2 * xt_connmark - Netfilter module to operate on connection marks
4 * Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
5 * by Henrik Nordstrom <hno@marasystems.com>
6 * Copyright © CC Computer Consultants GmbH, 2007 - 2008
7 * Jan Engelhardt <jengelh@medozas.de>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include <linux/module.h>
24 #include <linux/skbuff.h>
25 #include <net/netfilter/nf_conntrack.h>
26 #include <net/netfilter/nf_conntrack_ecache.h>
27 #include <linux/netfilter/x_tables.h>
28 #include <linux/netfilter/xt_connmark.h>
30 MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
31 MODULE_DESCRIPTION("Xtables: connection mark operations");
32 MODULE_LICENSE("GPL");
33 MODULE_ALIAS("ipt_CONNMARK");
34 MODULE_ALIAS("ip6t_CONNMARK");
35 MODULE_ALIAS("ipt_connmark");
36 MODULE_ALIAS("ip6t_connmark");
39 connmark_tg_shift(struct sk_buff *skb, const struct xt_connmark_tginfo2 *info)
41 enum ip_conntrack_info ctinfo;
42 u_int32_t new_targetmark;
46 ct = nf_ct_get(skb, &ctinfo);
52 newmark = (ct->mark & ~info->ctmask) ^ info->ctmark;
53 if (info->shift_dir == D_SHIFT_RIGHT)
54 newmark >>= info->shift_bits;
56 newmark <<= info->shift_bits;
58 if (ct->mark != newmark) {
60 nf_conntrack_event_cache(IPCT_MARK, ct);
63 case XT_CONNMARK_SAVE:
64 new_targetmark = (skb->mark & info->nfmask);
65 if (info->shift_dir == D_SHIFT_RIGHT)
66 new_targetmark >>= info->shift_bits;
68 new_targetmark <<= info->shift_bits;
70 newmark = (ct->mark & ~info->ctmask) ^
72 if (ct->mark != newmark) {
74 nf_conntrack_event_cache(IPCT_MARK, ct);
77 case XT_CONNMARK_RESTORE:
78 new_targetmark = (ct->mark & info->ctmask);
79 if (info->shift_dir == D_SHIFT_RIGHT)
80 new_targetmark >>= info->shift_bits;
82 new_targetmark <<= info->shift_bits;
84 newmark = (skb->mark & ~info->nfmask) ^
93 connmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
95 const struct xt_connmark_tginfo1 *info = par->targinfo;
96 const struct xt_connmark_tginfo2 info2 = {
97 .ctmark = info->ctmark,
98 .ctmask = info->ctmask,
99 .nfmask = info->nfmask,
103 return connmark_tg_shift(skb, &info2);
107 connmark_tg_v2(struct sk_buff *skb, const struct xt_action_param *par)
109 const struct xt_connmark_tginfo2 *info = par->targinfo;
111 return connmark_tg_shift(skb, info);
114 static int connmark_tg_check(const struct xt_tgchk_param *par)
118 ret = nf_ct_netns_get(par->net, par->family);
120 pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
125 static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
127 nf_ct_netns_put(par->net, par->family);
131 connmark_mt(const struct sk_buff *skb, struct xt_action_param *par)
133 const struct xt_connmark_mtinfo1 *info = par->matchinfo;
134 enum ip_conntrack_info ctinfo;
135 const struct nf_conn *ct;
137 ct = nf_ct_get(skb, &ctinfo);
141 return ((ct->mark & info->mask) == info->mark) ^ info->invert;
144 static int connmark_mt_check(const struct xt_mtchk_param *par)
148 ret = nf_ct_netns_get(par->net, par->family);
150 pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
155 static void connmark_mt_destroy(const struct xt_mtdtor_param *par)
157 nf_ct_netns_put(par->net, par->family);
160 static struct xt_target connmark_tg_reg[] __read_mostly = {
164 .family = NFPROTO_UNSPEC,
165 .checkentry = connmark_tg_check,
166 .target = connmark_tg,
167 .targetsize = sizeof(struct xt_connmark_tginfo1),
168 .destroy = connmark_tg_destroy,
174 .family = NFPROTO_UNSPEC,
175 .checkentry = connmark_tg_check,
176 .target = connmark_tg_v2,
177 .targetsize = sizeof(struct xt_connmark_tginfo2),
178 .destroy = connmark_tg_destroy,
183 static struct xt_match connmark_mt_reg __read_mostly = {
186 .family = NFPROTO_UNSPEC,
187 .checkentry = connmark_mt_check,
188 .match = connmark_mt,
189 .matchsize = sizeof(struct xt_connmark_mtinfo1),
190 .destroy = connmark_mt_destroy,
194 static int __init connmark_mt_init(void)
198 ret = xt_register_targets(connmark_tg_reg,
199 ARRAY_SIZE(connmark_tg_reg));
202 ret = xt_register_match(&connmark_mt_reg);
204 xt_unregister_targets(connmark_tg_reg,
205 ARRAY_SIZE(connmark_tg_reg));
211 static void __exit connmark_mt_exit(void)
213 xt_unregister_match(&connmark_mt_reg);
214 xt_unregister_targets(connmark_tg_reg, ARRAY_SIZE(connmark_tg_reg));
217 module_init(connmark_mt_init);
218 module_exit(connmark_mt_exit);