Merge tag 'staging-3.15-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh...
[linux-2.6-block.git] / net / netfilter / nf_conntrack_expect.c
CommitLineData
77ab9cff
MJ
1/* Expectation handling for nf_conntrack. */
2
3/* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
f229f6ce 6 * (c) 2005-2012 Patrick McHardy <kaber@trash.net>
77ab9cff
MJ
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
11 */
12
13#include <linux/types.h>
14#include <linux/netfilter.h>
15#include <linux/skbuff.h>
16#include <linux/proc_fs.h>
17#include <linux/seq_file.h>
18#include <linux/stddef.h>
19#include <linux/slab.h>
20#include <linux/err.h>
21#include <linux/percpu.h>
22#include <linux/kernel.h>
a71c0855 23#include <linux/jhash.h>
d9b93842 24#include <linux/moduleparam.h>
bc3b2d7f 25#include <linux/export.h>
457c4cbc 26#include <net/net_namespace.h>
77ab9cff
MJ
27
28#include <net/netfilter/nf_conntrack.h>
29#include <net/netfilter/nf_conntrack_core.h>
30#include <net/netfilter/nf_conntrack_expect.h>
31#include <net/netfilter/nf_conntrack_helper.h>
32#include <net/netfilter/nf_conntrack_tuple.h>
5d0aa2cc 33#include <net/netfilter/nf_conntrack_zones.h>
77ab9cff 34
a71c0855
PM
35unsigned int nf_ct_expect_hsize __read_mostly;
36EXPORT_SYMBOL_GPL(nf_ct_expect_hsize);
37
f264a7df 38unsigned int nf_ct_expect_max __read_mostly;
a71c0855 39
e9c1b084 40static struct kmem_cache *nf_ct_expect_cachep __read_mostly;
77ab9cff
MJ
41
42/* nf_conntrack_expect helper functions */
ebbf41df 43void nf_ct_unlink_expect_report(struct nf_conntrack_expect *exp,
ec464e5d 44 u32 portid, int report)
77ab9cff
MJ
45{
46 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 47 struct net *net = nf_ct_exp_net(exp);
77ab9cff 48
3d058d7b 49 NF_CT_ASSERT(master_help);
77ab9cff
MJ
50 NF_CT_ASSERT(!timer_pending(&exp->timeout));
51
7d0742da 52 hlist_del_rcu(&exp->hnode);
9b03f38d 53 net->ct.expect_count--;
a71c0855 54
b560580a 55 hlist_del(&exp->lnode);
3d058d7b 56 master_help->expecting[exp->class]--;
bc01befd 57
ec464e5d 58 nf_ct_expect_event_report(IPEXP_DESTROY, exp, portid, report);
6823645d 59 nf_ct_expect_put(exp);
b560580a 60
0d55af87 61 NF_CT_STAT_INC(net, expect_delete);
77ab9cff 62}
ebbf41df 63EXPORT_SYMBOL_GPL(nf_ct_unlink_expect_report);
77ab9cff 64
6823645d 65static void nf_ct_expectation_timed_out(unsigned long ul_expect)
77ab9cff
MJ
66{
67 struct nf_conntrack_expect *exp = (void *)ul_expect;
68
ca7433df 69 spin_lock_bh(&nf_conntrack_expect_lock);
77ab9cff 70 nf_ct_unlink_expect(exp);
ca7433df 71 spin_unlock_bh(&nf_conntrack_expect_lock);
6823645d 72 nf_ct_expect_put(exp);
77ab9cff
MJ
73}
74
a71c0855
PM
75static unsigned int nf_ct_expect_dst_hash(const struct nf_conntrack_tuple *tuple)
76{
34498825
PM
77 unsigned int hash;
78
f682cefa
CG
79 if (unlikely(!nf_conntrack_hash_rnd)) {
80 init_nf_conntrack_hash_rnd();
a71c0855
PM
81 }
82
34498825 83 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all),
a71c0855 84 (((tuple->dst.protonum ^ tuple->src.l3num) << 16) |
f682cefa 85 (__force __u16)tuple->dst.u.all) ^ nf_conntrack_hash_rnd);
34498825 86 return ((u64)hash * nf_ct_expect_hsize) >> 32;
a71c0855
PM
87}
88
77ab9cff 89struct nf_conntrack_expect *
5d0aa2cc
PM
90__nf_ct_expect_find(struct net *net, u16 zone,
91 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
92{
93 struct nf_conntrack_expect *i;
a71c0855
PM
94 unsigned int h;
95
9b03f38d 96 if (!net->ct.expect_count)
a71c0855 97 return NULL;
77ab9cff 98
a71c0855 99 h = nf_ct_expect_dst_hash(tuple);
b67bfe0d 100 hlist_for_each_entry_rcu(i, &net->ct.expect_hash[h], hnode) {
5d0aa2cc
PM
101 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
102 nf_ct_zone(i->master) == zone)
77ab9cff
MJ
103 return i;
104 }
105 return NULL;
106}
6823645d 107EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
77ab9cff
MJ
108
109/* Just find a expectation corresponding to a tuple. */
110struct nf_conntrack_expect *
5d0aa2cc
PM
111nf_ct_expect_find_get(struct net *net, u16 zone,
112 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
113{
114 struct nf_conntrack_expect *i;
115
7d0742da 116 rcu_read_lock();
5d0aa2cc 117 i = __nf_ct_expect_find(net, zone, tuple);
7d0742da
PM
118 if (i && !atomic_inc_not_zero(&i->use))
119 i = NULL;
120 rcu_read_unlock();
77ab9cff
MJ
121
122 return i;
123}
6823645d 124EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
77ab9cff
MJ
125
126/* If an expectation for this connection is found, it gets delete from
127 * global list then returned. */
128struct nf_conntrack_expect *
5d0aa2cc
PM
129nf_ct_find_expectation(struct net *net, u16 zone,
130 const struct nf_conntrack_tuple *tuple)
77ab9cff 131{
359b9ab6 132 struct nf_conntrack_expect *i, *exp = NULL;
359b9ab6
PM
133 unsigned int h;
134
9b03f38d 135 if (!net->ct.expect_count)
359b9ab6 136 return NULL;
ece00641 137
359b9ab6 138 h = nf_ct_expect_dst_hash(tuple);
b67bfe0d 139 hlist_for_each_entry(i, &net->ct.expect_hash[h], hnode) {
359b9ab6 140 if (!(i->flags & NF_CT_EXPECT_INACTIVE) &&
5d0aa2cc
PM
141 nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
142 nf_ct_zone(i->master) == zone) {
359b9ab6
PM
143 exp = i;
144 break;
145 }
146 }
ece00641
YK
147 if (!exp)
148 return NULL;
77ab9cff 149
77ab9cff
MJ
150 /* If master is not in hash table yet (ie. packet hasn't left
151 this machine yet), how can other end know about expected?
152 Hence these are not the droids you are looking for (if
153 master ct never got confirmed, we'd hold a reference to it
154 and weird things would happen to future packets). */
ece00641
YK
155 if (!nf_ct_is_confirmed(exp->master))
156 return NULL;
157
e1b207da
JDB
158 /* Avoid race with other CPUs, that for exp->master ct, is
159 * about to invoke ->destroy(), or nf_ct_delete() via timeout
160 * or early_drop().
161 *
162 * The atomic_inc_not_zero() check tells: If that fails, we
163 * know that the ct is being destroyed. If it succeeds, we
164 * can be sure the ct cannot disappear underneath.
165 */
166 if (unlikely(nf_ct_is_dying(exp->master) ||
167 !atomic_inc_not_zero(&exp->master->ct_general.use)))
168 return NULL;
169
ece00641
YK
170 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
171 atomic_inc(&exp->use);
172 return exp;
173 } else if (del_timer(&exp->timeout)) {
174 nf_ct_unlink_expect(exp);
175 return exp;
77ab9cff 176 }
e1b207da
JDB
177 /* Undo exp->master refcnt increase, if del_timer() failed */
178 nf_ct_put(exp->master);
ece00641 179
77ab9cff
MJ
180 return NULL;
181}
182
183/* delete all expectations for this conntrack */
184void nf_ct_remove_expectations(struct nf_conn *ct)
185{
77ab9cff 186 struct nf_conn_help *help = nfct_help(ct);
b560580a 187 struct nf_conntrack_expect *exp;
b67bfe0d 188 struct hlist_node *next;
77ab9cff
MJ
189
190 /* Optimization: most connection never expect any others. */
6002f266 191 if (!help)
77ab9cff
MJ
192 return;
193
ca7433df 194 spin_lock_bh(&nf_conntrack_expect_lock);
b67bfe0d 195 hlist_for_each_entry_safe(exp, next, &help->expectations, lnode) {
b560580a
PM
196 if (del_timer(&exp->timeout)) {
197 nf_ct_unlink_expect(exp);
198 nf_ct_expect_put(exp);
601e68e1 199 }
77ab9cff 200 }
ca7433df 201 spin_unlock_bh(&nf_conntrack_expect_lock);
77ab9cff 202}
13b18339 203EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
77ab9cff
MJ
204
205/* Would two expected things clash? */
206static inline int expect_clash(const struct nf_conntrack_expect *a,
207 const struct nf_conntrack_expect *b)
208{
209 /* Part covered by intersection of masks must be unequal,
210 otherwise they clash */
d4156e8c 211 struct nf_conntrack_tuple_mask intersect_mask;
77ab9cff
MJ
212 int count;
213
77ab9cff 214 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
77ab9cff
MJ
215
216 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
217 intersect_mask.src.u3.all[count] =
218 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
219 }
220
77ab9cff
MJ
221 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask);
222}
223
224static inline int expect_matches(const struct nf_conntrack_expect *a,
225 const struct nf_conntrack_expect *b)
226{
f64f9e71
JP
227 return a->master == b->master && a->class == b->class &&
228 nf_ct_tuple_equal(&a->tuple, &b->tuple) &&
5d0aa2cc
PM
229 nf_ct_tuple_mask_equal(&a->mask, &b->mask) &&
230 nf_ct_zone(a->master) == nf_ct_zone(b->master);
77ab9cff
MJ
231}
232
233/* Generally a bad idea to call this: could have matched already. */
6823645d 234void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
77ab9cff 235{
ca7433df 236 spin_lock_bh(&nf_conntrack_expect_lock);
4e1d4e6c
PM
237 if (del_timer(&exp->timeout)) {
238 nf_ct_unlink_expect(exp);
239 nf_ct_expect_put(exp);
77ab9cff 240 }
ca7433df 241 spin_unlock_bh(&nf_conntrack_expect_lock);
77ab9cff 242}
6823645d 243EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
77ab9cff
MJ
244
245/* We don't increase the master conntrack refcount for non-fulfilled
246 * conntracks. During the conntrack destruction, the expectations are
247 * always killed before the conntrack itself */
6823645d 248struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
77ab9cff
MJ
249{
250 struct nf_conntrack_expect *new;
251
6823645d 252 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
77ab9cff
MJ
253 if (!new)
254 return NULL;
255
256 new->master = me;
257 atomic_set(&new->use, 1);
258 return new;
259}
6823645d 260EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
77ab9cff 261
6002f266 262void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
76108cea 263 u_int8_t family,
1d9d7522
PM
264 const union nf_inet_addr *saddr,
265 const union nf_inet_addr *daddr,
266 u_int8_t proto, const __be16 *src, const __be16 *dst)
d6a9b650
PM
267{
268 int len;
269
270 if (family == AF_INET)
271 len = 4;
272 else
273 len = 16;
274
275 exp->flags = 0;
6002f266 276 exp->class = class;
d6a9b650
PM
277 exp->expectfn = NULL;
278 exp->helper = NULL;
279 exp->tuple.src.l3num = family;
280 exp->tuple.dst.protonum = proto;
d6a9b650
PM
281
282 if (saddr) {
283 memcpy(&exp->tuple.src.u3, saddr, len);
284 if (sizeof(exp->tuple.src.u3) > len)
285 /* address needs to be cleared for nf_ct_tuple_equal */
286 memset((void *)&exp->tuple.src.u3 + len, 0x00,
287 sizeof(exp->tuple.src.u3) - len);
288 memset(&exp->mask.src.u3, 0xFF, len);
289 if (sizeof(exp->mask.src.u3) > len)
290 memset((void *)&exp->mask.src.u3 + len, 0x00,
291 sizeof(exp->mask.src.u3) - len);
292 } else {
293 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
294 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
295 }
296
d6a9b650 297 if (src) {
a34c4589
AV
298 exp->tuple.src.u.all = *src;
299 exp->mask.src.u.all = htons(0xFFFF);
d6a9b650
PM
300 } else {
301 exp->tuple.src.u.all = 0;
302 exp->mask.src.u.all = 0;
303 }
304
d4156e8c
PM
305 memcpy(&exp->tuple.dst.u3, daddr, len);
306 if (sizeof(exp->tuple.dst.u3) > len)
307 /* address needs to be cleared for nf_ct_tuple_equal */
308 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
309 sizeof(exp->tuple.dst.u3) - len);
310
a34c4589 311 exp->tuple.dst.u.all = *dst;
f09eca8d
PNA
312
313#ifdef CONFIG_NF_NAT_NEEDED
314 memset(&exp->saved_addr, 0, sizeof(exp->saved_addr));
315 memset(&exp->saved_proto, 0, sizeof(exp->saved_proto));
316#endif
d6a9b650 317}
6823645d 318EXPORT_SYMBOL_GPL(nf_ct_expect_init);
d6a9b650 319
7d0742da
PM
320static void nf_ct_expect_free_rcu(struct rcu_head *head)
321{
322 struct nf_conntrack_expect *exp;
323
324 exp = container_of(head, struct nf_conntrack_expect, rcu);
325 kmem_cache_free(nf_ct_expect_cachep, exp);
326}
327
6823645d 328void nf_ct_expect_put(struct nf_conntrack_expect *exp)
77ab9cff
MJ
329{
330 if (atomic_dec_and_test(&exp->use))
7d0742da 331 call_rcu(&exp->rcu, nf_ct_expect_free_rcu);
77ab9cff 332}
6823645d 333EXPORT_SYMBOL_GPL(nf_ct_expect_put);
77ab9cff 334
3d058d7b 335static int nf_ct_expect_insert(struct nf_conntrack_expect *exp)
77ab9cff
MJ
336{
337 struct nf_conn_help *master_help = nfct_help(exp->master);
3d058d7b 338 struct nf_conntrack_helper *helper;
9b03f38d 339 struct net *net = nf_ct_exp_net(exp);
a71c0855 340 unsigned int h = nf_ct_expect_dst_hash(&exp->tuple);
77ab9cff 341
3bfd45f9
ED
342 /* two references : one for hash insert, one for the timer */
343 atomic_add(2, &exp->use);
b560580a 344
3d058d7b
PNA
345 hlist_add_head(&exp->lnode, &master_help->expectations);
346 master_help->expecting[exp->class]++;
a71c0855 347
9b03f38d
AD
348 hlist_add_head_rcu(&exp->hnode, &net->ct.expect_hash[h]);
349 net->ct.expect_count++;
77ab9cff 350
6823645d
PM
351 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
352 (unsigned long)exp);
3d058d7b 353 helper = rcu_dereference_protected(master_help->helper,
ca7433df 354 lockdep_is_held(&nf_conntrack_expect_lock));
3d058d7b
PNA
355 if (helper) {
356 exp->timeout.expires = jiffies +
357 helper->expect_policy[exp->class].timeout * HZ;
bc01befd 358 }
77ab9cff
MJ
359 add_timer(&exp->timeout);
360
0d55af87 361 NF_CT_STAT_INC(net, expect_create);
3d058d7b 362 return 0;
77ab9cff
MJ
363}
364
365/* Race with expectations being used means we could have none to find; OK. */
6002f266
PM
366static void evict_oldest_expect(struct nf_conn *master,
367 struct nf_conntrack_expect *new)
77ab9cff 368{
b560580a 369 struct nf_conn_help *master_help = nfct_help(master);
6002f266 370 struct nf_conntrack_expect *exp, *last = NULL;
77ab9cff 371
b67bfe0d 372 hlist_for_each_entry(exp, &master_help->expectations, lnode) {
6002f266
PM
373 if (exp->class == new->class)
374 last = exp;
375 }
b560580a 376
6002f266
PM
377 if (last && del_timer(&last->timeout)) {
378 nf_ct_unlink_expect(last);
379 nf_ct_expect_put(last);
77ab9cff
MJ
380 }
381}
382
19abb7b0 383static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
77ab9cff 384{
6002f266 385 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
386 struct nf_conntrack_expect *i;
387 struct nf_conn *master = expect->master;
388 struct nf_conn_help *master_help = nfct_help(master);
3d058d7b 389 struct nf_conntrack_helper *helper;
9b03f38d 390 struct net *net = nf_ct_exp_net(expect);
b67bfe0d 391 struct hlist_node *next;
a71c0855 392 unsigned int h;
83731671 393 int ret = 1;
77ab9cff 394
3d058d7b 395 if (!master_help) {
3c158f7f
PM
396 ret = -ESHUTDOWN;
397 goto out;
398 }
a71c0855 399 h = nf_ct_expect_dst_hash(&expect->tuple);
b67bfe0d 400 hlist_for_each_entry_safe(i, next, &net->ct.expect_hash[h], hnode) {
77ab9cff 401 if (expect_matches(i, expect)) {
2614f864
PNA
402 if (del_timer(&i->timeout)) {
403 nf_ct_unlink_expect(i);
404 nf_ct_expect_put(i);
405 break;
77ab9cff
MJ
406 }
407 } else if (expect_clash(i, expect)) {
408 ret = -EBUSY;
409 goto out;
410 }
411 }
412 /* Will be over limit? */
3d058d7b 413 helper = rcu_dereference_protected(master_help->helper,
ca7433df 414 lockdep_is_held(&nf_conntrack_expect_lock));
3d058d7b
PNA
415 if (helper) {
416 p = &helper->expect_policy[expect->class];
bc01befd
PNA
417 if (p->max_expected &&
418 master_help->expecting[expect->class] >= p->max_expected) {
419 evict_oldest_expect(master, expect);
420 if (master_help->expecting[expect->class]
421 >= p->max_expected) {
422 ret = -EMFILE;
423 goto out;
424 }
6002f266
PM
425 }
426 }
77ab9cff 427
9b03f38d 428 if (net->ct.expect_count >= nf_ct_expect_max) {
e87cc472 429 net_warn_ratelimited("nf_conntrack: expectation table full\n");
f264a7df 430 ret = -EMFILE;
f264a7df 431 }
19abb7b0
PNA
432out:
433 return ret;
434}
435
b476b72a 436int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
ec464e5d 437 u32 portid, int report)
19abb7b0
PNA
438{
439 int ret;
440
ca7433df 441 spin_lock_bh(&nf_conntrack_expect_lock);
19abb7b0 442 ret = __nf_ct_expect_check(expect);
83731671 443 if (ret <= 0)
19abb7b0 444 goto out;
f264a7df 445
3d058d7b
PNA
446 ret = nf_ct_expect_insert(expect);
447 if (ret < 0)
448 goto out;
ca7433df 449 spin_unlock_bh(&nf_conntrack_expect_lock);
ec464e5d 450 nf_ct_expect_event_report(IPEXP_NEW, expect, portid, report);
77ab9cff 451 return ret;
19abb7b0 452out:
ca7433df 453 spin_unlock_bh(&nf_conntrack_expect_lock);
19abb7b0
PNA
454 return ret;
455}
456EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
457
54b07dca 458#ifdef CONFIG_NF_CONNTRACK_PROCFS
5d08ad44 459struct ct_expect_iter_state {
dc5129f8 460 struct seq_net_private p;
5d08ad44
PM
461 unsigned int bucket;
462};
463
464static struct hlist_node *ct_expect_get_first(struct seq_file *seq)
77ab9cff 465{
dc5129f8 466 struct net *net = seq_file_net(seq);
5d08ad44 467 struct ct_expect_iter_state *st = seq->private;
7d0742da 468 struct hlist_node *n;
77ab9cff 469
5d08ad44 470 for (st->bucket = 0; st->bucket < nf_ct_expect_hsize; st->bucket++) {
0e60ebe0 471 n = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
7d0742da
PM
472 if (n)
473 return n;
5d08ad44
PM
474 }
475 return NULL;
476}
77ab9cff 477
5d08ad44
PM
478static struct hlist_node *ct_expect_get_next(struct seq_file *seq,
479 struct hlist_node *head)
480{
dc5129f8 481 struct net *net = seq_file_net(seq);
5d08ad44 482 struct ct_expect_iter_state *st = seq->private;
77ab9cff 483
0e60ebe0 484 head = rcu_dereference(hlist_next_rcu(head));
5d08ad44
PM
485 while (head == NULL) {
486 if (++st->bucket >= nf_ct_expect_hsize)
77ab9cff 487 return NULL;
0e60ebe0 488 head = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
77ab9cff 489 }
5d08ad44 490 return head;
77ab9cff
MJ
491}
492
5d08ad44 493static struct hlist_node *ct_expect_get_idx(struct seq_file *seq, loff_t pos)
77ab9cff 494{
5d08ad44 495 struct hlist_node *head = ct_expect_get_first(seq);
77ab9cff 496
5d08ad44
PM
497 if (head)
498 while (pos && (head = ct_expect_get_next(seq, head)))
499 pos--;
500 return pos ? NULL : head;
501}
77ab9cff 502
5d08ad44 503static void *exp_seq_start(struct seq_file *seq, loff_t *pos)
7d0742da 504 __acquires(RCU)
5d08ad44 505{
7d0742da 506 rcu_read_lock();
5d08ad44
PM
507 return ct_expect_get_idx(seq, *pos);
508}
77ab9cff 509
5d08ad44
PM
510static void *exp_seq_next(struct seq_file *seq, void *v, loff_t *pos)
511{
512 (*pos)++;
513 return ct_expect_get_next(seq, v);
77ab9cff
MJ
514}
515
5d08ad44 516static void exp_seq_stop(struct seq_file *seq, void *v)
7d0742da 517 __releases(RCU)
77ab9cff 518{
7d0742da 519 rcu_read_unlock();
77ab9cff
MJ
520}
521
522static int exp_seq_show(struct seq_file *s, void *v)
523{
5d08ad44 524 struct nf_conntrack_expect *expect;
b87921bd 525 struct nf_conntrack_helper *helper;
5d08ad44 526 struct hlist_node *n = v;
359b9ab6 527 char *delim = "";
5d08ad44
PM
528
529 expect = hlist_entry(n, struct nf_conntrack_expect, hnode);
77ab9cff
MJ
530
531 if (expect->timeout.function)
532 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
533 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
534 else
535 seq_printf(s, "- ");
536 seq_printf(s, "l3proto = %u proto=%u ",
537 expect->tuple.src.l3num,
538 expect->tuple.dst.protonum);
539 print_tuple(s, &expect->tuple,
540 __nf_ct_l3proto_find(expect->tuple.src.l3num),
605dcad6 541 __nf_ct_l4proto_find(expect->tuple.src.l3num,
77ab9cff 542 expect->tuple.dst.protonum));
4bb119ea 543
359b9ab6
PM
544 if (expect->flags & NF_CT_EXPECT_PERMANENT) {
545 seq_printf(s, "PERMANENT");
546 delim = ",";
547 }
bc01befd 548 if (expect->flags & NF_CT_EXPECT_INACTIVE) {
359b9ab6 549 seq_printf(s, "%sINACTIVE", delim);
bc01befd
PNA
550 delim = ",";
551 }
552 if (expect->flags & NF_CT_EXPECT_USERSPACE)
553 seq_printf(s, "%sUSERSPACE", delim);
4bb119ea 554
b87921bd
PM
555 helper = rcu_dereference(nfct_help(expect->master)->helper);
556 if (helper) {
557 seq_printf(s, "%s%s", expect->flags ? " " : "", helper->name);
558 if (helper->expect_policy[expect->class].name)
559 seq_printf(s, "/%s",
560 helper->expect_policy[expect->class].name);
561 }
562
77ab9cff
MJ
563 return seq_putc(s, '\n');
564}
565
56b3d975 566static const struct seq_operations exp_seq_ops = {
77ab9cff
MJ
567 .start = exp_seq_start,
568 .next = exp_seq_next,
569 .stop = exp_seq_stop,
570 .show = exp_seq_show
571};
572
573static int exp_open(struct inode *inode, struct file *file)
574{
dc5129f8 575 return seq_open_net(inode, file, &exp_seq_ops,
e2da5913 576 sizeof(struct ct_expect_iter_state));
77ab9cff
MJ
577}
578
5d08ad44 579static const struct file_operations exp_file_ops = {
77ab9cff
MJ
580 .owner = THIS_MODULE,
581 .open = exp_open,
582 .read = seq_read,
583 .llseek = seq_lseek,
dc5129f8 584 .release = seq_release_net,
77ab9cff 585};
54b07dca 586#endif /* CONFIG_NF_CONNTRACK_PROCFS */
e9c1b084 587
dc5129f8 588static int exp_proc_init(struct net *net)
e9c1b084 589{
54b07dca 590#ifdef CONFIG_NF_CONNTRACK_PROCFS
e9c1b084
PM
591 struct proc_dir_entry *proc;
592
d4beaa66
G
593 proc = proc_create("nf_conntrack_expect", 0440, net->proc_net,
594 &exp_file_ops);
e9c1b084
PM
595 if (!proc)
596 return -ENOMEM;
54b07dca 597#endif /* CONFIG_NF_CONNTRACK_PROCFS */
e9c1b084
PM
598 return 0;
599}
600
dc5129f8 601static void exp_proc_remove(struct net *net)
e9c1b084 602{
54b07dca 603#ifdef CONFIG_NF_CONNTRACK_PROCFS
ece31ffd 604 remove_proc_entry("nf_conntrack_expect", net->proc_net);
54b07dca 605#endif /* CONFIG_NF_CONNTRACK_PROCFS */
e9c1b084
PM
606}
607
13ccdfc2 608module_param_named(expect_hashsize, nf_ct_expect_hsize, uint, 0400);
a71c0855 609
83b4dbe1 610int nf_conntrack_expect_pernet_init(struct net *net)
e9c1b084 611{
a71c0855
PM
612 int err = -ENOMEM;
613
9b03f38d 614 net->ct.expect_count = 0;
d862a662 615 net->ct.expect_hash = nf_ct_alloc_hashtable(&nf_ct_expect_hsize, 0);
9b03f38d 616 if (net->ct.expect_hash == NULL)
a71c0855 617 goto err1;
e9c1b084 618
dc5129f8 619 err = exp_proc_init(net);
e9c1b084 620 if (err < 0)
83b4dbe1 621 goto err2;
e9c1b084
PM
622
623 return 0;
12293bf9 624err2:
d862a662 625 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
a71c0855 626err1:
e9c1b084
PM
627 return err;
628}
629
83b4dbe1 630void nf_conntrack_expect_pernet_fini(struct net *net)
e9c1b084 631{
dc5129f8 632 exp_proc_remove(net);
d862a662 633 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
e9c1b084 634}
83b4dbe1
G
635
636int nf_conntrack_expect_init(void)
637{
638 if (!nf_ct_expect_hsize) {
639 nf_ct_expect_hsize = nf_conntrack_htable_size / 256;
640 if (!nf_ct_expect_hsize)
641 nf_ct_expect_hsize = 1;
642 }
643 nf_ct_expect_max = nf_ct_expect_hsize * 4;
644 nf_ct_expect_cachep = kmem_cache_create("nf_conntrack_expect",
645 sizeof(struct nf_conntrack_expect),
646 0, 0, NULL);
647 if (!nf_ct_expect_cachep)
648 return -ENOMEM;
649 return 0;
650}
651
652void nf_conntrack_expect_fini(void)
653{
654 rcu_barrier(); /* Wait for call_rcu() before destroy */
655 kmem_cache_destroy(nf_ct_expect_cachep);
656}