]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/netfilter/nf_conntrack_expect.c
netfilter: nf_conntrack: add support for "conntrack zones"
[net-next-2.6.git] / net / netfilter / nf_conntrack_expect.c
CommitLineData
77ab9cff
MJ
1/* Expectation handling for nf_conntrack. */
2
3/* (C) 1999-2001 Paul `Rusty' Russell
4 * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org>
5 * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 */
11
12#include <linux/types.h>
13#include <linux/netfilter.h>
14#include <linux/skbuff.h>
15#include <linux/proc_fs.h>
16#include <linux/seq_file.h>
17#include <linux/stddef.h>
18#include <linux/slab.h>
19#include <linux/err.h>
20#include <linux/percpu.h>
21#include <linux/kernel.h>
a71c0855 22#include <linux/jhash.h>
457c4cbc 23#include <net/net_namespace.h>
77ab9cff
MJ
24
25#include <net/netfilter/nf_conntrack.h>
26#include <net/netfilter/nf_conntrack_core.h>
27#include <net/netfilter/nf_conntrack_expect.h>
28#include <net/netfilter/nf_conntrack_helper.h>
29#include <net/netfilter/nf_conntrack_tuple.h>
5d0aa2cc 30#include <net/netfilter/nf_conntrack_zones.h>
77ab9cff 31
a71c0855
PM
32unsigned int nf_ct_expect_hsize __read_mostly;
33EXPORT_SYMBOL_GPL(nf_ct_expect_hsize);
34
35static unsigned int nf_ct_expect_hash_rnd __read_mostly;
f264a7df 36unsigned int nf_ct_expect_max __read_mostly;
a71c0855 37static int nf_ct_expect_hash_rnd_initted __read_mostly;
a71c0855 38
e9c1b084 39static struct kmem_cache *nf_ct_expect_cachep __read_mostly;
77ab9cff
MJ
40
41/* nf_conntrack_expect helper functions */
42void nf_ct_unlink_expect(struct nf_conntrack_expect *exp)
43{
44 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 45 struct net *net = nf_ct_exp_net(exp);
77ab9cff
MJ
46
47 NF_CT_ASSERT(master_help);
48 NF_CT_ASSERT(!timer_pending(&exp->timeout));
49
7d0742da 50 hlist_del_rcu(&exp->hnode);
9b03f38d 51 net->ct.expect_count--;
a71c0855 52
b560580a 53 hlist_del(&exp->lnode);
6002f266 54 master_help->expecting[exp->class]--;
6823645d 55 nf_ct_expect_put(exp);
b560580a 56
0d55af87 57 NF_CT_STAT_INC(net, expect_delete);
77ab9cff 58}
13b18339 59EXPORT_SYMBOL_GPL(nf_ct_unlink_expect);
77ab9cff 60
6823645d 61static void nf_ct_expectation_timed_out(unsigned long ul_expect)
77ab9cff
MJ
62{
63 struct nf_conntrack_expect *exp = (void *)ul_expect;
64
f8ba1aff 65 spin_lock_bh(&nf_conntrack_lock);
77ab9cff 66 nf_ct_unlink_expect(exp);
f8ba1aff 67 spin_unlock_bh(&nf_conntrack_lock);
6823645d 68 nf_ct_expect_put(exp);
77ab9cff
MJ
69}
70
a71c0855
PM
71static unsigned int nf_ct_expect_dst_hash(const struct nf_conntrack_tuple *tuple)
72{
34498825
PM
73 unsigned int hash;
74
a71c0855 75 if (unlikely(!nf_ct_expect_hash_rnd_initted)) {
af07d241
HPP
76 get_random_bytes(&nf_ct_expect_hash_rnd,
77 sizeof(nf_ct_expect_hash_rnd));
a71c0855
PM
78 nf_ct_expect_hash_rnd_initted = 1;
79 }
80
34498825 81 hash = jhash2(tuple->dst.u3.all, ARRAY_SIZE(tuple->dst.u3.all),
a71c0855 82 (((tuple->dst.protonum ^ tuple->src.l3num) << 16) |
34498825
PM
83 (__force __u16)tuple->dst.u.all) ^ nf_ct_expect_hash_rnd);
84 return ((u64)hash * nf_ct_expect_hsize) >> 32;
a71c0855
PM
85}
86
77ab9cff 87struct nf_conntrack_expect *
5d0aa2cc
PM
88__nf_ct_expect_find(struct net *net, u16 zone,
89 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
90{
91 struct nf_conntrack_expect *i;
a71c0855
PM
92 struct hlist_node *n;
93 unsigned int h;
94
9b03f38d 95 if (!net->ct.expect_count)
a71c0855 96 return NULL;
77ab9cff 97
a71c0855 98 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 99 hlist_for_each_entry_rcu(i, n, &net->ct.expect_hash[h], hnode) {
5d0aa2cc
PM
100 if (nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
101 nf_ct_zone(i->master) == zone)
77ab9cff
MJ
102 return i;
103 }
104 return NULL;
105}
6823645d 106EXPORT_SYMBOL_GPL(__nf_ct_expect_find);
77ab9cff
MJ
107
108/* Just find a expectation corresponding to a tuple. */
109struct nf_conntrack_expect *
5d0aa2cc
PM
110nf_ct_expect_find_get(struct net *net, u16 zone,
111 const struct nf_conntrack_tuple *tuple)
77ab9cff
MJ
112{
113 struct nf_conntrack_expect *i;
114
7d0742da 115 rcu_read_lock();
5d0aa2cc 116 i = __nf_ct_expect_find(net, zone, tuple);
7d0742da
PM
117 if (i && !atomic_inc_not_zero(&i->use))
118 i = NULL;
119 rcu_read_unlock();
77ab9cff
MJ
120
121 return i;
122}
6823645d 123EXPORT_SYMBOL_GPL(nf_ct_expect_find_get);
77ab9cff
MJ
124
125/* If an expectation for this connection is found, it gets delete from
126 * global list then returned. */
127struct nf_conntrack_expect *
5d0aa2cc
PM
128nf_ct_find_expectation(struct net *net, u16 zone,
129 const struct nf_conntrack_tuple *tuple)
77ab9cff 130{
359b9ab6
PM
131 struct nf_conntrack_expect *i, *exp = NULL;
132 struct hlist_node *n;
133 unsigned int h;
134
9b03f38d 135 if (!net->ct.expect_count)
359b9ab6 136 return NULL;
ece00641 137
359b9ab6 138 h = nf_ct_expect_dst_hash(tuple);
9b03f38d 139 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
359b9ab6 140 if (!(i->flags & NF_CT_EXPECT_INACTIVE) &&
5d0aa2cc
PM
141 nf_ct_tuple_mask_cmp(tuple, &i->tuple, &i->mask) &&
142 nf_ct_zone(i->master) == zone) {
359b9ab6
PM
143 exp = i;
144 break;
145 }
146 }
ece00641
YK
147 if (!exp)
148 return NULL;
77ab9cff 149
77ab9cff
MJ
150 /* If master is not in hash table yet (ie. packet hasn't left
151 this machine yet), how can other end know about expected?
152 Hence these are not the droids you are looking for (if
153 master ct never got confirmed, we'd hold a reference to it
154 and weird things would happen to future packets). */
ece00641
YK
155 if (!nf_ct_is_confirmed(exp->master))
156 return NULL;
157
158 if (exp->flags & NF_CT_EXPECT_PERMANENT) {
159 atomic_inc(&exp->use);
160 return exp;
161 } else if (del_timer(&exp->timeout)) {
162 nf_ct_unlink_expect(exp);
163 return exp;
77ab9cff 164 }
ece00641 165
77ab9cff
MJ
166 return NULL;
167}
168
169/* delete all expectations for this conntrack */
170void nf_ct_remove_expectations(struct nf_conn *ct)
171{
77ab9cff 172 struct nf_conn_help *help = nfct_help(ct);
b560580a
PM
173 struct nf_conntrack_expect *exp;
174 struct hlist_node *n, *next;
77ab9cff
MJ
175
176 /* Optimization: most connection never expect any others. */
6002f266 177 if (!help)
77ab9cff
MJ
178 return;
179
b560580a
PM
180 hlist_for_each_entry_safe(exp, n, next, &help->expectations, lnode) {
181 if (del_timer(&exp->timeout)) {
182 nf_ct_unlink_expect(exp);
183 nf_ct_expect_put(exp);
601e68e1 184 }
77ab9cff
MJ
185 }
186}
13b18339 187EXPORT_SYMBOL_GPL(nf_ct_remove_expectations);
77ab9cff
MJ
188
189/* Would two expected things clash? */
190static inline int expect_clash(const struct nf_conntrack_expect *a,
191 const struct nf_conntrack_expect *b)
192{
193 /* Part covered by intersection of masks must be unequal,
194 otherwise they clash */
d4156e8c 195 struct nf_conntrack_tuple_mask intersect_mask;
77ab9cff
MJ
196 int count;
197
77ab9cff 198 intersect_mask.src.u.all = a->mask.src.u.all & b->mask.src.u.all;
77ab9cff
MJ
199
200 for (count = 0; count < NF_CT_TUPLE_L3SIZE; count++){
201 intersect_mask.src.u3.all[count] =
202 a->mask.src.u3.all[count] & b->mask.src.u3.all[count];
203 }
204
77ab9cff
MJ
205 return nf_ct_tuple_mask_cmp(&a->tuple, &b->tuple, &intersect_mask);
206}
207
208static inline int expect_matches(const struct nf_conntrack_expect *a,
209 const struct nf_conntrack_expect *b)
210{
f64f9e71
JP
211 return a->master == b->master && a->class == b->class &&
212 nf_ct_tuple_equal(&a->tuple, &b->tuple) &&
5d0aa2cc
PM
213 nf_ct_tuple_mask_equal(&a->mask, &b->mask) &&
214 nf_ct_zone(a->master) == nf_ct_zone(b->master);
77ab9cff
MJ
215}
216
217/* Generally a bad idea to call this: could have matched already. */
6823645d 218void nf_ct_unexpect_related(struct nf_conntrack_expect *exp)
77ab9cff 219{
f8ba1aff 220 spin_lock_bh(&nf_conntrack_lock);
4e1d4e6c
PM
221 if (del_timer(&exp->timeout)) {
222 nf_ct_unlink_expect(exp);
223 nf_ct_expect_put(exp);
77ab9cff 224 }
f8ba1aff 225 spin_unlock_bh(&nf_conntrack_lock);
77ab9cff 226}
6823645d 227EXPORT_SYMBOL_GPL(nf_ct_unexpect_related);
77ab9cff
MJ
228
229/* We don't increase the master conntrack refcount for non-fulfilled
230 * conntracks. During the conntrack destruction, the expectations are
231 * always killed before the conntrack itself */
6823645d 232struct nf_conntrack_expect *nf_ct_expect_alloc(struct nf_conn *me)
77ab9cff
MJ
233{
234 struct nf_conntrack_expect *new;
235
6823645d 236 new = kmem_cache_alloc(nf_ct_expect_cachep, GFP_ATOMIC);
77ab9cff
MJ
237 if (!new)
238 return NULL;
239
240 new->master = me;
241 atomic_set(&new->use, 1);
242 return new;
243}
6823645d 244EXPORT_SYMBOL_GPL(nf_ct_expect_alloc);
77ab9cff 245
6002f266 246void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
76108cea 247 u_int8_t family,
1d9d7522
PM
248 const union nf_inet_addr *saddr,
249 const union nf_inet_addr *daddr,
250 u_int8_t proto, const __be16 *src, const __be16 *dst)
d6a9b650
PM
251{
252 int len;
253
254 if (family == AF_INET)
255 len = 4;
256 else
257 len = 16;
258
259 exp->flags = 0;
6002f266 260 exp->class = class;
d6a9b650
PM
261 exp->expectfn = NULL;
262 exp->helper = NULL;
263 exp->tuple.src.l3num = family;
264 exp->tuple.dst.protonum = proto;
d6a9b650
PM
265
266 if (saddr) {
267 memcpy(&exp->tuple.src.u3, saddr, len);
268 if (sizeof(exp->tuple.src.u3) > len)
269 /* address needs to be cleared for nf_ct_tuple_equal */
270 memset((void *)&exp->tuple.src.u3 + len, 0x00,
271 sizeof(exp->tuple.src.u3) - len);
272 memset(&exp->mask.src.u3, 0xFF, len);
273 if (sizeof(exp->mask.src.u3) > len)
274 memset((void *)&exp->mask.src.u3 + len, 0x00,
275 sizeof(exp->mask.src.u3) - len);
276 } else {
277 memset(&exp->tuple.src.u3, 0x00, sizeof(exp->tuple.src.u3));
278 memset(&exp->mask.src.u3, 0x00, sizeof(exp->mask.src.u3));
279 }
280
d6a9b650 281 if (src) {
a34c4589
AV
282 exp->tuple.src.u.all = *src;
283 exp->mask.src.u.all = htons(0xFFFF);
d6a9b650
PM
284 } else {
285 exp->tuple.src.u.all = 0;
286 exp->mask.src.u.all = 0;
287 }
288
d4156e8c
PM
289 memcpy(&exp->tuple.dst.u3, daddr, len);
290 if (sizeof(exp->tuple.dst.u3) > len)
291 /* address needs to be cleared for nf_ct_tuple_equal */
292 memset((void *)&exp->tuple.dst.u3 + len, 0x00,
293 sizeof(exp->tuple.dst.u3) - len);
294
a34c4589 295 exp->tuple.dst.u.all = *dst;
d6a9b650 296}
6823645d 297EXPORT_SYMBOL_GPL(nf_ct_expect_init);
d6a9b650 298
7d0742da
PM
299static void nf_ct_expect_free_rcu(struct rcu_head *head)
300{
301 struct nf_conntrack_expect *exp;
302
303 exp = container_of(head, struct nf_conntrack_expect, rcu);
304 kmem_cache_free(nf_ct_expect_cachep, exp);
305}
306
6823645d 307void nf_ct_expect_put(struct nf_conntrack_expect *exp)
77ab9cff
MJ
308{
309 if (atomic_dec_and_test(&exp->use))
7d0742da 310 call_rcu(&exp->rcu, nf_ct_expect_free_rcu);
77ab9cff 311}
6823645d 312EXPORT_SYMBOL_GPL(nf_ct_expect_put);
77ab9cff 313
6823645d 314static void nf_ct_expect_insert(struct nf_conntrack_expect *exp)
77ab9cff
MJ
315{
316 struct nf_conn_help *master_help = nfct_help(exp->master);
9b03f38d 317 struct net *net = nf_ct_exp_net(exp);
6002f266 318 const struct nf_conntrack_expect_policy *p;
a71c0855 319 unsigned int h = nf_ct_expect_dst_hash(&exp->tuple);
77ab9cff
MJ
320
321 atomic_inc(&exp->use);
b560580a
PM
322
323 hlist_add_head(&exp->lnode, &master_help->expectations);
6002f266 324 master_help->expecting[exp->class]++;
a71c0855 325
9b03f38d
AD
326 hlist_add_head_rcu(&exp->hnode, &net->ct.expect_hash[h]);
327 net->ct.expect_count++;
77ab9cff 328
6823645d
PM
329 setup_timer(&exp->timeout, nf_ct_expectation_timed_out,
330 (unsigned long)exp);
6002f266
PM
331 p = &master_help->helper->expect_policy[exp->class];
332 exp->timeout.expires = jiffies + p->timeout * HZ;
77ab9cff
MJ
333 add_timer(&exp->timeout);
334
77ab9cff 335 atomic_inc(&exp->use);
0d55af87 336 NF_CT_STAT_INC(net, expect_create);
77ab9cff
MJ
337}
338
339/* Race with expectations being used means we could have none to find; OK. */
6002f266
PM
340static void evict_oldest_expect(struct nf_conn *master,
341 struct nf_conntrack_expect *new)
77ab9cff 342{
b560580a 343 struct nf_conn_help *master_help = nfct_help(master);
6002f266 344 struct nf_conntrack_expect *exp, *last = NULL;
b560580a 345 struct hlist_node *n;
77ab9cff 346
6002f266
PM
347 hlist_for_each_entry(exp, n, &master_help->expectations, lnode) {
348 if (exp->class == new->class)
349 last = exp;
350 }
b560580a 351
6002f266
PM
352 if (last && del_timer(&last->timeout)) {
353 nf_ct_unlink_expect(last);
354 nf_ct_expect_put(last);
77ab9cff
MJ
355 }
356}
357
358static inline int refresh_timer(struct nf_conntrack_expect *i)
359{
360 struct nf_conn_help *master_help = nfct_help(i->master);
6002f266 361 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
362
363 if (!del_timer(&i->timeout))
364 return 0;
365
6002f266
PM
366 p = &master_help->helper->expect_policy[i->class];
367 i->timeout.expires = jiffies + p->timeout * HZ;
77ab9cff
MJ
368 add_timer(&i->timeout);
369 return 1;
370}
371
19abb7b0 372static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
77ab9cff 373{
6002f266 374 const struct nf_conntrack_expect_policy *p;
77ab9cff
MJ
375 struct nf_conntrack_expect *i;
376 struct nf_conn *master = expect->master;
377 struct nf_conn_help *master_help = nfct_help(master);
9b03f38d 378 struct net *net = nf_ct_exp_net(expect);
a71c0855
PM
379 struct hlist_node *n;
380 unsigned int h;
83731671 381 int ret = 1;
77ab9cff 382
3c158f7f
PM
383 if (!master_help->helper) {
384 ret = -ESHUTDOWN;
385 goto out;
386 }
a71c0855 387 h = nf_ct_expect_dst_hash(&expect->tuple);
9b03f38d 388 hlist_for_each_entry(i, n, &net->ct.expect_hash[h], hnode) {
77ab9cff
MJ
389 if (expect_matches(i, expect)) {
390 /* Refresh timer: if it's dying, ignore.. */
391 if (refresh_timer(i)) {
392 ret = 0;
393 goto out;
394 }
395 } else if (expect_clash(i, expect)) {
396 ret = -EBUSY;
397 goto out;
398 }
399 }
400 /* Will be over limit? */
6002f266
PM
401 p = &master_help->helper->expect_policy[expect->class];
402 if (p->max_expected &&
403 master_help->expecting[expect->class] >= p->max_expected) {
404 evict_oldest_expect(master, expect);
405 if (master_help->expecting[expect->class] >= p->max_expected) {
406 ret = -EMFILE;
407 goto out;
408 }
409 }
77ab9cff 410
9b03f38d 411 if (net->ct.expect_count >= nf_ct_expect_max) {
f264a7df
PM
412 if (net_ratelimit())
413 printk(KERN_WARNING
3d89e9cf 414 "nf_conntrack: expectation table full\n");
f264a7df 415 ret = -EMFILE;
f264a7df 416 }
19abb7b0
PNA
417out:
418 return ret;
419}
420
83731671
PNA
421int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
422 u32 pid, int report)
19abb7b0
PNA
423{
424 int ret;
425
426 spin_lock_bh(&nf_conntrack_lock);
427 ret = __nf_ct_expect_check(expect);
83731671 428 if (ret <= 0)
19abb7b0 429 goto out;
f264a7df 430
83731671 431 ret = 0;
6823645d 432 nf_ct_expect_insert(expect);
f8ba1aff 433 spin_unlock_bh(&nf_conntrack_lock);
83731671 434 nf_ct_expect_event_report(IPEXP_NEW, expect, pid, report);
77ab9cff 435 return ret;
19abb7b0
PNA
436out:
437 spin_unlock_bh(&nf_conntrack_lock);
19abb7b0
PNA
438 return ret;
439}
440EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
441
77ab9cff 442#ifdef CONFIG_PROC_FS
5d08ad44 443struct ct_expect_iter_state {
dc5129f8 444 struct seq_net_private p;
5d08ad44
PM
445 unsigned int bucket;
446};
447
448static struct hlist_node *ct_expect_get_first(struct seq_file *seq)
77ab9cff 449{
dc5129f8 450 struct net *net = seq_file_net(seq);
5d08ad44 451 struct ct_expect_iter_state *st = seq->private;
7d0742da 452 struct hlist_node *n;
77ab9cff 453
5d08ad44 454 for (st->bucket = 0; st->bucket < nf_ct_expect_hsize; st->bucket++) {
9b03f38d 455 n = rcu_dereference(net->ct.expect_hash[st->bucket].first);
7d0742da
PM
456 if (n)
457 return n;
5d08ad44
PM
458 }
459 return NULL;
460}
77ab9cff 461
5d08ad44
PM
462static struct hlist_node *ct_expect_get_next(struct seq_file *seq,
463 struct hlist_node *head)
464{
dc5129f8 465 struct net *net = seq_file_net(seq);
5d08ad44 466 struct ct_expect_iter_state *st = seq->private;
77ab9cff 467
7d0742da 468 head = rcu_dereference(head->next);
5d08ad44
PM
469 while (head == NULL) {
470 if (++st->bucket >= nf_ct_expect_hsize)
77ab9cff 471 return NULL;
9b03f38d 472 head = rcu_dereference(net->ct.expect_hash[st->bucket].first);
77ab9cff 473 }
5d08ad44 474 return head;
77ab9cff
MJ
475}
476
5d08ad44 477static struct hlist_node *ct_expect_get_idx(struct seq_file *seq, loff_t pos)
77ab9cff 478{
5d08ad44 479 struct hlist_node *head = ct_expect_get_first(seq);
77ab9cff 480
5d08ad44
PM
481 if (head)
482 while (pos && (head = ct_expect_get_next(seq, head)))
483 pos--;
484 return pos ? NULL : head;
485}
77ab9cff 486
5d08ad44 487static void *exp_seq_start(struct seq_file *seq, loff_t *pos)
7d0742da 488 __acquires(RCU)
5d08ad44 489{
7d0742da 490 rcu_read_lock();
5d08ad44
PM
491 return ct_expect_get_idx(seq, *pos);
492}
77ab9cff 493
5d08ad44
PM
494static void *exp_seq_next(struct seq_file *seq, void *v, loff_t *pos)
495{
496 (*pos)++;
497 return ct_expect_get_next(seq, v);
77ab9cff
MJ
498}
499
5d08ad44 500static void exp_seq_stop(struct seq_file *seq, void *v)
7d0742da 501 __releases(RCU)
77ab9cff 502{
7d0742da 503 rcu_read_unlock();
77ab9cff
MJ
504}
505
506static int exp_seq_show(struct seq_file *s, void *v)
507{
5d08ad44 508 struct nf_conntrack_expect *expect;
b87921bd 509 struct nf_conntrack_helper *helper;
5d08ad44 510 struct hlist_node *n = v;
359b9ab6 511 char *delim = "";
5d08ad44
PM
512
513 expect = hlist_entry(n, struct nf_conntrack_expect, hnode);
77ab9cff
MJ
514
515 if (expect->timeout.function)
516 seq_printf(s, "%ld ", timer_pending(&expect->timeout)
517 ? (long)(expect->timeout.expires - jiffies)/HZ : 0);
518 else
519 seq_printf(s, "- ");
520 seq_printf(s, "l3proto = %u proto=%u ",
521 expect->tuple.src.l3num,
522 expect->tuple.dst.protonum);
523 print_tuple(s, &expect->tuple,
524 __nf_ct_l3proto_find(expect->tuple.src.l3num),
605dcad6 525 __nf_ct_l4proto_find(expect->tuple.src.l3num,
77ab9cff 526 expect->tuple.dst.protonum));
4bb119ea 527
359b9ab6
PM
528 if (expect->flags & NF_CT_EXPECT_PERMANENT) {
529 seq_printf(s, "PERMANENT");
530 delim = ",";
531 }
532 if (expect->flags & NF_CT_EXPECT_INACTIVE)
533 seq_printf(s, "%sINACTIVE", delim);
4bb119ea 534
b87921bd
PM
535 helper = rcu_dereference(nfct_help(expect->master)->helper);
536 if (helper) {
537 seq_printf(s, "%s%s", expect->flags ? " " : "", helper->name);
538 if (helper->expect_policy[expect->class].name)
539 seq_printf(s, "/%s",
540 helper->expect_policy[expect->class].name);
541 }
542
77ab9cff
MJ
543 return seq_putc(s, '\n');
544}
545
56b3d975 546static const struct seq_operations exp_seq_ops = {
77ab9cff
MJ
547 .start = exp_seq_start,
548 .next = exp_seq_next,
549 .stop = exp_seq_stop,
550 .show = exp_seq_show
551};
552
553static int exp_open(struct inode *inode, struct file *file)
554{
dc5129f8 555 return seq_open_net(inode, file, &exp_seq_ops,
e2da5913 556 sizeof(struct ct_expect_iter_state));
77ab9cff
MJ
557}
558
5d08ad44 559static const struct file_operations exp_file_ops = {
77ab9cff
MJ
560 .owner = THIS_MODULE,
561 .open = exp_open,
562 .read = seq_read,
563 .llseek = seq_lseek,
dc5129f8 564 .release = seq_release_net,
77ab9cff
MJ
565};
566#endif /* CONFIG_PROC_FS */
e9c1b084 567
dc5129f8 568static int exp_proc_init(struct net *net)
e9c1b084
PM
569{
570#ifdef CONFIG_PROC_FS
571 struct proc_dir_entry *proc;
572
dc5129f8 573 proc = proc_net_fops_create(net, "nf_conntrack_expect", 0440, &exp_file_ops);
e9c1b084
PM
574 if (!proc)
575 return -ENOMEM;
576#endif /* CONFIG_PROC_FS */
577 return 0;
578}
579
dc5129f8 580static void exp_proc_remove(struct net *net)
e9c1b084
PM
581{
582#ifdef CONFIG_PROC_FS
dc5129f8 583 proc_net_remove(net, "nf_conntrack_expect");
e9c1b084
PM
584#endif /* CONFIG_PROC_FS */
585}
586
13ccdfc2 587module_param_named(expect_hashsize, nf_ct_expect_hsize, uint, 0400);
a71c0855 588
9b03f38d 589int nf_conntrack_expect_init(struct net *net)
e9c1b084 590{
a71c0855
PM
591 int err = -ENOMEM;
592
08f6547d
AD
593 if (net_eq(net, &init_net)) {
594 if (!nf_ct_expect_hsize) {
d696c7bd 595 nf_ct_expect_hsize = net->ct.htable_size / 256;
08f6547d
AD
596 if (!nf_ct_expect_hsize)
597 nf_ct_expect_hsize = 1;
598 }
599 nf_ct_expect_max = nf_ct_expect_hsize * 4;
a71c0855
PM
600 }
601
9b03f38d
AD
602 net->ct.expect_count = 0;
603 net->ct.expect_hash = nf_ct_alloc_hashtable(&nf_ct_expect_hsize,
ea781f19 604 &net->ct.expect_vmalloc, 0);
9b03f38d 605 if (net->ct.expect_hash == NULL)
a71c0855 606 goto err1;
e9c1b084 607
08f6547d
AD
608 if (net_eq(net, &init_net)) {
609 nf_ct_expect_cachep = kmem_cache_create("nf_conntrack_expect",
e9c1b084 610 sizeof(struct nf_conntrack_expect),
20c2df83 611 0, 0, NULL);
08f6547d
AD
612 if (!nf_ct_expect_cachep)
613 goto err2;
614 }
e9c1b084 615
dc5129f8 616 err = exp_proc_init(net);
e9c1b084 617 if (err < 0)
a71c0855 618 goto err3;
e9c1b084
PM
619
620 return 0;
621
a71c0855 622err3:
08f6547d
AD
623 if (net_eq(net, &init_net))
624 kmem_cache_destroy(nf_ct_expect_cachep);
12293bf9 625err2:
9b03f38d 626 nf_ct_free_hashtable(net->ct.expect_hash, net->ct.expect_vmalloc,
a71c0855 627 nf_ct_expect_hsize);
a71c0855 628err1:
e9c1b084
PM
629 return err;
630}
631
9b03f38d 632void nf_conntrack_expect_fini(struct net *net)
e9c1b084 633{
dc5129f8 634 exp_proc_remove(net);
308ff823
JDB
635 if (net_eq(net, &init_net)) {
636 rcu_barrier(); /* Wait for call_rcu() before destroy */
08f6547d 637 kmem_cache_destroy(nf_ct_expect_cachep);
308ff823 638 }
9b03f38d 639 nf_ct_free_hashtable(net->ct.expect_hash, net->ct.expect_vmalloc,
a71c0855 640 nf_ct_expect_hsize);
e9c1b084 641}