e1000e: start network tx queue only when link is up
[linux-2.6-block.git] / net / netfilter / nf_tables_core.c
CommitLineData
96518518
PM
1/*
2 * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
a81b2ce8 11#include <linux/kernel.h>
96518518
PM
12#include <linux/module.h>
13#include <linux/init.h>
14#include <linux/list.h>
15#include <linux/rculist.h>
16#include <linux/skbuff.h>
17#include <linux/netlink.h>
18#include <linux/netfilter.h>
e639f7ab 19#include <linux/static_key.h>
96518518
PM
20#include <linux/netfilter/nfnetlink.h>
21#include <linux/netfilter/nf_tables.h>
22#include <net/netfilter/nf_tables_core.h>
23#include <net/netfilter/nf_tables.h>
b5bc89bf 24#include <net/netfilter/nf_log.h>
96518518 25
33d5a7b1
FW
26static noinline void __nft_trace_packet(struct nft_traceinfo *info,
27 const struct nft_chain *chain,
e65eebec 28 enum nft_trace_types type)
01ef16c2 29{
33d5a7b1
FW
30 const struct nft_pktinfo *pkt = info->pkt;
31
e639f7ab 32 if (!info->trace || !pkt->skb->nf_trace)
33d5a7b1
FW
33 return;
34
35 info->chain = chain;
36 info->type = type;
37
38 nft_trace_notify(info);
01ef16c2
PM
39}
40
33d5a7b1 41static inline void nft_trace_packet(struct nft_traceinfo *info,
01ef16c2 42 const struct nft_chain *chain,
33d5a7b1 43 const struct nft_rule *rule,
33d5a7b1 44 enum nft_trace_types type)
01ef16c2 45{
e639f7ab 46 if (static_branch_unlikely(&nft_trace_enabled)) {
33d5a7b1 47 info->rule = rule;
e65eebec 48 __nft_trace_packet(info, chain, type);
33d5a7b1 49 }
01ef16c2
PM
50}
51
cb7dbfd0 52static void nft_cmp_fast_eval(const struct nft_expr *expr,
a55e22e9 53 struct nft_regs *regs)
cb7dbfd0
PM
54{
55 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
b855d416 56 u32 mask = nft_cmp_fast_mask(priv->len);
cb7dbfd0 57
49499c3e 58 if ((regs->data[priv->sreg] & mask) == priv->data)
cb7dbfd0 59 return;
a55e22e9 60 regs->verdict.code = NFT_BREAK;
cb7dbfd0
PM
61}
62
c29b72e0 63static bool nft_payload_fast_eval(const struct nft_expr *expr,
a55e22e9 64 struct nft_regs *regs,
c29b72e0
PM
65 const struct nft_pktinfo *pkt)
66{
67 const struct nft_payload *priv = nft_expr_priv(expr);
68 const struct sk_buff *skb = pkt->skb;
49499c3e 69 u32 *dest = &regs->data[priv->dreg];
c29b72e0
PM
70 unsigned char *ptr;
71
72 if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
73 ptr = skb_network_header(skb);
a20877b5
LZ
74 else {
75 if (!pkt->tprot_set)
76 return false;
c54032e0 77 ptr = skb_network_header(skb) + pkt->xt.thoff;
a20877b5 78 }
c29b72e0
PM
79
80 ptr += priv->offset;
81
8dc3c2b8 82 if (unlikely(ptr + priv->len > skb_tail_pointer(skb)))
c29b72e0
PM
83 return false;
84
49499c3e 85 *dest = 0;
c29b72e0 86 if (priv->len == 2)
fad136ea 87 *(u16 *)dest = *(u16 *)ptr;
c29b72e0 88 else if (priv->len == 4)
fad136ea 89 *(u32 *)dest = *(u32 *)ptr;
c29b72e0 90 else
fad136ea 91 *(u8 *)dest = *(u8 *)ptr;
c29b72e0
PM
92 return true;
93}
94
9f08ea84
PNA
95DEFINE_STATIC_KEY_FALSE(nft_counters_enabled);
96
97static noinline void nft_update_chain_stats(const struct nft_chain *chain,
98 const struct nft_pktinfo *pkt)
99{
00924094 100 struct nft_base_chain *base_chain;
a9f5e78c 101 struct nft_stats __percpu *pstats;
9f08ea84
PNA
102 struct nft_stats *stats;
103
00924094 104 base_chain = nft_base_chain(chain);
00924094 105
a9f5e78c
LR
106 rcu_read_lock();
107 pstats = READ_ONCE(base_chain->stats);
108 if (pstats) {
109 local_bh_disable();
110 stats = this_cpu_ptr(pstats);
00924094
FW
111 u64_stats_update_begin(&stats->syncp);
112 stats->pkts++;
113 stats->bytes += pkt->skb->len;
114 u64_stats_update_end(&stats->syncp);
a9f5e78c 115 local_bh_enable();
00924094 116 }
a9f5e78c 117 rcu_read_unlock();
9f08ea84
PNA
118}
119
0ca743a5
PNA
120struct nft_jumpstack {
121 const struct nft_chain *chain;
0cbc06b3 122 struct nft_rule *const *rules;
0ca743a5
PNA
123};
124
222440b4
FW
125static void expr_call_ops_eval(const struct nft_expr *expr,
126 struct nft_regs *regs,
127 struct nft_pktinfo *pkt)
128{
10870dd8 129#ifdef CONFIG_RETPOLINE
222440b4 130 unsigned long e = (unsigned long)expr->ops->eval;
10870dd8
FW
131#define X(e, fun) \
132 do { if ((e) == (unsigned long)(fun)) \
133 return fun(expr, regs, pkt); } while (0)
134
135 X(e, nft_payload_eval);
136 X(e, nft_cmp_eval);
137 X(e, nft_meta_get_eval);
138 X(e, nft_lookup_eval);
139 X(e, nft_range_eval);
140 X(e, nft_immediate_eval);
141 X(e, nft_byteorder_eval);
142 X(e, nft_dynset_eval);
143 X(e, nft_rt_get_eval);
144 X(e, nft_bitwise_eval);
145#undef X
146#endif /* CONFIG_RETPOLINE */
147 expr->ops->eval(expr, regs, pkt);
222440b4
FW
148}
149
0ca743a5 150unsigned int
06198b34 151nft_do_chain(struct nft_pktinfo *pkt, void *priv)
96518518 152{
06198b34 153 const struct nft_chain *chain = priv, *basechain = chain;
0e5a1c7e 154 const struct net *net = nft_net(pkt);
0cbc06b3 155 struct nft_rule *const *rules;
96518518
PM
156 const struct nft_rule *rule;
157 const struct nft_expr *expr, *last;
a55e22e9 158 struct nft_regs regs;
96518518 159 unsigned int stackptr = 0;
0ca743a5 160 struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
0cbc06b3 161 bool genbit = READ_ONCE(net->nft.gencursor);
33d5a7b1 162 struct nft_traceinfo info;
96518518 163
e639f7ab
FW
164 info.trace = false;
165 if (static_branch_unlikely(&nft_trace_enabled))
166 nft_trace_init(&info, pkt, &regs.verdict, basechain);
96518518 167do_chain:
0cbc06b3
FW
168 if (genbit)
169 rules = rcu_dereference(chain->rules_gen_1);
170 else
171 rules = rcu_dereference(chain->rules_gen_0);
172
96518518 173next_rule:
0cbc06b3 174 rule = *rules;
a55e22e9 175 regs.verdict.code = NFT_CONTINUE;
0cbc06b3
FW
176 for (; *rules ; rules++) {
177 rule = *rules;
96518518 178 nft_rule_for_each_expr(expr, last, rule) {
cb7dbfd0 179 if (expr->ops == &nft_cmp_fast_ops)
a55e22e9 180 nft_cmp_fast_eval(expr, &regs);
c29b72e0 181 else if (expr->ops != &nft_payload_fast_ops ||
a55e22e9 182 !nft_payload_fast_eval(expr, &regs, pkt))
222440b4 183 expr_call_ops_eval(expr, &regs, pkt);
cb7dbfd0 184
a55e22e9 185 if (regs.verdict.code != NFT_CONTINUE)
96518518
PM
186 break;
187 }
188
a55e22e9 189 switch (regs.verdict.code) {
96518518 190 case NFT_BREAK:
a55e22e9 191 regs.verdict.code = NFT_CONTINUE;
3b084e99 192 continue;
96518518 193 case NFT_CONTINUE:
33d5a7b1 194 nft_trace_packet(&info, chain, rule,
e65eebec 195 NFT_TRACETYPE_RULE);
96518518
PM
196 continue;
197 }
198 break;
199 }
200
a55e22e9 201 switch (regs.verdict.code & NF_VERDICT_MASK) {
96518518
PM
202 case NF_ACCEPT:
203 case NF_DROP:
204 case NF_QUEUE:
5efa0fc6 205 case NF_STOLEN:
33d5a7b1 206 nft_trace_packet(&info, chain, rule,
e65eebec 207 NFT_TRACETYPE_RULE);
a55e22e9 208 return regs.verdict.code;
e569bdab
EL
209 }
210
a55e22e9 211 switch (regs.verdict.code) {
96518518 212 case NFT_JUMP:
adc972c5
TY
213 if (WARN_ON_ONCE(stackptr >= NFT_JUMP_STACK_SIZE))
214 return NF_DROP;
96518518 215 jumpstack[stackptr].chain = chain;
0cbc06b3 216 jumpstack[stackptr].rules = rules + 1;
96518518 217 stackptr++;
354bf5a0 218 /* fall through */
96518518 219 case NFT_GOTO:
33d5a7b1 220 nft_trace_packet(&info, chain, rule,
e65eebec 221 NFT_TRACETYPE_RULE);
7b9d5ef9 222
a55e22e9 223 chain = regs.verdict.chain;
96518518 224 goto do_chain;
354bf5a0 225 case NFT_CONTINUE:
96518518 226 case NFT_RETURN:
33d5a7b1 227 nft_trace_packet(&info, chain, rule,
e65eebec 228 NFT_TRACETYPE_RETURN);
7e9bc10d 229 break;
96518518
PM
230 default:
231 WARN_ON(1);
232 }
233
234 if (stackptr > 0) {
235 stackptr--;
236 chain = jumpstack[stackptr].chain;
0cbc06b3 237 rules = jumpstack[stackptr].rules;
96518518
PM
238 goto next_rule;
239 }
240
e65eebec 241 nft_trace_packet(&info, basechain, NULL, NFT_TRACETYPE_POLICY);
5467a512 242
9f08ea84
PNA
243 if (static_branch_unlikely(&nft_counters_enabled))
244 nft_update_chain_stats(basechain, pkt);
b5bc89bf 245
5467a512 246 return nft_base_chain(basechain)->policy;
96518518 247}
3876d22d 248EXPORT_SYMBOL_GPL(nft_do_chain);
96518518 249
4e24877e
LZ
250static struct nft_expr_type *nft_basic_types[] = {
251 &nft_imm_type,
252 &nft_cmp_type,
253 &nft_lookup_type,
254 &nft_bitwise_type,
255 &nft_byteorder_type,
256 &nft_payload_type,
257 &nft_dynset_type,
258 &nft_range_type,
8a22543c 259 &nft_meta_type,
ae1bc6a9 260 &nft_rt_type,
d0103158 261 &nft_exthdr_type,
4e24877e
LZ
262};
263
fb961945
CG
264static struct nft_object_type *nft_basic_objects[] = {
265#ifdef CONFIG_NETWORK_SECMARK
266 &nft_secmark_obj_type,
267#endif
268};
269
96518518
PM
270int __init nf_tables_core_module_init(void)
271{
fb961945
CG
272 int err, i, j = 0;
273
274 for (i = 0; i < ARRAY_SIZE(nft_basic_objects); i++) {
275 err = nft_register_obj(nft_basic_objects[i]);
276 if (err)
277 goto err;
278 }
96518518 279
fb961945
CG
280 for (j = 0; j < ARRAY_SIZE(nft_basic_types); j++) {
281 err = nft_register_expr(nft_basic_types[j]);
4e24877e
LZ
282 if (err)
283 goto err;
284 }
96518518 285
0f3cd9b3 286 return 0;
4e24877e
LZ
287
288err:
fb961945
CG
289 while (j-- > 0)
290 nft_unregister_expr(nft_basic_types[j]);
291
4e24877e 292 while (i-- > 0)
fb961945
CG
293 nft_unregister_obj(nft_basic_objects[i]);
294
96518518
PM
295 return err;
296}
297
298void nf_tables_core_module_exit(void)
299{
4e24877e
LZ
300 int i;
301
302 i = ARRAY_SIZE(nft_basic_types);
303 while (i-- > 0)
304 nft_unregister_expr(nft_basic_types[i]);
fb961945
CG
305
306 i = ARRAY_SIZE(nft_basic_objects);
307 while (i-- > 0)
308 nft_unregister_obj(nft_basic_objects[i]);
96518518 309}