mirror of
https://github.com/team-infusion-developers/android_kernel_samsung_msm8976.git
synced 2024-10-21 02:49:11 +00:00
9fb9cbb108
The existing connection tracking subsystem in netfilter can only handle ipv4. There were basically two choices present to add connection tracking support for ipv6. We could either duplicate all of the ipv4 connection tracking code into an ipv6 counterpart, or (the choice taken by these patches) we could design a generic layer that could handle both ipv4 and ipv6 and thus requiring only one sub-protocol (TCP, UDP, etc.) connection tracking helper module to be written. In fact nf_conntrack is capable of working with any layer 3 protocol. The existing ipv4 specific conntrack code could also not deal with the pecularities of doing connection tracking on ipv6, which is also cured here. For example, these issues include: 1) ICMPv6 handling, which is used for neighbour discovery in ipv6 thus some messages such as these should not participate in connection tracking since effectively they are like ARP messages 2) fragmentation must be handled differently in ipv6, because the simplistic "defrag, connection track and NAT, refrag" (which the existing ipv4 connection tracking does) approach simply isn't feasible in ipv6 3) ipv6 extension header parsing must occur at the correct spots before and after connection tracking decisions, and there were no provisions for this in the existing connection tracking design 4) ipv6 has no need for stateful NAT The ipv4 specific conntrack layer is kept around, until all of the ipv4 specific conntrack helpers are ported over to nf_conntrack and it is feature complete. Once that occurs, the old conntrack stuff will get placed into the feature-removal-schedule and we will fully kill it off 6 months later. Signed-off-by: Yasuyuki Kozakai <yasuyuki.kozakai@toshiba.co.jp> Signed-off-by: Harald Welte <laforge@netfilter.org> Signed-off-by: Arnaldo Carvalho de Melo <acme@mandriva.com>
161 lines
4 KiB
C
161 lines
4 KiB
C
/* Kernel module to match connection tracking byte counter.
|
|
* GPL (C) 2002 Martin Devera (devik@cdi.cz).
|
|
*
|
|
* 2004-07-20 Harald Welte <laforge@netfilter.org>
|
|
* - reimplemented to use per-connection accounting counters
|
|
* - add functionality to match number of packets
|
|
* - add functionality to match average packet size
|
|
* - add support to match directions seperately
|
|
*
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/skbuff.h>
|
|
#include <net/netfilter/nf_conntrack_compat.h>
|
|
#include <linux/netfilter_ipv4/ip_tables.h>
|
|
#include <linux/netfilter_ipv4/ipt_connbytes.h>
|
|
|
|
#include <asm/div64.h>
|
|
#include <asm/bitops.h>
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
|
|
MODULE_DESCRIPTION("iptables match for matching number of pkts/bytes per connection");
|
|
|
|
/* 64bit divisor, dividend and result. dynamic precision */
|
|
static u_int64_t div64_64(u_int64_t dividend, u_int64_t divisor)
|
|
{
|
|
u_int32_t d = divisor;
|
|
|
|
if (divisor > 0xffffffffULL) {
|
|
unsigned int shift = fls(divisor >> 32);
|
|
|
|
d = divisor >> shift;
|
|
dividend >>= shift;
|
|
}
|
|
|
|
do_div(dividend, d);
|
|
return dividend;
|
|
}
|
|
|
|
static int
|
|
match(const struct sk_buff *skb,
|
|
const struct net_device *in,
|
|
const struct net_device *out,
|
|
const void *matchinfo,
|
|
int offset,
|
|
int *hotdrop)
|
|
{
|
|
const struct ipt_connbytes_info *sinfo = matchinfo;
|
|
u_int64_t what = 0; /* initialize to make gcc happy */
|
|
const struct ip_conntrack_counter *counters;
|
|
|
|
if (!(counters = nf_ct_get_counters(skb)))
|
|
return 0; /* no match */
|
|
|
|
switch (sinfo->what) {
|
|
case IPT_CONNBYTES_PKTS:
|
|
switch (sinfo->direction) {
|
|
case IPT_CONNBYTES_DIR_ORIGINAL:
|
|
what = counters[IP_CT_DIR_ORIGINAL].packets;
|
|
break;
|
|
case IPT_CONNBYTES_DIR_REPLY:
|
|
what = counters[IP_CT_DIR_REPLY].packets;
|
|
break;
|
|
case IPT_CONNBYTES_DIR_BOTH:
|
|
what = counters[IP_CT_DIR_ORIGINAL].packets;
|
|
what += counters[IP_CT_DIR_REPLY].packets;
|
|
break;
|
|
}
|
|
break;
|
|
case IPT_CONNBYTES_BYTES:
|
|
switch (sinfo->direction) {
|
|
case IPT_CONNBYTES_DIR_ORIGINAL:
|
|
what = counters[IP_CT_DIR_ORIGINAL].bytes;
|
|
break;
|
|
case IPT_CONNBYTES_DIR_REPLY:
|
|
what = counters[IP_CT_DIR_REPLY].bytes;
|
|
break;
|
|
case IPT_CONNBYTES_DIR_BOTH:
|
|
what = counters[IP_CT_DIR_ORIGINAL].bytes;
|
|
what += counters[IP_CT_DIR_REPLY].bytes;
|
|
break;
|
|
}
|
|
break;
|
|
case IPT_CONNBYTES_AVGPKT:
|
|
switch (sinfo->direction) {
|
|
case IPT_CONNBYTES_DIR_ORIGINAL:
|
|
what = div64_64(counters[IP_CT_DIR_ORIGINAL].bytes,
|
|
counters[IP_CT_DIR_ORIGINAL].packets);
|
|
break;
|
|
case IPT_CONNBYTES_DIR_REPLY:
|
|
what = div64_64(counters[IP_CT_DIR_REPLY].bytes,
|
|
counters[IP_CT_DIR_REPLY].packets);
|
|
break;
|
|
case IPT_CONNBYTES_DIR_BOTH:
|
|
{
|
|
u_int64_t bytes;
|
|
u_int64_t pkts;
|
|
bytes = counters[IP_CT_DIR_ORIGINAL].bytes +
|
|
counters[IP_CT_DIR_REPLY].bytes;
|
|
pkts = counters[IP_CT_DIR_ORIGINAL].packets+
|
|
counters[IP_CT_DIR_REPLY].packets;
|
|
|
|
/* FIXME_THEORETICAL: what to do if sum
|
|
* overflows ? */
|
|
|
|
what = div64_64(bytes, pkts);
|
|
}
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (sinfo->count.to)
|
|
return (what <= sinfo->count.to && what >= sinfo->count.from);
|
|
else
|
|
return (what >= sinfo->count.from);
|
|
}
|
|
|
|
static int check(const char *tablename,
|
|
const struct ipt_ip *ip,
|
|
void *matchinfo,
|
|
unsigned int matchsize,
|
|
unsigned int hook_mask)
|
|
{
|
|
const struct ipt_connbytes_info *sinfo = matchinfo;
|
|
|
|
if (matchsize != IPT_ALIGN(sizeof(struct ipt_connbytes_info)))
|
|
return 0;
|
|
|
|
if (sinfo->what != IPT_CONNBYTES_PKTS &&
|
|
sinfo->what != IPT_CONNBYTES_BYTES &&
|
|
sinfo->what != IPT_CONNBYTES_AVGPKT)
|
|
return 0;
|
|
|
|
if (sinfo->direction != IPT_CONNBYTES_DIR_ORIGINAL &&
|
|
sinfo->direction != IPT_CONNBYTES_DIR_REPLY &&
|
|
sinfo->direction != IPT_CONNBYTES_DIR_BOTH)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static struct ipt_match state_match = {
|
|
.name = "connbytes",
|
|
.match = &match,
|
|
.checkentry = &check,
|
|
.me = THIS_MODULE
|
|
};
|
|
|
|
static int __init init(void)
|
|
{
|
|
return ipt_register_match(&state_match);
|
|
}
|
|
|
|
static void __exit fini(void)
|
|
{
|
|
ipt_unregister_match(&state_match);
|
|
}
|
|
|
|
module_init(init);
|
|
module_exit(fini);
|