xen-blkfront: don't add indirect pages to list when !feature_persistent
[linux-2.6-block.git] / net / netfilter / nf_tables_core.c
CommitLineData
96518518
PM
1/*
2 * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
a81b2ce8 11#include <linux/kernel.h>
96518518
PM
12#include <linux/module.h>
13#include <linux/init.h>
14#include <linux/list.h>
15#include <linux/rculist.h>
16#include <linux/skbuff.h>
17#include <linux/netlink.h>
18#include <linux/netfilter.h>
19#include <linux/netfilter/nfnetlink.h>
20#include <linux/netfilter/nf_tables.h>
21#include <net/netfilter/nf_tables_core.h>
22#include <net/netfilter/nf_tables.h>
b5bc89bf 23#include <net/netfilter/nf_log.h>
96518518 24
01ef16c2
PM
25enum nft_trace {
26 NFT_TRACE_RULE,
27 NFT_TRACE_RETURN,
28 NFT_TRACE_POLICY,
29};
30
31static const char *const comments[] = {
32 [NFT_TRACE_RULE] = "rule",
33 [NFT_TRACE_RETURN] = "return",
34 [NFT_TRACE_POLICY] = "policy",
35};
36
37static struct nf_loginfo trace_loginfo = {
38 .type = NF_LOG_TYPE_LOG,
39 .u = {
40 .log = {
a81b2ce8 41 .level = LOGLEVEL_WARNING,
01ef16c2
PM
42 .logflags = NF_LOG_MASK,
43 },
44 },
45};
46
47static void __nft_trace_packet(const struct nft_pktinfo *pkt,
48 const struct nft_chain *chain,
49 int rulenum, enum nft_trace type)
50{
51 struct net *net = dev_net(pkt->in ? pkt->in : pkt->out);
52
fce1528e
PNA
53 nf_log_trace(net, pkt->xt.family, pkt->ops->hooknum, pkt->skb, pkt->in,
54 pkt->out, &trace_loginfo, "TRACE: %s:%s:%s:%u ",
55 chain->table->name, chain->name, comments[type],
56 rulenum);
01ef16c2
PM
57}
58
59static inline void nft_trace_packet(const struct nft_pktinfo *pkt,
60 const struct nft_chain *chain,
61 int rulenum, enum nft_trace type)
62{
63 if (unlikely(pkt->skb->nf_trace))
64 __nft_trace_packet(pkt, chain, rulenum, type);
65}
66
cb7dbfd0 67static void nft_cmp_fast_eval(const struct nft_expr *expr,
a55e22e9 68 struct nft_regs *regs)
cb7dbfd0
PM
69{
70 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
b855d416 71 u32 mask = nft_cmp_fast_mask(priv->len);
cb7dbfd0 72
49499c3e 73 if ((regs->data[priv->sreg] & mask) == priv->data)
cb7dbfd0 74 return;
a55e22e9 75 regs->verdict.code = NFT_BREAK;
cb7dbfd0
PM
76}
77
c29b72e0 78static bool nft_payload_fast_eval(const struct nft_expr *expr,
a55e22e9 79 struct nft_regs *regs,
c29b72e0
PM
80 const struct nft_pktinfo *pkt)
81{
82 const struct nft_payload *priv = nft_expr_priv(expr);
83 const struct sk_buff *skb = pkt->skb;
49499c3e 84 u32 *dest = &regs->data[priv->dreg];
c29b72e0
PM
85 unsigned char *ptr;
86
87 if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
88 ptr = skb_network_header(skb);
89 else
c54032e0 90 ptr = skb_network_header(skb) + pkt->xt.thoff;
c29b72e0
PM
91
92 ptr += priv->offset;
93
94 if (unlikely(ptr + priv->len >= skb_tail_pointer(skb)))
95 return false;
96
49499c3e 97 *dest = 0;
c29b72e0 98 if (priv->len == 2)
fad136ea 99 *(u16 *)dest = *(u16 *)ptr;
c29b72e0 100 else if (priv->len == 4)
fad136ea 101 *(u32 *)dest = *(u32 *)ptr;
c29b72e0 102 else
fad136ea 103 *(u8 *)dest = *(u8 *)ptr;
c29b72e0
PM
104 return true;
105}
106
0ca743a5
PNA
107struct nft_jumpstack {
108 const struct nft_chain *chain;
109 const struct nft_rule *rule;
b5bc89bf 110 int rulenum;
0ca743a5
PNA
111};
112
0ca743a5 113unsigned int
3876d22d 114nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops)
96518518 115{
5467a512 116 const struct nft_chain *chain = ops->priv, *basechain = chain;
5ebb335d 117 const struct net *net = read_pnet(&nft_base_chain(basechain)->pnet);
96518518
PM
118 const struct nft_rule *rule;
119 const struct nft_expr *expr, *last;
a55e22e9 120 struct nft_regs regs;
96518518 121 unsigned int stackptr = 0;
0ca743a5 122 struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
ce355e20 123 struct nft_stats *stats;
d088be80 124 int rulenum;
ea4bd995 125 unsigned int gencursor = nft_genmask_cur(net);
96518518
PM
126
127do_chain:
d088be80 128 rulenum = 0;
96518518
PM
129 rule = list_entry(&chain->rules, struct nft_rule, list);
130next_rule:
a55e22e9 131 regs.verdict.code = NFT_CONTINUE;
96518518 132 list_for_each_entry_continue_rcu(rule, &chain->rules, list) {
0628b123
PNA
133
134 /* This rule is not active, skip. */
135 if (unlikely(rule->genmask & (1 << gencursor)))
136 continue;
137
b5bc89bf
PNA
138 rulenum++;
139
96518518 140 nft_rule_for_each_expr(expr, last, rule) {
cb7dbfd0 141 if (expr->ops == &nft_cmp_fast_ops)
a55e22e9 142 nft_cmp_fast_eval(expr, &regs);
c29b72e0 143 else if (expr->ops != &nft_payload_fast_ops ||
a55e22e9
PM
144 !nft_payload_fast_eval(expr, &regs, pkt))
145 expr->ops->eval(expr, &regs, pkt);
cb7dbfd0 146
a55e22e9 147 if (regs.verdict.code != NFT_CONTINUE)
96518518
PM
148 break;
149 }
150
a55e22e9 151 switch (regs.verdict.code) {
96518518 152 case NFT_BREAK:
a55e22e9 153 regs.verdict.code = NFT_CONTINUE;
3b084e99 154 continue;
96518518 155 case NFT_CONTINUE:
01ef16c2 156 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
96518518
PM
157 continue;
158 }
159 break;
160 }
161
a55e22e9 162 switch (regs.verdict.code & NF_VERDICT_MASK) {
96518518
PM
163 case NF_ACCEPT:
164 case NF_DROP:
165 case NF_QUEUE:
01ef16c2 166 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
a55e22e9 167 return regs.verdict.code;
e569bdab
EL
168 }
169
a55e22e9 170 switch (regs.verdict.code) {
96518518
PM
171 case NFT_JUMP:
172 BUG_ON(stackptr >= NFT_JUMP_STACK_SIZE);
173 jumpstack[stackptr].chain = chain;
174 jumpstack[stackptr].rule = rule;
b5bc89bf 175 jumpstack[stackptr].rulenum = rulenum;
96518518 176 stackptr++;
354bf5a0 177 /* fall through */
96518518 178 case NFT_GOTO:
01ef16c2 179 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
7b9d5ef9 180
a55e22e9 181 chain = regs.verdict.chain;
96518518 182 goto do_chain;
354bf5a0
PM
183 case NFT_CONTINUE:
184 rulenum++;
185 /* fall through */
96518518 186 case NFT_RETURN:
01ef16c2 187 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RETURN);
7e9bc10d 188 break;
96518518
PM
189 default:
190 WARN_ON(1);
191 }
192
193 if (stackptr > 0) {
194 stackptr--;
195 chain = jumpstack[stackptr].chain;
196 rule = jumpstack[stackptr].rule;
b5bc89bf 197 rulenum = jumpstack[stackptr].rulenum;
96518518
PM
198 goto next_rule;
199 }
200
01ef16c2 201 nft_trace_packet(pkt, basechain, -1, NFT_TRACE_POLICY);
5467a512
PNA
202
203 rcu_read_lock_bh();
ce355e20
ED
204 stats = this_cpu_ptr(rcu_dereference(nft_base_chain(basechain)->stats));
205 u64_stats_update_begin(&stats->syncp);
206 stats->pkts++;
207 stats->bytes += pkt->skb->len;
208 u64_stats_update_end(&stats->syncp);
5467a512 209 rcu_read_unlock_bh();
b5bc89bf 210
5467a512 211 return nft_base_chain(basechain)->policy;
96518518 212}
3876d22d 213EXPORT_SYMBOL_GPL(nft_do_chain);
96518518
PM
214
215int __init nf_tables_core_module_init(void)
216{
217 int err;
218
219 err = nft_immediate_module_init();
220 if (err < 0)
221 goto err1;
222
223 err = nft_cmp_module_init();
224 if (err < 0)
225 goto err2;
226
227 err = nft_lookup_module_init();
228 if (err < 0)
229 goto err3;
230
231 err = nft_bitwise_module_init();
232 if (err < 0)
233 goto err4;
234
235 err = nft_byteorder_module_init();
236 if (err < 0)
237 goto err5;
238
239 err = nft_payload_module_init();
240 if (err < 0)
241 goto err6;
242
22fe54d5
PM
243 err = nft_dynset_module_init();
244 if (err < 0)
245 goto err7;
246
96518518
PM
247 return 0;
248
22fe54d5
PM
249err7:
250 nft_payload_module_exit();
96518518
PM
251err6:
252 nft_byteorder_module_exit();
253err5:
254 nft_bitwise_module_exit();
255err4:
256 nft_lookup_module_exit();
257err3:
258 nft_cmp_module_exit();
259err2:
260 nft_immediate_module_exit();
261err1:
262 return err;
263}
264
265void nf_tables_core_module_exit(void)
266{
22fe54d5 267 nft_dynset_module_exit();
96518518
PM
268 nft_payload_module_exit();
269 nft_byteorder_module_exit();
270 nft_bitwise_module_exit();
271 nft_lookup_module_exit();
272 nft_cmp_module_exit();
273 nft_immediate_module_exit();
274}