The branch main has been updated by kp: URL: https://cgit.FreeBSD.org/src/commit/?id=1ba1e152f8889865e58df6c64d1e595f81f0babc
commit 1ba1e152f8889865e58df6c64d1e595f81f0babc Author: Kristof Provost <k...@freebsd.org> AuthorDate: 2025-02-14 10:06:26 +0000 Commit: Kristof Provost <k...@freebsd.org> CommitDate: 2025-02-21 08:11:03 +0000 pf: make log(matches) more useful change log(matches) semantics slightly to make it more useful. since it is a debug tool change of semantics not considered problematic. up until now, log(matches) forced logging on subsequent matching rules, the actual logging used the log settings from that matched rule. now, log(matches) causes subsequent matches to be logged with the log settings from the log(matches) rule. in particular (this was the driving point), log(matches, to pflog23) allows you to have the trace log going to a seperate pflog interface, not clobbering your regular pflogs, actually not affecting them at all. long conversation with bluhm about it, which didn't lead to a single bit changed in the diff but was very very helpful. ok bluhm as well. Obtained from: OpenBSD, henning <henn...@openbsd.org>, f61b1efcce Sponsored by: Rubicon Communications, LLC ("Netgate") --- sys/net/if_pflog.h | 4 ++-- sys/net/pfvar.h | 2 +- sys/netpfil/pf/if_pflog.c | 11 +++++++---- sys/netpfil/pf/pf.c | 41 ++++++++++++++++++++++++++++++----------- sys/netpfil/pf/pf_norm.c | 6 +++--- 5 files changed, 43 insertions(+), 21 deletions(-) diff --git a/sys/net/if_pflog.h b/sys/net/if_pflog.h index dc22c05cdea0..906f700b54e3 100644 --- a/sys/net/if_pflog.h +++ b/sys/net/if_pflog.h @@ -69,9 +69,9 @@ struct pf_ruleset; struct pfi_kif; struct pf_pdesc; -#define PFLOG_PACKET(b,t,c,d,e,f,g) do { \ +#define PFLOG_PACKET(b,t,c,d,e,f,g,h) do { \ if (pflog_packet_ptr != NULL) \ - pflog_packet_ptr(b,t,c,d,e,f,g); \ + pflog_packet_ptr(b,t,c,d,e,f,g,h); \ } while (0) #endif /* _KERNEL */ #endif /* _NET_IF_PFLOG_H_ */ diff --git a/sys/net/pfvar.h b/sys/net/pfvar.h index 0295bcc125f8..b481f767725d 100644 --- a/sys/net/pfvar.h +++ b/sys/net/pfvar.h @@ -1277,7 +1277,7 @@ struct pf_kruleset; struct pf_pdesc; typedef int pflog_packet_t(uint8_t, u_int8_t, struct pf_krule *, struct pf_krule *, struct pf_kruleset *, - struct pf_pdesc *, int); + struct pf_pdesc *, int, struct pf_krule *); extern pflog_packet_t *pflog_packet_ptr; #endif /* _KERNEL */ diff --git a/sys/netpfil/pf/if_pflog.c b/sys/netpfil/pf/if_pflog.c index 016ff96b02b4..6a87ea2471cb 100644 --- a/sys/netpfil/pf/if_pflog.c +++ b/sys/netpfil/pf/if_pflog.c @@ -243,18 +243,21 @@ pflogioctl(struct ifnet *ifp, u_long cmd, caddr_t data) static int pflog_packet(uint8_t action, u_int8_t reason, struct pf_krule *rm, struct pf_krule *am, - struct pf_kruleset *ruleset, struct pf_pdesc *pd, int lookupsafe) + struct pf_kruleset *ruleset, struct pf_pdesc *pd, int lookupsafe, + struct pf_krule *trigger) { struct ifnet *ifn; struct pfloghdr hdr; if (rm == NULL || pd == NULL) return (1); + if (trigger == NULL) + trigger = rm; - if (rm->logif > V_npflogifs) + if (trigger->logif > V_npflogifs) return (0); - ifn = V_pflogifs[rm->logif]; + ifn = V_pflogifs[trigger->logif]; if (ifn == NULL || !bpf_peers_present(ifn->if_bpf)) return (0); @@ -281,7 +284,7 @@ pflog_packet(uint8_t action, u_int8_t reason, * state lock, since this leads to unsafe LOR. * These conditions are very very rare, however. */ - if (rm->log & PF_LOG_SOCKET_LOOKUP && !pd->lookup.done && lookupsafe) + if (trigger->log & PF_LOG_SOCKET_LOOKUP && !pd->lookup.done && lookupsafe) pd->lookup.done = pf_socket_lookup(pd); if (pd->lookup.done > 0) hdr.uid = pd->lookup.uid; diff --git a/sys/netpfil/pf/pf.c b/sys/netpfil/pf/pf.c index e8b7a071a3c9..153fd11f1d2c 100644 --- a/sys/netpfil/pf/pf.c +++ b/sys/netpfil/pf/pf.c @@ -386,6 +386,9 @@ static int pf_match_rcvif(struct mbuf *, struct pf_krule *); static void pf_counters_inc(int, struct pf_pdesc *, struct pf_kstate *, struct pf_krule *, struct pf_krule *); +static void pf_log_matches(struct pf_pdesc *, struct pf_krule *, + struct pf_krule *, struct pf_kruleset *, + struct pf_krule_slist *); static void pf_overload_task(void *v, int pending); static u_short pf_insert_src_node(struct pf_ksrc_node *[PF_SN_MAX], struct pf_srchash *[PF_SN_MAX], struct pf_krule *, @@ -5535,7 +5538,7 @@ pf_test_rule(struct pf_krule **rm, struct pf_kstate **sm, if (nr->log) { PFLOG_PACKET(nr->action, PFRES_MATCH, nr, a, - ruleset, pd, 1); + ruleset, pd, 1, NULL); } if (pd->ip_sum) @@ -5826,18 +5829,17 @@ pf_test_rule(struct pf_krule **rm, struct pf_kstate **sm, goto cleanup; } } - if (r->log || pd->act.log & PF_LOG_MATCHES) + if (r->log) PFLOG_PACKET(r->action, PFRES_MATCH, r, - a, ruleset, pd, 1); + a, ruleset, pd, 1, NULL); } else { match = asd; *rm = r; *am = a; *rsm = ruleset; - if (pd->act.log & PF_LOG_MATCHES) - PFLOG_PACKET(r->action, PFRES_MATCH, r, - a, ruleset, pd, 1); } + if (pd->act.log & PF_LOG_MATCHES) + pf_log_matches(pd, r, a, ruleset, &match_rules); if (r->quick) break; r = TAILQ_NEXT(r, entries); @@ -5866,12 +5868,13 @@ nextrule: } } - if (r->log || pd->act.log & PF_LOG_MATCHES) { + if (r->log) { if (rewrite) m_copyback(pd->m, pd->off, pd->hdrlen, pd->hdr.any); - PFLOG_PACKET(r->action, reason, r, a, ruleset, pd, 1); + PFLOG_PACKET(r->action, reason, r, a, ruleset, pd, 1, NULL); } - + if (pd->act.log & PF_LOG_MATCHES) + pf_log_matches(pd, r, a, ruleset, &match_rules); if (pd->virtual_proto != PF_VPROTO_FRAGMENT && (r->action == PF_DROP) && ((r->rule_flag & PFRULE_RETURNRST) || @@ -10092,6 +10095,22 @@ pf_counters_inc(int action, struct pf_pdesc *pd, } pf_counter_u64_critical_exit(); } +static void +pf_log_matches(struct pf_pdesc *pd, struct pf_krule *rm, + struct pf_krule *am, struct pf_kruleset *ruleset, + struct pf_krule_slist *matchrules) +{ + struct pf_krule_item *ri; + + /* if this is the log(matches) rule, packet has been logged already */ + if (rm->log & PF_LOG_MATCHES) + return; + + SLIST_FOREACH(ri, matchrules, entry) + if (ri->r->log & PF_LOG_MATCHES) + PFLOG_PACKET(rm->action, PFRES_MATCH, rm, am, + ruleset, pd, 1, ri->r); +} #if defined(INET) || defined(INET6) int @@ -10495,12 +10514,12 @@ done: if (pd.act.log & PF_LOG_FORCE || lr->log & PF_LOG_ALL) PFLOG_PACKET(action, reason, lr, a, - ruleset, &pd, (s == NULL)); + ruleset, &pd, (s == NULL), NULL); if (s) { SLIST_FOREACH(ri, &s->match_rules, entry) if (ri->r->log & PF_LOG_ALL) PFLOG_PACKET(action, - reason, ri->r, a, ruleset, &pd, 0); + reason, ri->r, a, ruleset, &pd, 0, NULL); } } diff --git a/sys/netpfil/pf/pf_norm.c b/sys/netpfil/pf/pf_norm.c index 57b9549df5e0..ac74434cf2b7 100644 --- a/sys/netpfil/pf/pf_norm.c +++ b/sys/netpfil/pf/pf_norm.c @@ -1217,7 +1217,7 @@ pf_normalize_ip(u_short *reason, struct pf_pdesc *pd) REASON_SET(reason, PFRES_FRAG); drop: if (r != NULL && r->log) - PFLOG_PACKET(PF_DROP, *reason, r, NULL, NULL, pd, 1); + PFLOG_PACKET(PF_DROP, *reason, r, NULL, NULL, pd, 1, NULL); return (PF_DROP); } @@ -1421,7 +1421,7 @@ pf_normalize_tcp(struct pf_pdesc *pd) tcp_drop: REASON_SET(&reason, PFRES_NORM); if (rm != NULL && r->log) - PFLOG_PACKET(PF_DROP, reason, r, NULL, NULL, pd, 1); + PFLOG_PACKET(PF_DROP, reason, r, NULL, NULL, pd, 1, NULL); return (PF_DROP); } @@ -2185,7 +2185,7 @@ sctp_drop: REASON_SET(&reason, PFRES_NORM); if (rm != NULL && r->log) PFLOG_PACKET(PF_DROP, reason, r, NULL, NULL, pd, - 1); + 1, NULL); return (PF_DROP); }