Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
1da177e4 | 2 | /* |
0c6965dd | 3 | * net/sched/act_gact.c Generic actions |
1da177e4 | 4 | * |
1da177e4 | 5 | * copyright Jamal Hadi Salim (2002-4) |
1da177e4 LT |
6 | */ |
7 | ||
1da177e4 LT |
8 | #include <linux/types.h> |
9 | #include <linux/kernel.h> | |
1da177e4 | 10 | #include <linux/string.h> |
1da177e4 | 11 | #include <linux/errno.h> |
1da177e4 LT |
12 | #include <linux/skbuff.h> |
13 | #include <linux/rtnetlink.h> | |
14 | #include <linux/module.h> | |
15 | #include <linux/init.h> | |
dc5fc579 | 16 | #include <net/netlink.h> |
1da177e4 | 17 | #include <net/pkt_sched.h> |
0da2dbd6 | 18 | #include <net/pkt_cls.h> |
1da177e4 LT |
19 | #include <linux/tc_act/tc_gact.h> |
20 | #include <net/tc_act/tc_gact.h> | |
21 | ||
a85a970a | 22 | static struct tc_action_ops act_gact_ops; |
ddf97ccd | 23 | |
1da177e4 | 24 | #ifdef CONFIG_GACT_PROB |
e9ce1cd3 | 25 | static int gact_net_rand(struct tcf_gact *gact) |
1da177e4 | 26 | { |
cef5ecf9 ED |
27 | smp_rmb(); /* coupled with smp_wmb() in tcf_gact_init() */ |
28 | if (prandom_u32() % gact->tcfg_pval) | |
e9ce1cd3 DM |
29 | return gact->tcf_action; |
30 | return gact->tcfg_paction; | |
1da177e4 LT |
31 | } |
32 | ||
e9ce1cd3 | 33 | static int gact_determ(struct tcf_gact *gact) |
1da177e4 | 34 | { |
cc6510a9 ED |
35 | u32 pack = atomic_inc_return(&gact->packets); |
36 | ||
cef5ecf9 | 37 | smp_rmb(); /* coupled with smp_wmb() in tcf_gact_init() */ |
cc6510a9 | 38 | if (pack % gact->tcfg_pval) |
e9ce1cd3 DM |
39 | return gact->tcf_action; |
40 | return gact->tcfg_paction; | |
1da177e4 LT |
41 | } |
42 | ||
e9ce1cd3 | 43 | typedef int (*g_rand)(struct tcf_gact *gact); |
cc7ec456 | 44 | static g_rand gact_rand[MAX_RAND] = { NULL, gact_net_rand, gact_determ }; |
e9ce1cd3 | 45 | #endif /* CONFIG_GACT_PROB */ |
1da177e4 | 46 | |
53b2bf3f PM |
47 | static const struct nla_policy gact_policy[TCA_GACT_MAX + 1] = { |
48 | [TCA_GACT_PARMS] = { .len = sizeof(struct tc_gact) }, | |
49 | [TCA_GACT_PROB] = { .len = sizeof(struct tc_gact_p) }, | |
50 | }; | |
51 | ||
c1b52739 | 52 | static int tcf_gact_init(struct net *net, struct nlattr *nla, |
a85a970a | 53 | struct nlattr *est, struct tc_action **a, |
abbb0d33 VB |
54 | struct tcf_proto *tp, u32 flags, |
55 | struct netlink_ext_ack *extack) | |
1da177e4 | 56 | { |
acd0a7ab | 57 | struct tc_action_net *tn = net_generic(net, act_gact_ops.net_id); |
695176bf | 58 | bool bind = flags & TCA_ACT_FLAGS_BIND; |
7ba699c6 | 59 | struct nlattr *tb[TCA_GACT_MAX + 1]; |
0da2dbd6 | 60 | struct tcf_chain *goto_ch = NULL; |
1da177e4 | 61 | struct tc_gact *parm; |
e9ce1cd3 | 62 | struct tcf_gact *gact; |
1da177e4 | 63 | int ret = 0; |
7be8ef2c | 64 | u32 index; |
cee63723 | 65 | int err; |
696ecdc1 HS |
66 | #ifdef CONFIG_GACT_PROB |
67 | struct tc_gact_p *p_parm = NULL; | |
68 | #endif | |
1da177e4 | 69 | |
cee63723 | 70 | if (nla == NULL) |
1da177e4 LT |
71 | return -EINVAL; |
72 | ||
8cb08174 JB |
73 | err = nla_parse_nested_deprecated(tb, TCA_GACT_MAX, nla, gact_policy, |
74 | NULL); | |
cee63723 PM |
75 | if (err < 0) |
76 | return err; | |
77 | ||
53b2bf3f | 78 | if (tb[TCA_GACT_PARMS] == NULL) |
1da177e4 | 79 | return -EINVAL; |
7ba699c6 | 80 | parm = nla_data(tb[TCA_GACT_PARMS]); |
7be8ef2c | 81 | index = parm->index; |
1da177e4 | 82 | |
53b2bf3f | 83 | #ifndef CONFIG_GACT_PROB |
7ba699c6 | 84 | if (tb[TCA_GACT_PROB] != NULL) |
1da177e4 | 85 | return -EOPNOTSUPP; |
696ecdc1 HS |
86 | #else |
87 | if (tb[TCA_GACT_PROB]) { | |
88 | p_parm = nla_data(tb[TCA_GACT_PROB]); | |
89 | if (p_parm->ptype >= MAX_RAND) | |
90 | return -EINVAL; | |
9469f375 DC |
91 | if (TC_ACT_EXT_CMP(p_parm->paction, TC_ACT_GOTO_CHAIN)) { |
92 | NL_SET_ERR_MSG(extack, | |
93 | "goto chain not allowed on fallback"); | |
94 | return -EINVAL; | |
95 | } | |
696ecdc1 | 96 | } |
1da177e4 LT |
97 | #endif |
98 | ||
7be8ef2c | 99 | err = tcf_idr_check_alloc(tn, &index, a, bind); |
0190c1d4 | 100 | if (!err) { |
e3822678 VB |
101 | ret = tcf_idr_create_from_flags(tn, index, est, a, |
102 | &act_gact_ops, bind, flags); | |
0190c1d4 | 103 | if (ret) { |
7be8ef2c | 104 | tcf_idr_cleanup(tn, index); |
86062033 | 105 | return ret; |
0190c1d4 | 106 | } |
1da177e4 | 107 | ret = ACT_P_CREATED; |
0190c1d4 | 108 | } else if (err > 0) { |
1a29321e JHS |
109 | if (bind)/* dont override defaults */ |
110 | return 0; | |
695176bf | 111 | if (!(flags & TCA_ACT_FLAGS_REPLACE)) { |
4e8ddd7f | 112 | tcf_idr_release(*a, bind); |
1da177e4 | 113 | return -EEXIST; |
4e8ddd7f | 114 | } |
0190c1d4 VB |
115 | } else { |
116 | return err; | |
1da177e4 LT |
117 | } |
118 | ||
0da2dbd6 DC |
119 | err = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack); |
120 | if (err < 0) | |
121 | goto release_idr; | |
a85a970a | 122 | gact = to_gact(*a); |
e9ce1cd3 | 123 | |
653cd284 | 124 | spin_lock_bh(&gact->tcf_lock); |
0da2dbd6 | 125 | goto_ch = tcf_action_set_ctrlact(*a, parm->action, goto_ch); |
1da177e4 | 126 | #ifdef CONFIG_GACT_PROB |
696ecdc1 | 127 | if (p_parm) { |
e9ce1cd3 | 128 | gact->tcfg_paction = p_parm->paction; |
cef5ecf9 ED |
129 | gact->tcfg_pval = max_t(u16, 1, p_parm->pval); |
130 | /* Make sure tcfg_pval is written before tcfg_ptype | |
131 | * coupled with smp_rmb() in gact_net_rand() & gact_determ() | |
132 | */ | |
133 | smp_wmb(); | |
e9ce1cd3 | 134 | gact->tcfg_ptype = p_parm->ptype; |
1da177e4 LT |
135 | } |
136 | #endif | |
653cd284 | 137 | spin_unlock_bh(&gact->tcf_lock); |
e8917f43 | 138 | |
0da2dbd6 DC |
139 | if (goto_ch) |
140 | tcf_chain_put_by_act(goto_ch); | |
141 | ||
1da177e4 | 142 | return ret; |
0da2dbd6 DC |
143 | release_idr: |
144 | tcf_idr_release(*a, bind); | |
145 | return err; | |
1da177e4 LT |
146 | } |
147 | ||
1740005e JHS |
148 | static int tcf_gact_act(struct sk_buff *skb, const struct tc_action *a, |
149 | struct tcf_result *res) | |
1da177e4 | 150 | { |
a85a970a | 151 | struct tcf_gact *gact = to_gact(a); |
56e5d1ca | 152 | int action = READ_ONCE(gact->tcf_action); |
1da177e4 | 153 | |
1da177e4 | 154 | #ifdef CONFIG_GACT_PROB |
8f2ae965 ED |
155 | { |
156 | u32 ptype = READ_ONCE(gact->tcfg_ptype); | |
157 | ||
158 | if (ptype) | |
159 | action = gact_rand[ptype](gact); | |
160 | } | |
1da177e4 | 161 | #endif |
5e1ad95b | 162 | tcf_action_update_bstats(&gact->common, skb); |
1da177e4 | 163 | if (action == TC_ACT_SHOT) |
26b537a8 | 164 | tcf_action_inc_drop_qstats(&gact->common); |
56e5d1ca ED |
165 | |
166 | tcf_lastuse_update(&gact->tcf_tm); | |
1da177e4 LT |
167 | |
168 | return action; | |
169 | } | |
170 | ||
4b61d3e8 PL |
171 | static void tcf_gact_stats_update(struct tc_action *a, u64 bytes, u64 packets, |
172 | u64 drops, u64 lastuse, bool hw) | |
9fea47d9 | 173 | { |
a85a970a | 174 | struct tcf_gact *gact = to_gact(a); |
9fea47d9 AV |
175 | int action = READ_ONCE(gact->tcf_action); |
176 | struct tcf_t *tm = &gact->tcf_tm; | |
177 | ||
4b61d3e8 PL |
178 | tcf_action_update_stats(a, bytes, packets, |
179 | action == TC_ACT_SHOT ? packets : drops, hw); | |
3bb23421 | 180 | tm->lastuse = max_t(u64, tm->lastuse, lastuse); |
9fea47d9 AV |
181 | } |
182 | ||
0b0f43fe JHS |
183 | static int tcf_gact_dump(struct sk_buff *skb, struct tc_action *a, |
184 | int bind, int ref) | |
1da177e4 | 185 | { |
27a884dc | 186 | unsigned char *b = skb_tail_pointer(skb); |
a85a970a | 187 | struct tcf_gact *gact = to_gact(a); |
1c40be12 ED |
188 | struct tc_gact opt = { |
189 | .index = gact->tcf_index, | |
036bb443 VB |
190 | .refcnt = refcount_read(&gact->tcf_refcnt) - ref, |
191 | .bindcnt = atomic_read(&gact->tcf_bindcnt) - bind, | |
1c40be12 | 192 | }; |
1da177e4 LT |
193 | struct tcf_t t; |
194 | ||
653cd284 | 195 | spin_lock_bh(&gact->tcf_lock); |
e8917f43 | 196 | opt.action = gact->tcf_action; |
1b34ec43 DM |
197 | if (nla_put(skb, TCA_GACT_PARMS, sizeof(opt), &opt)) |
198 | goto nla_put_failure; | |
1da177e4 | 199 | #ifdef CONFIG_GACT_PROB |
e9ce1cd3 | 200 | if (gact->tcfg_ptype) { |
1c40be12 ED |
201 | struct tc_gact_p p_opt = { |
202 | .paction = gact->tcfg_paction, | |
203 | .pval = gact->tcfg_pval, | |
204 | .ptype = gact->tcfg_ptype, | |
205 | }; | |
206 | ||
1b34ec43 DM |
207 | if (nla_put(skb, TCA_GACT_PROB, sizeof(p_opt), &p_opt)) |
208 | goto nla_put_failure; | |
1da177e4 LT |
209 | } |
210 | #endif | |
48d8ee16 | 211 | tcf_tm_dump(&t, &gact->tcf_tm); |
9854518e | 212 | if (nla_put_64bit(skb, TCA_GACT_TM, sizeof(t), &t, TCA_GACT_PAD)) |
1b34ec43 | 213 | goto nla_put_failure; |
653cd284 | 214 | spin_unlock_bh(&gact->tcf_lock); |
e8917f43 | 215 | |
1da177e4 LT |
216 | return skb->len; |
217 | ||
7ba699c6 | 218 | nla_put_failure: |
653cd284 | 219 | spin_unlock_bh(&gact->tcf_lock); |
dc5fc579 | 220 | nlmsg_trim(skb, b); |
1da177e4 LT |
221 | return -1; |
222 | } | |
223 | ||
9c5c9c57 RM |
224 | static size_t tcf_gact_get_fill_size(const struct tc_action *act) |
225 | { | |
226 | size_t sz = nla_total_size(sizeof(struct tc_gact)); /* TCA_GACT_PARMS */ | |
227 | ||
228 | #ifdef CONFIG_GACT_PROB | |
229 | if (to_gact(act)->tcfg_ptype) | |
230 | /* TCA_GACT_PROB */ | |
231 | sz += nla_total_size(sizeof(struct tc_gact_p)); | |
232 | #endif | |
233 | ||
234 | return sz; | |
235 | } | |
236 | ||
c54e1d92 | 237 | static int tcf_gact_offload_act_setup(struct tc_action *act, void *entry_data, |
c2ccf84e IS |
238 | u32 *index_inc, bool bind, |
239 | struct netlink_ext_ack *extack) | |
c54e1d92 BZ |
240 | { |
241 | if (bind) { | |
242 | struct flow_action_entry *entry = entry_data; | |
243 | ||
244 | if (is_tcf_gact_ok(act)) { | |
245 | entry->id = FLOW_ACTION_ACCEPT; | |
246 | } else if (is_tcf_gact_shot(act)) { | |
247 | entry->id = FLOW_ACTION_DROP; | |
248 | } else if (is_tcf_gact_trap(act)) { | |
249 | entry->id = FLOW_ACTION_TRAP; | |
250 | } else if (is_tcf_gact_goto_chain(act)) { | |
251 | entry->id = FLOW_ACTION_GOTO; | |
252 | entry->chain_index = tcf_gact_goto_chain_index(act); | |
69642c2a IS |
253 | } else if (is_tcf_gact_continue(act)) { |
254 | NL_SET_ERR_MSG_MOD(extack, "Offload of \"continue\" action is not supported"); | |
255 | return -EOPNOTSUPP; | |
256 | } else if (is_tcf_gact_reclassify(act)) { | |
257 | NL_SET_ERR_MSG_MOD(extack, "Offload of \"reclassify\" action is not supported"); | |
258 | return -EOPNOTSUPP; | |
259 | } else if (is_tcf_gact_pipe(act)) { | |
260 | NL_SET_ERR_MSG_MOD(extack, "Offload of \"pipe\" action is not supported"); | |
261 | return -EOPNOTSUPP; | |
c54e1d92 | 262 | } else { |
69642c2a | 263 | NL_SET_ERR_MSG_MOD(extack, "Unsupported generic action offload"); |
c54e1d92 BZ |
264 | return -EOPNOTSUPP; |
265 | } | |
266 | *index_inc = 1; | |
267 | } else { | |
8cbfe939 BZ |
268 | struct flow_offload_action *fl_action = entry_data; |
269 | ||
270 | if (is_tcf_gact_ok(act)) | |
271 | fl_action->id = FLOW_ACTION_ACCEPT; | |
272 | else if (is_tcf_gact_shot(act)) | |
273 | fl_action->id = FLOW_ACTION_DROP; | |
274 | else if (is_tcf_gact_trap(act)) | |
275 | fl_action->id = FLOW_ACTION_TRAP; | |
276 | else if (is_tcf_gact_goto_chain(act)) | |
277 | fl_action->id = FLOW_ACTION_GOTO; | |
278 | else | |
279 | return -EOPNOTSUPP; | |
c54e1d92 BZ |
280 | } |
281 | ||
282 | return 0; | |
283 | } | |
284 | ||
1da177e4 LT |
285 | static struct tc_action_ops act_gact_ops = { |
286 | .kind = "gact", | |
eddd2cf1 | 287 | .id = TCA_ID_GACT, |
1da177e4 | 288 | .owner = THIS_MODULE, |
1740005e | 289 | .act = tcf_gact_act, |
9fea47d9 | 290 | .stats_update = tcf_gact_stats_update, |
1da177e4 | 291 | .dump = tcf_gact_dump, |
1da177e4 | 292 | .init = tcf_gact_init, |
9c5c9c57 | 293 | .get_fill_size = tcf_gact_get_fill_size, |
c54e1d92 | 294 | .offload_act_setup = tcf_gact_offload_act_setup, |
a85a970a | 295 | .size = sizeof(struct tcf_gact), |
ddf97ccd WC |
296 | }; |
297 | ||
298 | static __net_init int gact_init_net(struct net *net) | |
299 | { | |
acd0a7ab | 300 | struct tc_action_net *tn = net_generic(net, act_gact_ops.net_id); |
ddf97ccd | 301 | |
981471bd | 302 | return tc_action_net_init(net, tn, &act_gact_ops); |
ddf97ccd WC |
303 | } |
304 | ||
039af9c6 | 305 | static void __net_exit gact_exit_net(struct list_head *net_list) |
ddf97ccd | 306 | { |
acd0a7ab | 307 | tc_action_net_exit(net_list, act_gact_ops.net_id); |
ddf97ccd WC |
308 | } |
309 | ||
310 | static struct pernet_operations gact_net_ops = { | |
311 | .init = gact_init_net, | |
039af9c6 | 312 | .exit_batch = gact_exit_net, |
acd0a7ab | 313 | .id = &act_gact_ops.net_id, |
ddf97ccd | 314 | .size = sizeof(struct tc_action_net), |
1da177e4 LT |
315 | }; |
316 | ||
317 | MODULE_AUTHOR("Jamal Hadi Salim(2002-4)"); | |
318 | MODULE_DESCRIPTION("Generic Classifier actions"); | |
319 | MODULE_LICENSE("GPL"); | |
320 | ||
e9ce1cd3 | 321 | static int __init gact_init_module(void) |
1da177e4 LT |
322 | { |
323 | #ifdef CONFIG_GACT_PROB | |
cc7ec456 | 324 | pr_info("GACT probability on\n"); |
1da177e4 | 325 | #else |
cc7ec456 | 326 | pr_info("GACT probability NOT on\n"); |
1da177e4 | 327 | #endif |
ddf97ccd WC |
328 | |
329 | return tcf_register_action(&act_gact_ops, &gact_net_ops); | |
1da177e4 LT |
330 | } |
331 | ||
e9ce1cd3 | 332 | static void __exit gact_cleanup_module(void) |
1da177e4 | 333 | { |
ddf97ccd | 334 | tcf_unregister_action(&act_gact_ops, &gact_net_ops); |
1da177e4 LT |
335 | } |
336 | ||
337 | module_init(gact_init_module); | |
338 | module_exit(gact_cleanup_module); |