-+ case XT_MARK_COPYXID:
-+ dif = ((struct rtable *)(*pskb)->dst)->rt_iif;
-+
-+ ct = nf_ct_get((*pskb), &ctinfo);
-+ if (!ct)
-+ break;
-+
-+ dir = CTINFO2DIR(ctinfo);
-+ src_ip = ct->tuplehash[dir].tuple.src.u3.ip;
-+ dst_ip = ct->tuplehash[dir].tuple.dst.u3.ip;
-+ src_port = get_src_port(&ct->tuplehash[dir].tuple);
-+ proto = ct->tuplehash[dir].tuple.dst.protonum;
-+
-+ ip = ct->tuplehash[dir].tuple.dst.u3.ip;
-+ port = get_dst_port(&ct->tuplehash[dir].tuple);
-+
-+ if (proto == 1) {
-+ if ((*pskb)->mark>0) /* The packet is marked, it's going out */
-+ {
-+ ct->xid[0]=(*pskb)->mark;
-+ }
-+
-+ if (ct->xid[0] > 0) {
-+ mark = ct->xid[0];
-+ }
-+ }
-+ else if (proto == 17) {
-+ struct sock *sk;
-+ if (!(*pskb)->mark) {
-+ sk = __udp4_lib_lookup(src_ip, src_port, ip, port,
-+ dif, udp_hash);
-+
-+ if (sk && hooknum==NF_IP_LOCAL_IN) {
-+ mark=sk->sk_nid;
-+ }
-+
-+ if (sk) {
-+ sock_put(sk);
-+ }
-+ }
-+ else
-+ if ((*pskb)->mark>0) /* The packet is marked, it's going out */
-+ {
-+ ct->xid[0]=(*pskb)->mark;
-+ }
-+ }
-+ else if (proto == 6) {
-+ if ((*pskb)->sk) {
-+ /* It's a listening socket */
-+ connection_sk = (*pskb)->sk;
-+ sock_hold(connection_sk);
-+ }
-+ else /* It might be a connected socket */
-+ connection_sk = inet_lookup_established(&tcp_hashinfo, src_ip, src_port, ip, port, dif);
-+
-+
-+ if (connection_sk /* Well, some kind of TCP socket */) {
-+ if (connection_sk->sk_peercred.uid == 0 || connection_sk->sk_peercred.uid == (__u32) -1) {
-+ /* Normal case - the peercred on the socket is not set */
-+ connection_sk->sk_peercred.gid = connection_sk->sk_peercred.uid = ct->xid[!dir];
-+ }
-+ else /* Exceptional case - the peercred was set using SET_PEERCRED. Somebody wants us
-+ to mark packets with some arbitrary value.*/
-+ mark=connection_sk->sk_peercred.uid;
-+
-+ /* Has this connection already been tagged? */
-+ if (ct->xid[dir] < 1) {
-+ /* No - let's tag it */
-+ ct->xid[dir]=connection_sk->sk_nid;
-+ }
-+
-+ if (mark==-1 && (connection_sk->sk_nid != 0))
-+ mark = ct->xid[dir];
-+
-+
-+ if (connection_sk->sk_state == TCP_TIME_WAIT) {
-+ inet_twsk_put(inet_twsk(connection_sk));
-+ break;
-+ }
-+ else
-+ sock_put(connection_sk);
-+ }
-+
-+ /* Covers CoDemux case */
-+ if (mark < 1 && (ct->xid[dir]>0)) {
-+ mark = ct->xid[dir];
++ case XT_MARK_COPYXID:
++ dif = ((struct rtable *)(*pskb)->dst)->rt_iif;
++
++ ct = nf_ct_get((*pskb), &ctinfo);
++ if (!ct)
++ break;
++
++ dir = CTINFO2DIR(ctinfo);
++ src_ip = ct->tuplehash[dir].tuple.src.u3.ip;
++ dst_ip = ct->tuplehash[dir].tuple.dst.u3.ip;
++ src_port = get_src_port(&ct->tuplehash[dir].tuple);
++ proto = ct->tuplehash[dir].tuple.dst.protonum;
++
++ ip = ct->tuplehash[dir].tuple.dst.u3.ip;
++ port = get_dst_port(&ct->tuplehash[dir].tuple);
++
++ if (proto == 1) {
++ if ((*pskb)->mark>0) /* The packet is marked, it's going out */
++ {
++ ct->xid[0]=(*pskb)->mark;
++ }
++
++ if (ct->xid[0] > 0) {
++ mark = ct->xid[0];
++ }
++ }
++ else if (proto == 17) {
++ struct sock *sk;
++ if (!(*pskb)->mark) {
++ sk = __udp4_lib_lookup(src_ip, src_port, ip, port,
++ dif, udp_hash);
++
++ if (sk && hooknum==NF_IP_LOCAL_IN) {
++ mark=sk->sk_nid;
++ }
++
++ if (sk) {
++ sock_put(sk);
++ }
++ }
++ else
++ if ((*pskb)->mark>0) /* The packet is marked, it's going out */
++ {
++ ct->xid[0]=(*pskb)->mark;
++ }
++ }
++ else if (proto == 6) /* TCP */{
++ int sockettype=0; /* Established socket */
++ /* Looks for an established socket or a listening socket corresponding to the 4-tuple, in
++ * that order. The order is important for Codemux connections to be handled properly */
++
++ connection_sk = inet_lookup_established(&tcp_hashinfo, src_ip, src_port, ip, port, dif);
++
++ if (!connection_sk) {
++ connection_sk = inet_lookup_listener(&tcp_hashinfo, ip, port, dif);
++ sockettype=1; /* Listening socket */
++ }
++
++ if (connection_sk) {
++ /* The peercred is not set. We set it if the other side has an xid. */
++ if (!PEERCRED_SET(connection_sk->sk_peercred.uid)
++ && ct->xid[!dir]>0 && (sockettype==0)) {
++ connection_sk->sk_peercred.gid = connection_sk->sk_peercred.uid = ct->xid[!dir];
++ }
++
++ /* The peercred is set, and is not equal to the XID of 'the other side' */
++ else if (PEERCRED_SET(connection_sk->sk_peercred.uid) && (connection_sk->sk_peercred.uid != ct->xid[!dir]) && (sockettype==0)) {
++ mark = connection_sk->sk_peercred.uid;
++ }
++
++ /* Has this connection already been tagged? */
++ if (ct->xid[dir] < 1) {
++ /* No - let's tag it */
++ ct->xid[dir]=connection_sk->sk_nid;
++
++ }
++
++ if (mark==-1 && (ct->xid[dir]!= 0))
++ mark = ct->xid[dir];
++
++ if (connection_sk->sk_state == TCP_TIME_WAIT) {
++ inet_twsk_put(inet_twsk(connection_sk));
++ break;
++ }
++ else
++ sock_put(connection_sk);