]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * netfilter module for userspace bridged Ethernet frames logging daemons | |
3 | * | |
4 | * Authors: | |
5 | * Bart De Schuymer <bdschuym@pandora.be> | |
d5228a4f | 6 | * Harald Welte <laforge@netfilter.org> |
1da177e4 LT |
7 | * |
8 | * November, 2004 | |
9 | * | |
10 | * Based on ipt_ULOG.c, which is | |
11 | * (C) 2000-2002 by Harald Welte <laforge@netfilter.org> | |
12 | * | |
9d6f229f YH |
13 | * This module accepts two parameters: |
14 | * | |
1da177e4 LT |
15 | * nlbufsiz: |
16 | * The parameter specifies how big the buffer for each netlink multicast | |
17 | * group is. e.g. If you say nlbufsiz=8192, up to eight kb of packets will | |
18 | * get accumulated in the kernel until they are sent to userspace. It is | |
19 | * NOT possible to allocate more than 128kB, and it is strongly discouraged, | |
20 | * because atomically allocating 128kB inside the network rx softirq is not | |
21 | * reliable. Please also keep in mind that this buffer size is allocated for | |
22 | * each nlgroup you are using, so the total kernel memory usage increases | |
23 | * by that factor. | |
24 | * | |
25 | * flushtimeout: | |
26 | * Specify, after how many hundredths of a second the queue should be | |
27 | * flushed even if it is not full yet. | |
28 | * | |
29 | */ | |
ff67e4e4 | 30 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
1da177e4 | 31 | #include <linux/module.h> |
5a0e3ad6 | 32 | #include <linux/slab.h> |
1da177e4 LT |
33 | #include <linux/spinlock.h> |
34 | #include <linux/socket.h> | |
35 | #include <linux/skbuff.h> | |
36 | #include <linux/kernel.h> | |
37 | #include <linux/timer.h> | |
38 | #include <linux/netlink.h> | |
39 | #include <linux/netdevice.h> | |
18219d3f | 40 | #include <linux/netfilter/x_tables.h> |
1da177e4 LT |
41 | #include <linux/netfilter_bridge/ebtables.h> |
42 | #include <linux/netfilter_bridge/ebt_ulog.h> | |
f01ffbd6 | 43 | #include <net/netfilter/nf_log.h> |
1da177e4 LT |
44 | #include <net/sock.h> |
45 | #include "../br_private.h" | |
46 | ||
c2db2924 | 47 | static unsigned int nlbufsiz = NLMSG_GOODSIZE; |
1da177e4 LT |
48 | module_param(nlbufsiz, uint, 0600); |
49 | MODULE_PARM_DESC(nlbufsiz, "netlink buffer size (number of bytes) " | |
9d6f229f | 50 | "(defaults to 4096)"); |
1da177e4 LT |
51 | |
52 | static unsigned int flushtimeout = 10; | |
53 | module_param(flushtimeout, uint, 0600); | |
54 | MODULE_PARM_DESC(flushtimeout, "buffer flush timeout (hundredths ofa second) " | |
9d6f229f | 55 | "(defaults to 10)"); |
1da177e4 LT |
56 | |
57 | typedef struct { | |
58 | unsigned int qlen; /* number of nlmsgs' in the skb */ | |
59 | struct nlmsghdr *lastnlh; /* netlink header of last msg in skb */ | |
60 | struct sk_buff *skb; /* the pre-allocated skb */ | |
61 | struct timer_list timer; /* the timer function */ | |
62 | spinlock_t lock; /* the per-queue lock */ | |
63 | } ebt_ulog_buff_t; | |
64 | ||
65 | static ebt_ulog_buff_t ulog_buffers[EBT_ULOG_MAXNLGROUPS]; | |
66 | static struct sock *ebtulognl; | |
67 | ||
68 | /* send one ulog_buff_t to userspace */ | |
69 | static void ulog_send(unsigned int nlgroup) | |
70 | { | |
71 | ebt_ulog_buff_t *ub = &ulog_buffers[nlgroup]; | |
72 | ||
73 | if (timer_pending(&ub->timer)) | |
74 | del_timer(&ub->timer); | |
75 | ||
dcb7cd97 MH |
76 | if (!ub->skb) |
77 | return; | |
78 | ||
1da177e4 LT |
79 | /* last nlmsg needs NLMSG_DONE */ |
80 | if (ub->qlen > 1) | |
81 | ub->lastnlh->nlmsg_type = NLMSG_DONE; | |
82 | ||
ac6d439d PM |
83 | NETLINK_CB(ub->skb).dst_group = nlgroup + 1; |
84 | netlink_broadcast(ebtulognl, ub->skb, 0, nlgroup + 1, GFP_ATOMIC); | |
1da177e4 LT |
85 | |
86 | ub->qlen = 0; | |
87 | ub->skb = NULL; | |
88 | } | |
89 | ||
90 | /* timer function to flush queue in flushtimeout time */ | |
91 | static void ulog_timer(unsigned long data) | |
92 | { | |
93 | spin_lock_bh(&ulog_buffers[data].lock); | |
94 | if (ulog_buffers[data].skb) | |
95 | ulog_send(data); | |
96 | spin_unlock_bh(&ulog_buffers[data].lock); | |
97 | } | |
98 | ||
99 | static struct sk_buff *ulog_alloc_skb(unsigned int size) | |
100 | { | |
101 | struct sk_buff *skb; | |
ad2ad0f9 | 102 | unsigned int n; |
1da177e4 | 103 | |
ad2ad0f9 | 104 | n = max(size, nlbufsiz); |
0a9ee813 | 105 | skb = alloc_skb(n, GFP_ATOMIC | __GFP_NOWARN); |
1da177e4 | 106 | if (!skb) { |
ad2ad0f9 | 107 | if (n > size) { |
1da177e4 LT |
108 | /* try to allocate only as much as we need for |
109 | * current packet */ | |
110 | skb = alloc_skb(size, GFP_ATOMIC); | |
111 | if (!skb) | |
0a9ee813 JP |
112 | pr_debug("cannot even allocate buffer of size %ub\n", |
113 | size); | |
1da177e4 LT |
114 | } |
115 | } | |
116 | ||
117 | return skb; | |
118 | } | |
119 | ||
d5228a4f | 120 | static void ebt_ulog_packet(unsigned int hooknr, const struct sk_buff *skb, |
1da177e4 | 121 | const struct net_device *in, const struct net_device *out, |
d5228a4f | 122 | const struct ebt_ulog_info *uloginfo, const char *prefix) |
1da177e4 LT |
123 | { |
124 | ebt_ulog_packet_msg_t *pm; | |
125 | size_t size, copy_len; | |
126 | struct nlmsghdr *nlh; | |
1da177e4 LT |
127 | unsigned int group = uloginfo->nlgroup; |
128 | ebt_ulog_buff_t *ub = &ulog_buffers[group]; | |
129 | spinlock_t *lock = &ub->lock; | |
b7aa0bf7 | 130 | ktime_t kt; |
1da177e4 LT |
131 | |
132 | if ((uloginfo->cprange == 0) || | |
133 | (uloginfo->cprange > skb->len + ETH_HLEN)) | |
134 | copy_len = skb->len + ETH_HLEN; | |
135 | else | |
136 | copy_len = uloginfo->cprange; | |
137 | ||
138 | size = NLMSG_SPACE(sizeof(*pm) + copy_len); | |
139 | if (size > nlbufsiz) { | |
ff67e4e4 | 140 | pr_debug("Size %Zd needed, but nlbufsiz=%d\n", size, nlbufsiz); |
1da177e4 LT |
141 | return; |
142 | } | |
143 | ||
144 | spin_lock_bh(lock); | |
145 | ||
146 | if (!ub->skb) { | |
147 | if (!(ub->skb = ulog_alloc_skb(size))) | |
62566ca5 | 148 | goto unlock; |
1da177e4 LT |
149 | } else if (size > skb_tailroom(ub->skb)) { |
150 | ulog_send(group); | |
151 | ||
152 | if (!(ub->skb = ulog_alloc_skb(size))) | |
62566ca5 | 153 | goto unlock; |
1da177e4 LT |
154 | } |
155 | ||
62566ca5 DM |
156 | nlh = nlmsg_put(ub->skb, 0, ub->qlen, 0, |
157 | size - NLMSG_ALIGN(sizeof(*nlh)), 0); | |
158 | if (!nlh) { | |
f7eadafb | 159 | kfree_skb(ub->skb); |
62566ca5 DM |
160 | ub->skb = NULL; |
161 | goto unlock; | |
162 | } | |
1da177e4 LT |
163 | ub->qlen++; |
164 | ||
62566ca5 | 165 | pm = nlmsg_data(nlh); |
1da177e4 LT |
166 | |
167 | /* Fill in the ulog data */ | |
168 | pm->version = EBT_ULOG_VERSION; | |
b7aa0bf7 ED |
169 | kt = ktime_get_real(); |
170 | pm->stamp = ktime_to_timeval(kt); | |
1da177e4 | 171 | if (ub->qlen == 1) |
b7aa0bf7 | 172 | ub->skb->tstamp = kt; |
1da177e4 | 173 | pm->data_len = copy_len; |
82e91ffe | 174 | pm->mark = skb->mark; |
1da177e4 LT |
175 | pm->hook = hooknr; |
176 | if (uloginfo->prefix != NULL) | |
177 | strcpy(pm->prefix, uloginfo->prefix); | |
178 | else | |
179 | *(pm->prefix) = '\0'; | |
180 | ||
181 | if (in) { | |
182 | strcpy(pm->physindev, in->name); | |
183 | /* If in isn't a bridge, then physindev==indev */ | |
f350a0a8 JP |
184 | if (br_port_exists(in)) |
185 | /* rcu_read_lock()ed by nf_hook_slow */ | |
186 | strcpy(pm->indev, br_port_get_rcu(in)->br->dev->name); | |
1da177e4 LT |
187 | else |
188 | strcpy(pm->indev, in->name); | |
189 | } else | |
190 | pm->indev[0] = pm->physindev[0] = '\0'; | |
191 | ||
192 | if (out) { | |
193 | /* If out exists, then out is a bridge port */ | |
194 | strcpy(pm->physoutdev, out->name); | |
f350a0a8 JP |
195 | /* rcu_read_lock()ed by nf_hook_slow */ |
196 | strcpy(pm->outdev, br_port_get_rcu(out)->br->dev->name); | |
1da177e4 LT |
197 | } else |
198 | pm->outdev[0] = pm->physoutdev[0] = '\0'; | |
199 | ||
200 | if (skb_copy_bits(skb, -ETH_HLEN, pm->data, copy_len) < 0) | |
201 | BUG(); | |
202 | ||
203 | if (ub->qlen > 1) | |
204 | ub->lastnlh->nlmsg_flags |= NLM_F_MULTI; | |
205 | ||
206 | ub->lastnlh = nlh; | |
207 | ||
208 | if (ub->qlen >= uloginfo->qthreshold) | |
209 | ulog_send(group); | |
210 | else if (!timer_pending(&ub->timer)) { | |
211 | ub->timer.expires = jiffies + flushtimeout * HZ / 100; | |
212 | add_timer(&ub->timer); | |
213 | } | |
214 | ||
215 | unlock: | |
216 | spin_unlock_bh(lock); | |
1da177e4 LT |
217 | } |
218 | ||
d5228a4f | 219 | /* this function is registered with the netfilter core */ |
76108cea | 220 | static void ebt_log_packet(u_int8_t pf, unsigned int hooknum, |
d5228a4f BDS |
221 | const struct sk_buff *skb, const struct net_device *in, |
222 | const struct net_device *out, const struct nf_loginfo *li, | |
223 | const char *prefix) | |
224 | { | |
225 | struct ebt_ulog_info loginfo; | |
226 | ||
227 | if (!li || li->type != NF_LOG_TYPE_ULOG) { | |
228 | loginfo.nlgroup = EBT_ULOG_DEFAULT_NLGROUP; | |
229 | loginfo.cprange = 0; | |
230 | loginfo.qthreshold = EBT_ULOG_DEFAULT_QTHRESHOLD; | |
231 | loginfo.prefix[0] = '\0'; | |
232 | } else { | |
233 | loginfo.nlgroup = li->u.ulog.group; | |
234 | loginfo.cprange = li->u.ulog.copy_len; | |
235 | loginfo.qthreshold = li->u.ulog.qthreshold; | |
236 | strlcpy(loginfo.prefix, prefix, sizeof(loginfo.prefix)); | |
237 | } | |
238 | ||
239 | ebt_ulog_packet(hooknum, skb, in, out, &loginfo, prefix); | |
240 | } | |
241 | ||
2d06d4a5 | 242 | static unsigned int |
4b560b44 | 243 | ebt_ulog_tg(struct sk_buff *skb, const struct xt_action_param *par) |
d5228a4f | 244 | { |
7eb35586 JE |
245 | ebt_ulog_packet(par->hooknum, skb, par->in, par->out, |
246 | par->targinfo, NULL); | |
0ac6ab1f | 247 | return EBT_CONTINUE; |
d5228a4f BDS |
248 | } |
249 | ||
135367b8 | 250 | static int ebt_ulog_tg_check(const struct xt_tgchk_param *par) |
1da177e4 | 251 | { |
af5d6dc2 | 252 | struct ebt_ulog_info *uloginfo = par->targinfo; |
1da177e4 | 253 | |
18219d3f | 254 | if (uloginfo->nlgroup > 31) |
d6b00a53 | 255 | return -EINVAL; |
1da177e4 LT |
256 | |
257 | uloginfo->prefix[EBT_ULOG_PREFIX_LEN - 1] = '\0'; | |
258 | ||
259 | if (uloginfo->qthreshold > EBT_ULOG_MAX_QLEN) | |
260 | uloginfo->qthreshold = EBT_ULOG_MAX_QLEN; | |
261 | ||
d6b00a53 | 262 | return 0; |
1da177e4 LT |
263 | } |
264 | ||
043ef46c JE |
265 | static struct xt_target ebt_ulog_tg_reg __read_mostly = { |
266 | .name = "ulog", | |
001a18d3 JE |
267 | .revision = 0, |
268 | .family = NFPROTO_BRIDGE, | |
2d06d4a5 JE |
269 | .target = ebt_ulog_tg, |
270 | .checkentry = ebt_ulog_tg_check, | |
fc0e3df4 | 271 | .targetsize = sizeof(struct ebt_ulog_info), |
1da177e4 LT |
272 | .me = THIS_MODULE, |
273 | }; | |
274 | ||
704b3ea3 | 275 | static struct nf_logger ebt_ulog_logger __read_mostly = { |
7249dee5 | 276 | .name = "ebt_ulog", |
d5228a4f BDS |
277 | .logfn = &ebt_log_packet, |
278 | .me = THIS_MODULE, | |
279 | }; | |
280 | ||
65b4b4e8 | 281 | static int __init ebt_ulog_init(void) |
1da177e4 | 282 | { |
3b334d42 | 283 | int ret; |
19eda879 | 284 | int i; |
a31f2d17 PNA |
285 | struct netlink_kernel_cfg cfg = { |
286 | .groups = EBT_ULOG_MAXNLGROUPS, | |
287 | }; | |
1da177e4 LT |
288 | |
289 | if (nlbufsiz >= 128*1024) { | |
ff67e4e4 JE |
290 | pr_warning("Netlink buffer has to be <= 128kB," |
291 | " please try a smaller nlbufsiz parameter.\n"); | |
3b334d42 | 292 | return -EINVAL; |
1da177e4 LT |
293 | } |
294 | ||
295 | /* initialize ulog_buffers */ | |
296 | for (i = 0; i < EBT_ULOG_MAXNLGROUPS; i++) { | |
e6f689db | 297 | setup_timer(&ulog_buffers[i].timer, ulog_timer, i); |
1da177e4 LT |
298 | spin_lock_init(&ulog_buffers[i].lock); |
299 | } | |
300 | ||
b4b51029 | 301 | ebtulognl = netlink_kernel_create(&init_net, NETLINK_NFLOG, |
a31f2d17 | 302 | THIS_MODULE, &cfg); |
85bc3f38 | 303 | if (!ebtulognl) |
3b334d42 | 304 | ret = -ENOMEM; |
85bc3f38 | 305 | else if ((ret = xt_register_target(&ebt_ulog_tg_reg)) != 0) |
b7c6ba6e | 306 | netlink_kernel_release(ebtulognl); |
1da177e4 | 307 | |
3b334d42 | 308 | if (ret == 0) |
ee999d8b | 309 | nf_log_register(NFPROTO_BRIDGE, &ebt_ulog_logger); |
d5228a4f | 310 | |
1da177e4 LT |
311 | return ret; |
312 | } | |
313 | ||
65b4b4e8 | 314 | static void __exit ebt_ulog_fini(void) |
1da177e4 LT |
315 | { |
316 | ebt_ulog_buff_t *ub; | |
317 | int i; | |
318 | ||
e92ad99c | 319 | nf_log_unregister(&ebt_ulog_logger); |
043ef46c | 320 | xt_unregister_target(&ebt_ulog_tg_reg); |
1da177e4 LT |
321 | for (i = 0; i < EBT_ULOG_MAXNLGROUPS; i++) { |
322 | ub = &ulog_buffers[i]; | |
323 | if (timer_pending(&ub->timer)) | |
324 | del_timer(&ub->timer); | |
325 | spin_lock_bh(&ub->lock); | |
326 | if (ub->skb) { | |
327 | kfree_skb(ub->skb); | |
328 | ub->skb = NULL; | |
329 | } | |
330 | spin_unlock_bh(&ub->lock); | |
331 | } | |
b7c6ba6e | 332 | netlink_kernel_release(ebtulognl); |
1da177e4 LT |
333 | } |
334 | ||
65b4b4e8 AM |
335 | module_init(ebt_ulog_init); |
336 | module_exit(ebt_ulog_fini); | |
1da177e4 LT |
337 | MODULE_LICENSE("GPL"); |
338 | MODULE_AUTHOR("Bart De Schuymer <bdschuym@pandora.be>"); | |
f776c4cd | 339 | MODULE_DESCRIPTION("Ebtables: Packet logging to netlink using ULOG"); |