netfilter: conntrack: move extension sizes into core
No need to specify this in the registration modules, we already collect all sizes for build-time checks on the maximum combined size. After this change, all extensions except nat have no meaningful content in their nf_ct_ext_type struct definition. Next patch handles nat, this will then allow to remove the dynamic register api completely. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
bb62a765b1
commit
5f31edc067
@ -83,7 +83,6 @@ struct nf_ct_ext_type {
|
||||
void (*destroy)(struct nf_conn *ct);
|
||||
|
||||
enum nf_ct_ext_id id;
|
||||
u8 len;
|
||||
};
|
||||
|
||||
int nf_ct_extend_register(const struct nf_ct_ext_type *type);
|
||||
|
@ -23,7 +23,6 @@ module_param_named(acct, nf_ct_acct, bool, 0644);
|
||||
MODULE_PARM_DESC(acct, "Enable connection tracking flow accounting.");
|
||||
|
||||
static const struct nf_ct_ext_type acct_extend = {
|
||||
.len = sizeof(struct nf_conn_acct),
|
||||
.id = NF_CT_EXT_ACCT,
|
||||
};
|
||||
|
||||
|
@ -48,7 +48,6 @@
|
||||
#include <net/netfilter/nf_conntrack_timeout.h>
|
||||
#include <net/netfilter/nf_conntrack_labels.h>
|
||||
#include <net/netfilter/nf_conntrack_synproxy.h>
|
||||
#include <net/netfilter/nf_conntrack_act_ct.h>
|
||||
#include <net/netfilter/nf_nat.h>
|
||||
#include <net/netfilter/nf_nat_helper.h>
|
||||
#include <net/netns/hash.h>
|
||||
@ -2629,39 +2628,6 @@ int nf_conntrack_set_hashsize(const char *val, const struct kernel_param *kp)
|
||||
return nf_conntrack_hash_resize(hashsize);
|
||||
}
|
||||
|
||||
static __always_inline unsigned int total_extension_size(void)
|
||||
{
|
||||
/* remember to add new extensions below */
|
||||
BUILD_BUG_ON(NF_CT_EXT_NUM > 10);
|
||||
|
||||
return sizeof(struct nf_ct_ext) +
|
||||
sizeof(struct nf_conn_help)
|
||||
#if IS_ENABLED(CONFIG_NF_NAT)
|
||||
+ sizeof(struct nf_conn_nat)
|
||||
#endif
|
||||
+ sizeof(struct nf_conn_seqadj)
|
||||
+ sizeof(struct nf_conn_acct)
|
||||
#ifdef CONFIG_NF_CONNTRACK_EVENTS
|
||||
+ sizeof(struct nf_conntrack_ecache)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMESTAMP
|
||||
+ sizeof(struct nf_conn_tstamp)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMEOUT
|
||||
+ sizeof(struct nf_conn_timeout)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_LABELS
|
||||
+ sizeof(struct nf_conn_labels)
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NETFILTER_SYNPROXY)
|
||||
+ sizeof(struct nf_conn_synproxy)
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NET_ACT_CT)
|
||||
+ sizeof(struct nf_conn_act_ct_ext)
|
||||
#endif
|
||||
;
|
||||
};
|
||||
|
||||
int nf_conntrack_init_start(void)
|
||||
{
|
||||
unsigned long nr_pages = totalram_pages();
|
||||
@ -2669,9 +2635,6 @@ int nf_conntrack_init_start(void)
|
||||
int ret = -ENOMEM;
|
||||
int i;
|
||||
|
||||
/* struct nf_ct_ext uses u8 to store offsets/size */
|
||||
BUILD_BUG_ON(total_extension_size() > 255u);
|
||||
|
||||
seqcount_spinlock_init(&nf_conntrack_generation,
|
||||
&nf_conntrack_locks_all_lock);
|
||||
|
||||
|
@ -305,7 +305,6 @@ void nf_conntrack_ecache_work(struct net *net, enum nf_ct_ecache_state state)
|
||||
static int nf_ct_events __read_mostly = NF_CT_EVENTS_DEFAULT;
|
||||
|
||||
static const struct nf_ct_ext_type event_extend = {
|
||||
.len = sizeof(struct nf_conntrack_ecache),
|
||||
.id = NF_CT_EXT_ECACHE,
|
||||
};
|
||||
|
||||
|
@ -13,10 +13,82 @@
|
||||
#include <linux/skbuff.h>
|
||||
#include <net/netfilter/nf_conntrack_extend.h>
|
||||
|
||||
#include <net/netfilter/nf_conntrack_helper.h>
|
||||
#include <net/netfilter/nf_conntrack_acct.h>
|
||||
#include <net/netfilter/nf_conntrack_seqadj.h>
|
||||
#include <net/netfilter/nf_conntrack_ecache.h>
|
||||
#include <net/netfilter/nf_conntrack_zones.h>
|
||||
#include <net/netfilter/nf_conntrack_timestamp.h>
|
||||
#include <net/netfilter/nf_conntrack_timeout.h>
|
||||
#include <net/netfilter/nf_conntrack_labels.h>
|
||||
#include <net/netfilter/nf_conntrack_synproxy.h>
|
||||
#include <net/netfilter/nf_conntrack_act_ct.h>
|
||||
#include <net/netfilter/nf_nat.h>
|
||||
|
||||
static struct nf_ct_ext_type __rcu *nf_ct_ext_types[NF_CT_EXT_NUM];
|
||||
static DEFINE_MUTEX(nf_ct_ext_type_mutex);
|
||||
#define NF_CT_EXT_PREALLOC 128u /* conntrack events are on by default */
|
||||
|
||||
static const u8 nf_ct_ext_type_len[NF_CT_EXT_NUM] = {
|
||||
[NF_CT_EXT_HELPER] = sizeof(struct nf_conn_help),
|
||||
#if IS_ENABLED(CONFIG_NF_NAT)
|
||||
[NF_CT_EXT_NAT] = sizeof(struct nf_conn_nat),
|
||||
#endif
|
||||
[NF_CT_EXT_SEQADJ] = sizeof(struct nf_conn_seqadj),
|
||||
[NF_CT_EXT_ACCT] = sizeof(struct nf_conn_acct),
|
||||
#ifdef CONFIG_NF_CONNTRACK_EVENTS
|
||||
[NF_CT_EXT_ECACHE] = sizeof(struct nf_conntrack_ecache),
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMESTAMP
|
||||
[NF_CT_EXT_TSTAMP] = sizeof(struct nf_conn_acct),
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMEOUT
|
||||
[NF_CT_EXT_TIMEOUT] = sizeof(struct nf_conn_tstamp),
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_LABELS
|
||||
[NF_CT_EXT_LABELS] = sizeof(struct nf_conn_labels),
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NETFILTER_SYNPROXY)
|
||||
[NF_CT_EXT_SYNPROXY] = sizeof(struct nf_conn_synproxy),
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NET_ACT_CT)
|
||||
[NF_CT_EXT_ACT_CT] = sizeof(struct nf_conn_act_ct_ext),
|
||||
#endif
|
||||
};
|
||||
|
||||
static __always_inline unsigned int total_extension_size(void)
|
||||
{
|
||||
/* remember to add new extensions below */
|
||||
BUILD_BUG_ON(NF_CT_EXT_NUM > 10);
|
||||
|
||||
return sizeof(struct nf_ct_ext) +
|
||||
sizeof(struct nf_conn_help)
|
||||
#if IS_ENABLED(CONFIG_NF_NAT)
|
||||
+ sizeof(struct nf_conn_nat)
|
||||
#endif
|
||||
+ sizeof(struct nf_conn_seqadj)
|
||||
+ sizeof(struct nf_conn_acct)
|
||||
#ifdef CONFIG_NF_CONNTRACK_EVENTS
|
||||
+ sizeof(struct nf_conntrack_ecache)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMESTAMP
|
||||
+ sizeof(struct nf_conn_tstamp)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_TIMEOUT
|
||||
+ sizeof(struct nf_conn_timeout)
|
||||
#endif
|
||||
#ifdef CONFIG_NF_CONNTRACK_LABELS
|
||||
+ sizeof(struct nf_conn_labels)
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NETFILTER_SYNPROXY)
|
||||
+ sizeof(struct nf_conn_synproxy)
|
||||
#endif
|
||||
#if IS_ENABLED(CONFIG_NET_ACT_CT)
|
||||
+ sizeof(struct nf_conn_act_ct_ext)
|
||||
#endif
|
||||
;
|
||||
}
|
||||
|
||||
void nf_ct_ext_destroy(struct nf_conn *ct)
|
||||
{
|
||||
unsigned int i;
|
||||
@ -41,7 +113,6 @@ void nf_ct_ext_destroy(struct nf_conn *ct)
|
||||
void *nf_ct_ext_add(struct nf_conn *ct, enum nf_ct_ext_id id, gfp_t gfp)
|
||||
{
|
||||
unsigned int newlen, newoff, oldlen, alloc;
|
||||
struct nf_ct_ext_type *t;
|
||||
struct nf_ct_ext *new;
|
||||
|
||||
/* Conntrack must not be confirmed to avoid races on reallocation. */
|
||||
@ -58,16 +129,8 @@ void *nf_ct_ext_add(struct nf_conn *ct, enum nf_ct_ext_id id, gfp_t gfp)
|
||||
oldlen = sizeof(*new);
|
||||
}
|
||||
|
||||
rcu_read_lock();
|
||||
t = rcu_dereference(nf_ct_ext_types[id]);
|
||||
if (!t) {
|
||||
rcu_read_unlock();
|
||||
return NULL;
|
||||
}
|
||||
|
||||
newoff = ALIGN(oldlen, __alignof__(struct nf_ct_ext));
|
||||
newlen = newoff + t->len;
|
||||
rcu_read_unlock();
|
||||
newlen = newoff + nf_ct_ext_type_len[id];
|
||||
|
||||
alloc = max(newlen, NF_CT_EXT_PREALLOC);
|
||||
new = krealloc(ct->ext, alloc, gfp);
|
||||
@ -91,6 +154,9 @@ int nf_ct_extend_register(const struct nf_ct_ext_type *type)
|
||||
{
|
||||
int ret = 0;
|
||||
|
||||
/* struct nf_ct_ext uses u8 to store offsets/size */
|
||||
BUILD_BUG_ON(total_extension_size() > 255u);
|
||||
|
||||
mutex_lock(&nf_ct_ext_type_mutex);
|
||||
if (nf_ct_ext_types[type->id]) {
|
||||
ret = -EBUSY;
|
||||
|
@ -551,7 +551,6 @@ void nf_nat_helper_unregister(struct nf_conntrack_nat_helper *nat)
|
||||
EXPORT_SYMBOL_GPL(nf_nat_helper_unregister);
|
||||
|
||||
static const struct nf_ct_ext_type helper_extend = {
|
||||
.len = sizeof(struct nf_conn_help),
|
||||
.id = NF_CT_EXT_HELPER,
|
||||
};
|
||||
|
||||
|
@ -80,7 +80,6 @@ void nf_connlabels_put(struct net *net)
|
||||
EXPORT_SYMBOL_GPL(nf_connlabels_put);
|
||||
|
||||
static const struct nf_ct_ext_type labels_extend = {
|
||||
.len = sizeof(struct nf_conn_labels),
|
||||
.id = NF_CT_EXT_LABELS,
|
||||
};
|
||||
|
||||
|
@ -234,7 +234,6 @@ s32 nf_ct_seq_offset(const struct nf_conn *ct,
|
||||
EXPORT_SYMBOL_GPL(nf_ct_seq_offset);
|
||||
|
||||
static const struct nf_ct_ext_type nf_ct_seqadj_extend = {
|
||||
.len = sizeof(struct nf_conn_seqadj),
|
||||
.id = NF_CT_EXT_SEQADJ,
|
||||
};
|
||||
|
||||
|
@ -136,7 +136,6 @@ void nf_ct_destroy_timeout(struct nf_conn *ct)
|
||||
EXPORT_SYMBOL_GPL(nf_ct_destroy_timeout);
|
||||
|
||||
static const struct nf_ct_ext_type timeout_extend = {
|
||||
.len = sizeof(struct nf_conn_timeout),
|
||||
.id = NF_CT_EXT_TIMEOUT,
|
||||
};
|
||||
|
||||
|
@ -20,7 +20,6 @@ module_param_named(tstamp, nf_ct_tstamp, bool, 0644);
|
||||
MODULE_PARM_DESC(tstamp, "Enable connection tracking flow timestamping.");
|
||||
|
||||
static const struct nf_ct_ext_type tstamp_extend = {
|
||||
.len = sizeof(struct nf_conn_tstamp),
|
||||
.id = NF_CT_EXT_TSTAMP,
|
||||
};
|
||||
|
||||
|
@ -876,7 +876,6 @@ static void nf_nat_cleanup_conntrack(struct nf_conn *ct)
|
||||
}
|
||||
|
||||
static struct nf_ct_ext_type nat_extend __read_mostly = {
|
||||
.len = sizeof(struct nf_conn_nat),
|
||||
.destroy = nf_nat_cleanup_conntrack,
|
||||
.id = NF_CT_EXT_NAT,
|
||||
};
|
||||
|
@ -237,7 +237,6 @@ synproxy_tstamp_adjust(struct sk_buff *skb, unsigned int protoff,
|
||||
}
|
||||
|
||||
static struct nf_ct_ext_type nf_ct_synproxy_extend __read_mostly = {
|
||||
.len = sizeof(struct nf_conn_synproxy),
|
||||
.id = NF_CT_EXT_SYNPROXY,
|
||||
};
|
||||
|
||||
|
@ -58,7 +58,6 @@ static const struct rhashtable_params zones_params = {
|
||||
};
|
||||
|
||||
static struct nf_ct_ext_type act_ct_extend __read_mostly = {
|
||||
.len = sizeof(struct nf_conn_act_ct_ext),
|
||||
.id = NF_CT_EXT_ACT_CT,
|
||||
};
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user