Merge tag 'perf-tools-fixes-for-v6.4-1-2023-05-20' of git://git.kernel.org/pub/scm...
[linux-block.git] / net / sched / act_gact.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4 2/*
0c6965dd 3 * net/sched/act_gact.c Generic actions
1da177e4 4 *
1da177e4 5 * copyright Jamal Hadi Salim (2002-4)
1da177e4
LT
6 */
7
1da177e4
LT
8#include <linux/types.h>
9#include <linux/kernel.h>
1da177e4 10#include <linux/string.h>
1da177e4 11#include <linux/errno.h>
1da177e4
LT
12#include <linux/skbuff.h>
13#include <linux/rtnetlink.h>
14#include <linux/module.h>
15#include <linux/init.h>
dc5fc579 16#include <net/netlink.h>
1da177e4 17#include <net/pkt_sched.h>
0da2dbd6 18#include <net/pkt_cls.h>
1da177e4
LT
19#include <linux/tc_act/tc_gact.h>
20#include <net/tc_act/tc_gact.h>
871cf386 21#include <net/tc_wrapper.h>
1da177e4 22
a85a970a 23static struct tc_action_ops act_gact_ops;
ddf97ccd 24
1da177e4 25#ifdef CONFIG_GACT_PROB
e9ce1cd3 26static int gact_net_rand(struct tcf_gact *gact)
1da177e4 27{
cef5ecf9 28 smp_rmb(); /* coupled with smp_wmb() in tcf_gact_init() */
8032bf12 29 if (get_random_u32_below(gact->tcfg_pval))
e9ce1cd3
DM
30 return gact->tcf_action;
31 return gact->tcfg_paction;
1da177e4
LT
32}
33
e9ce1cd3 34static int gact_determ(struct tcf_gact *gact)
1da177e4 35{
cc6510a9
ED
36 u32 pack = atomic_inc_return(&gact->packets);
37
cef5ecf9 38 smp_rmb(); /* coupled with smp_wmb() in tcf_gact_init() */
cc6510a9 39 if (pack % gact->tcfg_pval)
e9ce1cd3
DM
40 return gact->tcf_action;
41 return gact->tcfg_paction;
1da177e4
LT
42}
43
e9ce1cd3 44typedef int (*g_rand)(struct tcf_gact *gact);
cc7ec456 45static g_rand gact_rand[MAX_RAND] = { NULL, gact_net_rand, gact_determ };
e9ce1cd3 46#endif /* CONFIG_GACT_PROB */
1da177e4 47
53b2bf3f
PM
48static const struct nla_policy gact_policy[TCA_GACT_MAX + 1] = {
49 [TCA_GACT_PARMS] = { .len = sizeof(struct tc_gact) },
50 [TCA_GACT_PROB] = { .len = sizeof(struct tc_gact_p) },
51};
52
c1b52739 53static int tcf_gact_init(struct net *net, struct nlattr *nla,
a85a970a 54 struct nlattr *est, struct tc_action **a,
abbb0d33
VB
55 struct tcf_proto *tp, u32 flags,
56 struct netlink_ext_ack *extack)
1da177e4 57{
acd0a7ab 58 struct tc_action_net *tn = net_generic(net, act_gact_ops.net_id);
695176bf 59 bool bind = flags & TCA_ACT_FLAGS_BIND;
7ba699c6 60 struct nlattr *tb[TCA_GACT_MAX + 1];
0da2dbd6 61 struct tcf_chain *goto_ch = NULL;
1da177e4 62 struct tc_gact *parm;
e9ce1cd3 63 struct tcf_gact *gact;
1da177e4 64 int ret = 0;
7be8ef2c 65 u32 index;
cee63723 66 int err;
696ecdc1
HS
67#ifdef CONFIG_GACT_PROB
68 struct tc_gact_p *p_parm = NULL;
69#endif
1da177e4 70
cee63723 71 if (nla == NULL)
1da177e4
LT
72 return -EINVAL;
73
8cb08174
JB
74 err = nla_parse_nested_deprecated(tb, TCA_GACT_MAX, nla, gact_policy,
75 NULL);
cee63723
PM
76 if (err < 0)
77 return err;
78
53b2bf3f 79 if (tb[TCA_GACT_PARMS] == NULL)
1da177e4 80 return -EINVAL;
7ba699c6 81 parm = nla_data(tb[TCA_GACT_PARMS]);
7be8ef2c 82 index = parm->index;
1da177e4 83
53b2bf3f 84#ifndef CONFIG_GACT_PROB
7ba699c6 85 if (tb[TCA_GACT_PROB] != NULL)
1da177e4 86 return -EOPNOTSUPP;
696ecdc1
HS
87#else
88 if (tb[TCA_GACT_PROB]) {
89 p_parm = nla_data(tb[TCA_GACT_PROB]);
90 if (p_parm->ptype >= MAX_RAND)
91 return -EINVAL;
9469f375
DC
92 if (TC_ACT_EXT_CMP(p_parm->paction, TC_ACT_GOTO_CHAIN)) {
93 NL_SET_ERR_MSG(extack,
94 "goto chain not allowed on fallback");
95 return -EINVAL;
96 }
696ecdc1 97 }
1da177e4
LT
98#endif
99
7be8ef2c 100 err = tcf_idr_check_alloc(tn, &index, a, bind);
0190c1d4 101 if (!err) {
e3822678
VB
102 ret = tcf_idr_create_from_flags(tn, index, est, a,
103 &act_gact_ops, bind, flags);
0190c1d4 104 if (ret) {
7be8ef2c 105 tcf_idr_cleanup(tn, index);
86062033 106 return ret;
0190c1d4 107 }
1da177e4 108 ret = ACT_P_CREATED;
0190c1d4 109 } else if (err > 0) {
1a29321e
JHS
110 if (bind)/* dont override defaults */
111 return 0;
695176bf 112 if (!(flags & TCA_ACT_FLAGS_REPLACE)) {
4e8ddd7f 113 tcf_idr_release(*a, bind);
1da177e4 114 return -EEXIST;
4e8ddd7f 115 }
0190c1d4
VB
116 } else {
117 return err;
1da177e4
LT
118 }
119
0da2dbd6
DC
120 err = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack);
121 if (err < 0)
122 goto release_idr;
a85a970a 123 gact = to_gact(*a);
e9ce1cd3 124
653cd284 125 spin_lock_bh(&gact->tcf_lock);
0da2dbd6 126 goto_ch = tcf_action_set_ctrlact(*a, parm->action, goto_ch);
1da177e4 127#ifdef CONFIG_GACT_PROB
696ecdc1 128 if (p_parm) {
e9ce1cd3 129 gact->tcfg_paction = p_parm->paction;
cef5ecf9
ED
130 gact->tcfg_pval = max_t(u16, 1, p_parm->pval);
131 /* Make sure tcfg_pval is written before tcfg_ptype
132 * coupled with smp_rmb() in gact_net_rand() & gact_determ()
133 */
134 smp_wmb();
e9ce1cd3 135 gact->tcfg_ptype = p_parm->ptype;
1da177e4
LT
136 }
137#endif
653cd284 138 spin_unlock_bh(&gact->tcf_lock);
e8917f43 139
0da2dbd6
DC
140 if (goto_ch)
141 tcf_chain_put_by_act(goto_ch);
142
1da177e4 143 return ret;
0da2dbd6
DC
144release_idr:
145 tcf_idr_release(*a, bind);
146 return err;
1da177e4
LT
147}
148
871cf386
PT
149TC_INDIRECT_SCOPE int tcf_gact_act(struct sk_buff *skb,
150 const struct tc_action *a,
151 struct tcf_result *res)
1da177e4 152{
a85a970a 153 struct tcf_gact *gact = to_gact(a);
56e5d1ca 154 int action = READ_ONCE(gact->tcf_action);
1da177e4 155
1da177e4 156#ifdef CONFIG_GACT_PROB
8f2ae965
ED
157 {
158 u32 ptype = READ_ONCE(gact->tcfg_ptype);
159
160 if (ptype)
161 action = gact_rand[ptype](gact);
162 }
1da177e4 163#endif
5e1ad95b 164 tcf_action_update_bstats(&gact->common, skb);
1da177e4 165 if (action == TC_ACT_SHOT)
26b537a8 166 tcf_action_inc_drop_qstats(&gact->common);
56e5d1ca
ED
167
168 tcf_lastuse_update(&gact->tcf_tm);
1da177e4
LT
169
170 return action;
171}
172
4b61d3e8
PL
173static void tcf_gact_stats_update(struct tc_action *a, u64 bytes, u64 packets,
174 u64 drops, u64 lastuse, bool hw)
9fea47d9 175{
a85a970a 176 struct tcf_gact *gact = to_gact(a);
9fea47d9
AV
177 int action = READ_ONCE(gact->tcf_action);
178 struct tcf_t *tm = &gact->tcf_tm;
179
4b61d3e8
PL
180 tcf_action_update_stats(a, bytes, packets,
181 action == TC_ACT_SHOT ? packets : drops, hw);
3bb23421 182 tm->lastuse = max_t(u64, tm->lastuse, lastuse);
9fea47d9
AV
183}
184
0b0f43fe
JHS
185static int tcf_gact_dump(struct sk_buff *skb, struct tc_action *a,
186 int bind, int ref)
1da177e4 187{
27a884dc 188 unsigned char *b = skb_tail_pointer(skb);
a85a970a 189 struct tcf_gact *gact = to_gact(a);
1c40be12
ED
190 struct tc_gact opt = {
191 .index = gact->tcf_index,
036bb443
VB
192 .refcnt = refcount_read(&gact->tcf_refcnt) - ref,
193 .bindcnt = atomic_read(&gact->tcf_bindcnt) - bind,
1c40be12 194 };
1da177e4
LT
195 struct tcf_t t;
196
653cd284 197 spin_lock_bh(&gact->tcf_lock);
e8917f43 198 opt.action = gact->tcf_action;
1b34ec43
DM
199 if (nla_put(skb, TCA_GACT_PARMS, sizeof(opt), &opt))
200 goto nla_put_failure;
1da177e4 201#ifdef CONFIG_GACT_PROB
e9ce1cd3 202 if (gact->tcfg_ptype) {
1c40be12
ED
203 struct tc_gact_p p_opt = {
204 .paction = gact->tcfg_paction,
205 .pval = gact->tcfg_pval,
206 .ptype = gact->tcfg_ptype,
207 };
208
1b34ec43
DM
209 if (nla_put(skb, TCA_GACT_PROB, sizeof(p_opt), &p_opt))
210 goto nla_put_failure;
1da177e4
LT
211 }
212#endif
48d8ee16 213 tcf_tm_dump(&t, &gact->tcf_tm);
9854518e 214 if (nla_put_64bit(skb, TCA_GACT_TM, sizeof(t), &t, TCA_GACT_PAD))
1b34ec43 215 goto nla_put_failure;
653cd284 216 spin_unlock_bh(&gact->tcf_lock);
e8917f43 217
1da177e4
LT
218 return skb->len;
219
7ba699c6 220nla_put_failure:
653cd284 221 spin_unlock_bh(&gact->tcf_lock);
dc5fc579 222 nlmsg_trim(skb, b);
1da177e4
LT
223 return -1;
224}
225
9c5c9c57
RM
226static size_t tcf_gact_get_fill_size(const struct tc_action *act)
227{
228 size_t sz = nla_total_size(sizeof(struct tc_gact)); /* TCA_GACT_PARMS */
229
230#ifdef CONFIG_GACT_PROB
231 if (to_gact(act)->tcfg_ptype)
232 /* TCA_GACT_PROB */
233 sz += nla_total_size(sizeof(struct tc_gact_p));
234#endif
235
236 return sz;
237}
238
c54e1d92 239static int tcf_gact_offload_act_setup(struct tc_action *act, void *entry_data,
c2ccf84e
IS
240 u32 *index_inc, bool bind,
241 struct netlink_ext_ack *extack)
c54e1d92
BZ
242{
243 if (bind) {
244 struct flow_action_entry *entry = entry_data;
245
246 if (is_tcf_gact_ok(act)) {
247 entry->id = FLOW_ACTION_ACCEPT;
248 } else if (is_tcf_gact_shot(act)) {
249 entry->id = FLOW_ACTION_DROP;
250 } else if (is_tcf_gact_trap(act)) {
251 entry->id = FLOW_ACTION_TRAP;
252 } else if (is_tcf_gact_goto_chain(act)) {
253 entry->id = FLOW_ACTION_GOTO;
254 entry->chain_index = tcf_gact_goto_chain_index(act);
69642c2a
IS
255 } else if (is_tcf_gact_continue(act)) {
256 NL_SET_ERR_MSG_MOD(extack, "Offload of \"continue\" action is not supported");
257 return -EOPNOTSUPP;
258 } else if (is_tcf_gact_reclassify(act)) {
259 NL_SET_ERR_MSG_MOD(extack, "Offload of \"reclassify\" action is not supported");
260 return -EOPNOTSUPP;
261 } else if (is_tcf_gact_pipe(act)) {
262 NL_SET_ERR_MSG_MOD(extack, "Offload of \"pipe\" action is not supported");
263 return -EOPNOTSUPP;
c54e1d92 264 } else {
69642c2a 265 NL_SET_ERR_MSG_MOD(extack, "Unsupported generic action offload");
c54e1d92
BZ
266 return -EOPNOTSUPP;
267 }
268 *index_inc = 1;
269 } else {
8cbfe939
BZ
270 struct flow_offload_action *fl_action = entry_data;
271
272 if (is_tcf_gact_ok(act))
273 fl_action->id = FLOW_ACTION_ACCEPT;
274 else if (is_tcf_gact_shot(act))
275 fl_action->id = FLOW_ACTION_DROP;
276 else if (is_tcf_gact_trap(act))
277 fl_action->id = FLOW_ACTION_TRAP;
278 else if (is_tcf_gact_goto_chain(act))
279 fl_action->id = FLOW_ACTION_GOTO;
280 else
281 return -EOPNOTSUPP;
c54e1d92
BZ
282 }
283
284 return 0;
285}
286
1da177e4
LT
287static struct tc_action_ops act_gact_ops = {
288 .kind = "gact",
eddd2cf1 289 .id = TCA_ID_GACT,
1da177e4 290 .owner = THIS_MODULE,
1740005e 291 .act = tcf_gact_act,
9fea47d9 292 .stats_update = tcf_gact_stats_update,
1da177e4 293 .dump = tcf_gact_dump,
1da177e4 294 .init = tcf_gact_init,
9c5c9c57 295 .get_fill_size = tcf_gact_get_fill_size,
c54e1d92 296 .offload_act_setup = tcf_gact_offload_act_setup,
a85a970a 297 .size = sizeof(struct tcf_gact),
ddf97ccd
WC
298};
299
300static __net_init int gact_init_net(struct net *net)
301{
acd0a7ab 302 struct tc_action_net *tn = net_generic(net, act_gact_ops.net_id);
ddf97ccd 303
981471bd 304 return tc_action_net_init(net, tn, &act_gact_ops);
ddf97ccd
WC
305}
306
039af9c6 307static void __net_exit gact_exit_net(struct list_head *net_list)
ddf97ccd 308{
acd0a7ab 309 tc_action_net_exit(net_list, act_gact_ops.net_id);
ddf97ccd
WC
310}
311
312static struct pernet_operations gact_net_ops = {
313 .init = gact_init_net,
039af9c6 314 .exit_batch = gact_exit_net,
acd0a7ab 315 .id = &act_gact_ops.net_id,
ddf97ccd 316 .size = sizeof(struct tc_action_net),
1da177e4
LT
317};
318
319MODULE_AUTHOR("Jamal Hadi Salim(2002-4)");
320MODULE_DESCRIPTION("Generic Classifier actions");
321MODULE_LICENSE("GPL");
322
e9ce1cd3 323static int __init gact_init_module(void)
1da177e4
LT
324{
325#ifdef CONFIG_GACT_PROB
cc7ec456 326 pr_info("GACT probability on\n");
1da177e4 327#else
cc7ec456 328 pr_info("GACT probability NOT on\n");
1da177e4 329#endif
ddf97ccd
WC
330
331 return tcf_register_action(&act_gact_ops, &gact_net_ops);
1da177e4
LT
332}
333
e9ce1cd3 334static void __exit gact_cleanup_module(void)
1da177e4 335{
ddf97ccd 336 tcf_unregister_action(&act_gact_ops, &gact_net_ops);
1da177e4
LT
337}
338
339module_init(gact_init_module);
340module_exit(gact_cleanup_module);