19fb9cbb1SYasuyuki Kozakai /* 29fb9cbb1SYasuyuki Kozakai * Connection state tracking for netfilter. This is separated from, 39fb9cbb1SYasuyuki Kozakai * but required by, the (future) NAT layer; it can also be used by an iptables 49fb9cbb1SYasuyuki Kozakai * extension. 59fb9cbb1SYasuyuki Kozakai * 69fb9cbb1SYasuyuki Kozakai * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp> 79fb9cbb1SYasuyuki Kozakai * - generalize L3 protocol dependent part. 89fb9cbb1SYasuyuki Kozakai * 99fb9cbb1SYasuyuki Kozakai * Derived from include/linux/netfiter_ipv4/ip_conntrack.h 109fb9cbb1SYasuyuki Kozakai */ 119fb9cbb1SYasuyuki Kozakai 129fb9cbb1SYasuyuki Kozakai #ifndef _NF_CONNTRACK_H 139fb9cbb1SYasuyuki Kozakai #define _NF_CONNTRACK_H 149fb9cbb1SYasuyuki Kozakai 159fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_common.h> 169fb9cbb1SYasuyuki Kozakai 179fb9cbb1SYasuyuki Kozakai #ifdef __KERNEL__ 189fb9cbb1SYasuyuki Kozakai #include <linux/bitops.h> 199fb9cbb1SYasuyuki Kozakai #include <linux/compiler.h> 209fb9cbb1SYasuyuki Kozakai #include <asm/atomic.h> 219fb9cbb1SYasuyuki Kozakai 229fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_tcp.h> 239fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_sctp.h> 24f09943feSPatrick McHardy #include <linux/netfilter/nf_conntrack_proto_gre.h> 259fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv4/nf_conntrack_icmp.h> 269fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv6/nf_conntrack_icmpv6.h> 279fb9cbb1SYasuyuki Kozakai 289fb9cbb1SYasuyuki Kozakai #include <net/netfilter/nf_conntrack_tuple.h> 299fb9cbb1SYasuyuki Kozakai 309fb9cbb1SYasuyuki Kozakai /* per conntrack: protocol private data */ 319fb9cbb1SYasuyuki Kozakai union nf_conntrack_proto { 329fb9cbb1SYasuyuki Kozakai /* insert conntrack proto private data here */ 339fb9cbb1SYasuyuki Kozakai struct ip_ct_sctp sctp; 349fb9cbb1SYasuyuki Kozakai struct ip_ct_tcp tcp; 359fb9cbb1SYasuyuki Kozakai struct ip_ct_icmp icmp; 369fb9cbb1SYasuyuki Kozakai struct nf_ct_icmpv6 icmpv6; 37f09943feSPatrick McHardy struct nf_ct_gre gre; 389fb9cbb1SYasuyuki Kozakai }; 399fb9cbb1SYasuyuki Kozakai 409fb9cbb1SYasuyuki Kozakai union nf_conntrack_expect_proto { 419fb9cbb1SYasuyuki Kozakai /* insert expect proto private data here */ 429fb9cbb1SYasuyuki Kozakai }; 439fb9cbb1SYasuyuki Kozakai 449fb9cbb1SYasuyuki Kozakai /* Add protocol helper include file here */ 459fb9cbb1SYasuyuki Kozakai #include <linux/netfilter/nf_conntrack_ftp.h> 46f09943feSPatrick McHardy #include <linux/netfilter/nf_conntrack_pptp.h> 47f587de0eSPatrick McHardy #include <linux/netfilter/nf_conntrack_h323.h> 486fecd198SMichal Schmidt #include <linux/netfilter/nf_conntrack_sane.h> 490f32a40fSPatrick McHardy #include <linux/netfilter/nf_conntrack_sip.h> 509fb9cbb1SYasuyuki Kozakai 519fb9cbb1SYasuyuki Kozakai /* per conntrack: application helper private data */ 529fb9cbb1SYasuyuki Kozakai union nf_conntrack_help { 539fb9cbb1SYasuyuki Kozakai /* insert conntrack helper private data (master) here */ 5455a73324SJozsef Kadlecsik struct nf_ct_ftp_master ct_ftp_info; 55f09943feSPatrick McHardy struct nf_ct_pptp_master ct_pptp_info; 56f587de0eSPatrick McHardy struct nf_ct_h323_master ct_h323_info; 576fecd198SMichal Schmidt struct nf_ct_sane_master ct_sane_info; 580f32a40fSPatrick McHardy struct nf_ct_sip_master ct_sip_info; 599fb9cbb1SYasuyuki Kozakai }; 609fb9cbb1SYasuyuki Kozakai 619fb9cbb1SYasuyuki Kozakai #include <linux/types.h> 629fb9cbb1SYasuyuki Kozakai #include <linux/skbuff.h> 63d7fe0f24SAl Viro #include <linux/timer.h> 649fb9cbb1SYasuyuki Kozakai 659fb9cbb1SYasuyuki Kozakai #ifdef CONFIG_NETFILTER_DEBUG 669fb9cbb1SYasuyuki Kozakai #define NF_CT_ASSERT(x) \ 679fb9cbb1SYasuyuki Kozakai do { \ 689fb9cbb1SYasuyuki Kozakai if (!(x)) \ 699fb9cbb1SYasuyuki Kozakai /* Wooah! I'm tripping my conntrack in a frenzy of \ 709fb9cbb1SYasuyuki Kozakai netplay... */ \ 719fb9cbb1SYasuyuki Kozakai printk("NF_CT_ASSERT: %s:%i(%s)\n", \ 729fb9cbb1SYasuyuki Kozakai __FILE__, __LINE__, __FUNCTION__); \ 739fb9cbb1SYasuyuki Kozakai } while(0) 749fb9cbb1SYasuyuki Kozakai #else 759fb9cbb1SYasuyuki Kozakai #define NF_CT_ASSERT(x) 769fb9cbb1SYasuyuki Kozakai #endif 779fb9cbb1SYasuyuki Kozakai 789fb9cbb1SYasuyuki Kozakai struct nf_conntrack_helper; 799fb9cbb1SYasuyuki Kozakai 806002f266SPatrick McHardy /* Must be kept in sync with the classes defined by helpers */ 810d0ab037SPatrick McHardy #define NF_CT_MAX_EXPECT_CLASSES 3 826002f266SPatrick McHardy 83dc808fe2SHarald Welte /* nf_conn feature for connections that have a helper */ 84dc808fe2SHarald Welte struct nf_conn_help { 85dc808fe2SHarald Welte /* Helper. if any */ 86dc808fe2SHarald Welte struct nf_conntrack_helper *helper; 87dc808fe2SHarald Welte 88dc808fe2SHarald Welte union nf_conntrack_help help; 89dc808fe2SHarald Welte 90b560580aSPatrick McHardy struct hlist_head expectations; 91b560580aSPatrick McHardy 92dc808fe2SHarald Welte /* Current number of expected connections */ 936002f266SPatrick McHardy u8 expecting[NF_CT_MAX_EXPECT_CLASSES]; 94dc808fe2SHarald Welte }; 95dc808fe2SHarald Welte 96dc808fe2SHarald Welte 979fb9cbb1SYasuyuki Kozakai #include <net/netfilter/ipv4/nf_conntrack_ipv4.h> 98f8eb24a8SPatrick McHardy #include <net/netfilter/ipv6/nf_conntrack_ipv6.h> 99f8eb24a8SPatrick McHardy 1009fb9cbb1SYasuyuki Kozakai struct nf_conn 1019fb9cbb1SYasuyuki Kozakai { 1029fb9cbb1SYasuyuki Kozakai /* Usage count in here is 1 for hash table/destruct timer, 1 per skb, 1039fb9cbb1SYasuyuki Kozakai plus 1 for any connection(s) we are `master' for */ 1049fb9cbb1SYasuyuki Kozakai struct nf_conntrack ct_general; 1059fb9cbb1SYasuyuki Kozakai 1069fb9cbb1SYasuyuki Kozakai /* XXX should I move this to the tail ? - Y.K */ 1079fb9cbb1SYasuyuki Kozakai /* These are my tuples; original and reply */ 1089fb9cbb1SYasuyuki Kozakai struct nf_conntrack_tuple_hash tuplehash[IP_CT_DIR_MAX]; 1099fb9cbb1SYasuyuki Kozakai 1109fb9cbb1SYasuyuki Kozakai /* Have we seen traffic both ways yet? (bitset) */ 1119fb9cbb1SYasuyuki Kozakai unsigned long status; 1129fb9cbb1SYasuyuki Kozakai 113dc808fe2SHarald Welte /* If we were expected by an expectation, this will be it */ 114dc808fe2SHarald Welte struct nf_conn *master; 115dc808fe2SHarald Welte 1169fb9cbb1SYasuyuki Kozakai /* Timer function; drops refcnt when it goes off. */ 1179fb9cbb1SYasuyuki Kozakai struct timer_list timeout; 1189fb9cbb1SYasuyuki Kozakai 1199fb9cbb1SYasuyuki Kozakai #ifdef CONFIG_NF_CT_ACCT 1209fb9cbb1SYasuyuki Kozakai /* Accounting Information (same cache line as other written members) */ 1219fb9cbb1SYasuyuki Kozakai struct ip_conntrack_counter counters[IP_CT_DIR_MAX]; 1229fb9cbb1SYasuyuki Kozakai #endif 1239fb9cbb1SYasuyuki Kozakai 1249fb9cbb1SYasuyuki Kozakai #if defined(CONFIG_NF_CONNTRACK_MARK) 1259fb9cbb1SYasuyuki Kozakai u_int32_t mark; 1269fb9cbb1SYasuyuki Kozakai #endif 1279fb9cbb1SYasuyuki Kozakai 1287c9728c3SJames Morris #ifdef CONFIG_NF_CONNTRACK_SECMARK 1297c9728c3SJames Morris u_int32_t secmark; 1307c9728c3SJames Morris #endif 1317c9728c3SJames Morris 132dc808fe2SHarald Welte /* Storage reserved for other modules: */ 133dc808fe2SHarald Welte union nf_conntrack_proto proto; 1349fb9cbb1SYasuyuki Kozakai 135ecfab2c9SYasuyuki Kozakai /* Extensions */ 136ecfab2c9SYasuyuki Kozakai struct nf_ct_ext *ext; 13776507f69SPatrick McHardy 13876507f69SPatrick McHardy struct rcu_head rcu; 1399fb9cbb1SYasuyuki Kozakai }; 1409fb9cbb1SYasuyuki Kozakai 1419fb9cbb1SYasuyuki Kozakai static inline struct nf_conn * 1429fb9cbb1SYasuyuki Kozakai nf_ct_tuplehash_to_ctrack(const struct nf_conntrack_tuple_hash *hash) 1439fb9cbb1SYasuyuki Kozakai { 1449fb9cbb1SYasuyuki Kozakai return container_of(hash, struct nf_conn, 1459fb9cbb1SYasuyuki Kozakai tuplehash[hash->tuple.dst.dir]); 1469fb9cbb1SYasuyuki Kozakai } 1479fb9cbb1SYasuyuki Kozakai 1489fb9cbb1SYasuyuki Kozakai /* get master conntrack via master expectation */ 1499fb9cbb1SYasuyuki Kozakai #define master_ct(conntr) (conntr->master) 1509fb9cbb1SYasuyuki Kozakai 1519fb9cbb1SYasuyuki Kozakai /* Alter reply tuple (maybe alter helper). */ 1529fb9cbb1SYasuyuki Kozakai extern void 153c88130bcSPatrick McHardy nf_conntrack_alter_reply(struct nf_conn *ct, 1549fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *newreply); 1559fb9cbb1SYasuyuki Kozakai 1569fb9cbb1SYasuyuki Kozakai /* Is this tuple taken? (ignoring any belonging to the given 1579fb9cbb1SYasuyuki Kozakai conntrack). */ 1589fb9cbb1SYasuyuki Kozakai extern int 1599fb9cbb1SYasuyuki Kozakai nf_conntrack_tuple_taken(const struct nf_conntrack_tuple *tuple, 1609fb9cbb1SYasuyuki Kozakai const struct nf_conn *ignored_conntrack); 1619fb9cbb1SYasuyuki Kozakai 1629fb9cbb1SYasuyuki Kozakai /* Return conntrack_info and tuple hash for given skb. */ 1639fb9cbb1SYasuyuki Kozakai static inline struct nf_conn * 1649fb9cbb1SYasuyuki Kozakai nf_ct_get(const struct sk_buff *skb, enum ip_conntrack_info *ctinfo) 1659fb9cbb1SYasuyuki Kozakai { 1669fb9cbb1SYasuyuki Kozakai *ctinfo = skb->nfctinfo; 1679fb9cbb1SYasuyuki Kozakai return (struct nf_conn *)skb->nfct; 1689fb9cbb1SYasuyuki Kozakai } 1699fb9cbb1SYasuyuki Kozakai 1709fb9cbb1SYasuyuki Kozakai /* decrement reference count on a conntrack */ 1719fb9cbb1SYasuyuki Kozakai static inline void nf_ct_put(struct nf_conn *ct) 1729fb9cbb1SYasuyuki Kozakai { 1739fb9cbb1SYasuyuki Kozakai NF_CT_ASSERT(ct); 1749fb9cbb1SYasuyuki Kozakai nf_conntrack_put(&ct->ct_general); 1759fb9cbb1SYasuyuki Kozakai } 1769fb9cbb1SYasuyuki Kozakai 177b9f78f9fSPablo Neira Ayuso /* Protocol module loading */ 178b9f78f9fSPablo Neira Ayuso extern int nf_ct_l3proto_try_module_get(unsigned short l3proto); 179b9f78f9fSPablo Neira Ayuso extern void nf_ct_l3proto_module_put(unsigned short l3proto); 180b9f78f9fSPablo Neira Ayuso 18196eb24d7SStephen Hemminger extern struct hlist_head *nf_ct_alloc_hashtable(unsigned int *sizep, int *vmalloced); 182ac565e5fSPatrick McHardy extern void nf_ct_free_hashtable(struct hlist_head *hash, int vmalloced, 18396eb24d7SStephen Hemminger unsigned int size); 184ac565e5fSPatrick McHardy 185c1d10adbSPablo Neira Ayuso extern struct nf_conntrack_tuple_hash * 186ba419affSPatrick McHardy __nf_conntrack_find(const struct nf_conntrack_tuple *tuple); 187c1d10adbSPablo Neira Ayuso 188c1d10adbSPablo Neira Ayuso extern void nf_conntrack_hash_insert(struct nf_conn *ct); 189c1d10adbSPablo Neira Ayuso 190c1d10adbSPablo Neira Ayuso extern void nf_conntrack_flush(void); 191c1d10adbSPablo Neira Ayuso 192e2a3123fSYasuyuki Kozakai extern int nf_ct_get_tuplepr(const struct sk_buff *skb, 193e2a3123fSYasuyuki Kozakai unsigned int nhoff, 194e2a3123fSYasuyuki Kozakai u_int16_t l3num, 195e2a3123fSYasuyuki Kozakai struct nf_conntrack_tuple *tuple); 1969fb9cbb1SYasuyuki Kozakai extern int nf_ct_invert_tuplepr(struct nf_conntrack_tuple *inverse, 1979fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *orig); 1989fb9cbb1SYasuyuki Kozakai 1999fb9cbb1SYasuyuki Kozakai extern void __nf_ct_refresh_acct(struct nf_conn *ct, 2009fb9cbb1SYasuyuki Kozakai enum ip_conntrack_info ctinfo, 2019fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 2029fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies, 2039fb9cbb1SYasuyuki Kozakai int do_acct); 2049fb9cbb1SYasuyuki Kozakai 2059fb9cbb1SYasuyuki Kozakai /* Refresh conntrack for this many jiffies and do accounting */ 2069fb9cbb1SYasuyuki Kozakai static inline void nf_ct_refresh_acct(struct nf_conn *ct, 2079fb9cbb1SYasuyuki Kozakai enum ip_conntrack_info ctinfo, 2089fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 2099fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies) 2109fb9cbb1SYasuyuki Kozakai { 2119fb9cbb1SYasuyuki Kozakai __nf_ct_refresh_acct(ct, ctinfo, skb, extra_jiffies, 1); 2129fb9cbb1SYasuyuki Kozakai } 2139fb9cbb1SYasuyuki Kozakai 2149fb9cbb1SYasuyuki Kozakai /* Refresh conntrack for this many jiffies */ 2159fb9cbb1SYasuyuki Kozakai static inline void nf_ct_refresh(struct nf_conn *ct, 2169fb9cbb1SYasuyuki Kozakai const struct sk_buff *skb, 2179fb9cbb1SYasuyuki Kozakai unsigned long extra_jiffies) 2189fb9cbb1SYasuyuki Kozakai { 2199fb9cbb1SYasuyuki Kozakai __nf_ct_refresh_acct(ct, 0, skb, extra_jiffies, 0); 2209fb9cbb1SYasuyuki Kozakai } 2219fb9cbb1SYasuyuki Kozakai 2229fb9cbb1SYasuyuki Kozakai /* These are for NAT. Icky. */ 2239fb9cbb1SYasuyuki Kozakai /* Update TCP window tracking data when NAT mangles the packet */ 22482f568fcSJan Engelhardt extern void nf_conntrack_tcp_update(const struct sk_buff *skb, 2259fb9cbb1SYasuyuki Kozakai unsigned int dataoff, 226c88130bcSPatrick McHardy struct nf_conn *ct, 2279fb9cbb1SYasuyuki Kozakai int dir); 2289fb9cbb1SYasuyuki Kozakai 2299fb9cbb1SYasuyuki Kozakai /* Fake conntrack entry for untracked connections */ 2309fb9cbb1SYasuyuki Kozakai extern struct nf_conn nf_conntrack_untracked; 2319fb9cbb1SYasuyuki Kozakai 2329fb9cbb1SYasuyuki Kozakai /* Iterate over all conntracks: if iter returns true, it's deleted. */ 2339fb9cbb1SYasuyuki Kozakai extern void 2349fb9cbb1SYasuyuki Kozakai nf_ct_iterate_cleanup(int (*iter)(struct nf_conn *i, void *data), void *data); 2359fb9cbb1SYasuyuki Kozakai extern void nf_conntrack_free(struct nf_conn *ct); 2369fb9cbb1SYasuyuki Kozakai extern struct nf_conn * 2379fb9cbb1SYasuyuki Kozakai nf_conntrack_alloc(const struct nf_conntrack_tuple *orig, 2389fb9cbb1SYasuyuki Kozakai const struct nf_conntrack_tuple *repl); 2399fb9cbb1SYasuyuki Kozakai 2409fb9cbb1SYasuyuki Kozakai /* It's confirmed if it is, or has been in the hash table. */ 2419fb9cbb1SYasuyuki Kozakai static inline int nf_ct_is_confirmed(struct nf_conn *ct) 2429fb9cbb1SYasuyuki Kozakai { 2439fb9cbb1SYasuyuki Kozakai return test_bit(IPS_CONFIRMED_BIT, &ct->status); 2449fb9cbb1SYasuyuki Kozakai } 2459fb9cbb1SYasuyuki Kozakai 2469fb9cbb1SYasuyuki Kozakai static inline int nf_ct_is_dying(struct nf_conn *ct) 2479fb9cbb1SYasuyuki Kozakai { 2489fb9cbb1SYasuyuki Kozakai return test_bit(IPS_DYING_BIT, &ct->status); 2499fb9cbb1SYasuyuki Kozakai } 2509fb9cbb1SYasuyuki Kozakai 251587aa641SPatrick McHardy static inline int nf_ct_is_untracked(const struct sk_buff *skb) 252587aa641SPatrick McHardy { 253587aa641SPatrick McHardy return (skb->nfct == &nf_conntrack_untracked.ct_general); 254587aa641SPatrick McHardy } 255587aa641SPatrick McHardy 256fae718ddSPatrick McHardy extern int nf_conntrack_set_hashsize(const char *val, struct kernel_param *kp); 2579fb9cbb1SYasuyuki Kozakai extern unsigned int nf_conntrack_htable_size; 25839a27a35SPatrick McHardy extern int nf_conntrack_checksum; 259f8eb24a8SPatrick McHardy extern atomic_t nf_conntrack_count; 260f8eb24a8SPatrick McHardy extern int nf_conntrack_max; 2619fb9cbb1SYasuyuki Kozakai 262f8eb24a8SPatrick McHardy DECLARE_PER_CPU(struct ip_conntrack_stat, nf_conntrack_stat); 2639fb9cbb1SYasuyuki Kozakai #define NF_CT_STAT_INC(count) (__get_cpu_var(nf_conntrack_stat).count++) 264c0e912d7SPatrick McHardy #define NF_CT_STAT_INC_ATOMIC(count) \ 265c0e912d7SPatrick McHardy do { \ 266c0e912d7SPatrick McHardy local_bh_disable(); \ 267c0e912d7SPatrick McHardy __get_cpu_var(nf_conntrack_stat).count++; \ 268c0e912d7SPatrick McHardy local_bh_enable(); \ 269c0e912d7SPatrick McHardy } while (0) 2709fb9cbb1SYasuyuki Kozakai 2719fb9cbb1SYasuyuki Kozakai #endif /* __KERNEL__ */ 2729fb9cbb1SYasuyuki Kozakai #endif /* _NF_CONNTRACK_H */ 273