19fb9cbb1SYasuyuki Kozakai /* 29fb9cbb1SYasuyuki Kozakai * Connection state tracking for netfilter. This is separated from, 39fb9cbb1SYasuyuki Kozakai * but required by, the (future) NAT layer; it can also be used by an iptables 49fb9cbb1SYasuyuki Kozakai * extension. 59fb9cbb1SYasuyuki Kozakai * 69fb9cbb1SYasuyuki Kozakai * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp> 79fb9cbb1SYasuyuki Kozakai * - generalize L3 protocol dependent part. 89fb9cbb1SYasuyuki Kozakai * 99fb9cbb1SYasuyuki Kozakai * Derived from include/linux/netfiter_ipv4/ip_conntrack.h 109fb9cbb1SYasuyuki Kozakai */ 119fb9cbb1SYasuyuki Kozakai 129fb9cbb1SYasuyuki Kozakai #ifndef _NF_CONNTRACK_H 139fb9cbb1SYasuyuki Kozakai #define _NF_CONNTRACK_H 149fb9cbb1SYasuyuki Kozakai 159fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_common.h> 169fb9cbb1SYasuyuki Kozakai 179fb9cbb1SYasuyuki Kozakai #ifdef __KERNEL__ 189fb9cbb1SYasuyuki Kozakai #include <linux/bitops.h> 199fb9cbb1SYasuyuki Kozakai #include <linux/compiler.h> 209fb9cbb1SYasuyuki Kozakai #include <asm/atomic.h> 219fb9cbb1SYasuyuki Kozakai 229fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_tcp.h> 239fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_sctp.h> 24f09943feSPatrick McHardy #include <linux/netfilter/nf_conntrack_proto_gre.h> 259fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv4/nf_conntrack_icmp.h> 269fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv6/nf_conntrack_icmpv6.h> 279fb9cbb1SYasuyuki Kozakai 289fb9cbb1SYasuyuki Kozakai #include <net/netfilter/nf_conntrack_tuple.h> 299fb9cbb1SYasuyuki Kozakai 309fb9cbb1SYasuyuki Kozakai /* per conntrack: protocol private data */ 319fb9cbb1SYasuyuki Kozakai union nf_conntrack_proto { 329fb9cbb1SYasuyuki Kozakai /* insert conntrack proto private data here */ 339fb9cbb1SYasuyuki Kozakai struct ip_ct_sctp sctp; 349fb9cbb1SYasuyuki Kozakai struct ip_ct_tcp tcp; 359fb9cbb1SYasuyuki Kozakai struct ip_ct_icmp icmp; 369fb9cbb1SYasuyuki Kozakai struct nf_ct_icmpv6 icmpv6; 37f09943feSPatrick McHardy struct nf_ct_gre gre; 389fb9cbb1SYasuyuki Kozakai }; 399fb9cbb1SYasuyuki Kozakai 409fb9cbb1SYasuyuki Kozakai union nf_conntrack_expect_proto { 419fb9cbb1SYasuyuki Kozakai /* insert expect proto private data here */ 429fb9cbb1SYasuyuki Kozakai }; 439fb9cbb1SYasuyuki Kozakai 449fb9cbb1SYasuyuki Kozakai /* Add protocol helper include file here */ 459fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_ftp.h> 46f09943feSPatrick McHardy #include <linux/netfilter/nf_conntrack_pptp.h> 47f587de0eSPatrick McHardy #include <linux/netfilter/nf_conntrack_h323.h> 489fb9cbb1SYasuyuki Kozakai 499fb9cbb1SYasuyuki Kozakai /* per conntrack: application helper private data */ 509fb9cbb1SYasuyuki Kozakai union nf_conntrack_help { 519fb9cbb1SYasuyuki Kozakai /* insert conntrack helper private data (master) here */ 5255a73324SJozsef Kadlecsik struct nf_ct_ftp_master ct_ftp_info; 53f09943feSPatrick McHardy struct nf_ct_pptp_master ct_pptp_info; 54f587de0eSPatrick McHardy struct nf_ct_h323_master ct_h323_info; 559fb9cbb1SYasuyuki Kozakai }; 569fb9cbb1SYasuyuki Kozakai 579fb9cbb1SYasuyuki Kozakai #include <linux/types.h> 589fb9cbb1SYasuyuki Kozakai #include <linux/skbuff.h> 599fb9cbb1SYasuyuki Kozakai 609fb9cbb1SYasuyuki Kozakai #ifdef CONFIG_NETFILTER_DEBUG 619fb9cbb1SYasuyuki Kozakai #define NF_CT_ASSERT(x) \ 629fb9cbb1SYasuyuki Kozakai do { \ 639fb9cbb1SYasuyuki Kozakai if (!(x)) \ 649fb9cbb1SYasuyuki Kozakai /* Wooah! I'm tripping my conntrack in a frenzy of \ 659fb9cbb1SYasuyuki Kozakai netplay... */ \ 669fb9cbb1SYasuyuki Kozakai printk("NF_CT_ASSERT: %s:%i(%s)\n", \ 679fb9cbb1SYasuyuki Kozakai __FILE__, __LINE__, __FUNCTION__); \ 689fb9cbb1SYasuyuki Kozakai } while(0) 699fb9cbb1SYasuyuki Kozakai #else 709fb9cbb1SYasuyuki Kozakai #define NF_CT_ASSERT(x) 719fb9cbb1SYasuyuki Kozakai #endif 729fb9cbb1SYasuyuki Kozakai 739fb9cbb1SYasuyuki Kozakai struct nf_conntrack_helper; 749fb9cbb1SYasuyuki Kozakai 75dc808fe2SHarald Welte /* nf_conn feature for connections that have a helper */ 76dc808fe2SHarald Welte struct nf_conn_help { 77dc808fe2SHarald Welte /* Helper. if any */ 78dc808fe2SHarald Welte struct nf_conntrack_helper *helper; 79dc808fe2SHarald Welte 80dc808fe2SHarald Welte union nf_conntrack_help help; 81dc808fe2SHarald Welte 82dc808fe2SHarald Welte /* Current number of expected connections */ 83dc808fe2SHarald Welte unsigned int expecting; 84dc808fe2SHarald Welte }; 85dc808fe2SHarald Welte 86dc808fe2SHarald Welte 879fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv4/nf_conntrack_ipv4.h> 88f8eb24a8SPatrick McHardy #include <net/netfilter/ipv6/nf_conntrack_ipv6.h> 89f8eb24a8SPatrick McHardy 909fb9cbb1SYasuyuki Kozakai struct nf_conn 919fb9cbb1SYasuyuki Kozakai { 929fb9cbb1SYasuyuki Kozakai /* Usage count in here is 1 for hash table/destruct timer, 1 per skb, 939fb9cbb1SYasuyuki Kozakai plus 1 for any connection(s) we are `master' for */ 949fb9cbb1SYasuyuki Kozakai struct nf_conntrack ct_general; 959fb9cbb1SYasuyuki Kozakai 969fb9cbb1SYasuyuki Kozakai /* XXX should I move this to the tail ? - Y.K */ 979fb9cbb1SYasuyuki Kozakai /* These are my tuples; original and reply */ 989fb9cbb1SYasuyuki Kozakai struct nf_conntrack_tuple_hash tuplehash[IP_CT_DIR_MAX]; 999fb9cbb1SYasuyuki Kozakai 1009fb9cbb1SYasuyuki Kozakai /* Have we seen traffic both ways yet? (bitset) */ 1019fb9cbb1SYasuyuki Kozakai unsigned long status; 1029fb9cbb1SYasuyuki Kozakai 103dc808fe2SHarald Welte /* If we were expected by an expectation, this will be it */ 104dc808fe2SHarald Welte struct nf_conn *master; 105dc808fe2SHarald Welte 1069fb9cbb1SYasuyuki Kozakai /* Timer function; drops refcnt when it goes off. */ 1079fb9cbb1SYasuyuki Kozakai struct timer_list timeout; 1089fb9cbb1SYasuyuki Kozakai 1099fb9cbb1SYasuyuki Kozakai #ifdef CONFIG_NF_CT_ACCT 1109fb9cbb1SYasuyuki Kozakai /* Accounting Information (same cache line as other written members) */ 1119fb9cbb1SYasuyuki Kozakai struct ip_conntrack_counter counters[IP_CT_DIR_MAX]; 1129fb9cbb1SYasuyuki Kozakai #endif 1139fb9cbb1SYasuyuki Kozakai 114c1d10adbSPablo Neira Ayuso /* Unique ID that identifies this conntrack*/ 115c1d10adbSPablo Neira Ayuso unsigned int id; 116c1d10adbSPablo Neira Ayuso 1179fb9cbb1SYasuyuki Kozakai /* features - nat, helper, ... used by allocating system */ 1189fb9cbb1SYasuyuki Kozakai u_int32_t features; 1199fb9cbb1SYasuyuki Kozakai 1209fb9cbb1SYasuyuki Kozakai #if defined(CONFIG_NF_CONNTRACK_MARK) 1219fb9cbb1SYasuyuki Kozakai u_int32_t mark; 1229fb9cbb1SYasuyuki Kozakai #endif 1239fb9cbb1SYasuyuki Kozakai 1247c9728c3SJames Morris #ifdef CONFIG_NF_CONNTRACK_SECMARK 1257c9728c3SJames Morris u_int32_t secmark; 1267c9728c3SJames Morris #endif 1277c9728c3SJames Morris 128dc808fe2SHarald Welte /* Storage reserved for other modules: */ 129dc808fe2SHarald Welte union nf_conntrack_proto proto; 1309fb9cbb1SYasuyuki Kozakai 131dc808fe2SHarald Welte /* features dynamically at the end: helper, nat (both optional) */ 132dc808fe2SHarald Welte char data[0]; 1339fb9cbb1SYasuyuki Kozakai }; 1349fb9cbb1SYasuyuki Kozakai 1359fb9cbb1SYasuyuki Kozakai static inline struct nf_conn * 1369fb9cbb1SYasuyuki Kozakai nf_ct_tuplehash_to_ctrack(const struct nf_conntrack_tuple_hash *hash) 1379fb9cbb1SYasuyuki Kozakai { 1389fb9cbb1SYasuyuki Kozakai return container_of(hash, struct nf_conn, 1399fb9cbb1SYasuyuki Kozakai tuplehash[hash->tuple.dst.dir]); 1409fb9cbb1SYasuyuki Kozakai } 1419fb9cbb1SYasuyuki Kozakai 1429fb9cbb1SYasuyuki Kozakai /* get master conntrack via master expectation */ 1439fb9cbb1SYasuyuki Kozakai #define master_ct(conntr) (conntr->master) 1449fb9cbb1SYasuyuki Kozakai 1459fb9cbb1SYasuyuki Kozakai /* Alter reply tuple (maybe alter helper). */ 1469fb9cbb1SYasuyuki Kozakai extern void 1479fb9cbb1SYasuyuki Kozakai nf_conntrack_alter_reply(struct nf_conn *conntrack, 1489fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *newreply); 1499fb9cbb1SYasuyuki Kozakai 1509fb9cbb1SYasuyuki Kozakai /* Is this tuple taken? (ignoring any belonging to the given 1519fb9cbb1SYasuyuki Kozakai conntrack). */ 1529fb9cbb1SYasuyuki Kozakai extern int 1539fb9cbb1SYasuyuki Kozakai nf_conntrack_tuple_taken(const struct nf_conntrack_tuple *tuple, 1549fb9cbb1SYasuyuki Kozakai const struct nf_conn *ignored_conntrack); 1559fb9cbb1SYasuyuki Kozakai 1569fb9cbb1SYasuyuki Kozakai /* Return conntrack_info and tuple hash for given skb. */ 1579fb9cbb1SYasuyuki Kozakai static inline struct nf_conn * 1589fb9cbb1SYasuyuki Kozakai nf_ct_get(const struct sk_buff *skb, enum ip_conntrack_info *ctinfo) 1599fb9cbb1SYasuyuki Kozakai { 1609fb9cbb1SYasuyuki Kozakai *ctinfo = skb->nfctinfo; 1619fb9cbb1SYasuyuki Kozakai return (struct nf_conn *)skb->nfct; 1629fb9cbb1SYasuyuki Kozakai } 1639fb9cbb1SYasuyuki Kozakai 1649fb9cbb1SYasuyuki Kozakai /* decrement reference count on a conntrack */ 1659fb9cbb1SYasuyuki Kozakai static inline void nf_ct_put(struct nf_conn *ct) 1669fb9cbb1SYasuyuki Kozakai { 1679fb9cbb1SYasuyuki Kozakai NF_CT_ASSERT(ct); 1689fb9cbb1SYasuyuki Kozakai nf_conntrack_put(&ct->ct_general); 1699fb9cbb1SYasuyuki Kozakai } 1709fb9cbb1SYasuyuki Kozakai 171b9f78f9fSPablo Neira Ayuso /* Protocol module loading */ 172b9f78f9fSPablo Neira Ayuso extern int nf_ct_l3proto_try_module_get(unsigned short l3proto); 173b9f78f9fSPablo Neira Ayuso extern void nf_ct_l3proto_module_put(unsigned short l3proto); 174b9f78f9fSPablo Neira Ayuso 175c1d10adbSPablo Neira Ayuso extern struct nf_conntrack_tuple_hash * 176c1d10adbSPablo Neira Ayuso __nf_conntrack_find(const struct nf_conntrack_tuple *tuple, 177c1d10adbSPablo Neira Ayuso const struct nf_conn *ignored_conntrack); 178c1d10adbSPablo Neira Ayuso 179c1d10adbSPablo Neira Ayuso extern void nf_conntrack_hash_insert(struct nf_conn *ct); 180c1d10adbSPablo Neira Ayuso 181c1d10adbSPablo Neira Ayuso extern void nf_conntrack_flush(void); 182c1d10adbSPablo Neira Ayuso 183c1d10adbSPablo Neira Ayuso extern struct nf_conntrack_helper * 184c1d10adbSPablo Neira Ayuso nf_ct_helper_find_get( const struct nf_conntrack_tuple *tuple); 185c1d10adbSPablo Neira Ayuso extern void nf_ct_helper_put(struct nf_conntrack_helper *helper); 186c1d10adbSPablo Neira Ayuso 187c1d10adbSPablo Neira Ayuso extern struct nf_conntrack_helper * 188c1d10adbSPablo Neira Ayuso __nf_conntrack_helper_find_byname(const char *name); 189c1d10adbSPablo Neira Ayuso 1909fb9cbb1SYasuyuki Kozakai extern int nf_ct_invert_tuplepr(struct nf_conntrack_tuple *inverse, 1919fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *orig); 1929fb9cbb1SYasuyuki Kozakai 1939fb9cbb1SYasuyuki Kozakai extern void __nf_ct_refresh_acct(struct nf_conn *ct, 1949fb9cbb1SYasuyuki Kozakai enum ip_conntrack_info ctinfo, 1959fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 1969fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies, 1979fb9cbb1SYasuyuki Kozakai int do_acct); 1989fb9cbb1SYasuyuki Kozakai 1999fb9cbb1SYasuyuki Kozakai /* Refresh conntrack for this many jiffies and do accounting */ 2009fb9cbb1SYasuyuki Kozakai static inline void nf_ct_refresh_acct(struct nf_conn *ct, 2019fb9cbb1SYasuyuki Kozakai enum ip_conntrack_info ctinfo, 2029fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 2039fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies) 2049fb9cbb1SYasuyuki Kozakai { 2059fb9cbb1SYasuyuki Kozakai __nf_ct_refresh_acct(ct, ctinfo, skb, extra_jiffies, 1); 2069fb9cbb1SYasuyuki Kozakai } 2079fb9cbb1SYasuyuki Kozakai 2089fb9cbb1SYasuyuki Kozakai /* Refresh conntrack for this many jiffies */ 2099fb9cbb1SYasuyuki Kozakai static inline void nf_ct_refresh(struct nf_conn *ct, 2109fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 2119fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies) 2129fb9cbb1SYasuyuki Kozakai { 2139fb9cbb1SYasuyuki Kozakai __nf_ct_refresh_acct(ct, 0, skb, extra_jiffies, 0); 2149fb9cbb1SYasuyuki Kozakai } 2159fb9cbb1SYasuyuki Kozakai 2169fb9cbb1SYasuyuki Kozakai /* These are for NAT. Icky. */ 2179fb9cbb1SYasuyuki Kozakai /* Update TCP window tracking data when NAT mangles the packet */ 2189fb9cbb1SYasuyuki Kozakai extern void nf_conntrack_tcp_update(struct sk_buff *skb, 2199fb9cbb1SYasuyuki Kozakai unsigned int dataoff, 2209fb9cbb1SYasuyuki Kozakai struct nf_conn *conntrack, 2219fb9cbb1SYasuyuki Kozakai int dir); 2229fb9cbb1SYasuyuki Kozakai 2239fb9cbb1SYasuyuki Kozakai /* Call me when a conntrack is destroyed. */ 2249fb9cbb1SYasuyuki Kozakai extern void (*nf_conntrack_destroyed)(struct nf_conn *conntrack); 2259fb9cbb1SYasuyuki Kozakai 2269fb9cbb1SYasuyuki Kozakai /* Fake conntrack entry for untracked connections */ 2279fb9cbb1SYasuyuki Kozakai extern struct nf_conn nf_conntrack_untracked; 2289fb9cbb1SYasuyuki Kozakai 2299fb9cbb1SYasuyuki Kozakai extern int nf_ct_no_defrag; 2309fb9cbb1SYasuyuki Kozakai 2319fb9cbb1SYasuyuki Kozakai /* Iterate over all conntracks: if iter returns true, it's deleted. */ 2329fb9cbb1SYasuyuki Kozakai extern void 2339fb9cbb1SYasuyuki Kozakai nf_ct_iterate_cleanup(int (*iter)(struct nf_conn *i, void *data), void *data); 2349fb9cbb1SYasuyuki Kozakai extern void nf_conntrack_free(struct nf_conn *ct); 2359fb9cbb1SYasuyuki Kozakai extern struct nf_conn * 2369fb9cbb1SYasuyuki Kozakai nf_conntrack_alloc(const struct nf_conntrack_tuple *orig, 2379fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *repl); 2389fb9cbb1SYasuyuki Kozakai 2399fb9cbb1SYasuyuki Kozakai /* It's confirmed if it is, or has been in the hash table. */ 2409fb9cbb1SYasuyuki Kozakai static inline int nf_ct_is_confirmed(struct nf_conn *ct) 2419fb9cbb1SYasuyuki Kozakai { 2429fb9cbb1SYasuyuki Kozakai return test_bit(IPS_CONFIRMED_BIT, &ct->status); 2439fb9cbb1SYasuyuki Kozakai } 2449fb9cbb1SYasuyuki Kozakai 2459fb9cbb1SYasuyuki Kozakai static inline int nf_ct_is_dying(struct nf_conn *ct) 2469fb9cbb1SYasuyuki Kozakai { 2479fb9cbb1SYasuyuki Kozakai return test_bit(IPS_DYING_BIT, &ct->status); 2489fb9cbb1SYasuyuki Kozakai } 2499fb9cbb1SYasuyuki Kozakai 2509fb9cbb1SYasuyuki Kozakai extern unsigned int nf_conntrack_htable_size; 25139a27a35SPatrick McHardy extern int nf_conntrack_checksum; 252f8eb24a8SPatrick McHardy extern atomic_t nf_conntrack_count; 253f8eb24a8SPatrick McHardy extern int nf_conntrack_max; 2549fb9cbb1SYasuyuki Kozakai 255f8eb24a8SPatrick McHardy DECLARE_PER_CPU(struct ip_conntrack_stat, nf_conntrack_stat); 2569fb9cbb1SYasuyuki Kozakai #define NF_CT_STAT_INC(count) (__get_cpu_var(nf_conntrack_stat).count++) 2579fb9cbb1SYasuyuki Kozakai 2589fb9cbb1SYasuyuki Kozakai /* no helper, no nat */ 2599fb9cbb1SYasuyuki Kozakai #define NF_CT_F_BASIC 0 2609fb9cbb1SYasuyuki Kozakai /* for helper */ 2619fb9cbb1SYasuyuki Kozakai #define NF_CT_F_HELP 1 2629fb9cbb1SYasuyuki Kozakai /* for nat. */ 2639fb9cbb1SYasuyuki Kozakai #define NF_CT_F_NAT 2 2649fb9cbb1SYasuyuki Kozakai #define NF_CT_F_NUM 4 2659fb9cbb1SYasuyuki Kozakai 2669fb9cbb1SYasuyuki Kozakai extern int 267dc808fe2SHarald Welte nf_conntrack_register_cache(u_int32_t features, const char *name, size_t size); 2689fb9cbb1SYasuyuki Kozakai extern void 2699fb9cbb1SYasuyuki Kozakai nf_conntrack_unregister_cache(u_int32_t features); 2709fb9cbb1SYasuyuki Kozakai 271dc808fe2SHarald Welte /* valid combinations: 272dc808fe2SHarald Welte * basic: nf_conn, nf_conn .. nf_conn_help 2735b1158e9SJozsef Kadlecsik * nat: nf_conn .. nf_conn_nat, nf_conn .. nf_conn_nat .. nf_conn help 274dc808fe2SHarald Welte */ 2755b1158e9SJozsef Kadlecsik #ifdef CONFIG_NF_NAT_NEEDED 2765b1158e9SJozsef Kadlecsik static inline struct nf_conn_nat *nfct_nat(const struct nf_conn *ct) 2775b1158e9SJozsef Kadlecsik { 2785b1158e9SJozsef Kadlecsik unsigned int offset = sizeof(struct nf_conn); 2795b1158e9SJozsef Kadlecsik 2805b1158e9SJozsef Kadlecsik if (!(ct->features & NF_CT_F_NAT)) 2815b1158e9SJozsef Kadlecsik return NULL; 2825b1158e9SJozsef Kadlecsik 2835b1158e9SJozsef Kadlecsik offset = ALIGN(offset, __alignof__(struct nf_conn_nat)); 2845b1158e9SJozsef Kadlecsik return (struct nf_conn_nat *) ((void *)ct + offset); 2855b1158e9SJozsef Kadlecsik } 2865b1158e9SJozsef Kadlecsik 2875b1158e9SJozsef Kadlecsik static inline struct nf_conn_help *nfct_help(const struct nf_conn *ct) 2885b1158e9SJozsef Kadlecsik { 2895b1158e9SJozsef Kadlecsik unsigned int offset = sizeof(struct nf_conn); 2905b1158e9SJozsef Kadlecsik 2915b1158e9SJozsef Kadlecsik if (!(ct->features & NF_CT_F_HELP)) 2925b1158e9SJozsef Kadlecsik return NULL; 2935b1158e9SJozsef Kadlecsik if (ct->features & NF_CT_F_NAT) { 2945b1158e9SJozsef Kadlecsik offset = ALIGN(offset, __alignof__(struct nf_conn_nat)); 2955b1158e9SJozsef Kadlecsik offset += sizeof(struct nf_conn_nat); 2965b1158e9SJozsef Kadlecsik } 2975b1158e9SJozsef Kadlecsik 2985b1158e9SJozsef Kadlecsik offset = ALIGN(offset, __alignof__(struct nf_conn_help)); 2995b1158e9SJozsef Kadlecsik return (struct nf_conn_help *) ((void *)ct + offset); 3005b1158e9SJozsef Kadlecsik } 3015b1158e9SJozsef Kadlecsik #else /* No NAT */ 302dc808fe2SHarald Welte static inline struct nf_conn_help *nfct_help(const struct nf_conn *ct) 303dc808fe2SHarald Welte { 304dc808fe2SHarald Welte unsigned int offset = sizeof(struct nf_conn); 305dc808fe2SHarald Welte 306dc808fe2SHarald Welte if (!(ct->features & NF_CT_F_HELP)) 307dc808fe2SHarald Welte return NULL; 308dc808fe2SHarald Welte 309f9aae958SPatrick McHardy offset = ALIGN(offset, __alignof__(struct nf_conn_help)); 310dc808fe2SHarald Welte return (struct nf_conn_help *) ((void *)ct + offset); 311dc808fe2SHarald Welte } 3125b1158e9SJozsef Kadlecsik #endif /* CONFIG_NF_NAT_NEEDED */ 3139fb9cbb1SYasuyuki Kozakai #endif /* __KERNEL__ */ 3149fb9cbb1SYasuyuki Kozakai #endif /* _NF_CONNTRACK_H */ 315