Linux Audio

Check our new training course

Linux kernel drivers training

May 6-19, 2025
Register
Loading...
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/*
  3 *	xt_connmark - Netfilter module to operate on connection marks
  4 *
  5 *	Copyright (C) 2002,2004 MARA Systems AB <https://www.marasystems.com>
  6 *	by Henrik Nordstrom <hno@marasystems.com>
  7 *	Copyright © CC Computer Consultants GmbH, 2007 - 2008
  8 *	Jan Engelhardt <jengelh@medozas.de>
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  9 */
 10
 11#include <linux/module.h>
 12#include <linux/skbuff.h>
 13#include <net/netfilter/nf_conntrack.h>
 14#include <net/netfilter/nf_conntrack_ecache.h>
 15#include <linux/netfilter/x_tables.h>
 16#include <linux/netfilter/xt_connmark.h>
 17
 18MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
 19MODULE_DESCRIPTION("Xtables: connection mark operations");
 20MODULE_LICENSE("GPL");
 21MODULE_ALIAS("ipt_CONNMARK");
 22MODULE_ALIAS("ip6t_CONNMARK");
 23MODULE_ALIAS("ipt_connmark");
 24MODULE_ALIAS("ip6t_connmark");
 25
 26static unsigned int
 27connmark_tg_shift(struct sk_buff *skb, const struct xt_connmark_tginfo2 *info)
 28{
 
 29	enum ip_conntrack_info ctinfo;
 30	u_int32_t new_targetmark;
 31	struct nf_conn *ct;
 32	u_int32_t newmark;
 33
 34	ct = nf_ct_get(skb, &ctinfo);
 35	if (ct == NULL)
 36		return XT_CONTINUE;
 37
 38	switch (info->mode) {
 39	case XT_CONNMARK_SET:
 40		newmark = (ct->mark & ~info->ctmask) ^ info->ctmark;
 41		if (info->shift_dir == D_SHIFT_RIGHT)
 42			newmark >>= info->shift_bits;
 43		else
 44			newmark <<= info->shift_bits;
 45
 46		if (ct->mark != newmark) {
 47			ct->mark = newmark;
 48			nf_conntrack_event_cache(IPCT_MARK, ct);
 49		}
 50		break;
 51	case XT_CONNMARK_SAVE:
 52		new_targetmark = (skb->mark & info->nfmask);
 53		if (info->shift_dir == D_SHIFT_RIGHT)
 54			new_targetmark >>= info->shift_bits;
 55		else
 56			new_targetmark <<= info->shift_bits;
 57
 58		newmark = (ct->mark & ~info->ctmask) ^
 59			  new_targetmark;
 60		if (ct->mark != newmark) {
 61			ct->mark = newmark;
 62			nf_conntrack_event_cache(IPCT_MARK, ct);
 63		}
 64		break;
 65	case XT_CONNMARK_RESTORE:
 66		new_targetmark = (ct->mark & info->ctmask);
 67		if (info->shift_dir == D_SHIFT_RIGHT)
 68			new_targetmark >>= info->shift_bits;
 69		else
 70			new_targetmark <<= info->shift_bits;
 71
 72		newmark = (skb->mark & ~info->nfmask) ^
 73			  new_targetmark;
 74		skb->mark = newmark;
 75		break;
 76	}
 77	return XT_CONTINUE;
 78}
 79
 80static unsigned int
 81connmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
 82{
 83	const struct xt_connmark_tginfo1 *info = par->targinfo;
 84	const struct xt_connmark_tginfo2 info2 = {
 85		.ctmark	= info->ctmark,
 86		.ctmask	= info->ctmask,
 87		.nfmask	= info->nfmask,
 88		.mode	= info->mode,
 89	};
 90
 91	return connmark_tg_shift(skb, &info2);
 92}
 93
 94static unsigned int
 95connmark_tg_v2(struct sk_buff *skb, const struct xt_action_param *par)
 96{
 97	const struct xt_connmark_tginfo2 *info = par->targinfo;
 98
 99	return connmark_tg_shift(skb, info);
100}
101
102static int connmark_tg_check(const struct xt_tgchk_param *par)
103{
104	int ret;
105
106	ret = nf_ct_netns_get(par->net, par->family);
107	if (ret < 0)
108		pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
109				    par->family);
110	return ret;
111}
112
113static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
114{
115	nf_ct_netns_put(par->net, par->family);
116}
117
118static bool
119connmark_mt(const struct sk_buff *skb, struct xt_action_param *par)
120{
121	const struct xt_connmark_mtinfo1 *info = par->matchinfo;
122	enum ip_conntrack_info ctinfo;
123	const struct nf_conn *ct;
124
125	ct = nf_ct_get(skb, &ctinfo);
126	if (ct == NULL)
127		return false;
128
129	return ((ct->mark & info->mask) == info->mark) ^ info->invert;
130}
131
132static int connmark_mt_check(const struct xt_mtchk_param *par)
133{
134	int ret;
135
136	ret = nf_ct_netns_get(par->net, par->family);
137	if (ret < 0)
138		pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
139				    par->family);
140	return ret;
141}
142
143static void connmark_mt_destroy(const struct xt_mtdtor_param *par)
144{
145	nf_ct_netns_put(par->net, par->family);
146}
147
148static struct xt_target connmark_tg_reg[] __read_mostly = {
149	{
150		.name           = "CONNMARK",
151		.revision       = 1,
152		.family         = NFPROTO_UNSPEC,
153		.checkentry     = connmark_tg_check,
154		.target         = connmark_tg,
155		.targetsize     = sizeof(struct xt_connmark_tginfo1),
156		.destroy        = connmark_tg_destroy,
157		.me             = THIS_MODULE,
158	},
159	{
160		.name           = "CONNMARK",
161		.revision       = 2,
162		.family         = NFPROTO_UNSPEC,
163		.checkentry     = connmark_tg_check,
164		.target         = connmark_tg_v2,
165		.targetsize     = sizeof(struct xt_connmark_tginfo2),
166		.destroy        = connmark_tg_destroy,
167		.me             = THIS_MODULE,
168	}
169};
170
171static struct xt_match connmark_mt_reg __read_mostly = {
172	.name           = "connmark",
173	.revision       = 1,
174	.family         = NFPROTO_UNSPEC,
175	.checkentry     = connmark_mt_check,
176	.match          = connmark_mt,
177	.matchsize      = sizeof(struct xt_connmark_mtinfo1),
178	.destroy        = connmark_mt_destroy,
179	.me             = THIS_MODULE,
180};
181
182static int __init connmark_mt_init(void)
183{
184	int ret;
185
186	ret = xt_register_targets(connmark_tg_reg,
187				  ARRAY_SIZE(connmark_tg_reg));
188	if (ret < 0)
189		return ret;
190	ret = xt_register_match(&connmark_mt_reg);
191	if (ret < 0) {
192		xt_unregister_targets(connmark_tg_reg,
193				      ARRAY_SIZE(connmark_tg_reg));
194		return ret;
195	}
196	return 0;
197}
198
199static void __exit connmark_mt_exit(void)
200{
201	xt_unregister_match(&connmark_mt_reg);
202	xt_unregister_targets(connmark_tg_reg, ARRAY_SIZE(connmark_tg_reg));
203}
204
205module_init(connmark_mt_init);
206module_exit(connmark_mt_exit);
v3.5.6
 
  1/*
  2 *	xt_connmark - Netfilter module to operate on connection marks
  3 *
  4 *	Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
  5 *	by Henrik Nordstrom <hno@marasystems.com>
  6 *	Copyright © CC Computer Consultants GmbH, 2007 - 2008
  7 *	Jan Engelhardt <jengelh@medozas.de>
  8 *
  9 * This program is free software; you can redistribute it and/or modify
 10 * it under the terms of the GNU General Public License as published by
 11 * the Free Software Foundation; either version 2 of the License, or
 12 * (at your option) any later version.
 13 *
 14 * This program is distributed in the hope that it will be useful,
 15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 17 * GNU General Public License for more details.
 18 *
 19 * You should have received a copy of the GNU General Public License
 20 * along with this program; if not, write to the Free Software
 21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 22 */
 23
 24#include <linux/module.h>
 25#include <linux/skbuff.h>
 26#include <net/netfilter/nf_conntrack.h>
 27#include <net/netfilter/nf_conntrack_ecache.h>
 28#include <linux/netfilter/x_tables.h>
 29#include <linux/netfilter/xt_connmark.h>
 30
 31MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
 32MODULE_DESCRIPTION("Xtables: connection mark operations");
 33MODULE_LICENSE("GPL");
 34MODULE_ALIAS("ipt_CONNMARK");
 35MODULE_ALIAS("ip6t_CONNMARK");
 36MODULE_ALIAS("ipt_connmark");
 37MODULE_ALIAS("ip6t_connmark");
 38
 39static unsigned int
 40connmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
 41{
 42	const struct xt_connmark_tginfo1 *info = par->targinfo;
 43	enum ip_conntrack_info ctinfo;
 
 44	struct nf_conn *ct;
 45	u_int32_t newmark;
 46
 47	ct = nf_ct_get(skb, &ctinfo);
 48	if (ct == NULL)
 49		return XT_CONTINUE;
 50
 51	switch (info->mode) {
 52	case XT_CONNMARK_SET:
 53		newmark = (ct->mark & ~info->ctmask) ^ info->ctmark;
 
 
 
 
 
 54		if (ct->mark != newmark) {
 55			ct->mark = newmark;
 56			nf_conntrack_event_cache(IPCT_MARK, ct);
 57		}
 58		break;
 59	case XT_CONNMARK_SAVE:
 
 
 
 
 
 
 60		newmark = (ct->mark & ~info->ctmask) ^
 61		          (skb->mark & info->nfmask);
 62		if (ct->mark != newmark) {
 63			ct->mark = newmark;
 64			nf_conntrack_event_cache(IPCT_MARK, ct);
 65		}
 66		break;
 67	case XT_CONNMARK_RESTORE:
 
 
 
 
 
 
 68		newmark = (skb->mark & ~info->nfmask) ^
 69		          (ct->mark & info->ctmask);
 70		skb->mark = newmark;
 71		break;
 72	}
 
 
 73
 74	return XT_CONTINUE;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 75}
 76
 77static int connmark_tg_check(const struct xt_tgchk_param *par)
 78{
 79	int ret;
 80
 81	ret = nf_ct_l3proto_try_module_get(par->family);
 82	if (ret < 0)
 83		pr_info("cannot load conntrack support for proto=%u\n",
 84			par->family);
 85	return ret;
 86}
 87
 88static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
 89{
 90	nf_ct_l3proto_module_put(par->family);
 91}
 92
 93static bool
 94connmark_mt(const struct sk_buff *skb, struct xt_action_param *par)
 95{
 96	const struct xt_connmark_mtinfo1 *info = par->matchinfo;
 97	enum ip_conntrack_info ctinfo;
 98	const struct nf_conn *ct;
 99
100	ct = nf_ct_get(skb, &ctinfo);
101	if (ct == NULL)
102		return false;
103
104	return ((ct->mark & info->mask) == info->mark) ^ info->invert;
105}
106
107static int connmark_mt_check(const struct xt_mtchk_param *par)
108{
109	int ret;
110
111	ret = nf_ct_l3proto_try_module_get(par->family);
112	if (ret < 0)
113		pr_info("cannot load conntrack support for proto=%u\n",
114			par->family);
115	return ret;
116}
117
118static void connmark_mt_destroy(const struct xt_mtdtor_param *par)
119{
120	nf_ct_l3proto_module_put(par->family);
121}
122
123static struct xt_target connmark_tg_reg __read_mostly = {
124	.name           = "CONNMARK",
125	.revision       = 1,
126	.family         = NFPROTO_UNSPEC,
127	.checkentry     = connmark_tg_check,
128	.target         = connmark_tg,
129	.targetsize     = sizeof(struct xt_connmark_tginfo1),
130	.destroy        = connmark_tg_destroy,
131	.me             = THIS_MODULE,
 
 
 
 
 
 
 
 
 
 
 
 
132};
133
134static struct xt_match connmark_mt_reg __read_mostly = {
135	.name           = "connmark",
136	.revision       = 1,
137	.family         = NFPROTO_UNSPEC,
138	.checkentry     = connmark_mt_check,
139	.match          = connmark_mt,
140	.matchsize      = sizeof(struct xt_connmark_mtinfo1),
141	.destroy        = connmark_mt_destroy,
142	.me             = THIS_MODULE,
143};
144
145static int __init connmark_mt_init(void)
146{
147	int ret;
148
149	ret = xt_register_target(&connmark_tg_reg);
 
150	if (ret < 0)
151		return ret;
152	ret = xt_register_match(&connmark_mt_reg);
153	if (ret < 0) {
154		xt_unregister_target(&connmark_tg_reg);
 
155		return ret;
156	}
157	return 0;
158}
159
160static void __exit connmark_mt_exit(void)
161{
162	xt_unregister_match(&connmark_mt_reg);
163	xt_unregister_target(&connmark_tg_reg);
164}
165
166module_init(connmark_mt_init);
167module_exit(connmark_mt_exit);