1/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * This header is used to share core functionality between the
4 * standalone connection tracking module, and the compatibility layer's use
5 * of connection tracking.
6 *
7 * 16 Dec 2003: Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
8 * - generalize L3 protocol dependent part.
9 *
10 * Derived from include/linux/netfiter_ipv4/ip_conntrack_core.h
11 */
12
13#ifndef _NF_CONNTRACK_CORE_H
14#define _NF_CONNTRACK_CORE_H
15
16#include <linux/netfilter.h>
17#include <net/netfilter/nf_conntrack.h>
18#include <net/netfilter/nf_conntrack_ecache.h>
19#include <net/netfilter/nf_conntrack_l4proto.h>
20
21/* This header is used to share core functionality between the
22 standalone connection tracking module, and the compatibility layer's use
23 of connection tracking. */
24
25unsigned int nf_conntrack_in(struct sk_buff *skb,
26 const struct nf_hook_state *state);
27
28int nf_conntrack_init_net(struct net *net);
29void nf_conntrack_cleanup_net(struct net *net);
30void nf_conntrack_cleanup_net_list(struct list_head *net_exit_list);
31
32void nf_conntrack_proto_pernet_init(struct net *net);
33
34int nf_conntrack_proto_init(void);
35void nf_conntrack_proto_fini(void);
36
37int nf_conntrack_init_start(void);
38void nf_conntrack_cleanup_start(void);
39
40void nf_conntrack_init_end(void);
41void nf_conntrack_cleanup_end(void);
42
43bool nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse,
44 const struct nf_conntrack_tuple *orig);
45
46/* Find a connection corresponding to a tuple. */
47struct nf_conntrack_tuple_hash *
48nf_conntrack_find_get(struct net *net,
49 const struct nf_conntrack_zone *zone,
50 const struct nf_conntrack_tuple *tuple);
51
52int __nf_conntrack_confirm(struct sk_buff *skb);
53
54/* Confirm a connection: returns NF_DROP if packet must be dropped. */
55static inline int nf_conntrack_confirm(struct sk_buff *skb)
56{
57 struct nf_conn *ct = (struct nf_conn *)skb_nfct(skb);
58 int ret = NF_ACCEPT;
59
60 if (ct) {
61 if (!nf_ct_is_confirmed(ct)) {
62 ret = __nf_conntrack_confirm(skb);
63
64 if (ret == NF_ACCEPT)
65 ct = (struct nf_conn *)skb_nfct(skb);
66 }
67
68 if (ret == NF_ACCEPT && nf_ct_ecache_exist(ct))
69 nf_ct_deliver_cached_events(ct);
70 }
71 return ret;
72}
73
74unsigned int nf_confirm(void *priv, struct sk_buff *skb, const struct nf_hook_state *state);
75
76void print_tuple(struct seq_file *s, const struct nf_conntrack_tuple *tuple,
77 const struct nf_conntrack_l4proto *proto);
78
79#define CONNTRACK_LOCKS 1024
80
81extern spinlock_t nf_conntrack_locks[CONNTRACK_LOCKS];
82void nf_conntrack_lock(spinlock_t *lock);
83
84extern spinlock_t nf_conntrack_expect_lock;
85
86/* ctnetlink code shared by both ctnetlink and nf_conntrack_bpf */
87
88static inline void __nf_ct_set_timeout(struct nf_conn *ct, u64 timeout)
89{
90 if (timeout > INT_MAX)
91 timeout = INT_MAX;
92
93 if (nf_ct_is_confirmed(ct))
94 WRITE_ONCE(ct->timeout, nfct_time_stamp + (u32)timeout);
95 else
96 ct->timeout = (u32)timeout;
97}
98
99int __nf_ct_change_timeout(struct nf_conn *ct, u64 cta_timeout);
100void __nf_ct_change_status(struct nf_conn *ct, unsigned long on, unsigned long off);
101int nf_ct_change_status_common(struct nf_conn *ct, unsigned int status);
102
103#endif /* _NF_CONNTRACK_CORE_H */
104

source code of linux/include/net/netfilter/nf_conntrack_core.h