splice: fix problems with sys_tee()
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / net / ipv4 / netfilter / ipt_ecn.c
blobb2825041493328381fa283307c35534a2b067ed9
1 /* IP tables module for matching the value of the IPv4 and TCP ECN bits
3 * ipt_ecn.c,v 1.3 2002/05/29 15:09:00 laforge Exp
5 * (C) 2002 by Harald Welte <laforge@gnumonks.org>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
12 #include <linux/module.h>
13 #include <linux/skbuff.h>
14 #include <linux/tcp.h>
16 #include <linux/netfilter_ipv4/ip_tables.h>
17 #include <linux/netfilter_ipv4/ipt_ecn.h>
19 MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
20 MODULE_DESCRIPTION("iptables ECN matching module");
21 MODULE_LICENSE("GPL");
23 static inline int match_ip(const struct sk_buff *skb,
24 const struct ipt_ecn_info *einfo)
26 return ((skb->nh.iph->tos&IPT_ECN_IP_MASK) == einfo->ip_ect);
29 static inline int match_tcp(const struct sk_buff *skb,
30 const struct ipt_ecn_info *einfo,
31 int *hotdrop)
33 struct tcphdr _tcph, *th;
35 /* In practice, TCP match does this, so can't fail. But let's
36 * be good citizens.
38 th = skb_header_pointer(skb, skb->nh.iph->ihl * 4,
39 sizeof(_tcph), &_tcph);
40 if (th == NULL) {
41 *hotdrop = 0;
42 return 0;
45 if (einfo->operation & IPT_ECN_OP_MATCH_ECE) {
46 if (einfo->invert & IPT_ECN_OP_MATCH_ECE) {
47 if (th->ece == 1)
48 return 0;
49 } else {
50 if (th->ece == 0)
51 return 0;
55 if (einfo->operation & IPT_ECN_OP_MATCH_CWR) {
56 if (einfo->invert & IPT_ECN_OP_MATCH_CWR) {
57 if (th->cwr == 1)
58 return 0;
59 } else {
60 if (th->cwr == 0)
61 return 0;
65 return 1;
68 static int match(const struct sk_buff *skb,
69 const struct net_device *in, const struct net_device *out,
70 const struct xt_match *match, const void *matchinfo,
71 int offset, unsigned int protoff, int *hotdrop)
73 const struct ipt_ecn_info *info = matchinfo;
75 if (info->operation & IPT_ECN_OP_MATCH_IP)
76 if (!match_ip(skb, info))
77 return 0;
79 if (info->operation & (IPT_ECN_OP_MATCH_ECE|IPT_ECN_OP_MATCH_CWR)) {
80 if (skb->nh.iph->protocol != IPPROTO_TCP)
81 return 0;
82 if (!match_tcp(skb, info, hotdrop))
83 return 0;
86 return 1;
89 static int checkentry(const char *tablename, const void *ip_void,
90 const struct xt_match *match,
91 void *matchinfo, unsigned int matchsize,
92 unsigned int hook_mask)
94 const struct ipt_ecn_info *info = matchinfo;
95 const struct ipt_ip *ip = ip_void;
97 if (info->operation & IPT_ECN_OP_MATCH_MASK)
98 return 0;
100 if (info->invert & IPT_ECN_OP_MATCH_MASK)
101 return 0;
103 if (info->operation & (IPT_ECN_OP_MATCH_ECE|IPT_ECN_OP_MATCH_CWR)
104 && ip->proto != IPPROTO_TCP) {
105 printk(KERN_WARNING "ipt_ecn: can't match TCP bits in rule for"
106 " non-tcp packets\n");
107 return 0;
110 return 1;
113 static struct ipt_match ecn_match = {
114 .name = "ecn",
115 .match = match,
116 .matchsize = sizeof(struct ipt_ecn_info),
117 .checkentry = checkentry,
118 .me = THIS_MODULE,
121 static int __init ipt_ecn_init(void)
123 return ipt_register_match(&ecn_match);
126 static void __exit ipt_ecn_fini(void)
128 ipt_unregister_match(&ecn_match);
131 module_init(ipt_ecn_init);
132 module_exit(ipt_ecn_fini);