[NETFILTER]: x_tables: consistent and unique symbol names
[deliverable/linux.git] / net / ipv4 / netfilter / ipt_REDIRECT.c
... / ...
CommitLineData
1/* Redirect. Simple mapping which alters dst to a local IP address. */
2/* (C) 1999-2001 Paul `Rusty' Russell
3 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
9
10#include <linux/types.h>
11#include <linux/ip.h>
12#include <linux/timer.h>
13#include <linux/module.h>
14#include <linux/netfilter.h>
15#include <linux/netdevice.h>
16#include <linux/if.h>
17#include <linux/inetdevice.h>
18#include <net/protocol.h>
19#include <net/checksum.h>
20#include <linux/netfilter_ipv4.h>
21#include <linux/netfilter/x_tables.h>
22#include <net/netfilter/nf_nat_rule.h>
23
24MODULE_LICENSE("GPL");
25MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
26MODULE_DESCRIPTION("iptables REDIRECT target module");
27
28/* FIXME: Take multiple ranges --RR */
29static bool
30redirect_tg_check(const char *tablename, const void *e,
31 const struct xt_target *target, void *targinfo,
32 unsigned int hook_mask)
33{
34 const struct nf_nat_multi_range_compat *mr = targinfo;
35
36 if (mr->range[0].flags & IP_NAT_RANGE_MAP_IPS) {
37 pr_debug("redirect_check: bad MAP_IPS.\n");
38 return false;
39 }
40 if (mr->rangesize != 1) {
41 pr_debug("redirect_check: bad rangesize %u.\n", mr->rangesize);
42 return false;
43 }
44 return true;
45}
46
47static unsigned int
48redirect_tg(struct sk_buff *skb, const struct net_device *in,
49 const struct net_device *out, unsigned int hooknum,
50 const struct xt_target *target, const void *targinfo)
51{
52 struct nf_conn *ct;
53 enum ip_conntrack_info ctinfo;
54 __be32 newdst;
55 const struct nf_nat_multi_range_compat *mr = targinfo;
56 struct nf_nat_range newrange;
57
58 NF_CT_ASSERT(hooknum == NF_INET_PRE_ROUTING
59 || hooknum == NF_INET_LOCAL_OUT);
60
61 ct = nf_ct_get(skb, &ctinfo);
62 NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED));
63
64 /* Local packets: make them go to loopback */
65 if (hooknum == NF_INET_LOCAL_OUT)
66 newdst = htonl(0x7F000001);
67 else {
68 struct in_device *indev;
69 struct in_ifaddr *ifa;
70
71 newdst = 0;
72
73 rcu_read_lock();
74 indev = __in_dev_get_rcu(skb->dev);
75 if (indev && (ifa = indev->ifa_list))
76 newdst = ifa->ifa_local;
77 rcu_read_unlock();
78
79 if (!newdst)
80 return NF_DROP;
81 }
82
83 /* Transfer from original range. */
84 newrange = ((struct nf_nat_range)
85 { mr->range[0].flags | IP_NAT_RANGE_MAP_IPS,
86 newdst, newdst,
87 mr->range[0].min, mr->range[0].max });
88
89 /* Hand modified range to generic setup. */
90 return nf_nat_setup_info(ct, &newrange, hooknum);
91}
92
93static struct xt_target redirect_tg_reg __read_mostly = {
94 .name = "REDIRECT",
95 .family = AF_INET,
96 .target = redirect_tg,
97 .targetsize = sizeof(struct nf_nat_multi_range_compat),
98 .table = "nat",
99 .hooks = (1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT),
100 .checkentry = redirect_tg_check,
101 .me = THIS_MODULE,
102};
103
104static int __init redirect_tg_init(void)
105{
106 return xt_register_target(&redirect_tg_reg);
107}
108
109static void __exit redirect_tg_exit(void)
110{
111 xt_unregister_target(&redirect_tg_reg);
112}
113
114module_init(redirect_tg_init);
115module_exit(redirect_tg_exit);
This page took 0.027463 seconds and 5 git commands to generate.