e1000e: start network tx queue only when link is up
[linux-2.6-block.git] / net / netfilter / nft_objref.c
CommitLineData
c97d22e6
PNA
1/*
2 * Copyright (c) 2012-2016 Pablo Neira Ayuso <pablo@netfilter.org>
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 */
8
9#include <linux/init.h>
10#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/netlink.h>
13#include <linux/netfilter.h>
14#include <linux/netfilter/nf_tables.h>
15#include <net/netfilter/nf_tables.h>
16
17#define nft_objref_priv(expr) *((struct nft_object **)nft_expr_priv(expr))
18
19static void nft_objref_eval(const struct nft_expr *expr,
20 struct nft_regs *regs,
21 const struct nft_pktinfo *pkt)
22{
23 struct nft_object *obj = nft_objref_priv(expr);
24
dfc46034 25 obj->ops->eval(obj, regs, pkt);
c97d22e6
PNA
26}
27
28static int nft_objref_init(const struct nft_ctx *ctx,
29 const struct nft_expr *expr,
30 const struct nlattr * const tb[])
31{
32 struct nft_object *obj = nft_objref_priv(expr);
33 u8 genmask = nft_genmask_next(ctx->net);
34 u32 objtype;
35
36 if (!tb[NFTA_OBJREF_IMM_NAME] ||
37 !tb[NFTA_OBJREF_IMM_TYPE])
38 return -EINVAL;
39
40 objtype = ntohl(nla_get_be32(tb[NFTA_OBJREF_IMM_TYPE]));
4d44175a
FW
41 obj = nft_obj_lookup(ctx->net, ctx->table,
42 tb[NFTA_OBJREF_IMM_NAME], objtype,
cac20fcd 43 genmask);
c97d22e6
PNA
44 if (IS_ERR(obj))
45 return -ENOENT;
46
47 nft_objref_priv(expr) = obj;
48 obj->use++;
49
50 return 0;
51}
52
53static int nft_objref_dump(struct sk_buff *skb, const struct nft_expr *expr)
54{
55 const struct nft_object *obj = nft_objref_priv(expr);
56
d152159b 57 if (nla_put_string(skb, NFTA_OBJREF_IMM_NAME, obj->key.name) ||
dfc46034
PBG
58 nla_put_be32(skb, NFTA_OBJREF_IMM_TYPE,
59 htonl(obj->ops->type->type)))
c97d22e6
PNA
60 goto nla_put_failure;
61
62 return 0;
63
64nla_put_failure:
65 return -1;
66}
67
8ffcd32f
PNA
68static void nft_objref_deactivate(const struct nft_ctx *ctx,
69 const struct nft_expr *expr,
70 enum nft_trans_phase phase)
c97d22e6
PNA
71{
72 struct nft_object *obj = nft_objref_priv(expr);
73
8ffcd32f
PNA
74 if (phase == NFT_TRANS_COMMIT)
75 return;
76
c97d22e6
PNA
77 obj->use--;
78}
79
8ffcd32f
PNA
80static void nft_objref_activate(const struct nft_ctx *ctx,
81 const struct nft_expr *expr)
82{
83 struct nft_object *obj = nft_objref_priv(expr);
84
85 obj->use++;
86}
87
c97d22e6
PNA
88static struct nft_expr_type nft_objref_type;
89static const struct nft_expr_ops nft_objref_ops = {
90 .type = &nft_objref_type,
91 .size = NFT_EXPR_SIZE(sizeof(struct nft_object *)),
92 .eval = nft_objref_eval,
93 .init = nft_objref_init,
8ffcd32f
PNA
94 .activate = nft_objref_activate,
95 .deactivate = nft_objref_deactivate,
c97d22e6
PNA
96 .dump = nft_objref_dump,
97};
98
63aea290
PNA
99struct nft_objref_map {
100 struct nft_set *set;
101 enum nft_registers sreg:8;
102 struct nft_set_binding binding;
103};
104
105static void nft_objref_map_eval(const struct nft_expr *expr,
106 struct nft_regs *regs,
107 const struct nft_pktinfo *pkt)
108{
109 struct nft_objref_map *priv = nft_expr_priv(expr);
110 const struct nft_set *set = priv->set;
111 const struct nft_set_ext *ext;
112 struct nft_object *obj;
113 bool found;
114
115 found = set->ops->lookup(nft_net(pkt), set, &regs->data[priv->sreg],
116 &ext);
117 if (!found) {
118 regs->verdict.code = NFT_BREAK;
119 return;
120 }
121 obj = *nft_set_ext_obj(ext);
dfc46034 122 obj->ops->eval(obj, regs, pkt);
63aea290
PNA
123}
124
125static int nft_objref_map_init(const struct nft_ctx *ctx,
126 const struct nft_expr *expr,
127 const struct nlattr * const tb[])
128{
129 struct nft_objref_map *priv = nft_expr_priv(expr);
130 u8 genmask = nft_genmask_next(ctx->net);
131 struct nft_set *set;
132 int err;
133
10659cba
PNA
134 set = nft_set_lookup_global(ctx->net, ctx->table,
135 tb[NFTA_OBJREF_SET_NAME],
136 tb[NFTA_OBJREF_SET_ID], genmask);
c7a72e3f
PNA
137 if (IS_ERR(set))
138 return PTR_ERR(set);
63aea290
PNA
139
140 if (!(set->flags & NFT_SET_OBJECT))
141 return -EINVAL;
142
143 priv->sreg = nft_parse_register(tb[NFTA_OBJREF_SET_SREG]);
144 err = nft_validate_register_load(priv->sreg, set->klen);
145 if (err < 0)
146 return err;
147
148 priv->binding.flags = set->flags & NFT_SET_OBJECT;
149
150 err = nf_tables_bind_set(ctx, set, &priv->binding);
151 if (err < 0)
152 return err;
153
154 priv->set = set;
155 return 0;
156}
157
158static int nft_objref_map_dump(struct sk_buff *skb, const struct nft_expr *expr)
159{
160 const struct nft_objref_map *priv = nft_expr_priv(expr);
161
162 if (nft_dump_register(skb, NFTA_OBJREF_SET_SREG, priv->sreg) ||
163 nla_put_string(skb, NFTA_OBJREF_SET_NAME, priv->set->name))
164 goto nla_put_failure;
165
166 return 0;
167
168nla_put_failure:
169 return -1;
170}
171
cd5125d8 172static void nft_objref_map_deactivate(const struct nft_ctx *ctx,
f6ac8585
PNA
173 const struct nft_expr *expr,
174 enum nft_trans_phase phase)
cd5125d8
FW
175{
176 struct nft_objref_map *priv = nft_expr_priv(expr);
177
273fe3f1
PNA
178 nf_tables_deactivate_set(ctx, priv->set, &priv->binding, phase);
179}
180
181static void nft_objref_map_activate(const struct nft_ctx *ctx,
182 const struct nft_expr *expr)
183{
184 struct nft_objref_map *priv = nft_expr_priv(expr);
f6ac8585 185
273fe3f1 186 priv->set->use++;
cd5125d8
FW
187}
188
63aea290
PNA
189static void nft_objref_map_destroy(const struct nft_ctx *ctx,
190 const struct nft_expr *expr)
191{
192 struct nft_objref_map *priv = nft_expr_priv(expr);
193
cd5125d8 194 nf_tables_destroy_set(ctx, priv->set);
63aea290
PNA
195}
196
197static struct nft_expr_type nft_objref_type;
198static const struct nft_expr_ops nft_objref_map_ops = {
199 .type = &nft_objref_type,
200 .size = NFT_EXPR_SIZE(sizeof(struct nft_objref_map)),
201 .eval = nft_objref_map_eval,
202 .init = nft_objref_map_init,
273fe3f1 203 .activate = nft_objref_map_activate,
cd5125d8 204 .deactivate = nft_objref_map_deactivate,
63aea290
PNA
205 .destroy = nft_objref_map_destroy,
206 .dump = nft_objref_map_dump,
207};
208
209static const struct nft_expr_ops *
210nft_objref_select_ops(const struct nft_ctx *ctx,
211 const struct nlattr * const tb[])
212{
213 if (tb[NFTA_OBJREF_SET_SREG] &&
214 (tb[NFTA_OBJREF_SET_NAME] ||
215 tb[NFTA_OBJREF_SET_ID]))
216 return &nft_objref_map_ops;
217 else if (tb[NFTA_OBJREF_IMM_NAME] &&
218 tb[NFTA_OBJREF_IMM_TYPE])
219 return &nft_objref_ops;
220
221 return ERR_PTR(-EOPNOTSUPP);
222}
223
c97d22e6 224static const struct nla_policy nft_objref_policy[NFTA_OBJREF_MAX + 1] = {
b2fbd044
LZ
225 [NFTA_OBJREF_IMM_NAME] = { .type = NLA_STRING,
226 .len = NFT_OBJ_MAXNAMELEN - 1 },
c97d22e6 227 [NFTA_OBJREF_IMM_TYPE] = { .type = NLA_U32 },
63aea290 228 [NFTA_OBJREF_SET_SREG] = { .type = NLA_U32 },
b2fbd044
LZ
229 [NFTA_OBJREF_SET_NAME] = { .type = NLA_STRING,
230 .len = NFT_SET_MAXNAMELEN - 1 },
63aea290 231 [NFTA_OBJREF_SET_ID] = { .type = NLA_U32 },
c97d22e6
PNA
232};
233
234static struct nft_expr_type nft_objref_type __read_mostly = {
235 .name = "objref",
63aea290 236 .select_ops = nft_objref_select_ops,
c97d22e6
PNA
237 .policy = nft_objref_policy,
238 .maxattr = NFTA_OBJREF_MAX,
239 .owner = THIS_MODULE,
240};
241
242static int __init nft_objref_module_init(void)
243{
244 return nft_register_expr(&nft_objref_type);
245}
246
247static void __exit nft_objref_module_exit(void)
248{
249 nft_unregister_expr(&nft_objref_type);
250}
251
252module_init(nft_objref_module_init);
253module_exit(nft_objref_module_exit);
254
255MODULE_LICENSE("GPL");
256MODULE_AUTHOR("Pablo Neira Ayuso <pablo@netfilter.org>");
257MODULE_ALIAS_NFT_EXPR("objref");