net_sched: use tcf_queue_work() in flower filter
[linux-2.6-block.git] / net / sched / cls_fw.c
CommitLineData
1da177e4
LT
1/*
2 * net/sched/cls_fw.c Classifier mapping ipchains' fwmark to traffic class.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 * Changes:
12 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_walk off by one
13 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_delete killed all the filter (and kernel).
14 * Alex <alex@pilotsoft.com> : 2004xxyy: Added Action extension
15 *
16 * JHS: We should remove the CONFIG_NET_CLS_IND from here
17 * eventually when the meta match extension is made available
18 *
19 */
20
1da177e4 21#include <linux/module.h>
5a0e3ad6 22#include <linux/slab.h>
1da177e4
LT
23#include <linux/types.h>
24#include <linux/kernel.h>
1da177e4 25#include <linux/string.h>
1da177e4 26#include <linux/errno.h>
1da177e4 27#include <linux/skbuff.h>
0ba48053 28#include <net/netlink.h>
1da177e4
LT
29#include <net/act_api.h>
30#include <net/pkt_cls.h>
31
d37d8ac1 32#define HTSIZE 256
c5c13faf 33
cc7ec456 34struct fw_head {
d37d8ac1 35 u32 mask;
e35a8ee5
JF
36 struct fw_filter __rcu *ht[HTSIZE];
37 struct rcu_head rcu;
1da177e4
LT
38};
39
cc7ec456 40struct fw_filter {
e35a8ee5 41 struct fw_filter __rcu *next;
1da177e4
LT
42 u32 id;
43 struct tcf_result res;
44#ifdef CONFIG_NET_CLS_IND
2519a602 45 int ifindex;
1da177e4
LT
46#endif /* CONFIG_NET_CLS_IND */
47 struct tcf_exts exts;
e35a8ee5
JF
48 struct tcf_proto *tp;
49 struct rcu_head rcu;
1da177e4
LT
50};
51
d37d8ac1 52static u32 fw_hash(u32 handle)
1da177e4 53{
d37d8ac1
ED
54 handle ^= (handle >> 16);
55 handle ^= (handle >> 8);
56 return handle % HTSIZE;
1da177e4
LT
57}
58
dc7f9f6e 59static int fw_classify(struct sk_buff *skb, const struct tcf_proto *tp,
5a7a5555 60 struct tcf_result *res)
1da177e4 61{
e35a8ee5 62 struct fw_head *head = rcu_dereference_bh(tp->root);
1da177e4
LT
63 struct fw_filter *f;
64 int r;
5c804bfd 65 u32 id = skb->mark;
1da177e4
LT
66
67 if (head != NULL) {
5c804bfd 68 id &= head->mask;
e35a8ee5
JF
69
70 for (f = rcu_dereference_bh(head->ht[fw_hash(id)]); f;
71 f = rcu_dereference_bh(f->next)) {
1da177e4
LT
72 if (f->id == id) {
73 *res = f->res;
74#ifdef CONFIG_NET_CLS_IND
2519a602 75 if (!tcf_match_indev(skb, f->ifindex))
1da177e4
LT
76 continue;
77#endif /* CONFIG_NET_CLS_IND */
78 r = tcf_exts_exec(skb, &f->exts, res);
79 if (r < 0)
80 continue;
81
82 return r;
83 }
84 }
85 } else {
d8aecb10 86 /* Old method: classify the packet using its skb mark. */
cc7ec456
ED
87 if (id && (TC_H_MAJ(id) == 0 ||
88 !(TC_H_MAJ(id ^ tp->q->handle)))) {
1da177e4
LT
89 res->classid = id;
90 res->class = 0;
91 return 0;
92 }
93 }
94
95 return -1;
96}
97
8113c095 98static void *fw_get(struct tcf_proto *tp, u32 handle)
1da177e4 99{
e35a8ee5 100 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
101 struct fw_filter *f;
102
103 if (head == NULL)
8113c095 104 return NULL;
1da177e4 105
e35a8ee5
JF
106 f = rtnl_dereference(head->ht[fw_hash(handle)]);
107 for (; f; f = rtnl_dereference(f->next)) {
1da177e4 108 if (f->id == handle)
8113c095 109 return f;
1da177e4 110 }
8113c095 111 return NULL;
1da177e4
LT
112}
113
1da177e4
LT
114static int fw_init(struct tcf_proto *tp)
115{
d8aecb10
WC
116 /* We don't allocate fw_head here, because in the old method
117 * we don't need it at all.
118 */
1da177e4
LT
119 return 0;
120}
121
e35a8ee5 122static void fw_delete_filter(struct rcu_head *head)
1da177e4 123{
e35a8ee5 124 struct fw_filter *f = container_of(head, struct fw_filter, rcu);
e35a8ee5 125
18d0264f 126 tcf_exts_destroy(&f->exts);
1da177e4
LT
127 kfree(f);
128}
129
763dbf63 130static void fw_destroy(struct tcf_proto *tp)
1da177e4 131{
e35a8ee5 132 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
133 struct fw_filter *f;
134 int h;
135
136 if (head == NULL)
763dbf63 137 return;
1da177e4 138
cc7ec456 139 for (h = 0; h < HTSIZE; h++) {
e35a8ee5
JF
140 while ((f = rtnl_dereference(head->ht[h])) != NULL) {
141 RCU_INIT_POINTER(head->ht[h],
142 rtnl_dereference(f->next));
18cdb37e 143 tcf_unbind_filter(tp, &f->res);
e35a8ee5 144 call_rcu(&f->rcu, fw_delete_filter);
1da177e4
LT
145 }
146 }
e35a8ee5 147 kfree_rcu(head, rcu);
1da177e4
LT
148}
149
8113c095 150static int fw_delete(struct tcf_proto *tp, void *arg, bool *last)
1da177e4 151{
e35a8ee5 152 struct fw_head *head = rtnl_dereference(tp->root);
8113c095 153 struct fw_filter *f = arg;
e35a8ee5
JF
154 struct fw_filter __rcu **fp;
155 struct fw_filter *pfp;
763dbf63
WC
156 int ret = -EINVAL;
157 int h;
1da177e4
LT
158
159 if (head == NULL || f == NULL)
160 goto out;
161
e35a8ee5
JF
162 fp = &head->ht[fw_hash(f->id)];
163
164 for (pfp = rtnl_dereference(*fp); pfp;
165 fp = &pfp->next, pfp = rtnl_dereference(*fp)) {
166 if (pfp == f) {
167 RCU_INIT_POINTER(*fp, rtnl_dereference(f->next));
18cdb37e 168 tcf_unbind_filter(tp, &f->res);
e35a8ee5 169 call_rcu(&f->rcu, fw_delete_filter);
763dbf63
WC
170 ret = 0;
171 break;
1da177e4
LT
172 }
173 }
763dbf63
WC
174
175 *last = true;
176 for (h = 0; h < HTSIZE; h++) {
177 if (rcu_access_pointer(head->ht[h])) {
178 *last = false;
179 break;
180 }
181 }
182
1da177e4 183out:
763dbf63 184 return ret;
1da177e4
LT
185}
186
6fa8c014
PM
187static const struct nla_policy fw_policy[TCA_FW_MAX + 1] = {
188 [TCA_FW_CLASSID] = { .type = NLA_U32 },
189 [TCA_FW_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ },
190 [TCA_FW_MASK] = { .type = NLA_U32 },
191};
192
1e5003af
JP
193static int fw_set_parms(struct net *net, struct tcf_proto *tp,
194 struct fw_filter *f, struct nlattr **tb,
195 struct nlattr **tca, unsigned long base, bool ovr)
1da177e4 196{
e35a8ee5 197 struct fw_head *head = rtnl_dereference(tp->root);
b4e9b520 198 u32 mask;
1da177e4
LT
199 int err;
200
94611bff 201 err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &f->exts, ovr);
1da177e4
LT
202 if (err < 0)
203 return err;
204
add93b61 205 if (tb[TCA_FW_CLASSID]) {
1587bac4 206 f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
1da177e4
LT
207 tcf_bind_filter(tp, &f->res, base);
208 }
209
210#ifdef CONFIG_NET_CLS_IND
add93b61 211 if (tb[TCA_FW_INDEV]) {
2519a602
WC
212 int ret;
213 ret = tcf_change_indev(net, tb[TCA_FW_INDEV]);
94611bff
JP
214 if (ret < 0)
215 return ret;
2519a602 216 f->ifindex = ret;
1da177e4
LT
217 }
218#endif /* CONFIG_NET_CLS_IND */
219
cb95ec62 220 err = -EINVAL;
add93b61 221 if (tb[TCA_FW_MASK]) {
1587bac4 222 mask = nla_get_u32(tb[TCA_FW_MASK]);
b4e9b520 223 if (mask != head->mask)
94611bff 224 return err;
b4e9b520 225 } else if (head->mask != 0xFFFFFFFF)
94611bff 226 return err;
1da177e4
LT
227
228 return 0;
1da177e4
LT
229}
230
c1b52739 231static int fw_change(struct net *net, struct sk_buff *in_skb,
af4c6641 232 struct tcf_proto *tp, unsigned long base,
8113c095 233 u32 handle, struct nlattr **tca, void **arg,
5a7a5555 234 bool ovr)
1da177e4 235{
e35a8ee5 236 struct fw_head *head = rtnl_dereference(tp->root);
8113c095 237 struct fw_filter *f = *arg;
add93b61
PM
238 struct nlattr *opt = tca[TCA_OPTIONS];
239 struct nlattr *tb[TCA_FW_MAX + 1];
1da177e4
LT
240 int err;
241
242 if (!opt)
d8aecb10 243 return handle ? -EINVAL : 0; /* Succeed if it is old method. */
1da177e4 244
fceb6435 245 err = nla_parse_nested(tb, TCA_FW_MAX, opt, fw_policy, NULL);
cee63723
PM
246 if (err < 0)
247 return err;
1da177e4 248
e35a8ee5
JF
249 if (f) {
250 struct fw_filter *pfp, *fnew;
251 struct fw_filter __rcu **fp;
252
1da177e4
LT
253 if (f->id != handle && handle)
254 return -EINVAL;
e35a8ee5
JF
255
256 fnew = kzalloc(sizeof(struct fw_filter), GFP_KERNEL);
257 if (!fnew)
258 return -ENOBUFS;
259
260 fnew->id = f->id;
261 fnew->res = f->res;
262#ifdef CONFIG_NET_CLS_IND
263 fnew->ifindex = f->ifindex;
264#endif /* CONFIG_NET_CLS_IND */
265 fnew->tp = f->tp;
266
b9a24bb7
WC
267 err = tcf_exts_init(&fnew->exts, TCA_FW_ACT, TCA_FW_POLICE);
268 if (err < 0) {
269 kfree(fnew);
270 return err;
271 }
e1f93eb0 272
1e5003af 273 err = fw_set_parms(net, tp, fnew, tb, tca, base, ovr);
e35a8ee5 274 if (err < 0) {
b9a24bb7 275 tcf_exts_destroy(&fnew->exts);
e35a8ee5
JF
276 kfree(fnew);
277 return err;
278 }
279
280 fp = &head->ht[fw_hash(fnew->id)];
281 for (pfp = rtnl_dereference(*fp); pfp;
282 fp = &pfp->next, pfp = rtnl_dereference(*fp))
283 if (pfp == f)
284 break;
285
286 RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
287 rcu_assign_pointer(*fp, fnew);
18cdb37e 288 tcf_unbind_filter(tp, &f->res);
e35a8ee5
JF
289 call_rcu(&f->rcu, fw_delete_filter);
290
8113c095 291 *arg = fnew;
e35a8ee5 292 return err;
1da177e4
LT
293 }
294
295 if (!handle)
296 return -EINVAL;
297
d8aecb10
WC
298 if (!head) {
299 u32 mask = 0xFFFFFFFF;
6fa8c014 300 if (tb[TCA_FW_MASK])
d8aecb10
WC
301 mask = nla_get_u32(tb[TCA_FW_MASK]);
302
303 head = kzalloc(sizeof(*head), GFP_KERNEL);
304 if (!head)
305 return -ENOBUFS;
306 head->mask = mask;
307
308 rcu_assign_pointer(tp->root, head);
1da177e4
LT
309 }
310
0da974f4 311 f = kzalloc(sizeof(struct fw_filter), GFP_KERNEL);
1da177e4
LT
312 if (f == NULL)
313 return -ENOBUFS;
1da177e4 314
b9a24bb7
WC
315 err = tcf_exts_init(&f->exts, TCA_FW_ACT, TCA_FW_POLICE);
316 if (err < 0)
317 goto errout;
1da177e4 318 f->id = handle;
e35a8ee5 319 f->tp = tp;
1da177e4 320
1e5003af 321 err = fw_set_parms(net, tp, f, tb, tca, base, ovr);
1da177e4
LT
322 if (err < 0)
323 goto errout;
324
e35a8ee5
JF
325 RCU_INIT_POINTER(f->next, head->ht[fw_hash(handle)]);
326 rcu_assign_pointer(head->ht[fw_hash(handle)], f);
1da177e4 327
8113c095 328 *arg = f;
1da177e4
LT
329 return 0;
330
331errout:
b9a24bb7 332 tcf_exts_destroy(&f->exts);
a51482bd 333 kfree(f);
1da177e4
LT
334 return err;
335}
336
337static void fw_walk(struct tcf_proto *tp, struct tcf_walker *arg)
338{
e35a8ee5 339 struct fw_head *head = rtnl_dereference(tp->root);
1da177e4
LT
340 int h;
341
342 if (head == NULL)
343 arg->stop = 1;
344
345 if (arg->stop)
346 return;
347
c5c13faf 348 for (h = 0; h < HTSIZE; h++) {
1da177e4
LT
349 struct fw_filter *f;
350
e35a8ee5
JF
351 for (f = rtnl_dereference(head->ht[h]); f;
352 f = rtnl_dereference(f->next)) {
1da177e4
LT
353 if (arg->count < arg->skip) {
354 arg->count++;
355 continue;
356 }
8113c095 357 if (arg->fn(tp, f, arg) < 0) {
1da177e4
LT
358 arg->stop = 1;
359 return;
360 }
361 arg->count++;
362 }
363 }
364}
365
8113c095 366static int fw_dump(struct net *net, struct tcf_proto *tp, void *fh,
1da177e4
LT
367 struct sk_buff *skb, struct tcmsg *t)
368{
e35a8ee5 369 struct fw_head *head = rtnl_dereference(tp->root);
8113c095 370 struct fw_filter *f = fh;
4b3550ef 371 struct nlattr *nest;
1da177e4
LT
372
373 if (f == NULL)
374 return skb->len;
375
376 t->tcm_handle = f->id;
377
6fc6d06e 378 if (!f->res.classid && !tcf_exts_has_actions(&f->exts))
1da177e4
LT
379 return skb->len;
380
4b3550ef
PM
381 nest = nla_nest_start(skb, TCA_OPTIONS);
382 if (nest == NULL)
383 goto nla_put_failure;
1da177e4 384
1b34ec43
DM
385 if (f->res.classid &&
386 nla_put_u32(skb, TCA_FW_CLASSID, f->res.classid))
387 goto nla_put_failure;
1da177e4 388#ifdef CONFIG_NET_CLS_IND
2519a602
WC
389 if (f->ifindex) {
390 struct net_device *dev;
391 dev = __dev_get_by_index(net, f->ifindex);
392 if (dev && nla_put_string(skb, TCA_FW_INDEV, dev->name))
393 goto nla_put_failure;
394 }
1da177e4 395#endif /* CONFIG_NET_CLS_IND */
1b34ec43
DM
396 if (head->mask != 0xFFFFFFFF &&
397 nla_put_u32(skb, TCA_FW_MASK, head->mask))
398 goto nla_put_failure;
1da177e4 399
5da57f42 400 if (tcf_exts_dump(skb, &f->exts) < 0)
add93b61 401 goto nla_put_failure;
1da177e4 402
4b3550ef 403 nla_nest_end(skb, nest);
1da177e4 404
5da57f42 405 if (tcf_exts_dump_stats(skb, &f->exts) < 0)
add93b61 406 goto nla_put_failure;
1da177e4
LT
407
408 return skb->len;
409
add93b61 410nla_put_failure:
6ea3b446 411 nla_nest_cancel(skb, nest);
1da177e4
LT
412 return -1;
413}
414
07d79fc7
CW
415static void fw_bind_class(void *fh, u32 classid, unsigned long cl)
416{
417 struct fw_filter *f = fh;
418
419 if (f && f->res.classid == classid)
420 f->res.class = cl;
421}
422
2eb9d75c 423static struct tcf_proto_ops cls_fw_ops __read_mostly = {
1da177e4
LT
424 .kind = "fw",
425 .classify = fw_classify,
426 .init = fw_init,
427 .destroy = fw_destroy,
428 .get = fw_get,
1da177e4
LT
429 .change = fw_change,
430 .delete = fw_delete,
431 .walk = fw_walk,
432 .dump = fw_dump,
07d79fc7 433 .bind_class = fw_bind_class,
1da177e4
LT
434 .owner = THIS_MODULE,
435};
436
437static int __init init_fw(void)
438{
439 return register_tcf_proto_ops(&cls_fw_ops);
440}
441
10297b99 442static void __exit exit_fw(void)
1da177e4
LT
443{
444 unregister_tcf_proto_ops(&cls_fw_ops);
445}
446
447module_init(init_fw)
448module_exit(exit_fw)
449MODULE_LICENSE("GPL");