dm-crypt: use __bio_add_page to add single page to clone bio
[linux-block.git] / net / netfilter / xt_connmark.c
CommitLineData
1ccea77e 1// SPDX-License-Identifier: GPL-2.0-or-later
96e32272 2/*
b8f00ba2 3 * xt_connmark - Netfilter module to operate on connection marks
1da177e4 4 *
50935339 5 * Copyright (C) 2002,2004 MARA Systems AB <https://www.marasystems.com>
96e32272
JE
6 * by Henrik Nordstrom <hno@marasystems.com>
7 * Copyright © CC Computer Consultants GmbH, 2007 - 2008
408ffaa4 8 * Jan Engelhardt <jengelh@medozas.de>
1da177e4
LT
9 */
10
11#include <linux/module.h>
12#include <linux/skbuff.h>
587aa641 13#include <net/netfilter/nf_conntrack.h>
b8f00ba2 14#include <net/netfilter/nf_conntrack_ecache.h>
587aa641
PM
15#include <linux/netfilter/x_tables.h>
16#include <linux/netfilter/xt_connmark.h>
1da177e4 17
3a4fa0a2 18MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
b8f00ba2 19MODULE_DESCRIPTION("Xtables: connection mark operations");
1da177e4 20MODULE_LICENSE("GPL");
b8f00ba2
JE
21MODULE_ALIAS("ipt_CONNMARK");
22MODULE_ALIAS("ip6t_CONNMARK");
2e4e6a17 23MODULE_ALIAS("ipt_connmark");
73aaf935 24MODULE_ALIAS("ip6t_connmark");
1da177e4 25
b8f00ba2 26static unsigned int
5a786232 27connmark_tg_shift(struct sk_buff *skb, const struct xt_connmark_tginfo2 *info)
b8f00ba2 28{
b8f00ba2 29 enum ip_conntrack_info ctinfo;
cf43ae63 30 u_int32_t new_targetmark;
b8f00ba2
JE
31 struct nf_conn *ct;
32 u_int32_t newmark;
52d1aa8b 33 u_int32_t oldmark;
b8f00ba2
JE
34
35 ct = nf_ct_get(skb, &ctinfo);
ab8bc7ed 36 if (ct == NULL)
b8f00ba2
JE
37 return XT_CONTINUE;
38
39 switch (info->mode) {
40 case XT_CONNMARK_SET:
52d1aa8b
DX
41 oldmark = READ_ONCE(ct->mark);
42 newmark = (oldmark & ~info->ctmask) ^ info->ctmark;
5a786232
PNA
43 if (info->shift_dir == D_SHIFT_RIGHT)
44 newmark >>= info->shift_bits;
472a73e0 45 else
5a786232
PNA
46 newmark <<= info->shift_bits;
47
52d1aa8b
DX
48 if (READ_ONCE(ct->mark) != newmark) {
49 WRITE_ONCE(ct->mark, newmark);
b8f00ba2
JE
50 nf_conntrack_event_cache(IPCT_MARK, ct);
51 }
52 break;
53 case XT_CONNMARK_SAVE:
cf43ae63 54 new_targetmark = (skb->mark & info->nfmask);
5a786232
PNA
55 if (info->shift_dir == D_SHIFT_RIGHT)
56 new_targetmark >>= info->shift_bits;
472a73e0 57 else
5a786232
PNA
58 new_targetmark <<= info->shift_bits;
59
52d1aa8b 60 newmark = (READ_ONCE(ct->mark) & ~info->ctmask) ^
cf43ae63 61 new_targetmark;
52d1aa8b
DX
62 if (READ_ONCE(ct->mark) != newmark) {
63 WRITE_ONCE(ct->mark, newmark);
b8f00ba2
JE
64 nf_conntrack_event_cache(IPCT_MARK, ct);
65 }
66 break;
67 case XT_CONNMARK_RESTORE:
52d1aa8b 68 new_targetmark = (READ_ONCE(ct->mark) & info->ctmask);
5a786232
PNA
69 if (info->shift_dir == D_SHIFT_RIGHT)
70 new_targetmark >>= info->shift_bits;
472a73e0 71 else
5a786232
PNA
72 new_targetmark <<= info->shift_bits;
73
cf43ae63
JM
74 newmark = (skb->mark & ~info->nfmask) ^
75 new_targetmark;
b8f00ba2
JE
76 skb->mark = newmark;
77 break;
78 }
b8f00ba2
JE
79 return XT_CONTINUE;
80}
81
472a73e0
JM
82static unsigned int
83connmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
84{
85 const struct xt_connmark_tginfo1 *info = par->targinfo;
5a786232
PNA
86 const struct xt_connmark_tginfo2 info2 = {
87 .ctmark = info->ctmark,
88 .ctmask = info->ctmask,
89 .nfmask = info->nfmask,
90 .mode = info->mode,
91 };
472a73e0 92
5a786232 93 return connmark_tg_shift(skb, &info2);
472a73e0
JM
94}
95
96static unsigned int
97connmark_tg_v2(struct sk_buff *skb, const struct xt_action_param *par)
98{
99 const struct xt_connmark_tginfo2 *info = par->targinfo;
100
5a786232 101 return connmark_tg_shift(skb, info);
472a73e0
JM
102}
103
135367b8 104static int connmark_tg_check(const struct xt_tgchk_param *par)
b8f00ba2 105{
4a5a5c73
JE
106 int ret;
107
ecb2421b 108 ret = nf_ct_netns_get(par->net, par->family);
f95c74e3 109 if (ret < 0)
b2606644
FW
110 pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
111 par->family);
f95c74e3 112 return ret;
b8f00ba2
JE
113}
114
115static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
116{
ecb2421b 117 nf_ct_netns_put(par->net, par->family);
b8f00ba2
JE
118}
119
1d93a9cb 120static bool
62fc8051 121connmark_mt(const struct sk_buff *skb, struct xt_action_param *par)
96e32272 122{
f7108a20 123 const struct xt_connmark_mtinfo1 *info = par->matchinfo;
96e32272
JE
124 enum ip_conntrack_info ctinfo;
125 const struct nf_conn *ct;
126
127 ct = nf_ct_get(skb, &ctinfo);
ab8bc7ed 128 if (ct == NULL)
96e32272
JE
129 return false;
130
52d1aa8b 131 return ((READ_ONCE(ct->mark) & info->mask) == info->mark) ^ info->invert;
96e32272
JE
132}
133
b0f38452 134static int connmark_mt_check(const struct xt_mtchk_param *par)
96e32272 135{
4a5a5c73
JE
136 int ret;
137
ecb2421b 138 ret = nf_ct_netns_get(par->net, par->family);
f95c74e3 139 if (ret < 0)
b2606644
FW
140 pr_info_ratelimited("cannot load conntrack support for proto=%u\n",
141 par->family);
f95c74e3 142 return ret;
96e32272
JE
143}
144
6be3d859 145static void connmark_mt_destroy(const struct xt_mtdtor_param *par)
b9f78f9f 146{
ecb2421b 147 nf_ct_netns_put(par->net, par->family);
b9f78f9f
PNA
148}
149
472a73e0
JM
150static struct xt_target connmark_tg_reg[] __read_mostly = {
151 {
152 .name = "CONNMARK",
153 .revision = 1,
154 .family = NFPROTO_UNSPEC,
155 .checkentry = connmark_tg_check,
156 .target = connmark_tg,
157 .targetsize = sizeof(struct xt_connmark_tginfo1),
158 .destroy = connmark_tg_destroy,
159 .me = THIS_MODULE,
160 },
161 {
162 .name = "CONNMARK",
163 .revision = 2,
164 .family = NFPROTO_UNSPEC,
165 .checkentry = connmark_tg_check,
166 .target = connmark_tg_v2,
167 .targetsize = sizeof(struct xt_connmark_tginfo2),
168 .destroy = connmark_tg_destroy,
169 .me = THIS_MODULE,
170 }
b8f00ba2
JE
171};
172
84899a2b
JE
173static struct xt_match connmark_mt_reg __read_mostly = {
174 .name = "connmark",
175 .revision = 1,
176 .family = NFPROTO_UNSPEC,
177 .checkentry = connmark_mt_check,
178 .match = connmark_mt,
179 .matchsize = sizeof(struct xt_connmark_mtinfo1),
180 .destroy = connmark_mt_destroy,
181 .me = THIS_MODULE,
1da177e4
LT
182};
183
d3c5ee6d 184static int __init connmark_mt_init(void)
1da177e4 185{
b8f00ba2
JE
186 int ret;
187
472a73e0
JM
188 ret = xt_register_targets(connmark_tg_reg,
189 ARRAY_SIZE(connmark_tg_reg));
b8f00ba2
JE
190 if (ret < 0)
191 return ret;
192 ret = xt_register_match(&connmark_mt_reg);
193 if (ret < 0) {
472a73e0
JM
194 xt_unregister_targets(connmark_tg_reg,
195 ARRAY_SIZE(connmark_tg_reg));
b8f00ba2
JE
196 return ret;
197 }
198 return 0;
1da177e4
LT
199}
200
d3c5ee6d 201static void __exit connmark_mt_exit(void)
1da177e4 202{
84899a2b 203 xt_unregister_match(&connmark_mt_reg);
fc6ddbec 204 xt_unregister_targets(connmark_tg_reg, ARRAY_SIZE(connmark_tg_reg));
1da177e4
LT
205}
206
d3c5ee6d
JE
207module_init(connmark_mt_init);
208module_exit(connmark_mt_exit);