netfilter: Use nf_hook_state in nf_queue_entry.
[deliverable/linux.git] / include / linux / netfilter.h
... / ...
CommitLineData
1#ifndef __LINUX_NETFILTER_H
2#define __LINUX_NETFILTER_H
3
4#include <linux/init.h>
5#include <linux/skbuff.h>
6#include <linux/net.h>
7#include <linux/if.h>
8#include <linux/in.h>
9#include <linux/in6.h>
10#include <linux/wait.h>
11#include <linux/list.h>
12#include <linux/static_key.h>
13#include <uapi/linux/netfilter.h>
14#ifdef CONFIG_NETFILTER
15static inline int NF_DROP_GETERR(int verdict)
16{
17 return -(verdict >> NF_VERDICT_QBITS);
18}
19
20static inline int nf_inet_addr_cmp(const union nf_inet_addr *a1,
21 const union nf_inet_addr *a2)
22{
23 return a1->all[0] == a2->all[0] &&
24 a1->all[1] == a2->all[1] &&
25 a1->all[2] == a2->all[2] &&
26 a1->all[3] == a2->all[3];
27}
28
29static inline void nf_inet_addr_mask(const union nf_inet_addr *a1,
30 union nf_inet_addr *result,
31 const union nf_inet_addr *mask)
32{
33 result->all[0] = a1->all[0] & mask->all[0];
34 result->all[1] = a1->all[1] & mask->all[1];
35 result->all[2] = a1->all[2] & mask->all[2];
36 result->all[3] = a1->all[3] & mask->all[3];
37}
38
39int netfilter_init(void);
40
41/* Largest hook number + 1 */
42#define NF_MAX_HOOKS 8
43
44struct sk_buff;
45
46struct nf_hook_ops;
47
48struct nf_hook_state {
49 unsigned int hook;
50 int thresh;
51 u_int8_t pf;
52 struct net_device *in;
53 struct net_device *out;
54 int (*okfn)(struct sk_buff *);
55};
56
57typedef unsigned int nf_hookfn(const struct nf_hook_ops *ops,
58 struct sk_buff *skb,
59 const struct net_device *in,
60 const struct net_device *out,
61 int (*okfn)(struct sk_buff *));
62
63struct nf_hook_ops {
64 struct list_head list;
65
66 /* User fills in from here down. */
67 nf_hookfn *hook;
68 struct module *owner;
69 void *priv;
70 u_int8_t pf;
71 unsigned int hooknum;
72 /* Hooks are ordered in ascending priority. */
73 int priority;
74};
75
76struct nf_sockopt_ops {
77 struct list_head list;
78
79 u_int8_t pf;
80
81 /* Non-inclusive ranges: use 0/0/NULL to never get called. */
82 int set_optmin;
83 int set_optmax;
84 int (*set)(struct sock *sk, int optval, void __user *user, unsigned int len);
85#ifdef CONFIG_COMPAT
86 int (*compat_set)(struct sock *sk, int optval,
87 void __user *user, unsigned int len);
88#endif
89 int get_optmin;
90 int get_optmax;
91 int (*get)(struct sock *sk, int optval, void __user *user, int *len);
92#ifdef CONFIG_COMPAT
93 int (*compat_get)(struct sock *sk, int optval,
94 void __user *user, int *len);
95#endif
96 /* Use the module struct to lock set/get code in place */
97 struct module *owner;
98};
99
100/* Function to register/unregister hook points. */
101int nf_register_hook(struct nf_hook_ops *reg);
102void nf_unregister_hook(struct nf_hook_ops *reg);
103int nf_register_hooks(struct nf_hook_ops *reg, unsigned int n);
104void nf_unregister_hooks(struct nf_hook_ops *reg, unsigned int n);
105
106/* Functions to register get/setsockopt ranges (non-inclusive). You
107 need to check permissions yourself! */
108int nf_register_sockopt(struct nf_sockopt_ops *reg);
109void nf_unregister_sockopt(struct nf_sockopt_ops *reg);
110
111extern struct list_head nf_hooks[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
112
113#ifdef HAVE_JUMP_LABEL
114extern struct static_key nf_hooks_needed[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
115
116static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
117{
118 if (__builtin_constant_p(pf) &&
119 __builtin_constant_p(hook))
120 return static_key_false(&nf_hooks_needed[pf][hook]);
121
122 return !list_empty(&nf_hooks[pf][hook]);
123}
124#else
125static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
126{
127 return !list_empty(&nf_hooks[pf][hook]);
128}
129#endif
130
131int nf_hook_slow(struct sk_buff *skb, struct nf_hook_state *state);
132
133/**
134 * nf_hook_thresh - call a netfilter hook
135 *
136 * Returns 1 if the hook has allowed the packet to pass. The function
137 * okfn must be invoked by the caller in this case. Any other return
138 * value indicates the packet has been consumed by the hook.
139 */
140static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
141 struct sk_buff *skb,
142 struct net_device *indev,
143 struct net_device *outdev,
144 int (*okfn)(struct sk_buff *), int thresh)
145{
146 if (nf_hooks_active(pf, hook)) {
147 struct nf_hook_state state = {
148 .hook = hook,
149 .thresh = thresh,
150 .pf = pf,
151 .in = indev,
152 .out = outdev,
153 .okfn = okfn
154 };
155
156 return nf_hook_slow(skb, &state);
157 }
158 return 1;
159}
160
161static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
162 struct net_device *indev, struct net_device *outdev,
163 int (*okfn)(struct sk_buff *))
164{
165 return nf_hook_thresh(pf, hook, skb, indev, outdev, okfn, INT_MIN);
166}
167
168/* Activate hook; either okfn or kfree_skb called, unless a hook
169 returns NF_STOLEN (in which case, it's up to the hook to deal with
170 the consequences).
171
172 Returns -ERRNO if packet dropped. Zero means queued, stolen or
173 accepted.
174*/
175
176/* RR:
177 > I don't want nf_hook to return anything because people might forget
178 > about async and trust the return value to mean "packet was ok".
179
180 AK:
181 Just document it clearly, then you can expect some sense from kernel
182 coders :)
183*/
184
185static inline int
186NF_HOOK_THRESH(uint8_t pf, unsigned int hook, struct sk_buff *skb,
187 struct net_device *in, struct net_device *out,
188 int (*okfn)(struct sk_buff *), int thresh)
189{
190 int ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, thresh);
191 if (ret == 1)
192 ret = okfn(skb);
193 return ret;
194}
195
196static inline int
197NF_HOOK_COND(uint8_t pf, unsigned int hook, struct sk_buff *skb,
198 struct net_device *in, struct net_device *out,
199 int (*okfn)(struct sk_buff *), bool cond)
200{
201 int ret;
202
203 if (!cond ||
204 ((ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, INT_MIN)) == 1))
205 ret = okfn(skb);
206 return ret;
207}
208
209static inline int
210NF_HOOK(uint8_t pf, unsigned int hook, struct sk_buff *skb,
211 struct net_device *in, struct net_device *out,
212 int (*okfn)(struct sk_buff *))
213{
214 return NF_HOOK_THRESH(pf, hook, skb, in, out, okfn, INT_MIN);
215}
216
217/* Call setsockopt() */
218int nf_setsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
219 unsigned int len);
220int nf_getsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
221 int *len);
222#ifdef CONFIG_COMPAT
223int compat_nf_setsockopt(struct sock *sk, u_int8_t pf, int optval,
224 char __user *opt, unsigned int len);
225int compat_nf_getsockopt(struct sock *sk, u_int8_t pf, int optval,
226 char __user *opt, int *len);
227#endif
228
229/* Call this before modifying an existing packet: ensures it is
230 modifiable and linear to the point you care about (writable_len).
231 Returns true or false. */
232int skb_make_writable(struct sk_buff *skb, unsigned int writable_len);
233
234struct flowi;
235struct nf_queue_entry;
236
237struct nf_afinfo {
238 unsigned short family;
239 __sum16 (*checksum)(struct sk_buff *skb, unsigned int hook,
240 unsigned int dataoff, u_int8_t protocol);
241 __sum16 (*checksum_partial)(struct sk_buff *skb,
242 unsigned int hook,
243 unsigned int dataoff,
244 unsigned int len,
245 u_int8_t protocol);
246 int (*route)(struct net *net, struct dst_entry **dst,
247 struct flowi *fl, bool strict);
248 void (*saveroute)(const struct sk_buff *skb,
249 struct nf_queue_entry *entry);
250 int (*reroute)(struct sk_buff *skb,
251 const struct nf_queue_entry *entry);
252 int route_key_size;
253};
254
255extern const struct nf_afinfo __rcu *nf_afinfo[NFPROTO_NUMPROTO];
256static inline const struct nf_afinfo *nf_get_afinfo(unsigned short family)
257{
258 return rcu_dereference(nf_afinfo[family]);
259}
260
261static inline __sum16
262nf_checksum(struct sk_buff *skb, unsigned int hook, unsigned int dataoff,
263 u_int8_t protocol, unsigned short family)
264{
265 const struct nf_afinfo *afinfo;
266 __sum16 csum = 0;
267
268 rcu_read_lock();
269 afinfo = nf_get_afinfo(family);
270 if (afinfo)
271 csum = afinfo->checksum(skb, hook, dataoff, protocol);
272 rcu_read_unlock();
273 return csum;
274}
275
276static inline __sum16
277nf_checksum_partial(struct sk_buff *skb, unsigned int hook,
278 unsigned int dataoff, unsigned int len,
279 u_int8_t protocol, unsigned short family)
280{
281 const struct nf_afinfo *afinfo;
282 __sum16 csum = 0;
283
284 rcu_read_lock();
285 afinfo = nf_get_afinfo(family);
286 if (afinfo)
287 csum = afinfo->checksum_partial(skb, hook, dataoff, len,
288 protocol);
289 rcu_read_unlock();
290 return csum;
291}
292
293int nf_register_afinfo(const struct nf_afinfo *afinfo);
294void nf_unregister_afinfo(const struct nf_afinfo *afinfo);
295
296#include <net/flow.h>
297extern void (*nf_nat_decode_session_hook)(struct sk_buff *, struct flowi *);
298
299static inline void
300nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
301{
302#ifdef CONFIG_NF_NAT_NEEDED
303 void (*decodefn)(struct sk_buff *, struct flowi *);
304
305 rcu_read_lock();
306 decodefn = rcu_dereference(nf_nat_decode_session_hook);
307 if (decodefn)
308 decodefn(skb, fl);
309 rcu_read_unlock();
310#endif
311}
312
313#else /* !CONFIG_NETFILTER */
314#define NF_HOOK(pf, hook, skb, indev, outdev, okfn) (okfn)(skb)
315#define NF_HOOK_COND(pf, hook, skb, indev, outdev, okfn, cond) (okfn)(skb)
316static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
317 struct sk_buff *skb,
318 struct net_device *indev,
319 struct net_device *outdev,
320 int (*okfn)(struct sk_buff *), int thresh)
321{
322 return okfn(skb);
323}
324static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
325 struct net_device *indev, struct net_device *outdev,
326 int (*okfn)(struct sk_buff *))
327{
328 return 1;
329}
330struct flowi;
331static inline void
332nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
333{
334}
335#endif /*CONFIG_NETFILTER*/
336
337#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
338extern void (*ip_ct_attach)(struct sk_buff *, const struct sk_buff *) __rcu;
339void nf_ct_attach(struct sk_buff *, const struct sk_buff *);
340extern void (*nf_ct_destroy)(struct nf_conntrack *) __rcu;
341
342struct nf_conn;
343enum ip_conntrack_info;
344struct nlattr;
345
346struct nfq_ct_hook {
347 size_t (*build_size)(const struct nf_conn *ct);
348 int (*build)(struct sk_buff *skb, struct nf_conn *ct);
349 int (*parse)(const struct nlattr *attr, struct nf_conn *ct);
350 int (*attach_expect)(const struct nlattr *attr, struct nf_conn *ct,
351 u32 portid, u32 report);
352 void (*seq_adjust)(struct sk_buff *skb, struct nf_conn *ct,
353 enum ip_conntrack_info ctinfo, s32 off);
354};
355extern struct nfq_ct_hook __rcu *nfq_ct_hook;
356#else
357static inline void nf_ct_attach(struct sk_buff *new, struct sk_buff *skb) {}
358#endif
359
360#endif /*__LINUX_NETFILTER_H*/
This page took 0.025752 seconds and 5 git commands to generate.