]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/sched/cls_fw.c
UBUNTU: SAUCE: hio: Fix incorrect use of enum req_opf values
[mirror_ubuntu-zesty-kernel.git] / net / sched / cls_fw.c
CommitLineData
1da177e4
LT
1/*
2 * net/sched/cls_fw.c Classifier mapping ipchains' fwmark to traffic class.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 * Changes:
12 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_walk off by one
13 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_delete killed all the filter (and kernel).
14 * Alex <alex@pilotsoft.com> : 2004xxyy: Added Action extension
15 *
16 * JHS: We should remove the CONFIG_NET_CLS_IND from here
17 * eventually when the meta match extension is made available
18 *
19 */
20
1da177e4 21#include <linux/module.h>
5a0e3ad6 22#include <linux/slab.h>
1da177e4
LT
23#include <linux/types.h>
24#include <linux/kernel.h>
1da177e4 25#include <linux/string.h>
1da177e4 26#include <linux/errno.h>
1da177e4 27#include <linux/skbuff.h>
0ba48053 28#include <net/netlink.h>
1da177e4
LT
29#include <net/act_api.h>
30#include <net/pkt_cls.h>
31
d37d8ac1 32#define HTSIZE 256
c5c13faf 33
cc7ec456 34struct fw_head {
d37d8ac1 35 u32 mask;
e35a8ee5
JF
36 struct fw_filter __rcu *ht[HTSIZE];
37 struct rcu_head rcu;
1da177e4
LT
38};
39
cc7ec456 40struct fw_filter {
e35a8ee5 41 struct fw_filter __rcu *next;
1da177e4
LT
42 u32 id;
43 struct tcf_result res;
44#ifdef CONFIG_NET_CLS_IND
2519a602 45 int ifindex;
1da177e4
LT
46#endif /* CONFIG_NET_CLS_IND */
47 struct tcf_exts exts;
e35a8ee5
JF
48 struct tcf_proto *tp;
49 struct rcu_head rcu;
1da177e4
LT
50};
51
d37d8ac1 52static u32 fw_hash(u32 handle)
1da177e4 53{
d37d8ac1
ED
54 handle ^= (handle >> 16);
55 handle ^= (handle >> 8);
56 return handle % HTSIZE;
1da177e4
LT
57}
58
dc7f9f6e 59static int fw_classify(struct sk_buff *skb, const struct tcf_proto *tp,
5a7a5555 60 struct tcf_result *res)
1da177e4 61{
e35a8ee5 62 struct fw_head *head = rcu_dereference_bh(tp->root);
1da177e4
LT
63 struct fw_filter *f;
64 int r;
5c804bfd 65 u32 id = skb->mark;
1da177e4
LT
66
67 if (head != NULL) {
5c804bfd 68 id &= head->mask;
e35a8ee5
JF
69
70 for (f = rcu_dereference_bh(head->ht[fw_hash(id)]); f;
71 f = rcu_dereference_bh(f->next)) {
1da177e4
LT
72 if (f->id == id) {
73 *res = f->res;
74#ifdef CONFIG_NET_CLS_IND
2519a602 75 if (!tcf_match_indev(skb, f->ifindex))
1da177e4
LT
76 continue;
77#endif /* CONFIG_NET_CLS_IND */
78 r = tcf_exts_exec(skb, &f->exts, res);
79 if (r < 0)
80 continue;
81
82 return r;
83 }
84 }
85 } else {
d8aecb10 86 /* Old method: classify the packet using its skb mark. */
cc7ec456
ED
87 if (id && (TC_H_MAJ(id) == 0 ||
88 !(TC_H_MAJ(id ^ tp->q->handle)))) {
1da177e4
LT
89 res->classid = id;
90 res->class = 0;
91 return 0;
92 }
93 }
94
95 return -1;
96}
97
98static unsigned long fw_get(struct tcf_proto *tp, u32 handle)
99{
e35a8ee5 100 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
101 struct fw_filter *f;
102
103 if (head == NULL)
104 return 0;
105
e35a8ee5
JF
106 f = rtnl_dereference(head->ht[fw_hash(handle)]);
107 for (; f; f = rtnl_dereference(f->next)) {
1da177e4
LT
108 if (f->id == handle)
109 return (unsigned long)f;
110 }
111 return 0;
112}
113
1da177e4
LT
114static int fw_init(struct tcf_proto *tp)
115{
d8aecb10
WC
116 /* We don't allocate fw_head here, because in the old method
117 * we don't need it at all.
118 */
1da177e4
LT
119 return 0;
120}
121
e35a8ee5 122static void fw_delete_filter(struct rcu_head *head)
1da177e4 123{
e35a8ee5 124 struct fw_filter *f = container_of(head, struct fw_filter, rcu);
e35a8ee5 125
18d0264f 126 tcf_exts_destroy(&f->exts);
1da177e4
LT
127 kfree(f);
128}
129
1e052be6 130static bool fw_destroy(struct tcf_proto *tp, bool force)
1da177e4 131{
e35a8ee5 132 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
133 struct fw_filter *f;
134 int h;
135
136 if (head == NULL)
1e052be6
CW
137 return true;
138
139 if (!force) {
140 for (h = 0; h < HTSIZE; h++)
141 if (rcu_access_pointer(head->ht[h]))
142 return false;
143 }
1da177e4 144
cc7ec456 145 for (h = 0; h < HTSIZE; h++) {
e35a8ee5
JF
146 while ((f = rtnl_dereference(head->ht[h])) != NULL) {
147 RCU_INIT_POINTER(head->ht[h],
148 rtnl_dereference(f->next));
18cdb37e 149 tcf_unbind_filter(tp, &f->res);
e35a8ee5 150 call_rcu(&f->rcu, fw_delete_filter);
1da177e4
LT
151 }
152 }
e35a8ee5
JF
153 RCU_INIT_POINTER(tp->root, NULL);
154 kfree_rcu(head, rcu);
1e052be6 155 return true;
1da177e4
LT
156}
157
158static int fw_delete(struct tcf_proto *tp, unsigned long arg)
159{
e35a8ee5 160 struct fw_head *head = rtnl_dereference(tp->root);
cc7ec456 161 struct fw_filter *f = (struct fw_filter *)arg;
e35a8ee5
JF
162 struct fw_filter __rcu **fp;
163 struct fw_filter *pfp;
1da177e4
LT
164
165 if (head == NULL || f == NULL)
166 goto out;
167
e35a8ee5
JF
168 fp = &head->ht[fw_hash(f->id)];
169
170 for (pfp = rtnl_dereference(*fp); pfp;
171 fp = &pfp->next, pfp = rtnl_dereference(*fp)) {
172 if (pfp == f) {
173 RCU_INIT_POINTER(*fp, rtnl_dereference(f->next));
18cdb37e 174 tcf_unbind_filter(tp, &f->res);
e35a8ee5 175 call_rcu(&f->rcu, fw_delete_filter);
1da177e4
LT
176 return 0;
177 }
178 }
179out:
180 return -EINVAL;
181}
182
6fa8c014
PM
183static const struct nla_policy fw_policy[TCA_FW_MAX + 1] = {
184 [TCA_FW_CLASSID] = { .type = NLA_U32 },
185 [TCA_FW_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ },
186 [TCA_FW_MASK] = { .type = NLA_U32 },
187};
188
1da177e4 189static int
c1b52739 190fw_change_attrs(struct net *net, struct tcf_proto *tp, struct fw_filter *f,
5a7a5555
JHS
191 struct nlattr **tb, struct nlattr **tca, unsigned long base,
192 bool ovr)
1da177e4 193{
e35a8ee5 194 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4 195 struct tcf_exts e;
b4e9b520 196 u32 mask;
1da177e4
LT
197 int err;
198
b9a24bb7 199 err = tcf_exts_init(&e, TCA_FW_ACT, TCA_FW_POLICE);
1da177e4
LT
200 if (err < 0)
201 return err;
b9a24bb7
WC
202 err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
203 if (err < 0)
204 goto errout;
1da177e4 205
add93b61 206 if (tb[TCA_FW_CLASSID]) {
1587bac4 207 f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
1da177e4
LT
208 tcf_bind_filter(tp, &f->res, base);
209 }
210
211#ifdef CONFIG_NET_CLS_IND
add93b61 212 if (tb[TCA_FW_INDEV]) {
2519a602
WC
213 int ret;
214 ret = tcf_change_indev(net, tb[TCA_FW_INDEV]);
722e47d7
WY
215 if (ret < 0) {
216 err = ret;
1da177e4 217 goto errout;
722e47d7 218 }
2519a602 219 f->ifindex = ret;
1da177e4
LT
220 }
221#endif /* CONFIG_NET_CLS_IND */
222
cb95ec62 223 err = -EINVAL;
add93b61 224 if (tb[TCA_FW_MASK]) {
1587bac4 225 mask = nla_get_u32(tb[TCA_FW_MASK]);
b4e9b520
PM
226 if (mask != head->mask)
227 goto errout;
228 } else if (head->mask != 0xFFFFFFFF)
229 goto errout;
230
1da177e4
LT
231 tcf_exts_change(tp, &f->exts, &e);
232
233 return 0;
234errout:
18d0264f 235 tcf_exts_destroy(&e);
1da177e4
LT
236 return err;
237}
238
c1b52739 239static int fw_change(struct net *net, struct sk_buff *in_skb,
af4c6641 240 struct tcf_proto *tp, unsigned long base,
5a7a5555
JHS
241 u32 handle, struct nlattr **tca, unsigned long *arg,
242 bool ovr)
1da177e4 243{
e35a8ee5 244 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4 245 struct fw_filter *f = (struct fw_filter *) *arg;
add93b61
PM
246 struct nlattr *opt = tca[TCA_OPTIONS];
247 struct nlattr *tb[TCA_FW_MAX + 1];
1da177e4
LT
248 int err;
249
250 if (!opt)
d8aecb10 251 return handle ? -EINVAL : 0; /* Succeed if it is old method. */
1da177e4 252
6fa8c014 253 err = nla_parse_nested(tb, TCA_FW_MAX, opt, fw_policy);
cee63723
PM
254 if (err < 0)
255 return err;
1da177e4 256
e35a8ee5
JF
257 if (f) {
258 struct fw_filter *pfp, *fnew;
259 struct fw_filter __rcu **fp;
260
1da177e4
LT
261 if (f->id != handle && handle)
262 return -EINVAL;
e35a8ee5
JF
263
264 fnew = kzalloc(sizeof(struct fw_filter), GFP_KERNEL);
265 if (!fnew)
266 return -ENOBUFS;
267
268 fnew->id = f->id;
269 fnew->res = f->res;
270#ifdef CONFIG_NET_CLS_IND
271 fnew->ifindex = f->ifindex;
272#endif /* CONFIG_NET_CLS_IND */
273 fnew->tp = f->tp;
274
b9a24bb7
WC
275 err = tcf_exts_init(&fnew->exts, TCA_FW_ACT, TCA_FW_POLICE);
276 if (err < 0) {
277 kfree(fnew);
278 return err;
279 }
e1f93eb0 280
e35a8ee5
JF
281 err = fw_change_attrs(net, tp, fnew, tb, tca, base, ovr);
282 if (err < 0) {
b9a24bb7 283 tcf_exts_destroy(&fnew->exts);
e35a8ee5
JF
284 kfree(fnew);
285 return err;
286 }
287
288 fp = &head->ht[fw_hash(fnew->id)];
289 for (pfp = rtnl_dereference(*fp); pfp;
290 fp = &pfp->next, pfp = rtnl_dereference(*fp))
291 if (pfp == f)
292 break;
293
294 RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
295 rcu_assign_pointer(*fp, fnew);
18cdb37e 296 tcf_unbind_filter(tp, &f->res);
e35a8ee5
JF
297 call_rcu(&f->rcu, fw_delete_filter);
298
299 *arg = (unsigned long)fnew;
300 return err;
1da177e4
LT
301 }
302
303 if (!handle)
304 return -EINVAL;
305
d8aecb10
WC
306 if (!head) {
307 u32 mask = 0xFFFFFFFF;
6fa8c014 308 if (tb[TCA_FW_MASK])
d8aecb10
WC
309 mask = nla_get_u32(tb[TCA_FW_MASK]);
310
311 head = kzalloc(sizeof(*head), GFP_KERNEL);
312 if (!head)
313 return -ENOBUFS;
314 head->mask = mask;
315
316 rcu_assign_pointer(tp->root, head);
1da177e4
LT
317 }
318
0da974f4 319 f = kzalloc(sizeof(struct fw_filter), GFP_KERNEL);
1da177e4
LT
320 if (f == NULL)
321 return -ENOBUFS;
1da177e4 322
b9a24bb7
WC
323 err = tcf_exts_init(&f->exts, TCA_FW_ACT, TCA_FW_POLICE);
324 if (err < 0)
325 goto errout;
1da177e4 326 f->id = handle;
e35a8ee5 327 f->tp = tp;
1da177e4 328
2f7ef2f8 329 err = fw_change_attrs(net, tp, f, tb, tca, base, ovr);
1da177e4
LT
330 if (err < 0)
331 goto errout;
332
e35a8ee5
JF
333 RCU_INIT_POINTER(f->next, head->ht[fw_hash(handle)]);
334 rcu_assign_pointer(head->ht[fw_hash(handle)], f);
1da177e4
LT
335
336 *arg = (unsigned long)f;
337 return 0;
338
339errout:
b9a24bb7 340 tcf_exts_destroy(&f->exts);
a51482bd 341 kfree(f);
1da177e4
LT
342 return err;
343}
344
345static void fw_walk(struct tcf_proto *tp, struct tcf_walker *arg)
346{
e35a8ee5 347 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
348 int h;
349
350 if (head == NULL)
351 arg->stop = 1;
352
353 if (arg->stop)
354 return;
355
c5c13faf 356 for (h = 0; h < HTSIZE; h++) {
1da177e4
LT
357 struct fw_filter *f;
358
e35a8ee5
JF
359 for (f = rtnl_dereference(head->ht[h]); f;
360 f = rtnl_dereference(f->next)) {
1da177e4
LT
361 if (arg->count < arg->skip) {
362 arg->count++;
363 continue;
364 }
365 if (arg->fn(tp, (unsigned long)f, arg) < 0) {
366 arg->stop = 1;
367 return;
368 }
369 arg->count++;
370 }
371 }
372}
373
832d1d5b 374static int fw_dump(struct net *net, struct tcf_proto *tp, unsigned long fh,
1da177e4
LT
375 struct sk_buff *skb, struct tcmsg *t)
376{
e35a8ee5 377 struct fw_head *head = rtnl_dereference(tp->root);
cc7ec456 378 struct fw_filter *f = (struct fw_filter *)fh;
4b3550ef 379 struct nlattr *nest;
1da177e4
LT
380
381 if (f == NULL)
382 return skb->len;
383
384 t->tcm_handle = f->id;
385
386 if (!f->res.classid && !tcf_exts_is_available(&f->exts))
387 return skb->len;
388
4b3550ef
PM
389 nest = nla_nest_start(skb, TCA_OPTIONS);
390 if (nest == NULL)
391 goto nla_put_failure;
1da177e4 392
1b34ec43
DM
393 if (f->res.classid &&
394 nla_put_u32(skb, TCA_FW_CLASSID, f->res.classid))
395 goto nla_put_failure;
1da177e4 396#ifdef CONFIG_NET_CLS_IND
2519a602
WC
397 if (f->ifindex) {
398 struct net_device *dev;
399 dev = __dev_get_by_index(net, f->ifindex);
400 if (dev && nla_put_string(skb, TCA_FW_INDEV, dev->name))
401 goto nla_put_failure;
402 }
1da177e4 403#endif /* CONFIG_NET_CLS_IND */
1b34ec43
DM
404 if (head->mask != 0xFFFFFFFF &&
405 nla_put_u32(skb, TCA_FW_MASK, head->mask))
406 goto nla_put_failure;
1da177e4 407
5da57f42 408 if (tcf_exts_dump(skb, &f->exts) < 0)
add93b61 409 goto nla_put_failure;
1da177e4 410
4b3550ef 411 nla_nest_end(skb, nest);
1da177e4 412
5da57f42 413 if (tcf_exts_dump_stats(skb, &f->exts) < 0)
add93b61 414 goto nla_put_failure;
1da177e4
LT
415
416 return skb->len;
417
add93b61 418nla_put_failure:
6ea3b446 419 nla_nest_cancel(skb, nest);
1da177e4
LT
420 return -1;
421}
422
2eb9d75c 423static struct tcf_proto_ops cls_fw_ops __read_mostly = {
1da177e4
LT
424 .kind = "fw",
425 .classify = fw_classify,
426 .init = fw_init,
427 .destroy = fw_destroy,
428 .get = fw_get,
1da177e4
LT
429 .change = fw_change,
430 .delete = fw_delete,
431 .walk = fw_walk,
432 .dump = fw_dump,
433 .owner = THIS_MODULE,
434};
435
436static int __init init_fw(void)
437{
438 return register_tcf_proto_ops(&cls_fw_ops);
439}
440
10297b99 441static void __exit exit_fw(void)
1da177e4
LT
442{
443 unregister_tcf_proto_ops(&cls_fw_ops);
444}
445
446module_init(init_fw)
447module_exit(exit_fw)
448MODULE_LICENSE("GPL");