_NFT_COMPAT] = {
+               nf_nft_compat_msg_types,
+               "NFNL_MSG_COMPAT_???"
+       }
+};
+
 static void
 decode_nlmsg_type_netfilter(const struct xlat *const xlat,
                            const uint16_t type,
@@ -137,11 +175,12 @@ decode_nlmsg_type_netfilter(const struct xlat *const xlat,
 
        printxval(xlat, subsys_id, dflt);
 
-       /*
-        * The type is subsystem specific,
-        * print it in numeric format for now.
-        */
-       tprintf("<<8|%#x", msg_type);
+       tprints("<<8|");
+       if (subsys_id < ARRAY_SIZE(nf_nlmsg_types))
+               printxval(nf_nlmsg_types[subsys_id].xlat,
+                         msg_type, nf_nlmsg_types[subsys_id].dflt);
+       else
+               tprintf("%#x", msg_type);
 }
 
 typedef void (*nlmsg_types_decoder_t)(const struct xlat *,
@@ -173,7 +212,7 @@ static const struct {
 
 /*
  * As all valid netlink families are positive integers, use unsigned int
- * for family here to filter out NL_FAMILY_ERROR and NL_FAMILY_DEFAULT.
+ * for family here to filter out -1.
  */
 static void
 decode_nlmsg_type(const uint16_t type, const unsigned int family)
@@ -182,7 +221,11 @@ decode_nlmsg_type(const uint16_t type, const unsigned int family)
        const struct xlat *xlat = netlink_types;
        const char *dflt = "NLMSG_???";
 
-       if (type != NLMSG_DONE && family < ARRAY_SIZE(nlmsg_types)) {
+       /*
+        * type < NLMSG_MIN_TYPE are reserved control messages
+        * that need no family-specific decoding.
+        */
+       if (type >= NLMSG_MIN_TYPE && family < ARRAY_SIZE(nlmsg_types)) {
                if (nlmsg_types[family].decoder)
                        decoder = nlmsg_types[family].decoder;
                if (nlmsg_types[family].xlat)
@@ -194,103 +237,225 @@ decode_nlmsg_type(const uint16_t type, const unsigned int family)
        decoder(xlat, type, dflt);
 }
 
-static void
-decode_nlmsg_flags(const uint16_t flags, const uint16_t type, const int family)
+static const struct xlat *
+decode_nlmsg_flags_crypto(const uint16_t type)
 {
-       const struct xlat *table = NULL;
-
-       if (type < NLMSG_MIN_TYPE) {
-               if (type == NLMSG_ERROR)
-                       table = netlink_ack_flags;
-               goto end;
+       switch (type) {
+       case CRYPTO_MSG_NEWALG:
+               return netlink_new_flags;
+       case CRYPTO_MSG_DELALG:
+       case CRYPTO_MSG_DELRNG:
+               return netlink_delete_flags;
+       case CRYPTO_MSG_GETALG:
+               return netlink_get_flags;
        }
 
-       switch (family) {
-       case NETLINK_CRYPTO:
-               switch (type) {
-               case CRYPTO_MSG_NEWALG:
-                       table = netlink_new_flags;
-                       break;
-               case CRYPTO_MSG_GETALG:
-                       table = netlink_get_flags;
-                       break;
+       return NULL;
+}
+
+static const struct xlat *
+decode_nlmsg_flags_netfilter(const uint16_t type)
+{
+       const uint8_t subsys_id = (uint8_t) (type >> 8);
+       const uint8_t msg_type = (uint8_t) type;
+
+       switch (subsys_id) {
+       case NFNL_SUBSYS_CTNETLINK:
+               switch (msg_type) {
+               case IPCTNL_MSG_CT_NEW:
+                       return netlink_new_flags;
+               case IPCTNL_MSG_CT_GET:
+               case IPCTNL_MSG_CT_GET_CTRZERO:
+               case IPCTNL_MSG_CT_GET_STATS_CPU:
+               case IPCTNL_MSG_CT_GET_STATS:
+               case IPCTNL_MSG_CT_GET_DYING:
+               case IPCTNL_MSG_CT_GET_UNCONFIRMED:
+                       return netlink_get_flags;
+               case IPCTNL_MSG_CT_DELETE:
+                       return netlink_delete_flags;
+               }
+               break;
+       case NFNL_SUBSYS_CTNETLINK_EXP:
+               switch (msg_type) {
+               case IPCTNL_MSG_EXP_NEW:
+                       return netlink_new_flags;
+               case IPCTNL_MSG_EXP_GET:
+               case IPCTNL_MSG_EXP_GET_STATS_CPU:
+                       return netlink_get_flags;
+               case IPCTNL_MSG_EXP_DELETE:
+                       return netlink_delete_flags;
                }
                break;
-       case NETLINK_SOCK_DIAG:
-               table = netlink_get_flags;
+       case NFNL_SUBSYS_ACCT:
+               switch (msg_type) {
+               case NFNL_MSG_ACCT_NEW:
+                       return netlink_new_flags;
+               case NFNL_MSG_ACCT_GET:
+               case NFNL_MSG_ACCT_GET_CTRZERO:
+                       return netlink_get_flags;
+               case NFNL_MSG_ACCT_DEL:
+                       return netlink_delete_flags;
+               }
                break;
-       case NETLINK_ROUTE:
-               if (type == RTM_DELACTION) {
-                       table = netlink_get_flags;
-                       break;
+       case NFNL_SUBSYS_CTNETLINK_TIMEOUT:
+               switch (msg_type) {
+               case IPCTNL_MSG_TIMEOUT_NEW:
+                       return netlink_new_flags;
+               case IPCTNL_MSG_TIMEOUT_GET:
+                       return netlink_get_flags;
+               case IPCTNL_MSG_TIMEOUT_DELETE:
+                       return netlink_delete_flags;
                }
-               switch (type & 3) {
-               case  0:
-                       table = netlink_new_flags;
-                       break;
-               case  2:
-                       table = netlink_get_flags;
-                       break;
+               break;
+       case NFNL_SUBSYS_CTHELPER:
+               switch (msg_type) {
+               case NFNL_MSG_CTHELPER_NEW:
+                       return netlink_new_flags;
+               case NFNL_MSG_CTHELPER_GET:
+                       return netlink_get_flags;
+               case NFNL_MSG_CTHELPER_DEL:
+                       return netlink_delete_flags;
                }
                break;
-       case NETLINK_XFRM:
-               switch (type) {
-               case XFRM_MSG_NEWSA:
-               case XFRM_MSG_NEWPOLICY:
-               case XFRM_MSG_NEWAE:
-               case XFRM_MSG_NEWSADINFO:
-               case XFRM_MSG_NEWSPDINFO:
-                       table = netlink_new_flags;
-                       break;
-
-               case XFRM_MSG_GETSA:
-               case XFRM_MSG_GETPOLICY:
-               case XFRM_MSG_GETAE:
-               case XFRM_MSG_GETSADINFO:
-               case XFRM_MSG_GETSPDINFO:
-                       table = netlink_get_flags;
-                       break;
+       case NFNL_SUBSYS_NFTABLES:
+               switch (msg_type) {
+               case NFT_MSG_NEWTABLE:
+               case NFT_MSG_NEWCHAIN:
+               case NFT_MSG_NEWRULE:
+               case NFT_MSG_NEWSET:
+               case NFT_MSG_NEWSETELEM:
+               case NFT_MSG_NEWGEN:
+               case NFT_MSG_NEWOBJ:
+                       return netlink_new_flags;
+               case NFT_MSG_GETTABLE:
+               case NFT_MSG_GETCHAIN:
+               case NFT_MSG_GETRULE:
+               case NFT_MSG_GETSET:
+               case NFT_MSG_GETSETELEM:
+               case NFT_MSG_GETGEN:
+               case NFT_MSG_GETOBJ:
+               case NFT_MSG_GETOBJ_RESET:
+                       return netlink_get_flags;
+               case NFT_MSG_DELTABLE:
+               case NFT_MSG_DELCHAIN:
+               case NFT_MSG_DELRULE:
+               case NFT_MSG_DELSET:
+               case NFT_MSG_DELSETELEM:
+               case NFT_MSG_DELOBJ:
+                       return netlink_delete_flags;
+               }
+               break;
+       case NFNL_SUBSYS_NFT_COMPAT:
+               switch (msg_type) {
+               case NFNL_MSG_COMPAT_GET:
+                       return netlink_get_flags;
                }
                break;
        }
 
-end:
+       return NULL;
+}
+
+static const struct xlat *
+decode_nlmsg_flags_route(const uint16_t type)
+{
+       /* RTM_DELACTION uses NLM_F_ROOT flags */
+       if (type == RTM_DELACTION)
+               return netlink_get_flags;
+       switch (type & 3) {
+       case  0:
+               return netlink_new_flags;
+       case  1:
+               return netlink_delete_flags;
+       case  2:
+               return netlink_get_flags;
+       }
+
+       return NULL;
+}
+
+static const struct xlat *
+decode_nlmsg_flags_sock_diag(const uint16_t type)
+{
+       return netlink_get_flags;
+}
+
+static const struct xlat *
+decode_nlmsg_flags_xfrm(const uint16_t type)
+{
+       switch (type) {
+       case XFRM_MSG_NEWSA:
+       case XFRM_MSG_NEWPOLICY:
+       case XFRM_MSG_NEWAE:
+       case XFRM_MSG_NEWSADINFO:
+       case XFRM_MSG_NEWSPDINFO:
+               return netlink_new_flags;
+       case XFRM_MSG_DELSA:
+       case XFRM_MSG_DELPOLICY:
+               return netlink_delete_flags;
+       case XFRM_MSG_GETSA:
+       case XFRM_MSG_GETPOLICY:
+       case XFRM_MSG_GETAE:
+       case XFRM_MSG_GETSADINFO:
+       case XFRM_MSG_GETSPDINFO:
+               return netlink_get_flags;
+       }
+
+       return NULL;
+}
+
+typedef const struct xlat *(*nlmsg_flags_decoder_t)(const uint16_t type);
+
+static const nlmsg_flags_decoder_t nlmsg_flags[] = {
+       [NETLINK_CRYPTO] = decode_nlmsg_flags_crypto,
+       [NETLINK_NETFILTER] = decode_nlmsg_flags_netfilter,
+       [NETLINK_ROUTE] = decode_nlmsg_flags_route,
+       [NETLINK_SOCK_DIAG] = decode_nlmsg_flags_sock_diag,
+       [NETLINK_XFRM] = decode_nlmsg_flags_xfrm
+};
+
+/*
+ * As all valid netlink families are positive integers, use unsigned int
+ * for family here to filter out -1.
+ */
+static void
+decode_nlmsg_flags(const uint16_t flags, const uint16_t type,
+                  const unsigned int family)
+{
+       const struct xlat *table = NULL;
+
+       if (type < NLMSG_MIN_TYPE) {
+               if (type == NLMSG_ERROR)
+                       table = netlink_ack_flags;
+       } else if (family < ARRAY_SIZE(nlmsg_flags) && nlmsg_flags[family])
+               table = nlmsg_flags[family](type);
+
        printflags_ex(flags, "NLM_F_???", netlink_flags, table, NULL);
 }
 
-static int
+static void
 print_nlmsghdr(struct tcb *tcp,
               const int fd,
-              int family,
+              const int family,
               const struct nlmsghdr *const nlmsghdr)
 {
        /* print the whole structure regardless of its nlmsg_len */
 
        tprintf("{len=%u, type=", nlmsghdr->nlmsg_len);
 
-       const int hdr_family = (nlmsghdr->nlmsg_type < NLMSG_MIN_TYPE
-                               && nlmsghdr->nlmsg_type != NLMSG_DONE)
-                              ? NL_FAMILY_DEFAULT
-                              : (family != NL_FAMILY_DEFAULT
-                                 ? family : get_fd_nl_family(tcp, fd));
-
-       decode_nlmsg_type(nlmsghdr->nlmsg_type, hdr_family);
+       decode_nlmsg_type(nlmsghdr->nlmsg_type, family);
 
        tprints(", flags=");
        decode_nlmsg_flags(nlmsghdr->nlmsg_flags,
-                          nlmsghdr->nlmsg_type, hdr_family);
+                          nlmsghdr->nlmsg_type, family);
 
        tprintf(", seq=%u, pid=%u}", nlmsghdr->nlmsg_seq,
                nlmsghdr->nlmsg_pid);
-
-       return family != NL_FAMILY_DEFAULT ? family : hdr_family;
 }
 
 static bool
-print_cookie(struct tcb *const tcp,
-           void *const elem_buf,
-           const size_t elem_size,
-           void *const opaque_data)
+print_cookie(struct tcb *const tcp, void *const elem_buf,
+            const size_t elem_size, void *const opaque_data)
 {
        tprintf("%" PRIu8, *(uint8_t *) elem_buf);
 
@@ -321,7 +486,7 @@ static const nla_decoder_t nlmsgerr_nla_decoders[] = {
 static void
 decode_nlmsghdr_with_payload(struct tcb *const tcp,
                             const int fd,
-                            int family,
+                            const int family,
                             const struct nlmsghdr *const nlmsghdr,
                             const kernel_ulong_t addr,
                             const kernel_ulong_t len);
@@ -383,6 +548,7 @@ static const netlink_decoder_t netlink_decoders[] = {
 #ifdef HAVE_LINUX_CRYPTOUSER_H
        [NETLINK_CRYPTO] = decode_netlink_crypto,
 #endif
+       [NETLINK_ROUTE] = decode_netlink_route,
        [NETLINK_SELINUX] = decode_netlink_selinux,
        [NETLINK_SOCK_DIAG] = decode_netlink_sock_diag
 };
@@ -401,7 +567,18 @@ decode_payload(struct tcb *const tcp,
                return;
        }
 
-       if ((unsigned int) family < ARRAY_SIZE(netlink_decoders)
+       /*
+        * While most of NLMSG_DONE messages indeed have payloads
+        * containing just a single integer, there are few exceptions,
+        * so pass payloads of NLMSG_DONE messages to family-specific
+        * netlink payload decoders.
+        *
+        * Other types of reserved control messages need no family-specific
+        * netlink payload decoding.
+        */
+       if ((nlmsghdr->nlmsg_type >= NLMSG_MIN_TYPE
+           || nlmsghdr->nlmsg_type == NLMSG_DONE)
+           && (unsigned int) family < ARRAY_SIZE(netlink_decoders)
            && netlink_decoders[family]
            && netlink_decoders[family](tcp, nlmsghdr, addr, len)) {
                return;
@@ -421,7 +598,7 @@ decode_payload(struct tcb *const tcp,
 static void
 decode_nlmsghdr_with_payload(struct tcb *const tcp,
                             const int fd,
-                            int family,
+                            const int family,
                             const struct nlmsghdr *const nlmsghdr,
                             const kernel_ulong_t addr,
                             const kernel_ulong_t len)
@@ -432,7 +609,7 @@ decode_nlmsghdr_with_payload(struct tcb *const tcp,
        if (nlmsg_len > NLMSG_HDRLEN)
                tprints("{");
 
-       family = print_nlmsghdr(tcp, fd, family, nlmsghdr);
+       print_nlmsghdr(tcp, fd, family, nlmsghdr);
 
        if (nlmsg_len > NLMSG_HDRLEN) {
                tprints(", ");
@@ -448,6 +625,13 @@ decode_netlink(struct tcb *const tcp,
               kernel_ulong_t addr,
               kernel_ulong_t len)
 {
+       const int family = get_fd_nl_family(tcp, fd);
+
+       if (family == NETLINK_KOBJECT_UEVENT) {
+               printstrn(tcp, addr, len);
+               return;
+       }
+
        struct nlmsghdr nlmsghdr;
        bool print_array = false;
        unsigned int elt;
@@ -474,7 +658,7 @@ decode_netlink(struct tcb *const tcp,
                        print_array = true;
                }
 
-               decode_nlmsghdr_with_payload(tcp, fd, NL_FAMILY_DEFAULT,
+               decode_nlmsghdr_with_payload(tcp, fd, family,
                                             &nlmsghdr, addr, len);
 
                if (!next_addr)