blob: 65598207a2fcbce73db20e4f89aafcc966c08c62 [file] [log] [blame]
b.liue9582032025-04-17 19:18:16 +08001// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * net/sched/cls_u32.c Ugly (or Universal) 32bit key Packet Classifier.
4 *
5 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
6 *
7 * The filters are packed to hash tables of key nodes
8 * with a set of 32bit key/mask pairs at every node.
9 * Nodes reference next level hash tables etc.
10 *
11 * This scheme is the best universal classifier I managed to
12 * invent; it is not super-fast, but it is not slow (provided you
13 * program it correctly), and general enough. And its relative
14 * speed grows as the number of rules becomes larger.
15 *
16 * It seems that it represents the best middle point between
17 * speed and manageability both by human and by machine.
18 *
19 * It is especially useful for link sharing combined with QoS;
20 * pure RSVP doesn't need such a general approach and can use
21 * much simpler (and faster) schemes, sort of cls_rsvp.c.
22 *
23 * nfmark match added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro>
24 */
25
26#include <linux/module.h>
27#include <linux/slab.h>
28#include <linux/types.h>
29#include <linux/kernel.h>
30#include <linux/string.h>
31#include <linux/errno.h>
32#include <linux/percpu.h>
33#include <linux/rtnetlink.h>
34#include <linux/skbuff.h>
35#include <linux/bitmap.h>
36#include <linux/netdevice.h>
37#include <linux/hash.h>
38#include <net/netlink.h>
39#include <net/act_api.h>
40#include <net/pkt_cls.h>
41#include <linux/idr.h>
42
43struct tc_u_knode {
44 struct tc_u_knode __rcu *next;
45 u32 handle;
46 struct tc_u_hnode __rcu *ht_up;
47 struct tcf_exts exts;
48 int ifindex;
49 u8 fshift;
50 struct tcf_result res;
51 struct tc_u_hnode __rcu *ht_down;
52#ifdef CONFIG_CLS_U32_PERF
53 struct tc_u32_pcnt __percpu *pf;
54#endif
55 u32 flags;
56 unsigned int in_hw_count;
57#ifdef CONFIG_CLS_U32_MARK
58 u32 val;
59 u32 mask;
60 u32 __percpu *pcpu_success;
61#endif
62 struct rcu_work rwork;
63 /* The 'sel' field MUST be the last field in structure to allow for
64 * tc_u32_keys allocated at end of structure.
65 */
66 struct tc_u32_sel sel;
67};
68
69struct tc_u_hnode {
70 struct tc_u_hnode __rcu *next;
71 u32 handle;
72 u32 prio;
73 int refcnt;
74 unsigned int divisor;
75 struct idr handle_idr;
76 bool is_root;
77 struct rcu_head rcu;
78 u32 flags;
79 /* The 'ht' field MUST be the last field in structure to allow for
80 * more entries allocated at end of structure.
81 */
82 struct tc_u_knode __rcu *ht[1];
83};
84
85struct tc_u_common {
86 struct tc_u_hnode __rcu *hlist;
87 void *ptr;
88 int refcnt;
89 struct idr handle_idr;
90 struct hlist_node hnode;
91 long knodes;
92};
93
94static inline unsigned int u32_hash_fold(__be32 key,
95 const struct tc_u32_sel *sel,
96 u8 fshift)
97{
98 unsigned int h = ntohl(key & sel->hmask) >> fshift;
99
100 return h;
101}
102
103static int u32_classify(struct sk_buff *skb, const struct tcf_proto *tp,
104 struct tcf_result *res)
105{
106 struct {
107 struct tc_u_knode *knode;
108 unsigned int off;
109 } stack[TC_U32_MAXDEPTH];
110
111 struct tc_u_hnode *ht = rcu_dereference_bh(tp->root);
112 unsigned int off = skb_network_offset(skb);
113 struct tc_u_knode *n;
114 int sdepth = 0;
115 int off2 = 0;
116 int sel = 0;
117#ifdef CONFIG_CLS_U32_PERF
118 int j;
119#endif
120 int i, r;
121
122next_ht:
123 n = rcu_dereference_bh(ht->ht[sel]);
124
125next_knode:
126 if (n) {
127 struct tc_u32_key *key = n->sel.keys;
128
129#ifdef CONFIG_CLS_U32_PERF
130 __this_cpu_inc(n->pf->rcnt);
131 j = 0;
132#endif
133
134 if (tc_skip_sw(n->flags)) {
135 n = rcu_dereference_bh(n->next);
136 goto next_knode;
137 }
138
139#ifdef CONFIG_CLS_U32_MARK
140 if ((skb->mark & n->mask) != n->val) {
141 n = rcu_dereference_bh(n->next);
142 goto next_knode;
143 } else {
144 __this_cpu_inc(*n->pcpu_success);
145 }
146#endif
147
148 for (i = n->sel.nkeys; i > 0; i--, key++) {
149 int toff = off + key->off + (off2 & key->offmask);
150 __be32 *data, hdata;
151
152 if (skb_headroom(skb) + toff > INT_MAX)
153 goto out;
154
155 data = skb_header_pointer(skb, toff, 4, &hdata);
156 if (!data)
157 goto out;
158 if ((*data ^ key->val) & key->mask) {
159 n = rcu_dereference_bh(n->next);
160 goto next_knode;
161 }
162#ifdef CONFIG_CLS_U32_PERF
163 __this_cpu_inc(n->pf->kcnts[j]);
164 j++;
165#endif
166 }
167
168 ht = rcu_dereference_bh(n->ht_down);
169 if (!ht) {
170check_terminal:
171 if (n->sel.flags & TC_U32_TERMINAL) {
172
173 *res = n->res;
174 if (!tcf_match_indev(skb, n->ifindex)) {
175 n = rcu_dereference_bh(n->next);
176 goto next_knode;
177 }
178#ifdef CONFIG_CLS_U32_PERF
179 __this_cpu_inc(n->pf->rhit);
180#endif
181 r = tcf_exts_exec(skb, &n->exts, res);
182 if (r < 0) {
183 n = rcu_dereference_bh(n->next);
184 goto next_knode;
185 }
186
187 return r;
188 }
189 n = rcu_dereference_bh(n->next);
190 goto next_knode;
191 }
192
193 /* PUSH */
194 if (sdepth >= TC_U32_MAXDEPTH)
195 goto deadloop;
196 stack[sdepth].knode = n;
197 stack[sdepth].off = off;
198 sdepth++;
199
200 ht = rcu_dereference_bh(n->ht_down);
201 sel = 0;
202 if (ht->divisor) {
203 __be32 *data, hdata;
204
205 data = skb_header_pointer(skb, off + n->sel.hoff, 4,
206 &hdata);
207 if (!data)
208 goto out;
209 sel = ht->divisor & u32_hash_fold(*data, &n->sel,
210 n->fshift);
211 }
212 if (!(n->sel.flags & (TC_U32_VAROFFSET | TC_U32_OFFSET | TC_U32_EAT)))
213 goto next_ht;
214
215 if (n->sel.flags & (TC_U32_OFFSET | TC_U32_VAROFFSET)) {
216 off2 = n->sel.off + 3;
217 if (n->sel.flags & TC_U32_VAROFFSET) {
218 __be16 *data, hdata;
219
220 data = skb_header_pointer(skb,
221 off + n->sel.offoff,
222 2, &hdata);
223 if (!data)
224 goto out;
225 off2 += ntohs(n->sel.offmask & *data) >>
226 n->sel.offshift;
227 }
228 off2 &= ~3;
229 }
230 if (n->sel.flags & TC_U32_EAT) {
231 off += off2;
232 off2 = 0;
233 }
234
235 if (off < skb->len)
236 goto next_ht;
237 }
238
239 /* POP */
240 if (sdepth--) {
241 n = stack[sdepth].knode;
242 ht = rcu_dereference_bh(n->ht_up);
243 off = stack[sdepth].off;
244 goto check_terminal;
245 }
246out:
247 return -1;
248
249deadloop:
250 net_warn_ratelimited("cls_u32: dead loop\n");
251 return -1;
252}
253
254static struct tc_u_hnode *u32_lookup_ht(struct tc_u_common *tp_c, u32 handle)
255{
256 struct tc_u_hnode *ht;
257
258 for (ht = rtnl_dereference(tp_c->hlist);
259 ht;
260 ht = rtnl_dereference(ht->next))
261 if (ht->handle == handle)
262 break;
263
264 return ht;
265}
266
267static struct tc_u_knode *u32_lookup_key(struct tc_u_hnode *ht, u32 handle)
268{
269 unsigned int sel;
270 struct tc_u_knode *n = NULL;
271
272 sel = TC_U32_HASH(handle);
273 if (sel > ht->divisor)
274 goto out;
275
276 for (n = rtnl_dereference(ht->ht[sel]);
277 n;
278 n = rtnl_dereference(n->next))
279 if (n->handle == handle)
280 break;
281out:
282 return n;
283}
284
285
286static void *u32_get(struct tcf_proto *tp, u32 handle)
287{
288 struct tc_u_hnode *ht;
289 struct tc_u_common *tp_c = tp->data;
290
291 if (TC_U32_HTID(handle) == TC_U32_ROOT)
292 ht = rtnl_dereference(tp->root);
293 else
294 ht = u32_lookup_ht(tp_c, TC_U32_HTID(handle));
295
296 if (!ht)
297 return NULL;
298
299 if (TC_U32_KEY(handle) == 0)
300 return ht;
301
302 return u32_lookup_key(ht, handle);
303}
304
305/* Protected by rtnl lock */
306static u32 gen_new_htid(struct tc_u_common *tp_c, struct tc_u_hnode *ptr)
307{
308 int id = idr_alloc_cyclic(&tp_c->handle_idr, ptr, 1, 0x7FF, GFP_KERNEL);
309 if (id < 0)
310 return 0;
311 return (id | 0x800U) << 20;
312}
313
314static struct hlist_head *tc_u_common_hash;
315
316#define U32_HASH_SHIFT 10
317#define U32_HASH_SIZE (1 << U32_HASH_SHIFT)
318
319static void *tc_u_common_ptr(const struct tcf_proto *tp)
320{
321 struct tcf_block *block = tp->chain->block;
322
323 /* The block sharing is currently supported only
324 * for classless qdiscs. In that case we use block
325 * for tc_u_common identification. In case the
326 * block is not shared, block->q is a valid pointer
327 * and we can use that. That works for classful qdiscs.
328 */
329 if (tcf_block_shared(block))
330 return block;
331 else
332 return block->q;
333}
334
335static struct hlist_head *tc_u_hash(void *key)
336{
337 return tc_u_common_hash + hash_ptr(key, U32_HASH_SHIFT);
338}
339
340static struct tc_u_common *tc_u_common_find(void *key)
341{
342 struct tc_u_common *tc;
343 hlist_for_each_entry(tc, tc_u_hash(key), hnode) {
344 if (tc->ptr == key)
345 return tc;
346 }
347 return NULL;
348}
349
350static int u32_init(struct tcf_proto *tp)
351{
352 struct tc_u_hnode *root_ht;
353 void *key = tc_u_common_ptr(tp);
354 struct tc_u_common *tp_c = tc_u_common_find(key);
355
356 root_ht = kzalloc(sizeof(*root_ht), GFP_KERNEL);
357 if (root_ht == NULL)
358 return -ENOBUFS;
359
360 root_ht->refcnt++;
361 root_ht->handle = tp_c ? gen_new_htid(tp_c, root_ht) : 0x80000000;
362 root_ht->prio = tp->prio;
363 root_ht->is_root = true;
364 idr_init(&root_ht->handle_idr);
365
366 if (tp_c == NULL) {
367 tp_c = kzalloc(sizeof(*tp_c), GFP_KERNEL);
368 if (tp_c == NULL) {
369 kfree(root_ht);
370 return -ENOBUFS;
371 }
372 tp_c->ptr = key;
373 INIT_HLIST_NODE(&tp_c->hnode);
374 idr_init(&tp_c->handle_idr);
375
376 hlist_add_head(&tp_c->hnode, tc_u_hash(key));
377 }
378
379 tp_c->refcnt++;
380 RCU_INIT_POINTER(root_ht->next, tp_c->hlist);
381 rcu_assign_pointer(tp_c->hlist, root_ht);
382
383 root_ht->refcnt++;
384 rcu_assign_pointer(tp->root, root_ht);
385 tp->data = tp_c;
386 return 0;
387}
388
389static void __u32_destroy_key(struct tc_u_knode *n)
390{
391 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
392
393 tcf_exts_destroy(&n->exts);
394 if (ht && --ht->refcnt == 0)
395 kfree(ht);
396 kfree(n);
397}
398
399static void u32_destroy_key(struct tc_u_knode *n, bool free_pf)
400{
401 tcf_exts_put_net(&n->exts);
402#ifdef CONFIG_CLS_U32_PERF
403 if (free_pf)
404 free_percpu(n->pf);
405#endif
406#ifdef CONFIG_CLS_U32_MARK
407 if (free_pf)
408 free_percpu(n->pcpu_success);
409#endif
410 __u32_destroy_key(n);
411}
412
413/* u32_delete_key_rcu should be called when free'ing a copied
414 * version of a tc_u_knode obtained from u32_init_knode(). When
415 * copies are obtained from u32_init_knode() the statistics are
416 * shared between the old and new copies to allow readers to
417 * continue to update the statistics during the copy. To support
418 * this the u32_delete_key_rcu variant does not free the percpu
419 * statistics.
420 */
421static void u32_delete_key_work(struct work_struct *work)
422{
423 struct tc_u_knode *key = container_of(to_rcu_work(work),
424 struct tc_u_knode,
425 rwork);
426 rtnl_lock();
427 u32_destroy_key(key, false);
428 rtnl_unlock();
429}
430
431/* u32_delete_key_freepf_rcu is the rcu callback variant
432 * that free's the entire structure including the statistics
433 * percpu variables. Only use this if the key is not a copy
434 * returned by u32_init_knode(). See u32_delete_key_rcu()
435 * for the variant that should be used with keys return from
436 * u32_init_knode()
437 */
438static void u32_delete_key_freepf_work(struct work_struct *work)
439{
440 struct tc_u_knode *key = container_of(to_rcu_work(work),
441 struct tc_u_knode,
442 rwork);
443 rtnl_lock();
444 u32_destroy_key(key, true);
445 rtnl_unlock();
446}
447
448static int u32_delete_key(struct tcf_proto *tp, struct tc_u_knode *key)
449{
450 struct tc_u_common *tp_c = tp->data;
451 struct tc_u_knode __rcu **kp;
452 struct tc_u_knode *pkp;
453 struct tc_u_hnode *ht = rtnl_dereference(key->ht_up);
454
455 if (ht) {
456 kp = &ht->ht[TC_U32_HASH(key->handle)];
457 for (pkp = rtnl_dereference(*kp); pkp;
458 kp = &pkp->next, pkp = rtnl_dereference(*kp)) {
459 if (pkp == key) {
460 RCU_INIT_POINTER(*kp, key->next);
461 tp_c->knodes--;
462
463 tcf_unbind_filter(tp, &key->res);
464 idr_remove(&ht->handle_idr, key->handle);
465 tcf_exts_get_net(&key->exts);
466 tcf_queue_work(&key->rwork, u32_delete_key_freepf_work);
467 return 0;
468 }
469 }
470 }
471 WARN_ON(1);
472 return 0;
473}
474
475static void u32_clear_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
476 struct netlink_ext_ack *extack)
477{
478 struct tcf_block *block = tp->chain->block;
479 struct tc_cls_u32_offload cls_u32 = {};
480
481 tc_cls_common_offload_init(&cls_u32.common, tp, h->flags, extack);
482 cls_u32.command = TC_CLSU32_DELETE_HNODE;
483 cls_u32.hnode.divisor = h->divisor;
484 cls_u32.hnode.handle = h->handle;
485 cls_u32.hnode.prio = h->prio;
486
487 tc_setup_cb_call(block, TC_SETUP_CLSU32, &cls_u32, false, true);
488}
489
490static int u32_replace_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
491 u32 flags, struct netlink_ext_ack *extack)
492{
493 struct tcf_block *block = tp->chain->block;
494 struct tc_cls_u32_offload cls_u32 = {};
495 bool skip_sw = tc_skip_sw(flags);
496 bool offloaded = false;
497 int err;
498
499 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
500 cls_u32.command = TC_CLSU32_NEW_HNODE;
501 cls_u32.hnode.divisor = h->divisor;
502 cls_u32.hnode.handle = h->handle;
503 cls_u32.hnode.prio = h->prio;
504
505 err = tc_setup_cb_call(block, TC_SETUP_CLSU32, &cls_u32, skip_sw, true);
506 if (err < 0) {
507 u32_clear_hw_hnode(tp, h, NULL);
508 return err;
509 } else if (err > 0) {
510 offloaded = true;
511 }
512
513 if (skip_sw && !offloaded)
514 return -EINVAL;
515
516 return 0;
517}
518
519static void u32_remove_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
520 struct netlink_ext_ack *extack)
521{
522 struct tcf_block *block = tp->chain->block;
523 struct tc_cls_u32_offload cls_u32 = {};
524
525 tc_cls_common_offload_init(&cls_u32.common, tp, n->flags, extack);
526 cls_u32.command = TC_CLSU32_DELETE_KNODE;
527 cls_u32.knode.handle = n->handle;
528
529 tc_setup_cb_destroy(block, tp, TC_SETUP_CLSU32, &cls_u32, false,
530 &n->flags, &n->in_hw_count, true);
531}
532
533static int u32_replace_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
534 u32 flags, struct netlink_ext_ack *extack)
535{
536 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
537 struct tcf_block *block = tp->chain->block;
538 struct tc_cls_u32_offload cls_u32 = {};
539 bool skip_sw = tc_skip_sw(flags);
540 int err;
541
542 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
543 cls_u32.command = TC_CLSU32_REPLACE_KNODE;
544 cls_u32.knode.handle = n->handle;
545 cls_u32.knode.fshift = n->fshift;
546#ifdef CONFIG_CLS_U32_MARK
547 cls_u32.knode.val = n->val;
548 cls_u32.knode.mask = n->mask;
549#else
550 cls_u32.knode.val = 0;
551 cls_u32.knode.mask = 0;
552#endif
553 cls_u32.knode.sel = &n->sel;
554 cls_u32.knode.res = &n->res;
555 cls_u32.knode.exts = &n->exts;
556 if (n->ht_down)
557 cls_u32.knode.link_handle = ht->handle;
558
559 err = tc_setup_cb_add(block, tp, TC_SETUP_CLSU32, &cls_u32, skip_sw,
560 &n->flags, &n->in_hw_count, true);
561 if (err) {
562 u32_remove_hw_knode(tp, n, NULL);
563 return err;
564 }
565
566 if (skip_sw && !(n->flags & TCA_CLS_FLAGS_IN_HW))
567 return -EINVAL;
568
569 return 0;
570}
571
572static void u32_clear_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
573 struct netlink_ext_ack *extack)
574{
575 struct tc_u_common *tp_c = tp->data;
576 struct tc_u_knode *n;
577 unsigned int h;
578
579 for (h = 0; h <= ht->divisor; h++) {
580 while ((n = rtnl_dereference(ht->ht[h])) != NULL) {
581 RCU_INIT_POINTER(ht->ht[h],
582 rtnl_dereference(n->next));
583 tp_c->knodes--;
584 tcf_unbind_filter(tp, &n->res);
585 u32_remove_hw_knode(tp, n, extack);
586 idr_remove(&ht->handle_idr, n->handle);
587 if (tcf_exts_get_net(&n->exts))
588 tcf_queue_work(&n->rwork, u32_delete_key_freepf_work);
589 else
590 u32_destroy_key(n, true);
591 }
592 }
593}
594
595static int u32_destroy_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
596 struct netlink_ext_ack *extack)
597{
598 struct tc_u_common *tp_c = tp->data;
599 struct tc_u_hnode __rcu **hn;
600 struct tc_u_hnode *phn;
601
602 WARN_ON(--ht->refcnt);
603
604 u32_clear_hnode(tp, ht, extack);
605
606 hn = &tp_c->hlist;
607 for (phn = rtnl_dereference(*hn);
608 phn;
609 hn = &phn->next, phn = rtnl_dereference(*hn)) {
610 if (phn == ht) {
611 u32_clear_hw_hnode(tp, ht, extack);
612 idr_destroy(&ht->handle_idr);
613 idr_remove(&tp_c->handle_idr, ht->handle);
614 RCU_INIT_POINTER(*hn, ht->next);
615 kfree_rcu(ht, rcu);
616 return 0;
617 }
618 }
619
620 return -ENOENT;
621}
622
623static void u32_destroy(struct tcf_proto *tp, bool rtnl_held,
624 struct netlink_ext_ack *extack)
625{
626 struct tc_u_common *tp_c = tp->data;
627 struct tc_u_hnode *root_ht = rtnl_dereference(tp->root);
628
629 WARN_ON(root_ht == NULL);
630
631 if (root_ht && --root_ht->refcnt == 1)
632 u32_destroy_hnode(tp, root_ht, extack);
633
634 if (--tp_c->refcnt == 0) {
635 struct tc_u_hnode *ht;
636
637 hlist_del(&tp_c->hnode);
638
639 while ((ht = rtnl_dereference(tp_c->hlist)) != NULL) {
640 u32_clear_hnode(tp, ht, extack);
641 RCU_INIT_POINTER(tp_c->hlist, ht->next);
642
643 /* u32_destroy_key() will later free ht for us, if it's
644 * still referenced by some knode
645 */
646 if (--ht->refcnt == 0)
647 kfree_rcu(ht, rcu);
648 }
649
650 idr_destroy(&tp_c->handle_idr);
651 kfree(tp_c);
652 }
653
654 tp->data = NULL;
655}
656
657static int u32_delete(struct tcf_proto *tp, void *arg, bool *last,
658 bool rtnl_held, struct netlink_ext_ack *extack)
659{
660 struct tc_u_hnode *ht = arg;
661 struct tc_u_common *tp_c = tp->data;
662 int ret = 0;
663
664 if (TC_U32_KEY(ht->handle)) {
665 u32_remove_hw_knode(tp, (struct tc_u_knode *)ht, extack);
666 ret = u32_delete_key(tp, (struct tc_u_knode *)ht);
667 goto out;
668 }
669
670 if (ht->is_root) {
671 NL_SET_ERR_MSG_MOD(extack, "Not allowed to delete root node");
672 return -EINVAL;
673 }
674
675 if (ht->refcnt == 1) {
676 u32_destroy_hnode(tp, ht, extack);
677 } else {
678 NL_SET_ERR_MSG_MOD(extack, "Can not delete in-use filter");
679 return -EBUSY;
680 }
681
682out:
683 *last = tp_c->refcnt == 1 && tp_c->knodes == 0;
684 return ret;
685}
686
687static u32 gen_new_kid(struct tc_u_hnode *ht, u32 htid)
688{
689 u32 index = htid | 0x800;
690 u32 max = htid | 0xFFF;
691
692 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max, GFP_KERNEL)) {
693 index = htid + 1;
694 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max,
695 GFP_KERNEL))
696 index = max;
697 }
698
699 return index;
700}
701
702static const struct nla_policy u32_policy[TCA_U32_MAX + 1] = {
703 [TCA_U32_CLASSID] = { .type = NLA_U32 },
704 [TCA_U32_HASH] = { .type = NLA_U32 },
705 [TCA_U32_LINK] = { .type = NLA_U32 },
706 [TCA_U32_DIVISOR] = { .type = NLA_U32 },
707 [TCA_U32_SEL] = { .len = sizeof(struct tc_u32_sel) },
708 [TCA_U32_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ },
709 [TCA_U32_MARK] = { .len = sizeof(struct tc_u32_mark) },
710 [TCA_U32_FLAGS] = { .type = NLA_U32 },
711};
712
713static int u32_set_parms(struct net *net, struct tcf_proto *tp,
714 unsigned long base,
715 struct tc_u_knode *n, struct nlattr **tb,
716 struct nlattr *est, bool ovr,
717 struct netlink_ext_ack *extack)
718{
719 int err, ifindex = -1;
720
721 err = tcf_exts_validate(net, tp, tb, est, &n->exts, ovr, true, extack);
722 if (err < 0)
723 return err;
724
725 if (tb[TCA_U32_INDEV]) {
726 ifindex = tcf_change_indev(net, tb[TCA_U32_INDEV], extack);
727 if (ifindex < 0)
728 return -EINVAL;
729 }
730
731 if (tb[TCA_U32_LINK]) {
732 u32 handle = nla_get_u32(tb[TCA_U32_LINK]);
733 struct tc_u_hnode *ht_down = NULL, *ht_old;
734
735 if (TC_U32_KEY(handle)) {
736 NL_SET_ERR_MSG_MOD(extack, "u32 Link handle must be a hash table");
737 return -EINVAL;
738 }
739
740 if (handle) {
741 ht_down = u32_lookup_ht(tp->data, handle);
742
743 if (!ht_down) {
744 NL_SET_ERR_MSG_MOD(extack, "Link hash table not found");
745 return -EINVAL;
746 }
747 if (ht_down->is_root) {
748 NL_SET_ERR_MSG_MOD(extack, "Not linking to root node");
749 return -EINVAL;
750 }
751 ht_down->refcnt++;
752 }
753
754 ht_old = rtnl_dereference(n->ht_down);
755 rcu_assign_pointer(n->ht_down, ht_down);
756
757 if (ht_old)
758 ht_old->refcnt--;
759 }
760 if (tb[TCA_U32_CLASSID]) {
761 n->res.classid = nla_get_u32(tb[TCA_U32_CLASSID]);
762 tcf_bind_filter(tp, &n->res, base);
763 }
764
765 if (ifindex >= 0)
766 n->ifindex = ifindex;
767
768 return 0;
769}
770
771static void u32_replace_knode(struct tcf_proto *tp, struct tc_u_common *tp_c,
772 struct tc_u_knode *n)
773{
774 struct tc_u_knode __rcu **ins;
775 struct tc_u_knode *pins;
776 struct tc_u_hnode *ht;
777
778 if (TC_U32_HTID(n->handle) == TC_U32_ROOT)
779 ht = rtnl_dereference(tp->root);
780 else
781 ht = u32_lookup_ht(tp_c, TC_U32_HTID(n->handle));
782
783 ins = &ht->ht[TC_U32_HASH(n->handle)];
784
785 /* The node must always exist for it to be replaced if this is not the
786 * case then something went very wrong elsewhere.
787 */
788 for (pins = rtnl_dereference(*ins); ;
789 ins = &pins->next, pins = rtnl_dereference(*ins))
790 if (pins->handle == n->handle)
791 break;
792
793 idr_replace(&ht->handle_idr, n, n->handle);
794 RCU_INIT_POINTER(n->next, pins->next);
795 rcu_assign_pointer(*ins, n);
796}
797
798static struct tc_u_knode *u32_init_knode(struct net *net, struct tcf_proto *tp,
799 struct tc_u_knode *n)
800{
801 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
802 struct tc_u32_sel *s = &n->sel;
803 struct tc_u_knode *new;
804
805 new = kzalloc(sizeof(*n) + s->nkeys*sizeof(struct tc_u32_key),
806 GFP_KERNEL);
807
808 if (!new)
809 return NULL;
810
811 RCU_INIT_POINTER(new->next, n->next);
812 new->handle = n->handle;
813 RCU_INIT_POINTER(new->ht_up, n->ht_up);
814
815 new->ifindex = n->ifindex;
816 new->fshift = n->fshift;
817 new->flags = n->flags;
818 RCU_INIT_POINTER(new->ht_down, ht);
819
820#ifdef CONFIG_CLS_U32_PERF
821 /* Statistics may be incremented by readers during update
822 * so we must keep them in tact. When the node is later destroyed
823 * a special destroy call must be made to not free the pf memory.
824 */
825 new->pf = n->pf;
826#endif
827
828#ifdef CONFIG_CLS_U32_MARK
829 new->val = n->val;
830 new->mask = n->mask;
831 /* Similarly success statistics must be moved as pointers */
832 new->pcpu_success = n->pcpu_success;
833#endif
834 memcpy(&new->sel, s, struct_size(s, keys, s->nkeys));
835
836 if (tcf_exts_init(&new->exts, net, TCA_U32_ACT, TCA_U32_POLICE)) {
837 kfree(new);
838 return NULL;
839 }
840
841 /* bump reference count as long as we hold pointer to structure */
842 if (ht)
843 ht->refcnt++;
844
845 return new;
846}
847
848static int u32_change(struct net *net, struct sk_buff *in_skb,
849 struct tcf_proto *tp, unsigned long base, u32 handle,
850 struct nlattr **tca, void **arg, bool ovr, bool rtnl_held,
851 struct netlink_ext_ack *extack)
852{
853 struct tc_u_common *tp_c = tp->data;
854 struct tc_u_hnode *ht;
855 struct tc_u_knode *n;
856 struct tc_u32_sel *s;
857 struct nlattr *opt = tca[TCA_OPTIONS];
858 struct nlattr *tb[TCA_U32_MAX + 1];
859 u32 htid, flags = 0;
860 size_t sel_size;
861 int err;
862#ifdef CONFIG_CLS_U32_PERF
863 size_t size;
864#endif
865
866 if (!opt) {
867 if (handle) {
868 NL_SET_ERR_MSG_MOD(extack, "Filter handle requires options");
869 return -EINVAL;
870 } else {
871 return 0;
872 }
873 }
874
875 err = nla_parse_nested_deprecated(tb, TCA_U32_MAX, opt, u32_policy,
876 extack);
877 if (err < 0)
878 return err;
879
880 if (tb[TCA_U32_FLAGS]) {
881 flags = nla_get_u32(tb[TCA_U32_FLAGS]);
882 if (!tc_flags_valid(flags)) {
883 NL_SET_ERR_MSG_MOD(extack, "Invalid filter flags");
884 return -EINVAL;
885 }
886 }
887
888 n = *arg;
889 if (n) {
890 struct tc_u_knode *new;
891
892 if (TC_U32_KEY(n->handle) == 0) {
893 NL_SET_ERR_MSG_MOD(extack, "Key node id cannot be zero");
894 return -EINVAL;
895 }
896
897 if ((n->flags ^ flags) &
898 ~(TCA_CLS_FLAGS_IN_HW | TCA_CLS_FLAGS_NOT_IN_HW)) {
899 NL_SET_ERR_MSG_MOD(extack, "Key node flags do not match passed flags");
900 return -EINVAL;
901 }
902
903 new = u32_init_knode(net, tp, n);
904 if (!new)
905 return -ENOMEM;
906
907 err = u32_set_parms(net, tp, base, new, tb,
908 tca[TCA_RATE], ovr, extack);
909
910 if (err) {
911 __u32_destroy_key(new);
912 return err;
913 }
914
915 err = u32_replace_hw_knode(tp, new, flags, extack);
916 if (err) {
917 __u32_destroy_key(new);
918 return err;
919 }
920
921 if (!tc_in_hw(new->flags))
922 new->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
923
924 u32_replace_knode(tp, tp_c, new);
925 tcf_unbind_filter(tp, &n->res);
926 tcf_exts_get_net(&n->exts);
927 tcf_queue_work(&n->rwork, u32_delete_key_work);
928 return 0;
929 }
930
931 if (tb[TCA_U32_DIVISOR]) {
932 unsigned int divisor = nla_get_u32(tb[TCA_U32_DIVISOR]);
933
934 if (!is_power_of_2(divisor)) {
935 NL_SET_ERR_MSG_MOD(extack, "Divisor is not a power of 2");
936 return -EINVAL;
937 }
938 if (divisor-- > 0x100) {
939 NL_SET_ERR_MSG_MOD(extack, "Exceeded maximum 256 hash buckets");
940 return -EINVAL;
941 }
942 if (TC_U32_KEY(handle)) {
943 NL_SET_ERR_MSG_MOD(extack, "Divisor can only be used on a hash table");
944 return -EINVAL;
945 }
946 ht = kzalloc(sizeof(*ht) + divisor*sizeof(void *), GFP_KERNEL);
947 if (ht == NULL)
948 return -ENOBUFS;
949 if (handle == 0) {
950 handle = gen_new_htid(tp->data, ht);
951 if (handle == 0) {
952 kfree(ht);
953 return -ENOMEM;
954 }
955 } else {
956 err = idr_alloc_u32(&tp_c->handle_idr, ht, &handle,
957 handle, GFP_KERNEL);
958 if (err) {
959 kfree(ht);
960 return err;
961 }
962 }
963 ht->refcnt = 1;
964 ht->divisor = divisor;
965 ht->handle = handle;
966 ht->prio = tp->prio;
967 idr_init(&ht->handle_idr);
968 ht->flags = flags;
969
970 err = u32_replace_hw_hnode(tp, ht, flags, extack);
971 if (err) {
972 idr_remove(&tp_c->handle_idr, handle);
973 kfree(ht);
974 return err;
975 }
976
977 RCU_INIT_POINTER(ht->next, tp_c->hlist);
978 rcu_assign_pointer(tp_c->hlist, ht);
979 *arg = ht;
980
981 return 0;
982 }
983
984 if (tb[TCA_U32_HASH]) {
985 htid = nla_get_u32(tb[TCA_U32_HASH]);
986 if (TC_U32_HTID(htid) == TC_U32_ROOT) {
987 ht = rtnl_dereference(tp->root);
988 htid = ht->handle;
989 } else {
990 ht = u32_lookup_ht(tp->data, TC_U32_HTID(htid));
991 if (!ht) {
992 NL_SET_ERR_MSG_MOD(extack, "Specified hash table not found");
993 return -EINVAL;
994 }
995 }
996 } else {
997 ht = rtnl_dereference(tp->root);
998 htid = ht->handle;
999 }
1000
1001 if (ht->divisor < TC_U32_HASH(htid)) {
1002 NL_SET_ERR_MSG_MOD(extack, "Specified hash table buckets exceed configured value");
1003 return -EINVAL;
1004 }
1005
1006 /* At this point, we need to derive the new handle that will be used to
1007 * uniquely map the identity of this table match entry. The
1008 * identity of the entry that we need to construct is 32 bits made of:
1009 * htid(12b):bucketid(8b):node/entryid(12b)
1010 *
1011 * At this point _we have the table(ht)_ in which we will insert this
1012 * entry. We carry the table's id in variable "htid".
1013 * Note that earlier code picked the ht selection either by a) the user
1014 * providing the htid specified via TCA_U32_HASH attribute or b) when
1015 * no such attribute is passed then the root ht, is default to at ID
1016 * 0x[800][00][000]. Rule: the root table has a single bucket with ID 0.
1017 * If OTOH the user passed us the htid, they may also pass a bucketid of
1018 * choice. 0 is fine. For example a user htid is 0x[600][01][000] it is
1019 * indicating hash bucketid of 1. Rule: the entry/node ID _cannot_ be
1020 * passed via the htid, so even if it was non-zero it will be ignored.
1021 *
1022 * We may also have a handle, if the user passed one. The handle also
1023 * carries the same addressing of htid(12b):bucketid(8b):node/entryid(12b).
1024 * Rule: the bucketid on the handle is ignored even if one was passed;
1025 * rather the value on "htid" is always assumed to be the bucketid.
1026 */
1027 if (handle) {
1028 /* Rule: The htid from handle and tableid from htid must match */
1029 if (TC_U32_HTID(handle) && TC_U32_HTID(handle ^ htid)) {
1030 NL_SET_ERR_MSG_MOD(extack, "Handle specified hash table address mismatch");
1031 return -EINVAL;
1032 }
1033 /* Ok, so far we have a valid htid(12b):bucketid(8b) but we
1034 * need to finalize the table entry identification with the last
1035 * part - the node/entryid(12b)). Rule: Nodeid _cannot be 0_ for
1036 * entries. Rule: nodeid of 0 is reserved only for tables(see
1037 * earlier code which processes TC_U32_DIVISOR attribute).
1038 * Rule: The nodeid can only be derived from the handle (and not
1039 * htid).
1040 * Rule: if the handle specified zero for the node id example
1041 * 0x60000000, then pick a new nodeid from the pool of IDs
1042 * this hash table has been allocating from.
1043 * If OTOH it is specified (i.e for example the user passed a
1044 * handle such as 0x60000123), then we use it generate our final
1045 * handle which is used to uniquely identify the match entry.
1046 */
1047 if (!TC_U32_NODE(handle)) {
1048 handle = gen_new_kid(ht, htid);
1049 } else {
1050 handle = htid | TC_U32_NODE(handle);
1051 err = idr_alloc_u32(&ht->handle_idr, NULL, &handle,
1052 handle, GFP_KERNEL);
1053 if (err)
1054 return err;
1055 }
1056 } else {
1057 /* The user did not give us a handle; lets just generate one
1058 * from the table's pool of nodeids.
1059 */
1060 handle = gen_new_kid(ht, htid);
1061 }
1062
1063 if (tb[TCA_U32_SEL] == NULL) {
1064 NL_SET_ERR_MSG_MOD(extack, "Selector not specified");
1065 err = -EINVAL;
1066 goto erridr;
1067 }
1068
1069 s = nla_data(tb[TCA_U32_SEL]);
1070 sel_size = struct_size(s, keys, s->nkeys);
1071 if (nla_len(tb[TCA_U32_SEL]) < sel_size) {
1072 err = -EINVAL;
1073 goto erridr;
1074 }
1075
1076 n = kzalloc(offsetof(typeof(*n), sel) + sel_size, GFP_KERNEL);
1077 if (n == NULL) {
1078 err = -ENOBUFS;
1079 goto erridr;
1080 }
1081
1082#ifdef CONFIG_CLS_U32_PERF
1083 size = sizeof(struct tc_u32_pcnt) + s->nkeys * sizeof(u64);
1084 n->pf = __alloc_percpu(size, __alignof__(struct tc_u32_pcnt));
1085 if (!n->pf) {
1086 err = -ENOBUFS;
1087 goto errfree;
1088 }
1089#endif
1090
1091 memcpy(&n->sel, s, sel_size);
1092 RCU_INIT_POINTER(n->ht_up, ht);
1093 n->handle = handle;
1094 n->fshift = s->hmask ? ffs(ntohl(s->hmask)) - 1 : 0;
1095 n->flags = flags;
1096
1097 err = tcf_exts_init(&n->exts, net, TCA_U32_ACT, TCA_U32_POLICE);
1098 if (err < 0)
1099 goto errout;
1100
1101#ifdef CONFIG_CLS_U32_MARK
1102 n->pcpu_success = alloc_percpu(u32);
1103 if (!n->pcpu_success) {
1104 err = -ENOMEM;
1105 goto errout;
1106 }
1107
1108 if (tb[TCA_U32_MARK]) {
1109 struct tc_u32_mark *mark;
1110
1111 mark = nla_data(tb[TCA_U32_MARK]);
1112 n->val = mark->val;
1113 n->mask = mark->mask;
1114 }
1115#endif
1116
1117 err = u32_set_parms(net, tp, base, n, tb, tca[TCA_RATE], ovr,
1118 extack);
1119 if (err == 0) {
1120 struct tc_u_knode __rcu **ins;
1121 struct tc_u_knode *pins;
1122
1123 err = u32_replace_hw_knode(tp, n, flags, extack);
1124 if (err)
1125 goto errhw;
1126
1127 if (!tc_in_hw(n->flags))
1128 n->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
1129
1130 ins = &ht->ht[TC_U32_HASH(handle)];
1131 for (pins = rtnl_dereference(*ins); pins;
1132 ins = &pins->next, pins = rtnl_dereference(*ins))
1133 if (TC_U32_NODE(handle) < TC_U32_NODE(pins->handle))
1134 break;
1135
1136 RCU_INIT_POINTER(n->next, pins);
1137 rcu_assign_pointer(*ins, n);
1138 tp_c->knodes++;
1139 *arg = n;
1140 return 0;
1141 }
1142
1143errhw:
1144#ifdef CONFIG_CLS_U32_MARK
1145 free_percpu(n->pcpu_success);
1146#endif
1147
1148errout:
1149 tcf_exts_destroy(&n->exts);
1150#ifdef CONFIG_CLS_U32_PERF
1151errfree:
1152 free_percpu(n->pf);
1153#endif
1154 kfree(n);
1155erridr:
1156 idr_remove(&ht->handle_idr, handle);
1157 return err;
1158}
1159
1160static void u32_walk(struct tcf_proto *tp, struct tcf_walker *arg,
1161 bool rtnl_held)
1162{
1163 struct tc_u_common *tp_c = tp->data;
1164 struct tc_u_hnode *ht;
1165 struct tc_u_knode *n;
1166 unsigned int h;
1167
1168 if (arg->stop)
1169 return;
1170
1171 for (ht = rtnl_dereference(tp_c->hlist);
1172 ht;
1173 ht = rtnl_dereference(ht->next)) {
1174 if (ht->prio != tp->prio)
1175 continue;
1176 if (arg->count >= arg->skip) {
1177 if (arg->fn(tp, ht, arg) < 0) {
1178 arg->stop = 1;
1179 return;
1180 }
1181 }
1182 arg->count++;
1183 for (h = 0; h <= ht->divisor; h++) {
1184 for (n = rtnl_dereference(ht->ht[h]);
1185 n;
1186 n = rtnl_dereference(n->next)) {
1187 if (arg->count < arg->skip) {
1188 arg->count++;
1189 continue;
1190 }
1191 if (arg->fn(tp, n, arg) < 0) {
1192 arg->stop = 1;
1193 return;
1194 }
1195 arg->count++;
1196 }
1197 }
1198 }
1199}
1200
1201static int u32_reoffload_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
1202 bool add, flow_setup_cb_t *cb, void *cb_priv,
1203 struct netlink_ext_ack *extack)
1204{
1205 struct tc_cls_u32_offload cls_u32 = {};
1206 int err;
1207
1208 tc_cls_common_offload_init(&cls_u32.common, tp, ht->flags, extack);
1209 cls_u32.command = add ? TC_CLSU32_NEW_HNODE : TC_CLSU32_DELETE_HNODE;
1210 cls_u32.hnode.divisor = ht->divisor;
1211 cls_u32.hnode.handle = ht->handle;
1212 cls_u32.hnode.prio = ht->prio;
1213
1214 err = cb(TC_SETUP_CLSU32, &cls_u32, cb_priv);
1215 if (err && add && tc_skip_sw(ht->flags))
1216 return err;
1217
1218 return 0;
1219}
1220
1221static int u32_reoffload_knode(struct tcf_proto *tp, struct tc_u_knode *n,
1222 bool add, flow_setup_cb_t *cb, void *cb_priv,
1223 struct netlink_ext_ack *extack)
1224{
1225 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
1226 struct tcf_block *block = tp->chain->block;
1227 struct tc_cls_u32_offload cls_u32 = {};
1228 int err;
1229
1230 tc_cls_common_offload_init(&cls_u32.common, tp, n->flags, extack);
1231 cls_u32.command = add ?
1232 TC_CLSU32_REPLACE_KNODE : TC_CLSU32_DELETE_KNODE;
1233 cls_u32.knode.handle = n->handle;
1234
1235 if (add) {
1236 cls_u32.knode.fshift = n->fshift;
1237#ifdef CONFIG_CLS_U32_MARK
1238 cls_u32.knode.val = n->val;
1239 cls_u32.knode.mask = n->mask;
1240#else
1241 cls_u32.knode.val = 0;
1242 cls_u32.knode.mask = 0;
1243#endif
1244 cls_u32.knode.sel = &n->sel;
1245 cls_u32.knode.res = &n->res;
1246 cls_u32.knode.exts = &n->exts;
1247 if (n->ht_down)
1248 cls_u32.knode.link_handle = ht->handle;
1249 }
1250
1251 err = tc_setup_cb_reoffload(block, tp, add, cb, TC_SETUP_CLSU32,
1252 &cls_u32, cb_priv, &n->flags,
1253 &n->in_hw_count);
1254 if (err)
1255 return err;
1256
1257 return 0;
1258}
1259
1260static int u32_reoffload(struct tcf_proto *tp, bool add, flow_setup_cb_t *cb,
1261 void *cb_priv, struct netlink_ext_ack *extack)
1262{
1263 struct tc_u_common *tp_c = tp->data;
1264 struct tc_u_hnode *ht;
1265 struct tc_u_knode *n;
1266 unsigned int h;
1267 int err;
1268
1269 for (ht = rtnl_dereference(tp_c->hlist);
1270 ht;
1271 ht = rtnl_dereference(ht->next)) {
1272 if (ht->prio != tp->prio)
1273 continue;
1274
1275 /* When adding filters to a new dev, try to offload the
1276 * hashtable first. When removing, do the filters before the
1277 * hashtable.
1278 */
1279 if (add && !tc_skip_hw(ht->flags)) {
1280 err = u32_reoffload_hnode(tp, ht, add, cb, cb_priv,
1281 extack);
1282 if (err)
1283 return err;
1284 }
1285
1286 for (h = 0; h <= ht->divisor; h++) {
1287 for (n = rtnl_dereference(ht->ht[h]);
1288 n;
1289 n = rtnl_dereference(n->next)) {
1290 if (tc_skip_hw(n->flags))
1291 continue;
1292
1293 err = u32_reoffload_knode(tp, n, add, cb,
1294 cb_priv, extack);
1295 if (err)
1296 return err;
1297 }
1298 }
1299
1300 if (!add && !tc_skip_hw(ht->flags))
1301 u32_reoffload_hnode(tp, ht, add, cb, cb_priv, extack);
1302 }
1303
1304 return 0;
1305}
1306
1307static void u32_bind_class(void *fh, u32 classid, unsigned long cl, void *q,
1308 unsigned long base)
1309{
1310 struct tc_u_knode *n = fh;
1311
1312 if (n && n->res.classid == classid) {
1313 if (cl)
1314 __tcf_bind_filter(q, &n->res, base);
1315 else
1316 __tcf_unbind_filter(q, &n->res);
1317 }
1318}
1319
1320static int u32_dump(struct net *net, struct tcf_proto *tp, void *fh,
1321 struct sk_buff *skb, struct tcmsg *t, bool rtnl_held)
1322{
1323 struct tc_u_knode *n = fh;
1324 struct tc_u_hnode *ht_up, *ht_down;
1325 struct nlattr *nest;
1326
1327 if (n == NULL)
1328 return skb->len;
1329
1330 t->tcm_handle = n->handle;
1331
1332 nest = nla_nest_start_noflag(skb, TCA_OPTIONS);
1333 if (nest == NULL)
1334 goto nla_put_failure;
1335
1336 if (TC_U32_KEY(n->handle) == 0) {
1337 struct tc_u_hnode *ht = fh;
1338 u32 divisor = ht->divisor + 1;
1339
1340 if (nla_put_u32(skb, TCA_U32_DIVISOR, divisor))
1341 goto nla_put_failure;
1342 } else {
1343#ifdef CONFIG_CLS_U32_PERF
1344 struct tc_u32_pcnt *gpf;
1345 int cpu;
1346#endif
1347
1348 if (nla_put(skb, TCA_U32_SEL,
1349 sizeof(n->sel) + n->sel.nkeys*sizeof(struct tc_u32_key),
1350 &n->sel))
1351 goto nla_put_failure;
1352
1353 ht_up = rtnl_dereference(n->ht_up);
1354 if (ht_up) {
1355 u32 htid = n->handle & 0xFFFFF000;
1356 if (nla_put_u32(skb, TCA_U32_HASH, htid))
1357 goto nla_put_failure;
1358 }
1359 if (n->res.classid &&
1360 nla_put_u32(skb, TCA_U32_CLASSID, n->res.classid))
1361 goto nla_put_failure;
1362
1363 ht_down = rtnl_dereference(n->ht_down);
1364 if (ht_down &&
1365 nla_put_u32(skb, TCA_U32_LINK, ht_down->handle))
1366 goto nla_put_failure;
1367
1368 if (n->flags && nla_put_u32(skb, TCA_U32_FLAGS, n->flags))
1369 goto nla_put_failure;
1370
1371#ifdef CONFIG_CLS_U32_MARK
1372 if ((n->val || n->mask)) {
1373 struct tc_u32_mark mark = {.val = n->val,
1374 .mask = n->mask,
1375 .success = 0};
1376 int cpum;
1377
1378 for_each_possible_cpu(cpum) {
1379 __u32 cnt = *per_cpu_ptr(n->pcpu_success, cpum);
1380
1381 mark.success += cnt;
1382 }
1383
1384 if (nla_put(skb, TCA_U32_MARK, sizeof(mark), &mark))
1385 goto nla_put_failure;
1386 }
1387#endif
1388
1389 if (tcf_exts_dump(skb, &n->exts) < 0)
1390 goto nla_put_failure;
1391
1392 if (n->ifindex) {
1393 struct net_device *dev;
1394 dev = __dev_get_by_index(net, n->ifindex);
1395 if (dev && nla_put_string(skb, TCA_U32_INDEV, dev->name))
1396 goto nla_put_failure;
1397 }
1398#ifdef CONFIG_CLS_U32_PERF
1399 gpf = kzalloc(sizeof(struct tc_u32_pcnt) +
1400 n->sel.nkeys * sizeof(u64),
1401 GFP_KERNEL);
1402 if (!gpf)
1403 goto nla_put_failure;
1404
1405 for_each_possible_cpu(cpu) {
1406 int i;
1407 struct tc_u32_pcnt *pf = per_cpu_ptr(n->pf, cpu);
1408
1409 gpf->rcnt += pf->rcnt;
1410 gpf->rhit += pf->rhit;
1411 for (i = 0; i < n->sel.nkeys; i++)
1412 gpf->kcnts[i] += pf->kcnts[i];
1413 }
1414
1415 if (nla_put_64bit(skb, TCA_U32_PCNT,
1416 sizeof(struct tc_u32_pcnt) +
1417 n->sel.nkeys * sizeof(u64),
1418 gpf, TCA_U32_PAD)) {
1419 kfree(gpf);
1420 goto nla_put_failure;
1421 }
1422 kfree(gpf);
1423#endif
1424 }
1425
1426 nla_nest_end(skb, nest);
1427
1428 if (TC_U32_KEY(n->handle))
1429 if (tcf_exts_dump_stats(skb, &n->exts) < 0)
1430 goto nla_put_failure;
1431 return skb->len;
1432
1433nla_put_failure:
1434 nla_nest_cancel(skb, nest);
1435 return -1;
1436}
1437
1438static struct tcf_proto_ops cls_u32_ops __read_mostly = {
1439 .kind = "u32",
1440 .classify = u32_classify,
1441 .init = u32_init,
1442 .destroy = u32_destroy,
1443 .get = u32_get,
1444 .change = u32_change,
1445 .delete = u32_delete,
1446 .walk = u32_walk,
1447 .reoffload = u32_reoffload,
1448 .dump = u32_dump,
1449 .bind_class = u32_bind_class,
1450 .owner = THIS_MODULE,
1451};
1452
1453static int __init init_u32(void)
1454{
1455 int i, ret;
1456
1457 pr_info("u32 classifier\n");
1458#ifdef CONFIG_CLS_U32_PERF
1459 pr_info(" Performance counters on\n");
1460#endif
1461 pr_info(" input device check on\n");
1462#ifdef CONFIG_NET_CLS_ACT
1463 pr_info(" Actions configured\n");
1464#endif
1465 tc_u_common_hash = kvmalloc_array(U32_HASH_SIZE,
1466 sizeof(struct hlist_head),
1467 GFP_KERNEL);
1468 if (!tc_u_common_hash)
1469 return -ENOMEM;
1470
1471 for (i = 0; i < U32_HASH_SIZE; i++)
1472 INIT_HLIST_HEAD(&tc_u_common_hash[i]);
1473
1474 ret = register_tcf_proto_ops(&cls_u32_ops);
1475 if (ret)
1476 kvfree(tc_u_common_hash);
1477 return ret;
1478}
1479
1480static void __exit exit_u32(void)
1481{
1482 unregister_tcf_proto_ops(&cls_u32_ops);
1483 kvfree(tc_u_common_hash);
1484}
1485
1486module_init(init_u32)
1487module_exit(exit_u32)
1488MODULE_LICENSE("GPL");