]>
Commit | Line | Data |
---|---|---|
09c434b8 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
ac2a6666 PNA |
2 | #include <linux/kernel.h> |
3 | #include <linux/init.h> | |
4 | #include <linux/module.h> | |
5 | #include <linux/netfilter.h> | |
6 | #include <linux/rhashtable.h> | |
7 | #include <linux/netdevice.h> | |
4f3780c0 FF |
8 | #include <net/ip.h> |
9 | #include <net/ip6_route.h> | |
c0ea1bcb | 10 | #include <net/netfilter/nf_tables.h> |
ac2a6666 PNA |
11 | #include <net/netfilter/nf_flow_table.h> |
12 | #include <net/netfilter/nf_conntrack.h> | |
13 | #include <net/netfilter/nf_conntrack_core.h> | |
40d102cd | 14 | #include <net/netfilter/nf_conntrack_l4proto.h> |
ac2a6666 PNA |
15 | #include <net/netfilter/nf_conntrack_tuple.h> |
16 | ||
84453a90 FF |
17 | static DEFINE_MUTEX(flowtable_lock); |
18 | static LIST_HEAD(flowtables); | |
19 | ||
047b300e | 20 | static void |
458a1828 | 21 | flow_offload_fill_dir(struct flow_offload *flow, |
047b300e FF |
22 | enum flow_offload_tuple_dir dir) |
23 | { | |
24 | struct flow_offload_tuple *ft = &flow->tuplehash[dir].tuple; | |
458a1828 | 25 | struct nf_conntrack_tuple *ctt = &flow->ct->tuplehash[dir].tuple; |
047b300e FF |
26 | |
27 | ft->dir = dir; | |
28 | ||
29 | switch (ctt->src.l3num) { | |
30 | case NFPROTO_IPV4: | |
31 | ft->src_v4 = ctt->src.u3.in; | |
32 | ft->dst_v4 = ctt->dst.u3.in; | |
33 | break; | |
34 | case NFPROTO_IPV6: | |
35 | ft->src_v6 = ctt->src.u3.in6; | |
36 | ft->dst_v6 = ctt->dst.u3.in6; | |
37 | break; | |
38 | } | |
39 | ||
40 | ft->l3proto = ctt->src.l3num; | |
41 | ft->l4proto = ctt->dst.protonum; | |
42 | ft->src_port = ctt->src.u.tcp.port; | |
43 | ft->dst_port = ctt->dst.u.tcp.port; | |
047b300e FF |
44 | } |
45 | ||
f1363e05 | 46 | struct flow_offload *flow_offload_alloc(struct nf_conn *ct) |
ac2a6666 | 47 | { |
ac2a6666 PNA |
48 | struct flow_offload *flow; |
49 | ||
50 | if (unlikely(nf_ct_is_dying(ct) || | |
51 | !atomic_inc_not_zero(&ct->ct_general.use))) | |
52 | return NULL; | |
53 | ||
62248df8 PNA |
54 | flow = kzalloc(sizeof(*flow), GFP_ATOMIC); |
55 | if (!flow) | |
ac2a6666 PNA |
56 | goto err_ct_refcnt; |
57 | ||
b32d2f34 | 58 | flow->ct = ct; |
ac2a6666 | 59 | |
458a1828 | 60 | flow_offload_fill_dir(flow, FLOW_OFFLOAD_DIR_ORIGINAL); |
61 | flow_offload_fill_dir(flow, FLOW_OFFLOAD_DIR_REPLY); | |
ac2a6666 PNA |
62 | |
63 | if (ct->status & IPS_SRC_NAT) | |
355a8b13 | 64 | __set_bit(NF_FLOW_SNAT, &flow->flags); |
df1e2025 | 65 | if (ct->status & IPS_DST_NAT) |
355a8b13 | 66 | __set_bit(NF_FLOW_DNAT, &flow->flags); |
ac2a6666 PNA |
67 | |
68 | return flow; | |
69 | ||
ac2a6666 PNA |
70 | err_ct_refcnt: |
71 | nf_ct_put(ct); | |
72 | ||
73 | return NULL; | |
74 | } | |
75 | EXPORT_SYMBOL_GPL(flow_offload_alloc); | |
76 | ||
f1363e05 PNA |
77 | static int flow_offload_fill_route(struct flow_offload *flow, |
78 | const struct nf_flow_route *route, | |
79 | enum flow_offload_tuple_dir dir) | |
80 | { | |
81 | struct flow_offload_tuple *flow_tuple = &flow->tuplehash[dir].tuple; | |
82 | struct dst_entry *other_dst = route->tuple[!dir].dst; | |
83 | struct dst_entry *dst = route->tuple[dir].dst; | |
84 | ||
85 | if (!dst_hold_safe(route->tuple[dir].dst)) | |
86 | return -1; | |
87 | ||
88 | switch (flow_tuple->l3proto) { | |
89 | case NFPROTO_IPV4: | |
90 | flow_tuple->mtu = ip_dst_mtu_maybe_forward(dst, true); | |
91 | break; | |
92 | case NFPROTO_IPV6: | |
93 | flow_tuple->mtu = ip6_dst_mtu_forward(dst); | |
94 | break; | |
95 | } | |
96 | ||
97 | flow_tuple->iifidx = other_dst->dev->ifindex; | |
98 | flow_tuple->dst_cache = dst; | |
99 | ||
100 | return 0; | |
101 | } | |
102 | ||
103 | int flow_offload_route_init(struct flow_offload *flow, | |
104 | const struct nf_flow_route *route) | |
105 | { | |
106 | int err; | |
107 | ||
108 | err = flow_offload_fill_route(flow, route, FLOW_OFFLOAD_DIR_ORIGINAL); | |
109 | if (err < 0) | |
110 | return err; | |
111 | ||
112 | err = flow_offload_fill_route(flow, route, FLOW_OFFLOAD_DIR_REPLY); | |
113 | if (err < 0) | |
114 | goto err_route_reply; | |
115 | ||
116 | flow->type = NF_FLOW_OFFLOAD_ROUTE; | |
117 | ||
118 | return 0; | |
119 | ||
120 | err_route_reply: | |
121 | dst_release(route->tuple[FLOW_OFFLOAD_DIR_ORIGINAL].dst); | |
122 | ||
123 | return err; | |
124 | } | |
125 | EXPORT_SYMBOL_GPL(flow_offload_route_init); | |
126 | ||
da5984e5 FF |
127 | static void flow_offload_fixup_tcp(struct ip_ct_tcp *tcp) |
128 | { | |
129 | tcp->state = TCP_CONNTRACK_ESTABLISHED; | |
130 | tcp->seen[0].td_maxwin = 0; | |
131 | tcp->seen[1].td_maxwin = 0; | |
132 | } | |
133 | ||
e97d9404 FW |
134 | #define NF_FLOWTABLE_TCP_PICKUP_TIMEOUT (120 * HZ) |
135 | #define NF_FLOWTABLE_UDP_PICKUP_TIMEOUT (30 * HZ) | |
136 | ||
1e5b2471 | 137 | static void flow_offload_fixup_ct_timeout(struct nf_conn *ct) |
da5984e5 FF |
138 | { |
139 | const struct nf_conntrack_l4proto *l4proto; | |
1e5b2471 | 140 | int l4num = nf_ct_protonum(ct); |
da5984e5 | 141 | unsigned int timeout; |
da5984e5 | 142 | |
4a60dc74 | 143 | l4proto = nf_ct_l4proto_find(l4num); |
da5984e5 FF |
144 | if (!l4proto) |
145 | return; | |
146 | ||
da5984e5 | 147 | if (l4num == IPPROTO_TCP) |
e97d9404 | 148 | timeout = NF_FLOWTABLE_TCP_PICKUP_TIMEOUT; |
da5984e5 | 149 | else if (l4num == IPPROTO_UDP) |
e97d9404 | 150 | timeout = NF_FLOWTABLE_UDP_PICKUP_TIMEOUT; |
da5984e5 FF |
151 | else |
152 | return; | |
153 | ||
1e5b2471 PNA |
154 | if (nf_flow_timeout_delta(ct->timeout) > (__s32)timeout) |
155 | ct->timeout = nfct_time_stamp + timeout; | |
156 | } | |
157 | ||
158 | static void flow_offload_fixup_ct_state(struct nf_conn *ct) | |
159 | { | |
160 | if (nf_ct_protonum(ct) == IPPROTO_TCP) | |
161 | flow_offload_fixup_tcp(&ct->proto.tcp); | |
162 | } | |
163 | ||
164 | static void flow_offload_fixup_ct(struct nf_conn *ct) | |
165 | { | |
166 | flow_offload_fixup_ct_state(ct); | |
167 | flow_offload_fixup_ct_timeout(ct); | |
da5984e5 FF |
168 | } |
169 | ||
f1363e05 | 170 | static void flow_offload_route_release(struct flow_offload *flow) |
ac2a6666 | 171 | { |
ac2a6666 PNA |
172 | dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_cache); |
173 | dst_release(flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_cache); | |
f1363e05 PNA |
174 | } |
175 | ||
176 | void flow_offload_free(struct flow_offload *flow) | |
177 | { | |
178 | switch (flow->type) { | |
179 | case NF_FLOW_OFFLOAD_ROUTE: | |
180 | flow_offload_route_release(flow); | |
181 | break; | |
182 | default: | |
183 | break; | |
184 | } | |
b32d2f34 | 185 | nf_ct_put(flow->ct); |
62248df8 | 186 | kfree_rcu(flow, rcu_head); |
ac2a6666 PNA |
187 | } |
188 | EXPORT_SYMBOL_GPL(flow_offload_free); | |
189 | ||
a268de77 FF |
190 | static u32 flow_offload_hash(const void *data, u32 len, u32 seed) |
191 | { | |
192 | const struct flow_offload_tuple *tuple = data; | |
193 | ||
194 | return jhash(tuple, offsetof(struct flow_offload_tuple, dir), seed); | |
195 | } | |
196 | ||
197 | static u32 flow_offload_hash_obj(const void *data, u32 len, u32 seed) | |
198 | { | |
199 | const struct flow_offload_tuple_rhash *tuplehash = data; | |
200 | ||
201 | return jhash(&tuplehash->tuple, offsetof(struct flow_offload_tuple, dir), seed); | |
202 | } | |
203 | ||
204 | static int flow_offload_hash_cmp(struct rhashtable_compare_arg *arg, | |
205 | const void *ptr) | |
206 | { | |
207 | const struct flow_offload_tuple *tuple = arg->key; | |
208 | const struct flow_offload_tuple_rhash *x = ptr; | |
209 | ||
210 | if (memcmp(&x->tuple, tuple, offsetof(struct flow_offload_tuple, dir))) | |
211 | return 1; | |
212 | ||
213 | return 0; | |
214 | } | |
215 | ||
216 | static const struct rhashtable_params nf_flow_offload_rhash_params = { | |
217 | .head_offset = offsetof(struct flow_offload_tuple_rhash, node), | |
218 | .hashfn = flow_offload_hash, | |
219 | .obj_hashfn = flow_offload_hash_obj, | |
220 | .obj_cmpfn = flow_offload_hash_cmp, | |
221 | .automatic_shrinking = true, | |
222 | }; | |
223 | ||
ac2a6666 PNA |
224 | int flow_offload_add(struct nf_flowtable *flow_table, struct flow_offload *flow) |
225 | { | |
43c8f131 TY |
226 | int err; |
227 | ||
fb46f1b7 | 228 | flow->timeout = nf_flowtable_time_stamp + NF_FLOW_TIMEOUT; |
daf61b02 | 229 | |
43c8f131 TY |
230 | err = rhashtable_insert_fast(&flow_table->rhashtable, |
231 | &flow->tuplehash[0].node, | |
232 | nf_flow_offload_rhash_params); | |
233 | if (err < 0) | |
234 | return err; | |
235 | ||
236 | err = rhashtable_insert_fast(&flow_table->rhashtable, | |
237 | &flow->tuplehash[1].node, | |
238 | nf_flow_offload_rhash_params); | |
239 | if (err < 0) { | |
240 | rhashtable_remove_fast(&flow_table->rhashtable, | |
241 | &flow->tuplehash[0].node, | |
242 | nf_flow_offload_rhash_params); | |
243 | return err; | |
244 | } | |
ac2a6666 | 245 | |
f698fe40 PNA |
246 | if (nf_flowtable_hw_offload(flow_table)) { |
247 | __set_bit(NF_FLOW_HW, &flow->flags); | |
c29f74e0 | 248 | nf_flow_offload_add(flow_table, flow); |
f698fe40 | 249 | } |
c29f74e0 | 250 | |
ac2a6666 PNA |
251 | return 0; |
252 | } | |
253 | EXPORT_SYMBOL_GPL(flow_offload_add); | |
254 | ||
3e68db2f PNA |
255 | static inline bool nf_flow_has_expired(const struct flow_offload *flow) |
256 | { | |
1e5b2471 | 257 | return nf_flow_timeout_delta(flow->timeout) <= 0; |
3e68db2f PNA |
258 | } |
259 | ||
0ff90b6c FF |
260 | static void flow_offload_del(struct nf_flowtable *flow_table, |
261 | struct flow_offload *flow) | |
ac2a6666 | 262 | { |
ac2a6666 PNA |
263 | rhashtable_remove_fast(&flow_table->rhashtable, |
264 | &flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].node, | |
a268de77 | 265 | nf_flow_offload_rhash_params); |
ac2a6666 PNA |
266 | rhashtable_remove_fast(&flow_table->rhashtable, |
267 | &flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].node, | |
a268de77 | 268 | nf_flow_offload_rhash_params); |
ac2a6666 | 269 | |
b32d2f34 | 270 | clear_bit(IPS_OFFLOAD_BIT, &flow->ct->status); |
da5984e5 | 271 | |
3e68db2f | 272 | if (nf_flow_has_expired(flow)) |
b32d2f34 | 273 | flow_offload_fixup_ct(flow->ct); |
355a8b13 | 274 | else if (test_bit(NF_FLOW_TEARDOWN, &flow->flags)) |
b32d2f34 | 275 | flow_offload_fixup_ct_timeout(flow->ct); |
3e68db2f | 276 | |
0ff90b6c | 277 | flow_offload_free(flow); |
ac2a6666 | 278 | } |
ac2a6666 | 279 | |
59c466dd FF |
280 | void flow_offload_teardown(struct flow_offload *flow) |
281 | { | |
355a8b13 | 282 | set_bit(NF_FLOW_TEARDOWN, &flow->flags); |
da5984e5 | 283 | |
b32d2f34 | 284 | flow_offload_fixup_ct_state(flow->ct); |
59c466dd FF |
285 | } |
286 | EXPORT_SYMBOL_GPL(flow_offload_teardown); | |
287 | ||
ac2a6666 PNA |
288 | struct flow_offload_tuple_rhash * |
289 | flow_offload_lookup(struct nf_flowtable *flow_table, | |
290 | struct flow_offload_tuple *tuple) | |
291 | { | |
ba03137f FF |
292 | struct flow_offload_tuple_rhash *tuplehash; |
293 | struct flow_offload *flow; | |
294 | int dir; | |
295 | ||
a2d88182 TY |
296 | tuplehash = rhashtable_lookup(&flow_table->rhashtable, tuple, |
297 | nf_flow_offload_rhash_params); | |
ba03137f FF |
298 | if (!tuplehash) |
299 | return NULL; | |
300 | ||
301 | dir = tuplehash->tuple.dir; | |
302 | flow = container_of(tuplehash, struct flow_offload, tuplehash[dir]); | |
355a8b13 | 303 | if (test_bit(NF_FLOW_TEARDOWN, &flow->flags)) |
ba03137f FF |
304 | return NULL; |
305 | ||
b32d2f34 | 306 | if (unlikely(nf_ct_is_dying(flow->ct))) |
8cd2bc98 TY |
307 | return NULL; |
308 | ||
ba03137f | 309 | return tuplehash; |
ac2a6666 PNA |
310 | } |
311 | EXPORT_SYMBOL_GPL(flow_offload_lookup); | |
312 | ||
49de9c09 TY |
313 | static int |
314 | nf_flow_table_iterate(struct nf_flowtable *flow_table, | |
315 | void (*iter)(struct flow_offload *flow, void *data), | |
316 | void *data) | |
ac2a6666 PNA |
317 | { |
318 | struct flow_offload_tuple_rhash *tuplehash; | |
319 | struct rhashtable_iter hti; | |
320 | struct flow_offload *flow; | |
0de22baa | 321 | int err = 0; |
ac2a6666 | 322 | |
0de22baa | 323 | rhashtable_walk_enter(&flow_table->rhashtable, &hti); |
ac2a6666 PNA |
324 | rhashtable_walk_start(&hti); |
325 | ||
326 | while ((tuplehash = rhashtable_walk_next(&hti))) { | |
327 | if (IS_ERR(tuplehash)) { | |
0de22baa TY |
328 | if (PTR_ERR(tuplehash) != -EAGAIN) { |
329 | err = PTR_ERR(tuplehash); | |
330 | break; | |
331 | } | |
ac2a6666 PNA |
332 | continue; |
333 | } | |
334 | if (tuplehash->tuple.dir) | |
335 | continue; | |
336 | ||
337 | flow = container_of(tuplehash, struct flow_offload, tuplehash[0]); | |
338 | ||
339 | iter(flow, data); | |
340 | } | |
ac2a6666 PNA |
341 | rhashtable_walk_stop(&hti); |
342 | rhashtable_walk_exit(&hti); | |
343 | ||
344 | return err; | |
345 | } | |
ac2a6666 | 346 | |
b9660987 | 347 | static void nf_flow_offload_gc_step(struct flow_offload *flow, void *data) |
ac2a6666 | 348 | { |
b9660987 | 349 | struct nf_flowtable *flow_table = data; |
ac2a6666 | 350 | |
b32d2f34 | 351 | if (nf_flow_has_expired(flow) || nf_ct_is_dying(flow->ct) || |
355a8b13 PNA |
352 | test_bit(NF_FLOW_TEARDOWN, &flow->flags)) { |
353 | if (test_bit(NF_FLOW_HW, &flow->flags)) { | |
354 | if (!test_bit(NF_FLOW_HW_DYING, &flow->flags)) | |
c29f74e0 | 355 | nf_flow_offload_del(flow_table, flow); |
355a8b13 | 356 | else if (test_bit(NF_FLOW_HW_DEAD, &flow->flags)) |
c29f74e0 PNA |
357 | flow_offload_del(flow_table, flow); |
358 | } else { | |
359 | flow_offload_del(flow_table, flow); | |
360 | } | |
355a8b13 | 361 | } else if (test_bit(NF_FLOW_HW, &flow->flags)) { |
79b9b685 | 362 | nf_flow_offload_stats(flow_table, flow); |
c29f74e0 | 363 | } |
b408c5b0 PNA |
364 | } |
365 | ||
a268de77 | 366 | static void nf_flow_offload_work_gc(struct work_struct *work) |
b408c5b0 PNA |
367 | { |
368 | struct nf_flowtable *flow_table; | |
369 | ||
370 | flow_table = container_of(work, struct nf_flowtable, gc_work.work); | |
b9660987 | 371 | nf_flow_table_iterate(flow_table, nf_flow_offload_gc_step, flow_table); |
ac2a6666 PNA |
372 | queue_delayed_work(system_power_efficient_wq, &flow_table->gc_work, HZ); |
373 | } | |
ac2a6666 PNA |
374 | |
375 | static int nf_flow_nat_port_tcp(struct sk_buff *skb, unsigned int thoff, | |
376 | __be16 port, __be16 new_port) | |
377 | { | |
378 | struct tcphdr *tcph; | |
379 | ||
380 | if (!pskb_may_pull(skb, thoff + sizeof(*tcph)) || | |
381 | skb_try_make_writable(skb, thoff + sizeof(*tcph))) | |
382 | return -1; | |
383 | ||
384 | tcph = (void *)(skb_network_header(skb) + thoff); | |
385 | inet_proto_csum_replace2(&tcph->check, skb, port, new_port, true); | |
386 | ||
387 | return 0; | |
388 | } | |
389 | ||
390 | static int nf_flow_nat_port_udp(struct sk_buff *skb, unsigned int thoff, | |
391 | __be16 port, __be16 new_port) | |
392 | { | |
393 | struct udphdr *udph; | |
394 | ||
395 | if (!pskb_may_pull(skb, thoff + sizeof(*udph)) || | |
396 | skb_try_make_writable(skb, thoff + sizeof(*udph))) | |
397 | return -1; | |
398 | ||
399 | udph = (void *)(skb_network_header(skb) + thoff); | |
400 | if (udph->check || skb->ip_summed == CHECKSUM_PARTIAL) { | |
401 | inet_proto_csum_replace2(&udph->check, skb, port, | |
402 | new_port, true); | |
403 | if (!udph->check) | |
404 | udph->check = CSUM_MANGLED_0; | |
405 | } | |
406 | ||
407 | return 0; | |
408 | } | |
409 | ||
410 | static int nf_flow_nat_port(struct sk_buff *skb, unsigned int thoff, | |
411 | u8 protocol, __be16 port, __be16 new_port) | |
412 | { | |
413 | switch (protocol) { | |
414 | case IPPROTO_TCP: | |
415 | if (nf_flow_nat_port_tcp(skb, thoff, port, new_port) < 0) | |
416 | return NF_DROP; | |
417 | break; | |
418 | case IPPROTO_UDP: | |
419 | if (nf_flow_nat_port_udp(skb, thoff, port, new_port) < 0) | |
420 | return NF_DROP; | |
421 | break; | |
422 | } | |
423 | ||
424 | return 0; | |
425 | } | |
426 | ||
427 | int nf_flow_snat_port(const struct flow_offload *flow, | |
428 | struct sk_buff *skb, unsigned int thoff, | |
429 | u8 protocol, enum flow_offload_tuple_dir dir) | |
430 | { | |
431 | struct flow_ports *hdr; | |
432 | __be16 port, new_port; | |
433 | ||
434 | if (!pskb_may_pull(skb, thoff + sizeof(*hdr)) || | |
435 | skb_try_make_writable(skb, thoff + sizeof(*hdr))) | |
436 | return -1; | |
437 | ||
438 | hdr = (void *)(skb_network_header(skb) + thoff); | |
439 | ||
440 | switch (dir) { | |
441 | case FLOW_OFFLOAD_DIR_ORIGINAL: | |
442 | port = hdr->source; | |
443 | new_port = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.dst_port; | |
444 | hdr->source = new_port; | |
445 | break; | |
446 | case FLOW_OFFLOAD_DIR_REPLY: | |
447 | port = hdr->dest; | |
448 | new_port = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.src_port; | |
449 | hdr->dest = new_port; | |
450 | break; | |
451 | default: | |
452 | return -1; | |
453 | } | |
454 | ||
455 | return nf_flow_nat_port(skb, thoff, protocol, port, new_port); | |
456 | } | |
457 | EXPORT_SYMBOL_GPL(nf_flow_snat_port); | |
458 | ||
459 | int nf_flow_dnat_port(const struct flow_offload *flow, | |
460 | struct sk_buff *skb, unsigned int thoff, | |
461 | u8 protocol, enum flow_offload_tuple_dir dir) | |
462 | { | |
463 | struct flow_ports *hdr; | |
464 | __be16 port, new_port; | |
465 | ||
466 | if (!pskb_may_pull(skb, thoff + sizeof(*hdr)) || | |
467 | skb_try_make_writable(skb, thoff + sizeof(*hdr))) | |
468 | return -1; | |
469 | ||
470 | hdr = (void *)(skb_network_header(skb) + thoff); | |
471 | ||
472 | switch (dir) { | |
473 | case FLOW_OFFLOAD_DIR_ORIGINAL: | |
474 | port = hdr->dest; | |
475 | new_port = flow->tuplehash[FLOW_OFFLOAD_DIR_REPLY].tuple.src_port; | |
476 | hdr->dest = new_port; | |
477 | break; | |
478 | case FLOW_OFFLOAD_DIR_REPLY: | |
479 | port = hdr->source; | |
480 | new_port = flow->tuplehash[FLOW_OFFLOAD_DIR_ORIGINAL].tuple.dst_port; | |
481 | hdr->source = new_port; | |
482 | break; | |
483 | default: | |
484 | return -1; | |
485 | } | |
486 | ||
487 | return nf_flow_nat_port(skb, thoff, protocol, port, new_port); | |
488 | } | |
489 | EXPORT_SYMBOL_GPL(nf_flow_dnat_port); | |
490 | ||
a268de77 FF |
491 | int nf_flow_table_init(struct nf_flowtable *flowtable) |
492 | { | |
493 | int err; | |
494 | ||
495 | INIT_DEFERRABLE_WORK(&flowtable->gc_work, nf_flow_offload_work_gc); | |
c29f74e0 | 496 | flow_block_init(&flowtable->flow_block); |
a268de77 FF |
497 | |
498 | err = rhashtable_init(&flowtable->rhashtable, | |
499 | &nf_flow_offload_rhash_params); | |
500 | if (err < 0) | |
501 | return err; | |
502 | ||
503 | queue_delayed_work(system_power_efficient_wq, | |
504 | &flowtable->gc_work, HZ); | |
505 | ||
84453a90 FF |
506 | mutex_lock(&flowtable_lock); |
507 | list_add(&flowtable->list, &flowtables); | |
508 | mutex_unlock(&flowtable_lock); | |
509 | ||
a268de77 FF |
510 | return 0; |
511 | } | |
512 | EXPORT_SYMBOL_GPL(nf_flow_table_init); | |
513 | ||
c0ea1bcb PNA |
514 | static void nf_flow_table_do_cleanup(struct flow_offload *flow, void *data) |
515 | { | |
516 | struct net_device *dev = data; | |
517 | ||
59c466dd FF |
518 | if (!dev) { |
519 | flow_offload_teardown(flow); | |
c0ea1bcb | 520 | return; |
59c466dd | 521 | } |
b32d2f34 PNA |
522 | |
523 | if (net_eq(nf_ct_net(flow->ct), dev_net(dev)) && | |
a3fb3698 TY |
524 | (flow->tuplehash[0].tuple.iifidx == dev->ifindex || |
525 | flow->tuplehash[1].tuple.iifidx == dev->ifindex)) | |
445db8d0 | 526 | flow_offload_teardown(flow); |
c0ea1bcb PNA |
527 | } |
528 | ||
529 | static void nf_flow_table_iterate_cleanup(struct nf_flowtable *flowtable, | |
84453a90 | 530 | struct net_device *dev) |
c0ea1bcb | 531 | { |
84453a90 | 532 | nf_flow_table_iterate(flowtable, nf_flow_table_do_cleanup, dev); |
c0ea1bcb | 533 | flush_delayed_work(&flowtable->gc_work); |
91bfaa15 | 534 | nf_flow_table_offload_flush(flowtable); |
c0ea1bcb PNA |
535 | } |
536 | ||
5f1be84a | 537 | void nf_flow_table_cleanup(struct net_device *dev) |
c0ea1bcb | 538 | { |
84453a90 FF |
539 | struct nf_flowtable *flowtable; |
540 | ||
541 | mutex_lock(&flowtable_lock); | |
542 | list_for_each_entry(flowtable, &flowtables, list) | |
543 | nf_flow_table_iterate_cleanup(flowtable, dev); | |
544 | mutex_unlock(&flowtable_lock); | |
c0ea1bcb PNA |
545 | } |
546 | EXPORT_SYMBOL_GPL(nf_flow_table_cleanup); | |
547 | ||
b408c5b0 PNA |
548 | void nf_flow_table_free(struct nf_flowtable *flow_table) |
549 | { | |
84453a90 FF |
550 | mutex_lock(&flowtable_lock); |
551 | list_del(&flow_table->list); | |
552 | mutex_unlock(&flowtable_lock); | |
a268de77 | 553 | cancel_delayed_work_sync(&flow_table->gc_work); |
b408c5b0 | 554 | nf_flow_table_iterate(flow_table, nf_flow_table_do_cleanup, NULL); |
b9660987 | 555 | nf_flow_table_iterate(flow_table, nf_flow_offload_gc_step, flow_table); |
0f34f30a | 556 | nf_flow_table_offload_flush(flow_table); |
a268de77 | 557 | rhashtable_destroy(&flow_table->rhashtable); |
b408c5b0 PNA |
558 | } |
559 | EXPORT_SYMBOL_GPL(nf_flow_table_free); | |
560 | ||
c29f74e0 PNA |
561 | static int __init nf_flow_table_module_init(void) |
562 | { | |
563 | return nf_flow_table_offload_init(); | |
564 | } | |
565 | ||
566 | static void __exit nf_flow_table_module_exit(void) | |
567 | { | |
568 | nf_flow_table_offload_exit(); | |
569 | } | |
570 | ||
571 | module_init(nf_flow_table_module_init); | |
572 | module_exit(nf_flow_table_module_exit); | |
573 | ||
ac2a6666 PNA |
574 | MODULE_LICENSE("GPL"); |
575 | MODULE_AUTHOR("Pablo Neira Ayuso <pablo@netfilter.org>"); |