]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/bridge/netfilter/ebt_ulog.c
netfilter: use kfree_skb() not kfree()
[mirror_ubuntu-zesty-kernel.git] / net / bridge / netfilter / ebt_ulog.c
CommitLineData
1da177e4
LT
1/*
2 * netfilter module for userspace bridged Ethernet frames logging daemons
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
d5228a4f 6 * Harald Welte <laforge@netfilter.org>
1da177e4
LT
7 *
8 * November, 2004
9 *
10 * Based on ipt_ULOG.c, which is
11 * (C) 2000-2002 by Harald Welte <laforge@netfilter.org>
12 *
9d6f229f
YH
13 * This module accepts two parameters:
14 *
1da177e4
LT
15 * nlbufsiz:
16 * The parameter specifies how big the buffer for each netlink multicast
17 * group is. e.g. If you say nlbufsiz=8192, up to eight kb of packets will
18 * get accumulated in the kernel until they are sent to userspace. It is
19 * NOT possible to allocate more than 128kB, and it is strongly discouraged,
20 * because atomically allocating 128kB inside the network rx softirq is not
21 * reliable. Please also keep in mind that this buffer size is allocated for
22 * each nlgroup you are using, so the total kernel memory usage increases
23 * by that factor.
24 *
25 * flushtimeout:
26 * Specify, after how many hundredths of a second the queue should be
27 * flushed even if it is not full yet.
28 *
29 */
ff67e4e4 30#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
1da177e4 31#include <linux/module.h>
5a0e3ad6 32#include <linux/slab.h>
1da177e4
LT
33#include <linux/spinlock.h>
34#include <linux/socket.h>
35#include <linux/skbuff.h>
36#include <linux/kernel.h>
37#include <linux/timer.h>
38#include <linux/netlink.h>
39#include <linux/netdevice.h>
18219d3f 40#include <linux/netfilter/x_tables.h>
1da177e4
LT
41#include <linux/netfilter_bridge/ebtables.h>
42#include <linux/netfilter_bridge/ebt_ulog.h>
f01ffbd6 43#include <net/netfilter/nf_log.h>
1da177e4
LT
44#include <net/sock.h>
45#include "../br_private.h"
46
c2db2924 47static unsigned int nlbufsiz = NLMSG_GOODSIZE;
1da177e4
LT
48module_param(nlbufsiz, uint, 0600);
49MODULE_PARM_DESC(nlbufsiz, "netlink buffer size (number of bytes) "
9d6f229f 50 "(defaults to 4096)");
1da177e4
LT
51
52static unsigned int flushtimeout = 10;
53module_param(flushtimeout, uint, 0600);
54MODULE_PARM_DESC(flushtimeout, "buffer flush timeout (hundredths ofa second) "
9d6f229f 55 "(defaults to 10)");
1da177e4
LT
56
57typedef struct {
58 unsigned int qlen; /* number of nlmsgs' in the skb */
59 struct nlmsghdr *lastnlh; /* netlink header of last msg in skb */
60 struct sk_buff *skb; /* the pre-allocated skb */
61 struct timer_list timer; /* the timer function */
62 spinlock_t lock; /* the per-queue lock */
63} ebt_ulog_buff_t;
64
65static ebt_ulog_buff_t ulog_buffers[EBT_ULOG_MAXNLGROUPS];
66static struct sock *ebtulognl;
67
68/* send one ulog_buff_t to userspace */
69static void ulog_send(unsigned int nlgroup)
70{
71 ebt_ulog_buff_t *ub = &ulog_buffers[nlgroup];
72
73 if (timer_pending(&ub->timer))
74 del_timer(&ub->timer);
75
dcb7cd97
MH
76 if (!ub->skb)
77 return;
78
1da177e4
LT
79 /* last nlmsg needs NLMSG_DONE */
80 if (ub->qlen > 1)
81 ub->lastnlh->nlmsg_type = NLMSG_DONE;
82
ac6d439d
PM
83 NETLINK_CB(ub->skb).dst_group = nlgroup + 1;
84 netlink_broadcast(ebtulognl, ub->skb, 0, nlgroup + 1, GFP_ATOMIC);
1da177e4
LT
85
86 ub->qlen = 0;
87 ub->skb = NULL;
88}
89
90/* timer function to flush queue in flushtimeout time */
91static void ulog_timer(unsigned long data)
92{
93 spin_lock_bh(&ulog_buffers[data].lock);
94 if (ulog_buffers[data].skb)
95 ulog_send(data);
96 spin_unlock_bh(&ulog_buffers[data].lock);
97}
98
99static struct sk_buff *ulog_alloc_skb(unsigned int size)
100{
101 struct sk_buff *skb;
ad2ad0f9 102 unsigned int n;
1da177e4 103
ad2ad0f9 104 n = max(size, nlbufsiz);
0a9ee813 105 skb = alloc_skb(n, GFP_ATOMIC | __GFP_NOWARN);
1da177e4 106 if (!skb) {
ad2ad0f9 107 if (n > size) {
1da177e4
LT
108 /* try to allocate only as much as we need for
109 * current packet */
110 skb = alloc_skb(size, GFP_ATOMIC);
111 if (!skb)
0a9ee813
JP
112 pr_debug("cannot even allocate buffer of size %ub\n",
113 size);
1da177e4
LT
114 }
115 }
116
117 return skb;
118}
119
d5228a4f 120static void ebt_ulog_packet(unsigned int hooknr, const struct sk_buff *skb,
1da177e4 121 const struct net_device *in, const struct net_device *out,
d5228a4f 122 const struct ebt_ulog_info *uloginfo, const char *prefix)
1da177e4
LT
123{
124 ebt_ulog_packet_msg_t *pm;
125 size_t size, copy_len;
126 struct nlmsghdr *nlh;
1da177e4
LT
127 unsigned int group = uloginfo->nlgroup;
128 ebt_ulog_buff_t *ub = &ulog_buffers[group];
129 spinlock_t *lock = &ub->lock;
b7aa0bf7 130 ktime_t kt;
1da177e4
LT
131
132 if ((uloginfo->cprange == 0) ||
133 (uloginfo->cprange > skb->len + ETH_HLEN))
134 copy_len = skb->len + ETH_HLEN;
135 else
136 copy_len = uloginfo->cprange;
137
138 size = NLMSG_SPACE(sizeof(*pm) + copy_len);
139 if (size > nlbufsiz) {
ff67e4e4 140 pr_debug("Size %Zd needed, but nlbufsiz=%d\n", size, nlbufsiz);
1da177e4
LT
141 return;
142 }
143
144 spin_lock_bh(lock);
145
146 if (!ub->skb) {
147 if (!(ub->skb = ulog_alloc_skb(size)))
62566ca5 148 goto unlock;
1da177e4
LT
149 } else if (size > skb_tailroom(ub->skb)) {
150 ulog_send(group);
151
152 if (!(ub->skb = ulog_alloc_skb(size)))
62566ca5 153 goto unlock;
1da177e4
LT
154 }
155
62566ca5
DM
156 nlh = nlmsg_put(ub->skb, 0, ub->qlen, 0,
157 size - NLMSG_ALIGN(sizeof(*nlh)), 0);
158 if (!nlh) {
f7eadafb 159 kfree_skb(ub->skb);
62566ca5
DM
160 ub->skb = NULL;
161 goto unlock;
162 }
1da177e4
LT
163 ub->qlen++;
164
62566ca5 165 pm = nlmsg_data(nlh);
1da177e4
LT
166
167 /* Fill in the ulog data */
168 pm->version = EBT_ULOG_VERSION;
b7aa0bf7
ED
169 kt = ktime_get_real();
170 pm->stamp = ktime_to_timeval(kt);
1da177e4 171 if (ub->qlen == 1)
b7aa0bf7 172 ub->skb->tstamp = kt;
1da177e4 173 pm->data_len = copy_len;
82e91ffe 174 pm->mark = skb->mark;
1da177e4
LT
175 pm->hook = hooknr;
176 if (uloginfo->prefix != NULL)
177 strcpy(pm->prefix, uloginfo->prefix);
178 else
179 *(pm->prefix) = '\0';
180
181 if (in) {
182 strcpy(pm->physindev, in->name);
183 /* If in isn't a bridge, then physindev==indev */
f350a0a8
JP
184 if (br_port_exists(in))
185 /* rcu_read_lock()ed by nf_hook_slow */
186 strcpy(pm->indev, br_port_get_rcu(in)->br->dev->name);
1da177e4
LT
187 else
188 strcpy(pm->indev, in->name);
189 } else
190 pm->indev[0] = pm->physindev[0] = '\0';
191
192 if (out) {
193 /* If out exists, then out is a bridge port */
194 strcpy(pm->physoutdev, out->name);
f350a0a8
JP
195 /* rcu_read_lock()ed by nf_hook_slow */
196 strcpy(pm->outdev, br_port_get_rcu(out)->br->dev->name);
1da177e4
LT
197 } else
198 pm->outdev[0] = pm->physoutdev[0] = '\0';
199
200 if (skb_copy_bits(skb, -ETH_HLEN, pm->data, copy_len) < 0)
201 BUG();
202
203 if (ub->qlen > 1)
204 ub->lastnlh->nlmsg_flags |= NLM_F_MULTI;
205
206 ub->lastnlh = nlh;
207
208 if (ub->qlen >= uloginfo->qthreshold)
209 ulog_send(group);
210 else if (!timer_pending(&ub->timer)) {
211 ub->timer.expires = jiffies + flushtimeout * HZ / 100;
212 add_timer(&ub->timer);
213 }
214
215unlock:
216 spin_unlock_bh(lock);
1da177e4
LT
217}
218
d5228a4f 219/* this function is registered with the netfilter core */
76108cea 220static void ebt_log_packet(u_int8_t pf, unsigned int hooknum,
d5228a4f
BDS
221 const struct sk_buff *skb, const struct net_device *in,
222 const struct net_device *out, const struct nf_loginfo *li,
223 const char *prefix)
224{
225 struct ebt_ulog_info loginfo;
226
227 if (!li || li->type != NF_LOG_TYPE_ULOG) {
228 loginfo.nlgroup = EBT_ULOG_DEFAULT_NLGROUP;
229 loginfo.cprange = 0;
230 loginfo.qthreshold = EBT_ULOG_DEFAULT_QTHRESHOLD;
231 loginfo.prefix[0] = '\0';
232 } else {
233 loginfo.nlgroup = li->u.ulog.group;
234 loginfo.cprange = li->u.ulog.copy_len;
235 loginfo.qthreshold = li->u.ulog.qthreshold;
236 strlcpy(loginfo.prefix, prefix, sizeof(loginfo.prefix));
237 }
238
239 ebt_ulog_packet(hooknum, skb, in, out, &loginfo, prefix);
240}
241
2d06d4a5 242static unsigned int
4b560b44 243ebt_ulog_tg(struct sk_buff *skb, const struct xt_action_param *par)
d5228a4f 244{
7eb35586
JE
245 ebt_ulog_packet(par->hooknum, skb, par->in, par->out,
246 par->targinfo, NULL);
0ac6ab1f 247 return EBT_CONTINUE;
d5228a4f
BDS
248}
249
135367b8 250static int ebt_ulog_tg_check(const struct xt_tgchk_param *par)
1da177e4 251{
af5d6dc2 252 struct ebt_ulog_info *uloginfo = par->targinfo;
1da177e4 253
18219d3f 254 if (uloginfo->nlgroup > 31)
d6b00a53 255 return -EINVAL;
1da177e4
LT
256
257 uloginfo->prefix[EBT_ULOG_PREFIX_LEN - 1] = '\0';
258
259 if (uloginfo->qthreshold > EBT_ULOG_MAX_QLEN)
260 uloginfo->qthreshold = EBT_ULOG_MAX_QLEN;
261
d6b00a53 262 return 0;
1da177e4
LT
263}
264
043ef46c
JE
265static struct xt_target ebt_ulog_tg_reg __read_mostly = {
266 .name = "ulog",
001a18d3
JE
267 .revision = 0,
268 .family = NFPROTO_BRIDGE,
2d06d4a5
JE
269 .target = ebt_ulog_tg,
270 .checkentry = ebt_ulog_tg_check,
fc0e3df4 271 .targetsize = sizeof(struct ebt_ulog_info),
1da177e4
LT
272 .me = THIS_MODULE,
273};
274
704b3ea3 275static struct nf_logger ebt_ulog_logger __read_mostly = {
7249dee5 276 .name = "ebt_ulog",
d5228a4f
BDS
277 .logfn = &ebt_log_packet,
278 .me = THIS_MODULE,
279};
280
65b4b4e8 281static int __init ebt_ulog_init(void)
1da177e4 282{
3b334d42 283 int ret;
19eda879 284 int i;
a31f2d17
PNA
285 struct netlink_kernel_cfg cfg = {
286 .groups = EBT_ULOG_MAXNLGROUPS,
287 };
1da177e4
LT
288
289 if (nlbufsiz >= 128*1024) {
ff67e4e4
JE
290 pr_warning("Netlink buffer has to be <= 128kB,"
291 " please try a smaller nlbufsiz parameter.\n");
3b334d42 292 return -EINVAL;
1da177e4
LT
293 }
294
295 /* initialize ulog_buffers */
296 for (i = 0; i < EBT_ULOG_MAXNLGROUPS; i++) {
e6f689db 297 setup_timer(&ulog_buffers[i].timer, ulog_timer, i);
1da177e4
LT
298 spin_lock_init(&ulog_buffers[i].lock);
299 }
300
b4b51029 301 ebtulognl = netlink_kernel_create(&init_net, NETLINK_NFLOG,
a31f2d17 302 THIS_MODULE, &cfg);
85bc3f38 303 if (!ebtulognl)
3b334d42 304 ret = -ENOMEM;
85bc3f38 305 else if ((ret = xt_register_target(&ebt_ulog_tg_reg)) != 0)
b7c6ba6e 306 netlink_kernel_release(ebtulognl);
1da177e4 307
3b334d42 308 if (ret == 0)
ee999d8b 309 nf_log_register(NFPROTO_BRIDGE, &ebt_ulog_logger);
d5228a4f 310
1da177e4
LT
311 return ret;
312}
313
65b4b4e8 314static void __exit ebt_ulog_fini(void)
1da177e4
LT
315{
316 ebt_ulog_buff_t *ub;
317 int i;
318
e92ad99c 319 nf_log_unregister(&ebt_ulog_logger);
043ef46c 320 xt_unregister_target(&ebt_ulog_tg_reg);
1da177e4
LT
321 for (i = 0; i < EBT_ULOG_MAXNLGROUPS; i++) {
322 ub = &ulog_buffers[i];
323 if (timer_pending(&ub->timer))
324 del_timer(&ub->timer);
325 spin_lock_bh(&ub->lock);
326 if (ub->skb) {
327 kfree_skb(ub->skb);
328 ub->skb = NULL;
329 }
330 spin_unlock_bh(&ub->lock);
331 }
b7c6ba6e 332 netlink_kernel_release(ebtulognl);
1da177e4
LT
333}
334
65b4b4e8
AM
335module_init(ebt_ulog_init);
336module_exit(ebt_ulog_fini);
1da177e4
LT
337MODULE_LICENSE("GPL");
338MODULE_AUTHOR("Bart De Schuymer <bdschuym@pandora.be>");
f776c4cd 339MODULE_DESCRIPTION("Ebtables: Packet logging to netlink using ULOG");