aboutsummaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2007-09-27 15:48:05 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:53:11 -0400
commitb4219952356baa162368f2f5dab6421a5dbc5e15 (patch)
tree4d99027b3453853c79a32793c4ebda76c6386169 /include
parentce1234d299f3823ea07019c0f7b7b0bcb81ee7a0 (diff)
[PKT_SCHED]: Add stateless NAT
Stateless NAT is useful in controlled environments where restrictions are placed on through traffic such that we don't need connection tracking to correctly NAT protocol-specific data. In particular, this is of interest when the number of flows or the number of addresses being NATed is large, or if connection tracking information has to be replicated and where it is not practical to do so. Previously we had stateless NAT functionality which was integrated into the IPv4 routing subsystem. This was a great solution as long as the NAT worked on a subnet to subnet basis such that the number of NAT rules was relatively small. The reason is that for SNAT the routing based system had to perform a linear scan through the rules. If the number of rules is large then major renovations would have take place in the routing subsystem to make this practical. For the time being, the least intrusive way of achieving this is to use the u32 classifier written by Alexey Kuznetsov along with the actions infrastructure implemented by Jamal Hadi Salim. The following patch is an attempt at this problem by creating a new nat action that can be invoked from u32 hash tables which would allow large number of stateless NAT rules that can be used/updated in constant time. The actual NAT code is mostly based on the previous stateless NAT code written by Alexey. In future we might be able to utilise the protocol NAT code from netfilter to improve support for other protocols. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include')
-rw-r--r--include/linux/tc_act/tc_nat.h29
-rw-r--r--include/net/tc_act/tc_nat.h21
2 files changed, 50 insertions, 0 deletions
diff --git a/include/linux/tc_act/tc_nat.h b/include/linux/tc_act/tc_nat.h
new file mode 100644
index 000000000000..e7cf31e8ba79
--- /dev/null
+++ b/include/linux/tc_act/tc_nat.h
@@ -0,0 +1,29 @@
1#ifndef __LINUX_TC_NAT_H
2#define __LINUX_TC_NAT_H
3
4#include <linux/pkt_cls.h>
5#include <linux/types.h>
6
7#define TCA_ACT_NAT 9
8
9enum
10{
11 TCA_NAT_UNSPEC,
12 TCA_NAT_PARMS,
13 TCA_NAT_TM,
14 __TCA_NAT_MAX
15};
16#define TCA_NAT_MAX (__TCA_NAT_MAX - 1)
17
18#define TCA_NAT_FLAG_EGRESS 1
19
20struct tc_nat
21{
22 tc_gen;
23 __be32 old_addr;
24 __be32 new_addr;
25 __be32 mask;
26 __u32 flags;
27};
28
29#endif
diff --git a/include/net/tc_act/tc_nat.h b/include/net/tc_act/tc_nat.h
new file mode 100644
index 000000000000..4a691f34d703
--- /dev/null
+++ b/include/net/tc_act/tc_nat.h
@@ -0,0 +1,21 @@
1#ifndef __NET_TC_NAT_H
2#define __NET_TC_NAT_H
3
4#include <linux/types.h>
5#include <net/act_api.h>
6
7struct tcf_nat {
8 struct tcf_common common;
9
10 __be32 old_addr;
11 __be32 new_addr;
12 __be32 mask;
13 u32 flags;
14};
15
16static inline struct tcf_nat *to_tcf_nat(struct tcf_common *pc)
17{
18 return container_of(pc, struct tcf_nat, common);
19}
20
21#endif /* __NET_TC_NAT_H */