| 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | /* |
| 3 | * This header is used to share core functionality between the |
| 4 | * standalone connection tracking module, and the compatibility layer's use |
| 5 | * of connection tracking. |
| 6 | * |
| 7 | * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp> |
| 8 | * - generalize L3 protocol dependent part. |
| 9 | * |
| 10 | * Derived from include/linux/netfiter_ipv4/ip_conntrack_core.h |
| 11 | */ |
| 12 | |
| 13 | #ifndef _NF_CONNTRACK_CORE_H |
| 14 | #define _NF_CONNTRACK_CORE_H |
| 15 | |
| 16 | #include <linux/netfilter.h> |
| 17 | #include <net/netfilter/nf_conntrack.h> |
| 18 | #include <net/netfilter/nf_conntrack_ecache.h> |
| 19 | #include <net/netfilter/nf_conntrack_l4proto.h> |
| 20 | |
| 21 | /* This header is used to share core functionality between the |
| 22 | standalone connection tracking module, and the compatibility layer's use |
| 23 | of connection tracking. */ |
| 24 | |
| 25 | unsigned int nf_conntrack_in(struct sk_buff *skb, |
| 26 | const struct nf_hook_state *state); |
| 27 | |
| 28 | int nf_conntrack_init_net(struct net *net); |
| 29 | void nf_conntrack_cleanup_net(struct net *net); |
| 30 | void nf_conntrack_cleanup_net_list(struct list_head *net_exit_list); |
| 31 | |
| 32 | void nf_conntrack_proto_pernet_init(struct net *net); |
| 33 | |
| 34 | int nf_conntrack_proto_init(void); |
| 35 | void nf_conntrack_proto_fini(void); |
| 36 | |
| 37 | int nf_conntrack_init_start(void); |
| 38 | void nf_conntrack_cleanup_start(void); |
| 39 | |
| 40 | void nf_conntrack_init_end(void); |
| 41 | void nf_conntrack_cleanup_end(void); |
| 42 | |
| 43 | bool nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse, |
| 44 | const struct nf_conntrack_tuple *orig); |
| 45 | |
| 46 | /* Find a connection corresponding to a tuple. */ |
| 47 | struct nf_conntrack_tuple_hash * |
| 48 | nf_conntrack_find_get(struct net *net, |
| 49 | const struct nf_conntrack_zone *zone, |
| 50 | const struct nf_conntrack_tuple *tuple); |
| 51 | |
| 52 | int __nf_conntrack_confirm(struct sk_buff *skb); |
| 53 | |
| 54 | /* Confirm a connection: returns NF_DROP if packet must be dropped. */ |
| 55 | static inline int nf_conntrack_confirm(struct sk_buff *skb) |
| 56 | { |
| 57 | struct nf_conn *ct = (struct nf_conn *)skb_nfct(skb); |
| 58 | int ret = NF_ACCEPT; |
| 59 | |
| 60 | if (ct) { |
| 61 | if (!nf_ct_is_confirmed(ct)) { |
| 62 | ret = __nf_conntrack_confirm(skb); |
| 63 | |
| 64 | if (ret == NF_ACCEPT) |
| 65 | ct = (struct nf_conn *)skb_nfct(skb); |
| 66 | } |
| 67 | |
| 68 | if (ret == NF_ACCEPT && nf_ct_ecache_exist(ct)) |
| 69 | nf_ct_deliver_cached_events(ct); |
| 70 | } |
| 71 | return ret; |
| 72 | } |
| 73 | |
| 74 | unsigned int nf_confirm(void *priv, struct sk_buff *skb, const struct nf_hook_state *state); |
| 75 | |
| 76 | void print_tuple(struct seq_file *s, const struct nf_conntrack_tuple *tuple, |
| 77 | const struct nf_conntrack_l4proto *proto); |
| 78 | |
| 79 | #define CONNTRACK_LOCKS 1024 |
| 80 | |
| 81 | extern spinlock_t nf_conntrack_locks[CONNTRACK_LOCKS]; |
| 82 | void nf_conntrack_lock(spinlock_t *lock); |
| 83 | |
| 84 | extern spinlock_t nf_conntrack_expect_lock; |
| 85 | |
| 86 | /* ctnetlink code shared by both ctnetlink and nf_conntrack_bpf */ |
| 87 | |
| 88 | static inline void __nf_ct_set_timeout(struct nf_conn *ct, u64 timeout) |
| 89 | { |
| 90 | if (timeout > INT_MAX) |
| 91 | timeout = INT_MAX; |
| 92 | |
| 93 | if (nf_ct_is_confirmed(ct)) |
| 94 | WRITE_ONCE(ct->timeout, nfct_time_stamp + (u32)timeout); |
| 95 | else |
| 96 | ct->timeout = (u32)timeout; |
| 97 | } |
| 98 | |
| 99 | int __nf_ct_change_timeout(struct nf_conn *ct, u64 cta_timeout); |
| 100 | void __nf_ct_change_status(struct nf_conn *ct, unsigned long on, unsigned long off); |
| 101 | int nf_ct_change_status_common(struct nf_conn *ct, unsigned int status); |
| 102 | |
| 103 | #endif /* _NF_CONNTRACK_CORE_H */ |
| 104 | |