5 * Bart De Schuymer <bdschuym@pandora.be>
11 #include <linux/netfilter_bridge/ebtables.h>
12 #include <linux/netfilter_bridge/ebt_log.h>
13 #include <linux/module.h>
15 #include <linux/if_arp.h>
16 #include <linux/spinlock.h>
18 static DEFINE_SPINLOCK(ebt_log_lock);
20 static int ebt_log_check(const char *tablename, unsigned int hookmask,
21 const struct ebt_entry *e, void *data, unsigned int datalen)
23 struct ebt_log_info *info = (struct ebt_log_info *)data;
25 if (datalen != EBT_ALIGN(sizeof(struct ebt_log_info)))
27 if (info->bitmask & ~EBT_LOG_MASK)
29 if (info->loglevel >= 8)
31 info->prefix[EBT_LOG_PREFIX_SIZE - 1] = '\0';
43 unsigned char mac_src[ETH_ALEN];
44 unsigned char ip_src[4];
45 unsigned char mac_dst[ETH_ALEN];
46 unsigned char ip_dst[4];
49 static void print_MAC(unsigned char *p)
53 for (i = 0; i < ETH_ALEN; i++, p++)
54 printk("%02x%c", *p, i == ETH_ALEN - 1 ? ' ':':');
57 #define myNIPQUAD(a) a[0], a[1], a[2], a[3]
58 static void ebt_log(const struct sk_buff *skb, unsigned int hooknr,
59 const struct net_device *in, const struct net_device *out,
60 const void *data, unsigned int datalen)
62 struct ebt_log_info *info = (struct ebt_log_info *)data;
63 char level_string[4] = "< >";
65 level_string[1] = '0' + info->loglevel;
66 spin_lock_bh(&ebt_log_lock);
68 printk("%s IN=%s OUT=%s ", info->prefix, in ? in->name : "",
69 out ? out->name : "");
71 printk("MAC source = ");
72 print_MAC(eth_hdr(skb)->h_source);
73 printk("MAC dest = ");
74 print_MAC(eth_hdr(skb)->h_dest);
76 printk("proto = 0x%04x", ntohs(eth_hdr(skb)->h_proto));
78 if ((info->bitmask & EBT_LOG_IP) && eth_hdr(skb)->h_proto ==
80 struct iphdr _iph, *ih;
82 ih = skb_header_pointer(skb, 0, sizeof(_iph), &_iph);
84 printk(" INCOMPLETE IP header");
87 printk(" IP SRC=%u.%u.%u.%u IP DST=%u.%u.%u.%u,",
88 NIPQUAD(ih->saddr), NIPQUAD(ih->daddr));
89 printk(" IP tos=0x%02X, IP proto=%d", ih->tos,
91 if (ih->protocol == IPPROTO_TCP ||
92 ih->protocol == IPPROTO_UDP) {
93 struct tcpudphdr _ports, *pptr;
95 pptr = skb_header_pointer(skb, ih->ihl*4,
96 sizeof(_ports), &_ports);
98 printk(" INCOMPLETE TCP/UDP header");
101 printk(" SPT=%u DPT=%u", ntohs(pptr->src),
107 if ((info->bitmask & EBT_LOG_ARP) &&
108 ((eth_hdr(skb)->h_proto == htons(ETH_P_ARP)) ||
109 (eth_hdr(skb)->h_proto == htons(ETH_P_RARP)))) {
110 struct arphdr _arph, *ah;
112 ah = skb_header_pointer(skb, 0, sizeof(_arph), &_arph);
114 printk(" INCOMPLETE ARP header");
117 printk(" ARP HTYPE=%d, PTYPE=0x%04x, OPCODE=%d",
118 ntohs(ah->ar_hrd), ntohs(ah->ar_pro),
121 /* If it's for Ethernet and the lengths are OK,
122 * then log the ARP payload */
123 if (ah->ar_hrd == htons(1) &&
124 ah->ar_hln == ETH_ALEN &&
125 ah->ar_pln == sizeof(uint32_t)) {
126 struct arppayload _arpp, *ap;
128 ap = skb_header_pointer(skb, sizeof(_arph),
129 sizeof(_arpp), &_arpp);
131 printk(" INCOMPLETE ARP payload");
134 printk(" ARP MAC SRC=");
135 print_MAC(ap->mac_src);
136 printk(" ARP IP SRC=%u.%u.%u.%u",
137 myNIPQUAD(ap->ip_src));
138 printk(" ARP MAC DST=");
139 print_MAC(ap->mac_dst);
140 printk(" ARP IP DST=%u.%u.%u.%u",
141 myNIPQUAD(ap->ip_dst));
146 spin_unlock_bh(&ebt_log_lock);
149 static struct ebt_watcher log =
151 .name = EBT_LOG_WATCHER,
153 .check = ebt_log_check,
157 static int __init init(void)
159 return ebt_register_watcher(&log);
162 static void __exit fini(void)
164 ebt_unregister_watcher(&log);
169 MODULE_LICENSE("GPL");