1 // SPDX-License-Identifier: GPL-2.0-only
6 * Bart De Schuymer <bdschuym@pandora.be>
7 * Harald Welte <laforge@netfilter.org>
12 #include <linux/module.h>
15 #include <linux/if_arp.h>
16 #include <linux/spinlock.h>
17 #include <net/netfilter/nf_log.h>
18 #include <linux/ipv6.h>
20 #include <linux/in6.h>
21 #include <linux/netfilter/x_tables.h>
22 #include <linux/netfilter_bridge/ebtables.h>
23 #include <linux/netfilter_bridge/ebt_log.h>
24 #include <linux/netfilter.h>
26 static DEFINE_SPINLOCK(ebt_log_lock
);
28 static int ebt_log_tg_check(const struct xt_tgchk_param
*par
)
30 struct ebt_log_info
*info
= par
->targinfo
;
32 if (info
->bitmask
& ~EBT_LOG_MASK
)
34 if (info
->loglevel
>= 8)
36 info
->prefix
[EBT_LOG_PREFIX_SIZE
- 1] = '\0';
46 unsigned char mac_src
[ETH_ALEN
];
47 unsigned char ip_src
[4];
48 unsigned char mac_dst
[ETH_ALEN
];
49 unsigned char ip_dst
[4];
53 print_ports(const struct sk_buff
*skb
, uint8_t protocol
, int offset
)
55 if (protocol
== IPPROTO_TCP
||
56 protocol
== IPPROTO_UDP
||
57 protocol
== IPPROTO_UDPLITE
||
58 protocol
== IPPROTO_SCTP
||
59 protocol
== IPPROTO_DCCP
) {
60 const struct tcpudphdr
*pptr
;
61 struct tcpudphdr _ports
;
63 pptr
= skb_header_pointer(skb
, offset
,
64 sizeof(_ports
), &_ports
);
66 pr_cont(" INCOMPLETE TCP/UDP header");
69 pr_cont(" SPT=%u DPT=%u", ntohs(pptr
->src
), ntohs(pptr
->dst
));
74 ebt_log_packet(struct net
*net
, u_int8_t pf
, unsigned int hooknum
,
75 const struct sk_buff
*skb
, const struct net_device
*in
,
76 const struct net_device
*out
, const struct nf_loginfo
*loginfo
,
81 /* FIXME: Disabled from containers until syslog ns is supported */
82 if (!net_eq(net
, &init_net
) && !sysctl_nf_log_all_netns
)
85 spin_lock_bh(&ebt_log_lock
);
86 printk(KERN_SOH
"%c%s IN=%s OUT=%s MAC source = %pM MAC dest = %pM proto = 0x%04x",
87 '0' + loginfo
->u
.log
.level
, prefix
,
88 in
? in
->name
: "", out
? out
->name
: "",
89 eth_hdr(skb
)->h_source
, eth_hdr(skb
)->h_dest
,
90 ntohs(eth_hdr(skb
)->h_proto
));
92 if (loginfo
->type
== NF_LOG_TYPE_LOG
)
93 bitmask
= loginfo
->u
.log
.logflags
;
95 bitmask
= NF_LOG_DEFAULT_MASK
;
97 if ((bitmask
& EBT_LOG_IP
) && eth_hdr(skb
)->h_proto
==
99 const struct iphdr
*ih
;
102 ih
= skb_header_pointer(skb
, 0, sizeof(_iph
), &_iph
);
104 pr_cont(" INCOMPLETE IP header");
107 pr_cont(" IP SRC=%pI4 IP DST=%pI4, IP tos=0x%02X, IP proto=%d",
108 &ih
->saddr
, &ih
->daddr
, ih
->tos
, ih
->protocol
);
109 print_ports(skb
, ih
->protocol
, ih
->ihl
*4);
113 #if IS_ENABLED(CONFIG_BRIDGE_EBT_IP6)
114 if ((bitmask
& EBT_LOG_IP6
) && eth_hdr(skb
)->h_proto
==
116 const struct ipv6hdr
*ih
;
122 ih
= skb_header_pointer(skb
, 0, sizeof(_iph
), &_iph
);
124 pr_cont(" INCOMPLETE IPv6 header");
127 pr_cont(" IPv6 SRC=%pI6 IPv6 DST=%pI6, IPv6 priority=0x%01X, Next Header=%d",
128 &ih
->saddr
, &ih
->daddr
, ih
->priority
, ih
->nexthdr
);
129 nexthdr
= ih
->nexthdr
;
130 offset_ph
= ipv6_skip_exthdr(skb
, sizeof(_iph
), &nexthdr
, &frag_off
);
133 print_ports(skb
, nexthdr
, offset_ph
);
138 if ((bitmask
& EBT_LOG_ARP
) &&
139 ((eth_hdr(skb
)->h_proto
== htons(ETH_P_ARP
)) ||
140 (eth_hdr(skb
)->h_proto
== htons(ETH_P_RARP
)))) {
141 const struct arphdr
*ah
;
144 ah
= skb_header_pointer(skb
, 0, sizeof(_arph
), &_arph
);
146 pr_cont(" INCOMPLETE ARP header");
149 pr_cont(" ARP HTYPE=%d, PTYPE=0x%04x, OPCODE=%d",
150 ntohs(ah
->ar_hrd
), ntohs(ah
->ar_pro
),
153 /* If it's for Ethernet and the lengths are OK,
154 * then log the ARP payload
156 if (ah
->ar_hrd
== htons(1) &&
157 ah
->ar_hln
== ETH_ALEN
&&
158 ah
->ar_pln
== sizeof(__be32
)) {
159 const struct arppayload
*ap
;
160 struct arppayload _arpp
;
162 ap
= skb_header_pointer(skb
, sizeof(_arph
),
163 sizeof(_arpp
), &_arpp
);
165 pr_cont(" INCOMPLETE ARP payload");
168 pr_cont(" ARP MAC SRC=%pM ARP IP SRC=%pI4 ARP MAC DST=%pM ARP IP DST=%pI4",
169 ap
->mac_src
, ap
->ip_src
,
170 ap
->mac_dst
, ap
->ip_dst
);
175 spin_unlock_bh(&ebt_log_lock
);
179 ebt_log_tg(struct sk_buff
*skb
, const struct xt_action_param
*par
)
181 const struct ebt_log_info
*info
= par
->targinfo
;
182 struct nf_loginfo li
;
183 struct net
*net
= xt_net(par
);
185 li
.type
= NF_LOG_TYPE_LOG
;
186 li
.u
.log
.level
= info
->loglevel
;
187 li
.u
.log
.logflags
= info
->bitmask
;
189 /* Remember that we have to use ebt_log_packet() not to break backward
190 * compatibility. We cannot use the default bridge packet logger via
191 * nf_log_packet() with NFT_LOG_TYPE_LOG here. --Pablo
193 if (info
->bitmask
& EBT_LOG_NFLOG
)
194 nf_log_packet(net
, NFPROTO_BRIDGE
, xt_hooknum(par
), skb
,
195 xt_in(par
), xt_out(par
), &li
, "%s",
198 ebt_log_packet(net
, NFPROTO_BRIDGE
, xt_hooknum(par
), skb
,
199 xt_in(par
), xt_out(par
), &li
, info
->prefix
);
203 static struct xt_target ebt_log_tg_reg __read_mostly
= {
206 .family
= NFPROTO_BRIDGE
,
207 .target
= ebt_log_tg
,
208 .checkentry
= ebt_log_tg_check
,
209 .targetsize
= sizeof(struct ebt_log_info
),
213 static int __init
ebt_log_init(void)
215 return xt_register_target(&ebt_log_tg_reg
);
218 static void __exit
ebt_log_fini(void)
220 xt_unregister_target(&ebt_log_tg_reg
);
223 module_init(ebt_log_init
);
224 module_exit(ebt_log_fini
);
225 MODULE_DESCRIPTION("Ebtables: Packet logging to syslog");
226 MODULE_LICENSE("GPL");