]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/netfilter/nf_conntrack_expect.c
net: Fix files explicitly needing to include module.h
[mirror_ubuntu-bionic-kernel.git] / net / netfilter / nf_conntrack_expect.c
CommitLineData
77ab9cff
MJ
1/* Expectation handling for nf_conntrack. */
2
3/* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11
12#include <linux/types.h>
13#include <linux/netfilter.h>
14#include <linux/skbuff.h>
15#include <linux/proc_fs.h>
16#include <linux/seq_file.h>
17#include <linux/stddef.h>
18#include <linux/slab.h>
19#include <linux/err.h>
20#include <linux/percpu.h>
21#include <linux/kernel.h>
a71c0855 22#include <linux/jhash.h>
457c4cbc 23#include <net/net_namespace.h>
77ab9cff
MJ
24
25#include <net/netfilter/nf_conntrack.h>
26#include <net/netfilter/nf_conntrack_core.h>
27#include <net/netfilter/nf_conntrack_expect.h>
28#include <net/netfilter/nf_conntrack_helper.h>
29#include <net/netfilter/nf_conntrack_tuple.h>
5d0aa2cc 30#include <net/netfilter/nf_conntrack_zones.h>
77ab9cff 31
a71c0855
PM
32unsigned int nf_ct_expect_hsize __read_mostly;
33EXPORT_SYMBOL_GPL(nf_ct_expect_hsize);
34
f264a7df 35unsigned int nf_ct_expect_max __read_mostly;
a71c0855 36
e9c1b084 37static struct kmem_cache *nf_ct_expect_cachep __read_mostly;
77ab9cff 38
bc01befd
PNA
39static HLIST_HEAD(nf_ct_userspace_expect_list);
40
77ab9cff 41/* nf_conntrack_expect helper functions */
ebbf41df
PNA
42void nf_ct_unlink_expect_report(struct nf_conntrack_expect *exp,
43 u32 pid, int report)
77ab9cff
MJ
44{
45 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 46 struct net *net = nf_ct_exp_net(exp);
77ab9cff 47
77ab9cff
MJ
48 NF_CT_ASSERT(!timer_pending(&exp->timeout));
49
7d0742da 50 hlist_del_rcu(&exp->hnode);
9b03f38d 51 net->ct.expect_count--;
a71c0855 52
b560580a 53 hlist_del(&exp->lnode);
bc01befd
PNA
54 if (!(exp->flags & NF_CT_EXPECT_USERSPACE))
55 master_help->expecting[exp->class]--;
56
ebbf41df 57 nf_ct_expect_event_report(IPEXP_DESTROY, exp, pid, report);
6823645d 58 nf_ct_expect_put(exp);
b560580a 59
0d55af87 60 NF_CT_STAT_INC(net, expect_delete);
77ab9cff 61}
ebbf41df 62EXPORT_SYMBOL_GPL(nf_ct_unlink_expect_report);
77ab9cff 63
6823645d 64static void nf_ct_expectation_timed_out(unsigned long ul_expect)
77ab9cff
MJ
65{
66 struct nf_conntrack_expect *exp = (void *)ul_expect;
67
f8ba1aff 68 spin_lock_bh(&nf_conntrack_lock);
77ab9cff 69 nf_ct_unlink_expect(exp);
f8ba1aff 70 spin_unlock_bh(&nf_conntrack_lock);
6823645d 71 nf_ct_expect_put(exp);
77ab9cff
MJ
72}
73
a71c0855
PM
74static unsigned int nf_ct_expect_dst_hash(const struct nf_conntrack_tuple *tuple)
75{
34498825
PM
76 unsigned int hash;
77
f682cefa
CG
78 if (unlikely(!nf_conntrack_hash_rnd)) {
79 init_nf_conntrack_hash_rnd();
a71c0855
PM
80 }
81
34498825 82 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all),
a71c0855 83 (((tuple->dst.protonum ^ tuple->src.l3num) << 16) |
f682cefa 84 (__force __u16)tuple->dst.u.all) ^ nf_conntrack_hash_rnd);
34498825 85 return ((u64)hash * nf_ct_expect_hsize) >> 32;
a71c0855
PM
86}
87
77ab9cff 88struct nf_conntrack_expect *
5d0aa2cc
PM
89__nf_ct_expect_find(struct net *net, u16 zone,
90 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
91{
92 struct nf_conntrack_expect *i;
a71c0855
PM
93 struct hlist_node *n;
94 unsigned int h;
95
9b03f38d 96 if (!net->ct.expect_count)
a71c0855 97 return NULL;
77ab9cff 98
a71c0855 99 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 100 hlist_for_each_entry_rcu(i, n, &net->ct.expect_hash[h], hnode) {
5d0aa2cc
PM
101 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
102 nf_ct_zone(i->master) == zone)
77ab9cff
MJ
103 return i;
104 }
105 return NULL;
106}
6823645d 107EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
77ab9cff
MJ
108
109/* Just find a expectation corresponding to a tuple. */
110struct nf_conntrack_expect *
5d0aa2cc
PM
111nf_ct_expect_find_get(struct net *net, u16 zone,
112 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
113{
114 struct nf_conntrack_expect *i;
115
7d0742da 116 rcu_read_lock();
5d0aa2cc 117 i = __nf_ct_expect_find(net, zone, tuple);
7d0742da
PM
118 if (i && !atomic_inc_not_zero(&i->use))
119 i = NULL;
120 rcu_read_unlock();
77ab9cff
MJ
121
122 return i;
123}
6823645d 124EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
77ab9cff
MJ
125
126/* If an expectation for this connection is found, it gets delete from
127 * global list then returned. */
128struct nf_conntrack_expect *
5d0aa2cc
PM
129nf_ct_find_expectation(struct net *net, u16 zone,
130 const struct nf_conntrack_tuple *tuple)
77ab9cff 131{
359b9ab6
PM
132 struct nf_conntrack_expect *i, *exp = NULL;
133 struct hlist_node *n;
134 unsigned int h;
135
9b03f38d 136 if (!net->ct.expect_count)
359b9ab6 137 return NULL;
ece00641 138
359b9ab6 139 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 140 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
359b9ab6 141 if (!(i->flags & NF_CT_EXPECT_INACTIVE) &&
5d0aa2cc
PM
142 nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
143 nf_ct_zone(i->master) == zone) {
359b9ab6
PM
144 exp = i;
145 break;
146 }
147 }
ece00641
YK
148 if (!exp)
149 return NULL;
77ab9cff 150
77ab9cff
MJ
151 /* If master is not in hash table yet (ie. packet hasn't left
152 this machine yet), how can other end know about expected?
153 Hence these are not the droids you are looking for (if
154 master ct never got confirmed, we'd hold a reference to it
155 and weird things would happen to future packets). */
ece00641
YK
156 if (!nf_ct_is_confirmed(exp->master))
157 return NULL;
158
159 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
160 atomic_inc(&exp->use);
161 return exp;
162 } else if (del_timer(&exp->timeout)) {
163 nf_ct_unlink_expect(exp);
164 return exp;
77ab9cff 165 }
ece00641 166
77ab9cff
MJ
167 return NULL;
168}
169
170/* delete all expectations for this conntrack */
171void nf_ct_remove_expectations(struct nf_conn *ct)
172{
77ab9cff 173 struct nf_conn_help *help = nfct_help(ct);
b560580a
PM
174 struct nf_conntrack_expect *exp;
175 struct hlist_node *n, *next;
77ab9cff
MJ
176
177 /* Optimization: most connection never expect any others. */
6002f266 178 if (!help)
77ab9cff
MJ
179 return;
180
b560580a
PM
181 hlist_for_each_entry_safe(exp, n, next, &help->expectations, lnode) {
182 if (del_timer(&exp->timeout)) {
183 nf_ct_unlink_expect(exp);
184 nf_ct_expect_put(exp);
601e68e1 185 }
77ab9cff
MJ
186 }
187}
13b18339 188EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
77ab9cff
MJ
189
190/* Would two expected things clash? */
191static inline int expect_clash(const struct nf_conntrack_expect *a,
192 const struct nf_conntrack_expect *b)
193{
194 /* Part covered by intersection of masks must be unequal,
195 otherwise they clash */
d4156e8c 196 struct nf_conntrack_tuple_mask intersect_mask;
77ab9cff
MJ
197 int count;
198
77ab9cff 199 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
77ab9cff
MJ
200
201 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
202 intersect_mask.src.u3.all[count] =
203 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
204 }
205
77ab9cff
MJ
206 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask);
207}
208
209static inline int expect_matches(const struct nf_conntrack_expect *a,
210 const struct nf_conntrack_expect *b)
211{
f64f9e71
JP
212 return a->master == b->master && a->class == b->class &&
213 nf_ct_tuple_equal(&a->tuple, &b->tuple) &&
5d0aa2cc
PM
214 nf_ct_tuple_mask_equal(&a->mask, &b->mask) &&
215 nf_ct_zone(a->master) == nf_ct_zone(b->master);
77ab9cff
MJ
216}
217
218/* Generally a bad idea to call this: could have matched already. */
6823645d 219void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
77ab9cff 220{
f8ba1aff 221 spin_lock_bh(&nf_conntrack_lock);
4e1d4e6c
PM
222 if (del_timer(&exp->timeout)) {
223 nf_ct_unlink_expect(exp);
224 nf_ct_expect_put(exp);
77ab9cff 225 }
f8ba1aff 226 spin_unlock_bh(&nf_conntrack_lock);
77ab9cff 227}
6823645d 228EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
77ab9cff
MJ
229
230/* We don't increase the master conntrack refcount for non-fulfilled
231 * conntracks. During the conntrack destruction, the expectations are
232 * always killed before the conntrack itself */
6823645d 233struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
77ab9cff
MJ
234{
235 struct nf_conntrack_expect *new;
236
6823645d 237 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
77ab9cff
MJ
238 if (!new)
239 return NULL;
240
241 new->master = me;
242 atomic_set(&new->use, 1);
243 return new;
244}
6823645d 245EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
77ab9cff 246
6002f266 247void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
76108cea 248 u_int8_t family,
1d9d7522
PM
249 const union nf_inet_addr *saddr,
250 const union nf_inet_addr *daddr,
251 u_int8_t proto, const __be16 *src, const __be16 *dst)
d6a9b650
PM
252{
253 int len;
254
255 if (family == AF_INET)
256 len = 4;
257 else
258 len = 16;
259
260 exp->flags = 0;
6002f266 261 exp->class = class;
d6a9b650
PM
262 exp->expectfn = NULL;
263 exp->helper = NULL;
264 exp->tuple.src.l3num = family;
265 exp->tuple.dst.protonum = proto;
d6a9b650
PM
266
267 if (saddr) {
268 memcpy(&exp->tuple.src.u3, saddr, len);
269 if (sizeof(exp->tuple.src.u3) > len)
270 /* address needs to be cleared for nf_ct_tuple_equal */
271 memset((void *)&exp->tuple.src.u3 + len, 0x00,
272 sizeof(exp->tuple.src.u3) - len);
273 memset(&exp->mask.src.u3, 0xFF, len);
274 if (sizeof(exp->mask.src.u3) > len)
275 memset((void *)&exp->mask.src.u3 + len, 0x00,
276 sizeof(exp->mask.src.u3) - len);
277 } else {
278 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
279 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
280 }
281
d6a9b650 282 if (src) {
a34c4589
AV
283 exp->tuple.src.u.all = *src;
284 exp->mask.src.u.all = htons(0xFFFF);
d6a9b650
PM
285 } else {
286 exp->tuple.src.u.all = 0;
287 exp->mask.src.u.all = 0;
288 }
289
d4156e8c
PM
290 memcpy(&exp->tuple.dst.u3, daddr, len);
291 if (sizeof(exp->tuple.dst.u3) > len)
292 /* address needs to be cleared for nf_ct_tuple_equal */
293 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
294 sizeof(exp->tuple.dst.u3) - len);
295
a34c4589 296 exp->tuple.dst.u.all = *dst;
d6a9b650 297}
6823645d 298EXPORT_SYMBOL_GPL(nf_ct_expect_init);
d6a9b650 299
7d0742da
PM
300static void nf_ct_expect_free_rcu(struct rcu_head *head)
301{
302 struct nf_conntrack_expect *exp;
303
304 exp = container_of(head, struct nf_conntrack_expect, rcu);
305 kmem_cache_free(nf_ct_expect_cachep, exp);
306}
307
6823645d 308void nf_ct_expect_put(struct nf_conntrack_expect *exp)
77ab9cff
MJ
309{
310 if (atomic_dec_and_test(&exp->use))
7d0742da 311 call_rcu(&exp->rcu, nf_ct_expect_free_rcu);
77ab9cff 312}
6823645d 313EXPORT_SYMBOL_GPL(nf_ct_expect_put);
77ab9cff 314
6823645d 315static void nf_ct_expect_insert(struct nf_conntrack_expect *exp)
77ab9cff
MJ
316{
317 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 318 struct net *net = nf_ct_exp_net(exp);
6002f266 319 const struct nf_conntrack_expect_policy *p;
a71c0855 320 unsigned int h = nf_ct_expect_dst_hash(&exp->tuple);
77ab9cff 321
3bfd45f9
ED
322 /* two references : one for hash insert, one for the timer */
323 atomic_add(2, &exp->use);
b560580a 324
bc01befd
PNA
325 if (master_help) {
326 hlist_add_head(&exp->lnode, &master_help->expectations);
327 master_help->expecting[exp->class]++;
328 } else if (exp->flags & NF_CT_EXPECT_USERSPACE)
329 hlist_add_head(&exp->lnode, &nf_ct_userspace_expect_list);
a71c0855 330
9b03f38d
AD
331 hlist_add_head_rcu(&exp->hnode, &net->ct.expect_hash[h]);
332 net->ct.expect_count++;
77ab9cff 333
6823645d
PM
334 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
335 (unsigned long)exp);
bc01befd 336 if (master_help) {
c5d277d2
ED
337 p = &rcu_dereference_protected(
338 master_help->helper,
339 lockdep_is_held(&nf_conntrack_lock)
340 )->expect_policy[exp->class];
bc01befd
PNA
341 exp->timeout.expires = jiffies + p->timeout * HZ;
342 }
77ab9cff
MJ
343 add_timer(&exp->timeout);
344
0d55af87 345 NF_CT_STAT_INC(net, expect_create);
77ab9cff
MJ
346}
347
348/* Race with expectations being used means we could have none to find; OK. */
6002f266
PM
349static void evict_oldest_expect(struct nf_conn *master,
350 struct nf_conntrack_expect *new)
77ab9cff 351{
b560580a 352 struct nf_conn_help *master_help = nfct_help(master);
6002f266 353 struct nf_conntrack_expect *exp, *last = NULL;
b560580a 354 struct hlist_node *n;
77ab9cff 355
6002f266
PM
356 hlist_for_each_entry(exp, n, &master_help->expectations, lnode) {
357 if (exp->class == new->class)
358 last = exp;
359 }
b560580a 360
6002f266
PM
361 if (last && del_timer(&last->timeout)) {
362 nf_ct_unlink_expect(last);
363 nf_ct_expect_put(last);
77ab9cff
MJ
364 }
365}
366
367static inline int refresh_timer(struct nf_conntrack_expect *i)
368{
369 struct nf_conn_help *master_help = nfct_help(i->master);
6002f266 370 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
371
372 if (!del_timer(&i->timeout))
373 return 0;
374
c5d277d2
ED
375 p = &rcu_dereference_protected(
376 master_help->helper,
377 lockdep_is_held(&nf_conntrack_lock)
378 )->expect_policy[i->class];
6002f266 379 i->timeout.expires = jiffies + p->timeout * HZ;
77ab9cff
MJ
380 add_timer(&i->timeout);
381 return 1;
382}
383
19abb7b0 384static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
77ab9cff 385{
6002f266 386 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
387 struct nf_conntrack_expect *i;
388 struct nf_conn *master = expect->master;
389 struct nf_conn_help *master_help = nfct_help(master);
9b03f38d 390 struct net *net = nf_ct_exp_net(expect);
a71c0855
PM
391 struct hlist_node *n;
392 unsigned int h;
83731671 393 int ret = 1;
77ab9cff 394
bc01befd
PNA
395 /* Don't allow expectations created from kernel-space with no helper */
396 if (!(expect->flags & NF_CT_EXPECT_USERSPACE) &&
397 (!master_help || (master_help && !master_help->helper))) {
3c158f7f
PM
398 ret = -ESHUTDOWN;
399 goto out;
400 }
a71c0855 401 h = nf_ct_expect_dst_hash(&expect->tuple);
9b03f38d 402 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
77ab9cff
MJ
403 if (expect_matches(i, expect)) {
404 /* Refresh timer: if it's dying, ignore.. */
405 if (refresh_timer(i)) {
406 ret = 0;
407 goto out;
408 }
409 } else if (expect_clash(i, expect)) {
410 ret = -EBUSY;
411 goto out;
412 }
413 }
414 /* Will be over limit? */
bc01befd 415 if (master_help) {
c5d277d2
ED
416 p = &rcu_dereference_protected(
417 master_help->helper,
418 lockdep_is_held(&nf_conntrack_lock)
419 )->expect_policy[expect->class];
bc01befd
PNA
420 if (p->max_expected &&
421 master_help->expecting[expect->class] >= p->max_expected) {
422 evict_oldest_expect(master, expect);
423 if (master_help->expecting[expect->class]
424 >= p->max_expected) {
425 ret = -EMFILE;
426 goto out;
427 }
6002f266
PM
428 }
429 }
77ab9cff 430
9b03f38d 431 if (net->ct.expect_count >= nf_ct_expect_max) {
f264a7df
PM
432 if (net_ratelimit())
433 printk(KERN_WARNING
3d89e9cf 434 "nf_conntrack: expectation table full\n");
f264a7df 435 ret = -EMFILE;
f264a7df 436 }
19abb7b0
PNA
437out:
438 return ret;
439}
440
83731671
PNA
441int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
442 u32 pid, int report)
19abb7b0
PNA
443{
444 int ret;
445
446 spin_lock_bh(&nf_conntrack_lock);
447 ret = __nf_ct_expect_check(expect);
83731671 448 if (ret <= 0)
19abb7b0 449 goto out;
f264a7df 450
83731671 451 ret = 0;
6823645d 452 nf_ct_expect_insert(expect);
f8ba1aff 453 spin_unlock_bh(&nf_conntrack_lock);
83731671 454 nf_ct_expect_event_report(IPEXP_NEW, expect, pid, report);
77ab9cff 455 return ret;
19abb7b0
PNA
456out:
457 spin_unlock_bh(&nf_conntrack_lock);
19abb7b0
PNA
458 return ret;
459}
460EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
461
bc01befd
PNA
462void nf_ct_remove_userspace_expectations(void)
463{
464 struct nf_conntrack_expect *exp;
465 struct hlist_node *n, *next;
466
467 hlist_for_each_entry_safe(exp, n, next,
468 &nf_ct_userspace_expect_list, lnode) {
469 if (del_timer(&exp->timeout)) {
470 nf_ct_unlink_expect(exp);
471 nf_ct_expect_put(exp);
472 }
473 }
474}
475EXPORT_SYMBOL_GPL(nf_ct_remove_userspace_expectations);
476
77ab9cff 477#ifdef CONFIG_PROC_FS
5d08ad44 478struct ct_expect_iter_state {
dc5129f8 479 struct seq_net_private p;
5d08ad44
PM
480 unsigned int bucket;
481};
482
483static struct hlist_node *ct_expect_get_first(struct seq_file *seq)
77ab9cff 484{
dc5129f8 485 struct net *net = seq_file_net(seq);
5d08ad44 486 struct ct_expect_iter_state *st = seq->private;
7d0742da 487 struct hlist_node *n;
77ab9cff 488
5d08ad44 489 for (st->bucket = 0; st->bucket < nf_ct_expect_hsize; st->bucket++) {
0e60ebe0 490 n = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
7d0742da
PM
491 if (n)
492 return n;
5d08ad44
PM
493 }
494 return NULL;
495}
77ab9cff 496
5d08ad44
PM
497static struct hlist_node *ct_expect_get_next(struct seq_file *seq,
498 struct hlist_node *head)
499{
dc5129f8 500 struct net *net = seq_file_net(seq);
5d08ad44 501 struct ct_expect_iter_state *st = seq->private;
77ab9cff 502
0e60ebe0 503 head = rcu_dereference(hlist_next_rcu(head));
5d08ad44
PM
504 while (head == NULL) {
505 if (++st->bucket >= nf_ct_expect_hsize)
77ab9cff 506 return NULL;
0e60ebe0 507 head = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
77ab9cff 508 }
5d08ad44 509 return head;
77ab9cff
MJ
510}
511
5d08ad44 512static struct hlist_node *ct_expect_get_idx(struct seq_file *seq, loff_t pos)
77ab9cff 513{
5d08ad44 514 struct hlist_node *head = ct_expect_get_first(seq);
77ab9cff 515
5d08ad44
PM
516 if (head)
517 while (pos && (head = ct_expect_get_next(seq, head)))
518 pos--;
519 return pos ? NULL : head;
520}
77ab9cff 521
5d08ad44 522static void *exp_seq_start(struct seq_file *seq, loff_t *pos)
7d0742da 523 __acquires(RCU)
5d08ad44 524{
7d0742da 525 rcu_read_lock();
5d08ad44
PM
526 return ct_expect_get_idx(seq, *pos);
527}
77ab9cff 528
5d08ad44
PM
529static void *exp_seq_next(struct seq_file *seq, void *v, loff_t *pos)
530{
531 (*pos)++;
532 return ct_expect_get_next(seq, v);
77ab9cff
MJ
533}
534
5d08ad44 535static void exp_seq_stop(struct seq_file *seq, void *v)
7d0742da 536 __releases(RCU)
77ab9cff 537{
7d0742da 538 rcu_read_unlock();
77ab9cff
MJ
539}
540
541static int exp_seq_show(struct seq_file *s, void *v)
542{
5d08ad44 543 struct nf_conntrack_expect *expect;
b87921bd 544 struct nf_conntrack_helper *helper;
5d08ad44 545 struct hlist_node *n = v;
359b9ab6 546 char *delim = "";
5d08ad44
PM
547
548 expect = hlist_entry(n, struct nf_conntrack_expect, hnode);
77ab9cff
MJ
549
550 if (expect->timeout.function)
551 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
552 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
553 else
554 seq_printf(s, "- ");
555 seq_printf(s, "l3proto = %u proto=%u ",
556 expect->tuple.src.l3num,
557 expect->tuple.dst.protonum);
558 print_tuple(s, &expect->tuple,
559 __nf_ct_l3proto_find(expect->tuple.src.l3num),
605dcad6 560 __nf_ct_l4proto_find(expect->tuple.src.l3num,
77ab9cff 561 expect->tuple.dst.protonum));
4bb119ea 562
359b9ab6
PM
563 if (expect->flags & NF_CT_EXPECT_PERMANENT) {
564 seq_printf(s, "PERMANENT");
565 delim = ",";
566 }
bc01befd 567 if (expect->flags & NF_CT_EXPECT_INACTIVE) {
359b9ab6 568 seq_printf(s, "%sINACTIVE", delim);
bc01befd
PNA
569 delim = ",";
570 }
571 if (expect->flags & NF_CT_EXPECT_USERSPACE)
572 seq_printf(s, "%sUSERSPACE", delim);
4bb119ea 573
b87921bd
PM
574 helper = rcu_dereference(nfct_help(expect->master)->helper);
575 if (helper) {
576 seq_printf(s, "%s%s", expect->flags ? " " : "", helper->name);
577 if (helper->expect_policy[expect->class].name)
578 seq_printf(s, "/%s",
579 helper->expect_policy[expect->class].name);
580 }
581
77ab9cff
MJ
582 return seq_putc(s, '\n');
583}
584
56b3d975 585static const struct seq_operations exp_seq_ops = {
77ab9cff
MJ
586 .start = exp_seq_start,
587 .next = exp_seq_next,
588 .stop = exp_seq_stop,
589 .show = exp_seq_show
590};
591
592static int exp_open(struct inode *inode, struct file *file)
593{
dc5129f8 594 return seq_open_net(inode, file, &exp_seq_ops,
e2da5913 595 sizeof(struct ct_expect_iter_state));
77ab9cff
MJ
596}
597
5d08ad44 598static const struct file_operations exp_file_ops = {
77ab9cff
MJ
599 .owner = THIS_MODULE,
600 .open = exp_open,
601 .read = seq_read,
602 .llseek = seq_lseek,
dc5129f8 603 .release = seq_release_net,
77ab9cff
MJ
604};
605#endif /* CONFIG_PROC_FS */
e9c1b084 606
dc5129f8 607static int exp_proc_init(struct net *net)
e9c1b084
PM
608{
609#ifdef CONFIG_PROC_FS
610 struct proc_dir_entry *proc;
611
dc5129f8 612 proc = proc_net_fops_create(net, "nf_conntrack_expect", 0440, &exp_file_ops);
e9c1b084
PM
613 if (!proc)
614 return -ENOMEM;
615#endif /* CONFIG_PROC_FS */
616 return 0;
617}
618
dc5129f8 619static void exp_proc_remove(struct net *net)
e9c1b084
PM
620{
621#ifdef CONFIG_PROC_FS
dc5129f8 622 proc_net_remove(net, "nf_conntrack_expect");
e9c1b084
PM
623#endif /* CONFIG_PROC_FS */
624}
625
13ccdfc2 626module_param_named(expect_hashsize, nf_ct_expect_hsize, uint, 0400);
a71c0855 627
9b03f38d 628int nf_conntrack_expect_init(struct net *net)
e9c1b084 629{
a71c0855
PM
630 int err = -ENOMEM;
631
08f6547d
AD
632 if (net_eq(net, &init_net)) {
633 if (!nf_ct_expect_hsize) {
d696c7bd 634 nf_ct_expect_hsize = net->ct.htable_size / 256;
08f6547d
AD
635 if (!nf_ct_expect_hsize)
636 nf_ct_expect_hsize = 1;
637 }
638 nf_ct_expect_max = nf_ct_expect_hsize * 4;
a71c0855
PM
639 }
640
9b03f38d 641 net->ct.expect_count = 0;
d862a662 642 net->ct.expect_hash = nf_ct_alloc_hashtable(&nf_ct_expect_hsize, 0);
9b03f38d 643 if (net->ct.expect_hash == NULL)
a71c0855 644 goto err1;
e9c1b084 645
08f6547d
AD
646 if (net_eq(net, &init_net)) {
647 nf_ct_expect_cachep = kmem_cache_create("nf_conntrack_expect",
e9c1b084 648 sizeof(struct nf_conntrack_expect),
20c2df83 649 0, 0, NULL);
08f6547d
AD
650 if (!nf_ct_expect_cachep)
651 goto err2;
652 }
e9c1b084 653
dc5129f8 654 err = exp_proc_init(net);
e9c1b084 655 if (err < 0)
a71c0855 656 goto err3;
e9c1b084
PM
657
658 return 0;
659
a71c0855 660err3:
08f6547d
AD
661 if (net_eq(net, &init_net))
662 kmem_cache_destroy(nf_ct_expect_cachep);
12293bf9 663err2:
d862a662 664 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
a71c0855 665err1:
e9c1b084
PM
666 return err;
667}
668
9b03f38d 669void nf_conntrack_expect_fini(struct net *net)
e9c1b084 670{
dc5129f8 671 exp_proc_remove(net);
308ff823
JDB
672 if (net_eq(net, &init_net)) {
673 rcu_barrier(); /* Wait for call_rcu() before destroy */
08f6547d 674 kmem_cache_destroy(nf_ct_expect_cachep);
308ff823 675 }
d862a662 676 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
e9c1b084 677}