2019-05-19 15:51:43 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2008-01-15 08:39:13 +01:00
|
|
|
/*
|
2010-02-26 14:20:32 +01:00
|
|
|
* xt_connmark - Netfilter module to operate on connection marks
|
2005-04-17 00:20:36 +02:00
|
|
|
*
|
2008-01-15 08:39:13 +01:00
|
|
|
* Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
|
|
|
|
* by Henrik Nordstrom <hno@marasystems.com>
|
|
|
|
* Copyright © CC Computer Consultants GmbH, 2007 - 2008
|
2010-02-28 23:19:52 +01:00
|
|
|
* Jan Engelhardt <jengelh@medozas.de>
|
2005-04-17 00:20:36 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/skbuff.h>
|
2007-03-15 00:37:25 +01:00
|
|
|
#include <net/netfilter/nf_conntrack.h>
|
2010-02-26 14:20:32 +01:00
|
|
|
#include <net/netfilter/nf_conntrack_ecache.h>
|
2007-03-15 00:37:25 +01:00
|
|
|
#include <linux/netfilter/x_tables.h>
|
|
|
|
#include <linux/netfilter/xt_connmark.h>
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-19 23:10:43 +02:00
|
|
|
MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
|
2010-02-26 14:20:32 +01:00
|
|
|
MODULE_DESCRIPTION("Xtables: connection mark operations");
|
2005-04-17 00:20:36 +02:00
|
|
|
MODULE_LICENSE("GPL");
|
2010-02-26 14:20:32 +01:00
|
|
|
MODULE_ALIAS("ipt_CONNMARK");
|
|
|
|
MODULE_ALIAS("ip6t_CONNMARK");
|
[NETFILTER] x_tables: Abstraction layer for {ip,ip6,arp}_tables
This monster-patch tries to do the best job for unifying the data
structures and backend interfaces for the three evil clones ip_tables,
ip6_tables and arp_tables. In an ideal world we would never have
allowed this kind of copy+paste programming... but well, our world
isn't (yet?) ideal.
o introduce a new x_tables module
o {ip,arp,ip6}_tables depend on this x_tables module
o registration functions for tables, matches and targets are only
wrappers around x_tables provided functions
o all matches/targets that are used from ip_tables and ip6_tables
are now implemented as xt_FOOBAR.c files and provide module aliases
to ipt_FOOBAR and ip6t_FOOBAR
o header files for xt_matches are in include/linux/netfilter/,
include/linux/netfilter_{ipv4,ipv6} contains compatibility wrappers
around the xt_FOOBAR.h headers
Based on this patchset we're going to further unify the code,
gradually getting rid of all the layer 3 specific assumptions.
Signed-off-by: Harald Welte <laforge@netfilter.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-01-12 22:30:04 +01:00
|
|
|
MODULE_ALIAS("ipt_connmark");
|
2007-10-11 23:36:40 +02:00
|
|
|
MODULE_ALIAS("ip6t_connmark");
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-02-26 14:20:32 +01:00
|
|
|
static unsigned int
|
2018-04-19 16:17:14 +02:00
|
|
|
connmark_tg_shift(struct sk_buff *skb, const struct xt_connmark_tginfo2 *info)
|
2010-02-26 14:20:32 +01:00
|
|
|
{
|
|
|
|
enum ip_conntrack_info ctinfo;
|
2018-04-06 05:45:16 +02:00
|
|
|
u_int32_t new_targetmark;
|
2010-02-26 14:20:32 +01:00
|
|
|
struct nf_conn *ct;
|
|
|
|
u_int32_t newmark;
|
|
|
|
|
|
|
|
ct = nf_ct_get(skb, &ctinfo);
|
2017-04-14 20:31:09 +02:00
|
|
|
if (ct == NULL)
|
2010-02-26 14:20:32 +01:00
|
|
|
return XT_CONTINUE;
|
|
|
|
|
|
|
|
switch (info->mode) {
|
|
|
|
case XT_CONNMARK_SET:
|
|
|
|
newmark = (ct->mark & ~info->ctmask) ^ info->ctmark;
|
2018-04-19 16:17:14 +02:00
|
|
|
if (info->shift_dir == D_SHIFT_RIGHT)
|
|
|
|
newmark >>= info->shift_bits;
|
2018-03-18 21:41:59 +01:00
|
|
|
else
|
2018-04-19 16:17:14 +02:00
|
|
|
newmark <<= info->shift_bits;
|
|
|
|
|
2010-02-26 14:20:32 +01:00
|
|
|
if (ct->mark != newmark) {
|
|
|
|
ct->mark = newmark;
|
|
|
|
nf_conntrack_event_cache(IPCT_MARK, ct);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case XT_CONNMARK_SAVE:
|
2018-04-06 05:45:16 +02:00
|
|
|
new_targetmark = (skb->mark & info->nfmask);
|
2018-04-19 16:17:14 +02:00
|
|
|
if (info->shift_dir == D_SHIFT_RIGHT)
|
|
|
|
new_targetmark >>= info->shift_bits;
|
2018-03-18 21:41:59 +01:00
|
|
|
else
|
2018-04-19 16:17:14 +02:00
|
|
|
new_targetmark <<= info->shift_bits;
|
|
|
|
|
2018-04-06 05:45:16 +02:00
|
|
|
newmark = (ct->mark & ~info->ctmask) ^
|
|
|
|
new_targetmark;
|
2010-02-26 14:20:32 +01:00
|
|
|
if (ct->mark != newmark) {
|
|
|
|
ct->mark = newmark;
|
|
|
|
nf_conntrack_event_cache(IPCT_MARK, ct);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case XT_CONNMARK_RESTORE:
|
2018-04-06 05:45:16 +02:00
|
|
|
new_targetmark = (ct->mark & info->ctmask);
|
2018-04-19 16:17:14 +02:00
|
|
|
if (info->shift_dir == D_SHIFT_RIGHT)
|
|
|
|
new_targetmark >>= info->shift_bits;
|
2018-03-18 21:41:59 +01:00
|
|
|
else
|
2018-04-19 16:17:14 +02:00
|
|
|
new_targetmark <<= info->shift_bits;
|
|
|
|
|
2018-04-06 05:45:16 +02:00
|
|
|
newmark = (skb->mark & ~info->nfmask) ^
|
|
|
|
new_targetmark;
|
2010-02-26 14:20:32 +01:00
|
|
|
skb->mark = newmark;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return XT_CONTINUE;
|
|
|
|
}
|
|
|
|
|
2018-03-18 21:41:59 +01:00
|
|
|
static unsigned int
|
|
|
|
connmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
|
|
|
{
|
|
|
|
const struct xt_connmark_tginfo1 *info = par->targinfo;
|
2018-04-19 16:17:14 +02:00
|
|
|
const struct xt_connmark_tginfo2 info2 = {
|
|
|
|
.ctmark = info->ctmark,
|
|
|
|
.ctmask = info->ctmask,
|
|
|
|
.nfmask = info->nfmask,
|
|
|
|
.mode = info->mode,
|
|
|
|
};
|
2018-03-18 21:41:59 +01:00
|
|
|
|
2018-04-19 16:17:14 +02:00
|
|
|
return connmark_tg_shift(skb, &info2);
|
2018-03-18 21:41:59 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int
|
|
|
|
connmark_tg_v2(struct sk_buff *skb, const struct xt_action_param *par)
|
|
|
|
{
|
|
|
|
const struct xt_connmark_tginfo2 *info = par->targinfo;
|
|
|
|
|
2018-04-19 16:17:14 +02:00
|
|
|
return connmark_tg_shift(skb, info);
|
2018-03-18 21:41:59 +01:00
|
|
|
}
|
|
|
|
|
2010-03-19 17:16:42 +01:00
|
|
|
static int connmark_tg_check(const struct xt_tgchk_param *par)
|
2010-02-26 14:20:32 +01:00
|
|
|
{
|
2010-03-19 17:32:59 +01:00
|
|
|
int ret;
|
|
|
|
|
2016-11-15 21:36:40 +01:00
|
|
|
ret = nf_ct_netns_get(par->net, par->family);
|
2010-03-21 04:05:56 +01:00
|
|
|
if (ret < 0)
|
2018-02-09 15:52:07 +01:00
|
|
|
pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
|
|
|
|
par->family);
|
2010-03-21 04:05:56 +01:00
|
|
|
return ret;
|
2010-02-26 14:20:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
|
|
|
|
{
|
2016-11-15 21:36:40 +01:00
|
|
|
nf_ct_netns_put(par->net, par->family);
|
2010-02-26 14:20:32 +01:00
|
|
|
}
|
|
|
|
|
2007-07-08 07:15:35 +02:00
|
|
|
static bool
|
2009-07-07 20:42:08 +02:00
|
|
|
connmark_mt(const struct sk_buff *skb, struct xt_action_param *par)
|
2008-01-15 08:39:13 +01:00
|
|
|
{
|
2008-10-08 11:35:18 +02:00
|
|
|
const struct xt_connmark_mtinfo1 *info = par->matchinfo;
|
2008-01-15 08:39:13 +01:00
|
|
|
enum ip_conntrack_info ctinfo;
|
|
|
|
const struct nf_conn *ct;
|
|
|
|
|
|
|
|
ct = nf_ct_get(skb, &ctinfo);
|
2017-04-14 20:31:09 +02:00
|
|
|
if (ct == NULL)
|
2008-01-15 08:39:13 +01:00
|
|
|
return false;
|
|
|
|
|
|
|
|
return ((ct->mark & info->mask) == info->mark) ^ info->invert;
|
|
|
|
}
|
|
|
|
|
2010-03-19 17:16:42 +01:00
|
|
|
static int connmark_mt_check(const struct xt_mtchk_param *par)
|
2008-01-15 08:39:13 +01:00
|
|
|
{
|
2010-03-19 17:32:59 +01:00
|
|
|
int ret;
|
|
|
|
|
2016-11-15 21:36:40 +01:00
|
|
|
ret = nf_ct_netns_get(par->net, par->family);
|
2010-03-21 04:05:56 +01:00
|
|
|
if (ret < 0)
|
2018-02-09 15:52:07 +01:00
|
|
|
pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
|
|
|
|
par->family);
|
2010-03-21 04:05:56 +01:00
|
|
|
return ret;
|
2008-01-15 08:39:13 +01:00
|
|
|
}
|
|
|
|
|
2008-10-08 11:35:19 +02:00
|
|
|
static void connmark_mt_destroy(const struct xt_mtdtor_param *par)
|
2006-03-22 22:56:08 +01:00
|
|
|
{
|
2016-11-15 21:36:40 +01:00
|
|
|
nf_ct_netns_put(par->net, par->family);
|
2006-03-22 22:56:08 +01:00
|
|
|
}
|
|
|
|
|
2018-03-18 21:41:59 +01:00
|
|
|
static struct xt_target connmark_tg_reg[] __read_mostly = {
|
|
|
|
{
|
|
|
|
.name = "CONNMARK",
|
|
|
|
.revision = 1,
|
|
|
|
.family = NFPROTO_UNSPEC,
|
|
|
|
.checkentry = connmark_tg_check,
|
|
|
|
.target = connmark_tg,
|
|
|
|
.targetsize = sizeof(struct xt_connmark_tginfo1),
|
|
|
|
.destroy = connmark_tg_destroy,
|
|
|
|
.me = THIS_MODULE,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "CONNMARK",
|
|
|
|
.revision = 2,
|
|
|
|
.family = NFPROTO_UNSPEC,
|
|
|
|
.checkentry = connmark_tg_check,
|
|
|
|
.target = connmark_tg_v2,
|
|
|
|
.targetsize = sizeof(struct xt_connmark_tginfo2),
|
|
|
|
.destroy = connmark_tg_destroy,
|
|
|
|
.me = THIS_MODULE,
|
|
|
|
}
|
2010-02-26 14:20:32 +01:00
|
|
|
};
|
|
|
|
|
2009-06-12 18:50:33 +02:00
|
|
|
static struct xt_match connmark_mt_reg __read_mostly = {
|
|
|
|
.name = "connmark",
|
|
|
|
.revision = 1,
|
|
|
|
.family = NFPROTO_UNSPEC,
|
|
|
|
.checkentry = connmark_mt_check,
|
|
|
|
.match = connmark_mt,
|
|
|
|
.matchsize = sizeof(struct xt_connmark_mtinfo1),
|
|
|
|
.destroy = connmark_mt_destroy,
|
|
|
|
.me = THIS_MODULE,
|
2005-04-17 00:20:36 +02:00
|
|
|
};
|
|
|
|
|
2007-12-05 08:24:03 +01:00
|
|
|
static int __init connmark_mt_init(void)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
2010-02-26 14:20:32 +01:00
|
|
|
int ret;
|
|
|
|
|
2018-03-18 21:41:59 +01:00
|
|
|
ret = xt_register_targets(connmark_tg_reg,
|
|
|
|
ARRAY_SIZE(connmark_tg_reg));
|
2010-02-26 14:20:32 +01:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
ret = xt_register_match(&connmark_mt_reg);
|
|
|
|
if (ret < 0) {
|
2018-03-18 21:41:59 +01:00
|
|
|
xt_unregister_targets(connmark_tg_reg,
|
|
|
|
ARRAY_SIZE(connmark_tg_reg));
|
2010-02-26 14:20:32 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2007-12-05 08:24:03 +01:00
|
|
|
static void __exit connmark_mt_exit(void)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
2009-06-12 18:50:33 +02:00
|
|
|
xt_unregister_match(&connmark_mt_reg);
|
2018-06-12 18:36:19 +02:00
|
|
|
xt_unregister_targets(connmark_tg_reg, ARRAY_SIZE(connmark_tg_reg));
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
2007-12-05 08:24:03 +01:00
|
|
|
module_init(connmark_mt_init);
|
|
|
|
module_exit(connmark_mt_exit);
|