netfilter: nf_conntrack: pass timeout array to l4->new and l4->packet
[linux-2.6-block.git] / include / net / netfilter / nf_conntrack_l4proto.h
CommitLineData
9fb9cbb1 1/*
605dcad6 2 * Header for use in defining a given L4 protocol for connection tracking.
9fb9cbb1
YK
3 *
4 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
5 * - generalized L3 protocol dependent part.
6 *
7 * Derived from include/linux/netfiter_ipv4/ip_conntrack_protcol.h
8 */
9
605dcad6
MJ
10#ifndef _NF_CONNTRACK_L4PROTO_H
11#define _NF_CONNTRACK_L4PROTO_H
df6fb868 12#include <linux/netlink.h>
f73e924c 13#include <net/netlink.h>
9fb9cbb1
YK
14#include <net/netfilter/nf_conntrack.h>
15
16struct seq_file;
17
fd2c3ef7 18struct nf_conntrack_l4proto {
9fb9cbb1
YK
19 /* L3 Protocol number. */
20 u_int16_t l3proto;
21
605dcad6
MJ
22 /* L4 Protocol number. */
23 u_int8_t l4proto;
9fb9cbb1 24
9fb9cbb1
YK
25 /* Try to fill in the third arg: dataoff is offset past network protocol
26 hdr. Return true if possible. */
09f263cd
JE
27 bool (*pkt_to_tuple)(const struct sk_buff *skb, unsigned int dataoff,
28 struct nf_conntrack_tuple *tuple);
9fb9cbb1
YK
29
30 /* Invert the per-proto part of the tuple: ie. turn xmit into reply.
31 * Some packets can't be inverted: return 0 in that case.
32 */
09f263cd
JE
33 bool (*invert_tuple)(struct nf_conntrack_tuple *inverse,
34 const struct nf_conntrack_tuple *orig);
9fb9cbb1 35
9fb9cbb1 36 /* Returns verdict for packet, or -1 for invalid. */
c88130bc 37 int (*packet)(struct nf_conn *ct,
9fb9cbb1
YK
38 const struct sk_buff *skb,
39 unsigned int dataoff,
40 enum ip_conntrack_info ctinfo,
76108cea 41 u_int8_t pf,
2c8503f5
PNA
42 unsigned int hooknum,
43 unsigned int *timeouts);
9fb9cbb1
YK
44
45 /* Called when a new connection for this protocol found;
46 * returns TRUE if it's OK. If so, packet() called next. */
09f263cd 47 bool (*new)(struct nf_conn *ct, const struct sk_buff *skb,
2c8503f5 48 unsigned int dataoff, unsigned int *timeouts);
9fb9cbb1
YK
49
50 /* Called when a conntrack entry is destroyed */
c88130bc 51 void (*destroy)(struct nf_conn *ct);
9fb9cbb1 52
8fea97ec
PM
53 int (*error)(struct net *net, struct nf_conn *tmpl, struct sk_buff *skb,
54 unsigned int dataoff, enum ip_conntrack_info *ctinfo,
76108cea 55 u_int8_t pf, unsigned int hooknum);
9fb9cbb1 56
ffaa9c10
PM
57 /* Print out the per-protocol part of the tuple. Return like seq_* */
58 int (*print_tuple)(struct seq_file *s,
59 const struct nf_conntrack_tuple *);
60
61 /* Print out the private part of the conntrack. */
440f0d58 62 int (*print_conntrack)(struct seq_file *s, struct nf_conn *);
ffaa9c10 63
2c8503f5
PNA
64 /* Return the array of timeouts for this protocol. */
65 unsigned int *(*get_timeouts)(struct net *net);
66
c1d10adb 67 /* convert protoinfo to nfnetink attributes */
fdf70832 68 int (*to_nlattr)(struct sk_buff *skb, struct nlattr *nla,
440f0d58 69 struct nf_conn *ct);
d0dba725
HE
70 /* Calculate protoinfo nlattr size */
71 int (*nlattr_size)(void);
c1d10adb
PNA
72
73 /* convert nfnetlink attributes to protoinfo */
fdf70832 74 int (*from_nlattr)(struct nlattr *tb[], struct nf_conn *ct);
c1d10adb 75
fdf70832 76 int (*tuple_to_nlattr)(struct sk_buff *skb,
c1d10adb 77 const struct nf_conntrack_tuple *t);
d0dba725
HE
78 /* Calculate tuple nlattr size */
79 int (*nlattr_tuple_size)(void);
fdf70832 80 int (*nlattr_to_tuple)(struct nlattr *tb[],
c1d10adb 81 struct nf_conntrack_tuple *t);
f73e924c 82 const struct nla_policy *nla_policy;
c1d10adb 83
d0dba725
HE
84 size_t nla_size;
85
d62f9ed4
PM
86#ifdef CONFIG_SYSCTL
87 struct ctl_table_header **ctl_table_header;
88 struct ctl_table *ctl_table;
89 unsigned int *ctl_table_users;
a999e683
PM
90#ifdef CONFIG_NF_CONNTRACK_PROC_COMPAT
91 struct ctl_table_header *ctl_compat_table_header;
92 struct ctl_table *ctl_compat_table;
93#endif
94#endif
ffaa9c10
PM
95 /* Protocol name */
96 const char *name;
d62f9ed4 97
9fb9cbb1
YK
98 /* Module (if any) which this is connected to. */
99 struct module *me;
100};
101
9d2493f8 102/* Existing built-in generic protocol */
605dcad6 103extern struct nf_conntrack_l4proto nf_conntrack_l4proto_generic;
9fb9cbb1
YK
104
105#define MAX_NF_CT_PROTO 256
9fb9cbb1 106
605dcad6
MJ
107extern struct nf_conntrack_l4proto *
108__nf_ct_l4proto_find(u_int16_t l3proto, u_int8_t l4proto);
c1d10adb 109
9fb9cbb1 110/* Protocol registration. */
605dcad6 111extern int nf_conntrack_l4proto_register(struct nf_conntrack_l4proto *proto);
fe3eb20c 112extern void nf_conntrack_l4proto_unregister(struct nf_conntrack_l4proto *proto);
9fb9cbb1 113
c1d10adb 114/* Generic netlink helpers */
fdf70832 115extern int nf_ct_port_tuple_to_nlattr(struct sk_buff *skb,
c1d10adb 116 const struct nf_conntrack_tuple *tuple);
fdf70832 117extern int nf_ct_port_nlattr_to_tuple(struct nlattr *tb[],
c1d10adb 118 struct nf_conntrack_tuple *t);
5c0de29d 119extern int nf_ct_port_nlattr_tuple_size(void);
f73e924c 120extern const struct nla_policy nf_ct_port_nla_policy[];
c1d10adb 121
9fb9cbb1
YK
122#ifdef CONFIG_SYSCTL
123#ifdef DEBUG_INVALID_PACKETS
c2a2c7e0
AD
124#define LOG_INVALID(net, proto) \
125 ((net)->ct.sysctl_log_invalid == (proto) || \
126 (net)->ct.sysctl_log_invalid == IPPROTO_RAW)
9fb9cbb1 127#else
c2a2c7e0
AD
128#define LOG_INVALID(net, proto) \
129 (((net)->ct.sysctl_log_invalid == (proto) || \
130 (net)->ct.sysctl_log_invalid == IPPROTO_RAW) \
9fb9cbb1
YK
131 && net_ratelimit())
132#endif
133#else
65f233fb 134static inline int LOG_INVALID(struct net *net, int proto) { return 0; }
9fb9cbb1
YK
135#endif /* CONFIG_SYSCTL */
136
137#endif /*_NF_CONNTRACK_PROTOCOL_H*/