netfilter: allow early drop of assured conntracks
[linux-2.6-block.git] / include / net / netfilter / nf_conntrack_l4proto.h
CommitLineData
9fb9cbb1 1/*
605dcad6 2 * Header for use in defining a given L4 protocol for connection tracking.
9fb9cbb1
YK
3 *
4 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
5 * - generalized L3 protocol dependent part.
6 *
7 * Derived from include/linux/netfiter_ipv4/ip_conntrack_protcol.h
8 */
9
605dcad6
MJ
10#ifndef _NF_CONNTRACK_L4PROTO_H
11#define _NF_CONNTRACK_L4PROTO_H
df6fb868 12#include <linux/netlink.h>
f73e924c 13#include <net/netlink.h>
9fb9cbb1 14#include <net/netfilter/nf_conntrack.h>
2c352f44 15#include <net/netns/generic.h>
9fb9cbb1
YK
16
17struct seq_file;
18
fd2c3ef7 19struct nf_conntrack_l4proto {
9fb9cbb1
YK
20 /* L3 Protocol number. */
21 u_int16_t l3proto;
22
605dcad6
MJ
23 /* L4 Protocol number. */
24 u_int8_t l4proto;
9fb9cbb1 25
71d8c47f
PNA
26 /* Resolve clashes on insertion races. */
27 bool allow_clash;
28
9fb9cbb1
YK
29 /* Try to fill in the third arg: dataoff is offset past network protocol
30 hdr. Return true if possible. */
09f263cd 31 bool (*pkt_to_tuple)(const struct sk_buff *skb, unsigned int dataoff,
a31f1adc 32 struct net *net, struct nf_conntrack_tuple *tuple);
9fb9cbb1
YK
33
34 /* Invert the per-proto part of the tuple: ie. turn xmit into reply.
35 * Some packets can't be inverted: return 0 in that case.
36 */
09f263cd
JE
37 bool (*invert_tuple)(struct nf_conntrack_tuple *inverse,
38 const struct nf_conntrack_tuple *orig);
9fb9cbb1 39
9fb9cbb1 40 /* Returns verdict for packet, or -1 for invalid. */
c88130bc 41 int (*packet)(struct nf_conn *ct,
9fb9cbb1
YK
42 const struct sk_buff *skb,
43 unsigned int dataoff,
44 enum ip_conntrack_info ctinfo,
76108cea 45 u_int8_t pf,
2c8503f5
PNA
46 unsigned int hooknum,
47 unsigned int *timeouts);
9fb9cbb1
YK
48
49 /* Called when a new connection for this protocol found;
50 * returns TRUE if it's OK. If so, packet() called next. */
09f263cd 51 bool (*new)(struct nf_conn *ct, const struct sk_buff *skb,
2c8503f5 52 unsigned int dataoff, unsigned int *timeouts);
9fb9cbb1
YK
53
54 /* Called when a conntrack entry is destroyed */
c88130bc 55 void (*destroy)(struct nf_conn *ct);
9fb9cbb1 56
8fea97ec 57 int (*error)(struct net *net, struct nf_conn *tmpl, struct sk_buff *skb,
11df4b76 58 unsigned int dataoff,
76108cea 59 u_int8_t pf, unsigned int hooknum);
9fb9cbb1 60
c6dd940b
FW
61 /* called by gc worker if table is full */
62 bool (*can_early_drop)(const struct nf_conn *ct);
63
ffaa9c10 64 /* Print out the per-protocol part of the tuple. Return like seq_* */
824f1fbe
JP
65 void (*print_tuple)(struct seq_file *s,
66 const struct nf_conntrack_tuple *);
ffaa9c10
PM
67
68 /* Print out the private part of the conntrack. */
37246a58 69 void (*print_conntrack)(struct seq_file *s, struct nf_conn *);
ffaa9c10 70
2c8503f5
PNA
71 /* Return the array of timeouts for this protocol. */
72 unsigned int *(*get_timeouts)(struct net *net);
73
c1d10adb 74 /* convert protoinfo to nfnetink attributes */
fdf70832 75 int (*to_nlattr)(struct sk_buff *skb, struct nlattr *nla,
440f0d58 76 struct nf_conn *ct);
d0dba725
HE
77 /* Calculate protoinfo nlattr size */
78 int (*nlattr_size)(void);
c1d10adb
PNA
79
80 /* convert nfnetlink attributes to protoinfo */
fdf70832 81 int (*from_nlattr)(struct nlattr *tb[], struct nf_conn *ct);
c1d10adb 82
fdf70832 83 int (*tuple_to_nlattr)(struct sk_buff *skb,
c1d10adb 84 const struct nf_conntrack_tuple *t);
d0dba725
HE
85 /* Calculate tuple nlattr size */
86 int (*nlattr_tuple_size)(void);
fdf70832 87 int (*nlattr_to_tuple)(struct nlattr *tb[],
c1d10adb 88 struct nf_conntrack_tuple *t);
f73e924c 89 const struct nla_policy *nla_policy;
c1d10adb 90
d0dba725
HE
91 size_t nla_size;
92
50978462
PNA
93#if IS_ENABLED(CONFIG_NF_CT_NETLINK_TIMEOUT)
94 struct {
95 size_t obj_size;
8264deb8
G
96 int (*nlattr_to_obj)(struct nlattr *tb[],
97 struct net *net, void *data);
50978462
PNA
98 int (*obj_to_nlattr)(struct sk_buff *skb, const void *data);
99
100 unsigned int nlattr_max;
101 const struct nla_policy *nla_policy;
102 } ctnl_timeout;
a999e683 103#endif
c7d03a00 104 unsigned int *net_id;
2c352f44 105 /* Init l4proto pernet data */
f1caad27 106 int (*init_net)(struct net *net, u_int16_t proto);
2c352f44 107
08911475
PNA
108 /* Return the per-net protocol part. */
109 struct nf_proto_net *(*get_net_proto)(struct net *net);
110
ffaa9c10
PM
111 /* Protocol name */
112 const char *name;
d62f9ed4 113
9fb9cbb1
YK
114 /* Module (if any) which this is connected to. */
115 struct module *me;
116};
117
9d2493f8 118/* Existing built-in generic protocol */
605dcad6 119extern struct nf_conntrack_l4proto nf_conntrack_l4proto_generic;
9fb9cbb1
YK
120
121#define MAX_NF_CT_PROTO 256
9fb9cbb1 122
4e77be46
JP
123struct nf_conntrack_l4proto *__nf_ct_l4proto_find(u_int16_t l3proto,
124 u_int8_t l4proto);
c1d10adb 125
4e77be46
JP
126struct nf_conntrack_l4proto *nf_ct_l4proto_find_get(u_int16_t l3proto,
127 u_int8_t l4proto);
128void nf_ct_l4proto_put(struct nf_conntrack_l4proto *p);
c1ebd7df 129
c296bb4d 130/* Protocol pernet registration. */
0e54d217
DC
131int nf_ct_l4proto_pernet_register_one(struct net *net,
132 struct nf_conntrack_l4proto *proto);
133void nf_ct_l4proto_pernet_unregister_one(struct net *net,
134 struct nf_conntrack_l4proto *proto);
4e77be46 135int nf_ct_l4proto_pernet_register(struct net *net,
0e54d217
DC
136 struct nf_conntrack_l4proto *proto[],
137 unsigned int num_proto);
4e77be46 138void nf_ct_l4proto_pernet_unregister(struct net *net,
0e54d217
DC
139 struct nf_conntrack_l4proto *proto[],
140 unsigned int num_proto);
9fb9cbb1 141
c296bb4d 142/* Protocol global registration. */
0e54d217
DC
143int nf_ct_l4proto_register_one(struct nf_conntrack_l4proto *proto);
144void nf_ct_l4proto_unregister_one(struct nf_conntrack_l4proto *proto);
145int nf_ct_l4proto_register(struct nf_conntrack_l4proto *proto[],
146 unsigned int num_proto);
147void nf_ct_l4proto_unregister(struct nf_conntrack_l4proto *proto[],
148 unsigned int num_proto);
c296bb4d 149
c1d10adb 150/* Generic netlink helpers */
4e77be46
JP
151int nf_ct_port_tuple_to_nlattr(struct sk_buff *skb,
152 const struct nf_conntrack_tuple *tuple);
153int nf_ct_port_nlattr_to_tuple(struct nlattr *tb[],
154 struct nf_conntrack_tuple *t);
155int nf_ct_port_nlattr_tuple_size(void);
f73e924c 156extern const struct nla_policy nf_ct_port_nla_policy[];
c1d10adb 157
9fb9cbb1 158#ifdef CONFIG_SYSCTL
c2a2c7e0
AD
159#define LOG_INVALID(net, proto) \
160 ((net)->ct.sysctl_log_invalid == (proto) || \
161 (net)->ct.sysctl_log_invalid == IPPROTO_RAW)
9fb9cbb1 162#else
65f233fb 163static inline int LOG_INVALID(struct net *net, int proto) { return 0; }
9fb9cbb1
YK
164#endif /* CONFIG_SYSCTL */
165
166#endif /*_NF_CONNTRACK_PROTOCOL_H*/