]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/bridge/netfilter/ebtable_nat.c
netfilter: Pass priv instead of nf_hook_ops to netfilter hooks
[mirror_ubuntu-artful-kernel.git] / net / bridge / netfilter / ebtable_nat.c
CommitLineData
1da177e4
LT
1/*
2 * ebtable_nat
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11#include <linux/netfilter_bridge/ebtables.h>
12#include <linux/module.h>
13
14#define NAT_VALID_HOOKS ((1 << NF_BR_PRE_ROUTING) | (1 << NF_BR_LOCAL_OUT) | \
15 (1 << NF_BR_POST_ROUTING))
16
97ad8b53 17static struct ebt_entries initial_chains[] = {
1da177e4
LT
18 {
19 .name = "PREROUTING",
20 .policy = EBT_ACCEPT,
21 },
22 {
23 .name = "OUTPUT",
24 .policy = EBT_ACCEPT,
25 },
26 {
27 .name = "POSTROUTING",
28 .policy = EBT_ACCEPT,
29 }
30};
31
97ad8b53 32static struct ebt_replace_kernel initial_table = {
1da177e4
LT
33 .name = "nat",
34 .valid_hooks = NAT_VALID_HOOKS,
35 .entries_size = 3 * sizeof(struct ebt_entries),
36 .hook_entry = {
37 [NF_BR_PRE_ROUTING] = &initial_chains[0],
38 [NF_BR_LOCAL_OUT] = &initial_chains[1],
39 [NF_BR_POST_ROUTING] = &initial_chains[2],
40 },
41 .entries = (char *)initial_chains,
42};
43
44static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
45{
46 if (valid_hooks & ~NAT_VALID_HOOKS)
47 return -EINVAL;
48 return 0;
49}
50
97ad8b53 51static struct ebt_table frame_nat = {
1da177e4
LT
52 .name = "nat",
53 .table = &initial_table,
54 .valid_hooks = NAT_VALID_HOOKS,
1da177e4
LT
55 .check = check,
56 .me = THIS_MODULE,
57};
58
59static unsigned int
06198b34 60ebt_nat_in(void *priv, struct sk_buff *skb,
238e54c9 61 const struct nf_hook_state *state)
1da177e4 62{
97b59c3a 63 return ebt_do_table(skb, state, state->net->xt.frame_nat);
1da177e4
LT
64}
65
66static unsigned int
06198b34 67ebt_nat_out(void *priv, struct sk_buff *skb,
238e54c9 68 const struct nf_hook_state *state)
1da177e4 69{
97b59c3a 70 return ebt_do_table(skb, state, state->net->xt.frame_nat);
1da177e4
LT
71}
72
1999414a 73static struct nf_hook_ops ebt_ops_nat[] __read_mostly = {
1da177e4 74 {
b71b30a6 75 .hook = ebt_nat_out,
1da177e4 76 .owner = THIS_MODULE,
24c232d8 77 .pf = NFPROTO_BRIDGE,
1da177e4
LT
78 .hooknum = NF_BR_LOCAL_OUT,
79 .priority = NF_BR_PRI_NAT_DST_OTHER,
80 },
81 {
b71b30a6 82 .hook = ebt_nat_out,
1da177e4 83 .owner = THIS_MODULE,
24c232d8 84 .pf = NFPROTO_BRIDGE,
1da177e4
LT
85 .hooknum = NF_BR_POST_ROUTING,
86 .priority = NF_BR_PRI_NAT_SRC,
87 },
88 {
b71b30a6 89 .hook = ebt_nat_in,
1da177e4 90 .owner = THIS_MODULE,
24c232d8 91 .pf = NFPROTO_BRIDGE,
1da177e4
LT
92 .hooknum = NF_BR_PRE_ROUTING,
93 .priority = NF_BR_PRI_NAT_DST_BRIDGED,
94 },
95};
96
b71b30a6
AD
97static int __net_init frame_nat_net_init(struct net *net)
98{
99 net->xt.frame_nat = ebt_register_table(net, &frame_nat);
8c6ffba0 100 return PTR_ERR_OR_ZERO(net->xt.frame_nat);
b71b30a6
AD
101}
102
103static void __net_exit frame_nat_net_exit(struct net *net)
104{
f54e9367 105 ebt_unregister_table(net, net->xt.frame_nat);
b71b30a6
AD
106}
107
108static struct pernet_operations frame_nat_net_ops = {
109 .init = frame_nat_net_init,
110 .exit = frame_nat_net_exit,
111};
112
65b4b4e8 113static int __init ebtable_nat_init(void)
1da177e4 114{
e40f51a3 115 int ret;
1da177e4 116
b71b30a6
AD
117 ret = register_pernet_subsys(&frame_nat_net_ops);
118 if (ret < 0)
119 return ret;
e40f51a3
AD
120 ret = nf_register_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
121 if (ret < 0)
b71b30a6 122 unregister_pernet_subsys(&frame_nat_net_ops);
1da177e4
LT
123 return ret;
124}
125
65b4b4e8 126static void __exit ebtable_nat_fini(void)
1da177e4 127{
e40f51a3 128 nf_unregister_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
b71b30a6 129 unregister_pernet_subsys(&frame_nat_net_ops);
1da177e4
LT
130}
131
65b4b4e8
AM
132module_init(ebtable_nat_init);
133module_exit(ebtable_nat_fini);
1da177e4 134MODULE_LICENSE("GPL");