linux/include/net/netfilter/nf_conntrack_core.h
<<
>>
Prefs
   1/* SPDX-License-Identifier: GPL-2.0 */
   2/*
   3 * This header is used to share core functionality between the
   4 * standalone connection tracking module, and the compatibility layer's use
   5 * of connection tracking.
   6 *
   7 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
   8 *      - generalize L3 protocol dependent part.
   9 *
  10 * Derived from include/linux/netfiter_ipv4/ip_conntrack_core.h
  11 */
  12
  13#ifndef _NF_CONNTRACK_CORE_H
  14#define _NF_CONNTRACK_CORE_H
  15
  16#include <linux/netfilter.h>
  17#include <net/netfilter/nf_conntrack.h>
  18#include <net/netfilter/nf_conntrack_ecache.h>
  19#include <net/netfilter/nf_conntrack_l4proto.h>
  20
  21/* This header is used to share core functionality between the
  22   standalone connection tracking module, and the compatibility layer's use
  23   of connection tracking. */
  24
  25unsigned int nf_conntrack_in(struct sk_buff *skb,
  26                             const struct nf_hook_state *state);
  27
  28int nf_conntrack_init_net(struct net *net);
  29void nf_conntrack_cleanup_net(struct net *net);
  30void nf_conntrack_cleanup_net_list(struct list_head *net_exit_list);
  31
  32void nf_conntrack_proto_pernet_init(struct net *net);
  33
  34int nf_conntrack_proto_init(void);
  35void nf_conntrack_proto_fini(void);
  36
  37int nf_conntrack_init_start(void);
  38void nf_conntrack_cleanup_start(void);
  39
  40void nf_conntrack_init_end(void);
  41void nf_conntrack_cleanup_end(void);
  42
  43bool nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse,
  44                        const struct nf_conntrack_tuple *orig);
  45
  46/* Find a connection corresponding to a tuple. */
  47struct nf_conntrack_tuple_hash *
  48nf_conntrack_find_get(struct net *net,
  49                      const struct nf_conntrack_zone *zone,
  50                      const struct nf_conntrack_tuple *tuple);
  51
  52int __nf_conntrack_confirm(struct sk_buff *skb);
  53
  54/* Confirm a connection: returns NF_DROP if packet must be dropped. */
  55static inline int nf_conntrack_confirm(struct sk_buff *skb)
  56{
  57        struct nf_conn *ct = (struct nf_conn *)skb_nfct(skb);
  58        int ret = NF_ACCEPT;
  59
  60        if (ct) {
  61                if (!nf_ct_is_confirmed(ct))
  62                        ret = __nf_conntrack_confirm(skb);
  63                if (likely(ret == NF_ACCEPT))
  64                        nf_ct_deliver_cached_events(ct);
  65        }
  66        return ret;
  67}
  68
  69unsigned int nf_confirm(struct sk_buff *skb, unsigned int protoff,
  70                        struct nf_conn *ct, enum ip_conntrack_info ctinfo);
  71
  72void print_tuple(struct seq_file *s, const struct nf_conntrack_tuple *tuple,
  73                 const struct nf_conntrack_l4proto *proto);
  74
  75#define CONNTRACK_LOCKS 1024
  76
  77extern spinlock_t nf_conntrack_locks[CONNTRACK_LOCKS];
  78void nf_conntrack_lock(spinlock_t *lock);
  79
  80extern spinlock_t nf_conntrack_expect_lock;
  81
  82#endif /* _NF_CONNTRACK_CORE_H */
  83