ebtable_nat.c 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. /*
  2. * ebtable_nat
  3. *
  4. * Authors:
  5. * Bart De Schuymer <bdschuym@pandora.be>
  6. *
  7. * April, 2002
  8. *
  9. */
  10. #include <linux/netfilter_bridge/ebtables.h>
  11. #include <linux/module.h>
  12. #define NAT_VALID_HOOKS ((1 << NF_BR_PRE_ROUTING) | (1 << NF_BR_LOCAL_OUT) | \
  13. (1 << NF_BR_POST_ROUTING))
  14. static struct ebt_entries initial_chains[] = {
  15. {
  16. .name = "PREROUTING",
  17. .policy = EBT_ACCEPT,
  18. },
  19. {
  20. .name = "OUTPUT",
  21. .policy = EBT_ACCEPT,
  22. },
  23. {
  24. .name = "POSTROUTING",
  25. .policy = EBT_ACCEPT,
  26. }
  27. };
  28. static struct ebt_replace_kernel initial_table = {
  29. .name = "nat",
  30. .valid_hooks = NAT_VALID_HOOKS,
  31. .entries_size = 3 * sizeof(struct ebt_entries),
  32. .hook_entry = {
  33. [NF_BR_PRE_ROUTING] = &initial_chains[0],
  34. [NF_BR_LOCAL_OUT] = &initial_chains[1],
  35. [NF_BR_POST_ROUTING] = &initial_chains[2],
  36. },
  37. .entries = (char *)initial_chains,
  38. };
  39. static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
  40. {
  41. if (valid_hooks & ~NAT_VALID_HOOKS)
  42. return -EINVAL;
  43. return 0;
  44. }
  45. static struct ebt_table frame_nat = {
  46. .name = "nat",
  47. .table = &initial_table,
  48. .valid_hooks = NAT_VALID_HOOKS,
  49. .check = check,
  50. .me = THIS_MODULE,
  51. };
  52. static unsigned int
  53. ebt_nat_in(void *priv, struct sk_buff *skb,
  54. const struct nf_hook_state *state)
  55. {
  56. return ebt_do_table(skb, state, state->net->xt.frame_nat);
  57. }
  58. static unsigned int
  59. ebt_nat_out(void *priv, struct sk_buff *skb,
  60. const struct nf_hook_state *state)
  61. {
  62. return ebt_do_table(skb, state, state->net->xt.frame_nat);
  63. }
  64. static struct nf_hook_ops ebt_ops_nat[] __read_mostly = {
  65. {
  66. .hook = ebt_nat_out,
  67. .pf = NFPROTO_BRIDGE,
  68. .hooknum = NF_BR_LOCAL_OUT,
  69. .priority = NF_BR_PRI_NAT_DST_OTHER,
  70. },
  71. {
  72. .hook = ebt_nat_out,
  73. .pf = NFPROTO_BRIDGE,
  74. .hooknum = NF_BR_POST_ROUTING,
  75. .priority = NF_BR_PRI_NAT_SRC,
  76. },
  77. {
  78. .hook = ebt_nat_in,
  79. .pf = NFPROTO_BRIDGE,
  80. .hooknum = NF_BR_PRE_ROUTING,
  81. .priority = NF_BR_PRI_NAT_DST_BRIDGED,
  82. },
  83. };
  84. static int __net_init frame_nat_net_init(struct net *net)
  85. {
  86. net->xt.frame_nat = ebt_register_table(net, &frame_nat);
  87. return PTR_ERR_OR_ZERO(net->xt.frame_nat);
  88. }
  89. static void __net_exit frame_nat_net_exit(struct net *net)
  90. {
  91. ebt_unregister_table(net, net->xt.frame_nat);
  92. }
  93. static struct pernet_operations frame_nat_net_ops = {
  94. .init = frame_nat_net_init,
  95. .exit = frame_nat_net_exit,
  96. };
  97. static int __init ebtable_nat_init(void)
  98. {
  99. int ret;
  100. ret = register_pernet_subsys(&frame_nat_net_ops);
  101. if (ret < 0)
  102. return ret;
  103. ret = nf_register_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
  104. if (ret < 0)
  105. unregister_pernet_subsys(&frame_nat_net_ops);
  106. return ret;
  107. }
  108. static void __exit ebtable_nat_fini(void)
  109. {
  110. nf_unregister_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
  111. unregister_pernet_subsys(&frame_nat_net_ops);
  112. }
  113. module_init(ebtable_nat_init);
  114. module_exit(ebtable_nat_fini);
  115. MODULE_LICENSE("GPL");