]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - include/linux/netfilter.h
Merge tag 'sound-3.18-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/tiwai...
[mirror_ubuntu-artful-kernel.git] / include / linux / netfilter.h
CommitLineData
1da177e4
LT
1#ifndef __LINUX_NETFILTER_H
2#define __LINUX_NETFILTER_H
3
1da177e4 4#include <linux/init.h>
1da177e4
LT
5#include <linux/skbuff.h>
6#include <linux/net.h>
7#include <linux/if.h>
2e3075a2
JE
8#include <linux/in.h>
9#include <linux/in6.h>
1da177e4
LT
10#include <linux/wait.h>
11#include <linux/list.h>
d1c85c2e 12#include <linux/static_key.h>
607ca46e 13#include <uapi/linux/netfilter.h>
1da177e4 14#ifdef CONFIG_NETFILTER
f615df76
FW
15static inline int NF_DROP_GETERR(int verdict)
16{
17 return -(verdict >> NF_VERDICT_QBITS);
18}
1da177e4 19
b8beedd2
PM
20static inline int nf_inet_addr_cmp(const union nf_inet_addr *a1,
21 const union nf_inet_addr *a2)
22{
23 return a1->all[0] == a2->all[0] &&
24 a1->all[1] == a2->all[1] &&
25 a1->all[2] == a2->all[2] &&
26 a1->all[3] == a2->all[3];
27}
28
efdedd54
DF
29static inline void nf_inet_addr_mask(const union nf_inet_addr *a1,
30 union nf_inet_addr *result,
31 const union nf_inet_addr *mask)
32{
33 result->all[0] = a1->all[0] & mask->all[0];
34 result->all[1] = a1->all[1] & mask->all[1];
35 result->all[2] = a1->all[2] & mask->all[2];
36 result->all[3] = a1->all[3] & mask->all[3];
37}
38
a0f4ecf3 39int netfilter_init(void);
1da177e4
LT
40
41/* Largest hook number + 1 */
42#define NF_MAX_HOOKS 8
43
44struct sk_buff;
1da177e4 45
795aa6ef
PM
46struct nf_hook_ops;
47typedef unsigned int nf_hookfn(const struct nf_hook_ops *ops,
3db05fea 48 struct sk_buff *skb,
1da177e4
LT
49 const struct net_device *in,
50 const struct net_device *out,
51 int (*okfn)(struct sk_buff *));
52
d94d9fee 53struct nf_hook_ops {
1da177e4
LT
54 struct list_head list;
55
56 /* User fills in from here down. */
96518518
PM
57 nf_hookfn *hook;
58 struct module *owner;
59 void *priv;
60 u_int8_t pf;
61 unsigned int hooknum;
1da177e4 62 /* Hooks are ordered in ascending priority. */
96518518 63 int priority;
1da177e4
LT
64};
65
d94d9fee 66struct nf_sockopt_ops {
1da177e4
LT
67 struct list_head list;
68
76108cea 69 u_int8_t pf;
1da177e4
LT
70
71 /* Non-inclusive ranges: use 0/0/NULL to never get called. */
72 int set_optmin;
73 int set_optmax;
74 int (*set)(struct sock *sk, int optval, void __user *user, unsigned int len);
c30f540b 75#ifdef CONFIG_COMPAT
3fdadf7d
DM
76 int (*compat_set)(struct sock *sk, int optval,
77 void __user *user, unsigned int len);
c30f540b 78#endif
1da177e4
LT
79 int get_optmin;
80 int get_optmax;
81 int (*get)(struct sock *sk, int optval, void __user *user, int *len);
c30f540b 82#ifdef CONFIG_COMPAT
3fdadf7d
DM
83 int (*compat_get)(struct sock *sk, int optval,
84 void __user *user, int *len);
c30f540b 85#endif
16fcec35
NH
86 /* Use the module struct to lock set/get code in place */
87 struct module *owner;
1da177e4
LT
88};
89
1da177e4
LT
90/* Function to register/unregister hook points. */
91int nf_register_hook(struct nf_hook_ops *reg);
92void nf_unregister_hook(struct nf_hook_ops *reg);
972d1cb1
PM
93int nf_register_hooks(struct nf_hook_ops *reg, unsigned int n);
94void nf_unregister_hooks(struct nf_hook_ops *reg, unsigned int n);
1da177e4
LT
95
96/* Functions to register get/setsockopt ranges (non-inclusive). You
97 need to check permissions yourself! */
98int nf_register_sockopt(struct nf_sockopt_ops *reg);
99void nf_unregister_sockopt(struct nf_sockopt_ops *reg);
100
7e9c6eeb 101extern struct list_head nf_hooks[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
1da177e4 102
d1c85c2e 103#ifdef HAVE_JUMP_LABEL
c5905afb 104extern struct static_key nf_hooks_needed[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
d1c85c2e 105
a2d7ec58
ED
106static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
107{
108 if (__builtin_constant_p(pf) &&
109 __builtin_constant_p(hook))
c5905afb 110 return static_key_false(&nf_hooks_needed[pf][hook]);
a2d7ec58
ED
111
112 return !list_empty(&nf_hooks[pf][hook]);
113}
114#else
115static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
116{
117 return !list_empty(&nf_hooks[pf][hook]);
118}
119#endif
120
76108cea 121int nf_hook_slow(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
16a6677f
PM
122 struct net_device *indev, struct net_device *outdev,
123 int (*okfn)(struct sk_buff *), int thresh);
124
125/**
126 * nf_hook_thresh - call a netfilter hook
127 *
128 * Returns 1 if the hook has allowed the packet to pass. The function
129 * okfn must be invoked by the caller in this case. Any other return
130 * value indicates the packet has been consumed by the hook.
131 */
76108cea 132static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
3db05fea 133 struct sk_buff *skb,
16a6677f
PM
134 struct net_device *indev,
135 struct net_device *outdev,
23f3733d 136 int (*okfn)(struct sk_buff *), int thresh)
16a6677f 137{
a2d7ec58
ED
138 if (nf_hooks_active(pf, hook))
139 return nf_hook_slow(pf, hook, skb, indev, outdev, okfn, thresh);
140 return 1;
16a6677f
PM
141}
142
76108cea 143static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
16a6677f
PM
144 struct net_device *indev, struct net_device *outdev,
145 int (*okfn)(struct sk_buff *))
146{
23f3733d 147 return nf_hook_thresh(pf, hook, skb, indev, outdev, okfn, INT_MIN);
16a6677f 148}
1da177e4
LT
149
150/* Activate hook; either okfn or kfree_skb called, unless a hook
151 returns NF_STOLEN (in which case, it's up to the hook to deal with
152 the consequences).
153
154 Returns -ERRNO if packet dropped. Zero means queued, stolen or
155 accepted.
156*/
157
158/* RR:
159 > I don't want nf_hook to return anything because people might forget
160 > about async and trust the return value to mean "packet was ok".
161
162 AK:
163 Just document it clearly, then you can expect some sense from kernel
164 coders :)
165*/
166
2249065f
JE
167static inline int
168NF_HOOK_THRESH(uint8_t pf, unsigned int hook, struct sk_buff *skb,
169 struct net_device *in, struct net_device *out,
170 int (*okfn)(struct sk_buff *), int thresh)
171{
172 int ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, thresh);
173 if (ret == 1)
174 ret = okfn(skb);
175 return ret;
176}
48d5cad8 177
2249065f
JE
178static inline int
179NF_HOOK_COND(uint8_t pf, unsigned int hook, struct sk_buff *skb,
180 struct net_device *in, struct net_device *out,
181 int (*okfn)(struct sk_buff *), bool cond)
182{
4bac6b18
PM
183 int ret;
184
185 if (!cond ||
ac5aa2e3 186 ((ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, INT_MIN)) == 1))
2249065f
JE
187 ret = okfn(skb);
188 return ret;
189}
1da177e4 190
2249065f
JE
191static inline int
192NF_HOOK(uint8_t pf, unsigned int hook, struct sk_buff *skb,
193 struct net_device *in, struct net_device *out,
194 int (*okfn)(struct sk_buff *))
195{
196 return NF_HOOK_THRESH(pf, hook, skb, in, out, okfn, INT_MIN);
197}
1da177e4
LT
198
199/* Call setsockopt() */
76108cea 200int nf_setsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
b7058842 201 unsigned int len);
76108cea 202int nf_getsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
1da177e4 203 int *len);
c30f540b 204#ifdef CONFIG_COMPAT
76108cea 205int compat_nf_setsockopt(struct sock *sk, u_int8_t pf, int optval,
b7058842 206 char __user *opt, unsigned int len);
76108cea 207int compat_nf_getsockopt(struct sock *sk, u_int8_t pf, int optval,
3fdadf7d 208 char __user *opt, int *len);
c30f540b 209#endif
3fdadf7d 210
089af26c
HW
211/* Call this before modifying an existing packet: ensures it is
212 modifiable and linear to the point you care about (writable_len).
213 Returns true or false. */
a0f4ecf3 214int skb_make_writable(struct sk_buff *skb, unsigned int writable_len);
089af26c 215
1841a4c7 216struct flowi;
02f014d8 217struct nf_queue_entry;
c01cd429 218
bce8032e
PM
219struct nf_afinfo {
220 unsigned short family;
b51655b9 221 __sum16 (*checksum)(struct sk_buff *skb, unsigned int hook,
422c346f 222 unsigned int dataoff, u_int8_t protocol);
d63a6507
PM
223 __sum16 (*checksum_partial)(struct sk_buff *skb,
224 unsigned int hook,
225 unsigned int dataoff,
226 unsigned int len,
227 u_int8_t protocol);
31ad3dd6 228 int (*route)(struct net *net, struct dst_entry **dst,
0fae2e77 229 struct flowi *fl, bool strict);
bce8032e 230 void (*saveroute)(const struct sk_buff *skb,
02f014d8 231 struct nf_queue_entry *entry);
3db05fea 232 int (*reroute)(struct sk_buff *skb,
02f014d8 233 const struct nf_queue_entry *entry);
bce8032e 234 int route_key_size;
2cc7d573
HW
235};
236
0e60ebe0 237extern const struct nf_afinfo __rcu *nf_afinfo[NFPROTO_NUMPROTO];
1e796fda 238static inline const struct nf_afinfo *nf_get_afinfo(unsigned short family)
bce8032e
PM
239{
240 return rcu_dereference(nf_afinfo[family]);
241}
2cc7d573 242
b51655b9 243static inline __sum16
422c346f
PM
244nf_checksum(struct sk_buff *skb, unsigned int hook, unsigned int dataoff,
245 u_int8_t protocol, unsigned short family)
246{
1e796fda 247 const struct nf_afinfo *afinfo;
b51655b9 248 __sum16 csum = 0;
422c346f
PM
249
250 rcu_read_lock();
251 afinfo = nf_get_afinfo(family);
252 if (afinfo)
253 csum = afinfo->checksum(skb, hook, dataoff, protocol);
254 rcu_read_unlock();
255 return csum;
256}
257
d63a6507
PM
258static inline __sum16
259nf_checksum_partial(struct sk_buff *skb, unsigned int hook,
260 unsigned int dataoff, unsigned int len,
261 u_int8_t protocol, unsigned short family)
262{
263 const struct nf_afinfo *afinfo;
264 __sum16 csum = 0;
265
266 rcu_read_lock();
267 afinfo = nf_get_afinfo(family);
268 if (afinfo)
269 csum = afinfo->checksum_partial(skb, hook, dataoff, len,
270 protocol);
271 rcu_read_unlock();
272 return csum;
273}
274
a0f4ecf3
JP
275int nf_register_afinfo(const struct nf_afinfo *afinfo);
276void nf_unregister_afinfo(const struct nf_afinfo *afinfo);
bce8032e 277
eb9c7ebe 278#include <net/flow.h>
c7232c99 279extern void (*nf_nat_decode_session_hook)(struct sk_buff *, struct flowi *);
eb9c7ebe
PM
280
281static inline void
76108cea 282nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
eb9c7ebe 283{
051578cc 284#ifdef CONFIG_NF_NAT_NEEDED
eb9c7ebe
PM
285 void (*decodefn)(struct sk_buff *, struct flowi *);
286
c7232c99
PM
287 rcu_read_lock();
288 decodefn = rcu_dereference(nf_nat_decode_session_hook);
289 if (decodefn)
290 decodefn(skb, fl);
291 rcu_read_unlock();
eb9c7ebe
PM
292#endif
293}
294
1da177e4
LT
295#else /* !CONFIG_NETFILTER */
296#define NF_HOOK(pf, hook, skb, indev, outdev, okfn) (okfn)(skb)
48d5cad8 297#define NF_HOOK_COND(pf, hook, skb, indev, outdev, okfn, cond) (okfn)(skb)
76108cea 298static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
3db05fea 299 struct sk_buff *skb,
f53b61d8
DM
300 struct net_device *indev,
301 struct net_device *outdev,
23f3733d 302 int (*okfn)(struct sk_buff *), int thresh)
f53b61d8 303{
3db05fea 304 return okfn(skb);
f53b61d8 305}
76108cea 306static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
f53b61d8
DM
307 struct net_device *indev, struct net_device *outdev,
308 int (*okfn)(struct sk_buff *))
309{
9c92d348 310 return 1;
f53b61d8 311}
f53b61d8 312struct flowi;
eb9c7ebe 313static inline void
76108cea
JE
314nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
315{
316}
1da177e4
LT
317#endif /*CONFIG_NETFILTER*/
318
5f79e0f9 319#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
312a0c16 320extern void (*ip_ct_attach)(struct sk_buff *, const struct sk_buff *) __rcu;
a0f4ecf3 321void nf_ct_attach(struct sk_buff *, const struct sk_buff *);
0e60ebe0 322extern void (*nf_ct_destroy)(struct nf_conntrack *) __rcu;
9cb01766
PNA
323
324struct nf_conn;
41d73ec0 325enum ip_conntrack_info;
9cb01766
PNA
326struct nlattr;
327
328struct nfq_ct_hook {
329 size_t (*build_size)(const struct nf_conn *ct);
330 int (*build)(struct sk_buff *skb, struct nf_conn *ct);
331 int (*parse)(const struct nlattr *attr, struct nf_conn *ct);
bd077937
PNA
332 int (*attach_expect)(const struct nlattr *attr, struct nf_conn *ct,
333 u32 portid, u32 report);
8c88f87c 334 void (*seq_adjust)(struct sk_buff *skb, struct nf_conn *ct,
41d73ec0 335 enum ip_conntrack_info ctinfo, s32 off);
9cb01766 336};
41d73ec0 337extern struct nfq_ct_hook __rcu *nfq_ct_hook;
5f79e0f9
YK
338#else
339static inline void nf_ct_attach(struct sk_buff *new, struct sk_buff *skb) {}
340#endif
341
1da177e4 342#endif /*__LINUX_NETFILTER_H*/