blob: c78e80afdf3dd3fcdbd2420f0aca87c8a97aa033 [file] [log] [blame]
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -07001/* x_tables module for setting the IPv4/IPv6 DSCP field, Version 1.8
2 *
3 * (C) 2002 by Harald Welte <laforge@netfilter.org>
4 * based on ipt_FTOS.c (C) 2000 by Matthew G. Marsh <mgm@paktronix.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 *
10 * See RFC2474 for a description of the DSCP field within the IP Header.
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070011*/
12
13#include <linux/module.h>
14#include <linux/skbuff.h>
15#include <linux/ip.h>
16#include <linux/ipv6.h>
17#include <net/dsfield.h>
18
19#include <linux/netfilter/x_tables.h>
20#include <linux/netfilter/xt_DSCP.h>
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080021#include <linux/netfilter_ipv4/ipt_TOS.h>
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070022
23MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
Jan Engelhardt2ae15b62008-01-14 23:42:28 -080024MODULE_DESCRIPTION("Xtables: DSCP/TOS field modification");
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070025MODULE_LICENSE("GPL");
26MODULE_ALIAS("ipt_DSCP");
27MODULE_ALIAS("ip6t_DSCP");
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080028MODULE_ALIAS("ipt_TOS");
Jan Engelhardt5c350e52007-12-04 23:39:09 -080029MODULE_ALIAS("ip6t_TOS");
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070030
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080031static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020032dscp_tg(struct sk_buff *skb, const struct xt_target_param *par)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070033{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020034 const struct xt_DSCP_info *dinfo = par->targinfo;
Herbert Xu3db05fe2007-10-15 00:53:15 -070035 u_int8_t dscp = ipv4_get_dsfield(ip_hdr(skb)) >> XT_DSCP_SHIFT;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070036
37 if (dscp != dinfo->dscp) {
Herbert Xu3db05fe2007-10-15 00:53:15 -070038 if (!skb_make_writable(skb, sizeof(struct iphdr)))
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070039 return NF_DROP;
40
Herbert Xu3db05fe2007-10-15 00:53:15 -070041 ipv4_change_dsfield(ip_hdr(skb), (__u8)(~XT_DSCP_MASK),
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070042 dinfo->dscp << XT_DSCP_SHIFT);
43
44 }
45 return XT_CONTINUE;
46}
47
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080048static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020049dscp_tg6(struct sk_buff *skb, const struct xt_target_param *par)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070050{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020051 const struct xt_DSCP_info *dinfo = par->targinfo;
Herbert Xu3db05fe2007-10-15 00:53:15 -070052 u_int8_t dscp = ipv6_get_dsfield(ipv6_hdr(skb)) >> XT_DSCP_SHIFT;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070053
54 if (dscp != dinfo->dscp) {
Herbert Xu3db05fe2007-10-15 00:53:15 -070055 if (!skb_make_writable(skb, sizeof(struct ipv6hdr)))
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070056 return NF_DROP;
57
Herbert Xu3db05fe2007-10-15 00:53:15 -070058 ipv6_change_dsfield(ipv6_hdr(skb), (__u8)(~XT_DSCP_MASK),
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070059 dinfo->dscp << XT_DSCP_SHIFT);
60 }
61 return XT_CONTINUE;
62}
63
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080064static bool
65dscp_tg_check(const char *tablename, const void *e_void,
66 const struct xt_target *target, void *targinfo,
67 unsigned int hook_mask)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070068{
69 const u_int8_t dscp = ((struct xt_DSCP_info *)targinfo)->dscp;
70
Jan Engelhardt7c4e36b2007-07-07 22:19:08 -070071 if (dscp > XT_DSCP_MAX) {
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070072 printk(KERN_WARNING "DSCP: dscp %x out of range\n", dscp);
Jan Engelhardte1931b72007-07-07 22:16:26 -070073 return false;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070074 }
Jan Engelhardte1931b72007-07-07 22:16:26 -070075 return true;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070076}
77
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080078static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020079tos_tg_v0(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080080{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020081 const struct ipt_tos_target_info *info = par->targinfo;
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080082 struct iphdr *iph = ip_hdr(skb);
83 u_int8_t oldtos;
84
85 if ((iph->tos & IPTOS_TOS_MASK) != info->tos) {
86 if (!skb_make_writable(skb, sizeof(struct iphdr)))
87 return NF_DROP;
88
89 iph = ip_hdr(skb);
90 oldtos = iph->tos;
91 iph->tos = (iph->tos & IPTOS_PREC_MASK) | info->tos;
92 csum_replace2(&iph->check, htons(oldtos), htons(iph->tos));
93 }
94
95 return XT_CONTINUE;
96}
97
98static bool
99tos_tg_check_v0(const char *tablename, const void *e_void,
100 const struct xt_target *target, void *targinfo,
101 unsigned int hook_mask)
102{
103 const u_int8_t tos = ((struct ipt_tos_target_info *)targinfo)->tos;
104
105 if (tos != IPTOS_LOWDELAY && tos != IPTOS_THROUGHPUT &&
106 tos != IPTOS_RELIABILITY && tos != IPTOS_MINCOST &&
107 tos != IPTOS_NORMALSVC) {
108 printk(KERN_WARNING "TOS: bad tos value %#x\n", tos);
109 return false;
110 }
111
112 return true;
113}
114
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800115static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200116tos_tg(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800117{
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200118 const struct xt_tos_target_info *info = par->targinfo;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800119 struct iphdr *iph = ip_hdr(skb);
120 u_int8_t orig, nv;
121
122 orig = ipv4_get_dsfield(iph);
Jan Engelhardt9bb268e2008-01-14 23:32:37 -0800123 nv = (orig & ~info->tos_mask) ^ info->tos_value;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800124
125 if (orig != nv) {
126 if (!skb_make_writable(skb, sizeof(struct iphdr)))
127 return NF_DROP;
128 iph = ip_hdr(skb);
Jan Engelhardtcdfe8b92008-01-14 23:32:54 -0800129 ipv4_change_dsfield(iph, 0, nv);
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800130 }
131
132 return XT_CONTINUE;
133}
134
135static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200136tos_tg6(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800137{
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200138 const struct xt_tos_target_info *info = par->targinfo;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800139 struct ipv6hdr *iph = ipv6_hdr(skb);
140 u_int8_t orig, nv;
141
142 orig = ipv6_get_dsfield(iph);
143 nv = (orig & info->tos_mask) ^ info->tos_value;
144
145 if (orig != nv) {
146 if (!skb_make_writable(skb, sizeof(struct iphdr)))
147 return NF_DROP;
148 iph = ipv6_hdr(skb);
Jan Engelhardtcdfe8b92008-01-14 23:32:54 -0800149 ipv6_change_dsfield(iph, 0, nv);
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800150 }
151
152 return XT_CONTINUE;
153}
154
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800155static struct xt_target dscp_tg_reg[] __read_mostly = {
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700156 {
157 .name = "DSCP",
Jan Engelhardtee999d82008-10-08 11:35:01 +0200158 .family = NFPROTO_IPV4,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800159 .checkentry = dscp_tg_check,
160 .target = dscp_tg,
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700161 .targetsize = sizeof(struct xt_DSCP_info),
162 .table = "mangle",
163 .me = THIS_MODULE,
164 },
165 {
166 .name = "DSCP",
Jan Engelhardtee999d82008-10-08 11:35:01 +0200167 .family = NFPROTO_IPV6,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800168 .checkentry = dscp_tg_check,
169 .target = dscp_tg6,
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700170 .targetsize = sizeof(struct xt_DSCP_info),
171 .table = "mangle",
172 .me = THIS_MODULE,
173 },
Jan Engelhardtc9fd4962007-12-04 23:38:13 -0800174 {
175 .name = "TOS",
176 .revision = 0,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200177 .family = NFPROTO_IPV4,
Jan Engelhardtc9fd4962007-12-04 23:38:13 -0800178 .table = "mangle",
179 .target = tos_tg_v0,
180 .targetsize = sizeof(struct ipt_tos_target_info),
181 .checkentry = tos_tg_check_v0,
182 .me = THIS_MODULE,
183 },
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800184 {
185 .name = "TOS",
186 .revision = 1,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200187 .family = NFPROTO_IPV4,
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800188 .table = "mangle",
189 .target = tos_tg,
190 .targetsize = sizeof(struct xt_tos_target_info),
191 .me = THIS_MODULE,
192 },
193 {
194 .name = "TOS",
195 .revision = 1,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200196 .family = NFPROTO_IPV6,
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800197 .table = "mangle",
198 .target = tos_tg6,
199 .targetsize = sizeof(struct xt_tos_target_info),
200 .me = THIS_MODULE,
201 },
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700202};
203
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800204static int __init dscp_tg_init(void)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700205{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800206 return xt_register_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700207}
208
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800209static void __exit dscp_tg_exit(void)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700210{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800211 xt_unregister_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700212}
213
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800214module_init(dscp_tg_init);
215module_exit(dscp_tg_exit);