2 * xt_ipvs - kernel module to match IPVS connection properties
4 * Author: Hannes Eder <heder@google.com>
7 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
9 #include <linux/module.h>
10 #include <linux/moduleparam.h>
11 #include <linux/spinlock.h>
12 #include <linux/skbuff.h>
13 #ifdef CONFIG_IP_VS_IPV6
16 #include <linux/ip_vs.h>
17 #include <linux/types.h>
18 #include <linux/netfilter/x_tables.h>
19 #include <linux/netfilter/x_tables.h>
20 #include <linux/netfilter/xt_ipvs.h>
21 #include <net/netfilter/nf_conntrack.h>
23 #include <net/ip_vs.h>
25 MODULE_AUTHOR("Hannes Eder <heder@google.com>");
26 MODULE_DESCRIPTION("Xtables: match IPVS connection properties");
27 MODULE_LICENSE("GPL");
28 MODULE_ALIAS("ipt_ipvs");
29 MODULE_ALIAS("ip6t_ipvs");
31 /* borrowed from xt_conntrack */
32 static bool ipvs_mt_addrcmp(const union nf_inet_addr
*kaddr
,
33 const union nf_inet_addr
*uaddr
,
34 const union nf_inet_addr
*umask
,
37 if (l3proto
== NFPROTO_IPV4
)
38 return ((kaddr
->ip
^ uaddr
->ip
) & umask
->ip
) == 0;
39 #ifdef CONFIG_IP_VS_IPV6
40 else if (l3proto
== NFPROTO_IPV6
)
41 return ipv6_masked_addr_cmp(&kaddr
->in6
, &umask
->in6
,
49 ipvs_mt(const struct sk_buff
*skb
, struct xt_action_param
*par
)
51 const struct xt_ipvs_mtinfo
*data
= par
->matchinfo
;
52 /* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */
53 const u_int8_t family
= par
->family
;
54 struct ip_vs_iphdr iph
;
55 struct ip_vs_protocol
*pp
;
56 struct ip_vs_conn
*cp
;
59 if (data
->bitmask
== XT_IPVS_IPVS_PROPERTY
) {
60 match
= skb
->ipvs_property
^
61 !!(data
->invert
& XT_IPVS_IPVS_PROPERTY
);
65 /* other flags than XT_IPVS_IPVS_PROPERTY are set */
66 if (!skb
->ipvs_property
) {
71 ip_vs_fill_iphdr(family
, skb_network_header(skb
), &iph
);
73 if (data
->bitmask
& XT_IPVS_PROTO
)
74 if ((iph
.protocol
== data
->l4proto
) ^
75 !(data
->invert
& XT_IPVS_PROTO
)) {
80 pp
= ip_vs_proto_get(iph
.protocol
);
87 * Check if the packet belongs to an existing entry
89 cp
= pp
->conn_out_get(family
, skb
, pp
, &iph
, iph
.len
, 1 /* inverse */);
90 if (unlikely(cp
== NULL
)) {
96 * We found a connection, i.e. ct != 0, make sure to call
97 * __ip_vs_conn_put before returning. In our case jump to out_put_con.
100 if (data
->bitmask
& XT_IPVS_VPORT
)
101 if ((cp
->vport
== data
->vport
) ^
102 !(data
->invert
& XT_IPVS_VPORT
)) {
107 if (data
->bitmask
& XT_IPVS_VPORTCTL
)
108 if ((cp
->control
!= NULL
&&
109 cp
->control
->vport
== data
->vportctl
) ^
110 !(data
->invert
& XT_IPVS_VPORTCTL
)) {
115 if (data
->bitmask
& XT_IPVS_DIR
) {
116 enum ip_conntrack_info ctinfo
;
117 struct nf_conn
*ct
= nf_ct_get(skb
, &ctinfo
);
119 if (ct
== NULL
|| nf_ct_is_untracked(ct
)) {
124 if ((ctinfo
>= IP_CT_IS_REPLY
) ^
125 !!(data
->invert
& XT_IPVS_DIR
)) {
131 if (data
->bitmask
& XT_IPVS_METHOD
)
132 if (((cp
->flags
& IP_VS_CONN_F_FWD_MASK
) == data
->fwd_method
) ^
133 !(data
->invert
& XT_IPVS_METHOD
)) {
138 if (data
->bitmask
& XT_IPVS_VADDR
) {
139 if (ipvs_mt_addrcmp(&cp
->vaddr
, &data
->vaddr
,
140 &data
->vmask
, family
) ^
141 !(data
->invert
& XT_IPVS_VADDR
)) {
148 __ip_vs_conn_put(cp
);
150 pr_debug("match=%d\n", match
);
154 static int ipvs_mt_check(const struct xt_mtchk_param
*par
)
156 if (par
->family
!= NFPROTO_IPV4
157 #ifdef CONFIG_IP_VS_IPV6
158 && par
->family
!= NFPROTO_IPV6
161 pr_info("protocol family %u not supported\n", par
->family
);
168 static struct xt_match xt_ipvs_mt_reg __read_mostly
= {
171 .family
= NFPROTO_UNSPEC
,
173 .checkentry
= ipvs_mt_check
,
174 .matchsize
= XT_ALIGN(sizeof(struct xt_ipvs_mtinfo
)),
178 static int __init
ipvs_mt_init(void)
180 return xt_register_match(&xt_ipvs_mt_reg
);
183 static void __exit
ipvs_mt_exit(void)
185 xt_unregister_match(&xt_ipvs_mt_reg
);
188 module_init(ipvs_mt_init
);
189 module_exit(ipvs_mt_exit
);