]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/netfilter/xt_connbytes.c
x86/msr-index: Cleanup bit defines
[mirror_ubuntu-bionic-kernel.git] / net / netfilter / xt_connbytes.c
CommitLineData
9d810fd2
HW
1/* Kernel module to match connection tracking byte counter.
2 * GPL (C) 2002 Martin Devera (devik@cdi.cz).
9d810fd2 3 */
8bee4bad 4#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
9d810fd2 5#include <linux/module.h>
1977f032 6#include <linux/bitops.h>
9d810fd2 7#include <linux/skbuff.h>
6f6d6a1a 8#include <linux/math64.h>
2e4e6a17
HW
9#include <linux/netfilter/x_tables.h>
10#include <linux/netfilter/xt_connbytes.h>
587aa641 11#include <net/netfilter/nf_conntrack.h>
58401572 12#include <net/netfilter/nf_conntrack_acct.h>
9d810fd2 13
9d810fd2
HW
14MODULE_LICENSE("GPL");
15MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
2ae15b64 16MODULE_DESCRIPTION("Xtables: Number of packets/bytes per connection matching");
2e4e6a17 17MODULE_ALIAS("ipt_connbytes");
73aaf935 18MODULE_ALIAS("ip6t_connbytes");
9d810fd2 19
1d93a9cb 20static bool
62fc8051 21connbytes_mt(const struct sk_buff *skb, struct xt_action_param *par)
9d810fd2 22{
f7108a20 23 const struct xt_connbytes_info *sinfo = par->matchinfo;
a47362a2 24 const struct nf_conn *ct;
587aa641 25 enum ip_conntrack_info ctinfo;
9d810fd2 26 u_int64_t what = 0; /* initialize to make gcc happy */
fb74a841
PM
27 u_int64_t bytes = 0;
28 u_int64_t pkts = 0;
f7b13e43 29 const struct nf_conn_acct *acct;
58401572 30 const struct nf_conn_counter *counters;
9d810fd2 31
587aa641
PM
32 ct = nf_ct_get(skb, &ctinfo);
33 if (!ct)
1d93a9cb 34 return false;
58401572 35
f7b13e43
HE
36 acct = nf_conn_acct_find(ct);
37 if (!acct)
58401572 38 return false;
9d810fd2 39
f7b13e43 40 counters = acct->counter;
9d810fd2 41 switch (sinfo->what) {
2e4e6a17 42 case XT_CONNBYTES_PKTS:
9d810fd2 43 switch (sinfo->direction) {
2e4e6a17 44 case XT_CONNBYTES_DIR_ORIGINAL:
b3e0bfa7 45 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets);
9d810fd2 46 break;
2e4e6a17 47 case XT_CONNBYTES_DIR_REPLY:
b3e0bfa7 48 what = atomic64_read(&counters[IP_CT_DIR_REPLY].packets);
9d810fd2 49 break;
2e4e6a17 50 case XT_CONNBYTES_DIR_BOTH:
b3e0bfa7
ED
51 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets);
52 what += atomic64_read(&counters[IP_CT_DIR_REPLY].packets);
9d810fd2
HW
53 break;
54 }
55 break;
2e4e6a17 56 case XT_CONNBYTES_BYTES:
9d810fd2 57 switch (sinfo->direction) {
2e4e6a17 58 case XT_CONNBYTES_DIR_ORIGINAL:
b3e0bfa7 59 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].bytes);
9d810fd2 60 break;
2e4e6a17 61 case XT_CONNBYTES_DIR_REPLY:
b3e0bfa7 62 what = atomic64_read(&counters[IP_CT_DIR_REPLY].bytes);
9d810fd2 63 break;
2e4e6a17 64 case XT_CONNBYTES_DIR_BOTH:
b3e0bfa7
ED
65 what = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].bytes);
66 what += atomic64_read(&counters[IP_CT_DIR_REPLY].bytes);
9d810fd2
HW
67 break;
68 }
69 break;
2e4e6a17 70 case XT_CONNBYTES_AVGPKT:
9d810fd2 71 switch (sinfo->direction) {
2e4e6a17 72 case XT_CONNBYTES_DIR_ORIGINAL:
b3e0bfa7
ED
73 bytes = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].bytes);
74 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets);
9d810fd2 75 break;
2e4e6a17 76 case XT_CONNBYTES_DIR_REPLY:
b3e0bfa7
ED
77 bytes = atomic64_read(&counters[IP_CT_DIR_REPLY].bytes);
78 pkts = atomic64_read(&counters[IP_CT_DIR_REPLY].packets);
9d810fd2 79 break;
2e4e6a17 80 case XT_CONNBYTES_DIR_BOTH:
b3e0bfa7
ED
81 bytes = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].bytes) +
82 atomic64_read(&counters[IP_CT_DIR_REPLY].bytes);
83 pkts = atomic64_read(&counters[IP_CT_DIR_ORIGINAL].packets) +
84 atomic64_read(&counters[IP_CT_DIR_REPLY].packets);
9d810fd2
HW
85 break;
86 }
fb74a841 87 if (pkts != 0)
6f6d6a1a 88 what = div64_u64(bytes, pkts);
9d810fd2
HW
89 break;
90 }
91
0354b48f 92 if (sinfo->count.to >= sinfo->count.from)
7c4e36bc 93 return what <= sinfo->count.to && what >= sinfo->count.from;
0354b48f
FW
94 else /* inverted */
95 return what < sinfo->count.to || what > sinfo->count.from;
9d810fd2
HW
96}
97
b0f38452 98static int connbytes_mt_check(const struct xt_mtchk_param *par)
9d810fd2 99{
9b4fce7a 100 const struct xt_connbytes_info *sinfo = par->matchinfo;
4a5a5c73 101 int ret;
9d810fd2 102
2e4e6a17
HW
103 if (sinfo->what != XT_CONNBYTES_PKTS &&
104 sinfo->what != XT_CONNBYTES_BYTES &&
105 sinfo->what != XT_CONNBYTES_AVGPKT)
bd414ee6 106 return -EINVAL;
9d810fd2 107
2e4e6a17
HW
108 if (sinfo->direction != XT_CONNBYTES_DIR_ORIGINAL &&
109 sinfo->direction != XT_CONNBYTES_DIR_REPLY &&
110 sinfo->direction != XT_CONNBYTES_DIR_BOTH)
bd414ee6 111 return -EINVAL;
9d810fd2 112
ecb2421b 113 ret = nf_ct_netns_get(par->net, par->family);
f95c74e3 114 if (ret < 0)
8bee4bad
JE
115 pr_info("cannot load conntrack support for proto=%u\n",
116 par->family);
a8756201
TG
117
118 /*
119 * This filter cannot function correctly unless connection tracking
120 * accounting is enabled, so complain in the hope that someone notices.
121 */
122 if (!nf_ct_acct_enabled(par->net)) {
b167a37c 123 pr_warn("Forcing CT accounting to be enabled\n");
a8756201
TG
124 nf_ct_set_acct(par->net, true);
125 }
126
f95c74e3 127 return ret;
9d810fd2
HW
128}
129
6be3d859 130static void connbytes_mt_destroy(const struct xt_mtdtor_param *par)
11078c37 131{
ecb2421b 132 nf_ct_netns_put(par->net, par->family);
11078c37
YK
133}
134
92f3b2b1
JE
135static struct xt_match connbytes_mt_reg __read_mostly = {
136 .name = "connbytes",
137 .revision = 0,
138 .family = NFPROTO_UNSPEC,
139 .checkentry = connbytes_mt_check,
140 .match = connbytes_mt,
141 .destroy = connbytes_mt_destroy,
142 .matchsize = sizeof(struct xt_connbytes_info),
143 .me = THIS_MODULE,
9d810fd2
HW
144};
145
d3c5ee6d 146static int __init connbytes_mt_init(void)
9d810fd2 147{
92f3b2b1 148 return xt_register_match(&connbytes_mt_reg);
9d810fd2
HW
149}
150
d3c5ee6d 151static void __exit connbytes_mt_exit(void)
9d810fd2 152{
92f3b2b1 153 xt_unregister_match(&connbytes_mt_reg);
9d810fd2
HW
154}
155
d3c5ee6d
JE
156module_init(connbytes_mt_init);
157module_exit(connbytes_mt_exit);