Linux 5.2-rc1
[linux-block.git] / net / netfilter / nf_log.c
CommitLineData
f6ebe77f
HW
1#include <linux/kernel.h>
2#include <linux/init.h>
3#include <linux/module.h>
4#include <linux/proc_fs.h>
5#include <linux/skbuff.h>
6#include <linux/netfilter.h>
bbd86b9f 7#include <linux/seq_file.h>
f6ebe77f 8#include <net/protocol.h>
f01ffbd6 9#include <net/netfilter/nf_log.h>
f6ebe77f
HW
10
11#include "nf_internals.h"
12
a5d29264 13/* Internal logging interface, which relies on the real
f6ebe77f
HW
14 LOG target modules */
15
17625274 16#define NFLOGGER_NAME_LEN 64
f6ebe77f 17
2851940f
MK
18int sysctl_nf_log_all_netns __read_mostly;
19EXPORT_SYMBOL(sysctl_nf_log_all_netns);
20
5962815a 21static struct nf_logger __rcu *loggers[NFPROTO_NUMPROTO][NF_LOG_TYPE_MAX] __read_mostly;
9b73534d 22static DEFINE_MUTEX(nf_log_mutex);
f6ebe77f 23
0c26ed1c
ML
24#define nft_log_dereference(logger) \
25 rcu_dereference_protected(logger, lockdep_is_held(&nf_log_mutex))
26
ca735b3a 27static struct nf_logger *__find_logger(int pf, const char *str_logger)
f6ebe77f 28{
5962815a
PNA
29 struct nf_logger *log;
30 int i;
31
32 for (i = 0; i < NF_LOG_TYPE_MAX; i++) {
33 if (loggers[pf][i] == NULL)
34 continue;
f6ebe77f 35
0c26ed1c 36 log = nft_log_dereference(loggers[pf][i]);
18082746 37 if (!strncasecmp(str_logger, log->name, strlen(log->name)))
5962815a 38 return log;
ca735b3a 39 }
d72367b6 40
ca735b3a 41 return NULL;
601e68e1 42}
f6ebe77f 43
779994fa 44int nf_log_set(struct net *net, u_int8_t pf, const struct nf_logger *logger)
30e0c6a6
G
45{
46 const struct nf_logger *log;
47
779994fa
GF
48 if (pf == NFPROTO_UNSPEC || pf >= ARRAY_SIZE(net->nf.nf_loggers))
49 return -EOPNOTSUPP;
30e0c6a6
G
50
51 mutex_lock(&nf_log_mutex);
0c26ed1c 52 log = nft_log_dereference(net->nf.nf_loggers[pf]);
30e0c6a6
G
53 if (log == NULL)
54 rcu_assign_pointer(net->nf.nf_loggers[pf], logger);
55
56 mutex_unlock(&nf_log_mutex);
779994fa
GF
57
58 return 0;
30e0c6a6
G
59}
60EXPORT_SYMBOL(nf_log_set);
61
62void nf_log_unset(struct net *net, const struct nf_logger *logger)
63{
64 int i;
65 const struct nf_logger *log;
66
30e0c6a6
G
67 mutex_lock(&nf_log_mutex);
68 for (i = 0; i < NFPROTO_NUMPROTO; i++) {
0c26ed1c 69 log = nft_log_dereference(net->nf.nf_loggers[i]);
30e0c6a6
G
70 if (log == logger)
71 RCU_INIT_POINTER(net->nf.nf_loggers[i], NULL);
72 }
73 mutex_unlock(&nf_log_mutex);
30e0c6a6
G
74}
75EXPORT_SYMBOL(nf_log_unset);
76
d93cf068 77/* return EEXIST if the same logger is registered, 0 on success. */
ca735b3a 78int nf_log_register(u_int8_t pf, struct nf_logger *logger)
f6ebe77f 79{
b6f0a365 80 int i;
8ac2bde2 81 int ret = 0;
ca735b3a 82
30e0c6a6 83 if (pf >= ARRAY_SIZE(init_net.nf.nf_loggers))
ca735b3a
EL
84 return -EINVAL;
85
9b73534d 86 mutex_lock(&nf_log_mutex);
ca735b3a
EL
87
88 if (pf == NFPROTO_UNSPEC) {
8ac2bde2
ML
89 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++) {
90 if (rcu_access_pointer(loggers[i][logger->type])) {
91 ret = -EEXIST;
92 goto unlock;
93 }
94 }
ca735b3a 95 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++)
5962815a 96 rcu_assign_pointer(loggers[i][logger->type], logger);
ca735b3a 97 } else {
8ac2bde2
ML
98 if (rcu_access_pointer(loggers[pf][logger->type])) {
99 ret = -EEXIST;
100 goto unlock;
101 }
5962815a 102 rcu_assign_pointer(loggers[pf][logger->type], logger);
ca735b3a
EL
103 }
104
8ac2bde2 105unlock:
9b73534d 106 mutex_unlock(&nf_log_mutex);
8ac2bde2 107 return ret;
f6ebe77f 108}
ca735b3a 109EXPORT_SYMBOL(nf_log_register);
f6ebe77f 110
ca735b3a 111void nf_log_unregister(struct nf_logger *logger)
f6ebe77f 112{
205ee117 113 const struct nf_logger *log;
f6ebe77f
HW
114 int i;
115
9b73534d 116 mutex_lock(&nf_log_mutex);
205ee117
FW
117 for (i = 0; i < NFPROTO_NUMPROTO; i++) {
118 log = nft_log_dereference(loggers[i][logger->type]);
119 if (log == logger)
120 RCU_INIT_POINTER(loggers[i][logger->type], NULL);
121 }
9b73534d 122 mutex_unlock(&nf_log_mutex);
ad5001cc 123 synchronize_rcu();
f6ebe77f 124}
e92ad99c 125EXPORT_SYMBOL(nf_log_unregister);
f6ebe77f 126
30e0c6a6
G
127int nf_log_bind_pf(struct net *net, u_int8_t pf,
128 const struct nf_logger *logger)
ca735b3a 129{
30e0c6a6 130 if (pf >= ARRAY_SIZE(net->nf.nf_loggers))
9ef0298a 131 return -EINVAL;
ca735b3a
EL
132 mutex_lock(&nf_log_mutex);
133 if (__find_logger(pf, logger->name) == NULL) {
134 mutex_unlock(&nf_log_mutex);
135 return -ENOENT;
136 }
30e0c6a6 137 rcu_assign_pointer(net->nf.nf_loggers[pf], logger);
ca735b3a
EL
138 mutex_unlock(&nf_log_mutex);
139 return 0;
140}
141EXPORT_SYMBOL(nf_log_bind_pf);
142
30e0c6a6 143void nf_log_unbind_pf(struct net *net, u_int8_t pf)
ca735b3a 144{
30e0c6a6 145 if (pf >= ARRAY_SIZE(net->nf.nf_loggers))
9ef0298a 146 return;
ca735b3a 147 mutex_lock(&nf_log_mutex);
30e0c6a6 148 RCU_INIT_POINTER(net->nf.nf_loggers[pf], NULL);
ca735b3a
EL
149 mutex_unlock(&nf_log_mutex);
150}
151EXPORT_SYMBOL(nf_log_unbind_pf);
152
960649d1
PNA
153void nf_logger_request_module(int pf, enum nf_log_type type)
154{
155 if (loggers[pf][type] == NULL)
156 request_module("nf-logger-%u-%u", pf, type);
157}
158EXPORT_SYMBOL_GPL(nf_logger_request_module);
159
fab4085f
PNA
160int nf_logger_find_get(int pf, enum nf_log_type type)
161{
162 struct nf_logger *logger;
163 int ret = -ENOENT;
164
f3bb5333
LZ
165 if (pf == NFPROTO_INET) {
166 ret = nf_logger_find_get(NFPROTO_IPV4, type);
167 if (ret < 0)
168 return ret;
169
170 ret = nf_logger_find_get(NFPROTO_IPV6, type);
171 if (ret < 0) {
172 nf_logger_put(NFPROTO_IPV4, type);
173 return ret;
174 }
175
176 return 0;
177 }
178
c5a589cc 179 if (rcu_access_pointer(loggers[pf][type]) == NULL)
fab4085f
PNA
180 request_module("nf-logger-%u-%u", pf, type);
181
182 rcu_read_lock();
183 logger = rcu_dereference(loggers[pf][type]);
184 if (logger == NULL)
185 goto out;
186
7e53e7f8 187 if (try_module_get(logger->me))
fab4085f
PNA
188 ret = 0;
189out:
190 rcu_read_unlock();
191 return ret;
192}
193EXPORT_SYMBOL_GPL(nf_logger_find_get);
194
195void nf_logger_put(int pf, enum nf_log_type type)
196{
197 struct nf_logger *logger;
198
f3bb5333
LZ
199 if (pf == NFPROTO_INET) {
200 nf_logger_put(NFPROTO_IPV4, type);
201 nf_logger_put(NFPROTO_IPV6, type);
202 return;
203 }
204
fab4085f
PNA
205 BUG_ON(loggers[pf][type] == NULL);
206
207 rcu_read_lock();
208 logger = rcu_dereference(loggers[pf][type]);
209 module_put(logger->me);
210 rcu_read_unlock();
211}
212EXPORT_SYMBOL_GPL(nf_logger_put);
213
30e0c6a6
G
214void nf_log_packet(struct net *net,
215 u_int8_t pf,
f6ebe77f
HW
216 unsigned int hooknum,
217 const struct sk_buff *skb,
218 const struct net_device *in,
219 const struct net_device *out,
7b2f9631 220 const struct nf_loginfo *loginfo,
f6ebe77f
HW
221 const char *fmt, ...)
222{
223 va_list args;
224 char prefix[NF_LOG_PREFIXLEN];
7b2f9631 225 const struct nf_logger *logger;
601e68e1 226
f6ebe77f 227 rcu_read_lock();
fab4085f
PNA
228 if (loginfo != NULL)
229 logger = rcu_dereference(loggers[pf][loginfo->type]);
230 else
231 logger = rcu_dereference(net->nf.nf_loggers[pf]);
232
f6ebe77f
HW
233 if (logger) {
234 va_start(args, fmt);
235 vsnprintf(prefix, sizeof(prefix), fmt, args);
236 va_end(args);
8cdb46da 237 logger->logfn(net, pf, hooknum, skb, in, out, loginfo, prefix);
f6ebe77f
HW
238 }
239 rcu_read_unlock();
240}
241EXPORT_SYMBOL(nf_log_packet);
242
4017a7ee
PNA
243void nf_log_trace(struct net *net,
244 u_int8_t pf,
245 unsigned int hooknum,
246 const struct sk_buff *skb,
247 const struct net_device *in,
248 const struct net_device *out,
249 const struct nf_loginfo *loginfo, const char *fmt, ...)
250{
251 va_list args;
252 char prefix[NF_LOG_PREFIXLEN];
253 const struct nf_logger *logger;
254
255 rcu_read_lock();
256 logger = rcu_dereference(net->nf.nf_loggers[pf]);
257 if (logger) {
258 va_start(args, fmt);
259 vsnprintf(prefix, sizeof(prefix), fmt, args);
260 va_end(args);
261 logger->logfn(net, pf, hooknum, skb, in, out, loginfo, prefix);
262 }
263 rcu_read_unlock();
264}
265EXPORT_SYMBOL(nf_log_trace);
266
27fd8d90
PNA
267#define S_SIZE (1024 - (sizeof(unsigned int) + 1))
268
269struct nf_log_buf {
270 unsigned int count;
271 char buf[S_SIZE + 1];
272};
273static struct nf_log_buf emergency, *emergency_ptr = &emergency;
274
275__printf(2, 3) int nf_log_buf_add(struct nf_log_buf *m, const char *f, ...)
276{
277 va_list args;
278 int len;
279
280 if (likely(m->count < S_SIZE)) {
281 va_start(args, f);
282 len = vsnprintf(m->buf + m->count, S_SIZE - m->count, f, args);
283 va_end(args);
284 if (likely(m->count + len < S_SIZE)) {
285 m->count += len;
286 return 0;
287 }
288 }
289 m->count = S_SIZE;
290 printk_once(KERN_ERR KBUILD_MODNAME " please increase S_SIZE\n");
291 return -1;
292}
293EXPORT_SYMBOL_GPL(nf_log_buf_add);
294
295struct nf_log_buf *nf_log_buf_open(void)
296{
297 struct nf_log_buf *m = kmalloc(sizeof(*m), GFP_ATOMIC);
298
299 if (unlikely(!m)) {
300 local_bh_disable();
301 do {
302 m = xchg(&emergency_ptr, NULL);
303 } while (!m);
304 }
305 m->count = 0;
306 return m;
307}
308EXPORT_SYMBOL_GPL(nf_log_buf_open);
309
310void nf_log_buf_close(struct nf_log_buf *m)
311{
312 m->buf[m->count] = 0;
313 printk("%s\n", m->buf);
314
315 if (likely(m != &emergency))
316 kfree(m);
317 else {
318 emergency_ptr = m;
319 local_bh_enable();
320 }
321}
322EXPORT_SYMBOL_GPL(nf_log_buf_close);
323
f6ebe77f
HW
324#ifdef CONFIG_PROC_FS
325static void *seq_start(struct seq_file *seq, loff_t *pos)
326{
30e0c6a6
G
327 struct net *net = seq_file_net(seq);
328
6440fe05 329 mutex_lock(&nf_log_mutex);
f6ebe77f 330
30e0c6a6 331 if (*pos >= ARRAY_SIZE(net->nf.nf_loggers))
f6ebe77f
HW
332 return NULL;
333
334 return pos;
335}
336
337static void *seq_next(struct seq_file *s, void *v, loff_t *pos)
338{
30e0c6a6
G
339 struct net *net = seq_file_net(s);
340
f6ebe77f
HW
341 (*pos)++;
342
30e0c6a6 343 if (*pos >= ARRAY_SIZE(net->nf.nf_loggers))
f6ebe77f
HW
344 return NULL;
345
346 return pos;
347}
348
349static void seq_stop(struct seq_file *s, void *v)
350{
6440fe05 351 mutex_unlock(&nf_log_mutex);
f6ebe77f
HW
352}
353
354static int seq_show(struct seq_file *s, void *v)
355{
356 loff_t *pos = v;
357 const struct nf_logger *logger;
e71456ae 358 int i;
30e0c6a6 359 struct net *net = seq_file_net(s);
f6ebe77f 360
0c26ed1c 361 logger = nft_log_dereference(net->nf.nf_loggers[*pos]);
f6ebe77f
HW
362
363 if (!logger)
e71456ae 364 seq_printf(s, "%2lld NONE (", *pos);
c7a913cd 365 else
e71456ae 366 seq_printf(s, "%2lld %s (", *pos, logger->name);
c7a913cd 367
e71456ae
SRRH
368 if (seq_has_overflowed(s))
369 return -ENOSPC;
c7a913cd 370
5962815a
PNA
371 for (i = 0; i < NF_LOG_TYPE_MAX; i++) {
372 if (loggers[*pos][i] == NULL)
373 continue;
374
0c26ed1c 375 logger = nft_log_dereference(loggers[*pos][i]);
e71456ae
SRRH
376 seq_printf(s, "%s", logger->name);
377 if (i == 0 && loggers[*pos][i + 1] != NULL)
cdec2685 378 seq_puts(s, ",");
e71456ae
SRRH
379
380 if (seq_has_overflowed(s))
381 return -ENOSPC;
c7a913cd 382 }
601e68e1 383
cdec2685 384 seq_puts(s, ")\n");
e71456ae
SRRH
385
386 if (seq_has_overflowed(s))
387 return -ENOSPC;
388 return 0;
f6ebe77f
HW
389}
390
56b3d975 391static const struct seq_operations nflog_seq_ops = {
f6ebe77f
HW
392 .start = seq_start,
393 .next = seq_next,
394 .stop = seq_stop,
395 .show = seq_show,
396};
f6ebe77f
HW
397#endif /* PROC_FS */
398
17625274 399#ifdef CONFIG_SYSCTL
17625274
EL
400static char nf_log_sysctl_fnames[NFPROTO_NUMPROTO-NFPROTO_UNSPEC][3];
401static struct ctl_table nf_log_sysctl_table[NFPROTO_NUMPROTO+1];
2851940f
MK
402static struct ctl_table_header *nf_log_sysctl_fhdr;
403
404static struct ctl_table nf_log_sysctl_ftable[] = {
405 {
406 .procname = "nf_log_all_netns",
407 .data = &sysctl_nf_log_all_netns,
408 .maxlen = sizeof(sysctl_nf_log_all_netns),
409 .mode = 0644,
410 .proc_handler = proc_dointvec,
411 },
412 { }
413};
f6ebe77f 414
fe2c6338 415static int nf_log_proc_dostring(struct ctl_table *table, int write,
24955619 416 void __user *buffer, size_t *lenp, loff_t *ppos)
17625274
EL
417{
418 const struct nf_logger *logger;
24955619 419 char buf[NFLOGGER_NAME_LEN];
17625274
EL
420 int r = 0;
421 int tindex = (unsigned long)table->extra1;
dbb5918c 422 struct net *net = table->extra2;
17625274
EL
423
424 if (write) {
c6ac37d8
PT
425 struct ctl_table tmp = *table;
426
dffd22ae
JH
427 /* proc_dostring() can append to existing strings, so we need to
428 * initialize it as an empty string.
429 */
430 buf[0] = '\0';
c6ac37d8
PT
431 tmp.data = buf;
432 r = proc_dostring(&tmp, write, buffer, lenp, ppos);
433 if (r)
434 return r;
24955619
PM
435
436 if (!strcmp(buf, "NONE")) {
30e0c6a6 437 nf_log_unbind_pf(net, tindex);
17625274
EL
438 return 0;
439 }
440 mutex_lock(&nf_log_mutex);
24955619 441 logger = __find_logger(tindex, buf);
17625274
EL
442 if (logger == NULL) {
443 mutex_unlock(&nf_log_mutex);
444 return -ENOENT;
445 }
30e0c6a6 446 rcu_assign_pointer(net->nf.nf_loggers[tindex], logger);
17625274
EL
447 mutex_unlock(&nf_log_mutex);
448 } else {
ce00bf07
JH
449 struct ctl_table tmp = *table;
450
451 tmp.data = buf;
266d07cb 452 mutex_lock(&nf_log_mutex);
0c26ed1c 453 logger = nft_log_dereference(net->nf.nf_loggers[tindex]);
17625274 454 if (!logger)
ce00bf07 455 strlcpy(buf, "NONE", sizeof(buf));
17625274 456 else
ce00bf07 457 strlcpy(buf, logger->name, sizeof(buf));
266d07cb 458 mutex_unlock(&nf_log_mutex);
ce00bf07 459 r = proc_dostring(&tmp, write, buffer, lenp, ppos);
17625274
EL
460 }
461
462 return r;
463}
464
30e0c6a6 465static int netfilter_log_sysctl_init(struct net *net)
f6ebe77f 466{
ca735b3a 467 int i;
30e0c6a6
G
468 struct ctl_table *table;
469
470 table = nf_log_sysctl_table;
471 if (!net_eq(net, &init_net)) {
472 table = kmemdup(nf_log_sysctl_table,
473 sizeof(nf_log_sysctl_table),
474 GFP_KERNEL);
475 if (!table)
476 goto err_alloc;
477 } else {
478 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++) {
479 snprintf(nf_log_sysctl_fnames[i],
480 3, "%d", i);
481 nf_log_sysctl_table[i].procname =
482 nf_log_sysctl_fnames[i];
8aefc4d1 483 nf_log_sysctl_table[i].maxlen = NFLOGGER_NAME_LEN;
30e0c6a6
G
484 nf_log_sysctl_table[i].mode = 0644;
485 nf_log_sysctl_table[i].proc_handler =
486 nf_log_proc_dostring;
487 nf_log_sysctl_table[i].extra1 =
488 (void *)(unsigned long) i;
489 }
2851940f
MK
490 nf_log_sysctl_fhdr = register_net_sysctl(net, "net/netfilter",
491 nf_log_sysctl_ftable);
492 if (!nf_log_sysctl_fhdr)
493 goto err_freg;
17625274
EL
494 }
495
dbb5918c
JH
496 for (i = NFPROTO_UNSPEC; i < NFPROTO_NUMPROTO; i++)
497 table[i].extra2 = net;
498
30e0c6a6
G
499 net->nf.nf_log_dir_header = register_net_sysctl(net,
500 "net/netfilter/nf_log",
501 table);
502 if (!net->nf.nf_log_dir_header)
503 goto err_reg;
17625274
EL
504
505 return 0;
30e0c6a6
G
506
507err_reg:
508 if (!net_eq(net, &init_net))
509 kfree(table);
2851940f
MK
510 else
511 unregister_net_sysctl_table(nf_log_sysctl_fhdr);
512err_freg:
30e0c6a6
G
513err_alloc:
514 return -ENOMEM;
515}
516
517static void netfilter_log_sysctl_exit(struct net *net)
518{
519 struct ctl_table *table;
520
521 table = net->nf.nf_log_dir_header->ctl_table_arg;
522 unregister_net_sysctl_table(net->nf.nf_log_dir_header);
523 if (!net_eq(net, &init_net))
524 kfree(table);
2851940f
MK
525 else
526 unregister_net_sysctl_table(nf_log_sysctl_fhdr);
17625274
EL
527}
528#else
30e0c6a6 529static int netfilter_log_sysctl_init(struct net *net)
17625274
EL
530{
531 return 0;
532}
30e0c6a6
G
533
534static void netfilter_log_sysctl_exit(struct net *net)
535{
536}
17625274
EL
537#endif /* CONFIG_SYSCTL */
538
30e0c6a6 539static int __net_init nf_log_net_init(struct net *net)
17625274 540{
30e0c6a6
G
541 int ret = -ENOMEM;
542
f6ebe77f 543#ifdef CONFIG_PROC_FS
c3506372
CH
544 if (!proc_create_net("nf_log", 0444, net->nf.proc_netfilter,
545 &nflog_seq_ops, sizeof(struct seq_net_private)))
30e0c6a6 546 return ret;
62243927 547#endif
30e0c6a6
G
548 ret = netfilter_log_sysctl_init(net);
549 if (ret < 0)
550 goto out_sysctl;
ca735b3a 551
30e0c6a6
G
552 return 0;
553
554out_sysctl:
e778f56e 555#ifdef CONFIG_PROC_FS
6d11cfdb 556 remove_proc_entry("nf_log", net->nf.proc_netfilter);
e778f56e 557#endif
30e0c6a6
G
558 return ret;
559}
560
561static void __net_exit nf_log_net_exit(struct net *net)
562{
563 netfilter_log_sysctl_exit(net);
e778f56e 564#ifdef CONFIG_PROC_FS
30e0c6a6 565 remove_proc_entry("nf_log", net->nf.proc_netfilter);
e778f56e 566#endif
30e0c6a6
G
567}
568
569static struct pernet_operations nf_log_net_ops = {
570 .init = nf_log_net_init,
571 .exit = nf_log_net_exit,
572};
573
574int __init netfilter_log_init(void)
575{
5962815a 576 return register_pernet_subsys(&nf_log_net_ops);
f6ebe77f 577}