]> The Tcpdump Group git mirrors - tcpdump/blobdiff - print-nflog.c
CI: Add warning exemptions for Sun C (suncc-5.15) on Solaris 10
[tcpdump] / print-nflog.c
index 28929747562deca767a53e93ca5c0ddea53322af..0f5b8b8d6b11c72ab1518ac588069c1c0e810a1d 100644 (file)
 
 /* \summary: DLT_NFLOG printer */
 
-#ifdef HAVE_CONFIG_H
 #include <config.h>
-#endif
 
 #include "netdissect-stdinc.h"
 
+#define ND_LONGJMP_FROM_TCHECK
 #include "netdissect.h"
 #include "extract.h"
 
@@ -55,12 +54,16 @@ typedef struct nflog_hdr {
        nd_uint16_t     nflog_rid;              /* resource ID */
 } nflog_hdr_t;
 
+#define NFLOG_HDR_LEN sizeof(nflog_hdr_t)
+
 typedef struct nflog_tlv {
        nd_uint16_t     tlv_length;             /* tlv length */
        nd_uint16_t     tlv_type;               /* tlv type */
        /* value follows this */
 } nflog_tlv_t;
 
+#define NFLOG_TLV_LEN sizeof(nflog_tlv_t)
+
 typedef struct nflog_packet_hdr {
        nd_uint16_t     hw_protocol;    /* hw protocol */
        nd_uint8_t      hook;           /* netfilter hook */
@@ -93,17 +96,25 @@ typedef struct nflog_timestamp {
 #define NFULA_PREFIX                   10      /* text string - null-terminated, count includes NUL */
 #define NFULA_UID                      11      /* UID owning socket on which packet was sent/received */
 #define NFULA_SEQ                      12      /* sequence number of packets on this NFLOG socket */
-#define NFULA_SEQ_GLOBAL               13      /* sequence number of pakets on all NFLOG sockets */
+#define NFULA_SEQ_GLOBAL               13      /* sequence number of packets on all NFLOG sockets */
 #define NFULA_GID                      14      /* GID owning socket on which packet was sent/received */
 #define NFULA_HWTYPE                   15      /* ARPHRD_ type of skbuff's device */
 #define NFULA_HWHEADER                 16      /* skbuff's MAC-layer header */
 #define NFULA_HWLEN                    17      /* length of skbuff's MAC-layer header */
 
+/*
+ * Define two constants specifically for the two AF code points from the
+ * LINKTYPE_NFLOG specification above and use these constants instead of
+ * AF_INET and AF_INET6.  This is the only way to dissect the "wire" encoding
+ * correctly because some BSD systems define AF_INET6 differently from Linux
+ * (see af.h) and Haiku defines both AF_INET and AF_INET6 differently from
+ * Linux.
+ */
+#define NFLOG_AF_INET   2
+#define NFLOG_AF_INET6 10
 static const struct tok nflog_values[] = {
-       { AF_INET,              "IPv4" },
-#ifdef AF_INET6
-       { AF_INET6,             "IPv6" },
-#endif /*AF_INET6*/
+       { NFLOG_AF_INET,        "IPv4" },
+       { NFLOG_AF_INET6,       "IPv6" },
        { 0,                    NULL }
 };
 
@@ -111,81 +122,79 @@ static void
 nflog_hdr_print(netdissect_options *ndo, const nflog_hdr_t *hdr, u_int length)
 {
        ND_PRINT("version %u, resource ID %u",
-           EXTRACT_U_1(hdr->nflog_version), EXTRACT_BE_U_2(hdr->nflog_rid));
+           GET_U_1(hdr->nflog_version), GET_BE_U_2(hdr->nflog_rid));
 
        if (!ndo->ndo_qflag) {
                ND_PRINT(", family %s (%u)",
                         tok2str(nflog_values, "Unknown",
-                                EXTRACT_U_1(hdr->nflog_family)),
-                        EXTRACT_U_1(hdr->nflog_family));
+                                GET_U_1(hdr->nflog_family)),
+                        GET_U_1(hdr->nflog_family));
                } else {
                ND_PRINT(", %s",
                         tok2str(nflog_values,
                                 "Unknown NFLOG (0x%02x)",
-                        EXTRACT_U_1(hdr->nflog_family)));
+                        GET_U_1(hdr->nflog_family)));
                }
 
        ND_PRINT(", length %u: ", length);
 }
 
-u_int
+void
 nflog_if_print(netdissect_options *ndo,
-                          const struct pcap_pkthdr *h, const u_char *p)
+              const struct pcap_pkthdr *h, const u_char *p)
 {
        const nflog_hdr_t *hdr = (const nflog_hdr_t *)p;
        uint16_t size;
-       uint16_t h_size = sizeof(nflog_hdr_t);
+       uint16_t h_size = NFLOG_HDR_LEN;
        u_int caplen = h->caplen;
        u_int length = h->len;
 
-       ndo->ndo_protocol = "nflog_if";
-       if (caplen < sizeof(nflog_hdr_t))
-               goto trunc;
+       ndo->ndo_protocol = "nflog";
+       ND_ICHECK_ZU(length, <, NFLOG_HDR_LEN);
 
        ND_TCHECK_SIZE(hdr);
-       if (EXTRACT_U_1(hdr->nflog_version) != 0) {
-               ND_PRINT("version %u (unknown)", EXTRACT_U_1(hdr->nflog_version));
-               return h_size;
+       ndo->ndo_ll_hdr_len += NFLOG_HDR_LEN;
+
+       if (GET_U_1(hdr->nflog_version) != 0) {
+               ND_PRINT("version %u (unknown)", GET_U_1(hdr->nflog_version));
+               return;
        }
 
        if (ndo->ndo_eflag)
                nflog_hdr_print(ndo, hdr, length);
 
-       p += sizeof(nflog_hdr_t);
-       length -= sizeof(nflog_hdr_t);
-       caplen -= sizeof(nflog_hdr_t);
+       p += NFLOG_HDR_LEN;
+       length -= NFLOG_HDR_LEN;
+       caplen -= NFLOG_HDR_LEN;
 
-       while (length > 0) {
+       while (length != 0) {
                const nflog_tlv_t *tlv;
 
-               /* We have some data.  Do we have enough for the TLV header? */
-               if (caplen < sizeof(nflog_tlv_t))
-                       goto trunc;     /* No. */
-
+               ND_ICHECK_ZU(length, <, NFLOG_TLV_LEN);
                tlv = (const nflog_tlv_t *) p;
+               /* Do we have enough data for the TLV header? */
                ND_TCHECK_SIZE(tlv);
-               size = EXTRACT_HE_U_2(tlv->tlv_length);
+               size = GET_HE_U_2(tlv->tlv_length);
                if (size % 4 != 0)
                        size += 4 - size % 4;
 
                /* Is the TLV's length less than the minimum? */
-               if (size < sizeof(nflog_tlv_t))
-                       goto trunc;     /* Yes. Give up now. */
+               ND_ICHECK_ZU(size, <, NFLOG_TLV_LEN);
+               ND_ICHECK_U(length, <, size);
 
                /* Do we have enough data for the full TLV? */
-               if (caplen < size)
-                       goto trunc;     /* No. */
+               ND_TCHECK_LEN(tlv, size);
 
-               if (EXTRACT_HE_U_2(tlv->tlv_type) == NFULA_PAYLOAD) {
+               if (GET_HE_U_2(tlv->tlv_type) == NFULA_PAYLOAD) {
                        /*
                         * This TLV's data is the packet payload.
                         * Skip past the TLV header, and break out
                         * of the loop so we print the packet data.
                         */
-                       p += sizeof(nflog_tlv_t);
-                       h_size += sizeof(nflog_tlv_t);
-                       length -= sizeof(nflog_tlv_t);
-                       caplen -= sizeof(nflog_tlv_t);
+                       p += NFLOG_TLV_LEN;
+                       h_size += NFLOG_TLV_LEN;
+                       length -= NFLOG_TLV_LEN;
+                       caplen -= NFLOG_TLV_LEN;
                        break;
                }
 
@@ -195,32 +204,31 @@ nflog_if_print(netdissect_options *ndo,
                caplen -= size;
        }
 
-       switch (EXTRACT_U_1(hdr->nflog_family)) {
+       switch (GET_U_1(hdr->nflog_family)) {
 
-       case AF_INET:
+       case NFLOG_AF_INET:
                ip_print(ndo, p, length);
                break;
 
-#ifdef AF_INET6
-       case AF_INET6:
+       case NFLOG_AF_INET6:
                ip6_print(ndo, p, length);
                break;
-#endif /* AF_INET6 */
 
        default:
                if (!ndo->ndo_eflag)
                        nflog_hdr_print(ndo, hdr,
-                               length + sizeof(nflog_hdr_t));
+                                       length + NFLOG_HDR_LEN);
 
                if (!ndo->ndo_suppress_default_print)
                        ND_DEFAULTPRINT(p, caplen);
                break;
        }
 
-       return h_size;
-trunc:
-       nd_print_trunc(ndo);
-       return h_size;
+       ndo->ndo_ll_hdr_len += h_size - NFLOG_HDR_LEN;
+       return;
+
+invalid:
+       nd_print_invalid(ndo);
 }
 
 #endif /* DLT_NFLOG */