1 /* 2 * net/sched/act_connmark.c netfilter connmark retriever action 3 * skb mark is over-written 4 * 5 * Copyright (c) 2011 Felix Fietkau <nbd@openwrt.org> 6 * 7 * This program is free software; you can redistribute it and/or modify 8 * it under the terms of the GNU General Public License as published by 9 * the Free Software Foundation; either version 2 of the License, or 10 * (at your option) any later version. 11 */ 12 13 #include <linux/module.h> 14 #include <linux/init.h> 15 #include <linux/kernel.h> 16 #include <linux/skbuff.h> 17 #include <linux/rtnetlink.h> 18 #include <linux/pkt_cls.h> 19 #include <linux/ip.h> 20 #include <linux/ipv6.h> 21 #include <net/netlink.h> 22 #include <net/pkt_sched.h> 23 #include <net/act_api.h> 24 #include <uapi/linux/tc_act/tc_connmark.h> 25 #include <net/tc_act/tc_connmark.h> 26 27 #include <net/netfilter/nf_conntrack.h> 28 #include <net/netfilter/nf_conntrack_core.h> 29 #include <net/netfilter/nf_conntrack_zones.h> 30 31 static unsigned int connmark_net_id; 32 static struct tc_action_ops act_connmark_ops; 33 34 static int tcf_connmark_act(struct sk_buff *skb, const struct tc_action *a, 35 struct tcf_result *res) 36 { 37 const struct nf_conntrack_tuple_hash *thash; 38 struct nf_conntrack_tuple tuple; 39 enum ip_conntrack_info ctinfo; 40 struct tcf_connmark_info *ca = to_connmark(a); 41 struct nf_conntrack_zone zone; 42 struct nf_conn *c; 43 int proto; 44 45 spin_lock(&ca->tcf_lock); 46 tcf_lastuse_update(&ca->tcf_tm); 47 bstats_update(&ca->tcf_bstats, skb); 48 49 if (skb->protocol == htons(ETH_P_IP)) { 50 if (skb->len < sizeof(struct iphdr)) 51 goto out; 52 53 proto = NFPROTO_IPV4; 54 } else if (skb->protocol == htons(ETH_P_IPV6)) { 55 if (skb->len < sizeof(struct ipv6hdr)) 56 goto out; 57 58 proto = NFPROTO_IPV6; 59 } else { 60 goto out; 61 } 62 63 c = nf_ct_get(skb, &ctinfo); 64 if (c) { 65 skb->mark = c->mark; 66 /* using overlimits stats to count how many packets marked */ 67 ca->tcf_qstats.overlimits++; 68 goto out; 69 } 70 71 if (!nf_ct_get_tuplepr(skb, skb_network_offset(skb), 72 proto, ca->net, &tuple)) 73 goto out; 74 75 zone.id = ca->zone; 76 zone.dir = NF_CT_DEFAULT_ZONE_DIR; 77 78 thash = nf_conntrack_find_get(ca->net, &zone, &tuple); 79 if (!thash) 80 goto out; 81 82 c = nf_ct_tuplehash_to_ctrack(thash); 83 /* using overlimits stats to count how many packets marked */ 84 ca->tcf_qstats.overlimits++; 85 skb->mark = c->mark; 86 nf_ct_put(c); 87 88 out: 89 spin_unlock(&ca->tcf_lock); 90 return ca->tcf_action; 91 } 92 93 static const struct nla_policy connmark_policy[TCA_CONNMARK_MAX + 1] = { 94 [TCA_CONNMARK_PARMS] = { .len = sizeof(struct tc_connmark) }, 95 }; 96 97 static int tcf_connmark_init(struct net *net, struct nlattr *nla, 98 struct nlattr *est, struct tc_action **a, 99 int ovr, int bind, bool rtnl_held, 100 struct netlink_ext_ack *extack) 101 { 102 struct tc_action_net *tn = net_generic(net, connmark_net_id); 103 struct nlattr *tb[TCA_CONNMARK_MAX + 1]; 104 struct tcf_connmark_info *ci; 105 struct tc_connmark *parm; 106 int ret = 0; 107 108 if (!nla) 109 return -EINVAL; 110 111 ret = nla_parse_nested(tb, TCA_CONNMARK_MAX, nla, connmark_policy, 112 NULL); 113 if (ret < 0) 114 return ret; 115 116 if (!tb[TCA_CONNMARK_PARMS]) 117 return -EINVAL; 118 119 parm = nla_data(tb[TCA_CONNMARK_PARMS]); 120 121 ret = tcf_idr_check_alloc(tn, &parm->index, a, bind); 122 if (!ret) { 123 ret = tcf_idr_create(tn, parm->index, est, a, 124 &act_connmark_ops, bind, false); 125 if (ret) { 126 tcf_idr_cleanup(tn, parm->index); 127 return ret; 128 } 129 130 ci = to_connmark(*a); 131 ci->tcf_action = parm->action; 132 ci->net = net; 133 ci->zone = parm->zone; 134 135 tcf_idr_insert(tn, *a); 136 ret = ACT_P_CREATED; 137 } else if (ret > 0) { 138 ci = to_connmark(*a); 139 if (bind) 140 return 0; 141 if (!ovr) { 142 tcf_idr_release(*a, bind); 143 return -EEXIST; 144 } 145 /* replacing action and zone */ 146 ci->tcf_action = parm->action; 147 ci->zone = parm->zone; 148 ret = 0; 149 } 150 151 return ret; 152 } 153 154 static inline int tcf_connmark_dump(struct sk_buff *skb, struct tc_action *a, 155 int bind, int ref) 156 { 157 unsigned char *b = skb_tail_pointer(skb); 158 struct tcf_connmark_info *ci = to_connmark(a); 159 160 struct tc_connmark opt = { 161 .index = ci->tcf_index, 162 .refcnt = refcount_read(&ci->tcf_refcnt) - ref, 163 .bindcnt = atomic_read(&ci->tcf_bindcnt) - bind, 164 .action = ci->tcf_action, 165 .zone = ci->zone, 166 }; 167 struct tcf_t t; 168 169 if (nla_put(skb, TCA_CONNMARK_PARMS, sizeof(opt), &opt)) 170 goto nla_put_failure; 171 172 tcf_tm_dump(&t, &ci->tcf_tm); 173 if (nla_put_64bit(skb, TCA_CONNMARK_TM, sizeof(t), &t, 174 TCA_CONNMARK_PAD)) 175 goto nla_put_failure; 176 177 return skb->len; 178 nla_put_failure: 179 nlmsg_trim(skb, b); 180 return -1; 181 } 182 183 static int tcf_connmark_walker(struct net *net, struct sk_buff *skb, 184 struct netlink_callback *cb, int type, 185 const struct tc_action_ops *ops, 186 struct netlink_ext_ack *extack) 187 { 188 struct tc_action_net *tn = net_generic(net, connmark_net_id); 189 190 return tcf_generic_walker(tn, skb, cb, type, ops, extack); 191 } 192 193 static int tcf_connmark_search(struct net *net, struct tc_action **a, u32 index, 194 struct netlink_ext_ack *extack) 195 { 196 struct tc_action_net *tn = net_generic(net, connmark_net_id); 197 198 return tcf_idr_search(tn, a, index); 199 } 200 201 static int tcf_connmark_delete(struct net *net, u32 index) 202 { 203 struct tc_action_net *tn = net_generic(net, connmark_net_id); 204 205 return tcf_idr_delete_index(tn, index); 206 } 207 208 static struct tc_action_ops act_connmark_ops = { 209 .kind = "connmark", 210 .type = TCA_ACT_CONNMARK, 211 .owner = THIS_MODULE, 212 .act = tcf_connmark_act, 213 .dump = tcf_connmark_dump, 214 .init = tcf_connmark_init, 215 .walk = tcf_connmark_walker, 216 .lookup = tcf_connmark_search, 217 .delete = tcf_connmark_delete, 218 .size = sizeof(struct tcf_connmark_info), 219 }; 220 221 static __net_init int connmark_init_net(struct net *net) 222 { 223 struct tc_action_net *tn = net_generic(net, connmark_net_id); 224 225 return tc_action_net_init(tn, &act_connmark_ops); 226 } 227 228 static void __net_exit connmark_exit_net(struct list_head *net_list) 229 { 230 tc_action_net_exit(net_list, connmark_net_id); 231 } 232 233 static struct pernet_operations connmark_net_ops = { 234 .init = connmark_init_net, 235 .exit_batch = connmark_exit_net, 236 .id = &connmark_net_id, 237 .size = sizeof(struct tc_action_net), 238 }; 239 240 static int __init connmark_init_module(void) 241 { 242 return tcf_register_action(&act_connmark_ops, &connmark_net_ops); 243 } 244 245 static void __exit connmark_cleanup_module(void) 246 { 247 tcf_unregister_action(&act_connmark_ops, &connmark_net_ops); 248 } 249 250 module_init(connmark_init_module); 251 module_exit(connmark_cleanup_module); 252 MODULE_AUTHOR("Felix Fietkau <nbd@openwrt.org>"); 253 MODULE_DESCRIPTION("Connection tracking mark restoring"); 254 MODULE_LICENSE("GPL"); 255