]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/netfilter/nf_conntrack_expect.c
[NETFILTER]: nf_conntrack_ftp: use nf_ct_expect_init
[mirror_ubuntu-artful-kernel.git] / net / netfilter / nf_conntrack_expect.c
CommitLineData
77ab9cff
MJ
1/* Expectation handling for nf_conntrack. */
2
3/* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11
12#include <linux/types.h>
13#include <linux/netfilter.h>
14#include <linux/skbuff.h>
15#include <linux/proc_fs.h>
16#include <linux/seq_file.h>
17#include <linux/stddef.h>
18#include <linux/slab.h>
19#include <linux/err.h>
20#include <linux/percpu.h>
21#include <linux/kernel.h>
22
23#include <net/netfilter/nf_conntrack.h>
24#include <net/netfilter/nf_conntrack_core.h>
25#include <net/netfilter/nf_conntrack_expect.h>
26#include <net/netfilter/nf_conntrack_helper.h>
27#include <net/netfilter/nf_conntrack_tuple.h>
28
6823645d
PM
29LIST_HEAD(nf_ct_expect_list);
30EXPORT_SYMBOL_GPL(nf_ct_expect_list);
13b18339 31
6823645d
PM
32struct kmem_cache *nf_ct_expect_cachep __read_mostly;
33static unsigned int nf_ct_expect_next_id;
77ab9cff
MJ
34
35/* nf_conntrack_expect helper functions */
36void nf_ct_unlink_expect(struct nf_conntrack_expect *exp)
37{
38 struct nf_conn_help *master_help = nfct_help(exp->master);
39
40 NF_CT_ASSERT(master_help);
41 NF_CT_ASSERT(!timer_pending(&exp->timeout));
42
43 list_del(&exp->list);
44 NF_CT_STAT_INC(expect_delete);
45 master_help->expecting--;
6823645d 46 nf_ct_expect_put(exp);
77ab9cff 47}
13b18339 48EXPORT_SYMBOL_GPL(nf_ct_unlink_expect);
77ab9cff 49
6823645d 50static void nf_ct_expectation_timed_out(unsigned long ul_expect)
77ab9cff
MJ
51{
52 struct nf_conntrack_expect *exp = (void *)ul_expect;
53
54 write_lock_bh(&nf_conntrack_lock);
55 nf_ct_unlink_expect(exp);
56 write_unlock_bh(&nf_conntrack_lock);
6823645d 57 nf_ct_expect_put(exp);
77ab9cff
MJ
58}
59
60struct nf_conntrack_expect *
6823645d 61__nf_ct_expect_find(const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
62{
63 struct nf_conntrack_expect *i;
64
6823645d 65 list_for_each_entry(i, &nf_ct_expect_list, list) {
77ab9cff
MJ
66 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask))
67 return i;
68 }
69 return NULL;
70}
6823645d 71EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
77ab9cff
MJ
72
73/* Just find a expectation corresponding to a tuple. */
74struct nf_conntrack_expect *
6823645d 75nf_ct_expect_find_get(const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
76{
77 struct nf_conntrack_expect *i;
78
79 read_lock_bh(&nf_conntrack_lock);
6823645d 80 i = __nf_ct_expect_find(tuple);
77ab9cff
MJ
81 if (i)
82 atomic_inc(&i->use);
83 read_unlock_bh(&nf_conntrack_lock);
84
85 return i;
86}
6823645d 87EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
77ab9cff
MJ
88
89/* If an expectation for this connection is found, it gets delete from
90 * global list then returned. */
91struct nf_conntrack_expect *
6823645d 92nf_ct_find_expectation(const struct nf_conntrack_tuple *tuple)
77ab9cff 93{
ece00641
YK
94 struct nf_conntrack_expect *exp;
95
6823645d 96 exp = __nf_ct_expect_find(tuple);
ece00641
YK
97 if (!exp)
98 return NULL;
77ab9cff 99
77ab9cff
MJ
100 /* If master is not in hash table yet (ie. packet hasn't left
101 this machine yet), how can other end know about expected?
102 Hence these are not the droids you are looking for (if
103 master ct never got confirmed, we'd hold a reference to it
104 and weird things would happen to future packets). */
ece00641
YK
105 if (!nf_ct_is_confirmed(exp->master))
106 return NULL;
107
108 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
109 atomic_inc(&exp->use);
110 return exp;
111 } else if (del_timer(&exp->timeout)) {
112 nf_ct_unlink_expect(exp);
113 return exp;
77ab9cff 114 }
ece00641 115
77ab9cff
MJ
116 return NULL;
117}
118
119/* delete all expectations for this conntrack */
120void nf_ct_remove_expectations(struct nf_conn *ct)
121{
122 struct nf_conntrack_expect *i, *tmp;
123 struct nf_conn_help *help = nfct_help(ct);
124
125 /* Optimization: most connection never expect any others. */
126 if (!help || help->expecting == 0)
127 return;
128
6823645d 129 list_for_each_entry_safe(i, tmp, &nf_ct_expect_list, list) {
77ab9cff
MJ
130 if (i->master == ct && del_timer(&i->timeout)) {
131 nf_ct_unlink_expect(i);
6823645d 132 nf_ct_expect_put(i);
601e68e1 133 }
77ab9cff
MJ
134 }
135}
13b18339 136EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
77ab9cff
MJ
137
138/* Would two expected things clash? */
139static inline int expect_clash(const struct nf_conntrack_expect *a,
140 const struct nf_conntrack_expect *b)
141{
142 /* Part covered by intersection of masks must be unequal,
143 otherwise they clash */
144 struct nf_conntrack_tuple intersect_mask;
145 int count;
146
147 intersect_mask.src.l3num = a->mask.src.l3num & b->mask.src.l3num;
148 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
149 intersect_mask.dst.u.all = a->mask.dst.u.all & b->mask.dst.u.all;
150 intersect_mask.dst.protonum = a->mask.dst.protonum
151 & b->mask.dst.protonum;
152
153 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
154 intersect_mask.src.u3.all[count] =
155 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
156 }
157
158 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
159 intersect_mask.dst.u3.all[count] =
160 a->mask.dst.u3.all[count] & b->mask.dst.u3.all[count];
161 }
162
163 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask);
164}
165
166static inline int expect_matches(const struct nf_conntrack_expect *a,
167 const struct nf_conntrack_expect *b)
168{
169 return a->master == b->master
170 && nf_ct_tuple_equal(&a->tuple, &b->tuple)
171 && nf_ct_tuple_equal(&a->mask, &b->mask);
172}
173
174/* Generally a bad idea to call this: could have matched already. */
6823645d 175void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
77ab9cff
MJ
176{
177 struct nf_conntrack_expect *i;
178
179 write_lock_bh(&nf_conntrack_lock);
59c51591 180 /* choose the oldest expectation to evict */
6823645d 181 list_for_each_entry_reverse(i, &nf_ct_expect_list, list) {
77ab9cff
MJ
182 if (expect_matches(i, exp) && del_timer(&i->timeout)) {
183 nf_ct_unlink_expect(i);
184 write_unlock_bh(&nf_conntrack_lock);
6823645d 185 nf_ct_expect_put(i);
77ab9cff
MJ
186 return;
187 }
188 }
189 write_unlock_bh(&nf_conntrack_lock);
190}
6823645d 191EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
77ab9cff
MJ
192
193/* We don't increase the master conntrack refcount for non-fulfilled
194 * conntracks. During the conntrack destruction, the expectations are
195 * always killed before the conntrack itself */
6823645d 196struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
77ab9cff
MJ
197{
198 struct nf_conntrack_expect *new;
199
6823645d 200 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
77ab9cff
MJ
201 if (!new)
202 return NULL;
203
204 new->master = me;
205 atomic_set(&new->use, 1);
206 return new;
207}
6823645d 208EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
77ab9cff 209
6823645d
PM
210void nf_ct_expect_init(struct nf_conntrack_expect *exp, int family,
211 union nf_conntrack_address *saddr,
212 union nf_conntrack_address *daddr,
213 u_int8_t proto, __be16 *src, __be16 *dst)
d6a9b650
PM
214{
215 int len;
216
217 if (family == AF_INET)
218 len = 4;
219 else
220 len = 16;
221
222 exp->flags = 0;
223 exp->expectfn = NULL;
224 exp->helper = NULL;
225 exp->tuple.src.l3num = family;
226 exp->tuple.dst.protonum = proto;
227 exp->mask.src.l3num = 0xFFFF;
228 exp->mask.dst.protonum = 0xFF;
229
230 if (saddr) {
231 memcpy(&exp->tuple.src.u3, saddr, len);
232 if (sizeof(exp->tuple.src.u3) > len)
233 /* address needs to be cleared for nf_ct_tuple_equal */
234 memset((void *)&exp->tuple.src.u3 + len, 0x00,
235 sizeof(exp->tuple.src.u3) - len);
236 memset(&exp->mask.src.u3, 0xFF, len);
237 if (sizeof(exp->mask.src.u3) > len)
238 memset((void *)&exp->mask.src.u3 + len, 0x00,
239 sizeof(exp->mask.src.u3) - len);
240 } else {
241 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
242 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
243 }
244
245 if (daddr) {
246 memcpy(&exp->tuple.dst.u3, daddr, len);
247 if (sizeof(exp->tuple.dst.u3) > len)
248 /* address needs to be cleared for nf_ct_tuple_equal */
249 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
250 sizeof(exp->tuple.dst.u3) - len);
251 memset(&exp->mask.dst.u3, 0xFF, len);
252 if (sizeof(exp->mask.dst.u3) > len)
253 memset((void *)&exp->mask.dst.u3 + len, 0x00,
254 sizeof(exp->mask.dst.u3) - len);
255 } else {
256 memset(&exp->tuple.dst.u3, 0x00, sizeof(exp->tuple.dst.u3));
257 memset(&exp->mask.dst.u3, 0x00, sizeof(exp->mask.dst.u3));
258 }
259
260 if (src) {
261 exp->tuple.src.u.all = (__force u16)*src;
262 exp->mask.src.u.all = 0xFFFF;
263 } else {
264 exp->tuple.src.u.all = 0;
265 exp->mask.src.u.all = 0;
266 }
267
268 if (dst) {
269 exp->tuple.dst.u.all = (__force u16)*dst;
270 exp->mask.dst.u.all = 0xFFFF;
271 } else {
272 exp->tuple.dst.u.all = 0;
273 exp->mask.dst.u.all = 0;
274 }
275}
6823645d 276EXPORT_SYMBOL_GPL(nf_ct_expect_init);
d6a9b650 277
6823645d 278void nf_ct_expect_put(struct nf_conntrack_expect *exp)
77ab9cff
MJ
279{
280 if (atomic_dec_and_test(&exp->use))
6823645d 281 kmem_cache_free(nf_ct_expect_cachep, exp);
77ab9cff 282}
6823645d 283EXPORT_SYMBOL_GPL(nf_ct_expect_put);
77ab9cff 284
6823645d 285static void nf_ct_expect_insert(struct nf_conntrack_expect *exp)
77ab9cff
MJ
286{
287 struct nf_conn_help *master_help = nfct_help(exp->master);
288
289 atomic_inc(&exp->use);
290 master_help->expecting++;
6823645d 291 list_add(&exp->list, &nf_ct_expect_list);
77ab9cff 292
6823645d
PM
293 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
294 (unsigned long)exp);
77ab9cff
MJ
295 exp->timeout.expires = jiffies + master_help->helper->timeout * HZ;
296 add_timer(&exp->timeout);
297
6823645d 298 exp->id = ++nf_ct_expect_next_id;
77ab9cff
MJ
299 atomic_inc(&exp->use);
300 NF_CT_STAT_INC(expect_create);
301}
302
303/* Race with expectations being used means we could have none to find; OK. */
304static void evict_oldest_expect(struct nf_conn *master)
305{
306 struct nf_conntrack_expect *i;
307
6823645d 308 list_for_each_entry_reverse(i, &nf_ct_expect_list, list) {
77ab9cff
MJ
309 if (i->master == master) {
310 if (del_timer(&i->timeout)) {
311 nf_ct_unlink_expect(i);
6823645d 312 nf_ct_expect_put(i);
77ab9cff
MJ
313 }
314 break;
315 }
316 }
317}
318
319static inline int refresh_timer(struct nf_conntrack_expect *i)
320{
321 struct nf_conn_help *master_help = nfct_help(i->master);
322
323 if (!del_timer(&i->timeout))
324 return 0;
325
326 i->timeout.expires = jiffies + master_help->helper->timeout*HZ;
327 add_timer(&i->timeout);
328 return 1;
329}
330
6823645d 331int nf_ct_expect_related(struct nf_conntrack_expect *expect)
77ab9cff
MJ
332{
333 struct nf_conntrack_expect *i;
334 struct nf_conn *master = expect->master;
335 struct nf_conn_help *master_help = nfct_help(master);
336 int ret;
337
338 NF_CT_ASSERT(master_help);
339
340 write_lock_bh(&nf_conntrack_lock);
3c158f7f
PM
341 if (!master_help->helper) {
342 ret = -ESHUTDOWN;
343 goto out;
344 }
6823645d 345 list_for_each_entry(i, &nf_ct_expect_list, list) {
77ab9cff
MJ
346 if (expect_matches(i, expect)) {
347 /* Refresh timer: if it's dying, ignore.. */
348 if (refresh_timer(i)) {
349 ret = 0;
350 goto out;
351 }
352 } else if (expect_clash(i, expect)) {
353 ret = -EBUSY;
354 goto out;
355 }
356 }
357 /* Will be over limit? */
358 if (master_help->helper->max_expected &&
359 master_help->expecting >= master_help->helper->max_expected)
360 evict_oldest_expect(master);
361
6823645d
PM
362 nf_ct_expect_insert(expect);
363 nf_ct_expect_event(IPEXP_NEW, expect);
77ab9cff
MJ
364 ret = 0;
365out:
366 write_unlock_bh(&nf_conntrack_lock);
367 return ret;
368}
6823645d 369EXPORT_SYMBOL_GPL(nf_ct_expect_related);
77ab9cff
MJ
370
371#ifdef CONFIG_PROC_FS
372static void *exp_seq_start(struct seq_file *s, loff_t *pos)
373{
6823645d 374 struct list_head *e = &nf_ct_expect_list;
77ab9cff
MJ
375 loff_t i;
376
377 /* strange seq_file api calls stop even if we fail,
378 * thus we need to grab lock since stop unlocks */
379 read_lock_bh(&nf_conntrack_lock);
380
381 if (list_empty(e))
382 return NULL;
383
384 for (i = 0; i <= *pos; i++) {
385 e = e->next;
6823645d 386 if (e == &nf_ct_expect_list)
77ab9cff
MJ
387 return NULL;
388 }
389 return e;
390}
391
392static void *exp_seq_next(struct seq_file *s, void *v, loff_t *pos)
393{
394 struct list_head *e = v;
395
396 ++*pos;
397 e = e->next;
398
6823645d 399 if (e == &nf_ct_expect_list)
77ab9cff
MJ
400 return NULL;
401
402 return e;
403}
404
405static void exp_seq_stop(struct seq_file *s, void *v)
406{
407 read_unlock_bh(&nf_conntrack_lock);
408}
409
410static int exp_seq_show(struct seq_file *s, void *v)
411{
412 struct nf_conntrack_expect *expect = v;
413
414 if (expect->timeout.function)
415 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
416 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
417 else
418 seq_printf(s, "- ");
419 seq_printf(s, "l3proto = %u proto=%u ",
420 expect->tuple.src.l3num,
421 expect->tuple.dst.protonum);
422 print_tuple(s, &expect->tuple,
423 __nf_ct_l3proto_find(expect->tuple.src.l3num),
605dcad6 424 __nf_ct_l4proto_find(expect->tuple.src.l3num,
77ab9cff
MJ
425 expect->tuple.dst.protonum));
426 return seq_putc(s, '\n');
427}
428
429static struct seq_operations exp_seq_ops = {
430 .start = exp_seq_start,
431 .next = exp_seq_next,
432 .stop = exp_seq_stop,
433 .show = exp_seq_show
434};
435
436static int exp_open(struct inode *inode, struct file *file)
437{
438 return seq_open(file, &exp_seq_ops);
439}
440
da7071d7 441const struct file_operations exp_file_ops = {
77ab9cff
MJ
442 .owner = THIS_MODULE,
443 .open = exp_open,
444 .read = seq_read,
445 .llseek = seq_lseek,
446 .release = seq_release
447};
448#endif /* CONFIG_PROC_FS */