Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
[linux-2.6-block.git] / net / netfilter / nft_meta.c
CommitLineData
96518518 1/*
ef1f7df9 2 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
bd2bbdb4
FW
3 * Copyright (c) 2014 Intel Corporation
4 * Author: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
96518518
PM
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 *
10 * Development of this code funded by Astaro AG (http://www.astaro.com/)
11 */
12
13#include <linux/kernel.h>
96518518
PM
14#include <linux/netlink.h>
15#include <linux/netfilter.h>
16#include <linux/netfilter/nf_tables.h>
e2a093ff
AR
17#include <linux/in.h>
18#include <linux/ip.h>
19#include <linux/ipv6.h>
afc5be30 20#include <linux/smp.h>
e639f7ab 21#include <linux/static_key.h>
96518518
PM
22#include <net/dst.h>
23#include <net/sock.h>
24#include <net/tcp_states.h> /* for TCP_TIME_WAIT */
25#include <net/netfilter/nf_tables.h>
e639f7ab 26#include <net/netfilter/nf_tables_core.h>
96518518 27
b4aae759
FW
28#include <uapi/linux/netfilter_bridge.h> /* NF_BR_PRE_ROUTING */
29
bd2bbdb4
FW
30struct nft_meta {
31 enum nft_meta_keys key:8;
32 union {
33 enum nft_registers dreg:8;
34 enum nft_registers sreg:8;
35 };
36};
37
b07edbe1
FW
38static DEFINE_PER_CPU(struct rnd_state, nft_prandom_state);
39
bd2bbdb4
FW
40#ifdef CONFIG_NF_TABLES_BRIDGE
41#include "../bridge/br_private.h"
42#endif
43
222440b4
FW
44void nft_meta_get_eval(const struct nft_expr *expr,
45 struct nft_regs *regs,
46 const struct nft_pktinfo *pkt)
96518518
PM
47{
48 const struct nft_meta *priv = nft_expr_priv(expr);
49 const struct sk_buff *skb = pkt->skb;
0e5a1c7e 50 const struct net_device *in = nft_in(pkt), *out = nft_out(pkt);
3aed8225 51 struct sock *sk;
49499c3e 52 u32 *dest = &regs->data[priv->dreg];
bd2bbdb4
FW
53#ifdef CONFIG_NF_TABLES_BRIDGE
54 const struct net_bridge_port *p;
55#endif
96518518
PM
56
57 switch (priv->key) {
58 case NFT_META_LEN:
fad136ea 59 *dest = skb->len;
96518518
PM
60 break;
61 case NFT_META_PROTOCOL:
10596608 62 nft_reg_store16(dest, (__force u16)skb->protocol);
96518518 63 break;
124edfa9 64 case NFT_META_NFPROTO:
10596608 65 nft_reg_store8(dest, nft_pf(pkt));
124edfa9 66 break;
4566bf27 67 case NFT_META_L4PROTO:
beac5afa
PNA
68 if (!pkt->tprot_set)
69 goto err;
10596608 70 nft_reg_store8(dest, pkt->tprot);
4566bf27 71 break;
96518518 72 case NFT_META_PRIORITY:
fad136ea 73 *dest = skb->priority;
96518518
PM
74 break;
75 case NFT_META_MARK:
fad136ea 76 *dest = skb->mark;
96518518
PM
77 break;
78 case NFT_META_IIF:
79 if (in == NULL)
80 goto err;
fad136ea 81 *dest = in->ifindex;
96518518
PM
82 break;
83 case NFT_META_OIF:
84 if (out == NULL)
85 goto err;
fad136ea 86 *dest = out->ifindex;
96518518
PM
87 break;
88 case NFT_META_IIFNAME:
89 if (in == NULL)
90 goto err;
fad136ea 91 strncpy((char *)dest, in->name, IFNAMSIZ);
96518518
PM
92 break;
93 case NFT_META_OIFNAME:
94 if (out == NULL)
95 goto err;
fad136ea 96 strncpy((char *)dest, out->name, IFNAMSIZ);
96518518
PM
97 break;
98 case NFT_META_IIFTYPE:
99 if (in == NULL)
100 goto err;
10596608 101 nft_reg_store16(dest, in->type);
96518518
PM
102 break;
103 case NFT_META_OIFTYPE:
104 if (out == NULL)
105 goto err;
10596608 106 nft_reg_store16(dest, out->type);
96518518
PM
107 break;
108 case NFT_META_SKUID:
3aed8225 109 sk = skb_to_full_sk(skb);
f5646501
FL
110 if (!sk || !sk_fullsock(sk) ||
111 !net_eq(nft_net(pkt), sock_net(sk)))
96518518
PM
112 goto err;
113
3aed8225
ED
114 read_lock_bh(&sk->sk_callback_lock);
115 if (sk->sk_socket == NULL ||
116 sk->sk_socket->file == NULL) {
117 read_unlock_bh(&sk->sk_callback_lock);
96518518
PM
118 goto err;
119 }
120
fad136ea 121 *dest = from_kuid_munged(&init_user_ns,
3aed8225
ED
122 sk->sk_socket->file->f_cred->fsuid);
123 read_unlock_bh(&sk->sk_callback_lock);
96518518
PM
124 break;
125 case NFT_META_SKGID:
3aed8225 126 sk = skb_to_full_sk(skb);
f5646501
FL
127 if (!sk || !sk_fullsock(sk) ||
128 !net_eq(nft_net(pkt), sock_net(sk)))
96518518
PM
129 goto err;
130
3aed8225
ED
131 read_lock_bh(&sk->sk_callback_lock);
132 if (sk->sk_socket == NULL ||
133 sk->sk_socket->file == NULL) {
134 read_unlock_bh(&sk->sk_callback_lock);
96518518
PM
135 goto err;
136 }
fad136ea 137 *dest = from_kgid_munged(&init_user_ns,
3aed8225
ED
138 sk->sk_socket->file->f_cred->fsgid);
139 read_unlock_bh(&sk->sk_callback_lock);
96518518 140 break;
06efbd6d 141#ifdef CONFIG_IP_ROUTE_CLASSID
96518518
PM
142 case NFT_META_RTCLASSID: {
143 const struct dst_entry *dst = skb_dst(skb);
144
145 if (dst == NULL)
146 goto err;
fad136ea 147 *dest = dst->tclassid;
96518518
PM
148 break;
149 }
150#endif
151#ifdef CONFIG_NETWORK_SECMARK
152 case NFT_META_SECMARK:
fad136ea 153 *dest = skb->secmark;
96518518
PM
154 break;
155#endif
e2a093ff
AR
156 case NFT_META_PKTTYPE:
157 if (skb->pkt_type != PACKET_LOOPBACK) {
10596608 158 nft_reg_store8(dest, skb->pkt_type);
e2a093ff
AR
159 break;
160 }
161
0e5a1c7e 162 switch (nft_pf(pkt)) {
e2a093ff
AR
163 case NFPROTO_IPV4:
164 if (ipv4_is_multicast(ip_hdr(skb)->daddr))
10596608 165 nft_reg_store8(dest, PACKET_MULTICAST);
e2a093ff 166 else
10596608 167 nft_reg_store8(dest, PACKET_BROADCAST);
e2a093ff
AR
168 break;
169 case NFPROTO_IPV6:
10596608 170 nft_reg_store8(dest, PACKET_MULTICAST);
e2a093ff 171 break;
f169fd69
LZ
172 case NFPROTO_NETDEV:
173 switch (skb->protocol) {
174 case htons(ETH_P_IP): {
175 int noff = skb_network_offset(skb);
176 struct iphdr *iph, _iph;
177
178 iph = skb_header_pointer(skb, noff,
179 sizeof(_iph), &_iph);
180 if (!iph)
181 goto err;
182
183 if (ipv4_is_multicast(iph->daddr))
10596608 184 nft_reg_store8(dest, PACKET_MULTICAST);
f169fd69 185 else
10596608 186 nft_reg_store8(dest, PACKET_BROADCAST);
f169fd69
LZ
187
188 break;
189 }
190 case htons(ETH_P_IPV6):
10596608 191 nft_reg_store8(dest, PACKET_MULTICAST);
f169fd69
LZ
192 break;
193 default:
194 WARN_ON_ONCE(1);
195 goto err;
196 }
197 break;
e2a093ff 198 default:
f169fd69 199 WARN_ON_ONCE(1);
e2a093ff
AR
200 goto err;
201 }
202 break;
afc5be30 203 case NFT_META_CPU:
fad136ea 204 *dest = raw_smp_processor_id();
afc5be30 205 break;
3045d760
AR
206 case NFT_META_IIFGROUP:
207 if (in == NULL)
208 goto err;
fad136ea 209 *dest = in->group;
3045d760
AR
210 break;
211 case NFT_META_OIFGROUP:
212 if (out == NULL)
213 goto err;
fad136ea 214 *dest = out->group;
3045d760 215 break;
e181a543 216#ifdef CONFIG_CGROUP_NET_CLASSID
ce674173 217 case NFT_META_CGROUP:
3aed8225 218 sk = skb_to_full_sk(skb);
f5646501
FL
219 if (!sk || !sk_fullsock(sk) ||
220 !net_eq(nft_net(pkt), sock_net(sk)))
c5035c77 221 goto err;
2a56a1fe 222 *dest = sock_cgroup_classid(&sk->sk_cgrp_data);
ce674173 223 break;
e181a543 224#endif
b07edbe1
FW
225 case NFT_META_PRANDOM: {
226 struct rnd_state *state = this_cpu_ptr(&nft_prandom_state);
227 *dest = prandom_u32_state(state);
228 break;
229 }
f6931f5f
FW
230#ifdef CONFIG_XFRM
231 case NFT_META_SECPATH:
7af8f4ca 232 nft_reg_store8(dest, secpath_exists(skb));
f6931f5f 233 break;
bd2bbdb4
FW
234#endif
235#ifdef CONFIG_NF_TABLES_BRIDGE
236 case NFT_META_BRI_IIFNAME:
237 if (in == NULL || (p = br_port_get_rcu(in)) == NULL)
238 goto err;
239 strncpy((char *)dest, p->br->dev->name, IFNAMSIZ);
240 return;
241 case NFT_META_BRI_OIFNAME:
242 if (out == NULL || (p = br_port_get_rcu(out)) == NULL)
243 goto err;
244 strncpy((char *)dest, p->br->dev->name, IFNAMSIZ);
245 return;
f6931f5f 246#endif
96518518
PM
247 default:
248 WARN_ON(1);
249 goto err;
250 }
251 return;
252
253err:
a55e22e9 254 regs->verdict.code = NFT_BREAK;
96518518
PM
255}
256
bd2bbdb4
FW
257static void nft_meta_set_eval(const struct nft_expr *expr,
258 struct nft_regs *regs,
259 const struct nft_pktinfo *pkt)
e035b77a
ABG
260{
261 const struct nft_meta *meta = nft_expr_priv(expr);
262 struct sk_buff *skb = pkt->skb;
10596608
LZ
263 u32 *sreg = &regs->data[meta->sreg];
264 u32 value = *sreg;
97a0549b 265 u8 value8;
e035b77a
ABG
266
267 switch (meta->key) {
268 case NFT_META_MARK:
269 skb->mark = value;
270 break;
271 case NFT_META_PRIORITY:
272 skb->priority = value;
273 break;
b4aae759 274 case NFT_META_PKTTYPE:
97a0549b 275 value8 = nft_reg_load8(sreg);
10596608 276
97a0549b
TY
277 if (skb->pkt_type != value8 &&
278 skb_pkt_type_ok(value8) &&
10596608 279 skb_pkt_type_ok(skb->pkt_type))
97a0549b 280 skb->pkt_type = value8;
b4aae759 281 break;
e035b77a 282 case NFT_META_NFTRACE:
97a0549b
TY
283 value8 = nft_reg_load8(sreg);
284
285 skb->nf_trace = !!value8;
e035b77a 286 break;
b473a1f5
CG
287#ifdef CONFIG_NETWORK_SECMARK
288 case NFT_META_SECMARK:
289 skb->secmark = value;
290 break;
291#endif
e035b77a
ABG
292 default:
293 WARN_ON(1);
294 }
295}
296
bd2bbdb4 297static const struct nla_policy nft_meta_policy[NFTA_META_MAX + 1] = {
96518518
PM
298 [NFTA_META_DREG] = { .type = NLA_U32 },
299 [NFTA_META_KEY] = { .type = NLA_U32 },
e035b77a 300 [NFTA_META_SREG] = { .type = NLA_U32 },
96518518
PM
301};
302
bd2bbdb4
FW
303static int nft_meta_get_init(const struct nft_ctx *ctx,
304 const struct nft_expr *expr,
305 const struct nlattr * const tb[])
96518518 306{
d2caa696 307 struct nft_meta *priv = nft_expr_priv(expr);
45d9bcda 308 unsigned int len;
96518518 309
d2caa696
PM
310 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
311 switch (priv->key) {
96518518 312 case NFT_META_PROTOCOL:
45d9bcda
PM
313 case NFT_META_IIFTYPE:
314 case NFT_META_OIFTYPE:
315 len = sizeof(u16);
316 break;
124edfa9 317 case NFT_META_NFPROTO:
4566bf27 318 case NFT_META_L4PROTO:
45d9bcda 319 case NFT_META_LEN:
96518518
PM
320 case NFT_META_PRIORITY:
321 case NFT_META_MARK:
322 case NFT_META_IIF:
323 case NFT_META_OIF:
96518518
PM
324 case NFT_META_SKUID:
325 case NFT_META_SKGID:
06efbd6d 326#ifdef CONFIG_IP_ROUTE_CLASSID
96518518
PM
327 case NFT_META_RTCLASSID:
328#endif
329#ifdef CONFIG_NETWORK_SECMARK
330 case NFT_META_SECMARK:
331#endif
e2a093ff 332 case NFT_META_PKTTYPE:
afc5be30 333 case NFT_META_CPU:
3045d760
AR
334 case NFT_META_IIFGROUP:
335 case NFT_META_OIFGROUP:
e181a543 336#ifdef CONFIG_CGROUP_NET_CLASSID
ce674173 337 case NFT_META_CGROUP:
e181a543 338#endif
45d9bcda
PM
339 len = sizeof(u32);
340 break;
341 case NFT_META_IIFNAME:
342 case NFT_META_OIFNAME:
343 len = IFNAMSIZ;
d2caa696 344 break;
b07edbe1
FW
345 case NFT_META_PRANDOM:
346 prandom_init_once(&nft_prandom_state);
347 len = sizeof(u32);
348 break;
f6931f5f
FW
349#ifdef CONFIG_XFRM
350 case NFT_META_SECPATH:
351 len = sizeof(u8);
352 break;
bd2bbdb4
FW
353#endif
354#ifdef CONFIG_NF_TABLES_BRIDGE
355 case NFT_META_BRI_IIFNAME:
356 case NFT_META_BRI_OIFNAME:
357 if (ctx->family != NFPROTO_BRIDGE)
358 return -EOPNOTSUPP;
359 len = IFNAMSIZ;
360 break;
f6931f5f 361#endif
96518518
PM
362 default:
363 return -EOPNOTSUPP;
364 }
365
b1c96ed3 366 priv->dreg = nft_parse_register(tb[NFTA_META_DREG]);
27e6d201
PM
367 return nft_validate_register_store(ctx, priv->dreg, NULL,
368 NFT_DATA_VALUE, len);
e035b77a
ABG
369}
370
f6931f5f
FW
371static int nft_meta_get_validate(const struct nft_ctx *ctx,
372 const struct nft_expr *expr,
373 const struct nft_data **data)
374{
375#ifdef CONFIG_XFRM
376 const struct nft_meta *priv = nft_expr_priv(expr);
377 unsigned int hooks;
378
379 if (priv->key != NFT_META_SECPATH)
380 return 0;
381
36596dad 382 switch (ctx->family) {
f6931f5f
FW
383 case NFPROTO_NETDEV:
384 hooks = 1 << NF_NETDEV_INGRESS;
385 break;
386 case NFPROTO_IPV4:
387 case NFPROTO_IPV6:
388 case NFPROTO_INET:
389 hooks = (1 << NF_INET_PRE_ROUTING) |
390 (1 << NF_INET_LOCAL_IN) |
391 (1 << NF_INET_FORWARD);
392 break;
393 default:
394 return -EOPNOTSUPP;
395 }
396
397 return nft_chain_validate_hooks(ctx->chain, hooks);
398#else
399 return 0;
400#endif
401}
402
bd2bbdb4
FW
403static int nft_meta_set_validate(const struct nft_ctx *ctx,
404 const struct nft_expr *expr,
405 const struct nft_data **data)
b4aae759 406{
960fa72f 407 struct nft_meta *priv = nft_expr_priv(expr);
b4aae759
FW
408 unsigned int hooks;
409
960fa72f
LZ
410 if (priv->key != NFT_META_PKTTYPE)
411 return 0;
412
36596dad 413 switch (ctx->family) {
b4aae759
FW
414 case NFPROTO_BRIDGE:
415 hooks = 1 << NF_BR_PRE_ROUTING;
416 break;
417 case NFPROTO_NETDEV:
418 hooks = 1 << NF_NETDEV_INGRESS;
419 break;
96d9f2a7
LZ
420 case NFPROTO_IPV4:
421 case NFPROTO_IPV6:
422 case NFPROTO_INET:
423 hooks = 1 << NF_INET_PRE_ROUTING;
424 break;
b4aae759
FW
425 default:
426 return -EOPNOTSUPP;
427 }
428
429 return nft_chain_validate_hooks(ctx->chain, hooks);
430}
431
bd2bbdb4
FW
432static int nft_meta_set_init(const struct nft_ctx *ctx,
433 const struct nft_expr *expr,
434 const struct nlattr * const tb[])
e035b77a
ABG
435{
436 struct nft_meta *priv = nft_expr_priv(expr);
d07db988 437 unsigned int len;
e035b77a
ABG
438 int err;
439
440 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
d2caa696
PM
441 switch (priv->key) {
442 case NFT_META_MARK:
443 case NFT_META_PRIORITY:
b473a1f5
CG
444#ifdef CONFIG_NETWORK_SECMARK
445 case NFT_META_SECMARK:
446#endif
d07db988
PM
447 len = sizeof(u32);
448 break;
d2caa696 449 case NFT_META_NFTRACE:
d07db988 450 len = sizeof(u8);
d2caa696 451 break;
b4aae759 452 case NFT_META_PKTTYPE:
b4aae759
FW
453 len = sizeof(u8);
454 break;
d2caa696
PM
455 default:
456 return -EOPNOTSUPP;
e035b77a
ABG
457 }
458
b1c96ed3 459 priv->sreg = nft_parse_register(tb[NFTA_META_SREG]);
d07db988 460 err = nft_validate_register_load(priv->sreg, len);
b38895c5
PNA
461 if (err < 0)
462 return err;
e035b77a 463
e639f7ab
FW
464 if (priv->key == NFT_META_NFTRACE)
465 static_branch_inc(&nft_trace_enabled);
466
e035b77a 467 return 0;
96518518
PM
468}
469
bd2bbdb4
FW
470static int nft_meta_get_dump(struct sk_buff *skb,
471 const struct nft_expr *expr)
96518518
PM
472{
473 const struct nft_meta *priv = nft_expr_priv(expr);
474
e035b77a
ABG
475 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
476 goto nla_put_failure;
b1c96ed3 477 if (nft_dump_register(skb, NFTA_META_DREG, priv->dreg))
96518518 478 goto nla_put_failure;
e035b77a
ABG
479 return 0;
480
481nla_put_failure:
482 return -1;
483}
484
bd2bbdb4 485static int nft_meta_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
e035b77a
ABG
486{
487 const struct nft_meta *priv = nft_expr_priv(expr);
488
96518518
PM
489 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
490 goto nla_put_failure;
b1c96ed3 491 if (nft_dump_register(skb, NFTA_META_SREG, priv->sreg))
e035b77a
ABG
492 goto nla_put_failure;
493
96518518
PM
494 return 0;
495
496nla_put_failure:
497 return -1;
498}
499
bd2bbdb4
FW
500static void nft_meta_set_destroy(const struct nft_ctx *ctx,
501 const struct nft_expr *expr)
e639f7ab
FW
502{
503 const struct nft_meta *priv = nft_expr_priv(expr);
504
505 if (priv->key == NFT_META_NFTRACE)
506 static_branch_dec(&nft_trace_enabled);
507}
e639f7ab 508
e035b77a 509static const struct nft_expr_ops nft_meta_get_ops = {
ef1f7df9 510 .type = &nft_meta_type,
96518518 511 .size = NFT_EXPR_SIZE(sizeof(struct nft_meta)),
e035b77a 512 .eval = nft_meta_get_eval,
d2caa696 513 .init = nft_meta_get_init,
e035b77a 514 .dump = nft_meta_get_dump,
f6931f5f 515 .validate = nft_meta_get_validate,
ef1f7df9
PM
516};
517
e035b77a
ABG
518static const struct nft_expr_ops nft_meta_set_ops = {
519 .type = &nft_meta_type,
520 .size = NFT_EXPR_SIZE(sizeof(struct nft_meta)),
521 .eval = nft_meta_set_eval,
d2caa696 522 .init = nft_meta_set_init,
e639f7ab 523 .destroy = nft_meta_set_destroy,
e035b77a 524 .dump = nft_meta_set_dump,
960fa72f 525 .validate = nft_meta_set_validate,
e035b77a
ABG
526};
527
528static const struct nft_expr_ops *
529nft_meta_select_ops(const struct nft_ctx *ctx,
530 const struct nlattr * const tb[])
531{
532 if (tb[NFTA_META_KEY] == NULL)
533 return ERR_PTR(-EINVAL);
534
535 if (tb[NFTA_META_DREG] && tb[NFTA_META_SREG])
536 return ERR_PTR(-EINVAL);
537
538 if (tb[NFTA_META_DREG])
539 return &nft_meta_get_ops;
540
541 if (tb[NFTA_META_SREG])
542 return &nft_meta_set_ops;
543
544 return ERR_PTR(-EINVAL);
545}
546
8a22543c 547struct nft_expr_type nft_meta_type __read_mostly = {
ef1f7df9 548 .name = "meta",
d4ef3835 549 .select_ops = nft_meta_select_ops,
96518518
PM
550 .policy = nft_meta_policy,
551 .maxattr = NFTA_META_MAX,
ef1f7df9 552 .owner = THIS_MODULE,
96518518 553};
fb961945
CG
554
555#ifdef CONFIG_NETWORK_SECMARK
556struct nft_secmark {
557 u32 secid;
558 char *ctx;
559};
560
561static const struct nla_policy nft_secmark_policy[NFTA_SECMARK_MAX + 1] = {
562 [NFTA_SECMARK_CTX] = { .type = NLA_STRING, .len = NFT_SECMARK_CTX_MAXLEN },
563};
564
565static int nft_secmark_compute_secid(struct nft_secmark *priv)
566{
567 u32 tmp_secid = 0;
568 int err;
569
570 err = security_secctx_to_secid(priv->ctx, strlen(priv->ctx), &tmp_secid);
571 if (err)
572 return err;
573
574 if (!tmp_secid)
575 return -ENOENT;
576
577 err = security_secmark_relabel_packet(tmp_secid);
578 if (err)
579 return err;
580
581 priv->secid = tmp_secid;
582 return 0;
583}
584
585static void nft_secmark_obj_eval(struct nft_object *obj, struct nft_regs *regs,
586 const struct nft_pktinfo *pkt)
587{
588 const struct nft_secmark *priv = nft_obj_data(obj);
589 struct sk_buff *skb = pkt->skb;
590
591 skb->secmark = priv->secid;
592}
593
594static int nft_secmark_obj_init(const struct nft_ctx *ctx,
595 const struct nlattr * const tb[],
596 struct nft_object *obj)
597{
598 struct nft_secmark *priv = nft_obj_data(obj);
599 int err;
600
601 if (tb[NFTA_SECMARK_CTX] == NULL)
602 return -EINVAL;
603
604 priv->ctx = nla_strdup(tb[NFTA_SECMARK_CTX], GFP_KERNEL);
605 if (!priv->ctx)
606 return -ENOMEM;
607
608 err = nft_secmark_compute_secid(priv);
609 if (err) {
610 kfree(priv->ctx);
611 return err;
612 }
613
614 security_secmark_refcount_inc();
615
616 return 0;
617}
618
619static int nft_secmark_obj_dump(struct sk_buff *skb, struct nft_object *obj,
620 bool reset)
621{
622 struct nft_secmark *priv = nft_obj_data(obj);
623 int err;
624
625 if (nla_put_string(skb, NFTA_SECMARK_CTX, priv->ctx))
626 return -1;
627
628 if (reset) {
629 err = nft_secmark_compute_secid(priv);
630 if (err)
631 return err;
632 }
633
634 return 0;
635}
636
637static void nft_secmark_obj_destroy(const struct nft_ctx *ctx, struct nft_object *obj)
638{
639 struct nft_secmark *priv = nft_obj_data(obj);
640
641 security_secmark_refcount_dec();
642
643 kfree(priv->ctx);
644}
645
646static const struct nft_object_ops nft_secmark_obj_ops = {
647 .type = &nft_secmark_obj_type,
648 .size = sizeof(struct nft_secmark),
649 .init = nft_secmark_obj_init,
650 .eval = nft_secmark_obj_eval,
651 .dump = nft_secmark_obj_dump,
652 .destroy = nft_secmark_obj_destroy,
653};
654struct nft_object_type nft_secmark_obj_type __read_mostly = {
655 .type = NFT_OBJECT_SECMARK,
656 .ops = &nft_secmark_obj_ops,
657 .maxattr = NFTA_SECMARK_MAX,
658 .policy = nft_secmark_policy,
659 .owner = THIS_MODULE,
660};
661#endif /* CONFIG_NETWORK_SECMARK */