blob: 6a347e768f862ed9a9621dfc23f27cf40b648ad2 [file] [log] [blame]
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -07001/* x_tables module for setting the IPv4/IPv6 DSCP field, Version 1.8
2 *
3 * (C) 2002 by Harald Welte <laforge@netfilter.org>
4 * based on ipt_FTOS.c (C) 2000 by Matthew G. Marsh <mgm@paktronix.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 *
10 * See RFC2474 for a description of the DSCP field within the IP Header.
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070011*/
12
13#include <linux/module.h>
14#include <linux/skbuff.h>
15#include <linux/ip.h>
16#include <linux/ipv6.h>
17#include <net/dsfield.h>
18
19#include <linux/netfilter/x_tables.h>
20#include <linux/netfilter/xt_DSCP.h>
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080021#include <linux/netfilter_ipv4/ipt_TOS.h>
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070022
23MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
Jan Engelhardt2ae15b62008-01-14 23:42:28 -080024MODULE_DESCRIPTION("Xtables: DSCP/TOS field modification");
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070025MODULE_LICENSE("GPL");
26MODULE_ALIAS("ipt_DSCP");
27MODULE_ALIAS("ip6t_DSCP");
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080028MODULE_ALIAS("ipt_TOS");
Jan Engelhardt5c350e52007-12-04 23:39:09 -080029MODULE_ALIAS("ip6t_TOS");
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070030
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080031static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020032dscp_tg(struct sk_buff *skb, const struct xt_target_param *par)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070033{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020034 const struct xt_DSCP_info *dinfo = par->targinfo;
Herbert Xu3db05fe2007-10-15 00:53:15 -070035 u_int8_t dscp = ipv4_get_dsfield(ip_hdr(skb)) >> XT_DSCP_SHIFT;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070036
37 if (dscp != dinfo->dscp) {
Herbert Xu3db05fe2007-10-15 00:53:15 -070038 if (!skb_make_writable(skb, sizeof(struct iphdr)))
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070039 return NF_DROP;
40
Herbert Xu3db05fe2007-10-15 00:53:15 -070041 ipv4_change_dsfield(ip_hdr(skb), (__u8)(~XT_DSCP_MASK),
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070042 dinfo->dscp << XT_DSCP_SHIFT);
43
44 }
45 return XT_CONTINUE;
46}
47
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080048static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020049dscp_tg6(struct sk_buff *skb, const struct xt_target_param *par)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070050{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020051 const struct xt_DSCP_info *dinfo = par->targinfo;
Herbert Xu3db05fe2007-10-15 00:53:15 -070052 u_int8_t dscp = ipv6_get_dsfield(ipv6_hdr(skb)) >> XT_DSCP_SHIFT;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070053
54 if (dscp != dinfo->dscp) {
Herbert Xu3db05fe2007-10-15 00:53:15 -070055 if (!skb_make_writable(skb, sizeof(struct ipv6hdr)))
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070056 return NF_DROP;
57
Herbert Xu3db05fe2007-10-15 00:53:15 -070058 ipv6_change_dsfield(ipv6_hdr(skb), (__u8)(~XT_DSCP_MASK),
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070059 dinfo->dscp << XT_DSCP_SHIFT);
60 }
61 return XT_CONTINUE;
62}
63
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +020064static bool dscp_tg_check(const struct xt_tgchk_param *par)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070065{
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +020066 const struct xt_DSCP_info *info = par->targinfo;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070067
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +020068 if (info->dscp > XT_DSCP_MAX) {
69 printk(KERN_WARNING "DSCP: dscp %x out of range\n", info->dscp);
Jan Engelhardte1931b72007-07-07 22:16:26 -070070 return false;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070071 }
Jan Engelhardte1931b72007-07-07 22:16:26 -070072 return true;
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -070073}
74
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080075static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +020076tos_tg_v0(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080077{
Jan Engelhardt7eb35582008-10-08 11:35:19 +020078 const struct ipt_tos_target_info *info = par->targinfo;
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080079 struct iphdr *iph = ip_hdr(skb);
80 u_int8_t oldtos;
81
82 if ((iph->tos & IPTOS_TOS_MASK) != info->tos) {
83 if (!skb_make_writable(skb, sizeof(struct iphdr)))
84 return NF_DROP;
85
86 iph = ip_hdr(skb);
87 oldtos = iph->tos;
88 iph->tos = (iph->tos & IPTOS_PREC_MASK) | info->tos;
89 csum_replace2(&iph->check, htons(oldtos), htons(iph->tos));
90 }
91
92 return XT_CONTINUE;
93}
94
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +020095static bool tos_tg_check_v0(const struct xt_tgchk_param *par)
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080096{
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +020097 const struct ipt_tos_target_info *info = par->targinfo;
98 const uint8_t tos = info->tos;
Jan Engelhardtc9fd4962007-12-04 23:38:13 -080099
100 if (tos != IPTOS_LOWDELAY && tos != IPTOS_THROUGHPUT &&
101 tos != IPTOS_RELIABILITY && tos != IPTOS_MINCOST &&
102 tos != IPTOS_NORMALSVC) {
103 printk(KERN_WARNING "TOS: bad tos value %#x\n", tos);
104 return false;
105 }
106
107 return true;
108}
109
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800110static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200111tos_tg(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800112{
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200113 const struct xt_tos_target_info *info = par->targinfo;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800114 struct iphdr *iph = ip_hdr(skb);
115 u_int8_t orig, nv;
116
117 orig = ipv4_get_dsfield(iph);
Jan Engelhardt9bb268e2008-01-14 23:32:37 -0800118 nv = (orig & ~info->tos_mask) ^ info->tos_value;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800119
120 if (orig != nv) {
121 if (!skb_make_writable(skb, sizeof(struct iphdr)))
122 return NF_DROP;
123 iph = ip_hdr(skb);
Jan Engelhardtcdfe8b92008-01-14 23:32:54 -0800124 ipv4_change_dsfield(iph, 0, nv);
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800125 }
126
127 return XT_CONTINUE;
128}
129
130static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200131tos_tg6(struct sk_buff *skb, const struct xt_target_param *par)
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800132{
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200133 const struct xt_tos_target_info *info = par->targinfo;
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800134 struct ipv6hdr *iph = ipv6_hdr(skb);
135 u_int8_t orig, nv;
136
137 orig = ipv6_get_dsfield(iph);
138 nv = (orig & info->tos_mask) ^ info->tos_value;
139
140 if (orig != nv) {
141 if (!skb_make_writable(skb, sizeof(struct iphdr)))
142 return NF_DROP;
143 iph = ipv6_hdr(skb);
Jan Engelhardtcdfe8b92008-01-14 23:32:54 -0800144 ipv6_change_dsfield(iph, 0, nv);
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800145 }
146
147 return XT_CONTINUE;
148}
149
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800150static struct xt_target dscp_tg_reg[] __read_mostly = {
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700151 {
152 .name = "DSCP",
Jan Engelhardtee999d82008-10-08 11:35:01 +0200153 .family = NFPROTO_IPV4,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800154 .checkentry = dscp_tg_check,
155 .target = dscp_tg,
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700156 .targetsize = sizeof(struct xt_DSCP_info),
157 .table = "mangle",
158 .me = THIS_MODULE,
159 },
160 {
161 .name = "DSCP",
Jan Engelhardtee999d82008-10-08 11:35:01 +0200162 .family = NFPROTO_IPV6,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800163 .checkentry = dscp_tg_check,
164 .target = dscp_tg6,
Patrick McHardy4470bbc2006-08-22 00:34:04 -0700165 .targetsize = sizeof(struct xt_DSCP_info),
166 .table = "mangle",
167 .me = THIS_MODULE,
168 },
Jan Engelhardtc9fd4962007-12-04 23:38:13 -0800169 {
170 .name = "TOS",
171 .revision = 0,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200172 .family = NFPROTO_IPV4,
Jan Engelhardtc9fd4962007-12-04 23:38:13 -0800173 .table = "mangle",
174 .target = tos_tg_v0,
175 .targetsize = sizeof(struct ipt_tos_target_info),
176 .checkentry = tos_tg_check_v0,
177 .me = THIS_MODULE,
178 },
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800179 {
180 .name = "TOS",
181 .revision = 1,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200182 .family = NFPROTO_IPV4,
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800183 .table = "mangle",
184 .target = tos_tg,
185 .targetsize = sizeof(struct xt_tos_target_info),
186 .me = THIS_MODULE,
187 },
188 {
189 .name = "TOS",
190 .revision = 1,
Jan Engelhardtee999d82008-10-08 11:35:01 +0200191 .family = NFPROTO_IPV6,
Jan Engelhardt5c350e52007-12-04 23:39:09 -0800192 .table = "mangle",
193 .target = tos_tg6,
194 .targetsize = sizeof(struct xt_tos_target_info),
195 .me = THIS_MODULE,
196 },
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700197};
198
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800199static int __init dscp_tg_init(void)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700200{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800201 return xt_register_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700202}
203
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800204static void __exit dscp_tg_exit(void)
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700205{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800206 xt_unregister_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
Yasuyuki Kozakaia4687012006-08-22 00:30:26 -0700207}
208
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800209module_init(dscp_tg_init);
210module_exit(dscp_tg_exit);