123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382 |
- /*
- * xt_quota2 - enhanced xt_quota that can count upwards and in packets
- * as a minimal accounting match.
- * by Jan Engelhardt <jengelh@medozas.de>, 2008
- *
- * Originally based on xt_quota.c:
- * netfilter module to enforce network quotas
- * Sam Johnston <samj@samj.net>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License; either
- * version 2 of the License, as published by the Free Software Foundation.
- */
- #include <linux/list.h>
- #include <linux/proc_fs.h>
- #include <linux/skbuff.h>
- #include <linux/spinlock.h>
- #include <asm/atomic.h>
- #include <linux/netfilter/x_tables.h>
- #include <linux/netfilter/xt_quota2.h>
- #ifdef CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG
- #include <linux/netfilter_ipv4/ipt_ULOG.h>
- #endif
- /**
- * @lock: lock to protect quota writers from each other
- */
- struct xt_quota_counter {
- u_int64_t quota;
- spinlock_t lock;
- struct list_head list;
- atomic_t ref;
- char name[sizeof(((struct xt_quota_mtinfo2 *)NULL)->name)];
- struct proc_dir_entry *procfs_entry;
- };
- #ifdef CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG
- /* Harald's favorite number +1 :D From ipt_ULOG.C */
- static int qlog_nl_event = 112;
- module_param_named(event_num, qlog_nl_event, uint, S_IRUGO | S_IWUSR);
- MODULE_PARM_DESC(event_num,
- "Event number for NETLINK_NFLOG message. 0 disables log."
- "111 is what ipt_ULOG uses.");
- static struct sock *nflognl;
- #endif
- static LIST_HEAD(counter_list);
- static DEFINE_SPINLOCK(counter_list_lock);
- static struct proc_dir_entry *proc_xt_quota;
- static unsigned int quota_list_perms = S_IRUGO | S_IWUSR;
- static unsigned int quota_list_uid = 0;
- static unsigned int quota_list_gid = 0;
- module_param_named(perms, quota_list_perms, uint, S_IRUGO | S_IWUSR);
- module_param_named(uid, quota_list_uid, uint, S_IRUGO | S_IWUSR);
- module_param_named(gid, quota_list_gid, uint, S_IRUGO | S_IWUSR);
- #ifdef CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG
- static void quota2_log(unsigned int hooknum,
- const struct sk_buff *skb,
- const struct net_device *in,
- const struct net_device *out,
- const char *prefix)
- {
- ulog_packet_msg_t *pm;
- struct sk_buff *log_skb;
- size_t size;
- struct nlmsghdr *nlh;
- if (!qlog_nl_event)
- return;
- size = NLMSG_SPACE(sizeof(*pm));
- size = max(size, (size_t)NLMSG_GOODSIZE);
- log_skb = alloc_skb(size, GFP_ATOMIC);
- if (!log_skb) {
- pr_err("xt_quota2: cannot alloc skb for logging\n");
- return;
- }
- /* NLMSG_PUT() uses "goto nlmsg_failure" */
- nlh = NLMSG_PUT(log_skb, /*pid*/0, /*seq*/0, qlog_nl_event,
- sizeof(*pm));
- pm = NLMSG_DATA(nlh);
- if (skb->tstamp.tv64 == 0)
- __net_timestamp((struct sk_buff *)skb);
- pm->data_len = 0;
- pm->hook = hooknum;
- if (prefix != NULL)
- strlcpy(pm->prefix, prefix, sizeof(pm->prefix));
- else
- *(pm->prefix) = '\0';
- if (in)
- strlcpy(pm->indev_name, in->name, sizeof(pm->indev_name));
- else
- pm->indev_name[0] = '\0';
- if (out)
- strlcpy(pm->outdev_name, out->name, sizeof(pm->outdev_name));
- else
- pm->outdev_name[0] = '\0';
- NETLINK_CB(log_skb).dst_group = 1;
- pr_debug("throwing 1 packets to netlink group 1\n");
- netlink_broadcast(nflognl, log_skb, 0, 1, GFP_ATOMIC);
- nlmsg_failure: /* Used within NLMSG_PUT() */
- pr_debug("xt_quota2: error during NLMSG_PUT\n");
- }
- #else
- static void quota2_log(unsigned int hooknum,
- const struct sk_buff *skb,
- const struct net_device *in,
- const struct net_device *out,
- const char *prefix)
- {
- }
- #endif /* if+else CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG */
- static int quota_proc_read(char *page, char **start, off_t offset,
- int count, int *eof, void *data)
- {
- struct xt_quota_counter *e = data;
- int ret;
- spin_lock_bh(&e->lock);
- ret = snprintf(page, PAGE_SIZE, "%llu\n", e->quota);
- spin_unlock_bh(&e->lock);
- return ret;
- }
- static int quota_proc_write(struct file *file, const char __user *input,
- unsigned long size, void *data)
- {
- struct xt_quota_counter *e = data;
- char buf[sizeof("18446744073709551616")];
- if (size > sizeof(buf))
- size = sizeof(buf);
- if (copy_from_user(buf, input, size) != 0)
- return -EFAULT;
- buf[sizeof(buf)-1] = '\0';
- spin_lock_bh(&e->lock);
- e->quota = simple_strtoull(buf, NULL, 0);
- spin_unlock_bh(&e->lock);
- return size;
- }
- static struct xt_quota_counter *
- q2_new_counter(const struct xt_quota_mtinfo2 *q, bool anon)
- {
- struct xt_quota_counter *e;
- unsigned int size;
- /* Do not need all the procfs things for anonymous counters. */
- size = anon ? offsetof(typeof(*e), list) : sizeof(*e);
- e = kmalloc(size, GFP_KERNEL);
- if (e == NULL)
- return NULL;
- e->quota = q->quota;
- spin_lock_init(&e->lock);
- if (!anon) {
- INIT_LIST_HEAD(&e->list);
- atomic_set(&e->ref, 1);
- strlcpy(e->name, q->name, sizeof(e->name));
- }
- return e;
- }
- /**
- * q2_get_counter - get ref to counter or create new
- * @name: name of counter
- */
- static struct xt_quota_counter *
- q2_get_counter(const struct xt_quota_mtinfo2 *q)
- {
- struct proc_dir_entry *p;
- struct xt_quota_counter *e = NULL;
- struct xt_quota_counter *new_e;
- if (*q->name == '\0')
- return q2_new_counter(q, true);
- /* No need to hold a lock while getting a new counter */
- new_e = q2_new_counter(q, false);
- if (new_e == NULL)
- goto out;
- spin_lock_bh(&counter_list_lock);
- list_for_each_entry(e, &counter_list, list)
- if (strcmp(e->name, q->name) == 0) {
- atomic_inc(&e->ref);
- spin_unlock_bh(&counter_list_lock);
- kfree(new_e);
- pr_debug("xt_quota2: old counter name=%s", e->name);
- return e;
- }
- e = new_e;
- pr_debug("xt_quota2: new_counter name=%s", e->name);
- list_add_tail(&e->list, &counter_list);
- /* The entry having a refcount of 1 is not directly destructible.
- * This func has not yet returned the new entry, thus iptables
- * has not references for destroying this entry.
- * For another rule to try to destroy it, it would 1st need for this
- * func* to be re-invoked, acquire a new ref for the same named quota.
- * Nobody will access the e->procfs_entry either.
- * So release the lock. */
- spin_unlock_bh(&counter_list_lock);
- /* create_proc_entry() is not spin_lock happy */
- p = e->procfs_entry = create_proc_entry(e->name, quota_list_perms,
- proc_xt_quota);
- if (IS_ERR_OR_NULL(p)) {
- spin_lock_bh(&counter_list_lock);
- list_del(&e->list);
- spin_unlock_bh(&counter_list_lock);
- goto out;
- }
- p->data = e;
- p->read_proc = quota_proc_read;
- p->write_proc = quota_proc_write;
- p->uid = quota_list_uid;
- p->gid = quota_list_gid;
- return e;
- out:
- kfree(e);
- return NULL;
- }
- static int quota_mt2_check(const struct xt_mtchk_param *par)
- {
- struct xt_quota_mtinfo2 *q = par->matchinfo;
- pr_debug("xt_quota2: check() flags=0x%04x", q->flags);
- if (q->flags & ~XT_QUOTA_MASK)
- return -EINVAL;
- q->name[sizeof(q->name)-1] = '\0';
- if (*q->name == '.' || strchr(q->name, '/') != NULL) {
- printk(KERN_ERR "xt_quota.3: illegal name\n");
- return -EINVAL;
- }
- q->master = q2_get_counter(q);
- if (q->master == NULL) {
- printk(KERN_ERR "xt_quota.3: memory alloc failure\n");
- return -ENOMEM;
- }
- return 0;
- }
- static void quota_mt2_destroy(const struct xt_mtdtor_param *par)
- {
- struct xt_quota_mtinfo2 *q = par->matchinfo;
- struct xt_quota_counter *e = q->master;
- if (*q->name == '\0') {
- kfree(e);
- return;
- }
- spin_lock_bh(&counter_list_lock);
- if (!atomic_dec_and_test(&e->ref)) {
- spin_unlock_bh(&counter_list_lock);
- return;
- }
- list_del(&e->list);
- remove_proc_entry(e->name, proc_xt_quota);
- spin_unlock_bh(&counter_list_lock);
- kfree(e);
- }
- static bool
- quota_mt2(const struct sk_buff *skb, struct xt_action_param *par)
- {
- struct xt_quota_mtinfo2 *q = (void *)par->matchinfo;
- struct xt_quota_counter *e = q->master;
- bool ret = q->flags & XT_QUOTA_INVERT;
- spin_lock_bh(&e->lock);
- if (q->flags & XT_QUOTA_GROW) {
- /*
- * While no_change is pointless in "grow" mode, we will
- * implement it here simply to have a consistent behavior.
- */
- if (!(q->flags & XT_QUOTA_NO_CHANGE)) {
- e->quota += (q->flags & XT_QUOTA_PACKET) ? 1 : skb->len;
- }
- ret = true;
- } else {
- if (e->quota >= skb->len) {
- if (!(q->flags & XT_QUOTA_NO_CHANGE))
- e->quota -= (q->flags & XT_QUOTA_PACKET) ? 1 : skb->len;
- ret = !ret;
- } else {
- /* We are transitioning, log that fact. */
- if (e->quota) {
- quota2_log(par->hooknum,
- skb,
- par->in,
- par->out,
- q->name);
- }
- /* we do not allow even small packets from now on */
- e->quota = 0;
- }
- }
- spin_unlock_bh(&e->lock);
- return ret;
- }
- static struct xt_match quota_mt2_reg[] __read_mostly = {
- {
- .name = "quota2",
- .revision = 3,
- .family = NFPROTO_IPV4,
- .checkentry = quota_mt2_check,
- .match = quota_mt2,
- .destroy = quota_mt2_destroy,
- .matchsize = sizeof(struct xt_quota_mtinfo2),
- .me = THIS_MODULE,
- },
- {
- .name = "quota2",
- .revision = 3,
- .family = NFPROTO_IPV6,
- .checkentry = quota_mt2_check,
- .match = quota_mt2,
- .destroy = quota_mt2_destroy,
- .matchsize = sizeof(struct xt_quota_mtinfo2),
- .me = THIS_MODULE,
- },
- };
- static int __init quota_mt2_init(void)
- {
- int ret;
- pr_debug("xt_quota2: init()");
- #ifdef CONFIG_NETFILTER_XT_MATCH_QUOTA2_LOG
- nflognl = netlink_kernel_create(&init_net,
- NETLINK_NFLOG, 1, NULL,
- NULL, THIS_MODULE);
- if (!nflognl)
- return -ENOMEM;
- #endif
- proc_xt_quota = proc_mkdir("xt_quota", init_net.proc_net);
- if (proc_xt_quota == NULL)
- return -EACCES;
- ret = xt_register_matches(quota_mt2_reg, ARRAY_SIZE(quota_mt2_reg));
- if (ret < 0)
- remove_proc_entry("xt_quota", init_net.proc_net);
- pr_debug("xt_quota2: init() %d", ret);
- return ret;
- }
- static void __exit quota_mt2_exit(void)
- {
- xt_unregister_matches(quota_mt2_reg, ARRAY_SIZE(quota_mt2_reg));
- remove_proc_entry("xt_quota", init_net.proc_net);
- }
- module_init(quota_mt2_init);
- module_exit(quota_mt2_exit);
- MODULE_DESCRIPTION("Xtables: countdown quota match; up counter");
- MODULE_AUTHOR("Sam Johnston <samj@samj.net>");
- MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
- MODULE_LICENSE("GPL");
- MODULE_ALIAS("ipt_quota2");
- MODULE_ALIAS("ip6t_quota2");
|