bridge: change "foo* bar" to "foo *bar"
[linux-2.6-block.git] / net / bridge / netfilter / ebtable_nat.c
CommitLineData
1da177e4
LT
1/*
2 * ebtable_nat
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11#include <linux/netfilter_bridge/ebtables.h>
12#include <linux/module.h>
13
14#define NAT_VALID_HOOKS ((1 << NF_BR_PRE_ROUTING) | (1 << NF_BR_LOCAL_OUT) | \
15 (1 << NF_BR_POST_ROUTING))
16
17static struct ebt_entries initial_chains[] =
18{
19 {
20 .name = "PREROUTING",
21 .policy = EBT_ACCEPT,
22 },
23 {
24 .name = "OUTPUT",
25 .policy = EBT_ACCEPT,
26 },
27 {
28 .name = "POSTROUTING",
29 .policy = EBT_ACCEPT,
30 }
31};
32
1e419cd9 33static struct ebt_replace_kernel initial_table =
1da177e4
LT
34{
35 .name = "nat",
36 .valid_hooks = NAT_VALID_HOOKS,
37 .entries_size = 3 * sizeof(struct ebt_entries),
38 .hook_entry = {
39 [NF_BR_PRE_ROUTING] = &initial_chains[0],
40 [NF_BR_LOCAL_OUT] = &initial_chains[1],
41 [NF_BR_POST_ROUTING] = &initial_chains[2],
42 },
43 .entries = (char *)initial_chains,
44};
45
46static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
47{
48 if (valid_hooks & ~NAT_VALID_HOOKS)
49 return -EINVAL;
50 return 0;
51}
52
b71b30a6 53static struct ebt_table frame_nat =
1da177e4
LT
54{
55 .name = "nat",
56 .table = &initial_table,
57 .valid_hooks = NAT_VALID_HOOKS,
1da177e4
LT
58 .check = check,
59 .me = THIS_MODULE,
60};
61
62static unsigned int
795aa6ef
PM
63ebt_nat_in(const struct nf_hook_ops *ops, struct sk_buff *skb,
64 const struct net_device *in, const struct net_device *out,
65 int (*okfn)(struct sk_buff *))
1da177e4 66{
795aa6ef
PM
67 return ebt_do_table(ops->hooknum, skb, in, out,
68 dev_net(in)->xt.frame_nat);
1da177e4
LT
69}
70
71static unsigned int
795aa6ef
PM
72ebt_nat_out(const struct nf_hook_ops *ops, struct sk_buff *skb,
73 const struct net_device *in, const struct net_device *out,
74 int (*okfn)(struct sk_buff *))
1da177e4 75{
795aa6ef
PM
76 return ebt_do_table(ops->hooknum, skb, in, out,
77 dev_net(out)->xt.frame_nat);
1da177e4
LT
78}
79
1999414a 80static struct nf_hook_ops ebt_ops_nat[] __read_mostly = {
1da177e4 81 {
b71b30a6 82 .hook = ebt_nat_out,
1da177e4 83 .owner = THIS_MODULE,
24c232d8 84 .pf = NFPROTO_BRIDGE,
1da177e4
LT
85 .hooknum = NF_BR_LOCAL_OUT,
86 .priority = NF_BR_PRI_NAT_DST_OTHER,
87 },
88 {
b71b30a6 89 .hook = ebt_nat_out,
1da177e4 90 .owner = THIS_MODULE,
24c232d8 91 .pf = NFPROTO_BRIDGE,
1da177e4
LT
92 .hooknum = NF_BR_POST_ROUTING,
93 .priority = NF_BR_PRI_NAT_SRC,
94 },
95 {
b71b30a6 96 .hook = ebt_nat_in,
1da177e4 97 .owner = THIS_MODULE,
24c232d8 98 .pf = NFPROTO_BRIDGE,
1da177e4
LT
99 .hooknum = NF_BR_PRE_ROUTING,
100 .priority = NF_BR_PRI_NAT_DST_BRIDGED,
101 },
102};
103
b71b30a6
AD
104static int __net_init frame_nat_net_init(struct net *net)
105{
106 net->xt.frame_nat = ebt_register_table(net, &frame_nat);
8c6ffba0 107 return PTR_ERR_OR_ZERO(net->xt.frame_nat);
b71b30a6
AD
108}
109
110static void __net_exit frame_nat_net_exit(struct net *net)
111{
f54e9367 112 ebt_unregister_table(net, net->xt.frame_nat);
b71b30a6
AD
113}
114
115static struct pernet_operations frame_nat_net_ops = {
116 .init = frame_nat_net_init,
117 .exit = frame_nat_net_exit,
118};
119
65b4b4e8 120static int __init ebtable_nat_init(void)
1da177e4 121{
e40f51a3 122 int ret;
1da177e4 123
b71b30a6
AD
124 ret = register_pernet_subsys(&frame_nat_net_ops);
125 if (ret < 0)
126 return ret;
e40f51a3
AD
127 ret = nf_register_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
128 if (ret < 0)
b71b30a6 129 unregister_pernet_subsys(&frame_nat_net_ops);
1da177e4
LT
130 return ret;
131}
132
65b4b4e8 133static void __exit ebtable_nat_fini(void)
1da177e4 134{
e40f51a3 135 nf_unregister_hooks(ebt_ops_nat, ARRAY_SIZE(ebt_ops_nat));
b71b30a6 136 unregister_pernet_subsys(&frame_nat_net_ops);
1da177e4
LT
137}
138
65b4b4e8
AM
139module_init(ebtable_nat_init);
140module_exit(ebtable_nat_fini);
1da177e4 141MODULE_LICENSE("GPL");