Merge tag 'wireless-drivers-for-davem-2019-09-26' of https://git.kernel.org/pub/scm...
[linux-2.6-block.git] / net / netfilter / nf_tables_offload.c
index c0d18c1d77ac05e0c9b1f98a33f2e18616bc3add..21bb772cb4b707c984d209ef811cd0d86d4d45d9 100644 (file)
@@ -28,13 +28,10 @@ static struct nft_flow_rule *nft_flow_rule_alloc(int num_actions)
        return flow;
 }
 
-struct nft_flow_rule *nft_flow_rule_create(const struct nft_rule *rule)
+struct nft_flow_rule *nft_flow_rule_create(struct net *net,
+                                          const struct nft_rule *rule)
 {
-       struct nft_offload_ctx ctx = {
-               .dep    = {
-                       .type   = NFT_OFFLOAD_DEP_UNSPEC,
-               },
-       };
+       struct nft_offload_ctx *ctx;
        struct nft_flow_rule *flow;
        int num_actions = 0, err;
        struct nft_expr *expr;
@@ -52,21 +49,32 @@ struct nft_flow_rule *nft_flow_rule_create(const struct nft_rule *rule)
                return ERR_PTR(-ENOMEM);
 
        expr = nft_expr_first(rule);
+
+       ctx = kzalloc(sizeof(struct nft_offload_ctx), GFP_KERNEL);
+       if (!ctx) {
+               err = -ENOMEM;
+               goto err_out;
+       }
+       ctx->net = net;
+       ctx->dep.type = NFT_OFFLOAD_DEP_UNSPEC;
+
        while (expr->ops && expr != nft_expr_last(rule)) {
                if (!expr->ops->offload) {
                        err = -EOPNOTSUPP;
                        goto err_out;
                }
-               err = expr->ops->offload(&ctx, flow, expr);
+               err = expr->ops->offload(ctx, flow, expr);
                if (err < 0)
                        goto err_out;
 
                expr = nft_expr_next(expr);
        }
-       flow->proto = ctx.dep.l3num;
+       flow->proto = ctx->dep.l3num;
+       kfree(ctx);
 
        return flow;
 err_out:
+       kfree(ctx);
        nft_flow_rule_destroy(flow);
 
        return ERR_PTR(err);
@@ -74,6 +82,19 @@ err_out:
 
 void nft_flow_rule_destroy(struct nft_flow_rule *flow)
 {
+       struct flow_action_entry *entry;
+       int i;
+
+       flow_action_for_each(i, entry, &flow->rule->action) {
+               switch (entry->id) {
+               case FLOW_ACTION_REDIRECT:
+               case FLOW_ACTION_MIRRED:
+                       dev_put(entry->dev);
+                       break;
+               default:
+                       break;
+               }
+       }
        kfree(flow->rule);
        kfree(flow);
 }
@@ -134,20 +155,20 @@ int nft_chain_offload_priority(struct nft_base_chain *basechain)
        return 0;
 }
 
-static int nft_flow_offload_rule(struct nft_trans *trans,
+static int nft_flow_offload_rule(struct nft_chain *chain,
+                                struct nft_rule *rule,
+                                struct nft_flow_rule *flow,
                                 enum flow_cls_command command)
 {
-       struct nft_flow_rule *flow = nft_trans_flow_rule(trans);
-       struct nft_rule *rule = nft_trans_rule(trans);
        struct flow_cls_offload cls_flow = {};
        struct nft_base_chain *basechain;
        struct netlink_ext_ack extack;
        __be16 proto = ETH_P_ALL;
 
-       if (!nft_is_base_chain(trans->ctx.chain))
+       if (!nft_is_base_chain(chain))
                return -EOPNOTSUPP;
 
-       basechain = nft_base_chain(trans->ctx.chain);
+       basechain = nft_base_chain(chain);
 
        if (flow)
                proto = flow->proto;
@@ -182,58 +203,130 @@ static int nft_flow_offload_unbind(struct flow_block_offload *bo,
        return 0;
 }
 
-#define FLOW_SETUP_BLOCK TC_SETUP_BLOCK
+static int nft_block_setup(struct nft_base_chain *basechain,
+                          struct flow_block_offload *bo,
+                          enum flow_block_command cmd)
+{
+       int err;
 
-static int nft_flow_offload_chain(struct nft_trans *trans,
-                                 enum flow_block_command cmd)
+       switch (cmd) {
+       case FLOW_BLOCK_BIND:
+               err = nft_flow_offload_bind(bo, basechain);
+               break;
+       case FLOW_BLOCK_UNBIND:
+               err = nft_flow_offload_unbind(bo, basechain);
+               break;
+       default:
+               WARN_ON_ONCE(1);
+               err = -EOPNOTSUPP;
+       }
+
+       return err;
+}
+
+static int nft_block_offload_cmd(struct nft_base_chain *chain,
+                                struct net_device *dev,
+                                enum flow_block_command cmd)
+{
+       struct netlink_ext_ack extack = {};
+       struct flow_block_offload bo = {};
+       int err;
+
+       bo.net = dev_net(dev);
+       bo.block = &chain->flow_block;
+       bo.command = cmd;
+       bo.binder_type = FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS;
+       bo.extack = &extack;
+       INIT_LIST_HEAD(&bo.cb_list);
+
+       err = dev->netdev_ops->ndo_setup_tc(dev, TC_SETUP_BLOCK, &bo);
+       if (err < 0)
+               return err;
+
+       return nft_block_setup(chain, &bo, cmd);
+}
+
+static void nft_indr_block_ing_cmd(struct net_device *dev,
+                                  struct nft_base_chain *chain,
+                                  flow_indr_block_bind_cb_t *cb,
+                                  void *cb_priv,
+                                  enum flow_block_command cmd)
 {
-       struct nft_chain *chain = trans->ctx.chain;
        struct netlink_ext_ack extack = {};
        struct flow_block_offload bo = {};
+
+       if (!chain)
+               return;
+
+       bo.net = dev_net(dev);
+       bo.block = &chain->flow_block;
+       bo.command = cmd;
+       bo.binder_type = FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS;
+       bo.extack = &extack;
+       INIT_LIST_HEAD(&bo.cb_list);
+
+       cb(dev, cb_priv, TC_SETUP_BLOCK, &bo);
+
+       nft_block_setup(chain, &bo, cmd);
+}
+
+static int nft_indr_block_offload_cmd(struct nft_base_chain *chain,
+                                     struct net_device *dev,
+                                     enum flow_block_command cmd)
+{
+       struct flow_block_offload bo = {};
+       struct netlink_ext_ack extack = {};
+
+       bo.net = dev_net(dev);
+       bo.block = &chain->flow_block;
+       bo.command = cmd;
+       bo.binder_type = FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS;
+       bo.extack = &extack;
+       INIT_LIST_HEAD(&bo.cb_list);
+
+       flow_indr_block_call(dev, &bo, cmd);
+
+       if (list_empty(&bo.cb_list))
+               return -EOPNOTSUPP;
+
+       return nft_block_setup(chain, &bo, cmd);
+}
+
+#define FLOW_SETUP_BLOCK TC_SETUP_BLOCK
+
+static int nft_flow_offload_chain(struct nft_chain *chain,
+                                 u8 *ppolicy,
+                                 enum flow_block_command cmd)
+{
        struct nft_base_chain *basechain;
        struct net_device *dev;
-       int err;
+       u8 policy;
 
        if (!nft_is_base_chain(chain))
                return -EOPNOTSUPP;
 
        basechain = nft_base_chain(chain);
        dev = basechain->ops.dev;
-       if (!dev || !dev->netdev_ops->ndo_setup_tc)
+       if (!dev)
                return -EOPNOTSUPP;
 
+       policy = ppolicy ? *ppolicy : basechain->policy;
+
        /* Only default policy to accept is supported for now. */
-       if (cmd == FLOW_BLOCK_BIND &&
-           nft_trans_chain_policy(trans) != -1 &&
-           nft_trans_chain_policy(trans) != NF_ACCEPT)
+       if (cmd == FLOW_BLOCK_BIND && policy != -1 && policy != NF_ACCEPT)
                return -EOPNOTSUPP;
 
-       bo.command = cmd;
-       bo.block = &basechain->flow_block;
-       bo.binder_type = FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS;
-       bo.extack = &extack;
-       INIT_LIST_HEAD(&bo.cb_list);
-
-       err = dev->netdev_ops->ndo_setup_tc(dev, FLOW_SETUP_BLOCK, &bo);
-       if (err < 0)
-               return err;
-
-       switch (cmd) {
-       case FLOW_BLOCK_BIND:
-               err = nft_flow_offload_bind(&bo, basechain);
-               break;
-       case FLOW_BLOCK_UNBIND:
-               err = nft_flow_offload_unbind(&bo, basechain);
-               break;
-       }
-
-       return err;
+       if (dev->netdev_ops->ndo_setup_tc)
+               return nft_block_offload_cmd(basechain, dev, cmd);
+       else
+               return nft_indr_block_offload_cmd(basechain, dev, cmd);
 }
 
 int nft_flow_rule_offload_commit(struct net *net)
 {
        struct nft_trans *trans;
        int err = 0;
+       u8 policy;
 
        list_for_each_entry(trans, &net->nft.commit_list, list) {
                if (trans->ctx.family != NFPROTO_NETDEV)
@@ -244,13 +337,17 @@ int nft_flow_rule_offload_commit(struct net *net)
                        if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
                                continue;
 
-                       err = nft_flow_offload_chain(trans, FLOW_BLOCK_BIND);
+                       policy = nft_trans_chain_policy(trans);
+                       err = nft_flow_offload_chain(trans->ctx.chain, &policy,
+                                                    FLOW_BLOCK_BIND);
                        break;
                case NFT_MSG_DELCHAIN:
                        if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
                                continue;
 
-                       err = nft_flow_offload_chain(trans, FLOW_BLOCK_UNBIND);
+                       policy = nft_trans_chain_policy(trans);
+                       err = nft_flow_offload_chain(trans->ctx.chain, &policy,
+                                                    FLOW_BLOCK_BIND);
                        break;
                case NFT_MSG_NEWRULE:
                        if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
@@ -260,14 +357,20 @@ int nft_flow_rule_offload_commit(struct net *net)
                            !(trans->ctx.flags & NLM_F_APPEND))
                                return -EOPNOTSUPP;
 
-                       err = nft_flow_offload_rule(trans, FLOW_CLS_REPLACE);
+                       err = nft_flow_offload_rule(trans->ctx.chain,
+                                                   nft_trans_rule(trans),
+                                                   nft_trans_flow_rule(trans),
+                                                   FLOW_CLS_REPLACE);
                        nft_flow_rule_destroy(nft_trans_flow_rule(trans));
                        break;
                case NFT_MSG_DELRULE:
                        if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
                                continue;
 
-                       err = nft_flow_offload_rule(trans, FLOW_CLS_DESTROY);
+                       err = nft_flow_offload_rule(trans->ctx.chain,
+                                                   nft_trans_rule(trans),
+                                                   nft_trans_flow_rule(trans),
+                                                   FLOW_CLS_DESTROY);
                        break;
                }
 
@@ -277,3 +380,104 @@ int nft_flow_rule_offload_commit(struct net *net)
 
        return err;
 }
+
+static struct nft_chain *__nft_offload_get_chain(struct net_device *dev)
+{
+       struct nft_base_chain *basechain;
+       struct net *net = dev_net(dev);
+       const struct nft_table *table;
+       struct nft_chain *chain;
+
+       list_for_each_entry(table, &net->nft.tables, list) {
+               if (table->family != NFPROTO_NETDEV)
+                       continue;
+
+               list_for_each_entry(chain, &table->chains, list) {
+                       if (!nft_is_base_chain(chain) ||
+                           !(chain->flags & NFT_CHAIN_HW_OFFLOAD))
+                               continue;
+
+                       basechain = nft_base_chain(chain);
+                       if (strncmp(basechain->dev_name, dev->name, IFNAMSIZ))
+                               continue;
+
+                       return chain;
+               }
+       }
+
+       return NULL;
+}
+
+static void nft_indr_block_cb(struct net_device *dev,
+                             flow_indr_block_bind_cb_t *cb, void *cb_priv,
+                             enum flow_block_command cmd)
+{
+       struct net *net = dev_net(dev);
+       struct nft_chain *chain;
+
+       mutex_lock(&net->nft.commit_mutex);
+       chain = __nft_offload_get_chain(dev);
+       if (chain) {
+               struct nft_base_chain *basechain;
+
+               basechain = nft_base_chain(chain);
+               nft_indr_block_ing_cmd(dev, basechain, cb, cb_priv, cmd);
+       }
+       mutex_unlock(&net->nft.commit_mutex);
+}
+
+static void nft_offload_chain_clean(struct nft_chain *chain)
+{
+       struct nft_rule *rule;
+
+       list_for_each_entry(rule, &chain->rules, list) {
+               nft_flow_offload_rule(chain, rule,
+                                     NULL, FLOW_CLS_DESTROY);
+       }
+
+       nft_flow_offload_chain(chain, NULL, FLOW_BLOCK_UNBIND);
+}
+
+static int nft_offload_netdev_event(struct notifier_block *this,
+                                   unsigned long event, void *ptr)
+{
+       struct net_device *dev = netdev_notifier_info_to_dev(ptr);
+       struct net *net = dev_net(dev);
+       struct nft_chain *chain;
+
+       mutex_lock(&net->nft.commit_mutex);
+       chain = __nft_offload_get_chain(dev);
+       if (chain)
+               nft_offload_chain_clean(chain);
+       mutex_unlock(&net->nft.commit_mutex);
+
+       return NOTIFY_DONE;
+}
+
+static struct flow_indr_block_ing_entry block_ing_entry = {
+       .cb     = nft_indr_block_cb,
+       .list   = LIST_HEAD_INIT(block_ing_entry.list),
+};
+
+static struct notifier_block nft_offload_netdev_notifier = {
+       .notifier_call  = nft_offload_netdev_event,
+};
+
+int nft_offload_init(void)
+{
+       int err;
+
+       err = register_netdevice_notifier(&nft_offload_netdev_notifier);
+       if (err < 0)
+               return err;
+
+       flow_indr_add_block_ing_cb(&block_ing_entry);
+
+       return 0;
+}
+
+void nft_offload_exit(void)
+{
+       flow_indr_del_block_ing_cb(&block_ing_entry);
+       unregister_netdevice_notifier(&nft_offload_netdev_notifier);
+}