1 /* (C) 1999-2001 Paul `Rusty' Russell
2 * (C) 2002-2004 Netfilter Core Team <coreteam@netfilter.org>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
9 #include <linux/types.h>
10 #include <linux/netfilter.h>
11 #include <linux/module.h>
12 #include <linux/skbuff.h>
13 #include <linux/proc_fs.h>
14 #include <linux/seq_file.h>
15 #include <linux/percpu.h>
16 #include <linux/netdevice.h>
17 #include <net/net_namespace.h>
19 #include <linux/sysctl.h>
22 #include <net/netfilter/nf_conntrack.h>
23 #include <net/netfilter/nf_conntrack_core.h>
24 #include <net/netfilter/nf_conntrack_l3proto.h>
25 #include <net/netfilter/nf_conntrack_l4proto.h>
26 #include <net/netfilter/nf_conntrack_expect.h>
27 #include <net/netfilter/nf_conntrack_helper.h>
28 #include <net/netfilter/nf_conntrack_acct.h>
30 MODULE_LICENSE("GPL");
34 print_tuple(struct seq_file
*s
, const struct nf_conntrack_tuple
*tuple
,
35 const struct nf_conntrack_l3proto
*l3proto
,
36 const struct nf_conntrack_l4proto
*l4proto
)
38 return l3proto
->print_tuple(s
, tuple
) || l4proto
->print_tuple(s
, tuple
);
40 EXPORT_SYMBOL_GPL(print_tuple
);
42 struct ct_iter_state
{
43 struct seq_net_private p
;
47 static struct hlist_node
*ct_get_first(struct seq_file
*seq
)
49 struct net
*net
= seq_file_net(seq
);
50 struct ct_iter_state
*st
= seq
->private;
54 st
->bucket
< nf_conntrack_htable_size
;
56 n
= rcu_dereference(net
->ct
.hash
[st
->bucket
].first
);
63 static struct hlist_node
*ct_get_next(struct seq_file
*seq
,
64 struct hlist_node
*head
)
66 struct net
*net
= seq_file_net(seq
);
67 struct ct_iter_state
*st
= seq
->private;
69 head
= rcu_dereference(head
->next
);
70 while (head
== NULL
) {
71 if (++st
->bucket
>= nf_conntrack_htable_size
)
73 head
= rcu_dereference(net
->ct
.hash
[st
->bucket
].first
);
78 static struct hlist_node
*ct_get_idx(struct seq_file
*seq
, loff_t pos
)
80 struct hlist_node
*head
= ct_get_first(seq
);
83 while (pos
&& (head
= ct_get_next(seq
, head
)))
85 return pos
? NULL
: head
;
88 static void *ct_seq_start(struct seq_file
*seq
, loff_t
*pos
)
92 return ct_get_idx(seq
, *pos
);
95 static void *ct_seq_next(struct seq_file
*s
, void *v
, loff_t
*pos
)
98 return ct_get_next(s
, v
);
101 static void ct_seq_stop(struct seq_file
*s
, void *v
)
107 /* return 0 on success, 1 in case of error */
108 static int ct_seq_show(struct seq_file
*s
, void *v
)
110 const struct nf_conntrack_tuple_hash
*hash
= v
;
111 const struct nf_conn
*ct
= nf_ct_tuplehash_to_ctrack(hash
);
112 const struct nf_conntrack_l3proto
*l3proto
;
113 const struct nf_conntrack_l4proto
*l4proto
;
117 /* we only want to print DIR_ORIGINAL */
118 if (NF_CT_DIRECTION(hash
))
121 l3proto
= __nf_ct_l3proto_find(nf_ct_l3num(ct
));
122 NF_CT_ASSERT(l3proto
);
123 l4proto
= __nf_ct_l4proto_find(nf_ct_l3num(ct
), nf_ct_protonum(ct
));
124 NF_CT_ASSERT(l4proto
);
126 if (seq_printf(s
, "%-8s %u %-8s %u %ld ",
127 l3proto
->name
, nf_ct_l3num(ct
),
128 l4proto
->name
, nf_ct_protonum(ct
),
129 timer_pending(&ct
->timeout
)
130 ? (long)(ct
->timeout
.expires
- jiffies
)/HZ
: 0) != 0)
133 if (l4proto
->print_conntrack
&& l4proto
->print_conntrack(s
, ct
))
136 if (print_tuple(s
, &ct
->tuplehash
[IP_CT_DIR_ORIGINAL
].tuple
,
140 if (seq_print_acct(s
, ct
, IP_CT_DIR_ORIGINAL
))
143 if (!(test_bit(IPS_SEEN_REPLY_BIT
, &ct
->status
)))
144 if (seq_printf(s
, "[UNREPLIED] "))
147 if (print_tuple(s
, &ct
->tuplehash
[IP_CT_DIR_REPLY
].tuple
,
151 if (seq_print_acct(s
, ct
, IP_CT_DIR_REPLY
))
154 if (test_bit(IPS_ASSURED_BIT
, &ct
->status
))
155 if (seq_printf(s
, "[ASSURED] "))
158 #if defined(CONFIG_NF_CONNTRACK_MARK)
159 if (seq_printf(s
, "mark=%u ", ct
->mark
))
163 #ifdef CONFIG_NF_CONNTRACK_SECMARK
164 if (seq_printf(s
, "secmark=%u ", ct
->secmark
))
168 if (seq_printf(s
, "use=%u\n", atomic_read(&ct
->ct_general
.use
)))
174 static const struct seq_operations ct_seq_ops
= {
175 .start
= ct_seq_start
,
181 static int ct_open(struct inode
*inode
, struct file
*file
)
183 return seq_open_net(inode
, file
, &ct_seq_ops
,
184 sizeof(struct ct_iter_state
));
187 static const struct file_operations ct_file_ops
= {
188 .owner
= THIS_MODULE
,
192 .release
= seq_release_net
,
195 static void *ct_cpu_seq_start(struct seq_file
*seq
, loff_t
*pos
)
197 struct net
*net
= seq_file_net(seq
);
201 return SEQ_START_TOKEN
;
203 for (cpu
= *pos
-1; cpu
< NR_CPUS
; ++cpu
) {
204 if (!cpu_possible(cpu
))
207 return per_cpu_ptr(net
->ct
.stat
, cpu
);
213 static void *ct_cpu_seq_next(struct seq_file
*seq
, void *v
, loff_t
*pos
)
215 struct net
*net
= seq_file_net(seq
);
218 for (cpu
= *pos
; cpu
< NR_CPUS
; ++cpu
) {
219 if (!cpu_possible(cpu
))
222 return per_cpu_ptr(net
->ct
.stat
, cpu
);
228 static void ct_cpu_seq_stop(struct seq_file
*seq
, void *v
)
232 static int ct_cpu_seq_show(struct seq_file
*seq
, void *v
)
234 struct net
*net
= seq_file_net(seq
);
235 unsigned int nr_conntracks
= atomic_read(&net
->ct
.count
);
236 const struct ip_conntrack_stat
*st
= v
;
238 if (v
== SEQ_START_TOKEN
) {
239 seq_printf(seq
, "entries searched found new invalid ignore delete delete_list insert insert_failed drop early_drop icmp_error expect_new expect_create expect_delete\n");
243 seq_printf(seq
, "%08x %08x %08x %08x %08x %08x %08x %08x "
244 "%08x %08x %08x %08x %08x %08x %08x %08x \n",
266 static const struct seq_operations ct_cpu_seq_ops
= {
267 .start
= ct_cpu_seq_start
,
268 .next
= ct_cpu_seq_next
,
269 .stop
= ct_cpu_seq_stop
,
270 .show
= ct_cpu_seq_show
,
273 static int ct_cpu_seq_open(struct inode
*inode
, struct file
*file
)
275 return seq_open_net(inode
, file
, &ct_cpu_seq_ops
,
276 sizeof(struct seq_net_private
));
279 static const struct file_operations ct_cpu_seq_fops
= {
280 .owner
= THIS_MODULE
,
281 .open
= ct_cpu_seq_open
,
284 .release
= seq_release_net
,
287 static int nf_conntrack_standalone_init_proc(struct net
*net
)
289 struct proc_dir_entry
*pde
;
291 pde
= proc_net_fops_create(net
, "nf_conntrack", 0440, &ct_file_ops
);
293 goto out_nf_conntrack
;
295 pde
= proc_create("nf_conntrack", S_IRUGO
, net
->proc_net_stat
,
298 goto out_stat_nf_conntrack
;
301 out_stat_nf_conntrack
:
302 proc_net_remove(net
, "nf_conntrack");
307 static void nf_conntrack_standalone_fini_proc(struct net
*net
)
309 remove_proc_entry("nf_conntrack", net
->proc_net_stat
);
310 proc_net_remove(net
, "nf_conntrack");
313 static int nf_conntrack_standalone_init_proc(struct net
*net
)
318 static void nf_conntrack_standalone_fini_proc(struct net
*net
)
321 #endif /* CONFIG_PROC_FS */
326 /* Log invalid packets of a given protocol */
327 static int log_invalid_proto_min
= 0;
328 static int log_invalid_proto_max
= 255;
330 static struct ctl_table_header
*nf_ct_netfilter_header
;
332 static ctl_table nf_ct_sysctl_table
[] = {
334 .ctl_name
= NET_NF_CONNTRACK_MAX
,
335 .procname
= "nf_conntrack_max",
336 .data
= &nf_conntrack_max
,
337 .maxlen
= sizeof(int),
339 .proc_handler
= &proc_dointvec
,
342 .ctl_name
= NET_NF_CONNTRACK_COUNT
,
343 .procname
= "nf_conntrack_count",
344 .data
= &init_net
.ct
.count
,
345 .maxlen
= sizeof(int),
347 .proc_handler
= &proc_dointvec
,
350 .ctl_name
= NET_NF_CONNTRACK_BUCKETS
,
351 .procname
= "nf_conntrack_buckets",
352 .data
= &nf_conntrack_htable_size
,
353 .maxlen
= sizeof(unsigned int),
355 .proc_handler
= &proc_dointvec
,
358 .ctl_name
= NET_NF_CONNTRACK_CHECKSUM
,
359 .procname
= "nf_conntrack_checksum",
360 .data
= &init_net
.ct
.sysctl_checksum
,
361 .maxlen
= sizeof(unsigned int),
363 .proc_handler
= &proc_dointvec
,
366 .ctl_name
= NET_NF_CONNTRACK_LOG_INVALID
,
367 .procname
= "nf_conntrack_log_invalid",
368 .data
= &init_net
.ct
.sysctl_log_invalid
,
369 .maxlen
= sizeof(unsigned int),
371 .proc_handler
= &proc_dointvec_minmax
,
372 .strategy
= &sysctl_intvec
,
373 .extra1
= &log_invalid_proto_min
,
374 .extra2
= &log_invalid_proto_max
,
377 .ctl_name
= CTL_UNNUMBERED
,
378 .procname
= "nf_conntrack_expect_max",
379 .data
= &nf_ct_expect_max
,
380 .maxlen
= sizeof(int),
382 .proc_handler
= &proc_dointvec
,
387 #define NET_NF_CONNTRACK_MAX 2089
389 static ctl_table nf_ct_netfilter_table
[] = {
391 .ctl_name
= NET_NF_CONNTRACK_MAX
,
392 .procname
= "nf_conntrack_max",
393 .data
= &nf_conntrack_max
,
394 .maxlen
= sizeof(int),
396 .proc_handler
= &proc_dointvec
,
401 static struct ctl_path nf_ct_path
[] = {
402 { .procname
= "net", .ctl_name
= CTL_NET
, },
406 static int nf_conntrack_standalone_init_sysctl(struct net
*net
)
408 struct ctl_table
*table
;
410 if (net_eq(net
, &init_net
)) {
411 nf_ct_netfilter_header
=
412 register_sysctl_paths(nf_ct_path
, nf_ct_netfilter_table
);
413 if (!nf_ct_netfilter_header
)
417 table
= kmemdup(nf_ct_sysctl_table
, sizeof(nf_ct_sysctl_table
),
422 table
[1].data
= &net
->ct
.count
;
423 table
[3].data
= &net
->ct
.sysctl_checksum
;
424 table
[4].data
= &net
->ct
.sysctl_log_invalid
;
426 net
->ct
.sysctl_header
= register_net_sysctl_table(net
,
427 nf_net_netfilter_sysctl_path
, table
);
428 if (!net
->ct
.sysctl_header
)
429 goto out_unregister_netfilter
;
433 out_unregister_netfilter
:
436 if (net_eq(net
, &init_net
))
437 unregister_sysctl_table(nf_ct_netfilter_header
);
439 printk("nf_conntrack: can't register to sysctl.\n");
443 static void nf_conntrack_standalone_fini_sysctl(struct net
*net
)
445 struct ctl_table
*table
;
447 if (net_eq(net
, &init_net
))
448 unregister_sysctl_table(nf_ct_netfilter_header
);
449 table
= net
->ct
.sysctl_header
->ctl_table_arg
;
450 unregister_net_sysctl_table(net
->ct
.sysctl_header
);
454 static int nf_conntrack_standalone_init_sysctl(struct net
*net
)
459 static void nf_conntrack_standalone_fini_sysctl(struct net
*net
)
462 #endif /* CONFIG_SYSCTL */
464 static int nf_conntrack_net_init(struct net
*net
)
468 ret
= nf_conntrack_init(net
);
471 ret
= nf_conntrack_standalone_init_proc(net
);
474 net
->ct
.sysctl_checksum
= 1;
475 net
->ct
.sysctl_log_invalid
= 0;
476 ret
= nf_conntrack_standalone_init_sysctl(net
);
482 nf_conntrack_standalone_fini_proc(net
);
484 nf_conntrack_cleanup(net
);
489 static void nf_conntrack_net_exit(struct net
*net
)
491 nf_conntrack_standalone_fini_sysctl(net
);
492 nf_conntrack_standalone_fini_proc(net
);
493 nf_conntrack_cleanup(net
);
496 static struct pernet_operations nf_conntrack_net_ops
= {
497 .init
= nf_conntrack_net_init
,
498 .exit
= nf_conntrack_net_exit
,
501 static int __init
nf_conntrack_standalone_init(void)
503 return register_pernet_subsys(&nf_conntrack_net_ops
);
506 static void __exit
nf_conntrack_standalone_fini(void)
508 unregister_pernet_subsys(&nf_conntrack_net_ops
);
511 module_init(nf_conntrack_standalone_init
);
512 module_exit(nf_conntrack_standalone_fini
);
514 /* Some modules need us, but don't depend directly on any symbol.
515 They should call this. */
516 void need_conntrack(void)
519 EXPORT_SYMBOL_GPL(need_conntrack
);