net: Add export.h for EXPORT_SYMBOL/THIS_MODULE to non-modules
[linux-2.6-block.git] / net / netfilter / nf_conntrack_expect.c
CommitLineData
77ab9cff
MJ
1/* Expectation handling for nf_conntrack. */
2
3/* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11
12#include <linux/types.h>
13#include <linux/netfilter.h>
14#include <linux/skbuff.h>
15#include <linux/proc_fs.h>
16#include <linux/seq_file.h>
17#include <linux/stddef.h>
18#include <linux/slab.h>
19#include <linux/err.h>
20#include <linux/percpu.h>
21#include <linux/kernel.h>
a71c0855 22#include <linux/jhash.h>
d9b93842 23#include <linux/moduleparam.h>
bc3b2d7f 24#include <linux/export.h>
457c4cbc 25#include <net/net_namespace.h>
77ab9cff
MJ
26
27#include <net/netfilter/nf_conntrack.h>
28#include <net/netfilter/nf_conntrack_core.h>
29#include <net/netfilter/nf_conntrack_expect.h>
30#include <net/netfilter/nf_conntrack_helper.h>
31#include <net/netfilter/nf_conntrack_tuple.h>
5d0aa2cc 32#include <net/netfilter/nf_conntrack_zones.h>
77ab9cff 33
a71c0855
PM
34unsigned int nf_ct_expect_hsize __read_mostly;
35EXPORT_SYMBOL_GPL(nf_ct_expect_hsize);
36
f264a7df 37unsigned int nf_ct_expect_max __read_mostly;
a71c0855 38
e9c1b084 39static struct kmem_cache *nf_ct_expect_cachep __read_mostly;
77ab9cff 40
bc01befd
PNA
41static HLIST_HEAD(nf_ct_userspace_expect_list);
42
77ab9cff 43/* nf_conntrack_expect helper functions */
ebbf41df
PNA
44void nf_ct_unlink_expect_report(struct nf_conntrack_expect *exp,
45 u32 pid, int report)
77ab9cff
MJ
46{
47 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 48 struct net *net = nf_ct_exp_net(exp);
77ab9cff 49
77ab9cff
MJ
50 NF_CT_ASSERT(!timer_pending(&exp->timeout));
51
7d0742da 52 hlist_del_rcu(&exp->hnode);
9b03f38d 53 net->ct.expect_count--;
a71c0855 54
b560580a 55 hlist_del(&exp->lnode);
bc01befd
PNA
56 if (!(exp->flags & NF_CT_EXPECT_USERSPACE))
57 master_help->expecting[exp->class]--;
58
ebbf41df 59 nf_ct_expect_event_report(IPEXP_DESTROY, exp, pid, report);
6823645d 60 nf_ct_expect_put(exp);
b560580a 61
0d55af87 62 NF_CT_STAT_INC(net, expect_delete);
77ab9cff 63}
ebbf41df 64EXPORT_SYMBOL_GPL(nf_ct_unlink_expect_report);
77ab9cff 65
6823645d 66static void nf_ct_expectation_timed_out(unsigned long ul_expect)
77ab9cff
MJ
67{
68 struct nf_conntrack_expect *exp = (void *)ul_expect;
69
f8ba1aff 70 spin_lock_bh(&nf_conntrack_lock);
77ab9cff 71 nf_ct_unlink_expect(exp);
f8ba1aff 72 spin_unlock_bh(&nf_conntrack_lock);
6823645d 73 nf_ct_expect_put(exp);
77ab9cff
MJ
74}
75
a71c0855
PM
76static unsigned int nf_ct_expect_dst_hash(const struct nf_conntrack_tuple *tuple)
77{
34498825
PM
78 unsigned int hash;
79
f682cefa
CG
80 if (unlikely(!nf_conntrack_hash_rnd)) {
81 init_nf_conntrack_hash_rnd();
a71c0855
PM
82 }
83
34498825 84 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all),
a71c0855 85 (((tuple->dst.protonum ^ tuple->src.l3num) << 16) |
f682cefa 86 (__force __u16)tuple->dst.u.all) ^ nf_conntrack_hash_rnd);
34498825 87 return ((u64)hash * nf_ct_expect_hsize) >> 32;
a71c0855
PM
88}
89
77ab9cff 90struct nf_conntrack_expect *
5d0aa2cc
PM
91__nf_ct_expect_find(struct net *net, u16 zone,
92 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
93{
94 struct nf_conntrack_expect *i;
a71c0855
PM
95 struct hlist_node *n;
96 unsigned int h;
97
9b03f38d 98 if (!net->ct.expect_count)
a71c0855 99 return NULL;
77ab9cff 100
a71c0855 101 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 102 hlist_for_each_entry_rcu(i, n, &net->ct.expect_hash[h], hnode) {
5d0aa2cc
PM
103 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
104 nf_ct_zone(i->master) == zone)
77ab9cff
MJ
105 return i;
106 }
107 return NULL;
108}
6823645d 109EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
77ab9cff
MJ
110
111/* Just find a expectation corresponding to a tuple. */
112struct nf_conntrack_expect *
5d0aa2cc
PM
113nf_ct_expect_find_get(struct net *net, u16 zone,
114 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
115{
116 struct nf_conntrack_expect *i;
117
7d0742da 118 rcu_read_lock();
5d0aa2cc 119 i = __nf_ct_expect_find(net, zone, tuple);
7d0742da
PM
120 if (i && !atomic_inc_not_zero(&i->use))
121 i = NULL;
122 rcu_read_unlock();
77ab9cff
MJ
123
124 return i;
125}
6823645d 126EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
77ab9cff
MJ
127
128/* If an expectation for this connection is found, it gets delete from
129 * global list then returned. */
130struct nf_conntrack_expect *
5d0aa2cc
PM
131nf_ct_find_expectation(struct net *net, u16 zone,
132 const struct nf_conntrack_tuple *tuple)
77ab9cff 133{
359b9ab6
PM
134 struct nf_conntrack_expect *i, *exp = NULL;
135 struct hlist_node *n;
136 unsigned int h;
137
9b03f38d 138 if (!net->ct.expect_count)
359b9ab6 139 return NULL;
ece00641 140
359b9ab6 141 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 142 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
359b9ab6 143 if (!(i->flags & NF_CT_EXPECT_INACTIVE) &&
5d0aa2cc
PM
144 nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
145 nf_ct_zone(i->master) == zone) {
359b9ab6
PM
146 exp = i;
147 break;
148 }
149 }
ece00641
YK
150 if (!exp)
151 return NULL;
77ab9cff 152
77ab9cff
MJ
153 /* If master is not in hash table yet (ie. packet hasn't left
154 this machine yet), how can other end know about expected?
155 Hence these are not the droids you are looking for (if
156 master ct never got confirmed, we'd hold a reference to it
157 and weird things would happen to future packets). */
ece00641
YK
158 if (!nf_ct_is_confirmed(exp->master))
159 return NULL;
160
161 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
162 atomic_inc(&exp->use);
163 return exp;
164 } else if (del_timer(&exp->timeout)) {
165 nf_ct_unlink_expect(exp);
166 return exp;
77ab9cff 167 }
ece00641 168
77ab9cff
MJ
169 return NULL;
170}
171
172/* delete all expectations for this conntrack */
173void nf_ct_remove_expectations(struct nf_conn *ct)
174{
77ab9cff 175 struct nf_conn_help *help = nfct_help(ct);
b560580a
PM
176 struct nf_conntrack_expect *exp;
177 struct hlist_node *n, *next;
77ab9cff
MJ
178
179 /* Optimization: most connection never expect any others. */
6002f266 180 if (!help)
77ab9cff
MJ
181 return;
182
b560580a
PM
183 hlist_for_each_entry_safe(exp, n, next, &help->expectations, lnode) {
184 if (del_timer(&exp->timeout)) {
185 nf_ct_unlink_expect(exp);
186 nf_ct_expect_put(exp);
601e68e1 187 }
77ab9cff
MJ
188 }
189}
13b18339 190EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
77ab9cff
MJ
191
192/* Would two expected things clash? */
193static inline int expect_clash(const struct nf_conntrack_expect *a,
194 const struct nf_conntrack_expect *b)
195{
196 /* Part covered by intersection of masks must be unequal,
197 otherwise they clash */
d4156e8c 198 struct nf_conntrack_tuple_mask intersect_mask;
77ab9cff
MJ
199 int count;
200
77ab9cff 201 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
77ab9cff
MJ
202
203 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
204 intersect_mask.src.u3.all[count] =
205 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
206 }
207
77ab9cff
MJ
208 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask);
209}
210
211static inline int expect_matches(const struct nf_conntrack_expect *a,
212 const struct nf_conntrack_expect *b)
213{
f64f9e71
JP
214 return a->master == b->master && a->class == b->class &&
215 nf_ct_tuple_equal(&a->tuple, &b->tuple) &&
5d0aa2cc
PM
216 nf_ct_tuple_mask_equal(&a->mask, &b->mask) &&
217 nf_ct_zone(a->master) == nf_ct_zone(b->master);
77ab9cff
MJ
218}
219
220/* Generally a bad idea to call this: could have matched already. */
6823645d 221void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
77ab9cff 222{
f8ba1aff 223 spin_lock_bh(&nf_conntrack_lock);
4e1d4e6c
PM
224 if (del_timer(&exp->timeout)) {
225 nf_ct_unlink_expect(exp);
226 nf_ct_expect_put(exp);
77ab9cff 227 }
f8ba1aff 228 spin_unlock_bh(&nf_conntrack_lock);
77ab9cff 229}
6823645d 230EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
77ab9cff
MJ
231
232/* We don't increase the master conntrack refcount for non-fulfilled
233 * conntracks. During the conntrack destruction, the expectations are
234 * always killed before the conntrack itself */
6823645d 235struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
77ab9cff
MJ
236{
237 struct nf_conntrack_expect *new;
238
6823645d 239 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
77ab9cff
MJ
240 if (!new)
241 return NULL;
242
243 new->master = me;
244 atomic_set(&new->use, 1);
245 return new;
246}
6823645d 247EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
77ab9cff 248
6002f266 249void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
76108cea 250 u_int8_t family,
1d9d7522
PM
251 const union nf_inet_addr *saddr,
252 const union nf_inet_addr *daddr,
253 u_int8_t proto, const __be16 *src, const __be16 *dst)
d6a9b650
PM
254{
255 int len;
256
257 if (family == AF_INET)
258 len = 4;
259 else
260 len = 16;
261
262 exp->flags = 0;
6002f266 263 exp->class = class;
d6a9b650
PM
264 exp->expectfn = NULL;
265 exp->helper = NULL;
266 exp->tuple.src.l3num = family;
267 exp->tuple.dst.protonum = proto;
d6a9b650
PM
268
269 if (saddr) {
270 memcpy(&exp->tuple.src.u3, saddr, len);
271 if (sizeof(exp->tuple.src.u3) > len)
272 /* address needs to be cleared for nf_ct_tuple_equal */
273 memset((void *)&exp->tuple.src.u3 + len, 0x00,
274 sizeof(exp->tuple.src.u3) - len);
275 memset(&exp->mask.src.u3, 0xFF, len);
276 if (sizeof(exp->mask.src.u3) > len)
277 memset((void *)&exp->mask.src.u3 + len, 0x00,
278 sizeof(exp->mask.src.u3) - len);
279 } else {
280 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
281 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
282 }
283
d6a9b650 284 if (src) {
a34c4589
AV
285 exp->tuple.src.u.all = *src;
286 exp->mask.src.u.all = htons(0xFFFF);
d6a9b650
PM
287 } else {
288 exp->tuple.src.u.all = 0;
289 exp->mask.src.u.all = 0;
290 }
291
d4156e8c
PM
292 memcpy(&exp->tuple.dst.u3, daddr, len);
293 if (sizeof(exp->tuple.dst.u3) > len)
294 /* address needs to be cleared for nf_ct_tuple_equal */
295 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
296 sizeof(exp->tuple.dst.u3) - len);
297
a34c4589 298 exp->tuple.dst.u.all = *dst;
d6a9b650 299}
6823645d 300EXPORT_SYMBOL_GPL(nf_ct_expect_init);
d6a9b650 301
7d0742da
PM
302static void nf_ct_expect_free_rcu(struct rcu_head *head)
303{
304 struct nf_conntrack_expect *exp;
305
306 exp = container_of(head, struct nf_conntrack_expect, rcu);
307 kmem_cache_free(nf_ct_expect_cachep, exp);
308}
309
6823645d 310void nf_ct_expect_put(struct nf_conntrack_expect *exp)
77ab9cff
MJ
311{
312 if (atomic_dec_and_test(&exp->use))
7d0742da 313 call_rcu(&exp->rcu, nf_ct_expect_free_rcu);
77ab9cff 314}
6823645d 315EXPORT_SYMBOL_GPL(nf_ct_expect_put);
77ab9cff 316
6823645d 317static void nf_ct_expect_insert(struct nf_conntrack_expect *exp)
77ab9cff
MJ
318{
319 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 320 struct net *net = nf_ct_exp_net(exp);
6002f266 321 const struct nf_conntrack_expect_policy *p;
a71c0855 322 unsigned int h = nf_ct_expect_dst_hash(&exp->tuple);
77ab9cff 323
3bfd45f9
ED
324 /* two references : one for hash insert, one for the timer */
325 atomic_add(2, &exp->use);
b560580a 326
bc01befd
PNA
327 if (master_help) {
328 hlist_add_head(&exp->lnode, &master_help->expectations);
329 master_help->expecting[exp->class]++;
330 } else if (exp->flags & NF_CT_EXPECT_USERSPACE)
331 hlist_add_head(&exp->lnode, &nf_ct_userspace_expect_list);
a71c0855 332
9b03f38d
AD
333 hlist_add_head_rcu(&exp->hnode, &net->ct.expect_hash[h]);
334 net->ct.expect_count++;
77ab9cff 335
6823645d
PM
336 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
337 (unsigned long)exp);
bc01befd 338 if (master_help) {
c5d277d2
ED
339 p = &rcu_dereference_protected(
340 master_help->helper,
341 lockdep_is_held(&nf_conntrack_lock)
342 )->expect_policy[exp->class];
bc01befd
PNA
343 exp->timeout.expires = jiffies + p->timeout * HZ;
344 }
77ab9cff
MJ
345 add_timer(&exp->timeout);
346
0d55af87 347 NF_CT_STAT_INC(net, expect_create);
77ab9cff
MJ
348}
349
350/* Race with expectations being used means we could have none to find; OK. */
6002f266
PM
351static void evict_oldest_expect(struct nf_conn *master,
352 struct nf_conntrack_expect *new)
77ab9cff 353{
b560580a 354 struct nf_conn_help *master_help = nfct_help(master);
6002f266 355 struct nf_conntrack_expect *exp, *last = NULL;
b560580a 356 struct hlist_node *n;
77ab9cff 357
6002f266
PM
358 hlist_for_each_entry(exp, n, &master_help->expectations, lnode) {
359 if (exp->class == new->class)
360 last = exp;
361 }
b560580a 362
6002f266
PM
363 if (last && del_timer(&last->timeout)) {
364 nf_ct_unlink_expect(last);
365 nf_ct_expect_put(last);
77ab9cff
MJ
366 }
367}
368
369static inline int refresh_timer(struct nf_conntrack_expect *i)
370{
371 struct nf_conn_help *master_help = nfct_help(i->master);
6002f266 372 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
373
374 if (!del_timer(&i->timeout))
375 return 0;
376
c5d277d2
ED
377 p = &rcu_dereference_protected(
378 master_help->helper,
379 lockdep_is_held(&nf_conntrack_lock)
380 )->expect_policy[i->class];
6002f266 381 i->timeout.expires = jiffies + p->timeout * HZ;
77ab9cff
MJ
382 add_timer(&i->timeout);
383 return 1;
384}
385
19abb7b0 386static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
77ab9cff 387{
6002f266 388 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
389 struct nf_conntrack_expect *i;
390 struct nf_conn *master = expect->master;
391 struct nf_conn_help *master_help = nfct_help(master);
9b03f38d 392 struct net *net = nf_ct_exp_net(expect);
a71c0855
PM
393 struct hlist_node *n;
394 unsigned int h;
83731671 395 int ret = 1;
77ab9cff 396
bc01befd
PNA
397 /* Don't allow expectations created from kernel-space with no helper */
398 if (!(expect->flags & NF_CT_EXPECT_USERSPACE) &&
399 (!master_help || (master_help && !master_help->helper))) {
3c158f7f
PM
400 ret = -ESHUTDOWN;
401 goto out;
402 }
a71c0855 403 h = nf_ct_expect_dst_hash(&expect->tuple);
9b03f38d 404 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
77ab9cff
MJ
405 if (expect_matches(i, expect)) {
406 /* Refresh timer: if it's dying, ignore.. */
407 if (refresh_timer(i)) {
408 ret = 0;
409 goto out;
410 }
411 } else if (expect_clash(i, expect)) {
412 ret = -EBUSY;
413 goto out;
414 }
415 }
416 /* Will be over limit? */
bc01befd 417 if (master_help) {
c5d277d2
ED
418 p = &rcu_dereference_protected(
419 master_help->helper,
420 lockdep_is_held(&nf_conntrack_lock)
421 )->expect_policy[expect->class];
bc01befd
PNA
422 if (p->max_expected &&
423 master_help->expecting[expect->class] >= p->max_expected) {
424 evict_oldest_expect(master, expect);
425 if (master_help->expecting[expect->class]
426 >= p->max_expected) {
427 ret = -EMFILE;
428 goto out;
429 }
6002f266
PM
430 }
431 }
77ab9cff 432
9b03f38d 433 if (net->ct.expect_count >= nf_ct_expect_max) {
f264a7df
PM
434 if (net_ratelimit())
435 printk(KERN_WARNING
3d89e9cf 436 "nf_conntrack: expectation table full\n");
f264a7df 437 ret = -EMFILE;
f264a7df 438 }
19abb7b0
PNA
439out:
440 return ret;
441}
442
83731671
PNA
443int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
444 u32 pid, int report)
19abb7b0
PNA
445{
446 int ret;
447
448 spin_lock_bh(&nf_conntrack_lock);
449 ret = __nf_ct_expect_check(expect);
83731671 450 if (ret <= 0)
19abb7b0 451 goto out;
f264a7df 452
83731671 453 ret = 0;
6823645d 454 nf_ct_expect_insert(expect);
f8ba1aff 455 spin_unlock_bh(&nf_conntrack_lock);
83731671 456 nf_ct_expect_event_report(IPEXP_NEW, expect, pid, report);
77ab9cff 457 return ret;
19abb7b0
PNA
458out:
459 spin_unlock_bh(&nf_conntrack_lock);
19abb7b0
PNA
460 return ret;
461}
462EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
463
bc01befd
PNA
464void nf_ct_remove_userspace_expectations(void)
465{
466 struct nf_conntrack_expect *exp;
467 struct hlist_node *n, *next;
468
469 hlist_for_each_entry_safe(exp, n, next,
470 &nf_ct_userspace_expect_list, lnode) {
471 if (del_timer(&exp->timeout)) {
472 nf_ct_unlink_expect(exp);
473 nf_ct_expect_put(exp);
474 }
475 }
476}
477EXPORT_SYMBOL_GPL(nf_ct_remove_userspace_expectations);
478
77ab9cff 479#ifdef CONFIG_PROC_FS
5d08ad44 480struct ct_expect_iter_state {
dc5129f8 481 struct seq_net_private p;
5d08ad44
PM
482 unsigned int bucket;
483};
484
485static struct hlist_node *ct_expect_get_first(struct seq_file *seq)
77ab9cff 486{
dc5129f8 487 struct net *net = seq_file_net(seq);
5d08ad44 488 struct ct_expect_iter_state *st = seq->private;
7d0742da 489 struct hlist_node *n;
77ab9cff 490
5d08ad44 491 for (st->bucket = 0; st->bucket < nf_ct_expect_hsize; st->bucket++) {
0e60ebe0 492 n = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
7d0742da
PM
493 if (n)
494 return n;
5d08ad44
PM
495 }
496 return NULL;
497}
77ab9cff 498
5d08ad44
PM
499static struct hlist_node *ct_expect_get_next(struct seq_file *seq,
500 struct hlist_node *head)
501{
dc5129f8 502 struct net *net = seq_file_net(seq);
5d08ad44 503 struct ct_expect_iter_state *st = seq->private;
77ab9cff 504
0e60ebe0 505 head = rcu_dereference(hlist_next_rcu(head));
5d08ad44
PM
506 while (head == NULL) {
507 if (++st->bucket >= nf_ct_expect_hsize)
77ab9cff 508 return NULL;
0e60ebe0 509 head = rcu_dereference(hlist_first_rcu(&net->ct.expect_hash[st->bucket]));
77ab9cff 510 }
5d08ad44 511 return head;
77ab9cff
MJ
512}
513
5d08ad44 514static struct hlist_node *ct_expect_get_idx(struct seq_file *seq, loff_t pos)
77ab9cff 515{
5d08ad44 516 struct hlist_node *head = ct_expect_get_first(seq);
77ab9cff 517
5d08ad44
PM
518 if (head)
519 while (pos && (head = ct_expect_get_next(seq, head)))
520 pos--;
521 return pos ? NULL : head;
522}
77ab9cff 523
5d08ad44 524static void *exp_seq_start(struct seq_file *seq, loff_t *pos)
7d0742da 525 __acquires(RCU)
5d08ad44 526{
7d0742da 527 rcu_read_lock();
5d08ad44
PM
528 return ct_expect_get_idx(seq, *pos);
529}
77ab9cff 530
5d08ad44
PM
531static void *exp_seq_next(struct seq_file *seq, void *v, loff_t *pos)
532{
533 (*pos)++;
534 return ct_expect_get_next(seq, v);
77ab9cff
MJ
535}
536
5d08ad44 537static void exp_seq_stop(struct seq_file *seq, void *v)
7d0742da 538 __releases(RCU)
77ab9cff 539{
7d0742da 540 rcu_read_unlock();
77ab9cff
MJ
541}
542
543static int exp_seq_show(struct seq_file *s, void *v)
544{
5d08ad44 545 struct nf_conntrack_expect *expect;
b87921bd 546 struct nf_conntrack_helper *helper;
5d08ad44 547 struct hlist_node *n = v;
359b9ab6 548 char *delim = "";
5d08ad44
PM
549
550 expect = hlist_entry(n, struct nf_conntrack_expect, hnode);
77ab9cff
MJ
551
552 if (expect->timeout.function)
553 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
554 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
555 else
556 seq_printf(s, "- ");
557 seq_printf(s, "l3proto = %u proto=%u ",
558 expect->tuple.src.l3num,
559 expect->tuple.dst.protonum);
560 print_tuple(s, &expect->tuple,
561 __nf_ct_l3proto_find(expect->tuple.src.l3num),
605dcad6 562 __nf_ct_l4proto_find(expect->tuple.src.l3num,
77ab9cff 563 expect->tuple.dst.protonum));
4bb119ea 564
359b9ab6
PM
565 if (expect->flags & NF_CT_EXPECT_PERMANENT) {
566 seq_printf(s, "PERMANENT");
567 delim = ",";
568 }
bc01befd 569 if (expect->flags & NF_CT_EXPECT_INACTIVE) {
359b9ab6 570 seq_printf(s, "%sINACTIVE", delim);
bc01befd
PNA
571 delim = ",";
572 }
573 if (expect->flags & NF_CT_EXPECT_USERSPACE)
574 seq_printf(s, "%sUSERSPACE", delim);
4bb119ea 575
b87921bd
PM
576 helper = rcu_dereference(nfct_help(expect->master)->helper);
577 if (helper) {
578 seq_printf(s, "%s%s", expect->flags ? " " : "", helper->name);
579 if (helper->expect_policy[expect->class].name)
580 seq_printf(s, "/%s",
581 helper->expect_policy[expect->class].name);
582 }
583
77ab9cff
MJ
584 return seq_putc(s, '\n');
585}
586
56b3d975 587static const struct seq_operations exp_seq_ops = {
77ab9cff
MJ
588 .start = exp_seq_start,
589 .next = exp_seq_next,
590 .stop = exp_seq_stop,
591 .show = exp_seq_show
592};
593
594static int exp_open(struct inode *inode, struct file *file)
595{
dc5129f8 596 return seq_open_net(inode, file, &exp_seq_ops,
e2da5913 597 sizeof(struct ct_expect_iter_state));
77ab9cff
MJ
598}
599
5d08ad44 600static const struct file_operations exp_file_ops = {
77ab9cff
MJ
601 .owner = THIS_MODULE,
602 .open = exp_open,
603 .read = seq_read,
604 .llseek = seq_lseek,
dc5129f8 605 .release = seq_release_net,
77ab9cff
MJ
606};
607#endif /* CONFIG_PROC_FS */
e9c1b084 608
dc5129f8 609static int exp_proc_init(struct net *net)
e9c1b084
PM
610{
611#ifdef CONFIG_PROC_FS
612 struct proc_dir_entry *proc;
613
dc5129f8 614 proc = proc_net_fops_create(net, "nf_conntrack_expect", 0440, &exp_file_ops);
e9c1b084
PM
615 if (!proc)
616 return -ENOMEM;
617#endif /* CONFIG_PROC_FS */
618 return 0;
619}
620
dc5129f8 621static void exp_proc_remove(struct net *net)
e9c1b084
PM
622{
623#ifdef CONFIG_PROC_FS
dc5129f8 624 proc_net_remove(net, "nf_conntrack_expect");
e9c1b084
PM
625#endif /* CONFIG_PROC_FS */
626}
627
13ccdfc2 628module_param_named(expect_hashsize, nf_ct_expect_hsize, uint, 0400);
a71c0855 629
9b03f38d 630int nf_conntrack_expect_init(struct net *net)
e9c1b084 631{
a71c0855
PM
632 int err = -ENOMEM;
633
08f6547d
AD
634 if (net_eq(net, &init_net)) {
635 if (!nf_ct_expect_hsize) {
d696c7bd 636 nf_ct_expect_hsize = net->ct.htable_size / 256;
08f6547d
AD
637 if (!nf_ct_expect_hsize)
638 nf_ct_expect_hsize = 1;
639 }
640 nf_ct_expect_max = nf_ct_expect_hsize * 4;
a71c0855
PM
641 }
642
9b03f38d 643 net->ct.expect_count = 0;
d862a662 644 net->ct.expect_hash = nf_ct_alloc_hashtable(&nf_ct_expect_hsize, 0);
9b03f38d 645 if (net->ct.expect_hash == NULL)
a71c0855 646 goto err1;
e9c1b084 647
08f6547d
AD
648 if (net_eq(net, &init_net)) {
649 nf_ct_expect_cachep = kmem_cache_create("nf_conntrack_expect",
e9c1b084 650 sizeof(struct nf_conntrack_expect),
20c2df83 651 0, 0, NULL);
08f6547d
AD
652 if (!nf_ct_expect_cachep)
653 goto err2;
654 }
e9c1b084 655
dc5129f8 656 err = exp_proc_init(net);
e9c1b084 657 if (err < 0)
a71c0855 658 goto err3;
e9c1b084
PM
659
660 return 0;
661
a71c0855 662err3:
08f6547d
AD
663 if (net_eq(net, &init_net))
664 kmem_cache_destroy(nf_ct_expect_cachep);
12293bf9 665err2:
d862a662 666 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
a71c0855 667err1:
e9c1b084
PM
668 return err;
669}
670
9b03f38d 671void nf_conntrack_expect_fini(struct net *net)
e9c1b084 672{
dc5129f8 673 exp_proc_remove(net);
308ff823
JDB
674 if (net_eq(net, &init_net)) {
675 rcu_barrier(); /* Wait for call_rcu() before destroy */
08f6547d 676 kmem_cache_destroy(nf_ct_expect_cachep);
308ff823 677 }
d862a662 678 nf_ct_free_hashtable(net->ct.expect_hash, nf_ct_expect_hsize);
e9c1b084 679}