ASoC: SOF: Drop superfluous snd_pcm_sgbuf_ops_page
[linux-2.6-block.git] / net / netfilter / nf_tables_core.c
CommitLineData
d2912cb1 1// SPDX-License-Identifier: GPL-2.0-only
96518518
PM
2/*
3 * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
4 *
96518518
PM
5 * Development of this code funded by Astaro AG (http://www.astaro.com/)
6 */
7
a81b2ce8 8#include <linux/kernel.h>
96518518
PM
9#include <linux/module.h>
10#include <linux/init.h>
11#include <linux/list.h>
12#include <linux/rculist.h>
13#include <linux/skbuff.h>
14#include <linux/netlink.h>
15#include <linux/netfilter.h>
e639f7ab 16#include <linux/static_key.h>
96518518
PM
17#include <linux/netfilter/nfnetlink.h>
18#include <linux/netfilter/nf_tables.h>
19#include <net/netfilter/nf_tables_core.h>
20#include <net/netfilter/nf_tables.h>
b5bc89bf 21#include <net/netfilter/nf_log.h>
30e103fe 22#include <net/netfilter/nft_meta.h>
96518518 23
33d5a7b1
FW
24static noinline void __nft_trace_packet(struct nft_traceinfo *info,
25 const struct nft_chain *chain,
e65eebec 26 enum nft_trace_types type)
01ef16c2 27{
33d5a7b1
FW
28 const struct nft_pktinfo *pkt = info->pkt;
29
e639f7ab 30 if (!info->trace || !pkt->skb->nf_trace)
33d5a7b1
FW
31 return;
32
33 info->chain = chain;
34 info->type = type;
35
36 nft_trace_notify(info);
01ef16c2
PM
37}
38
33d5a7b1 39static inline void nft_trace_packet(struct nft_traceinfo *info,
01ef16c2 40 const struct nft_chain *chain,
33d5a7b1 41 const struct nft_rule *rule,
33d5a7b1 42 enum nft_trace_types type)
01ef16c2 43{
e639f7ab 44 if (static_branch_unlikely(&nft_trace_enabled)) {
33d5a7b1 45 info->rule = rule;
e65eebec 46 __nft_trace_packet(info, chain, type);
33d5a7b1 47 }
01ef16c2
PM
48}
49
cb7dbfd0 50static void nft_cmp_fast_eval(const struct nft_expr *expr,
a55e22e9 51 struct nft_regs *regs)
cb7dbfd0
PM
52{
53 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
b855d416 54 u32 mask = nft_cmp_fast_mask(priv->len);
cb7dbfd0 55
49499c3e 56 if ((regs->data[priv->sreg] & mask) == priv->data)
cb7dbfd0 57 return;
a55e22e9 58 regs->verdict.code = NFT_BREAK;
cb7dbfd0
PM
59}
60
c29b72e0 61static bool nft_payload_fast_eval(const struct nft_expr *expr,
a55e22e9 62 struct nft_regs *regs,
c29b72e0
PM
63 const struct nft_pktinfo *pkt)
64{
65 const struct nft_payload *priv = nft_expr_priv(expr);
66 const struct sk_buff *skb = pkt->skb;
49499c3e 67 u32 *dest = &regs->data[priv->dreg];
c29b72e0
PM
68 unsigned char *ptr;
69
70 if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
71 ptr = skb_network_header(skb);
a20877b5
LZ
72 else {
73 if (!pkt->tprot_set)
74 return false;
c54032e0 75 ptr = skb_network_header(skb) + pkt->xt.thoff;
a20877b5 76 }
c29b72e0
PM
77
78 ptr += priv->offset;
79
8dc3c2b8 80 if (unlikely(ptr + priv->len > skb_tail_pointer(skb)))
c29b72e0
PM
81 return false;
82
49499c3e 83 *dest = 0;
c29b72e0 84 if (priv->len == 2)
fad136ea 85 *(u16 *)dest = *(u16 *)ptr;
c29b72e0 86 else if (priv->len == 4)
fad136ea 87 *(u32 *)dest = *(u32 *)ptr;
c29b72e0 88 else
fad136ea 89 *(u8 *)dest = *(u8 *)ptr;
c29b72e0
PM
90 return true;
91}
92
9f08ea84
PNA
93DEFINE_STATIC_KEY_FALSE(nft_counters_enabled);
94
95static noinline void nft_update_chain_stats(const struct nft_chain *chain,
96 const struct nft_pktinfo *pkt)
97{
00924094 98 struct nft_base_chain *base_chain;
a9f5e78c 99 struct nft_stats __percpu *pstats;
9f08ea84
PNA
100 struct nft_stats *stats;
101
00924094 102 base_chain = nft_base_chain(chain);
00924094 103
a9f5e78c
LR
104 rcu_read_lock();
105 pstats = READ_ONCE(base_chain->stats);
106 if (pstats) {
107 local_bh_disable();
108 stats = this_cpu_ptr(pstats);
00924094
FW
109 u64_stats_update_begin(&stats->syncp);
110 stats->pkts++;
111 stats->bytes += pkt->skb->len;
112 u64_stats_update_end(&stats->syncp);
a9f5e78c 113 local_bh_enable();
00924094 114 }
a9f5e78c 115 rcu_read_unlock();
9f08ea84
PNA
116}
117
0ca743a5
PNA
118struct nft_jumpstack {
119 const struct nft_chain *chain;
0cbc06b3 120 struct nft_rule *const *rules;
0ca743a5
PNA
121};
122
222440b4
FW
123static void expr_call_ops_eval(const struct nft_expr *expr,
124 struct nft_regs *regs,
125 struct nft_pktinfo *pkt)
126{
10870dd8 127#ifdef CONFIG_RETPOLINE
222440b4 128 unsigned long e = (unsigned long)expr->ops->eval;
10870dd8
FW
129#define X(e, fun) \
130 do { if ((e) == (unsigned long)(fun)) \
131 return fun(expr, regs, pkt); } while (0)
132
133 X(e, nft_payload_eval);
134 X(e, nft_cmp_eval);
135 X(e, nft_meta_get_eval);
136 X(e, nft_lookup_eval);
137 X(e, nft_range_eval);
138 X(e, nft_immediate_eval);
139 X(e, nft_byteorder_eval);
140 X(e, nft_dynset_eval);
141 X(e, nft_rt_get_eval);
142 X(e, nft_bitwise_eval);
143#undef X
144#endif /* CONFIG_RETPOLINE */
145 expr->ops->eval(expr, regs, pkt);
222440b4
FW
146}
147
0ca743a5 148unsigned int
06198b34 149nft_do_chain(struct nft_pktinfo *pkt, void *priv)
96518518 150{
06198b34 151 const struct nft_chain *chain = priv, *basechain = chain;
0e5a1c7e 152 const struct net *net = nft_net(pkt);
0cbc06b3 153 struct nft_rule *const *rules;
96518518
PM
154 const struct nft_rule *rule;
155 const struct nft_expr *expr, *last;
a55e22e9 156 struct nft_regs regs;
96518518 157 unsigned int stackptr = 0;
0ca743a5 158 struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
0cbc06b3 159 bool genbit = READ_ONCE(net->nft.gencursor);
33d5a7b1 160 struct nft_traceinfo info;
96518518 161
e639f7ab
FW
162 info.trace = false;
163 if (static_branch_unlikely(&nft_trace_enabled))
164 nft_trace_init(&info, pkt, &regs.verdict, basechain);
96518518 165do_chain:
0cbc06b3
FW
166 if (genbit)
167 rules = rcu_dereference(chain->rules_gen_1);
168 else
169 rules = rcu_dereference(chain->rules_gen_0);
170
96518518 171next_rule:
0cbc06b3 172 rule = *rules;
a55e22e9 173 regs.verdict.code = NFT_CONTINUE;
0cbc06b3
FW
174 for (; *rules ; rules++) {
175 rule = *rules;
96518518 176 nft_rule_for_each_expr(expr, last, rule) {
cb7dbfd0 177 if (expr->ops == &nft_cmp_fast_ops)
a55e22e9 178 nft_cmp_fast_eval(expr, &regs);
c29b72e0 179 else if (expr->ops != &nft_payload_fast_ops ||
a55e22e9 180 !nft_payload_fast_eval(expr, &regs, pkt))
222440b4 181 expr_call_ops_eval(expr, &regs, pkt);
cb7dbfd0 182
a55e22e9 183 if (regs.verdict.code != NFT_CONTINUE)
96518518
PM
184 break;
185 }
186
a55e22e9 187 switch (regs.verdict.code) {
96518518 188 case NFT_BREAK:
a55e22e9 189 regs.verdict.code = NFT_CONTINUE;
3b084e99 190 continue;
96518518 191 case NFT_CONTINUE:
33d5a7b1 192 nft_trace_packet(&info, chain, rule,
e65eebec 193 NFT_TRACETYPE_RULE);
96518518
PM
194 continue;
195 }
196 break;
197 }
198
a55e22e9 199 switch (regs.verdict.code & NF_VERDICT_MASK) {
96518518
PM
200 case NF_ACCEPT:
201 case NF_DROP:
202 case NF_QUEUE:
5efa0fc6 203 case NF_STOLEN:
33d5a7b1 204 nft_trace_packet(&info, chain, rule,
e65eebec 205 NFT_TRACETYPE_RULE);
a55e22e9 206 return regs.verdict.code;
e569bdab
EL
207 }
208
a55e22e9 209 switch (regs.verdict.code) {
96518518 210 case NFT_JUMP:
adc972c5
TY
211 if (WARN_ON_ONCE(stackptr >= NFT_JUMP_STACK_SIZE))
212 return NF_DROP;
96518518 213 jumpstack[stackptr].chain = chain;
0cbc06b3 214 jumpstack[stackptr].rules = rules + 1;
96518518 215 stackptr++;
354bf5a0 216 /* fall through */
96518518 217 case NFT_GOTO:
33d5a7b1 218 nft_trace_packet(&info, chain, rule,
e65eebec 219 NFT_TRACETYPE_RULE);
7b9d5ef9 220
a55e22e9 221 chain = regs.verdict.chain;
96518518 222 goto do_chain;
354bf5a0 223 case NFT_CONTINUE:
96518518 224 case NFT_RETURN:
33d5a7b1 225 nft_trace_packet(&info, chain, rule,
e65eebec 226 NFT_TRACETYPE_RETURN);
7e9bc10d 227 break;
96518518
PM
228 default:
229 WARN_ON(1);
230 }
231
232 if (stackptr > 0) {
233 stackptr--;
234 chain = jumpstack[stackptr].chain;
0cbc06b3 235 rules = jumpstack[stackptr].rules;
96518518
PM
236 goto next_rule;
237 }
238
e65eebec 239 nft_trace_packet(&info, basechain, NULL, NFT_TRACETYPE_POLICY);
5467a512 240
9f08ea84
PNA
241 if (static_branch_unlikely(&nft_counters_enabled))
242 nft_update_chain_stats(basechain, pkt);
b5bc89bf 243
5467a512 244 return nft_base_chain(basechain)->policy;
96518518 245}
3876d22d 246EXPORT_SYMBOL_GPL(nft_do_chain);
96518518 247
4e24877e
LZ
248static struct nft_expr_type *nft_basic_types[] = {
249 &nft_imm_type,
250 &nft_cmp_type,
251 &nft_lookup_type,
252 &nft_bitwise_type,
253 &nft_byteorder_type,
254 &nft_payload_type,
255 &nft_dynset_type,
256 &nft_range_type,
8a22543c 257 &nft_meta_type,
ae1bc6a9 258 &nft_rt_type,
d0103158 259 &nft_exthdr_type,
4e24877e
LZ
260};
261
fb961945
CG
262static struct nft_object_type *nft_basic_objects[] = {
263#ifdef CONFIG_NETWORK_SECMARK
264 &nft_secmark_obj_type,
265#endif
266};
267
96518518
PM
268int __init nf_tables_core_module_init(void)
269{
fb961945
CG
270 int err, i, j = 0;
271
272 for (i = 0; i < ARRAY_SIZE(nft_basic_objects); i++) {
273 err = nft_register_obj(nft_basic_objects[i]);
274 if (err)
275 goto err;
276 }
96518518 277
fb961945
CG
278 for (j = 0; j < ARRAY_SIZE(nft_basic_types); j++) {
279 err = nft_register_expr(nft_basic_types[j]);
4e24877e
LZ
280 if (err)
281 goto err;
282 }
96518518 283
0f3cd9b3 284 return 0;
4e24877e
LZ
285
286err:
fb961945
CG
287 while (j-- > 0)
288 nft_unregister_expr(nft_basic_types[j]);
289
4e24877e 290 while (i-- > 0)
fb961945
CG
291 nft_unregister_obj(nft_basic_objects[i]);
292
96518518
PM
293 return err;
294}
295
296void nf_tables_core_module_exit(void)
297{
4e24877e
LZ
298 int i;
299
300 i = ARRAY_SIZE(nft_basic_types);
301 while (i-- > 0)
302 nft_unregister_expr(nft_basic_types[i]);
fb961945
CG
303
304 i = ARRAY_SIZE(nft_basic_objects);
305 while (i-- > 0)
306 nft_unregister_obj(nft_basic_objects[i]);
96518518 307}