Linux 4.19-rc7
[linux-2.6/btrfs-unstable.git] / net / netfilter / nf_log.c
bloba61d6df6e5f64f5b2086d14f35c88a0491f77ce6
1 #include <linux/kernel.h>
2 #include <linux/init.h>
3 #include <linux/module.h>
4 #include <linux/proc_fs.h>
5 #include <linux/skbuff.h>
6 #include <linux/netfilter.h>
7 #include <linux/seq_file.h>
8 #include <net/protocol.h>
9 #include <net/netfilter/nf_log.h>
11 #include "nf_internals.h"
13 /* Internal logging interface, which relies on the real
14 LOG target modules */
16 #define NFLOGGER_NAME_LEN 64
18 int sysctl_nf_log_all_netns __read_mostly;
19 EXPORT_SYMBOL(sysctl_nf_log_all_netns);
21 static struct nf_logger __rcu *loggers[NFPROTO_NUMPROTO][NF_LOG_TYPE_MAX] __read_mostly;
22 static DEFINE_MUTEX(nf_log_mutex);
24 #define nft_log_dereference(logger) \
25 rcu_dereference_protected(logger, lockdep_is_held(&nf_log_mutex))
27 static struct nf_logger *__find_logger(int pf, const char *str_logger)
29 struct nf_logger *log;
30 int i;
32 for (i = 0; i < NF_LOG_TYPE_MAX; i++) {
33 if (loggers[pf][i] == NULL)
34 continue;
36 log = nft_log_dereference(loggers[pf][i]);
37 if (!strncasecmp(str_logger, log->name, strlen(log->name)))
38 return log;
41 return NULL;
44 int nf_log_set(struct net *net, u_int8_t pf, const struct nf_logger *logger)
46 const struct nf_logger *log;
48 if (pf == NFPROTO_UNSPEC || pf >= ARRAY_SIZE(net->nf.nf_loggers))
49 return -EOPNOTSUPP;
51 mutex_lock(&nf_log_mutex);
52 log = nft_log_dereference(net->nf.nf_loggers[pf]);
53 if (log == NULL)
54 rcu_assign_pointer(net->nf.nf_loggers[pf], logger);
56 mutex_unlock(&nf_log_mutex);
58 return 0;
60 EXPORT_SYMBOL(nf_log_set);
62 void nf_log_unset(struct net *net, const struct nf_logger *logger)
64 int i;
65 const struct nf_logger *log;
67 mutex_lock(&nf_log_mutex);
68 for (i = 0; i < NFPROTO_NUMPROTO; i++) {
69 log = nft_log_dereference(net->nf.nf_loggers[i]);
70 if (log == logger)
71 RCU_INIT_POINTER(net->nf.nf_loggers[i], NULL);
73 mutex_unlock(&nf_log_mutex);
75 EXPORT_SYMBOL(nf_log_unset);
77 /* return EEXIST if the same logger is registered, 0 on success. */
78 int nf_log_register(u_int8_t pf, struct nf_logger *logger)
80 int i;
81 int ret = 0;
83 if (pf >= ARRAY_SIZE(init_net.nf.nf_loggers))
84 return -EINVAL;
86 mutex_lock(&nf_log_mutex);
88 if (pf == NFPROTO_UNSPEC) {
89 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++) {
90 if (rcu_access_pointer(loggers[i][logger->type])) {
91 ret = -EEXIST;
92 goto unlock;
95 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++)
96 rcu_assign_pointer(loggers[i][logger->type], logger);
97 } else {
98 if (rcu_access_pointer(loggers[pf][logger->type])) {
99 ret = -EEXIST;
100 goto unlock;
102 rcu_assign_pointer(loggers[pf][logger->type], logger);
105 unlock:
106 mutex_unlock(&nf_log_mutex);
107 return ret;
109 EXPORT_SYMBOL(nf_log_register);
111 void nf_log_unregister(struct nf_logger *logger)
113 const struct nf_logger *log;
114 int i;
116 mutex_lock(&nf_log_mutex);
117 for (i = 0; i < NFPROTO_NUMPROTO; i++) {
118 log = nft_log_dereference(loggers[i][logger->type]);
119 if (log == logger)
120 RCU_INIT_POINTER(loggers[i][logger->type], NULL);
122 mutex_unlock(&nf_log_mutex);
123 synchronize_rcu();
125 EXPORT_SYMBOL(nf_log_unregister);
127 int nf_log_bind_pf(struct net *net, u_int8_t pf,
128 const struct nf_logger *logger)
130 if (pf >= ARRAY_SIZE(net->nf.nf_loggers))
131 return -EINVAL;
132 mutex_lock(&nf_log_mutex);
133 if (__find_logger(pf, logger->name) == NULL) {
134 mutex_unlock(&nf_log_mutex);
135 return -ENOENT;
137 rcu_assign_pointer(net->nf.nf_loggers[pf], logger);
138 mutex_unlock(&nf_log_mutex);
139 return 0;
141 EXPORT_SYMBOL(nf_log_bind_pf);
143 void nf_log_unbind_pf(struct net *net, u_int8_t pf)
145 if (pf >= ARRAY_SIZE(net->nf.nf_loggers))
146 return;
147 mutex_lock(&nf_log_mutex);
148 RCU_INIT_POINTER(net->nf.nf_loggers[pf], NULL);
149 mutex_unlock(&nf_log_mutex);
151 EXPORT_SYMBOL(nf_log_unbind_pf);
153 void nf_logger_request_module(int pf, enum nf_log_type type)
155 if (loggers[pf][type] == NULL)
156 request_module("nf-logger-%u-%u", pf, type);
158 EXPORT_SYMBOL_GPL(nf_logger_request_module);
160 int nf_logger_find_get(int pf, enum nf_log_type type)
162 struct nf_logger *logger;
163 int ret = -ENOENT;
165 if (pf == NFPROTO_INET) {
166 ret = nf_logger_find_get(NFPROTO_IPV4, type);
167 if (ret < 0)
168 return ret;
170 ret = nf_logger_find_get(NFPROTO_IPV6, type);
171 if (ret < 0) {
172 nf_logger_put(NFPROTO_IPV4, type);
173 return ret;
176 return 0;
179 if (rcu_access_pointer(loggers[pf][type]) == NULL)
180 request_module("nf-logger-%u-%u", pf, type);
182 rcu_read_lock();
183 logger = rcu_dereference(loggers[pf][type]);
184 if (logger == NULL)
185 goto out;
187 if (try_module_get(logger->me))
188 ret = 0;
189 out:
190 rcu_read_unlock();
191 return ret;
193 EXPORT_SYMBOL_GPL(nf_logger_find_get);
195 void nf_logger_put(int pf, enum nf_log_type type)
197 struct nf_logger *logger;
199 if (pf == NFPROTO_INET) {
200 nf_logger_put(NFPROTO_IPV4, type);
201 nf_logger_put(NFPROTO_IPV6, type);
202 return;
205 BUG_ON(loggers[pf][type] == NULL);
207 rcu_read_lock();
208 logger = rcu_dereference(loggers[pf][type]);
209 module_put(logger->me);
210 rcu_read_unlock();
212 EXPORT_SYMBOL_GPL(nf_logger_put);
214 void nf_log_packet(struct net *net,
215 u_int8_t pf,
216 unsigned int hooknum,
217 const struct sk_buff *skb,
218 const struct net_device *in,
219 const struct net_device *out,
220 const struct nf_loginfo *loginfo,
221 const char *fmt, ...)
223 va_list args;
224 char prefix[NF_LOG_PREFIXLEN];
225 const struct nf_logger *logger;
227 rcu_read_lock();
228 if (loginfo != NULL)
229 logger = rcu_dereference(loggers[pf][loginfo->type]);
230 else
231 logger = rcu_dereference(net->nf.nf_loggers[pf]);
233 if (logger) {
234 va_start(args, fmt);
235 vsnprintf(prefix, sizeof(prefix), fmt, args);
236 va_end(args);
237 logger->logfn(net, pf, hooknum, skb, in, out, loginfo, prefix);
239 rcu_read_unlock();
241 EXPORT_SYMBOL(nf_log_packet);
243 void nf_log_trace(struct net *net,
244 u_int8_t pf,
245 unsigned int hooknum,
246 const struct sk_buff *skb,
247 const struct net_device *in,
248 const struct net_device *out,
249 const struct nf_loginfo *loginfo, const char *fmt, ...)
251 va_list args;
252 char prefix[NF_LOG_PREFIXLEN];
253 const struct nf_logger *logger;
255 rcu_read_lock();
256 logger = rcu_dereference(net->nf.nf_loggers[pf]);
257 if (logger) {
258 va_start(args, fmt);
259 vsnprintf(prefix, sizeof(prefix), fmt, args);
260 va_end(args);
261 logger->logfn(net, pf, hooknum, skb, in, out, loginfo, prefix);
263 rcu_read_unlock();
265 EXPORT_SYMBOL(nf_log_trace);
267 #define S_SIZE (1024 - (sizeof(unsigned int) + 1))
269 struct nf_log_buf {
270 unsigned int count;
271 char buf[S_SIZE + 1];
273 static struct nf_log_buf emergency, *emergency_ptr = &emergency;
275 __printf(2, 3) int nf_log_buf_add(struct nf_log_buf *m, const char *f, ...)
277 va_list args;
278 int len;
280 if (likely(m->count < S_SIZE)) {
281 va_start(args, f);
282 len = vsnprintf(m->buf + m->count, S_SIZE - m->count, f, args);
283 va_end(args);
284 if (likely(m->count + len < S_SIZE)) {
285 m->count += len;
286 return 0;
289 m->count = S_SIZE;
290 printk_once(KERN_ERR KBUILD_MODNAME " please increase S_SIZE\n");
291 return -1;
293 EXPORT_SYMBOL_GPL(nf_log_buf_add);
295 struct nf_log_buf *nf_log_buf_open(void)
297 struct nf_log_buf *m = kmalloc(sizeof(*m), GFP_ATOMIC);
299 if (unlikely(!m)) {
300 local_bh_disable();
301 do {
302 m = xchg(&emergency_ptr, NULL);
303 } while (!m);
305 m->count = 0;
306 return m;
308 EXPORT_SYMBOL_GPL(nf_log_buf_open);
310 void nf_log_buf_close(struct nf_log_buf *m)
312 m->buf[m->count] = 0;
313 printk("%s\n", m->buf);
315 if (likely(m != &emergency))
316 kfree(m);
317 else {
318 emergency_ptr = m;
319 local_bh_enable();
322 EXPORT_SYMBOL_GPL(nf_log_buf_close);
324 #ifdef CONFIG_PROC_FS
325 static void *seq_start(struct seq_file *seq, loff_t *pos)
327 struct net *net = seq_file_net(seq);
329 mutex_lock(&nf_log_mutex);
331 if (*pos >= ARRAY_SIZE(net->nf.nf_loggers))
332 return NULL;
334 return pos;
337 static void *seq_next(struct seq_file *s, void *v, loff_t *pos)
339 struct net *net = seq_file_net(s);
341 (*pos)++;
343 if (*pos >= ARRAY_SIZE(net->nf.nf_loggers))
344 return NULL;
346 return pos;
349 static void seq_stop(struct seq_file *s, void *v)
351 mutex_unlock(&nf_log_mutex);
354 static int seq_show(struct seq_file *s, void *v)
356 loff_t *pos = v;
357 const struct nf_logger *logger;
358 int i;
359 struct net *net = seq_file_net(s);
361 logger = nft_log_dereference(net->nf.nf_loggers[*pos]);
363 if (!logger)
364 seq_printf(s, "%2lld NONE (", *pos);
365 else
366 seq_printf(s, "%2lld %s (", *pos, logger->name);
368 if (seq_has_overflowed(s))
369 return -ENOSPC;
371 for (i = 0; i < NF_LOG_TYPE_MAX; i++) {
372 if (loggers[*pos][i] == NULL)
373 continue;
375 logger = nft_log_dereference(loggers[*pos][i]);
376 seq_printf(s, "%s", logger->name);
377 if (i == 0 && loggers[*pos][i + 1] != NULL)
378 seq_puts(s, ",");
380 if (seq_has_overflowed(s))
381 return -ENOSPC;
384 seq_puts(s, ")\n");
386 if (seq_has_overflowed(s))
387 return -ENOSPC;
388 return 0;
391 static const struct seq_operations nflog_seq_ops = {
392 .start = seq_start,
393 .next = seq_next,
394 .stop = seq_stop,
395 .show = seq_show,
397 #endif /* PROC_FS */
399 #ifdef CONFIG_SYSCTL
400 static char nf_log_sysctl_fnames[NFPROTO_NUMPROTO-NFPROTO_UNSPEC][3];
401 static struct ctl_table nf_log_sysctl_table[NFPROTO_NUMPROTO+1];
402 static struct ctl_table_header *nf_log_sysctl_fhdr;
404 static struct ctl_table nf_log_sysctl_ftable[] = {
406 .procname = "nf_log_all_netns",
407 .data = &sysctl_nf_log_all_netns,
408 .maxlen = sizeof(sysctl_nf_log_all_netns),
409 .mode = 0644,
410 .proc_handler = proc_dointvec,
415 static int nf_log_proc_dostring(struct ctl_table *table, int write,
416 void __user *buffer, size_t *lenp, loff_t *ppos)
418 const struct nf_logger *logger;
419 char buf[NFLOGGER_NAME_LEN];
420 int r = 0;
421 int tindex = (unsigned long)table->extra1;
422 struct net *net = table->extra2;
424 if (write) {
425 struct ctl_table tmp = *table;
427 /* proc_dostring() can append to existing strings, so we need to
428 * initialize it as an empty string.
430 buf[0] = '\0';
431 tmp.data = buf;
432 r = proc_dostring(&tmp, write, buffer, lenp, ppos);
433 if (r)
434 return r;
436 if (!strcmp(buf, "NONE")) {
437 nf_log_unbind_pf(net, tindex);
438 return 0;
440 mutex_lock(&nf_log_mutex);
441 logger = __find_logger(tindex, buf);
442 if (logger == NULL) {
443 mutex_unlock(&nf_log_mutex);
444 return -ENOENT;
446 rcu_assign_pointer(net->nf.nf_loggers[tindex], logger);
447 mutex_unlock(&nf_log_mutex);
448 } else {
449 struct ctl_table tmp = *table;
451 tmp.data = buf;
452 mutex_lock(&nf_log_mutex);
453 logger = nft_log_dereference(net->nf.nf_loggers[tindex]);
454 if (!logger)
455 strlcpy(buf, "NONE", sizeof(buf));
456 else
457 strlcpy(buf, logger->name, sizeof(buf));
458 mutex_unlock(&nf_log_mutex);
459 r = proc_dostring(&tmp, write, buffer, lenp, ppos);
462 return r;
465 static int netfilter_log_sysctl_init(struct net *net)
467 int i;
468 struct ctl_table *table;
470 table = nf_log_sysctl_table;
471 if (!net_eq(net, &init_net)) {
472 table = kmemdup(nf_log_sysctl_table,
473 sizeof(nf_log_sysctl_table),
474 GFP_KERNEL);
475 if (!table)
476 goto err_alloc;
477 } else {
478 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++) {
479 snprintf(nf_log_sysctl_fnames[i],
480 3, "%d", i);
481 nf_log_sysctl_table[i].procname =
482 nf_log_sysctl_fnames[i];
483 nf_log_sysctl_table[i].maxlen = NFLOGGER_NAME_LEN;
484 nf_log_sysctl_table[i].mode = 0644;
485 nf_log_sysctl_table[i].proc_handler =
486 nf_log_proc_dostring;
487 nf_log_sysctl_table[i].extra1 =
488 (void *)(unsigned long) i;
490 nf_log_sysctl_fhdr = register_net_sysctl(net, "net/netfilter",
491 nf_log_sysctl_ftable);
492 if (!nf_log_sysctl_fhdr)
493 goto err_freg;
496 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++)
497 table[i].extra2 = net;
499 net->nf.nf_log_dir_header = register_net_sysctl(net,
500 "net/netfilter/nf_log",
501 table);
502 if (!net->nf.nf_log_dir_header)
503 goto err_reg;
505 return 0;
507 err_reg:
508 if (!net_eq(net, &init_net))
509 kfree(table);
510 else
511 unregister_net_sysctl_table(nf_log_sysctl_fhdr);
512 err_freg:
513 err_alloc:
514 return -ENOMEM;
517 static void netfilter_log_sysctl_exit(struct net *net)
519 struct ctl_table *table;
521 table = net->nf.nf_log_dir_header->ctl_table_arg;
522 unregister_net_sysctl_table(net->nf.nf_log_dir_header);
523 if (!net_eq(net, &init_net))
524 kfree(table);
525 else
526 unregister_net_sysctl_table(nf_log_sysctl_fhdr);
528 #else
529 static int netfilter_log_sysctl_init(struct net *net)
531 return 0;
534 static void netfilter_log_sysctl_exit(struct net *net)
537 #endif /* CONFIG_SYSCTL */
539 static int __net_init nf_log_net_init(struct net *net)
541 int ret = -ENOMEM;
543 #ifdef CONFIG_PROC_FS
544 if (!proc_create_net("nf_log", 0444, net->nf.proc_netfilter,
545 &nflog_seq_ops, sizeof(struct seq_net_private)))
546 return ret;
547 #endif
548 ret = netfilter_log_sysctl_init(net);
549 if (ret < 0)
550 goto out_sysctl;
552 return 0;
554 out_sysctl:
555 #ifdef CONFIG_PROC_FS
556 remove_proc_entry("nf_log", net->nf.proc_netfilter);
557 #endif
558 return ret;
561 static void __net_exit nf_log_net_exit(struct net *net)
563 netfilter_log_sysctl_exit(net);
564 #ifdef CONFIG_PROC_FS
565 remove_proc_entry("nf_log", net->nf.proc_netfilter);
566 #endif
569 static struct pernet_operations nf_log_net_ops = {
570 .init = nf_log_net_init,
571 .exit = nf_log_net_exit,
574 int __init netfilter_log_init(void)
576 return register_pernet_subsys(&nf_log_net_ops);