Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* iptables module for the IPv4 and TCP ECN bits, Version 1.5 |
2 | * | |
3 | * (C) 2002 by Harald Welte <laforge@netfilter.org> | |
e905a9ed | 4 | * |
1da177e4 | 5 | * This program is free software; you can redistribute it and/or modify |
e905a9ed | 6 | * it under the terms of the GNU General Public License version 2 as |
1da177e4 | 7 | * published by the Free Software Foundation. |
1da177e4 | 8 | */ |
ff67e4e4 | 9 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
6709dbbb | 10 | #include <linux/in.h> |
1da177e4 LT |
11 | #include <linux/module.h> |
12 | #include <linux/skbuff.h> | |
13 | #include <linux/ip.h> | |
c9bdd4b5 | 14 | #include <net/ip.h> |
1da177e4 LT |
15 | #include <linux/tcp.h> |
16 | #include <net/checksum.h> | |
17 | ||
6709dbbb | 18 | #include <linux/netfilter/x_tables.h> |
1da177e4 LT |
19 | #include <linux/netfilter_ipv4/ip_tables.h> |
20 | #include <linux/netfilter_ipv4/ipt_ECN.h> | |
21 | ||
22 | MODULE_LICENSE("GPL"); | |
23 | MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>"); | |
2ae15b64 | 24 | MODULE_DESCRIPTION("Xtables: Explicit Congestion Notification (ECN) flag modification"); |
1da177e4 LT |
25 | |
26 | /* set ECT codepoint from IP header. | |
e1931b78 JE |
27 | * return false if there was an error. */ |
28 | static inline bool | |
3db05fea | 29 | set_ect_ip(struct sk_buff *skb, const struct ipt_ECN_info *einfo) |
1da177e4 | 30 | { |
3db05fea | 31 | struct iphdr *iph = ip_hdr(skb); |
1da177e4 | 32 | |
da878c8e | 33 | if ((iph->tos & IPT_ECN_IP_MASK) != (einfo->ip_ect & IPT_ECN_IP_MASK)) { |
43bc0ca7 | 34 | __u8 oldtos; |
3db05fea | 35 | if (!skb_make_writable(skb, sizeof(struct iphdr))) |
e1931b78 | 36 | return false; |
3db05fea | 37 | iph = ip_hdr(skb); |
da878c8e PM |
38 | oldtos = iph->tos; |
39 | iph->tos &= ~IPT_ECN_IP_MASK; | |
40 | iph->tos |= (einfo->ip_ect & IPT_ECN_IP_MASK); | |
be0ea7d5 | 41 | csum_replace2(&iph->check, htons(oldtos), htons(iph->tos)); |
e905a9ed | 42 | } |
e1931b78 | 43 | return true; |
1da177e4 LT |
44 | } |
45 | ||
e1931b78 JE |
46 | /* Return false if there was an error. */ |
47 | static inline bool | |
3db05fea | 48 | set_ect_tcp(struct sk_buff *skb, const struct ipt_ECN_info *einfo) |
1da177e4 LT |
49 | { |
50 | struct tcphdr _tcph, *tcph; | |
6a19d614 | 51 | __be16 oldval; |
1da177e4 | 52 | |
af901ca1 | 53 | /* Not enough header? */ |
3db05fea | 54 | tcph = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(_tcph), &_tcph); |
1da177e4 | 55 | if (!tcph) |
e1931b78 | 56 | return false; |
1da177e4 | 57 | |
fd841326 PM |
58 | if ((!(einfo->operation & IPT_ECN_OP_SET_ECE) || |
59 | tcph->ece == einfo->proto.tcp.ece) && | |
7c4e36bc JE |
60 | (!(einfo->operation & IPT_ECN_OP_SET_CWR) || |
61 | tcph->cwr == einfo->proto.tcp.cwr)) | |
e1931b78 | 62 | return true; |
1da177e4 | 63 | |
3db05fea | 64 | if (!skb_make_writable(skb, ip_hdrlen(skb) + sizeof(*tcph))) |
e1931b78 | 65 | return false; |
3db05fea | 66 | tcph = (void *)ip_hdr(skb) + ip_hdrlen(skb); |
1da177e4 | 67 | |
6a19d614 | 68 | oldval = ((__be16 *)tcph)[6]; |
1da177e4 LT |
69 | if (einfo->operation & IPT_ECN_OP_SET_ECE) |
70 | tcph->ece = einfo->proto.tcp.ece; | |
71 | if (einfo->operation & IPT_ECN_OP_SET_CWR) | |
72 | tcph->cwr = einfo->proto.tcp.cwr; | |
1da177e4 | 73 | |
be0ea7d5 PM |
74 | inet_proto_csum_replace2(&tcph->check, skb, |
75 | oldval, ((__be16 *)tcph)[6], 0); | |
e1931b78 | 76 | return true; |
1da177e4 LT |
77 | } |
78 | ||
79 | static unsigned int | |
4b560b44 | 80 | ecn_tg(struct sk_buff *skb, const struct xt_action_param *par) |
1da177e4 | 81 | { |
7eb35586 | 82 | const struct ipt_ECN_info *einfo = par->targinfo; |
1da177e4 LT |
83 | |
84 | if (einfo->operation & IPT_ECN_OP_SET_IP) | |
3db05fea | 85 | if (!set_ect_ip(skb, einfo)) |
1da177e4 LT |
86 | return NF_DROP; |
87 | ||
3666ed1c JP |
88 | if (einfo->operation & (IPT_ECN_OP_SET_ECE | IPT_ECN_OP_SET_CWR) && |
89 | ip_hdr(skb)->protocol == IPPROTO_TCP) | |
3db05fea | 90 | if (!set_ect_tcp(skb, einfo)) |
1da177e4 LT |
91 | return NF_DROP; |
92 | ||
6709dbbb | 93 | return XT_CONTINUE; |
1da177e4 LT |
94 | } |
95 | ||
135367b8 | 96 | static int ecn_tg_check(const struct xt_tgchk_param *par) |
1da177e4 | 97 | { |
af5d6dc2 JE |
98 | const struct ipt_ECN_info *einfo = par->targinfo; |
99 | const struct ipt_entry *e = par->entryinfo; | |
1da177e4 | 100 | |
1da177e4 | 101 | if (einfo->operation & IPT_ECN_OP_MASK) { |
ff67e4e4 | 102 | pr_info("unsupported ECN operation %x\n", einfo->operation); |
d6b00a53 | 103 | return -EINVAL; |
1da177e4 LT |
104 | } |
105 | if (einfo->ip_ect & ~IPT_ECN_IP_MASK) { | |
ff67e4e4 | 106 | pr_info("new ECT codepoint %x out of mask\n", einfo->ip_ect); |
d6b00a53 | 107 | return -EINVAL; |
1da177e4 | 108 | } |
3666ed1c JP |
109 | if ((einfo->operation & (IPT_ECN_OP_SET_ECE|IPT_ECN_OP_SET_CWR)) && |
110 | (e->ip.proto != IPPROTO_TCP || (e->ip.invflags & XT_INV_PROTO))) { | |
ff67e4e4 | 111 | pr_info("cannot use TCP operations on a non-tcp rule\n"); |
d6b00a53 | 112 | return -EINVAL; |
1da177e4 | 113 | } |
d6b00a53 | 114 | return 0; |
1da177e4 LT |
115 | } |
116 | ||
d3c5ee6d | 117 | static struct xt_target ecn_tg_reg __read_mostly = { |
1da177e4 | 118 | .name = "ECN", |
ee999d8b | 119 | .family = NFPROTO_IPV4, |
d3c5ee6d | 120 | .target = ecn_tg, |
1d5cd909 PM |
121 | .targetsize = sizeof(struct ipt_ECN_info), |
122 | .table = "mangle", | |
d3c5ee6d | 123 | .checkentry = ecn_tg_check, |
1da177e4 LT |
124 | .me = THIS_MODULE, |
125 | }; | |
126 | ||
d3c5ee6d | 127 | static int __init ecn_tg_init(void) |
1da177e4 | 128 | { |
d3c5ee6d | 129 | return xt_register_target(&ecn_tg_reg); |
1da177e4 LT |
130 | } |
131 | ||
d3c5ee6d | 132 | static void __exit ecn_tg_exit(void) |
1da177e4 | 133 | { |
d3c5ee6d | 134 | xt_unregister_target(&ecn_tg_reg); |
1da177e4 LT |
135 | } |
136 | ||
d3c5ee6d JE |
137 | module_init(ecn_tg_init); |
138 | module_exit(ecn_tg_exit); |