]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - net/netfilter/nf_conntrack_expect.c
net: ethernet: Fix double word "the the" in eth.c
[mirror_ubuntu-artful-kernel.git] / net / netfilter / nf_conntrack_expect.c
1 /* Expectation handling for nf_conntrack. */
2
3 /* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
6 * (c) 2005-2012 Patrick McHardy <kaber@trash.net>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
11 */
12
13 #include <linux/types.h>
14 #include <linux/netfilter.h>
15 #include <linux/skbuff.h>
16 #include <linux/proc_fs.h>
17 #include <linux/seq_file.h>
18 #include <linux/stddef.h>
19 #include <linux/slab.h>
20 #include <linux/err.h>
21 #include <linux/percpu.h>
22 #include <linux/kernel.h>
23 #include <linux/jhash.h>
24 #include <linux/moduleparam.h>
25 #include <linux/export.h>
26 #include <net/net_namespace.h>
27
28 #include <net/netfilter/nf_conntrack.h>
29 #include <net/netfilter/nf_conntrack_core.h>
30 #include <net/netfilter/nf_conntrack_expect.h>
31 #include <net/netfilter/nf_conntrack_helper.h>
32 #include <net/netfilter/nf_conntrack_tuple.h>
33 #include <net/netfilter/nf_conntrack_zones.h>
34
35 unsigned int nf_ct_expect_hsize __read_mostly;
36 EXPORT_SYMBOL_GPL(nf_ct_expect_hsize);
37
38 unsigned int nf_ct_expect_max __read_mostly;
39
40 static struct kmem_cache *nf_ct_expect_cachep __read_mostly;
41
42 /* nf_conntrack_expect helper functions */
43 void nf_ct_unlink_expect_report(struct nf_conntrack_expect *exp,
44 u32 portid, int report)
45 {
46 struct nf_conn_help *master_help = nfct_help(exp->master);
47 struct net *net = nf_ct_exp_net(exp);
48
49 NF_CT_ASSERT(master_help);
50 NF_CT_ASSERT(!timer_pending(&exp->timeout));
51
52 hlist_del_rcu(&exp->hnode);
53 net->ct.expect_count--;
54
55 hlist_del(&exp->lnode);
56 master_help->expecting[exp->class]--;
57
58 nf_ct_expect_event_report(IPEXP_DESTROY, exp, portid, report);
59 nf_ct_expect_put(exp);
60
61 NF_CT_STAT_INC(net, expect_delete);
62 }
63 EXPORT_SYMBOL_GPL(nf_ct_unlink_expect_report);
64
65 static void nf_ct_expectation_timed_out(unsigned long ul_expect)
66 {
67 struct nf_conntrack_expect *exp = (void *)ul_expect;
68
69 spin_lock_bh(&nf_conntrack_expect_lock);
70 nf_ct_unlink_expect(exp);
71 spin_unlock_bh(&nf_conntrack_expect_lock);
72 nf_ct_expect_put(exp);
73 }
74
75 static unsigned int nf_ct_expect_dst_hash(const struct nf_conntrack_tuple *tuple)
76 {
77 unsigned int hash;
78
79 if (unlikely(!nf_conntrack_hash_rnd)) {
80 init_nf_conntrack_hash_rnd();
81 }
82
83 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all),
84 (((tuple->dst.protonum ^ tuple->src.l3num) << 16) |
85 (__force __u16)tuple->dst.u.all) ^ nf_conntrack_hash_rnd);
86
87 return reciprocal_scale(hash, nf_ct_expect_hsize);
88 }
89
90 struct nf_conntrack_expect *
91 __nf_ct_expect_find(struct net *net, u16 zone,
92 const struct nf_conntrack_tuple *tuple)
93 {
94 struct nf_conntrack_expect *i;
95 unsigned int h;
96
97 if (!net->ct.expect_count)
98 return NULL;
99
100 h = nf_ct_expect_dst_hash(tuple);
101 hlist_for_each_entry_rcu(i, &net->ct.expect_hash[h], hnode) {
102 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
103 nf_ct_zone(i->master) == zone)
104 return i;
105 }
106 return NULL;
107 }
108 EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
109
110 /* Just find a expectation corresponding to a tuple. */
111 struct nf_conntrack_expect *
112 nf_ct_expect_find_get(struct net *net, u16 zone,
113 const struct nf_conntrack_tuple *tuple)
114 {
115 struct nf_conntrack_expect *i;
116
117 rcu_read_lock();
118 i = __nf_ct_expect_find(net, zone, tuple);
119 if (i && !atomic_inc_not_zero(&i->use))
120 i = NULL;
121 rcu_read_unlock();
122
123 return i;
124 }
125 EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
126
127 /* If an expectation for this connection is found, it gets delete from
128 * global list then returned. */
129 struct nf_conntrack_expect *
130 nf_ct_find_expectation(struct net *net, u16 zone,
131 const struct nf_conntrack_tuple *tuple)
132 {
133 struct nf_conntrack_expect *i, *exp = NULL;
134 unsigned int h;
135
136 if (!net->ct.expect_count)
137 return NULL;
138
139 h = nf_ct_expect_dst_hash(tuple);
140 hlist_for_each_entry(i, &net->ct.expect_hash[h], hnode) {
141 if (!(i->flags & NF_CT_EXPECT_INACTIVE) &&
142 nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
143 nf_ct_zone(i->master) == zone) {
144 exp = i;
145 break;
146 }
147 }
148 if (!exp)
149 return NULL;
150
151 /* If master is not in hash table yet (ie. packet hasn't left
152 this machine yet), how can other end know about expected?
153 Hence these are not the droids you are looking for (if
154 master ct never got confirmed, we'd hold a reference to it
155 and weird things would happen to future packets). */
156 if (!nf_ct_is_confirmed(exp->master))
157 return NULL;
158
159 /* Avoid race with other CPUs, that for exp->master ct, is
160 * about to invoke ->destroy(), or nf_ct_delete() via timeout
161 * or early_drop().
162 *
163 * The atomic_inc_not_zero() check tells: If that fails, we
164 * know that the ct is being destroyed. If it succeeds, we
165 * can be sure the ct cannot disappear underneath.
166 */
167 if (unlikely(nf_ct_is_dying(exp->master) ||
168 !atomic_inc_not_zero(&exp->master->ct_general.use)))
169 return NULL;
170
171 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
172 atomic_inc(&exp->use);
173 return exp;
174 } else if (del_timer(&exp->timeout)) {
175 nf_ct_unlink_expect(exp);
176 return exp;
177 }
178 /* Undo exp->master refcnt increase, if del_timer() failed */
179 nf_ct_put(exp->master);
180
181 return NULL;
182 }
183
184 /* delete all expectations for this conntrack */
185 void nf_ct_remove_expectations(struct nf_conn *ct)
186 {
187 struct nf_conn_help *help = nfct_help(ct);
188 struct nf_conntrack_expect *exp;
189 struct hlist_node *next;
190
191 /* Optimization: most connection never expect any others. */
192 if (!help)
193 return;
194
195 spin_lock_bh(&nf_conntrack_expect_lock);
196 hlist_for_each_entry_safe(exp, next, &help->expectations, lnode) {
197 if (del_timer(&exp->timeout)) {
198 nf_ct_unlink_expect(exp);
199 nf_ct_expect_put(exp);
200 }
201 }
202 spin_unlock_bh(&nf_conntrack_expect_lock);
203 }
204 EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
205
206 /* Would two expected things clash? */
207 static inline int expect_clash(const struct nf_conntrack_expect *a,
208 const struct nf_conntrack_expect *b)
209 {
210 /* Part covered by intersection of masks must be unequal,
211 otherwise they clash */
212 struct nf_conntrack_tuple_mask intersect_mask;
213 int count;
214
215 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
216
217 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
218 intersect_mask.src.u3.all[count] =
219 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
220 }
221
222 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask) &&
223 nf_ct_zone(a->master) == nf_ct_zone(b->master);
224 }
225
226 static inline int expect_matches(const struct nf_conntrack_expect *a,
227 const struct nf_conntrack_expect *b)
228 {
229 return a->master == b->master && a->class == b->class &&
230 nf_ct_tuple_equal(&a->tuple, &b->tuple) &&
231 nf_ct_tuple_mask_equal(&a->mask, &b->mask) &&
232 nf_ct_zone(a->master) == nf_ct_zone(b->master);
233 }
234
235 /* Generally a bad idea to call this: could have matched already. */
236 void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
237 {
238 spin_lock_bh(&nf_conntrack_expect_lock);
239 if (del_timer(&exp->timeout)) {
240 nf_ct_unlink_expect(exp);
241 nf_ct_expect_put(exp);
242 }
243 spin_unlock_bh(&nf_conntrack_expect_lock);
244 }
245 EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
246
247 /* We don't increase the master conntrack refcount for non-fulfilled
248 * conntracks. During the conntrack destruction, the expectations are
249 * always killed before the conntrack itself */
250 struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
251 {
252 struct nf_conntrack_expect *new;
253
254 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
255 if (!new)
256 return NULL;
257
258 new->master = me;
259 atomic_set(&new->use, 1);
260 return new;
261 }
262 EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
263
264 void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
265 u_int8_t family,
266 const union nf_inet_addr *saddr,
267 const union nf_inet_addr *daddr,
268 u_int8_t proto, const __be16 *src, const __be16 *dst)
269 {
270 int len;
271
272 if (family == AF_INET)
273 len = 4;
274 else
275 len = 16;
276
277 exp->flags = 0;
278 exp->class = class;
279 exp->expectfn = NULL;
280 exp->helper = NULL;
281 exp->tuple.src.l3num = family;
282 exp->tuple.dst.protonum = proto;
283
284 if (saddr) {
285 memcpy(&exp->tuple.src.u3, saddr, len);
286 if (sizeof(exp->tuple.src.u3) > len)
287 /* address needs to be cleared for nf_ct_tuple_equal */
288 memset((void *)&exp->tuple.src.u3 + len, 0x00,
289 sizeof(exp->tuple.src.u3) - len);
290 memset(&exp->mask.src.u3, 0xFF, len);
291 if (sizeof(exp->mask.src.u3) > len)
292 memset((void *)&exp->mask.src.u3 + len, 0x00,
293 sizeof(exp->mask.src.u3) - len);
294 } else {
295 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
296 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
297 }
298
299 if (src) {
300 exp->tuple.src.u.all = *src;
301 exp->mask.src.u.all = htons(0xFFFF);
302 } else {
303 exp->tuple.src.u.all = 0;
304 exp->mask.src.u.all = 0;
305 }
306
307 memcpy(&exp->tuple.dst.u3, daddr, len);
308 if (sizeof(exp->tuple.dst.u3) > len)
309 /* address needs to be cleared for nf_ct_tuple_equal */
310 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
311 sizeof(exp->tuple.dst.u3) - len);
312
313 exp->tuple.dst.u.all = *dst;
314
315 #ifdef CONFIG_NF_NAT_NEEDED
316 memset(&exp->saved_addr, 0, sizeof(exp->saved_addr));
317 memset(&exp->saved_proto, 0, sizeof(exp->saved_proto));
318 #endif
319 }
320 EXPORT_SYMBOL_GPL(nf_ct_expect_init);
321
322 static void nf_ct_expect_free_rcu(struct rcu_head *head)
323 {
324 struct nf_conntrack_expect *exp;
325
326 exp = container_of(head, struct nf_conntrack_expect, rcu);
327 kmem_cache_free(nf_ct_expect_cachep, exp);
328 }
329
330 void nf_ct_expect_put(struct nf_conntrack_expect *exp)
331 {
332 if (atomic_dec_and_test(&exp->use))
333 call_rcu(&exp->rcu, nf_ct_expect_free_rcu);
334 }
335 EXPORT_SYMBOL_GPL(nf_ct_expect_put);
336
337 static int nf_ct_expect_insert(struct nf_conntrack_expect *exp)
338 {
339 struct nf_conn_help *master_help = nfct_help(exp->master);
340 struct nf_conntrack_helper *helper;
341 struct net *net = nf_ct_exp_net(exp);
342 unsigned int h = nf_ct_expect_dst_hash(&exp->tuple);
343
344 /* two references : one for hash insert, one for the timer */
345 atomic_add(2, &exp->use);
346
347 hlist_add_head(&exp->lnode, &master_help->expectations);
348 master_help->expecting[exp->class]++;
349
350 hlist_add_head_rcu(&exp->hnode, &net->ct.expect_hash[h]);
351 net->ct.expect_count++;
352
353 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
354 (unsigned long)exp);
355 helper = rcu_dereference_protected(master_help->helper,
356 lockdep_is_held(&nf_conntrack_expect_lock));
357 if (helper) {
358 exp->timeout.expires = jiffies +
359 helper->expect_policy[exp->class].timeout * HZ;
360 }
361 add_timer(&exp->timeout);
362
363 NF_CT_STAT_INC(net, expect_create);
364 return 0;
365 }
366
367 /* Race with expectations being used means we could have none to find; OK. */
368 static void evict_oldest_expect(struct nf_conn *master,
369 struct nf_conntrack_expect *new)
370 {
371 struct nf_conn_help *master_help = nfct_help(master);
372 struct nf_conntrack_expect *exp, *last = NULL;
373
374 hlist_for_each_entry(exp, &master_help->expectations, lnode) {
375 if (exp->class == new->class)
376 last = exp;
377 }
378
379 if (last && del_timer(&last->timeout)) {
380 nf_ct_unlink_expect(last);
381 nf_ct_expect_put(last);
382 }
383 }
384
385 static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
386 {
387 const struct nf_conntrack_expect_policy *p;
388 struct nf_conntrack_expect *i;
389 struct nf_conn *master = expect->master;
390 struct nf_conn_help *master_help = nfct_help(master);
391 struct nf_conntrack_helper *helper;
392 struct net *net = nf_ct_exp_net(expect);
393 struct hlist_node *next;
394 unsigned int h;
395 int ret = 1;
396
397 if (!master_help) {
398 ret = -ESHUTDOWN;
399 goto out;
400 }
401 h = nf_ct_expect_dst_hash(&expect->tuple);
402 hlist_for_each_entry_safe(i, next, &net->ct.expect_hash[h], hnode) {
403 if (expect_matches(i, expect)) {
404 if (del_timer(&i->timeout)) {
405 nf_ct_unlink_expect(i);
406 nf_ct_expect_put(i);
407 break;
408 }
409 } else if (expect_clash(i, expect)) {
410 ret = -EBUSY;
411 goto out;
412 }
413 }
414 /* Will be over limit? */
415 helper = rcu_dereference_protected(master_help->helper,
416 lockdep_is_held(&nf_conntrack_expect_lock));
417 if (helper) {
418 p = &helper->expect_policy[expect->class];
419 if (p->max_expected &&
420 master_help->expecting[expect->class] >= p->max_expected) {
421 evict_oldest_expect(master, expect);
422 if (master_help->expecting[expect->class]
423 >= p->max_expected) {
424 ret = -EMFILE;
425 goto out;
426 }
427 }
428 }
429
430 if (net->ct.expect_count >= nf_ct_expect_max) {
431 net_warn_ratelimited("nf_conntrack: expectation table full\n");
432 ret = -EMFILE;
433 }
434 out:
435 return ret;
436 }
437
438 int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
439 u32 portid, int report)
440 {
441 int ret;
442
443 spin_lock_bh(&nf_conntrack_expect_lock);
444 ret = __nf_ct_expect_check(expect);
445 if (ret <= 0)
446 goto out;
447
448 ret = nf_ct_expect_insert(expect);
449 if (ret < 0)
450 goto out;
451 spin_unlock_bh(&nf_conntrack_expect_lock);
452 nf_ct_expect_event_report(IPEXP_NEW, expect, portid, report);
453 return ret;
454 out:
455 spin_unlock_bh(&nf_conntrack_expect_lock);
456 return ret;
457 }
458 EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
459
460 #ifdef CONFIG_NF_CONNTRACK_PROCFS
461 struct ct_expect_iter_state {
462 struct seq_net_private p;
463 unsigned int bucket;
464 };
465
466 static struct hlist_node *ct_expect_get_first(struct seq_file *seq)
467 {
468 struct net *net = seq_file_net(seq);
469 struct ct_expect_iter_state *st = seq->private;
470 struct hlist_node *n;
471
472 for (st->bucket = 0; st->bucket < nf_ct_expect_hsize; st->bucket++) {
473 n = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
474 if (n)
475 return n;
476 }
477 return NULL;
478 }
479
480 static struct hlist_node *ct_expect_get_next(struct seq_file *seq,
481 struct hlist_node *head)
482 {
483 struct net *net = seq_file_net(seq);
484 struct ct_expect_iter_state *st = seq->private;
485
486 head = rcu_dereference(hlist_next_rcu(head));
487 while (head == NULL) {
488 if (++st->bucket >= nf_ct_expect_hsize)
489 return NULL;
490 head = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
491 }
492 return head;
493 }
494
495 static struct hlist_node *ct_expect_get_idx(struct seq_file *seq, loff_t pos)
496 {
497 struct hlist_node *head = ct_expect_get_first(seq);
498
499 if (head)
500 while (pos && (head = ct_expect_get_next(seq, head)))
501 pos--;
502 return pos ? NULL : head;
503 }
504
505 static void *exp_seq_start(struct seq_file *seq, loff_t *pos)
506 __acquires(RCU)
507 {
508 rcu_read_lock();
509 return ct_expect_get_idx(seq, *pos);
510 }
511
512 static void *exp_seq_next(struct seq_file *seq, void *v, loff_t *pos)
513 {
514 (*pos)++;
515 return ct_expect_get_next(seq, v);
516 }
517
518 static void exp_seq_stop(struct seq_file *seq, void *v)
519 __releases(RCU)
520 {
521 rcu_read_unlock();
522 }
523
524 static int exp_seq_show(struct seq_file *s, void *v)
525 {
526 struct nf_conntrack_expect *expect;
527 struct nf_conntrack_helper *helper;
528 struct hlist_node *n = v;
529 char *delim = "";
530
531 expect = hlist_entry(n, struct nf_conntrack_expect, hnode);
532
533 if (expect->timeout.function)
534 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
535 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
536 else
537 seq_printf(s, "- ");
538 seq_printf(s, "l3proto = %u proto=%u ",
539 expect->tuple.src.l3num,
540 expect->tuple.dst.protonum);
541 print_tuple(s, &expect->tuple,
542 __nf_ct_l3proto_find(expect->tuple.src.l3num),
543 __nf_ct_l4proto_find(expect->tuple.src.l3num,
544 expect->tuple.dst.protonum));
545
546 if (expect->flags & NF_CT_EXPECT_PERMANENT) {
547 seq_printf(s, "PERMANENT");
548 delim = ",";
549 }
550 if (expect->flags & NF_CT_EXPECT_INACTIVE) {
551 seq_printf(s, "%sINACTIVE", delim);
552 delim = ",";
553 }
554 if (expect->flags & NF_CT_EXPECT_USERSPACE)
555 seq_printf(s, "%sUSERSPACE", delim);
556
557 helper = rcu_dereference(nfct_help(expect->master)->helper);
558 if (helper) {
559 seq_printf(s, "%s%s", expect->flags ? " " : "", helper->name);
560 if (helper->expect_policy[expect->class].name)
561 seq_printf(s, "/%s",
562 helper->expect_policy[expect->class].name);
563 }
564
565 seq_putc(s, '\n');
566
567 return 0;
568 }
569
570 static const struct seq_operations exp_seq_ops = {
571 .start = exp_seq_start,
572 .next = exp_seq_next,
573 .stop = exp_seq_stop,
574 .show = exp_seq_show
575 };
576
577 static int exp_open(struct inode *inode, struct file *file)
578 {
579 return seq_open_net(inode, file, &exp_seq_ops,
580 sizeof(struct ct_expect_iter_state));
581 }
582
583 static const struct file_operations exp_file_ops = {
584 .owner = THIS_MODULE,
585 .open = exp_open,
586 .read = seq_read,
587 .llseek = seq_lseek,
588 .release = seq_release_net,
589 };
590 #endif /* CONFIG_NF_CONNTRACK_PROCFS */
591
592 static int exp_proc_init(struct net *net)
593 {
594 #ifdef CONFIG_NF_CONNTRACK_PROCFS
595 struct proc_dir_entry *proc;
596
597 proc = proc_create("nf_conntrack_expect", 0440, net->proc_net,
598 &exp_file_ops);
599 if (!proc)
600 return -ENOMEM;
601 #endif /* CONFIG_NF_CONNTRACK_PROCFS */
602 return 0;
603 }
604
605 static void exp_proc_remove(struct net *net)
606 {
607 #ifdef CONFIG_NF_CONNTRACK_PROCFS
608 remove_proc_entry("nf_conntrack_expect", net->proc_net);
609 #endif /* CONFIG_NF_CONNTRACK_PROCFS */
610 }
611
612 module_param_named(expect_hashsize, nf_ct_expect_hsize, uint, 0400);
613
614 int nf_conntrack_expect_pernet_init(struct net *net)
615 {
616 int err = -ENOMEM;
617
618 net->ct.expect_count = 0;
619 net->ct.expect_hash = nf_ct_alloc_hashtable(&nf_ct_expect_hsize, 0);
620 if (net->ct.expect_hash == NULL)
621 goto err1;
622
623 err = exp_proc_init(net);
624 if (err < 0)
625 goto err2;
626
627 return 0;
628 err2:
629 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
630 err1:
631 return err;
632 }
633
634 void nf_conntrack_expect_pernet_fini(struct net *net)
635 {
636 exp_proc_remove(net);
637 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
638 }
639
640 int nf_conntrack_expect_init(void)
641 {
642 if (!nf_ct_expect_hsize) {
643 nf_ct_expect_hsize = nf_conntrack_htable_size / 256;
644 if (!nf_ct_expect_hsize)
645 nf_ct_expect_hsize = 1;
646 }
647 nf_ct_expect_max = nf_ct_expect_hsize * 4;
648 nf_ct_expect_cachep = kmem_cache_create("nf_conntrack_expect",
649 sizeof(struct nf_conntrack_expect),
650 0, 0, NULL);
651 if (!nf_ct_expect_cachep)
652 return -ENOMEM;
653 return 0;
654 }
655
656 void nf_conntrack_expect_fini(void)
657 {
658 rcu_barrier(); /* Wait for call_rcu() before destroy */
659 kmem_cache_destroy(nf_ct_expect_cachep);
660 }