148 lines
3.5 KiB
C
148 lines
3.5 KiB
C
/*
|
|
* src/nf-log.c Monitor netfilter log events
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation version 2.1
|
|
* of the License.
|
|
*
|
|
* Copyright (c) 2003-2008 Thomas Graf <tgraf@suug.ch>
|
|
* Copyright (c) 2007 Philip Craig <philipc@snapgear.com>
|
|
* Copyright (c) 2007 Secure Computing Corporation
|
|
*/
|
|
|
|
#include <netlink/cli/utils.h>
|
|
#include <netlink/cli/link.h>
|
|
#include <linux/netfilter/nfnetlink_log.h>
|
|
#include <netlink/netfilter/nfnl.h>
|
|
#include <netlink/netfilter/log.h>
|
|
|
|
static struct nfnl_log *alloc_log(void)
|
|
{
|
|
struct nfnl_log *log;
|
|
|
|
log = nfnl_log_alloc();
|
|
if (!log)
|
|
nl_cli_fatal(ENOMEM, "Unable to allocate log object");
|
|
|
|
return log;
|
|
}
|
|
|
|
static void obj_input(struct nl_object *obj, void *arg)
|
|
{
|
|
struct nl_dump_params dp = {
|
|
.dp_type = NL_DUMP_STATS,
|
|
.dp_fd = stdout,
|
|
.dp_dump_msgtype = 1,
|
|
};
|
|
|
|
nl_object_dump(obj, &dp);
|
|
}
|
|
|
|
static int event_input(struct nl_msg *msg, void *arg)
|
|
{
|
|
if (nl_msg_parse(msg, &obj_input, NULL) < 0)
|
|
fprintf(stderr, "<<EVENT>> Unknown message type\n");
|
|
|
|
/* Exit nl_recvmsgs_def() and return to the main select() */
|
|
return NL_STOP;
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
struct nl_sock *nf_sock;
|
|
struct nl_sock *rt_sock;
|
|
struct nl_cache *link_cache;
|
|
struct nfnl_log *log;
|
|
enum nfnl_log_copy_mode copy_mode;
|
|
uint32_t copy_range;
|
|
int err;
|
|
int family;
|
|
|
|
nf_sock = nl_cli_alloc_socket();
|
|
nl_socket_disable_seq_check(nf_sock);
|
|
nl_socket_modify_cb(nf_sock, NL_CB_VALID, NL_CB_CUSTOM, event_input, NULL);
|
|
|
|
if ((argc > 1 && !strcasecmp(argv[1], "-h")) || argc < 3) {
|
|
printf("Usage: nf-log family group [ copy_mode ] "
|
|
"[copy_range] \n");
|
|
return 2;
|
|
}
|
|
|
|
nl_cli_connect(nf_sock, NETLINK_NETFILTER);
|
|
|
|
family = nl_str2af(argv[1]);
|
|
if (family == AF_UNSPEC)
|
|
nl_cli_fatal(NLE_INVAL, "Unknown family \"%s\": %s",
|
|
argv[1], nl_geterror(family));
|
|
|
|
nfnl_log_pf_unbind(nf_sock, family);
|
|
if ((err = nfnl_log_pf_bind(nf_sock, family)) < 0)
|
|
nl_cli_fatal(err, "Unable to bind logger: %s",
|
|
nl_geterror(err));
|
|
|
|
log = alloc_log();
|
|
nfnl_log_set_group(log, atoi(argv[2]));
|
|
|
|
copy_mode = NFNL_LOG_COPY_META;
|
|
if (argc > 3) {
|
|
copy_mode = nfnl_log_str2copy_mode(argv[3]);
|
|
if (copy_mode < 0)
|
|
nl_cli_fatal(copy_mode,
|
|
"Unable to parse copy mode \"%s\": %s",
|
|
argv[3], nl_geterror(copy_mode));
|
|
}
|
|
nfnl_log_set_copy_mode(log, copy_mode);
|
|
|
|
copy_range = 0xFFFF;
|
|
if (argc > 4)
|
|
copy_mode = atoi(argv[4]);
|
|
nfnl_log_set_copy_range(log, copy_range);
|
|
|
|
if ((err = nfnl_log_create(nf_sock, log)) < 0)
|
|
nl_cli_fatal(err, "Unable to bind instance: %s",
|
|
nl_geterror(err));
|
|
|
|
{
|
|
struct nl_dump_params dp = {
|
|
.dp_type = NL_DUMP_STATS,
|
|
.dp_fd = stdout,
|
|
.dp_dump_msgtype = 1,
|
|
};
|
|
|
|
printf("log params: ");
|
|
nl_object_dump((struct nl_object *) log, &dp);
|
|
}
|
|
|
|
rt_sock = nl_cli_alloc_socket();
|
|
nl_cli_connect(rt_sock, NETLINK_ROUTE);
|
|
link_cache = nl_cli_link_alloc_cache(rt_sock);
|
|
|
|
while (1) {
|
|
fd_set rfds;
|
|
int nffd, rtfd, maxfd, retval;
|
|
|
|
FD_ZERO(&rfds);
|
|
|
|
maxfd = nffd = nl_socket_get_fd(nf_sock);
|
|
FD_SET(nffd, &rfds);
|
|
|
|
rtfd = nl_socket_get_fd(rt_sock);
|
|
FD_SET(rtfd, &rfds);
|
|
if (maxfd < rtfd)
|
|
maxfd = rtfd;
|
|
|
|
/* wait for an incoming message on the netlink nf_socket */
|
|
retval = select(maxfd+1, &rfds, NULL, NULL, NULL);
|
|
|
|
if (retval) {
|
|
if (FD_ISSET(nffd, &rfds))
|
|
nl_recvmsgs_default(nf_sock);
|
|
if (FD_ISSET(rtfd, &rfds))
|
|
nl_recvmsgs_default(rt_sock);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|