]> bbs.cooldavid.org Git - net-next-2.6.git/blame - include/net/netfilter/nf_conntrack_l4proto.h
netfilter: nf_conntrack: pass template to l4proto ->error() handler
[net-next-2.6.git] / include / net / netfilter / nf_conntrack_l4proto.h
CommitLineData
9fb9cbb1 1/*
605dcad6 2 * Header for use in defining a given L4 protocol for connection tracking.
9fb9cbb1
YK
3 *
4 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
5 * - generalized L3 protocol dependent part.
6 *
7 * Derived from include/linux/netfiter_ipv4/ip_conntrack_protcol.h
8 */
9
605dcad6
MJ
10#ifndef _NF_CONNTRACK_L4PROTO_H
11#define _NF_CONNTRACK_L4PROTO_H
df6fb868 12#include <linux/netlink.h>
f73e924c 13#include <net/netlink.h>
9fb9cbb1
YK
14#include <net/netfilter/nf_conntrack.h>
15
16struct seq_file;
17
fd2c3ef7 18struct nf_conntrack_l4proto {
9fb9cbb1
YK
19 /* L3 Protocol number. */
20 u_int16_t l3proto;
21
605dcad6
MJ
22 /* L4 Protocol number. */
23 u_int8_t l4proto;
9fb9cbb1 24
9fb9cbb1
YK
25 /* Try to fill in the third arg: dataoff is offset past network protocol
26 hdr. Return true if possible. */
09f263cd
JE
27 bool (*pkt_to_tuple)(const struct sk_buff *skb, unsigned int dataoff,
28 struct nf_conntrack_tuple *tuple);
9fb9cbb1
YK
29
30 /* Invert the per-proto part of the tuple: ie. turn xmit into reply.
31 * Some packets can't be inverted: return 0 in that case.
32 */
09f263cd
JE
33 bool (*invert_tuple)(struct nf_conntrack_tuple *inverse,
34 const struct nf_conntrack_tuple *orig);
9fb9cbb1 35
9fb9cbb1 36 /* Returns verdict for packet, or -1 for invalid. */
c88130bc 37 int (*packet)(struct nf_conn *ct,
9fb9cbb1
YK
38 const struct sk_buff *skb,
39 unsigned int dataoff,
40 enum ip_conntrack_info ctinfo,
76108cea 41 u_int8_t pf,
9fb9cbb1
YK
42 unsigned int hooknum);
43
44 /* Called when a new connection for this protocol found;
45 * returns TRUE if it's OK. If so, packet() called next. */
09f263cd
JE
46 bool (*new)(struct nf_conn *ct, const struct sk_buff *skb,
47 unsigned int dataoff);
9fb9cbb1
YK
48
49 /* Called when a conntrack entry is destroyed */
c88130bc 50 void (*destroy)(struct nf_conn *ct);
9fb9cbb1 51
8fea97ec
PM
52 int (*error)(struct net *net, struct nf_conn *tmpl, struct sk_buff *skb,
53 unsigned int dataoff, enum ip_conntrack_info *ctinfo,
76108cea 54 u_int8_t pf, unsigned int hooknum);
9fb9cbb1 55
ffaa9c10
PM
56 /* Print out the per-protocol part of the tuple. Return like seq_* */
57 int (*print_tuple)(struct seq_file *s,
58 const struct nf_conntrack_tuple *);
59
60 /* Print out the private part of the conntrack. */
440f0d58 61 int (*print_conntrack)(struct seq_file *s, struct nf_conn *);
ffaa9c10 62
c1d10adb 63 /* convert protoinfo to nfnetink attributes */
fdf70832 64 int (*to_nlattr)(struct sk_buff *skb, struct nlattr *nla,
440f0d58 65 struct nf_conn *ct);
d0dba725
HE
66 /* Calculate protoinfo nlattr size */
67 int (*nlattr_size)(void);
c1d10adb
PNA
68
69 /* convert nfnetlink attributes to protoinfo */
fdf70832 70 int (*from_nlattr)(struct nlattr *tb[], struct nf_conn *ct);
c1d10adb 71
fdf70832 72 int (*tuple_to_nlattr)(struct sk_buff *skb,
c1d10adb 73 const struct nf_conntrack_tuple *t);
d0dba725
HE
74 /* Calculate tuple nlattr size */
75 int (*nlattr_tuple_size)(void);
fdf70832 76 int (*nlattr_to_tuple)(struct nlattr *tb[],
c1d10adb 77 struct nf_conntrack_tuple *t);
f73e924c 78 const struct nla_policy *nla_policy;
c1d10adb 79
d0dba725
HE
80 size_t nla_size;
81
d62f9ed4
PM
82#ifdef CONFIG_SYSCTL
83 struct ctl_table_header **ctl_table_header;
84 struct ctl_table *ctl_table;
85 unsigned int *ctl_table_users;
a999e683
PM
86#ifdef CONFIG_NF_CONNTRACK_PROC_COMPAT
87 struct ctl_table_header *ctl_compat_table_header;
88 struct ctl_table *ctl_compat_table;
89#endif
90#endif
ffaa9c10
PM
91 /* Protocol name */
92 const char *name;
d62f9ed4 93
9fb9cbb1
YK
94 /* Module (if any) which this is connected to. */
95 struct module *me;
96};
97
9d2493f8 98/* Existing built-in generic protocol */
605dcad6 99extern struct nf_conntrack_l4proto nf_conntrack_l4proto_generic;
9fb9cbb1
YK
100
101#define MAX_NF_CT_PROTO 256
9fb9cbb1 102
605dcad6
MJ
103extern struct nf_conntrack_l4proto *
104__nf_ct_l4proto_find(u_int16_t l3proto, u_int8_t l4proto);
c1d10adb 105
9fb9cbb1 106/* Protocol registration. */
605dcad6 107extern int nf_conntrack_l4proto_register(struct nf_conntrack_l4proto *proto);
fe3eb20c 108extern void nf_conntrack_l4proto_unregister(struct nf_conntrack_l4proto *proto);
9fb9cbb1 109
c1d10adb 110/* Generic netlink helpers */
fdf70832 111extern int nf_ct_port_tuple_to_nlattr(struct sk_buff *skb,
c1d10adb 112 const struct nf_conntrack_tuple *tuple);
fdf70832 113extern int nf_ct_port_nlattr_to_tuple(struct nlattr *tb[],
c1d10adb 114 struct nf_conntrack_tuple *t);
5c0de29d 115extern int nf_ct_port_nlattr_tuple_size(void);
f73e924c 116extern const struct nla_policy nf_ct_port_nla_policy[];
c1d10adb 117
9fb9cbb1
YK
118#ifdef CONFIG_SYSCTL
119#ifdef DEBUG_INVALID_PACKETS
c2a2c7e0
AD
120#define LOG_INVALID(net, proto) \
121 ((net)->ct.sysctl_log_invalid == (proto) || \
122 (net)->ct.sysctl_log_invalid == IPPROTO_RAW)
9fb9cbb1 123#else
c2a2c7e0
AD
124#define LOG_INVALID(net, proto) \
125 (((net)->ct.sysctl_log_invalid == (proto) || \
126 (net)->ct.sysctl_log_invalid == IPPROTO_RAW) \
9fb9cbb1
YK
127 && net_ratelimit())
128#endif
129#else
65f233fb 130static inline int LOG_INVALID(struct net *net, int proto) { return 0; }
9fb9cbb1
YK
131#endif /* CONFIG_SYSCTL */
132
133#endif /*_NF_CONNTRACK_PROTOCOL_H*/