padata: use %*pb[l] to print bitmaps including cpumasks and nodemasks
[deliverable/linux.git] / include / linux / netfilter_bridge.h
CommitLineData
1da177e4
LT
1#ifndef __LINUX_BRIDGE_NETFILTER_H
2#define __LINUX_BRIDGE_NETFILTER_H
3
607ca46e
DH
4#include <uapi/linux/netfilter_bridge.h>
5
1da177e4
LT
6
7enum nf_br_hook_priorities {
8 NF_BR_PRI_FIRST = INT_MIN,
9 NF_BR_PRI_NAT_DST_BRIDGED = -300,
10 NF_BR_PRI_FILTER_BRIDGED = -200,
11 NF_BR_PRI_BRNF = 0,
12 NF_BR_PRI_NAT_DST_OTHER = 100,
13 NF_BR_PRI_FILTER_OTHER = 200,
14 NF_BR_PRI_NAT_SRC = 300,
15 NF_BR_PRI_LAST = INT_MAX,
16};
17
34666d46 18#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
1da177e4
LT
19
20#define BRNF_PKT_TYPE 0x01
21#define BRNF_BRIDGED_DNAT 0x02
ea2d9b41
BDS
22#define BRNF_BRIDGED 0x04
23#define BRNF_NF_BRIDGE_PREROUTING 0x08
e179e632
BDS
24#define BRNF_8021Q 0x10
25#define BRNF_PPPoE 0x20
1da177e4 26
fc38582d
PM
27static inline unsigned int nf_bridge_encap_header_len(const struct sk_buff *skb)
28{
29 switch (skb->protocol) {
f3a7c66b 30 case __cpu_to_be16(ETH_P_8021Q):
fc38582d 31 return VLAN_HLEN;
f3a7c66b 32 case __cpu_to_be16(ETH_P_PPP_SES):
fc38582d
PM
33 return PPPOE_SES_HLEN;
34 default:
35 return 0;
36 }
37}
38
7276ca3f
PNA
39static inline void nf_bridge_update_protocol(struct sk_buff *skb)
40{
41 if (skb->nf_bridge->mask & BRNF_8021Q)
42 skb->protocol = htons(ETH_P_8021Q);
43 else if (skb->nf_bridge->mask & BRNF_PPPoE)
44 skb->protocol = htons(ETH_P_PPP_SES);
45}
46
47/* Fill in the header for fragmented IP packets handled by
48 * the IPv4 connection tracking code.
49 *
50 * Only used in br_forward.c
51 */
52static inline int nf_bridge_copy_header(struct sk_buff *skb)
53{
54 int err;
55 unsigned int header_size;
56
57 nf_bridge_update_protocol(skb);
58 header_size = ETH_HLEN + nf_bridge_encap_header_len(skb);
59 err = skb_cow_head(skb, header_size);
60 if (err)
61 return err;
62
63 skb_copy_to_linear_data_offset(skb, -header_size,
64 skb->nf_bridge->data, header_size);
65 __skb_push(skb, nf_bridge_encap_header_len(skb));
66 return 0;
67}
68
69static inline int nf_bridge_maybe_copy_header(struct sk_buff *skb)
70{
71 if (skb->nf_bridge &&
72 skb->nf_bridge->mask & (BRNF_BRIDGED | BRNF_BRIDGED_DNAT))
73 return nf_bridge_copy_header(skb);
74 return 0;
75}
76
6c79bf0f
BDS
77static inline unsigned int nf_bridge_mtu_reduction(const struct sk_buff *skb)
78{
79 if (unlikely(skb->nf_bridge->mask & BRNF_PPPoE))
80 return PPPOE_SES_HLEN;
81 return 0;
82}
83
a0f4ecf3 84int br_handle_frame_finish(struct sk_buff *skb);
ea2d9b41
BDS
85/* Only used in br_device.c */
86static inline int br_nf_pre_routing_finish_bridge_slow(struct sk_buff *skb)
87{
88 struct nf_bridge_info *nf_bridge = skb->nf_bridge;
89
90 skb_pull(skb, ETH_HLEN);
91 nf_bridge->mask ^= BRNF_BRIDGED_DNAT;
e179e632
BDS
92 skb_copy_to_linear_data_offset(skb, -(ETH_HLEN-ETH_ALEN),
93 skb->nf_bridge->data, ETH_HLEN-ETH_ALEN);
ea2d9b41
BDS
94 skb->dev = nf_bridge->physindev;
95 return br_handle_frame_finish(skb);
96}
97
1da177e4
LT
98/* This is called by the IP fragmenting code and it ensures there is
99 * enough room for the encapsulating header (if there is one). */
fc38582d 100static inline unsigned int nf_bridge_pad(const struct sk_buff *skb)
1da177e4 101{
fc38582d
PM
102 if (skb->nf_bridge)
103 return nf_bridge_encap_header_len(skb);
104 return 0;
1da177e4
LT
105}
106
107struct bridge_skb_cb {
108 union {
47c183fa 109 __be32 ipv4;
1da177e4
LT
110 } daddr;
111};
10ea6ac8 112
a881e963
PHP
113static inline void br_drop_fake_rtable(struct sk_buff *skb)
114{
115 struct dst_entry *dst = skb_dst(skb);
116
117 if (dst && (dst->flags & DST_FAKE_RTABLE))
118 skb_dst_drop(skb);
119}
120
07317621
SH
121#else
122#define nf_bridge_maybe_copy_header(skb) (0)
9bcfcaf5 123#define nf_bridge_pad(skb) (0)
a881e963 124#define br_drop_fake_rtable(skb) do { } while (0)
1da177e4
LT
125#endif /* CONFIG_BRIDGE_NETFILTER */
126
1da177e4 127#endif
This page took 1.061954 seconds and 5 git commands to generate.