3 #include <linux/netfilter_ipv4.h>
4 #include <linux/netfilter/nf_nat.h>
5 #include <net/netfilter/nf_conntrack_tuple.h>
7 enum nf_nat_manip_type {
12 /* SRC manip occurs POST_ROUTING or LOCAL_IN */
13 #define HOOK2MANIP(hooknum) ((hooknum) != NF_INET_POST_ROUTING && \
14 (hooknum) != NF_INET_LOCAL_IN)
16 #include <linux/list.h>
17 #include <linux/netfilter/nf_conntrack_pptp.h>
18 #include <net/netfilter/nf_conntrack_extend.h>
20 /* per conntrack: nat application helper private data */
21 union nf_conntrack_nat_help {
22 /* insert nat helper private data here */
23 #if defined(CONFIG_NF_NAT_PPTP) || defined(CONFIG_NF_NAT_PPTP_MODULE)
24 struct nf_nat_pptp nat_pptp_info;
30 /* The structure embedded in the conntrack structure. */
32 union nf_conntrack_nat_help help;
33 #if IS_ENABLED(CONFIG_NF_NAT_MASQUERADE_IPV4) || \
34 IS_ENABLED(CONFIG_NF_NAT_MASQUERADE_IPV6)
39 /* Set up the info structure to map into this range. */
40 unsigned int nf_nat_setup_info(struct nf_conn *ct,
41 const struct nf_nat_range *range,
42 enum nf_nat_manip_type maniptype);
44 extern unsigned int nf_nat_alloc_null_binding(struct nf_conn *ct,
45 unsigned int hooknum);
47 struct nf_conn_nat *nf_ct_nat_ext_add(struct nf_conn *ct);
49 /* Is this tuple already taken? (not by us)*/
50 int nf_nat_used_tuple(const struct nf_conntrack_tuple *tuple,
51 const struct nf_conn *ignored_conntrack);
53 static inline struct nf_conn_nat *nfct_nat(const struct nf_conn *ct)
55 #if defined(CONFIG_NF_NAT) || defined(CONFIG_NF_NAT_MODULE)
56 return nf_ct_ext_find(ct, NF_CT_EXT_NAT);
62 static inline bool nf_nat_oif_changed(unsigned int hooknum,
63 enum ip_conntrack_info ctinfo,
64 struct nf_conn_nat *nat,
65 const struct net_device *out)
67 #if IS_ENABLED(CONFIG_NF_NAT_MASQUERADE_IPV4) || \
68 IS_ENABLED(CONFIG_NF_NAT_MASQUERADE_IPV6)
69 return nat->masq_index && hooknum == NF_INET_POST_ROUTING &&
70 CTINFO2DIR(ctinfo) == IP_CT_DIR_ORIGINAL &&
71 nat->masq_index != out->ifindex;