]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/netfilter/nft_set_rbtree.c
cpufreq: CPPC: Don't set transition_latency
[mirror_ubuntu-bionic-kernel.git] / net / netfilter / nft_set_rbtree.c
CommitLineData
20a69341
PM
1/*
2 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
11#include <linux/kernel.h>
12#include <linux/init.h>
13#include <linux/module.h>
14#include <linux/list.h>
15#include <linux/rbtree.h>
16#include <linux/netlink.h>
17#include <linux/netfilter.h>
18#include <linux/netfilter/nf_tables.h>
19#include <net/netfilter/nf_tables.h>
20
21struct nft_rbtree {
22 struct rb_root root;
9b7e26ae
FW
23 rwlock_t lock;
24 seqcount_t count;
20a69341
PM
25};
26
27struct nft_rbtree_elem {
28 struct rb_node node;
fe2811eb 29 struct nft_set_ext ext;
20a69341
PM
30};
31
ef1d20e0
PNA
32static bool nft_rbtree_interval_end(const struct nft_rbtree_elem *rbe)
33{
34 return nft_set_ext_exists(&rbe->ext, NFT_SET_EXT_FLAGS) &&
35 (*nft_set_ext_flags(&rbe->ext) & NFT_SET_ELEM_INTERVAL_END);
36}
cc02e457 37
e701001e
PNA
38static bool nft_rbtree_equal(const struct nft_set *set, const void *this,
39 const struct nft_rbtree_elem *interval)
40{
41 return memcmp(this, nft_set_ext_key(&interval->ext), set->klen) == 0;
42}
43
9b7e26ae
FW
44static bool __nft_rbtree_lookup(const struct net *net, const struct nft_set *set,
45 const u32 *key, const struct nft_set_ext **ext,
46 unsigned int seq)
20a69341 47{
03e5fd0e 48 struct nft_rbtree *priv = nft_set_priv(set);
20a69341 49 const struct nft_rbtree_elem *rbe, *interval = NULL;
42a55769 50 u8 genmask = nft_genmask_cur(net);
16c45eda 51 const struct rb_node *parent;
e701001e 52 const void *this;
20a69341
PM
53 int d;
54
9b7e26ae 55 parent = rcu_dereference_raw(priv->root.rb_node);
20a69341 56 while (parent != NULL) {
9b7e26ae
FW
57 if (read_seqcount_retry(&priv->count, seq))
58 return false;
59
20a69341
PM
60 rbe = rb_entry(parent, struct nft_rbtree_elem, node);
61
e701001e
PNA
62 this = nft_set_ext_key(&rbe->ext);
63 d = memcmp(this, key, set->klen);
20a69341 64 if (d < 0) {
9b7e26ae 65 parent = rcu_dereference_raw(parent->rb_left);
f9121355
PNA
66 if (interval &&
67 nft_rbtree_equal(set, this, interval) &&
68 nft_rbtree_interval_end(this) &&
69 !nft_rbtree_interval_end(interval))
e701001e 70 continue;
20a69341
PM
71 interval = rbe;
72 } else if (d > 0)
9b7e26ae 73 parent = rcu_dereference_raw(parent->rb_right);
20a69341 74 else {
cc02e457 75 if (!nft_set_elem_active(&rbe->ext, genmask)) {
9b7e26ae 76 parent = rcu_dereference_raw(parent->rb_left);
cc02e457
PM
77 continue;
78 }
ef1d20e0 79 if (nft_rbtree_interval_end(rbe))
20a69341 80 goto out;
b2832dd6
PM
81
82 *ext = &rbe->ext;
20a69341
PM
83 return true;
84 }
85 }
86
c1eda3c6
PNA
87 if (set->flags & NFT_SET_INTERVAL && interval != NULL &&
88 nft_set_elem_active(&interval->ext, genmask) &&
89 !nft_rbtree_interval_end(interval)) {
c1eda3c6
PNA
90 *ext = &interval->ext;
91 return true;
20a69341
PM
92 }
93out:
94 return false;
95}
96
9b7e26ae
FW
97static bool nft_rbtree_lookup(const struct net *net, const struct nft_set *set,
98 const u32 *key, const struct nft_set_ext **ext)
99{
100 struct nft_rbtree *priv = nft_set_priv(set);
101 unsigned int seq = read_seqcount_begin(&priv->count);
102 bool ret;
103
104 ret = __nft_rbtree_lookup(net, set, key, ext, seq);
105 if (ret || !read_seqcount_retry(&priv->count, seq))
106 return ret;
107
108 read_lock_bh(&priv->lock);
109 seq = read_seqcount_begin(&priv->count);
110 ret = __nft_rbtree_lookup(net, set, key, ext, seq);
111 read_unlock_bh(&priv->lock);
112
113 return ret;
114}
115
ba0e4d99
PNA
116static bool __nft_rbtree_get(const struct net *net, const struct nft_set *set,
117 const u32 *key, struct nft_rbtree_elem **elem,
118 unsigned int seq, unsigned int flags, u8 genmask)
119{
120 struct nft_rbtree_elem *rbe, *interval = NULL;
121 struct nft_rbtree *priv = nft_set_priv(set);
122 const struct rb_node *parent;
123 const void *this;
124 int d;
125
126 parent = rcu_dereference_raw(priv->root.rb_node);
127 while (parent != NULL) {
128 if (read_seqcount_retry(&priv->count, seq))
129 return false;
130
131 rbe = rb_entry(parent, struct nft_rbtree_elem, node);
132
133 this = nft_set_ext_key(&rbe->ext);
134 d = memcmp(this, key, set->klen);
135 if (d < 0) {
136 parent = rcu_dereference_raw(parent->rb_left);
137 interval = rbe;
138 } else if (d > 0) {
139 parent = rcu_dereference_raw(parent->rb_right);
140 } else {
141 if (!nft_set_elem_active(&rbe->ext, genmask))
142 parent = rcu_dereference_raw(parent->rb_left);
143
144 if (!nft_set_ext_exists(&rbe->ext, NFT_SET_EXT_FLAGS) ||
145 (*nft_set_ext_flags(&rbe->ext) & NFT_SET_ELEM_INTERVAL_END) ==
146 (flags & NFT_SET_ELEM_INTERVAL_END)) {
147 *elem = rbe;
148 return true;
149 }
150 return false;
151 }
152 }
153
154 if (set->flags & NFT_SET_INTERVAL && interval != NULL &&
155 nft_set_elem_active(&interval->ext, genmask) &&
156 !nft_rbtree_interval_end(interval)) {
157 *elem = interval;
158 return true;
159 }
160
161 return false;
162}
163
164static void *nft_rbtree_get(const struct net *net, const struct nft_set *set,
165 const struct nft_set_elem *elem, unsigned int flags)
166{
167 struct nft_rbtree *priv = nft_set_priv(set);
168 unsigned int seq = read_seqcount_begin(&priv->count);
169 struct nft_rbtree_elem *rbe = ERR_PTR(-ENOENT);
170 const u32 *key = (const u32 *)&elem->key.val;
171 u8 genmask = nft_genmask_cur(net);
172 bool ret;
173
174 ret = __nft_rbtree_get(net, set, key, &rbe, seq, flags, genmask);
175 if (ret || !read_seqcount_retry(&priv->count, seq))
176 return rbe;
177
178 read_lock_bh(&priv->lock);
179 seq = read_seqcount_begin(&priv->count);
180 ret = __nft_rbtree_get(net, set, key, &rbe, seq, flags, genmask);
181 if (!ret)
182 rbe = ERR_PTR(-ENOENT);
183 read_unlock_bh(&priv->lock);
184
185 return rbe;
186}
187
42a55769 188static int __nft_rbtree_insert(const struct net *net, const struct nft_set *set,
c016c7e4
PNA
189 struct nft_rbtree_elem *new,
190 struct nft_set_ext **ext)
20a69341
PM
191{
192 struct nft_rbtree *priv = nft_set_priv(set);
42a55769 193 u8 genmask = nft_genmask_next(net);
20a69341
PM
194 struct nft_rbtree_elem *rbe;
195 struct rb_node *parent, **p;
196 int d;
197
198 parent = NULL;
199 p = &priv->root.rb_node;
200 while (*p != NULL) {
201 parent = *p;
202 rbe = rb_entry(parent, struct nft_rbtree_elem, node);
e562d860
PM
203 d = memcmp(nft_set_ext_key(&rbe->ext),
204 nft_set_ext_key(&new->ext),
205 set->klen);
20a69341
PM
206 if (d < 0)
207 p = &parent->rb_left;
208 else if (d > 0)
209 p = &parent->rb_right;
cc02e457 210 else {
d2df92e9
PNA
211 if (nft_rbtree_interval_end(rbe) &&
212 !nft_rbtree_interval_end(new)) {
213 p = &parent->rb_left;
214 } else if (!nft_rbtree_interval_end(rbe) &&
215 nft_rbtree_interval_end(new)) {
216 p = &parent->rb_right;
217 } else if (nft_set_elem_active(&rbe->ext, genmask)) {
218 *ext = &rbe->ext;
219 return -EEXIST;
220 } else {
221 p = &parent->rb_left;
e701001e 222 }
cc02e457 223 }
20a69341 224 }
9b7e26ae 225 rb_link_node_rcu(&new->node, parent, p);
20a69341
PM
226 rb_insert_color(&new->node, &priv->root);
227 return 0;
228}
229
42a55769 230static int nft_rbtree_insert(const struct net *net, const struct nft_set *set,
c016c7e4
PNA
231 const struct nft_set_elem *elem,
232 struct nft_set_ext **ext)
20a69341 233{
03e5fd0e 234 struct nft_rbtree *priv = nft_set_priv(set);
fe2811eb 235 struct nft_rbtree_elem *rbe = elem->priv;
20a69341
PM
236 int err;
237
03e5fd0e 238 write_lock_bh(&priv->lock);
9b7e26ae 239 write_seqcount_begin(&priv->count);
c016c7e4 240 err = __nft_rbtree_insert(net, set, rbe, ext);
9b7e26ae 241 write_seqcount_end(&priv->count);
03e5fd0e 242 write_unlock_bh(&priv->lock);
fe2811eb 243
20a69341
PM
244 return err;
245}
246
5cb82a38
PNA
247static void nft_rbtree_remove(const struct net *net,
248 const struct nft_set *set,
20a69341
PM
249 const struct nft_set_elem *elem)
250{
251 struct nft_rbtree *priv = nft_set_priv(set);
cc02e457 252 struct nft_rbtree_elem *rbe = elem->priv;
20a69341 253
03e5fd0e 254 write_lock_bh(&priv->lock);
9b7e26ae 255 write_seqcount_begin(&priv->count);
20a69341 256 rb_erase(&rbe->node, &priv->root);
9b7e26ae 257 write_seqcount_end(&priv->count);
03e5fd0e 258 write_unlock_bh(&priv->lock);
20a69341
PM
259}
260
42a55769
PNA
261static void nft_rbtree_activate(const struct net *net,
262 const struct nft_set *set,
cc02e457
PM
263 const struct nft_set_elem *elem)
264{
265 struct nft_rbtree_elem *rbe = elem->priv;
266
42a55769 267 nft_set_elem_change_active(net, set, &rbe->ext);
cc02e457
PM
268}
269
1ba1c414
PNA
270static bool nft_rbtree_flush(const struct net *net,
271 const struct nft_set *set, void *priv)
37df5301
PNA
272{
273 struct nft_rbtree_elem *rbe = priv;
274
275 nft_set_elem_change_active(net, set, &rbe->ext);
276 return true;
277}
278
42a55769
PNA
279static void *nft_rbtree_deactivate(const struct net *net,
280 const struct nft_set *set,
cc02e457 281 const struct nft_set_elem *elem)
20a69341
PM
282{
283 const struct nft_rbtree *priv = nft_set_priv(set);
284 const struct rb_node *parent = priv->root.rb_node;
e701001e 285 struct nft_rbtree_elem *rbe, *this = elem->priv;
42a55769 286 u8 genmask = nft_genmask_next(net);
20a69341
PM
287 int d;
288
289 while (parent != NULL) {
290 rbe = rb_entry(parent, struct nft_rbtree_elem, node);
291
7d740264
PM
292 d = memcmp(nft_set_ext_key(&rbe->ext), &elem->key.val,
293 set->klen);
20a69341
PM
294 if (d < 0)
295 parent = parent->rb_left;
296 else if (d > 0)
297 parent = parent->rb_right;
298 else {
cc02e457
PM
299 if (!nft_set_elem_active(&rbe->ext, genmask)) {
300 parent = parent->rb_left;
301 continue;
302 }
e701001e
PNA
303 if (nft_rbtree_interval_end(rbe) &&
304 !nft_rbtree_interval_end(this)) {
305 parent = parent->rb_left;
306 continue;
307 } else if (!nft_rbtree_interval_end(rbe) &&
308 nft_rbtree_interval_end(this)) {
309 parent = parent->rb_right;
310 continue;
311 }
1ba1c414 312 nft_rbtree_flush(net, set, rbe);
cc02e457 313 return rbe;
20a69341
PM
314 }
315 }
cc02e457 316 return NULL;
20a69341
PM
317}
318
319static void nft_rbtree_walk(const struct nft_ctx *ctx,
de70185d 320 struct nft_set *set,
20a69341
PM
321 struct nft_set_iter *iter)
322{
03e5fd0e 323 struct nft_rbtree *priv = nft_set_priv(set);
fe2811eb 324 struct nft_rbtree_elem *rbe;
20a69341
PM
325 struct nft_set_elem elem;
326 struct rb_node *node;
327
03e5fd0e 328 read_lock_bh(&priv->lock);
20a69341 329 for (node = rb_first(&priv->root); node != NULL; node = rb_next(node)) {
cc02e457
PM
330 rbe = rb_entry(node, struct nft_rbtree_elem, node);
331
20a69341
PM
332 if (iter->count < iter->skip)
333 goto cont;
8588ac09 334 if (!nft_set_elem_active(&rbe->ext, iter->genmask))
cc02e457 335 goto cont;
20a69341 336
fe2811eb 337 elem.priv = rbe;
20a69341
PM
338
339 iter->err = iter->fn(ctx, set, iter, &elem);
7632667d 340 if (iter->err < 0) {
03e5fd0e 341 read_unlock_bh(&priv->lock);
20a69341 342 return;
7632667d 343 }
20a69341
PM
344cont:
345 iter->count++;
346 }
03e5fd0e 347 read_unlock_bh(&priv->lock);
20a69341
PM
348}
349
347b408d
PNA
350static unsigned int nft_rbtree_privsize(const struct nlattr * const nla[],
351 const struct nft_set_desc *desc)
20a69341
PM
352{
353 return sizeof(struct nft_rbtree);
354}
355
356static int nft_rbtree_init(const struct nft_set *set,
c50b960c 357 const struct nft_set_desc *desc,
20a69341
PM
358 const struct nlattr * const nla[])
359{
360 struct nft_rbtree *priv = nft_set_priv(set);
361
03e5fd0e 362 rwlock_init(&priv->lock);
9b7e26ae 363 seqcount_init(&priv->count);
20a69341
PM
364 priv->root = RB_ROOT;
365 return 0;
366}
367
368static void nft_rbtree_destroy(const struct nft_set *set)
369{
370 struct nft_rbtree *priv = nft_set_priv(set);
371 struct nft_rbtree_elem *rbe;
372 struct rb_node *node;
373
374 while ((node = priv->root.rb_node) != NULL) {
375 rb_erase(node, &priv->root);
376 rbe = rb_entry(node, struct nft_rbtree_elem, node);
61f9e292 377 nft_set_elem_destroy(set, rbe, true);
20a69341
PM
378 }
379}
380
c50b960c
PM
381static bool nft_rbtree_estimate(const struct nft_set_desc *desc, u32 features,
382 struct nft_set_estimate *est)
383{
c50b960c 384 if (desc->size)
080ed636
PNA
385 est->size = sizeof(struct nft_rbtree) +
386 desc->size * sizeof(struct nft_rbtree_elem);
c50b960c 387 else
080ed636 388 est->size = ~0;
c50b960c 389
55af753c 390 est->lookup = NFT_SET_CLASS_O_LOG_N;
0b5a7874 391 est->space = NFT_SET_CLASS_O_N;
c50b960c
PM
392
393 return true;
394}
395
2b664957 396static struct nft_set_type nft_rbtree_type;
20a69341 397static struct nft_set_ops nft_rbtree_ops __read_mostly = {
2b664957 398 .type = &nft_rbtree_type,
20a69341 399 .privsize = nft_rbtree_privsize,
fe2811eb 400 .elemsize = offsetof(struct nft_rbtree_elem, ext),
c50b960c 401 .estimate = nft_rbtree_estimate,
20a69341
PM
402 .init = nft_rbtree_init,
403 .destroy = nft_rbtree_destroy,
404 .insert = nft_rbtree_insert,
405 .remove = nft_rbtree_remove,
cc02e457 406 .deactivate = nft_rbtree_deactivate,
1ba1c414 407 .flush = nft_rbtree_flush,
cc02e457 408 .activate = nft_rbtree_activate,
20a69341
PM
409 .lookup = nft_rbtree_lookup,
410 .walk = nft_rbtree_walk,
ba0e4d99 411 .get = nft_rbtree_get,
7286ff7f 412 .features = NFT_SET_INTERVAL | NFT_SET_MAP | NFT_SET_OBJECT,
2b664957
PNA
413};
414
415static struct nft_set_type nft_rbtree_type __read_mostly = {
416 .ops = &nft_rbtree_ops,
20a69341
PM
417 .owner = THIS_MODULE,
418};
419
420static int __init nft_rbtree_module_init(void)
421{
2b664957 422 return nft_register_set(&nft_rbtree_type);
20a69341
PM
423}
424
425static void __exit nft_rbtree_module_exit(void)
426{
2b664957 427 nft_unregister_set(&nft_rbtree_type);
20a69341
PM
428}
429
430module_init(nft_rbtree_module_init);
431module_exit(nft_rbtree_module_exit);
432
433MODULE_LICENSE("GPL");
434MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
435MODULE_ALIAS_NFT_SET();