netfilter: xtables: move extension arguments into compound structure (1/6)
[deliverable/linux.git] / net / netfilter / xt_connbytes.c
... / ...
CommitLineData
1/* Kernel module to match connection tracking byte counter.
2 * GPL (C) 2002 Martin Devera (devik@cdi.cz).
3 */
4#include <linux/module.h>
5#include <linux/bitops.h>
6#include <linux/skbuff.h>
7#include <linux/math64.h>
8#include <linux/netfilter/x_tables.h>
9#include <linux/netfilter/xt_connbytes.h>
10#include <net/netfilter/nf_conntrack.h>
11#include <net/netfilter/nf_conntrack_acct.h>
12
13MODULE_LICENSE("GPL");
14MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
15MODULE_DESCRIPTION("Xtables: Number of packets/bytes per connection matching");
16MODULE_ALIAS("ipt_connbytes");
17MODULE_ALIAS("ip6t_connbytes");
18
19static bool
20connbytes_mt(const struct sk_buff *skb, const struct xt_match_param *par)
21{
22 const struct xt_connbytes_info *sinfo = par->matchinfo;
23 const struct nf_conn *ct;
24 enum ip_conntrack_info ctinfo;
25 u_int64_t what = 0; /* initialize to make gcc happy */
26 u_int64_t bytes = 0;
27 u_int64_t pkts = 0;
28 const struct nf_conn_counter *counters;
29
30 ct = nf_ct_get(skb, &ctinfo);
31 if (!ct)
32 return false;
33
34 counters = nf_conn_acct_find(ct);
35 if (!counters)
36 return false;
37
38 switch (sinfo->what) {
39 case XT_CONNBYTES_PKTS:
40 switch (sinfo->direction) {
41 case XT_CONNBYTES_DIR_ORIGINAL:
42 what = counters[IP_CT_DIR_ORIGINAL].packets;
43 break;
44 case XT_CONNBYTES_DIR_REPLY:
45 what = counters[IP_CT_DIR_REPLY].packets;
46 break;
47 case XT_CONNBYTES_DIR_BOTH:
48 what = counters[IP_CT_DIR_ORIGINAL].packets;
49 what += counters[IP_CT_DIR_REPLY].packets;
50 break;
51 }
52 break;
53 case XT_CONNBYTES_BYTES:
54 switch (sinfo->direction) {
55 case XT_CONNBYTES_DIR_ORIGINAL:
56 what = counters[IP_CT_DIR_ORIGINAL].bytes;
57 break;
58 case XT_CONNBYTES_DIR_REPLY:
59 what = counters[IP_CT_DIR_REPLY].bytes;
60 break;
61 case XT_CONNBYTES_DIR_BOTH:
62 what = counters[IP_CT_DIR_ORIGINAL].bytes;
63 what += counters[IP_CT_DIR_REPLY].bytes;
64 break;
65 }
66 break;
67 case XT_CONNBYTES_AVGPKT:
68 switch (sinfo->direction) {
69 case XT_CONNBYTES_DIR_ORIGINAL:
70 bytes = counters[IP_CT_DIR_ORIGINAL].bytes;
71 pkts = counters[IP_CT_DIR_ORIGINAL].packets;
72 break;
73 case XT_CONNBYTES_DIR_REPLY:
74 bytes = counters[IP_CT_DIR_REPLY].bytes;
75 pkts = counters[IP_CT_DIR_REPLY].packets;
76 break;
77 case XT_CONNBYTES_DIR_BOTH:
78 bytes = counters[IP_CT_DIR_ORIGINAL].bytes +
79 counters[IP_CT_DIR_REPLY].bytes;
80 pkts = counters[IP_CT_DIR_ORIGINAL].packets +
81 counters[IP_CT_DIR_REPLY].packets;
82 break;
83 }
84 if (pkts != 0)
85 what = div64_u64(bytes, pkts);
86 break;
87 }
88
89 if (sinfo->count.to)
90 return what <= sinfo->count.to && what >= sinfo->count.from;
91 else
92 return what >= sinfo->count.from;
93}
94
95static bool
96connbytes_mt_check(const char *tablename, const void *ip,
97 const struct xt_match *match, void *matchinfo,
98 unsigned int hook_mask)
99{
100 const struct xt_connbytes_info *sinfo = matchinfo;
101
102 if (sinfo->what != XT_CONNBYTES_PKTS &&
103 sinfo->what != XT_CONNBYTES_BYTES &&
104 sinfo->what != XT_CONNBYTES_AVGPKT)
105 return false;
106
107 if (sinfo->direction != XT_CONNBYTES_DIR_ORIGINAL &&
108 sinfo->direction != XT_CONNBYTES_DIR_REPLY &&
109 sinfo->direction != XT_CONNBYTES_DIR_BOTH)
110 return false;
111
112 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
113 printk(KERN_WARNING "can't load conntrack support for "
114 "proto=%u\n", match->family);
115 return false;
116 }
117
118 return true;
119}
120
121static void
122connbytes_mt_destroy(const struct xt_match *match, void *matchinfo)
123{
124 nf_ct_l3proto_module_put(match->family);
125}
126
127static struct xt_match connbytes_mt_reg[] __read_mostly = {
128 {
129 .name = "connbytes",
130 .family = NFPROTO_IPV4,
131 .checkentry = connbytes_mt_check,
132 .match = connbytes_mt,
133 .destroy = connbytes_mt_destroy,
134 .matchsize = sizeof(struct xt_connbytes_info),
135 .me = THIS_MODULE
136 },
137 {
138 .name = "connbytes",
139 .family = NFPROTO_IPV6,
140 .checkentry = connbytes_mt_check,
141 .match = connbytes_mt,
142 .destroy = connbytes_mt_destroy,
143 .matchsize = sizeof(struct xt_connbytes_info),
144 .me = THIS_MODULE
145 },
146};
147
148static int __init connbytes_mt_init(void)
149{
150 return xt_register_matches(connbytes_mt_reg,
151 ARRAY_SIZE(connbytes_mt_reg));
152}
153
154static void __exit connbytes_mt_exit(void)
155{
156 xt_unregister_matches(connbytes_mt_reg, ARRAY_SIZE(connbytes_mt_reg));
157}
158
159module_init(connbytes_mt_init);
160module_exit(connbytes_mt_exit);
This page took 0.02551 seconds and 5 git commands to generate.