linux/include/net/netfilter/nf_conntrack_core.h
<<
>>
Prefs
   1/* SPDX-License-Identifier: GPL-2.0 */
   2/*
   3 * This header is used to share core functionality between the
   4 * standalone connection tracking module, and the compatibility layer's use
   5 * of connection tracking.
   6 *
   7 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
   8 *      - generalize L3 protocol dependent part.
   9 *
  10 * Derived from include/linux/netfiter_ipv4/ip_conntrack_core.h
  11 */
  12
  13#ifndef _NF_CONNTRACK_CORE_H
  14#define _NF_CONNTRACK_CORE_H
  15
  16#include <linux/netfilter.h>
  17#include <net/netfilter/nf_conntrack_l3proto.h>
  18#include <net/netfilter/nf_conntrack_l4proto.h>
  19#include <net/netfilter/nf_conntrack_ecache.h>
  20
  21/* This header is used to share core functionality between the
  22   standalone connection tracking module, and the compatibility layer's use
  23   of connection tracking. */
  24unsigned int nf_conntrack_in(struct net *net, u_int8_t pf, unsigned int hooknum,
  25                             struct sk_buff *skb);
  26
  27int nf_conntrack_init_net(struct net *net);
  28void nf_conntrack_cleanup_net(struct net *net);
  29void nf_conntrack_cleanup_net_list(struct list_head *net_exit_list);
  30
  31int nf_conntrack_proto_pernet_init(struct net *net);
  32void nf_conntrack_proto_pernet_fini(struct net *net);
  33
  34int nf_conntrack_proto_init(void);
  35void nf_conntrack_proto_fini(void);
  36
  37int nf_conntrack_init_start(void);
  38void nf_conntrack_cleanup_start(void);
  39
  40void nf_conntrack_init_end(void);
  41void nf_conntrack_cleanup_end(void);
  42
  43bool nf_ct_get_tuple(const struct sk_buff *skb, unsigned int nhoff,
  44                     unsigned int dataoff, u_int16_t l3num, u_int8_t protonum,
  45                     struct net *net,
  46                     struct nf_conntrack_tuple *tuple,
  47                     const struct nf_conntrack_l3proto *l3proto,
  48                     const struct nf_conntrack_l4proto *l4proto);
  49
  50bool nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse,
  51                        const struct nf_conntrack_tuple *orig,
  52                        const struct nf_conntrack_l3proto *l3proto,
  53                        const struct nf_conntrack_l4proto *l4proto);
  54
  55/* Find a connection corresponding to a tuple. */
  56struct nf_conntrack_tuple_hash *
  57nf_conntrack_find_get(struct net *net,
  58                      const struct nf_conntrack_zone *zone,
  59                      const struct nf_conntrack_tuple *tuple);
  60
  61int __nf_conntrack_confirm(struct sk_buff *skb);
  62
  63/* Confirm a connection: returns NF_DROP if packet must be dropped. */
  64static inline int nf_conntrack_confirm(struct sk_buff *skb)
  65{
  66        struct nf_conn *ct = (struct nf_conn *)skb_nfct(skb);
  67        int ret = NF_ACCEPT;
  68
  69        if (ct) {
  70                if (!nf_ct_is_confirmed(ct))
  71                        ret = __nf_conntrack_confirm(skb);
  72                if (likely(ret == NF_ACCEPT))
  73                        nf_ct_deliver_cached_events(ct);
  74        }
  75        return ret;
  76}
  77
  78void
  79print_tuple(struct seq_file *s, const struct nf_conntrack_tuple *tuple,
  80            const struct nf_conntrack_l3proto *l3proto,
  81            const struct nf_conntrack_l4proto *proto);
  82
  83#define CONNTRACK_LOCKS 1024
  84
  85extern spinlock_t nf_conntrack_locks[CONNTRACK_LOCKS];
  86void nf_conntrack_lock(spinlock_t *lock);
  87
  88extern spinlock_t nf_conntrack_expect_lock;
  89
  90#endif /* _NF_CONNTRACK_CORE_H */
  91