flow_offload: rename offload functions with offload instead of flow
[linux-2.6-block.git] / net / sched / cls_matchall.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
bf3994d2
JP
2/*
3 * net/sched/cls_matchll.c Match-all classifier
4 *
5 * Copyright (c) 2016 Jiri Pirko <jiri@mellanox.com>
bf3994d2
JP
6 */
7
8#include <linux/kernel.h>
9#include <linux/init.h>
10#include <linux/module.h>
f88c19aa 11#include <linux/percpu.h>
bf3994d2
JP
12
13#include <net/sch_generic.h>
14#include <net/pkt_cls.h>
15
fd62d9f5 16struct cls_mall_head {
bf3994d2
JP
17 struct tcf_exts exts;
18 struct tcf_result res;
19 u32 handle;
b87f7936 20 u32 flags;
0efd1b3a 21 unsigned int in_hw_count;
f88c19aa 22 struct tc_matchall_pcnt __percpu *pf;
aaa908ff 23 struct rcu_work rwork;
f517f271 24 bool deleting;
bf3994d2
JP
25};
26
27static int mall_classify(struct sk_buff *skb, const struct tcf_proto *tp,
28 struct tcf_result *res)
29{
30 struct cls_mall_head *head = rcu_dereference_bh(tp->root);
bf3994d2 31
25426043
MC
32 if (unlikely(!head))
33 return -1;
34
fd62d9f5 35 if (tc_skip_sw(head->flags))
b87f7936
YG
36 return -1;
37
3ff4cbec 38 *res = head->res;
f88c19aa 39 __this_cpu_inc(head->pf->rhit);
fd62d9f5 40 return tcf_exts_exec(skb, &head->exts, res);
bf3994d2
JP
41}
42
43static int mall_init(struct tcf_proto *tp)
44{
bf3994d2
JP
45 return 0;
46}
47
57767e78
CW
48static void __mall_destroy(struct cls_mall_head *head)
49{
50 tcf_exts_destroy(&head->exts);
51 tcf_exts_put_net(&head->exts);
f88c19aa 52 free_percpu(head->pf);
57767e78
CW
53 kfree(head);
54}
55
df2735ee
CW
56static void mall_destroy_work(struct work_struct *work)
57{
aaa908ff
CW
58 struct cls_mall_head *head = container_of(to_rcu_work(work),
59 struct cls_mall_head,
60 rwork);
df2735ee 61 rtnl_lock();
57767e78 62 __mall_destroy(head);
df2735ee
CW
63 rtnl_unlock();
64}
65
2447a96f
JP
66static void mall_destroy_hw_filter(struct tcf_proto *tp,
67 struct cls_mall_head *head,
b505b29f
JK
68 unsigned long cookie,
69 struct netlink_ext_ack *extack)
b87f7936 70{
de4784ca 71 struct tc_cls_matchall_offload cls_mall = {};
2447a96f 72 struct tcf_block *block = tp->chain->block;
b87f7936 73
d6787147 74 tc_cls_common_offload_init(&cls_mall.common, tp, head->flags, extack);
2447a96f 75 cls_mall.command = TC_CLSMATCHALL_DESTROY;
de4784ca 76 cls_mall.cookie = cookie;
b87f7936 77
40119211
VB
78 tc_setup_cb_destroy(block, tp, TC_SETUP_CLSMATCHALL, &cls_mall, false,
79 &head->flags, &head->in_hw_count, true);
b87f7936
YG
80}
81
2447a96f
JP
82static int mall_replace_hw_filter(struct tcf_proto *tp,
83 struct cls_mall_head *head,
02798140
QM
84 unsigned long cookie,
85 struct netlink_ext_ack *extack)
b87f7936 86{
de4784ca 87 struct tc_cls_matchall_offload cls_mall = {};
2447a96f
JP
88 struct tcf_block *block = tp->chain->block;
89 bool skip_sw = tc_skip_sw(head->flags);
90 int err;
b87f7936 91
f00cbf19
PJV
92 cls_mall.rule = flow_rule_alloc(tcf_exts_num_actions(&head->exts));
93 if (!cls_mall.rule)
94 return -ENOMEM;
95
d6787147 96 tc_cls_common_offload_init(&cls_mall.common, tp, head->flags, extack);
2447a96f 97 cls_mall.command = TC_CLSMATCHALL_REPLACE;
de4784ca 98 cls_mall.cookie = cookie;
b87f7936 99
9c1c0e12 100 err = tc_setup_offload_action(&cls_mall.rule->action, &head->exts);
f00cbf19
PJV
101 if (err) {
102 kfree(cls_mall.rule);
103 mall_destroy_hw_filter(tp, head, cookie, NULL);
104 if (skip_sw)
105 NL_SET_ERR_MSG_MOD(extack, "Failed to setup flow action");
106 else
107 err = 0;
108
109 return err;
110 }
111
40119211
VB
112 err = tc_setup_cb_add(block, tp, TC_SETUP_CLSMATCHALL, &cls_mall,
113 skip_sw, &head->flags, &head->in_hw_count, true);
9c1c0e12 114 tc_cleanup_offload_action(&cls_mall.rule->action);
f00cbf19
PJV
115 kfree(cls_mall.rule);
116
40119211 117 if (err) {
b505b29f 118 mall_destroy_hw_filter(tp, head, cookie, NULL);
2447a96f 119 return err;
2447a96f
JP
120 }
121
122 if (skip_sw && !(head->flags & TCA_CLS_FLAGS_IN_HW))
123 return -EINVAL;
124
125 return 0;
b87f7936
YG
126}
127
12db03b6
VB
128static void mall_destroy(struct tcf_proto *tp, bool rtnl_held,
129 struct netlink_ext_ack *extack)
bf3994d2
JP
130{
131 struct cls_mall_head *head = rtnl_dereference(tp->root);
132
fd62d9f5 133 if (!head)
763dbf63 134 return;
bf3994d2 135
a51c76b4
HL
136 tcf_unbind_filter(tp, &head->res);
137
2447a96f 138 if (!tc_skip_hw(head->flags))
b505b29f 139 mall_destroy_hw_filter(tp, head, (unsigned long) head, extack);
b87f7936 140
57767e78 141 if (tcf_exts_get_net(&head->exts))
aaa908ff 142 tcf_queue_work(&head->rwork, mall_destroy_work);
57767e78
CW
143 else
144 __mall_destroy(head);
bf3994d2
JP
145}
146
8113c095 147static void *mall_get(struct tcf_proto *tp, u32 handle)
bf3994d2 148{
0db6f8be
ND
149 struct cls_mall_head *head = rtnl_dereference(tp->root);
150
151 if (head && head->handle == handle)
152 return head;
153
8113c095 154 return NULL;
bf3994d2
JP
155}
156
157static const struct nla_policy mall_policy[TCA_MATCHALL_MAX + 1] = {
158 [TCA_MATCHALL_UNSPEC] = { .type = NLA_UNSPEC },
159 [TCA_MATCHALL_CLASSID] = { .type = NLA_U32 },
1afa3cc9 160 [TCA_MATCHALL_FLAGS] = { .type = NLA_U32 },
bf3994d2
JP
161};
162
163static int mall_set_parms(struct net *net, struct tcf_proto *tp,
fd62d9f5 164 struct cls_mall_head *head,
bf3994d2 165 unsigned long base, struct nlattr **tb,
695176bf 166 struct nlattr *est, u32 flags,
50a56190 167 struct netlink_ext_ack *extack)
bf3994d2 168{
bf3994d2
JP
169 int err;
170
695176bf 171 err = tcf_exts_validate(net, tp, tb, est, &head->exts, flags, extack);
bf3994d2 172 if (err < 0)
a74cb369 173 return err;
bf3994d2
JP
174
175 if (tb[TCA_MATCHALL_CLASSID]) {
fd62d9f5
YG
176 head->res.classid = nla_get_u32(tb[TCA_MATCHALL_CLASSID]);
177 tcf_bind_filter(tp, &head->res, base);
bf3994d2 178 }
bf3994d2
JP
179 return 0;
180}
181
182static int mall_change(struct net *net, struct sk_buff *in_skb,
183 struct tcf_proto *tp, unsigned long base,
184 u32 handle, struct nlattr **tca,
695176bf 185 void **arg, u32 flags,
12db03b6 186 struct netlink_ext_ack *extack)
bf3994d2
JP
187{
188 struct cls_mall_head *head = rtnl_dereference(tp->root);
bf3994d2 189 struct nlattr *tb[TCA_MATCHALL_MAX + 1];
fd62d9f5 190 struct cls_mall_head *new;
695176bf 191 u32 userflags = 0;
bf3994d2
JP
192 int err;
193
194 if (!tca[TCA_OPTIONS])
195 return -EINVAL;
196
fd62d9f5
YG
197 if (head)
198 return -EEXIST;
bf3994d2 199
8cb08174
JB
200 err = nla_parse_nested_deprecated(tb, TCA_MATCHALL_MAX,
201 tca[TCA_OPTIONS], mall_policy, NULL);
bf3994d2
JP
202 if (err < 0)
203 return err;
204
b87f7936 205 if (tb[TCA_MATCHALL_FLAGS]) {
695176bf
CW
206 userflags = nla_get_u32(tb[TCA_MATCHALL_FLAGS]);
207 if (!tc_flags_valid(userflags))
b87f7936
YG
208 return -EINVAL;
209 }
210
fd62d9f5
YG
211 new = kzalloc(sizeof(*new), GFP_KERNEL);
212 if (!new)
bf3994d2
JP
213 return -ENOBUFS;
214
14215108 215 err = tcf_exts_init(&new->exts, net, TCA_MATCHALL_ACT, 0);
ec2507d2
YG
216 if (err)
217 goto err_exts_init;
bf3994d2
JP
218
219 if (!handle)
220 handle = 1;
fd62d9f5 221 new->handle = handle;
695176bf 222 new->flags = userflags;
f88c19aa
CW
223 new->pf = alloc_percpu(struct tc_matchall_pcnt);
224 if (!new->pf) {
225 err = -ENOMEM;
226 goto err_alloc_percpu;
227 }
bf3994d2 228
695176bf 229 err = mall_set_parms(net, tp, new, base, tb, tca[TCA_RATE], flags,
50a56190 230 extack);
bf3994d2 231 if (err)
ec2507d2 232 goto err_set_parms;
bf3994d2 233
2447a96f 234 if (!tc_skip_hw(new->flags)) {
02798140
QM
235 err = mall_replace_hw_filter(tp, new, (unsigned long)new,
236 extack);
2447a96f
JP
237 if (err)
238 goto err_replace_hw_filter;
b87f7936 239 }
c7d2b2f5
OG
240
241 if (!tc_in_hw(new->flags))
242 new->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
b87f7936 243
8113c095 244 *arg = head;
fd62d9f5 245 rcu_assign_pointer(tp->root, new);
bf3994d2
JP
246 return 0;
247
ec2507d2
YG
248err_replace_hw_filter:
249err_set_parms:
f88c19aa
CW
250 free_percpu(new->pf);
251err_alloc_percpu:
e2160156 252 tcf_exts_destroy(&new->exts);
ec2507d2 253err_exts_init:
fd62d9f5 254 kfree(new);
bf3994d2
JP
255 return err;
256}
257
571acf21 258static int mall_delete(struct tcf_proto *tp, void *arg, bool *last,
12db03b6 259 bool rtnl_held, struct netlink_ext_ack *extack)
bf3994d2 260{
f517f271
JP
261 struct cls_mall_head *head = rtnl_dereference(tp->root);
262
263 head->deleting = true;
264 *last = true;
265 return 0;
bf3994d2
JP
266}
267
12db03b6
VB
268static void mall_walk(struct tcf_proto *tp, struct tcf_walker *arg,
269 bool rtnl_held)
bf3994d2
JP
270{
271 struct cls_mall_head *head = rtnl_dereference(tp->root);
bf3994d2
JP
272
273 if (arg->count < arg->skip)
274 goto skip;
d66022cd 275
f517f271 276 if (!head || head->deleting)
d66022cd 277 return;
8113c095 278 if (arg->fn(tp, head, arg) < 0)
bf3994d2
JP
279 arg->stop = 1;
280skip:
281 arg->count++;
282}
283
a7323311 284static int mall_reoffload(struct tcf_proto *tp, bool add, flow_setup_cb_t *cb,
0efd1b3a
JH
285 void *cb_priv, struct netlink_ext_ack *extack)
286{
287 struct cls_mall_head *head = rtnl_dereference(tp->root);
288 struct tc_cls_matchall_offload cls_mall = {};
289 struct tcf_block *block = tp->chain->block;
290 int err;
291
292 if (tc_skip_hw(head->flags))
293 return 0;
294
f00cbf19
PJV
295 cls_mall.rule = flow_rule_alloc(tcf_exts_num_actions(&head->exts));
296 if (!cls_mall.rule)
297 return -ENOMEM;
298
d6787147 299 tc_cls_common_offload_init(&cls_mall.common, tp, head->flags, extack);
0efd1b3a
JH
300 cls_mall.command = add ?
301 TC_CLSMATCHALL_REPLACE : TC_CLSMATCHALL_DESTROY;
0efd1b3a
JH
302 cls_mall.cookie = (unsigned long)head;
303
9c1c0e12 304 err = tc_setup_offload_action(&cls_mall.rule->action, &head->exts);
f00cbf19
PJV
305 if (err) {
306 kfree(cls_mall.rule);
307 if (add && tc_skip_sw(head->flags)) {
308 NL_SET_ERR_MSG_MOD(extack, "Failed to setup flow action");
309 return err;
310 }
5f058368 311 return 0;
f00cbf19
PJV
312 }
313
40119211
VB
314 err = tc_setup_cb_reoffload(block, tp, add, cb, TC_SETUP_CLSMATCHALL,
315 &cls_mall, cb_priv, &head->flags,
316 &head->in_hw_count);
9c1c0e12 317 tc_cleanup_offload_action(&cls_mall.rule->action);
f00cbf19
PJV
318 kfree(cls_mall.rule);
319
40119211
VB
320 if (err)
321 return err;
0efd1b3a
JH
322
323 return 0;
324}
325
b7fe4ab8
PJV
326static void mall_stats_hw_filter(struct tcf_proto *tp,
327 struct cls_mall_head *head,
328 unsigned long cookie)
329{
330 struct tc_cls_matchall_offload cls_mall = {};
331 struct tcf_block *block = tp->chain->block;
332
d6787147 333 tc_cls_common_offload_init(&cls_mall.common, tp, head->flags, NULL);
b7fe4ab8
PJV
334 cls_mall.command = TC_CLSMATCHALL_STATS;
335 cls_mall.cookie = cookie;
336
40119211 337 tc_setup_cb_call(block, TC_SETUP_CLSMATCHALL, &cls_mall, false, true);
b7fe4ab8
PJV
338
339 tcf_exts_stats_update(&head->exts, cls_mall.stats.bytes,
4b61d3e8
PL
340 cls_mall.stats.pkts, cls_mall.stats.drops,
341 cls_mall.stats.lastused,
93a129eb
JP
342 cls_mall.stats.used_hw_stats,
343 cls_mall.stats.used_hw_stats_valid);
b7fe4ab8
PJV
344}
345
8113c095 346static int mall_dump(struct net *net, struct tcf_proto *tp, void *fh,
12db03b6 347 struct sk_buff *skb, struct tcmsg *t, bool rtnl_held)
bf3994d2 348{
f88c19aa 349 struct tc_matchall_pcnt gpf = {};
8113c095 350 struct cls_mall_head *head = fh;
bf3994d2 351 struct nlattr *nest;
f88c19aa 352 int cpu;
bf3994d2 353
fd62d9f5 354 if (!head)
bf3994d2
JP
355 return skb->len;
356
b7fe4ab8
PJV
357 if (!tc_skip_hw(head->flags))
358 mall_stats_hw_filter(tp, head, (unsigned long)head);
359
fd62d9f5 360 t->tcm_handle = head->handle;
bf3994d2 361
ae0be8de 362 nest = nla_nest_start_noflag(skb, TCA_OPTIONS);
bf3994d2
JP
363 if (!nest)
364 goto nla_put_failure;
365
fd62d9f5
YG
366 if (head->res.classid &&
367 nla_put_u32(skb, TCA_MATCHALL_CLASSID, head->res.classid))
bf3994d2
JP
368 goto nla_put_failure;
369
7a335ada
OG
370 if (head->flags && nla_put_u32(skb, TCA_MATCHALL_FLAGS, head->flags))
371 goto nla_put_failure;
372
f88c19aa
CW
373 for_each_possible_cpu(cpu) {
374 struct tc_matchall_pcnt *pf = per_cpu_ptr(head->pf, cpu);
375
376 gpf.rhit += pf->rhit;
377 }
378
379 if (nla_put_64bit(skb, TCA_MATCHALL_PCNT,
380 sizeof(struct tc_matchall_pcnt),
381 &gpf, TCA_MATCHALL_PAD))
382 goto nla_put_failure;
383
fd62d9f5 384 if (tcf_exts_dump(skb, &head->exts))
bf3994d2
JP
385 goto nla_put_failure;
386
387 nla_nest_end(skb, nest);
388
fd62d9f5 389 if (tcf_exts_dump_stats(skb, &head->exts) < 0)
bf3994d2
JP
390 goto nla_put_failure;
391
392 return skb->len;
393
394nla_put_failure:
395 nla_nest_cancel(skb, nest);
396 return -1;
397}
398
2e24cd75
CW
399static void mall_bind_class(void *fh, u32 classid, unsigned long cl, void *q,
400 unsigned long base)
07d79fc7
CW
401{
402 struct cls_mall_head *head = fh;
403
2e24cd75
CW
404 if (head && head->res.classid == classid) {
405 if (cl)
406 __tcf_bind_filter(q, &head->res, base);
407 else
408 __tcf_unbind_filter(q, &head->res);
409 }
07d79fc7
CW
410}
411
bf3994d2
JP
412static struct tcf_proto_ops cls_mall_ops __read_mostly = {
413 .kind = "matchall",
414 .classify = mall_classify,
415 .init = mall_init,
416 .destroy = mall_destroy,
417 .get = mall_get,
418 .change = mall_change,
419 .delete = mall_delete,
420 .walk = mall_walk,
0efd1b3a 421 .reoffload = mall_reoffload,
bf3994d2 422 .dump = mall_dump,
07d79fc7 423 .bind_class = mall_bind_class,
bf3994d2
JP
424 .owner = THIS_MODULE,
425};
426
427static int __init cls_mall_init(void)
428{
429 return register_tcf_proto_ops(&cls_mall_ops);
430}
431
432static void __exit cls_mall_exit(void)
433{
434 unregister_tcf_proto_ops(&cls_mall_ops);
435}
436
437module_init(cls_mall_init);
438module_exit(cls_mall_exit);
439
440MODULE_AUTHOR("Jiri Pirko <jiri@mellanox.com>");
441MODULE_DESCRIPTION("Match-all classifier");
442MODULE_LICENSE("GPL v2");