]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - net/sched/cls_u32.c
net_sched: switch to rcu_work
[mirror_ubuntu-hirsute-kernel.git] / net / sched / cls_u32.c
CommitLineData
1da177e4
LT
1/*
2 * net/sched/cls_u32.c Ugly (or Universal) 32bit key Packet Classifier.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 * The filters are packed to hash tables of key nodes
12 * with a set of 32bit key/mask pairs at every node.
13 * Nodes reference next level hash tables etc.
14 *
15 * This scheme is the best universal classifier I managed to
16 * invent; it is not super-fast, but it is not slow (provided you
17 * program it correctly), and general enough. And its relative
18 * speed grows as the number of rules becomes larger.
19 *
20 * It seems that it represents the best middle point between
21 * speed and manageability both by human and by machine.
22 *
23 * It is especially useful for link sharing combined with QoS;
24 * pure RSVP doesn't need such a general approach and can use
25 * much simpler (and faster) schemes, sort of cls_rsvp.c.
26 *
27 * JHS: We should remove the CONFIG_NET_CLS_IND from here
28 * eventually when the meta match extension is made available
29 *
30 * nfmark match added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro>
31 */
32
1da177e4 33#include <linux/module.h>
5a0e3ad6 34#include <linux/slab.h>
1da177e4
LT
35#include <linux/types.h>
36#include <linux/kernel.h>
1da177e4 37#include <linux/string.h>
1da177e4 38#include <linux/errno.h>
1ce87720 39#include <linux/percpu.h>
1da177e4 40#include <linux/rtnetlink.h>
1da177e4 41#include <linux/skbuff.h>
7801db8a 42#include <linux/bitmap.h>
3cd904ec
WC
43#include <linux/netdevice.h>
44#include <linux/hash.h>
0ba48053 45#include <net/netlink.h>
1da177e4
LT
46#include <net/act_api.h>
47#include <net/pkt_cls.h>
e7614370 48#include <linux/idr.h>
1da177e4 49
cc7ec456 50struct tc_u_knode {
1ce87720 51 struct tc_u_knode __rcu *next;
1da177e4 52 u32 handle;
1ce87720 53 struct tc_u_hnode __rcu *ht_up;
1da177e4
LT
54 struct tcf_exts exts;
55#ifdef CONFIG_NET_CLS_IND
2519a602 56 int ifindex;
1da177e4
LT
57#endif
58 u8 fshift;
59 struct tcf_result res;
1ce87720 60 struct tc_u_hnode __rcu *ht_down;
1da177e4 61#ifdef CONFIG_CLS_U32_PERF
459d5f62 62 struct tc_u32_pcnt __percpu *pf;
1da177e4 63#endif
9e8ce79c 64 u32 flags;
1da177e4 65#ifdef CONFIG_CLS_U32_MARK
459d5f62
JF
66 u32 val;
67 u32 mask;
68 u32 __percpu *pcpu_success;
1da177e4 69#endif
1ce87720 70 struct tcf_proto *tp;
aaa908ff 71 struct rcu_work rwork;
4e2840ee
JF
72 /* The 'sel' field MUST be the last field in structure to allow for
73 * tc_u32_keys allocated at end of structure.
74 */
75 struct tc_u32_sel sel;
1da177e4
LT
76};
77
cc7ec456 78struct tc_u_hnode {
1ce87720 79 struct tc_u_hnode __rcu *next;
1da177e4
LT
80 u32 handle;
81 u32 prio;
82 struct tc_u_common *tp_c;
83 int refcnt;
cc7ec456 84 unsigned int divisor;
e7614370 85 struct idr handle_idr;
1ce87720 86 struct rcu_head rcu;
f40fe58d 87 u32 flags;
5778d39d
WC
88 /* The 'ht' field MUST be the last field in structure to allow for
89 * more entries allocated at end of structure.
90 */
91 struct tc_u_knode __rcu *ht[1];
1da177e4
LT
92};
93
cc7ec456 94struct tc_u_common {
1ce87720 95 struct tc_u_hnode __rcu *hlist;
339c21d7 96 void *ptr;
1da177e4 97 int refcnt;
e7614370 98 struct idr handle_idr;
3cd904ec 99 struct hlist_node hnode;
1ce87720 100 struct rcu_head rcu;
1da177e4
LT
101};
102
cc7ec456
ED
103static inline unsigned int u32_hash_fold(__be32 key,
104 const struct tc_u32_sel *sel,
105 u8 fshift)
1da177e4 106{
cc7ec456 107 unsigned int h = ntohl(key & sel->hmask) >> fshift;
1da177e4
LT
108
109 return h;
110}
111
5a7a5555
JHS
112static int u32_classify(struct sk_buff *skb, const struct tcf_proto *tp,
113 struct tcf_result *res)
1da177e4
LT
114{
115 struct {
116 struct tc_u_knode *knode;
fbc2e7d9 117 unsigned int off;
1da177e4
LT
118 } stack[TC_U32_MAXDEPTH];
119
1ce87720 120 struct tc_u_hnode *ht = rcu_dereference_bh(tp->root);
fbc2e7d9 121 unsigned int off = skb_network_offset(skb);
1da177e4
LT
122 struct tc_u_knode *n;
123 int sdepth = 0;
124 int off2 = 0;
125 int sel = 0;
126#ifdef CONFIG_CLS_U32_PERF
127 int j;
128#endif
129 int i, r;
130
131next_ht:
1ce87720 132 n = rcu_dereference_bh(ht->ht[sel]);
1da177e4
LT
133
134next_knode:
135 if (n) {
136 struct tc_u32_key *key = n->sel.keys;
137
138#ifdef CONFIG_CLS_U32_PERF
459d5f62 139 __this_cpu_inc(n->pf->rcnt);
1da177e4
LT
140 j = 0;
141#endif
142
d34e3e18
SS
143 if (tc_skip_sw(n->flags)) {
144 n = rcu_dereference_bh(n->next);
145 goto next_knode;
146 }
147
1da177e4 148#ifdef CONFIG_CLS_U32_MARK
459d5f62 149 if ((skb->mark & n->mask) != n->val) {
1ce87720 150 n = rcu_dereference_bh(n->next);
1da177e4
LT
151 goto next_knode;
152 } else {
459d5f62 153 __this_cpu_inc(*n->pcpu_success);
1da177e4
LT
154 }
155#endif
156
cc7ec456 157 for (i = n->sel.nkeys; i > 0; i--, key++) {
66d50d25 158 int toff = off + key->off + (off2 & key->offmask);
86fce3ba 159 __be32 *data, hdata;
fbc2e7d9 160
4e18b3ed 161 if (skb_headroom(skb) + toff > INT_MAX)
66d50d25 162 goto out;
163
86fce3ba 164 data = skb_header_pointer(skb, toff, 4, &hdata);
fbc2e7d9
CG
165 if (!data)
166 goto out;
167 if ((*data ^ key->val) & key->mask) {
1ce87720 168 n = rcu_dereference_bh(n->next);
1da177e4
LT
169 goto next_knode;
170 }
171#ifdef CONFIG_CLS_U32_PERF
459d5f62 172 __this_cpu_inc(n->pf->kcnts[j]);
1da177e4
LT
173 j++;
174#endif
175 }
1ce87720
JF
176
177 ht = rcu_dereference_bh(n->ht_down);
178 if (!ht) {
1da177e4 179check_terminal:
cc7ec456 180 if (n->sel.flags & TC_U32_TERMINAL) {
1da177e4
LT
181
182 *res = n->res;
183#ifdef CONFIG_NET_CLS_IND
2519a602 184 if (!tcf_match_indev(skb, n->ifindex)) {
1ce87720 185 n = rcu_dereference_bh(n->next);
1da177e4
LT
186 goto next_knode;
187 }
188#endif
189#ifdef CONFIG_CLS_U32_PERF
459d5f62 190 __this_cpu_inc(n->pf->rhit);
1da177e4
LT
191#endif
192 r = tcf_exts_exec(skb, &n->exts, res);
193 if (r < 0) {
1ce87720 194 n = rcu_dereference_bh(n->next);
1da177e4
LT
195 goto next_knode;
196 }
197
198 return r;
199 }
1ce87720 200 n = rcu_dereference_bh(n->next);
1da177e4
LT
201 goto next_knode;
202 }
203
204 /* PUSH */
205 if (sdepth >= TC_U32_MAXDEPTH)
206 goto deadloop;
207 stack[sdepth].knode = n;
fbc2e7d9 208 stack[sdepth].off = off;
1da177e4
LT
209 sdepth++;
210
1ce87720 211 ht = rcu_dereference_bh(n->ht_down);
1da177e4 212 sel = 0;
fbc2e7d9 213 if (ht->divisor) {
86fce3ba 214 __be32 *data, hdata;
fbc2e7d9
CG
215
216 data = skb_header_pointer(skb, off + n->sel.hoff, 4,
86fce3ba 217 &hdata);
fbc2e7d9
CG
218 if (!data)
219 goto out;
220 sel = ht->divisor & u32_hash_fold(*data, &n->sel,
221 n->fshift);
222 }
cc7ec456 223 if (!(n->sel.flags & (TC_U32_VAROFFSET | TC_U32_OFFSET | TC_U32_EAT)))
1da177e4
LT
224 goto next_ht;
225
cc7ec456 226 if (n->sel.flags & (TC_U32_OFFSET | TC_U32_VAROFFSET)) {
1da177e4 227 off2 = n->sel.off + 3;
fbc2e7d9 228 if (n->sel.flags & TC_U32_VAROFFSET) {
86fce3ba 229 __be16 *data, hdata;
fbc2e7d9
CG
230
231 data = skb_header_pointer(skb,
232 off + n->sel.offoff,
86fce3ba 233 2, &hdata);
fbc2e7d9
CG
234 if (!data)
235 goto out;
236 off2 += ntohs(n->sel.offmask & *data) >>
237 n->sel.offshift;
238 }
1da177e4
LT
239 off2 &= ~3;
240 }
cc7ec456 241 if (n->sel.flags & TC_U32_EAT) {
fbc2e7d9 242 off += off2;
1da177e4
LT
243 off2 = 0;
244 }
245
fbc2e7d9 246 if (off < skb->len)
1da177e4
LT
247 goto next_ht;
248 }
249
250 /* POP */
251 if (sdepth--) {
252 n = stack[sdepth].knode;
1ce87720 253 ht = rcu_dereference_bh(n->ht_up);
fbc2e7d9 254 off = stack[sdepth].off;
1da177e4
LT
255 goto check_terminal;
256 }
fbc2e7d9 257out:
1da177e4
LT
258 return -1;
259
260deadloop:
e87cc472 261 net_warn_ratelimited("cls_u32: dead loop\n");
1da177e4
LT
262 return -1;
263}
264
5a7a5555 265static struct tc_u_hnode *u32_lookup_ht(struct tc_u_common *tp_c, u32 handle)
1da177e4
LT
266{
267 struct tc_u_hnode *ht;
268
1ce87720
JF
269 for (ht = rtnl_dereference(tp_c->hlist);
270 ht;
271 ht = rtnl_dereference(ht->next))
1da177e4
LT
272 if (ht->handle == handle)
273 break;
274
275 return ht;
276}
277
5a7a5555 278static struct tc_u_knode *u32_lookup_key(struct tc_u_hnode *ht, u32 handle)
1da177e4 279{
cc7ec456 280 unsigned int sel;
1da177e4
LT
281 struct tc_u_knode *n = NULL;
282
283 sel = TC_U32_HASH(handle);
284 if (sel > ht->divisor)
285 goto out;
286
1ce87720
JF
287 for (n = rtnl_dereference(ht->ht[sel]);
288 n;
289 n = rtnl_dereference(n->next))
1da177e4
LT
290 if (n->handle == handle)
291 break;
292out:
293 return n;
294}
295
296
8113c095 297static void *u32_get(struct tcf_proto *tp, u32 handle)
1da177e4
LT
298{
299 struct tc_u_hnode *ht;
300 struct tc_u_common *tp_c = tp->data;
301
302 if (TC_U32_HTID(handle) == TC_U32_ROOT)
1ce87720 303 ht = rtnl_dereference(tp->root);
1da177e4
LT
304 else
305 ht = u32_lookup_ht(tp_c, TC_U32_HTID(handle));
306
307 if (!ht)
8113c095 308 return NULL;
1da177e4
LT
309
310 if (TC_U32_KEY(handle) == 0)
8113c095 311 return ht;
1da177e4 312
8113c095 313 return u32_lookup_key(ht, handle);
1da177e4
LT
314}
315
ffdc2d9e 316/* Protected by rtnl lock */
e7614370 317static u32 gen_new_htid(struct tc_u_common *tp_c, struct tc_u_hnode *ptr)
1da177e4 318{
ffdc2d9e
MW
319 int id = idr_alloc_cyclic(&tp_c->handle_idr, ptr, 1, 0x7FF, GFP_KERNEL);
320 if (id < 0)
e7614370 321 return 0;
ffdc2d9e 322 return (id | 0x800U) << 20;
1da177e4
LT
323}
324
3cd904ec
WC
325static struct hlist_head *tc_u_common_hash;
326
327#define U32_HASH_SHIFT 10
328#define U32_HASH_SIZE (1 << U32_HASH_SHIFT)
329
339c21d7
JP
330static void *tc_u_common_ptr(const struct tcf_proto *tp)
331{
332 struct tcf_block *block = tp->chain->block;
333
334 /* The block sharing is currently supported only
335 * for classless qdiscs. In that case we use block
336 * for tc_u_common identification. In case the
337 * block is not shared, block->q is a valid pointer
338 * and we can use that. That works for classful qdiscs.
339 */
340 if (tcf_block_shared(block))
341 return block;
342 else
343 return block->q;
344}
345
3cd904ec
WC
346static unsigned int tc_u_hash(const struct tcf_proto *tp)
347{
339c21d7 348 return hash_ptr(tc_u_common_ptr(tp), U32_HASH_SHIFT);
3cd904ec
WC
349}
350
351static struct tc_u_common *tc_u_common_find(const struct tcf_proto *tp)
352{
353 struct tc_u_common *tc;
354 unsigned int h;
355
356 h = tc_u_hash(tp);
357 hlist_for_each_entry(tc, &tc_u_common_hash[h], hnode) {
339c21d7 358 if (tc->ptr == tc_u_common_ptr(tp))
3cd904ec
WC
359 return tc;
360 }
361 return NULL;
362}
363
1da177e4
LT
364static int u32_init(struct tcf_proto *tp)
365{
366 struct tc_u_hnode *root_ht;
367 struct tc_u_common *tp_c;
3cd904ec 368 unsigned int h;
1da177e4 369
3cd904ec 370 tp_c = tc_u_common_find(tp);
1da177e4 371
0da974f4 372 root_ht = kzalloc(sizeof(*root_ht), GFP_KERNEL);
1da177e4
LT
373 if (root_ht == NULL)
374 return -ENOBUFS;
375
1da177e4 376 root_ht->refcnt++;
e7614370 377 root_ht->handle = tp_c ? gen_new_htid(tp_c, root_ht) : 0x80000000;
1da177e4 378 root_ht->prio = tp->prio;
e7614370 379 idr_init(&root_ht->handle_idr);
1da177e4
LT
380
381 if (tp_c == NULL) {
0da974f4 382 tp_c = kzalloc(sizeof(*tp_c), GFP_KERNEL);
1da177e4
LT
383 if (tp_c == NULL) {
384 kfree(root_ht);
385 return -ENOBUFS;
386 }
339c21d7 387 tp_c->ptr = tc_u_common_ptr(tp);
3cd904ec 388 INIT_HLIST_NODE(&tp_c->hnode);
e7614370 389 idr_init(&tp_c->handle_idr);
3cd904ec
WC
390
391 h = tc_u_hash(tp);
392 hlist_add_head(&tp_c->hnode, &tc_u_common_hash[h]);
1da177e4
LT
393 }
394
395 tp_c->refcnt++;
1ce87720
JF
396 RCU_INIT_POINTER(root_ht->next, tp_c->hlist);
397 rcu_assign_pointer(tp_c->hlist, root_ht);
1da177e4
LT
398 root_ht->tp_c = tp_c;
399
1ce87720 400 rcu_assign_pointer(tp->root, root_ht);
1da177e4
LT
401 tp->data = tp_c;
402 return 0;
403}
404
5a7a5555 405static int u32_destroy_key(struct tcf_proto *tp, struct tc_u_knode *n,
de5df632 406 bool free_pf)
1da177e4 407{
d7cdee5e
PA
408 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
409
18d0264f 410 tcf_exts_destroy(&n->exts);
35c55fc1 411 tcf_exts_put_net(&n->exts);
d7cdee5e
PA
412 if (ht && --ht->refcnt == 0)
413 kfree(ht);
1da177e4 414#ifdef CONFIG_CLS_U32_PERF
de5df632
JF
415 if (free_pf)
416 free_percpu(n->pf);
a1ddcfee
JF
417#endif
418#ifdef CONFIG_CLS_U32_MARK
de5df632
JF
419 if (free_pf)
420 free_percpu(n->pcpu_success);
1da177e4
LT
421#endif
422 kfree(n);
423 return 0;
424}
425
de5df632
JF
426/* u32_delete_key_rcu should be called when free'ing a copied
427 * version of a tc_u_knode obtained from u32_init_knode(). When
428 * copies are obtained from u32_init_knode() the statistics are
429 * shared between the old and new copies to allow readers to
430 * continue to update the statistics during the copy. To support
431 * this the u32_delete_key_rcu variant does not free the percpu
432 * statistics.
433 */
c0d378ef
CW
434static void u32_delete_key_work(struct work_struct *work)
435{
aaa908ff
CW
436 struct tc_u_knode *key = container_of(to_rcu_work(work),
437 struct tc_u_knode,
438 rwork);
c0d378ef
CW
439 rtnl_lock();
440 u32_destroy_key(key->tp, key, false);
441 rtnl_unlock();
442}
443
de5df632
JF
444/* u32_delete_key_freepf_rcu is the rcu callback variant
445 * that free's the entire structure including the statistics
446 * percpu variables. Only use this if the key is not a copy
447 * returned by u32_init_knode(). See u32_delete_key_rcu()
448 * for the variant that should be used with keys return from
449 * u32_init_knode()
450 */
c0d378ef
CW
451static void u32_delete_key_freepf_work(struct work_struct *work)
452{
aaa908ff
CW
453 struct tc_u_knode *key = container_of(to_rcu_work(work),
454 struct tc_u_knode,
455 rwork);
c0d378ef
CW
456 rtnl_lock();
457 u32_destroy_key(key->tp, key, true);
458 rtnl_unlock();
459}
460
82d567c2 461static int u32_delete_key(struct tcf_proto *tp, struct tc_u_knode *key)
1da177e4 462{
1ce87720
JF
463 struct tc_u_knode __rcu **kp;
464 struct tc_u_knode *pkp;
a96366bf 465 struct tc_u_hnode *ht = rtnl_dereference(key->ht_up);
1da177e4
LT
466
467 if (ht) {
1ce87720
JF
468 kp = &ht->ht[TC_U32_HASH(key->handle)];
469 for (pkp = rtnl_dereference(*kp); pkp;
470 kp = &pkp->next, pkp = rtnl_dereference(*kp)) {
471 if (pkp == key) {
472 RCU_INIT_POINTER(*kp, key->next);
1da177e4 473
a0efb80c 474 tcf_unbind_filter(tp, &key->res);
f12c6432 475 idr_remove(&ht->handle_idr, key->handle);
35c55fc1 476 tcf_exts_get_net(&key->exts);
aaa908ff 477 tcf_queue_work(&key->rwork, u32_delete_key_freepf_work);
1da177e4
LT
478 return 0;
479 }
480 }
481 }
547b792c 482 WARN_ON(1);
1da177e4
LT
483 return 0;
484}
485
458e704d
JK
486static void u32_clear_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
487 struct netlink_ext_ack *extack)
a1b7c5fd 488{
245dc512 489 struct tcf_block *block = tp->chain->block;
de4784ca 490 struct tc_cls_u32_offload cls_u32 = {};
a1b7c5fd 491
458e704d 492 tc_cls_common_offload_init(&cls_u32.common, tp, h->flags, extack);
77460411
JP
493 cls_u32.command = TC_CLSU32_DELETE_HNODE;
494 cls_u32.hnode.divisor = h->divisor;
495 cls_u32.hnode.handle = h->handle;
496 cls_u32.hnode.prio = h->prio;
de4784ca 497
245dc512 498 tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, false);
a1b7c5fd
JF
499}
500
5a7a5555 501static int u32_replace_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
10a47e0f 502 u32 flags, struct netlink_ext_ack *extack)
a1b7c5fd 503{
245dc512 504 struct tcf_block *block = tp->chain->block;
de4784ca 505 struct tc_cls_u32_offload cls_u32 = {};
245dc512
JP
506 bool skip_sw = tc_skip_sw(flags);
507 bool offloaded = false;
d34e3e18 508 int err;
a1b7c5fd 509
f40fe58d 510 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
de4784ca
JP
511 cls_u32.command = TC_CLSU32_NEW_HNODE;
512 cls_u32.hnode.divisor = h->divisor;
513 cls_u32.hnode.handle = h->handle;
514 cls_u32.hnode.prio = h->prio;
a1b7c5fd 515
245dc512
JP
516 err = tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, skip_sw);
517 if (err < 0) {
458e704d 518 u32_clear_hw_hnode(tp, h, NULL);
d47a0f38 519 return err;
245dc512
JP
520 } else if (err > 0) {
521 offloaded = true;
522 }
523
524 if (skip_sw && !offloaded)
525 return -EINVAL;
d34e3e18
SS
526
527 return 0;
a1b7c5fd
JF
528}
529
458e704d
JK
530static void u32_remove_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
531 struct netlink_ext_ack *extack)
a1b7c5fd 532{
245dc512 533 struct tcf_block *block = tp->chain->block;
de4784ca 534 struct tc_cls_u32_offload cls_u32 = {};
a1b7c5fd 535
458e704d 536 tc_cls_common_offload_init(&cls_u32.common, tp, n->flags, extack);
77460411 537 cls_u32.command = TC_CLSU32_DELETE_KNODE;
caa72601 538 cls_u32.knode.handle = n->handle;
a1b7c5fd 539
245dc512 540 tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, false);
caa72601 541 tcf_block_offload_dec(block, &n->flags);
a1b7c5fd
JF
542}
543
5a7a5555 544static int u32_replace_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
10a47e0f 545 u32 flags, struct netlink_ext_ack *extack)
a1b7c5fd 546{
058a6c03 547 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
245dc512 548 struct tcf_block *block = tp->chain->block;
de4784ca 549 struct tc_cls_u32_offload cls_u32 = {};
245dc512 550 bool skip_sw = tc_skip_sw(flags);
d34e3e18 551 int err;
a1b7c5fd 552
f40fe58d 553 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
de4784ca
JP
554 cls_u32.command = TC_CLSU32_REPLACE_KNODE;
555 cls_u32.knode.handle = n->handle;
556 cls_u32.knode.fshift = n->fshift;
a1b7c5fd 557#ifdef CONFIG_CLS_U32_MARK
de4784ca
JP
558 cls_u32.knode.val = n->val;
559 cls_u32.knode.mask = n->mask;
a1b7c5fd 560#else
de4784ca
JP
561 cls_u32.knode.val = 0;
562 cls_u32.knode.mask = 0;
a1b7c5fd 563#endif
de4784ca
JP
564 cls_u32.knode.sel = &n->sel;
565 cls_u32.knode.exts = &n->exts;
201c44bd 566 if (n->ht_down)
058a6c03 567 cls_u32.knode.link_handle = ht->handle;
201c44bd 568
245dc512
JP
569 err = tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, skip_sw);
570 if (err < 0) {
458e704d 571 u32_remove_hw_knode(tp, n, NULL);
201c44bd 572 return err;
245dc512 573 } else if (err > 0) {
caa72601 574 tcf_block_offload_inc(block, &n->flags);
245dc512
JP
575 }
576
0f04d057 577 if (skip_sw && !(n->flags & TCA_CLS_FLAGS_IN_HW))
245dc512 578 return -EINVAL;
d34e3e18
SS
579
580 return 0;
a1b7c5fd
JF
581}
582
458e704d
JK
583static void u32_clear_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
584 struct netlink_ext_ack *extack)
1da177e4
LT
585{
586 struct tc_u_knode *n;
cc7ec456 587 unsigned int h;
1da177e4 588
cc7ec456 589 for (h = 0; h <= ht->divisor; h++) {
1ce87720
JF
590 while ((n = rtnl_dereference(ht->ht[h])) != NULL) {
591 RCU_INIT_POINTER(ht->ht[h],
592 rtnl_dereference(n->next));
a0efb80c 593 tcf_unbind_filter(tp, &n->res);
458e704d 594 u32_remove_hw_knode(tp, n, extack);
9c160941 595 idr_remove(&ht->handle_idr, n->handle);
35c55fc1 596 if (tcf_exts_get_net(&n->exts))
aaa908ff 597 tcf_queue_work(&n->rwork, u32_delete_key_freepf_work);
35c55fc1
CW
598 else
599 u32_destroy_key(n->tp, n, true);
1da177e4
LT
600 }
601 }
602}
603
458e704d
JK
604static int u32_destroy_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
605 struct netlink_ext_ack *extack)
1da177e4
LT
606{
607 struct tc_u_common *tp_c = tp->data;
1ce87720
JF
608 struct tc_u_hnode __rcu **hn;
609 struct tc_u_hnode *phn;
1da177e4 610
547b792c 611 WARN_ON(ht->refcnt);
1da177e4 612
458e704d 613 u32_clear_hnode(tp, ht, extack);
1da177e4 614
1ce87720
JF
615 hn = &tp_c->hlist;
616 for (phn = rtnl_dereference(*hn);
617 phn;
618 hn = &phn->next, phn = rtnl_dereference(*hn)) {
619 if (phn == ht) {
458e704d 620 u32_clear_hw_hnode(tp, ht, extack);
e7614370 621 idr_destroy(&ht->handle_idr);
9c160941 622 idr_remove(&tp_c->handle_idr, ht->handle);
1ce87720
JF
623 RCU_INIT_POINTER(*hn, ht->next);
624 kfree_rcu(ht, rcu);
1da177e4
LT
625 return 0;
626 }
627 }
628
1da177e4
LT
629 return -ENOENT;
630}
631
1e052be6
CW
632static bool ht_empty(struct tc_u_hnode *ht)
633{
634 unsigned int h;
635
636 for (h = 0; h <= ht->divisor; h++)
637 if (rcu_access_pointer(ht->ht[h]))
638 return false;
639
640 return true;
641}
642
715df5ec 643static void u32_destroy(struct tcf_proto *tp, struct netlink_ext_ack *extack)
1da177e4
LT
644{
645 struct tc_u_common *tp_c = tp->data;
1ce87720 646 struct tc_u_hnode *root_ht = rtnl_dereference(tp->root);
1da177e4 647
547b792c 648 WARN_ON(root_ht == NULL);
1da177e4
LT
649
650 if (root_ht && --root_ht->refcnt == 0)
458e704d 651 u32_destroy_hnode(tp, root_ht, extack);
1da177e4
LT
652
653 if (--tp_c->refcnt == 0) {
654 struct tc_u_hnode *ht;
1da177e4 655
3cd904ec 656 hlist_del(&tp_c->hnode);
1da177e4 657
1ce87720 658 while ((ht = rtnl_dereference(tp_c->hlist)) != NULL) {
d7cdee5e 659 u32_clear_hnode(tp, ht, extack);
1ce87720 660 RCU_INIT_POINTER(tp_c->hlist, ht->next);
d7cdee5e
PA
661
662 /* u32_destroy_key() will later free ht for us, if it's
663 * still referenced by some knode
664 */
665 if (--ht->refcnt == 0)
666 kfree_rcu(ht, rcu);
3ff50b79 667 }
1da177e4 668
e7614370 669 idr_destroy(&tp_c->handle_idr);
1da177e4
LT
670 kfree(tp_c);
671 }
672
673 tp->data = NULL;
674}
675
571acf21
AA
676static int u32_delete(struct tcf_proto *tp, void *arg, bool *last,
677 struct netlink_ext_ack *extack)
1da177e4 678{
8113c095 679 struct tc_u_hnode *ht = arg;
1ce87720 680 struct tc_u_hnode *root_ht = rtnl_dereference(tp->root);
763dbf63
WC
681 struct tc_u_common *tp_c = tp->data;
682 int ret = 0;
1da177e4
LT
683
684 if (ht == NULL)
763dbf63 685 goto out;
1da177e4 686
a1b7c5fd 687 if (TC_U32_KEY(ht->handle)) {
458e704d 688 u32_remove_hw_knode(tp, (struct tc_u_knode *)ht, extack);
763dbf63
WC
689 ret = u32_delete_key(tp, (struct tc_u_knode *)ht);
690 goto out;
a1b7c5fd 691 }
1da177e4 692
4b981dbc
AA
693 if (root_ht == ht) {
694 NL_SET_ERR_MSG_MOD(extack, "Not allowed to delete root node");
1da177e4 695 return -EINVAL;
4b981dbc 696 }
1da177e4 697
e56cfad1
JP
698 if (ht->refcnt == 1) {
699 ht->refcnt--;
458e704d 700 u32_destroy_hnode(tp, ht, extack);
e56cfad1 701 } else {
4b981dbc 702 NL_SET_ERR_MSG_MOD(extack, "Can not delete in-use filter");
e56cfad1
JP
703 return -EBUSY;
704 }
1da177e4 705
763dbf63
WC
706out:
707 *last = true;
708 if (root_ht) {
709 if (root_ht->refcnt > 1) {
710 *last = false;
711 goto ret;
712 }
713 if (root_ht->refcnt == 1) {
714 if (!ht_empty(root_ht)) {
715 *last = false;
716 goto ret;
717 }
718 }
719 }
720
721 if (tp_c->refcnt > 1) {
722 *last = false;
723 goto ret;
724 }
725
726 if (tp_c->refcnt == 1) {
727 struct tc_u_hnode *ht;
728
729 for (ht = rtnl_dereference(tp_c->hlist);
730 ht;
731 ht = rtnl_dereference(ht->next))
732 if (!ht_empty(ht)) {
733 *last = false;
734 break;
735 }
736 }
737
738ret:
739 return ret;
1da177e4
LT
740}
741
e7614370 742static u32 gen_new_kid(struct tc_u_hnode *ht, u32 htid)
1da177e4 743{
f730cb93 744 u32 index = htid | 0x800;
e7614370 745 u32 max = htid | 0xFFF;
e7614370 746
f730cb93
MW
747 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max, GFP_KERNEL)) {
748 index = htid + 1;
749 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max,
750 GFP_KERNEL))
751 index = max;
e7614370 752 }
7801db8a 753
f730cb93 754 return index;
1da177e4
LT
755}
756
6fa8c014
PM
757static const struct nla_policy u32_policy[TCA_U32_MAX + 1] = {
758 [TCA_U32_CLASSID] = { .type = NLA_U32 },
759 [TCA_U32_HASH] = { .type = NLA_U32 },
760 [TCA_U32_LINK] = { .type = NLA_U32 },
761 [TCA_U32_DIVISOR] = { .type = NLA_U32 },
762 [TCA_U32_SEL] = { .len = sizeof(struct tc_u32_sel) },
763 [TCA_U32_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ },
764 [TCA_U32_MARK] = { .len = sizeof(struct tc_u32_mark) },
9e8ce79c 765 [TCA_U32_FLAGS] = { .type = NLA_U32 },
6fa8c014
PM
766};
767
c1b52739
BL
768static int u32_set_parms(struct net *net, struct tcf_proto *tp,
769 unsigned long base, struct tc_u_hnode *ht,
add93b61 770 struct tc_u_knode *n, struct nlattr **tb,
50a56190
AA
771 struct nlattr *est, bool ovr,
772 struct netlink_ext_ack *extack)
1da177e4 773{
b9a24bb7 774 int err;
1da177e4 775
50a56190 776 err = tcf_exts_validate(net, tp, tb, est, &n->exts, ovr, extack);
1da177e4
LT
777 if (err < 0)
778 return err;
779
add93b61 780 if (tb[TCA_U32_LINK]) {
1587bac4 781 u32 handle = nla_get_u32(tb[TCA_U32_LINK]);
47a1a1d4 782 struct tc_u_hnode *ht_down = NULL, *ht_old;
1da177e4 783
4b981dbc
AA
784 if (TC_U32_KEY(handle)) {
785 NL_SET_ERR_MSG_MOD(extack, "u32 Link handle must be a hash table");
705c7091 786 return -EINVAL;
4b981dbc 787 }
1da177e4
LT
788
789 if (handle) {
790 ht_down = u32_lookup_ht(ht->tp_c, handle);
791
4b981dbc
AA
792 if (!ht_down) {
793 NL_SET_ERR_MSG_MOD(extack, "Link hash table not found");
705c7091 794 return -EINVAL;
4b981dbc 795 }
1da177e4
LT
796 ht_down->refcnt++;
797 }
798
1ce87720
JF
799 ht_old = rtnl_dereference(n->ht_down);
800 rcu_assign_pointer(n->ht_down, ht_down);
1da177e4 801
47a1a1d4
PM
802 if (ht_old)
803 ht_old->refcnt--;
1da177e4 804 }
add93b61 805 if (tb[TCA_U32_CLASSID]) {
1587bac4 806 n->res.classid = nla_get_u32(tb[TCA_U32_CLASSID]);
1da177e4
LT
807 tcf_bind_filter(tp, &n->res, base);
808 }
809
810#ifdef CONFIG_NET_CLS_IND
add93b61 811 if (tb[TCA_U32_INDEV]) {
2519a602 812 int ret;
1057c55f 813 ret = tcf_change_indev(net, tb[TCA_U32_INDEV], extack);
2519a602 814 if (ret < 0)
705c7091 815 return -EINVAL;
2519a602 816 n->ifindex = ret;
1da177e4
LT
817 }
818#endif
1da177e4 819 return 0;
1da177e4
LT
820}
821
5a7a5555 822static void u32_replace_knode(struct tcf_proto *tp, struct tc_u_common *tp_c,
de5df632
JF
823 struct tc_u_knode *n)
824{
825 struct tc_u_knode __rcu **ins;
826 struct tc_u_knode *pins;
827 struct tc_u_hnode *ht;
828
829 if (TC_U32_HTID(n->handle) == TC_U32_ROOT)
830 ht = rtnl_dereference(tp->root);
831 else
832 ht = u32_lookup_ht(tp_c, TC_U32_HTID(n->handle));
833
834 ins = &ht->ht[TC_U32_HASH(n->handle)];
835
836 /* The node must always exist for it to be replaced if this is not the
837 * case then something went very wrong elsewhere.
838 */
839 for (pins = rtnl_dereference(*ins); ;
840 ins = &pins->next, pins = rtnl_dereference(*ins))
841 if (pins->handle == n->handle)
842 break;
843
234a4624 844 idr_replace(&ht->handle_idr, n, n->handle);
de5df632
JF
845 RCU_INIT_POINTER(n->next, pins->next);
846 rcu_assign_pointer(*ins, n);
847}
848
849static struct tc_u_knode *u32_init_knode(struct tcf_proto *tp,
850 struct tc_u_knode *n)
851{
058a6c03 852 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
de5df632 853 struct tc_u32_sel *s = &n->sel;
058a6c03 854 struct tc_u_knode *new;
de5df632
JF
855
856 new = kzalloc(sizeof(*n) + s->nkeys*sizeof(struct tc_u32_key),
857 GFP_KERNEL);
858
859 if (!new)
860 return NULL;
861
862 RCU_INIT_POINTER(new->next, n->next);
863 new->handle = n->handle;
864 RCU_INIT_POINTER(new->ht_up, n->ht_up);
865
866#ifdef CONFIG_NET_CLS_IND
867 new->ifindex = n->ifindex;
868#endif
869 new->fshift = n->fshift;
870 new->res = n->res;
9e8ce79c 871 new->flags = n->flags;
058a6c03 872 RCU_INIT_POINTER(new->ht_down, ht);
de5df632
JF
873
874 /* bump reference count as long as we hold pointer to structure */
058a6c03
PA
875 if (ht)
876 ht->refcnt++;
de5df632
JF
877
878#ifdef CONFIG_CLS_U32_PERF
879 /* Statistics may be incremented by readers during update
880 * so we must keep them in tact. When the node is later destroyed
881 * a special destroy call must be made to not free the pf memory.
882 */
883 new->pf = n->pf;
884#endif
885
886#ifdef CONFIG_CLS_U32_MARK
887 new->val = n->val;
888 new->mask = n->mask;
889 /* Similarly success statistics must be moved as pointers */
890 new->pcpu_success = n->pcpu_success;
891#endif
892 new->tp = tp;
893 memcpy(&new->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
894
b9a24bb7
WC
895 if (tcf_exts_init(&new->exts, TCA_U32_ACT, TCA_U32_POLICE)) {
896 kfree(new);
897 return NULL;
898 }
de5df632
JF
899
900 return new;
901}
902
c1b52739 903static int u32_change(struct net *net, struct sk_buff *in_skb,
af4c6641 904 struct tcf_proto *tp, unsigned long base, u32 handle,
7306db38
AA
905 struct nlattr **tca, void **arg, bool ovr,
906 struct netlink_ext_ack *extack)
1da177e4
LT
907{
908 struct tc_u_common *tp_c = tp->data;
909 struct tc_u_hnode *ht;
910 struct tc_u_knode *n;
911 struct tc_u32_sel *s;
add93b61
PM
912 struct nlattr *opt = tca[TCA_OPTIONS];
913 struct nlattr *tb[TCA_U32_MAX + 1];
9e8ce79c 914 u32 htid, flags = 0;
1da177e4 915 int err;
459d5f62
JF
916#ifdef CONFIG_CLS_U32_PERF
917 size_t size;
918#endif
1da177e4 919
4b981dbc
AA
920 if (!opt) {
921 if (handle) {
922 NL_SET_ERR_MSG_MOD(extack, "Filter handle requires options");
923 return -EINVAL;
924 } else {
925 return 0;
926 }
927 }
1da177e4 928
4b981dbc 929 err = nla_parse_nested(tb, TCA_U32_MAX, opt, u32_policy, extack);
cee63723
PM
930 if (err < 0)
931 return err;
1da177e4 932
d34e3e18 933 if (tb[TCA_U32_FLAGS]) {
9e8ce79c 934 flags = nla_get_u32(tb[TCA_U32_FLAGS]);
4b981dbc
AA
935 if (!tc_flags_valid(flags)) {
936 NL_SET_ERR_MSG_MOD(extack, "Invalid filter flags");
1a0f7d29 937 return -EINVAL;
4b981dbc 938 }
d34e3e18 939 }
9e8ce79c 940
8113c095 941 n = *arg;
cc7ec456 942 if (n) {
de5df632
JF
943 struct tc_u_knode *new;
944
4b981dbc
AA
945 if (TC_U32_KEY(n->handle) == 0) {
946 NL_SET_ERR_MSG_MOD(extack, "Key node id cannot be zero");
1da177e4 947 return -EINVAL;
4b981dbc 948 }
1da177e4 949
eb53f7af
IV
950 if ((n->flags ^ flags) &
951 ~(TCA_CLS_FLAGS_IN_HW | TCA_CLS_FLAGS_NOT_IN_HW)) {
4b981dbc 952 NL_SET_ERR_MSG_MOD(extack, "Key node flags do not match passed flags");
9e8ce79c 953 return -EINVAL;
4b981dbc 954 }
9e8ce79c 955
de5df632
JF
956 new = u32_init_knode(tp, n);
957 if (!new)
958 return -ENOMEM;
959
960 err = u32_set_parms(net, tp, base,
961 rtnl_dereference(n->ht_up), new, tb,
50a56190 962 tca[TCA_RATE], ovr, extack);
de5df632
JF
963
964 if (err) {
965 u32_destroy_key(tp, new, false);
966 return err;
967 }
968
10a47e0f 969 err = u32_replace_hw_knode(tp, new, flags, extack);
d34e3e18
SS
970 if (err) {
971 u32_destroy_key(tp, new, false);
972 return err;
973 }
974
24d3dc6d
OG
975 if (!tc_in_hw(new->flags))
976 new->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
977
de5df632 978 u32_replace_knode(tp, tp_c, new);
a0efb80c 979 tcf_unbind_filter(tp, &n->res);
35c55fc1 980 tcf_exts_get_net(&n->exts);
aaa908ff 981 tcf_queue_work(&n->rwork, u32_delete_key_work);
de5df632 982 return 0;
1da177e4
LT
983 }
984
add93b61 985 if (tb[TCA_U32_DIVISOR]) {
cc7ec456 986 unsigned int divisor = nla_get_u32(tb[TCA_U32_DIVISOR]);
1da177e4 987
4b981dbc
AA
988 if (--divisor > 0x100) {
989 NL_SET_ERR_MSG_MOD(extack, "Exceeded maximum 256 hash buckets");
1da177e4 990 return -EINVAL;
4b981dbc
AA
991 }
992 if (TC_U32_KEY(handle)) {
993 NL_SET_ERR_MSG_MOD(extack, "Divisor can only be used on a hash table");
1da177e4 994 return -EINVAL;
4b981dbc 995 }
cc7ec456 996 ht = kzalloc(sizeof(*ht) + divisor*sizeof(void *), GFP_KERNEL);
1da177e4
LT
997 if (ht == NULL)
998 return -ENOBUFS;
e7614370
CW
999 if (handle == 0) {
1000 handle = gen_new_htid(tp->data, ht);
1001 if (handle == 0) {
1002 kfree(ht);
1003 return -ENOMEM;
1004 }
1005 } else {
f730cb93
MW
1006 err = idr_alloc_u32(&tp_c->handle_idr, ht, &handle,
1007 handle, GFP_KERNEL);
e7614370
CW
1008 if (err) {
1009 kfree(ht);
1010 return err;
1011 }
1012 }
1da177e4 1013 ht->tp_c = tp_c;
e56cfad1 1014 ht->refcnt = 1;
1da177e4
LT
1015 ht->divisor = divisor;
1016 ht->handle = handle;
1017 ht->prio = tp->prio;
e7614370 1018 idr_init(&ht->handle_idr);
f40fe58d 1019 ht->flags = flags;
6eef3801 1020
10a47e0f 1021 err = u32_replace_hw_hnode(tp, ht, flags, extack);
6eef3801 1022 if (err) {
9c160941 1023 idr_remove(&tp_c->handle_idr, handle);
6eef3801
JK
1024 kfree(ht);
1025 return err;
1026 }
1027
1ce87720
JF
1028 RCU_INIT_POINTER(ht->next, tp_c->hlist);
1029 rcu_assign_pointer(tp_c->hlist, ht);
8113c095 1030 *arg = ht;
a1b7c5fd 1031
1da177e4
LT
1032 return 0;
1033 }
1034
add93b61 1035 if (tb[TCA_U32_HASH]) {
1587bac4 1036 htid = nla_get_u32(tb[TCA_U32_HASH]);
1da177e4 1037 if (TC_U32_HTID(htid) == TC_U32_ROOT) {
1ce87720 1038 ht = rtnl_dereference(tp->root);
1da177e4
LT
1039 htid = ht->handle;
1040 } else {
1041 ht = u32_lookup_ht(tp->data, TC_U32_HTID(htid));
4b981dbc
AA
1042 if (!ht) {
1043 NL_SET_ERR_MSG_MOD(extack, "Specified hash table not found");
1da177e4 1044 return -EINVAL;
4b981dbc 1045 }
1da177e4
LT
1046 }
1047 } else {
1ce87720 1048 ht = rtnl_dereference(tp->root);
1da177e4
LT
1049 htid = ht->handle;
1050 }
1051
4b981dbc
AA
1052 if (ht->divisor < TC_U32_HASH(htid)) {
1053 NL_SET_ERR_MSG_MOD(extack, "Specified hash table buckets exceed configured value");
1da177e4 1054 return -EINVAL;
4b981dbc 1055 }
1da177e4
LT
1056
1057 if (handle) {
4b981dbc
AA
1058 if (TC_U32_HTID(handle) && TC_U32_HTID(handle ^ htid)) {
1059 NL_SET_ERR_MSG_MOD(extack, "Handle specified hash table address mismatch");
1da177e4 1060 return -EINVAL;
4b981dbc 1061 }
1da177e4 1062 handle = htid | TC_U32_NODE(handle);
f730cb93 1063 err = idr_alloc_u32(&ht->handle_idr, NULL, &handle, handle,
e7614370
CW
1064 GFP_KERNEL);
1065 if (err)
1066 return err;
1da177e4
LT
1067 } else
1068 handle = gen_new_kid(ht, htid);
1069
e7614370 1070 if (tb[TCA_U32_SEL] == NULL) {
4b981dbc 1071 NL_SET_ERR_MSG_MOD(extack, "Selector not specified");
e7614370
CW
1072 err = -EINVAL;
1073 goto erridr;
1074 }
1da177e4 1075
add93b61 1076 s = nla_data(tb[TCA_U32_SEL]);
1da177e4 1077
0da974f4 1078 n = kzalloc(sizeof(*n) + s->nkeys*sizeof(struct tc_u32_key), GFP_KERNEL);
e7614370
CW
1079 if (n == NULL) {
1080 err = -ENOBUFS;
1081 goto erridr;
1082 }
1da177e4 1083
1da177e4 1084#ifdef CONFIG_CLS_U32_PERF
459d5f62
JF
1085 size = sizeof(struct tc_u32_pcnt) + s->nkeys * sizeof(u64);
1086 n->pf = __alloc_percpu(size, __alignof__(struct tc_u32_pcnt));
1087 if (!n->pf) {
e7614370
CW
1088 err = -ENOBUFS;
1089 goto errfree;
1da177e4 1090 }
1da177e4
LT
1091#endif
1092
1093 memcpy(&n->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
a96366bf 1094 RCU_INIT_POINTER(n->ht_up, ht);
1da177e4 1095 n->handle = handle;
b2268016 1096 n->fshift = s->hmask ? ffs(ntohl(s->hmask)) - 1 : 0;
9e8ce79c 1097 n->flags = flags;
1ce87720 1098 n->tp = tp;
1da177e4 1099
b9a24bb7
WC
1100 err = tcf_exts_init(&n->exts, TCA_U32_ACT, TCA_U32_POLICE);
1101 if (err < 0)
1102 goto errout;
1103
1da177e4 1104#ifdef CONFIG_CLS_U32_MARK
459d5f62 1105 n->pcpu_success = alloc_percpu(u32);
a1ddcfee
JF
1106 if (!n->pcpu_success) {
1107 err = -ENOMEM;
1108 goto errout;
1109 }
459d5f62 1110
add93b61 1111 if (tb[TCA_U32_MARK]) {
1da177e4
LT
1112 struct tc_u32_mark *mark;
1113
add93b61 1114 mark = nla_data(tb[TCA_U32_MARK]);
459d5f62
JF
1115 n->val = mark->val;
1116 n->mask = mark->mask;
1da177e4
LT
1117 }
1118#endif
1119
50a56190
AA
1120 err = u32_set_parms(net, tp, base, ht, n, tb, tca[TCA_RATE], ovr,
1121 extack);
1da177e4 1122 if (err == 0) {
1ce87720
JF
1123 struct tc_u_knode __rcu **ins;
1124 struct tc_u_knode *pins;
1125
10a47e0f 1126 err = u32_replace_hw_knode(tp, n, flags, extack);
d34e3e18
SS
1127 if (err)
1128 goto errhw;
1129
24d3dc6d
OG
1130 if (!tc_in_hw(n->flags))
1131 n->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
1132
1ce87720
JF
1133 ins = &ht->ht[TC_U32_HASH(handle)];
1134 for (pins = rtnl_dereference(*ins); pins;
1135 ins = &pins->next, pins = rtnl_dereference(*ins))
1136 if (TC_U32_NODE(handle) < TC_U32_NODE(pins->handle))
1da177e4
LT
1137 break;
1138
1ce87720
JF
1139 RCU_INIT_POINTER(n->next, pins);
1140 rcu_assign_pointer(*ins, n);
8113c095 1141 *arg = n;
1da177e4
LT
1142 return 0;
1143 }
a1ddcfee 1144
d34e3e18 1145errhw:
a1ddcfee
JF
1146#ifdef CONFIG_CLS_U32_MARK
1147 free_percpu(n->pcpu_success);
1148#endif
1149
b9a24bb7
WC
1150errout:
1151 tcf_exts_destroy(&n->exts);
1da177e4 1152#ifdef CONFIG_CLS_U32_PERF
e7614370 1153errfree:
1ce87720 1154 free_percpu(n->pf);
1da177e4
LT
1155#endif
1156 kfree(n);
e7614370 1157erridr:
9c160941 1158 idr_remove(&ht->handle_idr, handle);
1da177e4
LT
1159 return err;
1160}
1161
1162static void u32_walk(struct tcf_proto *tp, struct tcf_walker *arg)
1163{
1164 struct tc_u_common *tp_c = tp->data;
1165 struct tc_u_hnode *ht;
1166 struct tc_u_knode *n;
cc7ec456 1167 unsigned int h;
1da177e4
LT
1168
1169 if (arg->stop)
1170 return;
1171
1ce87720
JF
1172 for (ht = rtnl_dereference(tp_c->hlist);
1173 ht;
1174 ht = rtnl_dereference(ht->next)) {
1da177e4
LT
1175 if (ht->prio != tp->prio)
1176 continue;
1177 if (arg->count >= arg->skip) {
8113c095 1178 if (arg->fn(tp, ht, arg) < 0) {
1da177e4
LT
1179 arg->stop = 1;
1180 return;
1181 }
1182 }
1183 arg->count++;
1184 for (h = 0; h <= ht->divisor; h++) {
1ce87720
JF
1185 for (n = rtnl_dereference(ht->ht[h]);
1186 n;
1187 n = rtnl_dereference(n->next)) {
1da177e4
LT
1188 if (arg->count < arg->skip) {
1189 arg->count++;
1190 continue;
1191 }
8113c095 1192 if (arg->fn(tp, n, arg) < 0) {
1da177e4
LT
1193 arg->stop = 1;
1194 return;
1195 }
1196 arg->count++;
1197 }
1198 }
1199 }
1200}
1201
07d79fc7
CW
1202static void u32_bind_class(void *fh, u32 classid, unsigned long cl)
1203{
1204 struct tc_u_knode *n = fh;
1205
1206 if (n && n->res.classid == classid)
1207 n->res.class = cl;
1208}
1209
8113c095 1210static int u32_dump(struct net *net, struct tcf_proto *tp, void *fh,
5a7a5555 1211 struct sk_buff *skb, struct tcmsg *t)
1da177e4 1212{
8113c095 1213 struct tc_u_knode *n = fh;
1ce87720 1214 struct tc_u_hnode *ht_up, *ht_down;
4b3550ef 1215 struct nlattr *nest;
1da177e4
LT
1216
1217 if (n == NULL)
1218 return skb->len;
1219
1220 t->tcm_handle = n->handle;
1221
4b3550ef
PM
1222 nest = nla_nest_start(skb, TCA_OPTIONS);
1223 if (nest == NULL)
1224 goto nla_put_failure;
1da177e4
LT
1225
1226 if (TC_U32_KEY(n->handle) == 0) {
8113c095 1227 struct tc_u_hnode *ht = fh;
cc7ec456
ED
1228 u32 divisor = ht->divisor + 1;
1229
1b34ec43
DM
1230 if (nla_put_u32(skb, TCA_U32_DIVISOR, divisor))
1231 goto nla_put_failure;
1da177e4 1232 } else {
459d5f62
JF
1233#ifdef CONFIG_CLS_U32_PERF
1234 struct tc_u32_pcnt *gpf;
459d5f62 1235 int cpu;
80aab73d 1236#endif
459d5f62 1237
1b34ec43
DM
1238 if (nla_put(skb, TCA_U32_SEL,
1239 sizeof(n->sel) + n->sel.nkeys*sizeof(struct tc_u32_key),
1240 &n->sel))
1241 goto nla_put_failure;
1ce87720
JF
1242
1243 ht_up = rtnl_dereference(n->ht_up);
1244 if (ht_up) {
1da177e4 1245 u32 htid = n->handle & 0xFFFFF000;
1b34ec43
DM
1246 if (nla_put_u32(skb, TCA_U32_HASH, htid))
1247 goto nla_put_failure;
1da177e4 1248 }
1b34ec43
DM
1249 if (n->res.classid &&
1250 nla_put_u32(skb, TCA_U32_CLASSID, n->res.classid))
1251 goto nla_put_failure;
1ce87720
JF
1252
1253 ht_down = rtnl_dereference(n->ht_down);
1254 if (ht_down &&
1255 nla_put_u32(skb, TCA_U32_LINK, ht_down->handle))
1b34ec43 1256 goto nla_put_failure;
1da177e4 1257
9e8ce79c
JF
1258 if (n->flags && nla_put_u32(skb, TCA_U32_FLAGS, n->flags))
1259 goto nla_put_failure;
1260
1da177e4 1261#ifdef CONFIG_CLS_U32_MARK
459d5f62
JF
1262 if ((n->val || n->mask)) {
1263 struct tc_u32_mark mark = {.val = n->val,
1264 .mask = n->mask,
1265 .success = 0};
80aab73d 1266 int cpum;
459d5f62 1267
80aab73d
JF
1268 for_each_possible_cpu(cpum) {
1269 __u32 cnt = *per_cpu_ptr(n->pcpu_success, cpum);
459d5f62
JF
1270
1271 mark.success += cnt;
1272 }
1273
1274 if (nla_put(skb, TCA_U32_MARK, sizeof(mark), &mark))
1275 goto nla_put_failure;
1276 }
1da177e4
LT
1277#endif
1278
5da57f42 1279 if (tcf_exts_dump(skb, &n->exts) < 0)
add93b61 1280 goto nla_put_failure;
1da177e4
LT
1281
1282#ifdef CONFIG_NET_CLS_IND
2519a602
WC
1283 if (n->ifindex) {
1284 struct net_device *dev;
1285 dev = __dev_get_by_index(net, n->ifindex);
1286 if (dev && nla_put_string(skb, TCA_U32_INDEV, dev->name))
1287 goto nla_put_failure;
1288 }
1da177e4
LT
1289#endif
1290#ifdef CONFIG_CLS_U32_PERF
459d5f62
JF
1291 gpf = kzalloc(sizeof(struct tc_u32_pcnt) +
1292 n->sel.nkeys * sizeof(u64),
1293 GFP_KERNEL);
1294 if (!gpf)
1295 goto nla_put_failure;
1296
1297 for_each_possible_cpu(cpu) {
1298 int i;
1299 struct tc_u32_pcnt *pf = per_cpu_ptr(n->pf, cpu);
1300
1301 gpf->rcnt += pf->rcnt;
1302 gpf->rhit += pf->rhit;
1303 for (i = 0; i < n->sel.nkeys; i++)
1304 gpf->kcnts[i] += pf->kcnts[i];
1305 }
1306
9854518e
ND
1307 if (nla_put_64bit(skb, TCA_U32_PCNT,
1308 sizeof(struct tc_u32_pcnt) +
1309 n->sel.nkeys * sizeof(u64),
1310 gpf, TCA_U32_PAD)) {
459d5f62 1311 kfree(gpf);
1b34ec43 1312 goto nla_put_failure;
459d5f62
JF
1313 }
1314 kfree(gpf);
1da177e4
LT
1315#endif
1316 }
1317
4b3550ef
PM
1318 nla_nest_end(skb, nest);
1319
1da177e4 1320 if (TC_U32_KEY(n->handle))
5da57f42 1321 if (tcf_exts_dump_stats(skb, &n->exts) < 0)
add93b61 1322 goto nla_put_failure;
1da177e4
LT
1323 return skb->len;
1324
add93b61 1325nla_put_failure:
4b3550ef 1326 nla_nest_cancel(skb, nest);
1da177e4
LT
1327 return -1;
1328}
1329
2eb9d75c 1330static struct tcf_proto_ops cls_u32_ops __read_mostly = {
1da177e4
LT
1331 .kind = "u32",
1332 .classify = u32_classify,
1333 .init = u32_init,
1334 .destroy = u32_destroy,
1335 .get = u32_get,
1da177e4
LT
1336 .change = u32_change,
1337 .delete = u32_delete,
1338 .walk = u32_walk,
1339 .dump = u32_dump,
07d79fc7 1340 .bind_class = u32_bind_class,
1da177e4
LT
1341 .owner = THIS_MODULE,
1342};
1343
1344static int __init init_u32(void)
1345{
3cd904ec
WC
1346 int i, ret;
1347
6ff9c364 1348 pr_info("u32 classifier\n");
1da177e4 1349#ifdef CONFIG_CLS_U32_PERF
6ff9c364 1350 pr_info(" Performance counters on\n");
1da177e4 1351#endif
1da177e4 1352#ifdef CONFIG_NET_CLS_IND
6ff9c364 1353 pr_info(" input device check on\n");
1da177e4
LT
1354#endif
1355#ifdef CONFIG_NET_CLS_ACT
6ff9c364 1356 pr_info(" Actions configured\n");
1da177e4 1357#endif
3cd904ec
WC
1358 tc_u_common_hash = kvmalloc_array(U32_HASH_SIZE,
1359 sizeof(struct hlist_head),
1360 GFP_KERNEL);
1361 if (!tc_u_common_hash)
1362 return -ENOMEM;
1363
1364 for (i = 0; i < U32_HASH_SIZE; i++)
1365 INIT_HLIST_HEAD(&tc_u_common_hash[i]);
1366
1367 ret = register_tcf_proto_ops(&cls_u32_ops);
1368 if (ret)
1369 kvfree(tc_u_common_hash);
1370 return ret;
1da177e4
LT
1371}
1372
10297b99 1373static void __exit exit_u32(void)
1da177e4
LT
1374{
1375 unregister_tcf_proto_ops(&cls_u32_ops);
3cd904ec 1376 kvfree(tc_u_common_hash);
1da177e4
LT
1377}
1378
1379module_init(init_u32)
1380module_exit(exit_u32)
1381MODULE_LICENSE("GPL");