]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/net/netfilter/nf_conntrack_l4proto.h
netfilter: factorize ifname_compare()
[mirror_ubuntu-bionic-kernel.git] / include / net / netfilter / nf_conntrack_l4proto.h
CommitLineData
9fb9cbb1 1/*
605dcad6 2 * Header for use in defining a given L4 protocol for connection tracking.
9fb9cbb1
YK
3 *
4 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
5 * - generalized L3 protocol dependent part.
6 *
7 * Derived from include/linux/netfiter_ipv4/ip_conntrack_protcol.h
8 */
9
605dcad6
MJ
10#ifndef _NF_CONNTRACK_L4PROTO_H
11#define _NF_CONNTRACK_L4PROTO_H
df6fb868 12#include <linux/netlink.h>
f73e924c 13#include <net/netlink.h>
9fb9cbb1
YK
14#include <net/netfilter/nf_conntrack.h>
15
16struct seq_file;
17
605dcad6 18struct nf_conntrack_l4proto
9fb9cbb1 19{
9fb9cbb1
YK
20 /* L3 Protocol number. */
21 u_int16_t l3proto;
22
605dcad6
MJ
23 /* L4 Protocol number. */
24 u_int8_t l4proto;
9fb9cbb1 25
9fb9cbb1
YK
26 /* Try to fill in the third arg: dataoff is offset past network protocol
27 hdr. Return true if possible. */
09f263cd
JE
28 bool (*pkt_to_tuple)(const struct sk_buff *skb, unsigned int dataoff,
29 struct nf_conntrack_tuple *tuple);
9fb9cbb1
YK
30
31 /* Invert the per-proto part of the tuple: ie. turn xmit into reply.
32 * Some packets can't be inverted: return 0 in that case.
33 */
09f263cd
JE
34 bool (*invert_tuple)(struct nf_conntrack_tuple *inverse,
35 const struct nf_conntrack_tuple *orig);
9fb9cbb1 36
9fb9cbb1 37 /* Returns verdict for packet, or -1 for invalid. */
c88130bc 38 int (*packet)(struct nf_conn *ct,
9fb9cbb1
YK
39 const struct sk_buff *skb,
40 unsigned int dataoff,
41 enum ip_conntrack_info ctinfo,
76108cea 42 u_int8_t pf,
9fb9cbb1
YK
43 unsigned int hooknum);
44
45 /* Called when a new connection for this protocol found;
46 * returns TRUE if it's OK. If so, packet() called next. */
09f263cd
JE
47 bool (*new)(struct nf_conn *ct, const struct sk_buff *skb,
48 unsigned int dataoff);
9fb9cbb1
YK
49
50 /* Called when a conntrack entry is destroyed */
c88130bc 51 void (*destroy)(struct nf_conn *ct);
9fb9cbb1 52
74c51a14 53 int (*error)(struct net *net, struct sk_buff *skb, unsigned int dataoff,
9fb9cbb1 54 enum ip_conntrack_info *ctinfo,
76108cea 55 u_int8_t pf, unsigned int hooknum);
9fb9cbb1 56
ffaa9c10
PM
57 /* Print out the per-protocol part of the tuple. Return like seq_* */
58 int (*print_tuple)(struct seq_file *s,
59 const struct nf_conntrack_tuple *);
60
61 /* Print out the private part of the conntrack. */
62 int (*print_conntrack)(struct seq_file *s, const struct nf_conn *);
63
c1d10adb 64 /* convert protoinfo to nfnetink attributes */
fdf70832 65 int (*to_nlattr)(struct sk_buff *skb, struct nlattr *nla,
c1d10adb
PNA
66 const struct nf_conn *ct);
67
68 /* convert nfnetlink attributes to protoinfo */
fdf70832 69 int (*from_nlattr)(struct nlattr *tb[], struct nf_conn *ct);
c1d10adb 70
fdf70832 71 int (*tuple_to_nlattr)(struct sk_buff *skb,
c1d10adb 72 const struct nf_conntrack_tuple *t);
fdf70832 73 int (*nlattr_to_tuple)(struct nlattr *tb[],
c1d10adb 74 struct nf_conntrack_tuple *t);
f73e924c 75 const struct nla_policy *nla_policy;
c1d10adb 76
d62f9ed4
PM
77#ifdef CONFIG_SYSCTL
78 struct ctl_table_header **ctl_table_header;
79 struct ctl_table *ctl_table;
80 unsigned int *ctl_table_users;
a999e683
PM
81#ifdef CONFIG_NF_CONNTRACK_PROC_COMPAT
82 struct ctl_table_header *ctl_compat_table_header;
83 struct ctl_table *ctl_compat_table;
84#endif
85#endif
ffaa9c10
PM
86 /* Protocol name */
87 const char *name;
d62f9ed4 88
9fb9cbb1
YK
89 /* Module (if any) which this is connected to. */
90 struct module *me;
91};
92
9d2493f8 93/* Existing built-in generic protocol */
605dcad6 94extern struct nf_conntrack_l4proto nf_conntrack_l4proto_generic;
9fb9cbb1
YK
95
96#define MAX_NF_CT_PROTO 256
9fb9cbb1 97
605dcad6
MJ
98extern struct nf_conntrack_l4proto *
99__nf_ct_l4proto_find(u_int16_t l3proto, u_int8_t l4proto);
c1d10adb 100
9fb9cbb1 101/* Protocol registration. */
605dcad6 102extern int nf_conntrack_l4proto_register(struct nf_conntrack_l4proto *proto);
fe3eb20c 103extern void nf_conntrack_l4proto_unregister(struct nf_conntrack_l4proto *proto);
9fb9cbb1 104
c1d10adb 105/* Generic netlink helpers */
fdf70832 106extern int nf_ct_port_tuple_to_nlattr(struct sk_buff *skb,
c1d10adb 107 const struct nf_conntrack_tuple *tuple);
fdf70832 108extern int nf_ct_port_nlattr_to_tuple(struct nlattr *tb[],
c1d10adb 109 struct nf_conntrack_tuple *t);
f73e924c 110extern const struct nla_policy nf_ct_port_nla_policy[];
c1d10adb 111
9fb9cbb1
YK
112#ifdef CONFIG_SYSCTL
113#ifdef DEBUG_INVALID_PACKETS
c2a2c7e0
AD
114#define LOG_INVALID(net, proto) \
115 ((net)->ct.sysctl_log_invalid == (proto) || \
116 (net)->ct.sysctl_log_invalid == IPPROTO_RAW)
9fb9cbb1 117#else
c2a2c7e0
AD
118#define LOG_INVALID(net, proto) \
119 (((net)->ct.sysctl_log_invalid == (proto) || \
120 (net)->ct.sysctl_log_invalid == IPPROTO_RAW) \
9fb9cbb1
YK
121 && net_ratelimit())
122#endif
123#else
65f233fb 124static inline int LOG_INVALID(struct net *net, int proto) { return 0; }
9fb9cbb1
YK
125#endif /* CONFIG_SYSCTL */
126
127#endif /*_NF_CONNTRACK_PROTOCOL_H*/