blob: b8c88f3c85ff1967ccbaf0ce52b3618973df6d13 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001#ifndef __LINUX_NETFILTER_H
2#define __LINUX_NETFILTER_H
3
Linus Torvalds1da177e2005-04-16 15:20:36 -07004#include <linux/init.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -07005#include <linux/skbuff.h>
6#include <linux/net.h>
7#include <linux/if.h>
Jan Engelhardt2e3075a2008-01-14 23:40:34 -08008#include <linux/in.h>
9#include <linux/in6.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070010#include <linux/wait.h>
11#include <linux/list.h>
Zhouyi Zhoud1c85c22014-08-22 10:40:15 +080012#include <linux/static_key.h>
David Howells607ca462012-10-13 10:46:48 +010013#include <uapi/linux/netfilter.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#ifdef CONFIG_NETFILTER
Florian Westphalf615df72011-01-18 15:52:14 +010015static inline int NF_DROP_GETERR(int verdict)
16{
17 return -(verdict >> NF_VERDICT_QBITS);
18}
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Patrick McHardyb8beedd2008-03-25 20:09:33 -070020static inline int nf_inet_addr_cmp(const union nf_inet_addr *a1,
21 const union nf_inet_addr *a2)
22{
23 return a1->all[0] == a2->all[0] &&
24 a1->all[1] == a2->all[1] &&
25 a1->all[2] == a2->all[2] &&
26 a1->all[3] == a2->all[3];
27}
28
Denys Fedoryshchenkoefdedd52012-05-17 23:08:57 +030029static inline void nf_inet_addr_mask(const union nf_inet_addr *a1,
30 union nf_inet_addr *result,
31 const union nf_inet_addr *mask)
32{
33 result->all[0] = a1->all[0] & mask->all[0];
34 result->all[1] = a1->all[1] & mask->all[1];
35 result->all[2] = a1->all[2] & mask->all[2];
36 result->all[3] = a1->all[3] & mask->all[3];
37}
38
Joe Perchesa0f4ecf2013-09-26 14:48:15 -070039int netfilter_init(void);
Linus Torvalds1da177e2005-04-16 15:20:36 -070040
41/* Largest hook number + 1 */
42#define NF_MAX_HOOKS 8
43
44struct sk_buff;
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Patrick McHardy795aa6e2013-10-10 09:21:55 +020046struct nf_hook_ops;
David S. Millercfdfab32015-04-03 16:23:58 -040047
48struct nf_hook_state {
49 unsigned int hook;
50 int thresh;
51 u_int8_t pf;
52 struct net_device *in;
53 struct net_device *out;
54 int (*okfn)(struct sk_buff *);
55};
56
David Miller107a9f42015-04-05 22:18:54 -040057static inline void nf_hook_state_init(struct nf_hook_state *p,
58 unsigned int hook,
59 int thresh, u_int8_t pf,
60 struct net_device *indev,
61 struct net_device *outdev,
62 int (*okfn)(struct sk_buff *))
63{
64 p->hook = hook;
65 p->thresh = thresh;
66 p->pf = pf;
67 p->in = indev;
68 p->out = outdev;
69 p->okfn = okfn;
70}
71
Patrick McHardy795aa6e2013-10-10 09:21:55 +020072typedef unsigned int nf_hookfn(const struct nf_hook_ops *ops,
Herbert Xu3db05fe2007-10-15 00:53:15 -070073 struct sk_buff *skb,
David S. Miller238e54c2015-04-03 20:32:56 -040074 const struct nf_hook_state *state);
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
Eric Dumazetd94d9fe2009-11-04 09:50:58 -080076struct nf_hook_ops {
Linus Torvalds1da177e2005-04-16 15:20:36 -070077 struct list_head list;
78
79 /* User fills in from here down. */
Patrick McHardy96518512013-10-14 11:00:02 +020080 nf_hookfn *hook;
81 struct module *owner;
82 void *priv;
83 u_int8_t pf;
84 unsigned int hooknum;
Linus Torvalds1da177e2005-04-16 15:20:36 -070085 /* Hooks are ordered in ascending priority. */
Patrick McHardy96518512013-10-14 11:00:02 +020086 int priority;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087};
88
Eric Dumazetd94d9fe2009-11-04 09:50:58 -080089struct nf_sockopt_ops {
Linus Torvalds1da177e2005-04-16 15:20:36 -070090 struct list_head list;
91
Jan Engelhardt76108ce2008-10-08 11:35:00 +020092 u_int8_t pf;
Linus Torvalds1da177e2005-04-16 15:20:36 -070093
94 /* Non-inclusive ranges: use 0/0/NULL to never get called. */
95 int set_optmin;
96 int set_optmax;
97 int (*set)(struct sock *sk, int optval, void __user *user, unsigned int len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +010098#ifdef CONFIG_COMPAT
Dmitry Mishin3fdadf72006-03-20 22:45:21 -080099 int (*compat_set)(struct sock *sk, int optval,
100 void __user *user, unsigned int len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +0100101#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102 int get_optmin;
103 int get_optmax;
104 int (*get)(struct sock *sk, int optval, void __user *user, int *len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +0100105#ifdef CONFIG_COMPAT
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800106 int (*compat_get)(struct sock *sk, int optval,
107 void __user *user, int *len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +0100108#endif
Neil Horman16fcec32007-09-11 11:28:26 +0200109 /* Use the module struct to lock set/get code in place */
110 struct module *owner;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111};
112
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113/* Function to register/unregister hook points. */
114int nf_register_hook(struct nf_hook_ops *reg);
115void nf_unregister_hook(struct nf_hook_ops *reg);
Patrick McHardy972d1cb2006-04-06 14:09:12 -0700116int nf_register_hooks(struct nf_hook_ops *reg, unsigned int n);
117void nf_unregister_hooks(struct nf_hook_ops *reg, unsigned int n);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118
119/* Functions to register get/setsockopt ranges (non-inclusive). You
120 need to check permissions yourself! */
121int nf_register_sockopt(struct nf_sockopt_ops *reg);
122void nf_unregister_sockopt(struct nf_sockopt_ops *reg);
123
Jan Engelhardt7e9c6ee2008-10-08 11:35:00 +0200124extern struct list_head nf_hooks[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125
Zhouyi Zhoud1c85c22014-08-22 10:40:15 +0800126#ifdef HAVE_JUMP_LABEL
Ingo Molnarc5905af2012-02-24 08:31:31 +0100127extern struct static_key nf_hooks_needed[NFPROTO_NUMPROTO][NF_MAX_HOOKS];
Zhouyi Zhoud1c85c22014-08-22 10:40:15 +0800128
Eric Dumazeta2d7ec52011-11-18 17:32:46 +0000129static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
130{
131 if (__builtin_constant_p(pf) &&
132 __builtin_constant_p(hook))
Ingo Molnarc5905af2012-02-24 08:31:31 +0100133 return static_key_false(&nf_hooks_needed[pf][hook]);
Eric Dumazeta2d7ec52011-11-18 17:32:46 +0000134
135 return !list_empty(&nf_hooks[pf][hook]);
136}
137#else
138static inline bool nf_hooks_active(u_int8_t pf, unsigned int hook)
139{
140 return !list_empty(&nf_hooks[pf][hook]);
141}
142#endif
143
David S. Millercfdfab32015-04-03 16:23:58 -0400144int nf_hook_slow(struct sk_buff *skb, struct nf_hook_state *state);
Patrick McHardy16a66772006-01-06 23:01:48 -0800145
146/**
147 * nf_hook_thresh - call a netfilter hook
148 *
149 * Returns 1 if the hook has allowed the packet to pass. The function
150 * okfn must be invoked by the caller in this case. Any other return
151 * value indicates the packet has been consumed by the hook.
152 */
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200153static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
Herbert Xu3db05fe2007-10-15 00:53:15 -0700154 struct sk_buff *skb,
Patrick McHardy16a66772006-01-06 23:01:48 -0800155 struct net_device *indev,
156 struct net_device *outdev,
Jan Engelhardt23f37332009-06-05 17:31:46 +0200157 int (*okfn)(struct sk_buff *), int thresh)
Patrick McHardy16a66772006-01-06 23:01:48 -0800158{
David S. Millercfdfab32015-04-03 16:23:58 -0400159 if (nf_hooks_active(pf, hook)) {
David Miller107a9f42015-04-05 22:18:54 -0400160 struct nf_hook_state state;
David S. Millercfdfab32015-04-03 16:23:58 -0400161
David Miller107a9f42015-04-05 22:18:54 -0400162 nf_hook_state_init(&state, hook, thresh, pf,
163 indev, outdev, okfn);
David S. Millercfdfab32015-04-03 16:23:58 -0400164 return nf_hook_slow(skb, &state);
165 }
Eric Dumazeta2d7ec52011-11-18 17:32:46 +0000166 return 1;
Patrick McHardy16a66772006-01-06 23:01:48 -0800167}
168
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200169static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
Patrick McHardy16a66772006-01-06 23:01:48 -0800170 struct net_device *indev, struct net_device *outdev,
171 int (*okfn)(struct sk_buff *))
172{
Jan Engelhardt23f37332009-06-05 17:31:46 +0200173 return nf_hook_thresh(pf, hook, skb, indev, outdev, okfn, INT_MIN);
Patrick McHardy16a66772006-01-06 23:01:48 -0800174}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175
176/* Activate hook; either okfn or kfree_skb called, unless a hook
177 returns NF_STOLEN (in which case, it's up to the hook to deal with
178 the consequences).
179
180 Returns -ERRNO if packet dropped. Zero means queued, stolen or
181 accepted.
182*/
183
184/* RR:
185 > I don't want nf_hook to return anything because people might forget
186 > about async and trust the return value to mean "packet was ok".
187
188 AK:
189 Just document it clearly, then you can expect some sense from kernel
190 coders :)
191*/
192
Jan Engelhardt22490652009-06-13 04:13:26 +0200193static inline int
194NF_HOOK_THRESH(uint8_t pf, unsigned int hook, struct sk_buff *skb,
195 struct net_device *in, struct net_device *out,
196 int (*okfn)(struct sk_buff *), int thresh)
197{
198 int ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, thresh);
199 if (ret == 1)
200 ret = okfn(skb);
201 return ret;
202}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203
Jan Engelhardt22490652009-06-13 04:13:26 +0200204static inline int
205NF_HOOK_COND(uint8_t pf, unsigned int hook, struct sk_buff *skb,
206 struct net_device *in, struct net_device *out,
207 int (*okfn)(struct sk_buff *), bool cond)
208{
Patrick McHardy4bac6b12010-02-19 08:03:28 +0100209 int ret;
210
211 if (!cond ||
Eric Parisac5aa2e2010-11-12 08:26:06 +0100212 ((ret = nf_hook_thresh(pf, hook, skb, in, out, okfn, INT_MIN)) == 1))
Jan Engelhardt22490652009-06-13 04:13:26 +0200213 ret = okfn(skb);
214 return ret;
215}
Patrick McHardy16a66772006-01-06 23:01:48 -0800216
Jan Engelhardt22490652009-06-13 04:13:26 +0200217static inline int
218NF_HOOK(uint8_t pf, unsigned int hook, struct sk_buff *skb,
219 struct net_device *in, struct net_device *out,
220 int (*okfn)(struct sk_buff *))
221{
222 return NF_HOOK_THRESH(pf, hook, skb, in, out, okfn, INT_MIN);
223}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224
225/* Call setsockopt() */
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200226int nf_setsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
David S. Millerb7058842009-09-30 16:12:20 -0700227 unsigned int len);
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200228int nf_getsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229 int *len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +0100230#ifdef CONFIG_COMPAT
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200231int compat_nf_setsockopt(struct sock *sk, u_int8_t pf, int optval,
David S. Millerb7058842009-09-30 16:12:20 -0700232 char __user *opt, unsigned int len);
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200233int compat_nf_getsockopt(struct sock *sk, u_int8_t pf, int optval,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800234 char __user *opt, int *len);
Alexey Dobriyanc30f5402010-02-02 15:03:24 +0100235#endif
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800236
Harald Welte089af262005-08-09 19:37:23 -0700237/* Call this before modifying an existing packet: ensures it is
238 modifiable and linear to the point you care about (writable_len).
239 Returns true or false. */
Joe Perchesa0f4ecf2013-09-26 14:48:15 -0700240int skb_make_writable(struct sk_buff *skb, unsigned int writable_len);
Harald Welte089af262005-08-09 19:37:23 -0700241
Patrick McHardy1841a4c2007-12-05 01:22:05 -0800242struct flowi;
Patrick McHardy02f014d2007-12-05 01:26:33 -0800243struct nf_queue_entry;
Patrick McHardyc01cd422007-12-05 01:24:48 -0800244
Patrick McHardybce80322006-04-06 14:18:09 -0700245struct nf_afinfo {
246 unsigned short family;
Al Virob51655b2006-11-14 21:40:42 -0800247 __sum16 (*checksum)(struct sk_buff *skb, unsigned int hook,
Patrick McHardy422c3462006-04-06 14:18:43 -0700248 unsigned int dataoff, u_int8_t protocol);
Patrick McHardyd63a6502008-03-20 15:15:53 +0100249 __sum16 (*checksum_partial)(struct sk_buff *skb,
250 unsigned int hook,
251 unsigned int dataoff,
252 unsigned int len,
253 u_int8_t protocol);
Florian Westphal31ad3dd2011-04-04 16:56:29 +0200254 int (*route)(struct net *net, struct dst_entry **dst,
Florian Westphal0fae2e72011-04-04 17:00:54 +0200255 struct flowi *fl, bool strict);
Patrick McHardybce80322006-04-06 14:18:09 -0700256 void (*saveroute)(const struct sk_buff *skb,
Patrick McHardy02f014d2007-12-05 01:26:33 -0800257 struct nf_queue_entry *entry);
Herbert Xu3db05fe2007-10-15 00:53:15 -0700258 int (*reroute)(struct sk_buff *skb,
Patrick McHardy02f014d2007-12-05 01:26:33 -0800259 const struct nf_queue_entry *entry);
Patrick McHardybce80322006-04-06 14:18:09 -0700260 int route_key_size;
Harald Welte2cc7d572005-08-09 19:42:34 -0700261};
262
Eric Dumazet0e60ebe2010-11-15 18:17:21 +0100263extern const struct nf_afinfo __rcu *nf_afinfo[NFPROTO_NUMPROTO];
Patrick McHardy1e796fd2007-12-17 22:42:27 -0800264static inline const struct nf_afinfo *nf_get_afinfo(unsigned short family)
Patrick McHardybce80322006-04-06 14:18:09 -0700265{
266 return rcu_dereference(nf_afinfo[family]);
267}
Harald Welte2cc7d572005-08-09 19:42:34 -0700268
Al Virob51655b2006-11-14 21:40:42 -0800269static inline __sum16
Patrick McHardy422c3462006-04-06 14:18:43 -0700270nf_checksum(struct sk_buff *skb, unsigned int hook, unsigned int dataoff,
271 u_int8_t protocol, unsigned short family)
272{
Patrick McHardy1e796fd2007-12-17 22:42:27 -0800273 const struct nf_afinfo *afinfo;
Al Virob51655b2006-11-14 21:40:42 -0800274 __sum16 csum = 0;
Patrick McHardy422c3462006-04-06 14:18:43 -0700275
276 rcu_read_lock();
277 afinfo = nf_get_afinfo(family);
278 if (afinfo)
279 csum = afinfo->checksum(skb, hook, dataoff, protocol);
280 rcu_read_unlock();
281 return csum;
282}
283
Patrick McHardyd63a6502008-03-20 15:15:53 +0100284static inline __sum16
285nf_checksum_partial(struct sk_buff *skb, unsigned int hook,
286 unsigned int dataoff, unsigned int len,
287 u_int8_t protocol, unsigned short family)
288{
289 const struct nf_afinfo *afinfo;
290 __sum16 csum = 0;
291
292 rcu_read_lock();
293 afinfo = nf_get_afinfo(family);
294 if (afinfo)
295 csum = afinfo->checksum_partial(skb, hook, dataoff, len,
296 protocol);
297 rcu_read_unlock();
298 return csum;
299}
300
Joe Perchesa0f4ecf2013-09-26 14:48:15 -0700301int nf_register_afinfo(const struct nf_afinfo *afinfo);
302void nf_unregister_afinfo(const struct nf_afinfo *afinfo);
Patrick McHardybce80322006-04-06 14:18:09 -0700303
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800304#include <net/flow.h>
Patrick McHardyc7232c92012-08-26 19:14:06 +0200305extern void (*nf_nat_decode_session_hook)(struct sk_buff *, struct flowi *);
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800306
307static inline void
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200308nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800309{
Patrick McHardy051578c2007-12-17 22:42:51 -0800310#ifdef CONFIG_NF_NAT_NEEDED
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800311 void (*decodefn)(struct sk_buff *, struct flowi *);
312
Patrick McHardyc7232c92012-08-26 19:14:06 +0200313 rcu_read_lock();
314 decodefn = rcu_dereference(nf_nat_decode_session_hook);
315 if (decodefn)
316 decodefn(skb, fl);
317 rcu_read_unlock();
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800318#endif
319}
320
Linus Torvalds1da177e2005-04-16 15:20:36 -0700321#else /* !CONFIG_NETFILTER */
322#define NF_HOOK(pf, hook, skb, indev, outdev, okfn) (okfn)(skb)
Patrick McHardy48d5cad2006-02-15 15:10:22 -0800323#define NF_HOOK_COND(pf, hook, skb, indev, outdev, okfn, cond) (okfn)(skb)
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200324static inline int nf_hook_thresh(u_int8_t pf, unsigned int hook,
Herbert Xu3db05fe2007-10-15 00:53:15 -0700325 struct sk_buff *skb,
David S. Millerf53b61d2006-01-07 12:50:27 -0800326 struct net_device *indev,
327 struct net_device *outdev,
Jan Engelhardt23f37332009-06-05 17:31:46 +0200328 int (*okfn)(struct sk_buff *), int thresh)
David S. Millerf53b61d2006-01-07 12:50:27 -0800329{
Herbert Xu3db05fe2007-10-15 00:53:15 -0700330 return okfn(skb);
David S. Millerf53b61d2006-01-07 12:50:27 -0800331}
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200332static inline int nf_hook(u_int8_t pf, unsigned int hook, struct sk_buff *skb,
David S. Millerf53b61d2006-01-07 12:50:27 -0800333 struct net_device *indev, struct net_device *outdev,
334 int (*okfn)(struct sk_buff *))
335{
Patrick McHardy9c92d342006-02-15 15:18:19 -0800336 return 1;
David S. Millerf53b61d2006-01-07 12:50:27 -0800337}
David S. Millerf53b61d2006-01-07 12:50:27 -0800338struct flowi;
Patrick McHardyeb9c7eb2006-01-06 23:06:30 -0800339static inline void
Jan Engelhardt76108ce2008-10-08 11:35:00 +0200340nf_nat_decode_session(struct sk_buff *skb, struct flowi *fl, u_int8_t family)
341{
342}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343#endif /*CONFIG_NETFILTER*/
344
Yasuyuki Kozakai5f79e0f2007-03-23 11:17:07 -0700345#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
Patrick McHardy312a0c162013-07-28 22:54:08 +0200346extern void (*ip_ct_attach)(struct sk_buff *, const struct sk_buff *) __rcu;
Joe Perchesa0f4ecf2013-09-26 14:48:15 -0700347void nf_ct_attach(struct sk_buff *, const struct sk_buff *);
Eric Dumazet0e60ebe2010-11-15 18:17:21 +0100348extern void (*nf_ct_destroy)(struct nf_conntrack *) __rcu;
Pablo Neira Ayuso9cb01762012-06-07 12:13:39 +0200349
350struct nf_conn;
Patrick McHardy41d73ec2013-08-27 08:50:12 +0200351enum ip_conntrack_info;
Pablo Neira Ayuso9cb01762012-06-07 12:13:39 +0200352struct nlattr;
353
354struct nfq_ct_hook {
355 size_t (*build_size)(const struct nf_conn *ct);
356 int (*build)(struct sk_buff *skb, struct nf_conn *ct);
357 int (*parse)(const struct nlattr *attr, struct nf_conn *ct);
Pablo Neira Ayusobd077932013-08-07 18:13:20 +0200358 int (*attach_expect)(const struct nlattr *attr, struct nf_conn *ct,
359 u32 portid, u32 report);
Patrick McHardy41d73ec2013-08-27 08:50:12 +0200360 void (*seq_adjust)(struct sk_buff *skb, struct nf_conn *ct,
361 enum ip_conntrack_info ctinfo, s32 off);
Pablo Neira Ayusod584a612012-06-20 20:52:31 +0200362};
363extern struct nfq_ct_hook __rcu *nfq_ct_hook;
Yasuyuki Kozakai5f79e0f2007-03-23 11:17:07 -0700364#else
365static inline void nf_ct_attach(struct sk_buff *new, struct sk_buff *skb) {}
366#endif
367
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368#endif /*__LINUX_NETFILTER_H*/