1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* 3 * This header is used to share core functionality between the 4 * standalone connection tracking module, and the compatibility layer's use 5 * of connection tracking. 6 * 7 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp> 8 * - generalize L3 protocol dependent part. 9 * 10 * Derived from include/linux/netfiter_ipv4/ip_conntrack_core.h 11 */ 12 13 #ifndef _NF_CONNTRACK_CORE_H 14 #define _NF_CONNTRACK_CORE_H 15 16 #include <linux/netfilter.h> 17 #include <net/netfilter/nf_conntrack.h> 18 #include <net/netfilter/nf_conntrack_ecache.h> 19 #include <net/netfilter/nf_conntrack_l4proto.h> 20 21 /* This header is used to share core functionality between the 22 standalone connection tracking module, and the compatibility layer's use 23 of connection tracking. */ 24 25 unsigned int nf_conntrack_in(struct sk_buff *skb, 26 const struct nf_hook_state *state); 27 28 int nf_conntrack_init_net(struct net *net); 29 void nf_conntrack_cleanup_net(struct net *net); 30 void nf_conntrack_cleanup_net_list(struct list_head *net_exit_list); 31 32 void nf_conntrack_proto_pernet_init(struct net *net); 33 34 int nf_conntrack_proto_init(void); 35 void nf_conntrack_proto_fini(void); 36 37 int nf_conntrack_init_start(void); 38 void nf_conntrack_cleanup_start(void); 39 40 void nf_conntrack_init_end(void); 41 void nf_conntrack_cleanup_end(void); 42 43 bool nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse, 44 const struct nf_conntrack_tuple *orig); 45 46 /* Find a connection corresponding to a tuple. */ 47 struct nf_conntrack_tuple_hash * 48 nf_conntrack_find_get(struct net *net, 49 const struct nf_conntrack_zone *zone, 50 const struct nf_conntrack_tuple *tuple); 51 52 int __nf_conntrack_confirm(struct sk_buff *skb); 53 54 /* Confirm a connection: returns NF_DROP if packet must be dropped. */ 55 static inline int nf_conntrack_confirm(struct sk_buff *skb) 56 { 57 struct nf_conn *ct = (struct nf_conn *)skb_nfct(skb); 58 int ret = NF_ACCEPT; 59 60 if (ct) { 61 if (!nf_ct_is_confirmed(ct)) { 62 ret = __nf_conntrack_confirm(skb); 63 64 if (ret == NF_ACCEPT) 65 ct = (struct nf_conn *)skb_nfct(skb); 66 } 67 68 if (ret == NF_ACCEPT && nf_ct_ecache_exist(ct)) 69 nf_ct_deliver_cached_events(ct); 70 } 71 return ret; 72 } 73 74 unsigned int nf_confirm(struct sk_buff *skb, unsigned int protoff, 75 struct nf_conn *ct, enum ip_conntrack_info ctinfo); 76 77 void print_tuple(struct seq_file *s, const struct nf_conntrack_tuple *tuple, 78 const struct nf_conntrack_l4proto *proto); 79 80 #define CONNTRACK_LOCKS 1024 81 82 extern spinlock_t nf_conntrack_locks[CONNTRACK_LOCKS]; 83 void nf_conntrack_lock(spinlock_t *lock); 84 85 extern spinlock_t nf_conntrack_expect_lock; 86 87 /* ctnetlink code shared by both ctnetlink and nf_conntrack_bpf */ 88 89 static inline void __nf_ct_set_timeout(struct nf_conn *ct, u64 timeout) 90 { 91 if (timeout > INT_MAX) 92 timeout = INT_MAX; 93 WRITE_ONCE(ct->timeout, nfct_time_stamp + (u32)timeout); 94 } 95 96 int __nf_ct_change_timeout(struct nf_conn *ct, u64 cta_timeout); 97 void __nf_ct_change_status(struct nf_conn *ct, unsigned long on, unsigned long off); 98 int nf_ct_change_status_common(struct nf_conn *ct, unsigned int status); 99 100 #endif /* _NF_CONNTRACK_CORE_H */ 101