Linux Audio

Check our new training course

Loading...
v4.10.11
 
  1/*
  2 * net/sched/act_connmark.c  netfilter connmark retriever action
  3 * skb mark is over-written
  4 *
  5 * Copyright (c) 2011 Felix Fietkau <nbd@openwrt.org>
  6 *
  7 * This program is free software; you can redistribute it and/or modify
  8 * it under the terms of the GNU General Public License as published by
  9 * the Free Software Foundation; either version 2 of the License, or
 10 * (at your option) any later version.
 11*/
 12
 13#include <linux/module.h>
 14#include <linux/init.h>
 15#include <linux/kernel.h>
 16#include <linux/skbuff.h>
 17#include <linux/rtnetlink.h>
 18#include <linux/pkt_cls.h>
 19#include <linux/ip.h>
 20#include <linux/ipv6.h>
 21#include <net/netlink.h>
 22#include <net/pkt_sched.h>
 23#include <net/act_api.h>
 
 24#include <uapi/linux/tc_act/tc_connmark.h>
 25#include <net/tc_act/tc_connmark.h>
 
 26
 27#include <net/netfilter/nf_conntrack.h>
 28#include <net/netfilter/nf_conntrack_core.h>
 29#include <net/netfilter/nf_conntrack_zones.h>
 30
 31#define CONNMARK_TAB_MASK     3
 32
 33static unsigned int connmark_net_id;
 34static struct tc_action_ops act_connmark_ops;
 35
 36static int tcf_connmark(struct sk_buff *skb, const struct tc_action *a,
 37			struct tcf_result *res)
 
 38{
 39	const struct nf_conntrack_tuple_hash *thash;
 40	struct nf_conntrack_tuple tuple;
 41	enum ip_conntrack_info ctinfo;
 42	struct tcf_connmark_info *ca = to_connmark(a);
 
 43	struct nf_conntrack_zone zone;
 44	struct nf_conn *c;
 45	int proto;
 46
 47	spin_lock(&ca->tcf_lock);
 48	tcf_lastuse_update(&ca->tcf_tm);
 49	bstats_update(&ca->tcf_bstats, skb);
 50
 51	if (skb->protocol == htons(ETH_P_IP)) {
 
 
 
 52		if (skb->len < sizeof(struct iphdr))
 53			goto out;
 54
 55		proto = NFPROTO_IPV4;
 56	} else if (skb->protocol == htons(ETH_P_IPV6)) {
 
 57		if (skb->len < sizeof(struct ipv6hdr))
 58			goto out;
 59
 60		proto = NFPROTO_IPV6;
 61	} else {
 
 62		goto out;
 63	}
 64
 65	c = nf_ct_get(skb, &ctinfo);
 66	if (c) {
 67		skb->mark = c->mark;
 68		/* using overlimits stats to count how many packets marked */
 69		ca->tcf_qstats.overlimits++;
 70		goto out;
 71	}
 72
 73	if (!nf_ct_get_tuplepr(skb, skb_network_offset(skb),
 74			       proto, ca->net, &tuple))
 75		goto out;
 76
 77	zone.id = ca->zone;
 78	zone.dir = NF_CT_DEFAULT_ZONE_DIR;
 79
 80	thash = nf_conntrack_find_get(ca->net, &zone, &tuple);
 81	if (!thash)
 82		goto out;
 83
 84	c = nf_ct_tuplehash_to_ctrack(thash);
 85	/* using overlimits stats to count how many packets marked */
 86	ca->tcf_qstats.overlimits++;
 87	skb->mark = c->mark;
 88	nf_ct_put(c);
 89
 
 
 
 90out:
 91	spin_unlock(&ca->tcf_lock);
 92	return ca->tcf_action;
 93}
 94
 95static const struct nla_policy connmark_policy[TCA_CONNMARK_MAX + 1] = {
 96	[TCA_CONNMARK_PARMS] = { .len = sizeof(struct tc_connmark) },
 97};
 98
 99static int tcf_connmark_init(struct net *net, struct nlattr *nla,
100			     struct nlattr *est, struct tc_action **a,
101			     int ovr, int bind)
 
102{
103	struct tc_action_net *tn = net_generic(net, connmark_net_id);
 
104	struct nlattr *tb[TCA_CONNMARK_MAX + 1];
 
 
105	struct tcf_connmark_info *ci;
106	struct tc_connmark *parm;
107	int ret = 0;
 
108
109	if (!nla)
110		return -EINVAL;
111
112	ret = nla_parse_nested(tb, TCA_CONNMARK_MAX, nla, connmark_policy);
 
113	if (ret < 0)
114		return ret;
115
116	if (!tb[TCA_CONNMARK_PARMS])
117		return -EINVAL;
118
119	parm = nla_data(tb[TCA_CONNMARK_PARMS]);
 
 
120
121	if (!tcf_hash_check(tn, parm->index, a, bind)) {
122		ret = tcf_hash_create(tn, parm->index, est, a,
123				      &act_connmark_ops, bind, false);
124		if (ret)
125			return ret;
 
 
 
 
 
 
126
127		ci = to_connmark(*a);
128		ci->tcf_action = parm->action;
129		ci->net = net;
130		ci->zone = parm->zone;
131
132		tcf_hash_insert(tn, *a);
 
 
133		ret = ACT_P_CREATED;
134	} else {
135		ci = to_connmark(*a);
136		if (bind)
137			return 0;
138		tcf_hash_release(*a, bind);
139		if (!ovr)
140			return -EEXIST;
141		/* replacing action and zone */
142		ci->tcf_action = parm->action;
143		ci->zone = parm->zone;
 
 
 
 
 
 
 
 
144	}
145
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
146	return ret;
 
 
 
 
 
 
147}
148
149static inline int tcf_connmark_dump(struct sk_buff *skb, struct tc_action *a,
150				    int bind, int ref)
151{
152	unsigned char *b = skb_tail_pointer(skb);
153	struct tcf_connmark_info *ci = to_connmark(a);
154
155	struct tc_connmark opt = {
156		.index   = ci->tcf_index,
157		.refcnt  = ci->tcf_refcnt - ref,
158		.bindcnt = ci->tcf_bindcnt - bind,
159		.action  = ci->tcf_action,
160		.zone   = ci->zone,
161	};
 
162	struct tcf_t t;
163
 
 
 
 
 
164	if (nla_put(skb, TCA_CONNMARK_PARMS, sizeof(opt), &opt))
165		goto nla_put_failure;
166
167	tcf_tm_dump(&t, &ci->tcf_tm);
168	if (nla_put_64bit(skb, TCA_CONNMARK_TM, sizeof(t), &t,
169			  TCA_CONNMARK_PAD))
170		goto nla_put_failure;
 
171
172	return skb->len;
 
173nla_put_failure:
 
174	nlmsg_trim(skb, b);
175	return -1;
176}
177
178static int tcf_connmark_walker(struct net *net, struct sk_buff *skb,
179			       struct netlink_callback *cb, int type,
180			       const struct tc_action_ops *ops)
181{
182	struct tc_action_net *tn = net_generic(net, connmark_net_id);
183
184	return tcf_generic_walker(tn, skb, cb, type, ops);
185}
186
187static int tcf_connmark_search(struct net *net, struct tc_action **a, u32 index)
188{
189	struct tc_action_net *tn = net_generic(net, connmark_net_id);
190
191	return tcf_hash_search(tn, a, index);
 
 
192}
193
194static struct tc_action_ops act_connmark_ops = {
195	.kind		=	"connmark",
196	.type		=	TCA_ACT_CONNMARK,
197	.owner		=	THIS_MODULE,
198	.act		=	tcf_connmark,
199	.dump		=	tcf_connmark_dump,
200	.init		=	tcf_connmark_init,
201	.walk		=	tcf_connmark_walker,
202	.lookup		=	tcf_connmark_search,
203	.size		=	sizeof(struct tcf_connmark_info),
204};
 
205
206static __net_init int connmark_init_net(struct net *net)
207{
208	struct tc_action_net *tn = net_generic(net, connmark_net_id);
209
210	return tc_action_net_init(tn, &act_connmark_ops, CONNMARK_TAB_MASK);
211}
212
213static void __net_exit connmark_exit_net(struct net *net)
214{
215	struct tc_action_net *tn = net_generic(net, connmark_net_id);
216
217	tc_action_net_exit(tn);
218}
219
220static struct pernet_operations connmark_net_ops = {
221	.init = connmark_init_net,
222	.exit = connmark_exit_net,
223	.id   = &connmark_net_id,
224	.size = sizeof(struct tc_action_net),
225};
226
227static int __init connmark_init_module(void)
228{
229	return tcf_register_action(&act_connmark_ops, &connmark_net_ops);
230}
231
232static void __exit connmark_cleanup_module(void)
233{
234	tcf_unregister_action(&act_connmark_ops, &connmark_net_ops);
235}
236
237module_init(connmark_init_module);
238module_exit(connmark_cleanup_module);
239MODULE_AUTHOR("Felix Fietkau <nbd@openwrt.org>");
240MODULE_DESCRIPTION("Connection tracking mark restoring");
241MODULE_LICENSE("GPL");
242
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/*
  3 * net/sched/act_connmark.c  netfilter connmark retriever action
  4 * skb mark is over-written
  5 *
  6 * Copyright (c) 2011 Felix Fietkau <nbd@openwrt.org>
 
 
 
 
 
  7*/
  8
  9#include <linux/module.h>
 10#include <linux/init.h>
 11#include <linux/kernel.h>
 12#include <linux/skbuff.h>
 13#include <linux/rtnetlink.h>
 14#include <linux/pkt_cls.h>
 15#include <linux/ip.h>
 16#include <linux/ipv6.h>
 17#include <net/netlink.h>
 18#include <net/pkt_sched.h>
 19#include <net/act_api.h>
 20#include <net/pkt_cls.h>
 21#include <uapi/linux/tc_act/tc_connmark.h>
 22#include <net/tc_act/tc_connmark.h>
 23#include <net/tc_wrapper.h>
 24
 25#include <net/netfilter/nf_conntrack.h>
 26#include <net/netfilter/nf_conntrack_core.h>
 27#include <net/netfilter/nf_conntrack_zones.h>
 28
 
 
 
 29static struct tc_action_ops act_connmark_ops;
 30
 31TC_INDIRECT_SCOPE int tcf_connmark_act(struct sk_buff *skb,
 32				       const struct tc_action *a,
 33				       struct tcf_result *res)
 34{
 35	const struct nf_conntrack_tuple_hash *thash;
 36	struct nf_conntrack_tuple tuple;
 37	enum ip_conntrack_info ctinfo;
 38	struct tcf_connmark_info *ca = to_connmark(a);
 39	struct tcf_connmark_parms *parms;
 40	struct nf_conntrack_zone zone;
 41	struct nf_conn *c;
 42	int proto;
 43
 
 44	tcf_lastuse_update(&ca->tcf_tm);
 45	tcf_action_update_bstats(&ca->common, skb);
 46
 47	parms = rcu_dereference_bh(ca->parms);
 48
 49	switch (skb_protocol(skb, true)) {
 50	case htons(ETH_P_IP):
 51		if (skb->len < sizeof(struct iphdr))
 52			goto out;
 53
 54		proto = NFPROTO_IPV4;
 55		break;
 56	case htons(ETH_P_IPV6):
 57		if (skb->len < sizeof(struct ipv6hdr))
 58			goto out;
 59
 60		proto = NFPROTO_IPV6;
 61		break;
 62	default:
 63		goto out;
 64	}
 65
 66	c = nf_ct_get(skb, &ctinfo);
 67	if (c) {
 68		skb->mark = READ_ONCE(c->mark);
 69		goto count;
 
 
 70	}
 71
 72	if (!nf_ct_get_tuplepr(skb, skb_network_offset(skb), proto, parms->net,
 73			       &tuple))
 74		goto out;
 75
 76	zone.id = parms->zone;
 77	zone.dir = NF_CT_DEFAULT_ZONE_DIR;
 78
 79	thash = nf_conntrack_find_get(parms->net, &zone, &tuple);
 80	if (!thash)
 81		goto out;
 82
 83	c = nf_ct_tuplehash_to_ctrack(thash);
 84	skb->mark = READ_ONCE(c->mark);
 
 
 85	nf_ct_put(c);
 86
 87count:
 88	/* using overlimits stats to count how many packets marked */
 89	tcf_action_inc_overlimit_qstats(&ca->common);
 90out:
 91	return READ_ONCE(ca->tcf_action);
 
 92}
 93
 94static const struct nla_policy connmark_policy[TCA_CONNMARK_MAX + 1] = {
 95	[TCA_CONNMARK_PARMS] = { .len = sizeof(struct tc_connmark) },
 96};
 97
 98static int tcf_connmark_init(struct net *net, struct nlattr *nla,
 99			     struct nlattr *est, struct tc_action **a,
100			     struct tcf_proto *tp, u32 flags,
101			     struct netlink_ext_ack *extack)
102{
103	struct tc_action_net *tn = net_generic(net, act_connmark_ops.net_id);
104	struct tcf_connmark_parms *nparms, *oparms;
105	struct nlattr *tb[TCA_CONNMARK_MAX + 1];
106	bool bind = flags & TCA_ACT_FLAGS_BIND;
107	struct tcf_chain *goto_ch = NULL;
108	struct tcf_connmark_info *ci;
109	struct tc_connmark *parm;
110	int ret = 0, err;
111	u32 index;
112
113	if (!nla)
114		return -EINVAL;
115
116	ret = nla_parse_nested_deprecated(tb, TCA_CONNMARK_MAX, nla,
117					  connmark_policy, NULL);
118	if (ret < 0)
119		return ret;
120
121	if (!tb[TCA_CONNMARK_PARMS])
122		return -EINVAL;
123
124	nparms = kzalloc(sizeof(*nparms), GFP_KERNEL);
125	if (!nparms)
126		return -ENOMEM;
127
128	parm = nla_data(tb[TCA_CONNMARK_PARMS]);
129	index = parm->index;
130	ret = tcf_idr_check_alloc(tn, &index, a, bind);
131	if (!ret) {
132		ret = tcf_idr_create_from_flags(tn, index, est, a,
133						&act_connmark_ops, bind, flags);
134		if (ret) {
135			tcf_idr_cleanup(tn, index);
136			err = ret;
137			goto out_free;
138		}
139
140		ci = to_connmark(*a);
 
 
 
141
142		nparms->net = net;
143		nparms->zone = parm->zone;
144
145		ret = ACT_P_CREATED;
146	} else if (ret > 0) {
147		ci = to_connmark(*a);
148		if (bind) {
149			err = ACT_P_BOUND;
150			goto out_free;
151		}
152		if (!(flags & TCA_ACT_FLAGS_REPLACE)) {
153			err = -EEXIST;
154			goto release_idr;
155		}
156
157		nparms->net = rtnl_dereference(ci->parms)->net;
158		nparms->zone = parm->zone;
159
160		ret = 0;
161	} else {
162		err = ret;
163		goto out_free;
164	}
165
166	err = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack);
167	if (err < 0)
168		goto release_idr;
169
170	spin_lock_bh(&ci->tcf_lock);
171	goto_ch = tcf_action_set_ctrlact(*a, parm->action, goto_ch);
172	oparms = rcu_replace_pointer(ci->parms, nparms, lockdep_is_held(&ci->tcf_lock));
173	spin_unlock_bh(&ci->tcf_lock);
174
175	if (goto_ch)
176		tcf_chain_put_by_act(goto_ch);
177
178	if (oparms)
179		kfree_rcu(oparms, rcu);
180
181	return ret;
182
183release_idr:
184	tcf_idr_release(*a, bind);
185out_free:
186	kfree(nparms);
187	return err;
188}
189
190static inline int tcf_connmark_dump(struct sk_buff *skb, struct tc_action *a,
191				    int bind, int ref)
192{
193	unsigned char *b = skb_tail_pointer(skb);
194	struct tcf_connmark_info *ci = to_connmark(a);
 
195	struct tc_connmark opt = {
196		.index   = ci->tcf_index,
197		.refcnt  = refcount_read(&ci->tcf_refcnt) - ref,
198		.bindcnt = atomic_read(&ci->tcf_bindcnt) - bind,
 
 
199	};
200	struct tcf_connmark_parms *parms;
201	struct tcf_t t;
202
203	spin_lock_bh(&ci->tcf_lock);
204	parms = rcu_dereference_protected(ci->parms, lockdep_is_held(&ci->tcf_lock));
205
206	opt.action = ci->tcf_action;
207	opt.zone = parms->zone;
208	if (nla_put(skb, TCA_CONNMARK_PARMS, sizeof(opt), &opt))
209		goto nla_put_failure;
210
211	tcf_tm_dump(&t, &ci->tcf_tm);
212	if (nla_put_64bit(skb, TCA_CONNMARK_TM, sizeof(t), &t,
213			  TCA_CONNMARK_PAD))
214		goto nla_put_failure;
215	spin_unlock_bh(&ci->tcf_lock);
216
217	return skb->len;
218
219nla_put_failure:
220	spin_unlock_bh(&ci->tcf_lock);
221	nlmsg_trim(skb, b);
222	return -1;
223}
224
225static void tcf_connmark_cleanup(struct tc_action *a)
 
 
226{
227	struct tcf_connmark_info *ci = to_connmark(a);
228	struct tcf_connmark_parms *parms;
 
 
 
 
 
 
229
230	parms = rcu_dereference_protected(ci->parms, 1);
231	if (parms)
232		kfree_rcu(parms, rcu);
233}
234
235static struct tc_action_ops act_connmark_ops = {
236	.kind		=	"connmark",
237	.id		=	TCA_ID_CONNMARK,
238	.owner		=	THIS_MODULE,
239	.act		=	tcf_connmark_act,
240	.dump		=	tcf_connmark_dump,
241	.init		=	tcf_connmark_init,
242	.cleanup	=	tcf_connmark_cleanup,
 
243	.size		=	sizeof(struct tcf_connmark_info),
244};
245MODULE_ALIAS_NET_ACT("connmark");
246
247static __net_init int connmark_init_net(struct net *net)
248{
249	struct tc_action_net *tn = net_generic(net, act_connmark_ops.net_id);
250
251	return tc_action_net_init(net, tn, &act_connmark_ops);
252}
253
254static void __net_exit connmark_exit_net(struct list_head *net_list)
255{
256	tc_action_net_exit(net_list, act_connmark_ops.net_id);
 
 
257}
258
259static struct pernet_operations connmark_net_ops = {
260	.init = connmark_init_net,
261	.exit_batch = connmark_exit_net,
262	.id   = &act_connmark_ops.net_id,
263	.size = sizeof(struct tc_action_net),
264};
265
266static int __init connmark_init_module(void)
267{
268	return tcf_register_action(&act_connmark_ops, &connmark_net_ops);
269}
270
271static void __exit connmark_cleanup_module(void)
272{
273	tcf_unregister_action(&act_connmark_ops, &connmark_net_ops);
274}
275
276module_init(connmark_init_module);
277module_exit(connmark_cleanup_module);
278MODULE_AUTHOR("Felix Fietkau <nbd@openwrt.org>");
279MODULE_DESCRIPTION("Connection tracking mark restoring");
280MODULE_LICENSE("GPL");