Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/livep...
[linux-2.6-block.git] / net / sched / cls_u32.c
CommitLineData
1da177e4
LT
1/*
2 * net/sched/cls_u32.c Ugly (or Universal) 32bit key Packet Classifier.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version
7 * 2 of the License, or (at your option) any later version.
8 *
9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
10 *
11 * The filters are packed to hash tables of key nodes
12 * with a set of 32bit key/mask pairs at every node.
13 * Nodes reference next level hash tables etc.
14 *
15 * This scheme is the best universal classifier I managed to
16 * invent; it is not super-fast, but it is not slow (provided you
17 * program it correctly), and general enough. And its relative
18 * speed grows as the number of rules becomes larger.
19 *
20 * It seems that it represents the best middle point between
21 * speed and manageability both by human and by machine.
22 *
23 * It is especially useful for link sharing combined with QoS;
24 * pure RSVP doesn't need such a general approach and can use
25 * much simpler (and faster) schemes, sort of cls_rsvp.c.
26 *
27 * JHS: We should remove the CONFIG_NET_CLS_IND from here
28 * eventually when the meta match extension is made available
29 *
30 * nfmark match added by Catalin(ux aka Dino) BOIE <catab at umbrella.ro>
31 */
32
1da177e4 33#include <linux/module.h>
5a0e3ad6 34#include <linux/slab.h>
1da177e4
LT
35#include <linux/types.h>
36#include <linux/kernel.h>
1da177e4 37#include <linux/string.h>
1da177e4 38#include <linux/errno.h>
1ce87720 39#include <linux/percpu.h>
1da177e4 40#include <linux/rtnetlink.h>
1da177e4 41#include <linux/skbuff.h>
7801db8a 42#include <linux/bitmap.h>
3cd904ec
WC
43#include <linux/netdevice.h>
44#include <linux/hash.h>
0ba48053 45#include <net/netlink.h>
1da177e4
LT
46#include <net/act_api.h>
47#include <net/pkt_cls.h>
e7614370 48#include <linux/idr.h>
1da177e4 49
cc7ec456 50struct tc_u_knode {
1ce87720 51 struct tc_u_knode __rcu *next;
1da177e4 52 u32 handle;
1ce87720 53 struct tc_u_hnode __rcu *ht_up;
1da177e4
LT
54 struct tcf_exts exts;
55#ifdef CONFIG_NET_CLS_IND
2519a602 56 int ifindex;
1da177e4
LT
57#endif
58 u8 fshift;
59 struct tcf_result res;
1ce87720 60 struct tc_u_hnode __rcu *ht_down;
1da177e4 61#ifdef CONFIG_CLS_U32_PERF
459d5f62 62 struct tc_u32_pcnt __percpu *pf;
1da177e4 63#endif
9e8ce79c 64 u32 flags;
1da177e4 65#ifdef CONFIG_CLS_U32_MARK
459d5f62
JF
66 u32 val;
67 u32 mask;
68 u32 __percpu *pcpu_success;
1da177e4 69#endif
1ce87720 70 struct tcf_proto *tp;
c0d378ef
CW
71 union {
72 struct work_struct work;
73 struct rcu_head rcu;
74 };
4e2840ee
JF
75 /* The 'sel' field MUST be the last field in structure to allow for
76 * tc_u32_keys allocated at end of structure.
77 */
78 struct tc_u32_sel sel;
1da177e4
LT
79};
80
cc7ec456 81struct tc_u_hnode {
1ce87720 82 struct tc_u_hnode __rcu *next;
1da177e4
LT
83 u32 handle;
84 u32 prio;
85 struct tc_u_common *tp_c;
86 int refcnt;
cc7ec456 87 unsigned int divisor;
e7614370 88 struct idr handle_idr;
1ce87720 89 struct rcu_head rcu;
f40fe58d 90 u32 flags;
5778d39d
WC
91 /* The 'ht' field MUST be the last field in structure to allow for
92 * more entries allocated at end of structure.
93 */
94 struct tc_u_knode __rcu *ht[1];
1da177e4
LT
95};
96
cc7ec456 97struct tc_u_common {
1ce87720 98 struct tc_u_hnode __rcu *hlist;
339c21d7 99 void *ptr;
1da177e4 100 int refcnt;
e7614370 101 struct idr handle_idr;
3cd904ec 102 struct hlist_node hnode;
1ce87720 103 struct rcu_head rcu;
1da177e4
LT
104};
105
cc7ec456
ED
106static inline unsigned int u32_hash_fold(__be32 key,
107 const struct tc_u32_sel *sel,
108 u8 fshift)
1da177e4 109{
cc7ec456 110 unsigned int h = ntohl(key & sel->hmask) >> fshift;
1da177e4
LT
111
112 return h;
113}
114
5a7a5555
JHS
115static int u32_classify(struct sk_buff *skb, const struct tcf_proto *tp,
116 struct tcf_result *res)
1da177e4
LT
117{
118 struct {
119 struct tc_u_knode *knode;
fbc2e7d9 120 unsigned int off;
1da177e4
LT
121 } stack[TC_U32_MAXDEPTH];
122
1ce87720 123 struct tc_u_hnode *ht = rcu_dereference_bh(tp->root);
fbc2e7d9 124 unsigned int off = skb_network_offset(skb);
1da177e4
LT
125 struct tc_u_knode *n;
126 int sdepth = 0;
127 int off2 = 0;
128 int sel = 0;
129#ifdef CONFIG_CLS_U32_PERF
130 int j;
131#endif
132 int i, r;
133
134next_ht:
1ce87720 135 n = rcu_dereference_bh(ht->ht[sel]);
1da177e4
LT
136
137next_knode:
138 if (n) {
139 struct tc_u32_key *key = n->sel.keys;
140
141#ifdef CONFIG_CLS_U32_PERF
459d5f62 142 __this_cpu_inc(n->pf->rcnt);
1da177e4
LT
143 j = 0;
144#endif
145
d34e3e18
SS
146 if (tc_skip_sw(n->flags)) {
147 n = rcu_dereference_bh(n->next);
148 goto next_knode;
149 }
150
1da177e4 151#ifdef CONFIG_CLS_U32_MARK
459d5f62 152 if ((skb->mark & n->mask) != n->val) {
1ce87720 153 n = rcu_dereference_bh(n->next);
1da177e4
LT
154 goto next_knode;
155 } else {
459d5f62 156 __this_cpu_inc(*n->pcpu_success);
1da177e4
LT
157 }
158#endif
159
cc7ec456 160 for (i = n->sel.nkeys; i > 0; i--, key++) {
66d50d25 161 int toff = off + key->off + (off2 & key->offmask);
86fce3ba 162 __be32 *data, hdata;
fbc2e7d9 163
4e18b3ed 164 if (skb_headroom(skb) + toff > INT_MAX)
66d50d25 165 goto out;
166
86fce3ba 167 data = skb_header_pointer(skb, toff, 4, &hdata);
fbc2e7d9
CG
168 if (!data)
169 goto out;
170 if ((*data ^ key->val) & key->mask) {
1ce87720 171 n = rcu_dereference_bh(n->next);
1da177e4
LT
172 goto next_knode;
173 }
174#ifdef CONFIG_CLS_U32_PERF
459d5f62 175 __this_cpu_inc(n->pf->kcnts[j]);
1da177e4
LT
176 j++;
177#endif
178 }
1ce87720
JF
179
180 ht = rcu_dereference_bh(n->ht_down);
181 if (!ht) {
1da177e4 182check_terminal:
cc7ec456 183 if (n->sel.flags & TC_U32_TERMINAL) {
1da177e4
LT
184
185 *res = n->res;
186#ifdef CONFIG_NET_CLS_IND
2519a602 187 if (!tcf_match_indev(skb, n->ifindex)) {
1ce87720 188 n = rcu_dereference_bh(n->next);
1da177e4
LT
189 goto next_knode;
190 }
191#endif
192#ifdef CONFIG_CLS_U32_PERF
459d5f62 193 __this_cpu_inc(n->pf->rhit);
1da177e4
LT
194#endif
195 r = tcf_exts_exec(skb, &n->exts, res);
196 if (r < 0) {
1ce87720 197 n = rcu_dereference_bh(n->next);
1da177e4
LT
198 goto next_knode;
199 }
200
201 return r;
202 }
1ce87720 203 n = rcu_dereference_bh(n->next);
1da177e4
LT
204 goto next_knode;
205 }
206
207 /* PUSH */
208 if (sdepth >= TC_U32_MAXDEPTH)
209 goto deadloop;
210 stack[sdepth].knode = n;
fbc2e7d9 211 stack[sdepth].off = off;
1da177e4
LT
212 sdepth++;
213
1ce87720 214 ht = rcu_dereference_bh(n->ht_down);
1da177e4 215 sel = 0;
fbc2e7d9 216 if (ht->divisor) {
86fce3ba 217 __be32 *data, hdata;
fbc2e7d9
CG
218
219 data = skb_header_pointer(skb, off + n->sel.hoff, 4,
86fce3ba 220 &hdata);
fbc2e7d9
CG
221 if (!data)
222 goto out;
223 sel = ht->divisor & u32_hash_fold(*data, &n->sel,
224 n->fshift);
225 }
cc7ec456 226 if (!(n->sel.flags & (TC_U32_VAROFFSET | TC_U32_OFFSET | TC_U32_EAT)))
1da177e4
LT
227 goto next_ht;
228
cc7ec456 229 if (n->sel.flags & (TC_U32_OFFSET | TC_U32_VAROFFSET)) {
1da177e4 230 off2 = n->sel.off + 3;
fbc2e7d9 231 if (n->sel.flags & TC_U32_VAROFFSET) {
86fce3ba 232 __be16 *data, hdata;
fbc2e7d9
CG
233
234 data = skb_header_pointer(skb,
235 off + n->sel.offoff,
86fce3ba 236 2, &hdata);
fbc2e7d9
CG
237 if (!data)
238 goto out;
239 off2 += ntohs(n->sel.offmask & *data) >>
240 n->sel.offshift;
241 }
1da177e4
LT
242 off2 &= ~3;
243 }
cc7ec456 244 if (n->sel.flags & TC_U32_EAT) {
fbc2e7d9 245 off += off2;
1da177e4
LT
246 off2 = 0;
247 }
248
fbc2e7d9 249 if (off < skb->len)
1da177e4
LT
250 goto next_ht;
251 }
252
253 /* POP */
254 if (sdepth--) {
255 n = stack[sdepth].knode;
1ce87720 256 ht = rcu_dereference_bh(n->ht_up);
fbc2e7d9 257 off = stack[sdepth].off;
1da177e4
LT
258 goto check_terminal;
259 }
fbc2e7d9 260out:
1da177e4
LT
261 return -1;
262
263deadloop:
e87cc472 264 net_warn_ratelimited("cls_u32: dead loop\n");
1da177e4
LT
265 return -1;
266}
267
5a7a5555 268static struct tc_u_hnode *u32_lookup_ht(struct tc_u_common *tp_c, u32 handle)
1da177e4
LT
269{
270 struct tc_u_hnode *ht;
271
1ce87720
JF
272 for (ht = rtnl_dereference(tp_c->hlist);
273 ht;
274 ht = rtnl_dereference(ht->next))
1da177e4
LT
275 if (ht->handle == handle)
276 break;
277
278 return ht;
279}
280
5a7a5555 281static struct tc_u_knode *u32_lookup_key(struct tc_u_hnode *ht, u32 handle)
1da177e4 282{
cc7ec456 283 unsigned int sel;
1da177e4
LT
284 struct tc_u_knode *n = NULL;
285
286 sel = TC_U32_HASH(handle);
287 if (sel > ht->divisor)
288 goto out;
289
1ce87720
JF
290 for (n = rtnl_dereference(ht->ht[sel]);
291 n;
292 n = rtnl_dereference(n->next))
1da177e4
LT
293 if (n->handle == handle)
294 break;
295out:
296 return n;
297}
298
299
8113c095 300static void *u32_get(struct tcf_proto *tp, u32 handle)
1da177e4
LT
301{
302 struct tc_u_hnode *ht;
303 struct tc_u_common *tp_c = tp->data;
304
305 if (TC_U32_HTID(handle) == TC_U32_ROOT)
1ce87720 306 ht = rtnl_dereference(tp->root);
1da177e4
LT
307 else
308 ht = u32_lookup_ht(tp_c, TC_U32_HTID(handle));
309
310 if (!ht)
8113c095 311 return NULL;
1da177e4
LT
312
313 if (TC_U32_KEY(handle) == 0)
8113c095 314 return ht;
1da177e4 315
8113c095 316 return u32_lookup_key(ht, handle);
1da177e4
LT
317}
318
ffdc2d9e 319/* Protected by rtnl lock */
e7614370 320static u32 gen_new_htid(struct tc_u_common *tp_c, struct tc_u_hnode *ptr)
1da177e4 321{
ffdc2d9e
MW
322 int id = idr_alloc_cyclic(&tp_c->handle_idr, ptr, 1, 0x7FF, GFP_KERNEL);
323 if (id < 0)
e7614370 324 return 0;
ffdc2d9e 325 return (id | 0x800U) << 20;
1da177e4
LT
326}
327
3cd904ec
WC
328static struct hlist_head *tc_u_common_hash;
329
330#define U32_HASH_SHIFT 10
331#define U32_HASH_SIZE (1 << U32_HASH_SHIFT)
332
339c21d7
JP
333static void *tc_u_common_ptr(const struct tcf_proto *tp)
334{
335 struct tcf_block *block = tp->chain->block;
336
337 /* The block sharing is currently supported only
338 * for classless qdiscs. In that case we use block
339 * for tc_u_common identification. In case the
340 * block is not shared, block->q is a valid pointer
341 * and we can use that. That works for classful qdiscs.
342 */
343 if (tcf_block_shared(block))
344 return block;
345 else
346 return block->q;
347}
348
3cd904ec
WC
349static unsigned int tc_u_hash(const struct tcf_proto *tp)
350{
339c21d7 351 return hash_ptr(tc_u_common_ptr(tp), U32_HASH_SHIFT);
3cd904ec
WC
352}
353
354static struct tc_u_common *tc_u_common_find(const struct tcf_proto *tp)
355{
356 struct tc_u_common *tc;
357 unsigned int h;
358
359 h = tc_u_hash(tp);
360 hlist_for_each_entry(tc, &tc_u_common_hash[h], hnode) {
339c21d7 361 if (tc->ptr == tc_u_common_ptr(tp))
3cd904ec
WC
362 return tc;
363 }
364 return NULL;
365}
366
1da177e4
LT
367static int u32_init(struct tcf_proto *tp)
368{
369 struct tc_u_hnode *root_ht;
370 struct tc_u_common *tp_c;
3cd904ec 371 unsigned int h;
1da177e4 372
3cd904ec 373 tp_c = tc_u_common_find(tp);
1da177e4 374
0da974f4 375 root_ht = kzalloc(sizeof(*root_ht), GFP_KERNEL);
1da177e4
LT
376 if (root_ht == NULL)
377 return -ENOBUFS;
378
1da177e4 379 root_ht->refcnt++;
e7614370 380 root_ht->handle = tp_c ? gen_new_htid(tp_c, root_ht) : 0x80000000;
1da177e4 381 root_ht->prio = tp->prio;
e7614370 382 idr_init(&root_ht->handle_idr);
1da177e4
LT
383
384 if (tp_c == NULL) {
0da974f4 385 tp_c = kzalloc(sizeof(*tp_c), GFP_KERNEL);
1da177e4
LT
386 if (tp_c == NULL) {
387 kfree(root_ht);
388 return -ENOBUFS;
389 }
339c21d7 390 tp_c->ptr = tc_u_common_ptr(tp);
3cd904ec 391 INIT_HLIST_NODE(&tp_c->hnode);
e7614370 392 idr_init(&tp_c->handle_idr);
3cd904ec
WC
393
394 h = tc_u_hash(tp);
395 hlist_add_head(&tp_c->hnode, &tc_u_common_hash[h]);
1da177e4
LT
396 }
397
398 tp_c->refcnt++;
1ce87720
JF
399 RCU_INIT_POINTER(root_ht->next, tp_c->hlist);
400 rcu_assign_pointer(tp_c->hlist, root_ht);
1da177e4
LT
401 root_ht->tp_c = tp_c;
402
1ce87720 403 rcu_assign_pointer(tp->root, root_ht);
1da177e4
LT
404 tp->data = tp_c;
405 return 0;
406}
407
5a7a5555 408static int u32_destroy_key(struct tcf_proto *tp, struct tc_u_knode *n,
de5df632 409 bool free_pf)
1da177e4 410{
d7cdee5e
PA
411 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
412
18d0264f 413 tcf_exts_destroy(&n->exts);
35c55fc1 414 tcf_exts_put_net(&n->exts);
d7cdee5e
PA
415 if (ht && --ht->refcnt == 0)
416 kfree(ht);
1da177e4 417#ifdef CONFIG_CLS_U32_PERF
de5df632
JF
418 if (free_pf)
419 free_percpu(n->pf);
a1ddcfee
JF
420#endif
421#ifdef CONFIG_CLS_U32_MARK
de5df632
JF
422 if (free_pf)
423 free_percpu(n->pcpu_success);
1da177e4
LT
424#endif
425 kfree(n);
426 return 0;
427}
428
de5df632
JF
429/* u32_delete_key_rcu should be called when free'ing a copied
430 * version of a tc_u_knode obtained from u32_init_knode(). When
431 * copies are obtained from u32_init_knode() the statistics are
432 * shared between the old and new copies to allow readers to
433 * continue to update the statistics during the copy. To support
434 * this the u32_delete_key_rcu variant does not free the percpu
435 * statistics.
436 */
c0d378ef
CW
437static void u32_delete_key_work(struct work_struct *work)
438{
439 struct tc_u_knode *key = container_of(work, struct tc_u_knode, work);
440
441 rtnl_lock();
442 u32_destroy_key(key->tp, key, false);
443 rtnl_unlock();
444}
445
1ce87720
JF
446static void u32_delete_key_rcu(struct rcu_head *rcu)
447{
448 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu);
449
c0d378ef
CW
450 INIT_WORK(&key->work, u32_delete_key_work);
451 tcf_queue_work(&key->work);
de5df632
JF
452}
453
454/* u32_delete_key_freepf_rcu is the rcu callback variant
455 * that free's the entire structure including the statistics
456 * percpu variables. Only use this if the key is not a copy
457 * returned by u32_init_knode(). See u32_delete_key_rcu()
458 * for the variant that should be used with keys return from
459 * u32_init_knode()
460 */
c0d378ef
CW
461static void u32_delete_key_freepf_work(struct work_struct *work)
462{
463 struct tc_u_knode *key = container_of(work, struct tc_u_knode, work);
464
465 rtnl_lock();
466 u32_destroy_key(key->tp, key, true);
467 rtnl_unlock();
468}
469
de5df632
JF
470static void u32_delete_key_freepf_rcu(struct rcu_head *rcu)
471{
472 struct tc_u_knode *key = container_of(rcu, struct tc_u_knode, rcu);
473
c0d378ef
CW
474 INIT_WORK(&key->work, u32_delete_key_freepf_work);
475 tcf_queue_work(&key->work);
1ce87720
JF
476}
477
82d567c2 478static int u32_delete_key(struct tcf_proto *tp, struct tc_u_knode *key)
1da177e4 479{
1ce87720
JF
480 struct tc_u_knode __rcu **kp;
481 struct tc_u_knode *pkp;
a96366bf 482 struct tc_u_hnode *ht = rtnl_dereference(key->ht_up);
1da177e4
LT
483
484 if (ht) {
1ce87720
JF
485 kp = &ht->ht[TC_U32_HASH(key->handle)];
486 for (pkp = rtnl_dereference(*kp); pkp;
487 kp = &pkp->next, pkp = rtnl_dereference(*kp)) {
488 if (pkp == key) {
489 RCU_INIT_POINTER(*kp, key->next);
1da177e4 490
a0efb80c 491 tcf_unbind_filter(tp, &key->res);
f12c6432 492 idr_remove(&ht->handle_idr, key->handle);
35c55fc1 493 tcf_exts_get_net(&key->exts);
de5df632 494 call_rcu(&key->rcu, u32_delete_key_freepf_rcu);
1da177e4
LT
495 return 0;
496 }
497 }
498 }
547b792c 499 WARN_ON(1);
1da177e4
LT
500 return 0;
501}
502
458e704d
JK
503static void u32_clear_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
504 struct netlink_ext_ack *extack)
a1b7c5fd 505{
245dc512 506 struct tcf_block *block = tp->chain->block;
de4784ca 507 struct tc_cls_u32_offload cls_u32 = {};
a1b7c5fd 508
458e704d 509 tc_cls_common_offload_init(&cls_u32.common, tp, h->flags, extack);
77460411
JP
510 cls_u32.command = TC_CLSU32_DELETE_HNODE;
511 cls_u32.hnode.divisor = h->divisor;
512 cls_u32.hnode.handle = h->handle;
513 cls_u32.hnode.prio = h->prio;
de4784ca 514
245dc512 515 tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, false);
a1b7c5fd
JF
516}
517
5a7a5555 518static int u32_replace_hw_hnode(struct tcf_proto *tp, struct tc_u_hnode *h,
10a47e0f 519 u32 flags, struct netlink_ext_ack *extack)
a1b7c5fd 520{
245dc512 521 struct tcf_block *block = tp->chain->block;
de4784ca 522 struct tc_cls_u32_offload cls_u32 = {};
245dc512
JP
523 bool skip_sw = tc_skip_sw(flags);
524 bool offloaded = false;
d34e3e18 525 int err;
a1b7c5fd 526
f40fe58d 527 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
de4784ca
JP
528 cls_u32.command = TC_CLSU32_NEW_HNODE;
529 cls_u32.hnode.divisor = h->divisor;
530 cls_u32.hnode.handle = h->handle;
531 cls_u32.hnode.prio = h->prio;
a1b7c5fd 532
245dc512
JP
533 err = tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, skip_sw);
534 if (err < 0) {
458e704d 535 u32_clear_hw_hnode(tp, h, NULL);
d47a0f38 536 return err;
245dc512
JP
537 } else if (err > 0) {
538 offloaded = true;
539 }
540
541 if (skip_sw && !offloaded)
542 return -EINVAL;
d34e3e18
SS
543
544 return 0;
a1b7c5fd
JF
545}
546
458e704d
JK
547static void u32_remove_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
548 struct netlink_ext_ack *extack)
a1b7c5fd 549{
245dc512 550 struct tcf_block *block = tp->chain->block;
de4784ca 551 struct tc_cls_u32_offload cls_u32 = {};
a1b7c5fd 552
458e704d 553 tc_cls_common_offload_init(&cls_u32.common, tp, n->flags, extack);
77460411 554 cls_u32.command = TC_CLSU32_DELETE_KNODE;
caa72601 555 cls_u32.knode.handle = n->handle;
a1b7c5fd 556
245dc512 557 tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, false);
caa72601 558 tcf_block_offload_dec(block, &n->flags);
a1b7c5fd
JF
559}
560
5a7a5555 561static int u32_replace_hw_knode(struct tcf_proto *tp, struct tc_u_knode *n,
10a47e0f 562 u32 flags, struct netlink_ext_ack *extack)
a1b7c5fd 563{
058a6c03 564 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
245dc512 565 struct tcf_block *block = tp->chain->block;
de4784ca 566 struct tc_cls_u32_offload cls_u32 = {};
245dc512 567 bool skip_sw = tc_skip_sw(flags);
d34e3e18 568 int err;
a1b7c5fd 569
f40fe58d 570 tc_cls_common_offload_init(&cls_u32.common, tp, flags, extack);
de4784ca
JP
571 cls_u32.command = TC_CLSU32_REPLACE_KNODE;
572 cls_u32.knode.handle = n->handle;
573 cls_u32.knode.fshift = n->fshift;
a1b7c5fd 574#ifdef CONFIG_CLS_U32_MARK
de4784ca
JP
575 cls_u32.knode.val = n->val;
576 cls_u32.knode.mask = n->mask;
a1b7c5fd 577#else
de4784ca
JP
578 cls_u32.knode.val = 0;
579 cls_u32.knode.mask = 0;
a1b7c5fd 580#endif
de4784ca
JP
581 cls_u32.knode.sel = &n->sel;
582 cls_u32.knode.exts = &n->exts;
201c44bd 583 if (n->ht_down)
058a6c03 584 cls_u32.knode.link_handle = ht->handle;
201c44bd 585
245dc512
JP
586 err = tc_setup_cb_call(block, NULL, TC_SETUP_CLSU32, &cls_u32, skip_sw);
587 if (err < 0) {
458e704d 588 u32_remove_hw_knode(tp, n, NULL);
201c44bd 589 return err;
245dc512 590 } else if (err > 0) {
caa72601 591 tcf_block_offload_inc(block, &n->flags);
245dc512
JP
592 }
593
0f04d057 594 if (skip_sw && !(n->flags & TCA_CLS_FLAGS_IN_HW))
245dc512 595 return -EINVAL;
d34e3e18
SS
596
597 return 0;
a1b7c5fd
JF
598}
599
458e704d
JK
600static void u32_clear_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
601 struct netlink_ext_ack *extack)
1da177e4
LT
602{
603 struct tc_u_knode *n;
cc7ec456 604 unsigned int h;
1da177e4 605
cc7ec456 606 for (h = 0; h <= ht->divisor; h++) {
1ce87720
JF
607 while ((n = rtnl_dereference(ht->ht[h])) != NULL) {
608 RCU_INIT_POINTER(ht->ht[h],
609 rtnl_dereference(n->next));
a0efb80c 610 tcf_unbind_filter(tp, &n->res);
458e704d 611 u32_remove_hw_knode(tp, n, extack);
9c160941 612 idr_remove(&ht->handle_idr, n->handle);
35c55fc1
CW
613 if (tcf_exts_get_net(&n->exts))
614 call_rcu(&n->rcu, u32_delete_key_freepf_rcu);
615 else
616 u32_destroy_key(n->tp, n, true);
1da177e4
LT
617 }
618 }
619}
620
458e704d
JK
621static int u32_destroy_hnode(struct tcf_proto *tp, struct tc_u_hnode *ht,
622 struct netlink_ext_ack *extack)
1da177e4
LT
623{
624 struct tc_u_common *tp_c = tp->data;
1ce87720
JF
625 struct tc_u_hnode __rcu **hn;
626 struct tc_u_hnode *phn;
1da177e4 627
547b792c 628 WARN_ON(ht->refcnt);
1da177e4 629
458e704d 630 u32_clear_hnode(tp, ht, extack);
1da177e4 631
1ce87720
JF
632 hn = &tp_c->hlist;
633 for (phn = rtnl_dereference(*hn);
634 phn;
635 hn = &phn->next, phn = rtnl_dereference(*hn)) {
636 if (phn == ht) {
458e704d 637 u32_clear_hw_hnode(tp, ht, extack);
e7614370 638 idr_destroy(&ht->handle_idr);
9c160941 639 idr_remove(&tp_c->handle_idr, ht->handle);
1ce87720
JF
640 RCU_INIT_POINTER(*hn, ht->next);
641 kfree_rcu(ht, rcu);
1da177e4
LT
642 return 0;
643 }
644 }
645
1da177e4
LT
646 return -ENOENT;
647}
648
1e052be6
CW
649static bool ht_empty(struct tc_u_hnode *ht)
650{
651 unsigned int h;
652
653 for (h = 0; h <= ht->divisor; h++)
654 if (rcu_access_pointer(ht->ht[h]))
655 return false;
656
657 return true;
658}
659
715df5ec 660static void u32_destroy(struct tcf_proto *tp, struct netlink_ext_ack *extack)
1da177e4
LT
661{
662 struct tc_u_common *tp_c = tp->data;
1ce87720 663 struct tc_u_hnode *root_ht = rtnl_dereference(tp->root);
1da177e4 664
547b792c 665 WARN_ON(root_ht == NULL);
1da177e4
LT
666
667 if (root_ht && --root_ht->refcnt == 0)
458e704d 668 u32_destroy_hnode(tp, root_ht, extack);
1da177e4
LT
669
670 if (--tp_c->refcnt == 0) {
671 struct tc_u_hnode *ht;
1da177e4 672
3cd904ec 673 hlist_del(&tp_c->hnode);
1da177e4 674
1ce87720 675 while ((ht = rtnl_dereference(tp_c->hlist)) != NULL) {
d7cdee5e 676 u32_clear_hnode(tp, ht, extack);
1ce87720 677 RCU_INIT_POINTER(tp_c->hlist, ht->next);
d7cdee5e
PA
678
679 /* u32_destroy_key() will later free ht for us, if it's
680 * still referenced by some knode
681 */
682 if (--ht->refcnt == 0)
683 kfree_rcu(ht, rcu);
3ff50b79 684 }
1da177e4 685
e7614370 686 idr_destroy(&tp_c->handle_idr);
1da177e4
LT
687 kfree(tp_c);
688 }
689
690 tp->data = NULL;
691}
692
571acf21
AA
693static int u32_delete(struct tcf_proto *tp, void *arg, bool *last,
694 struct netlink_ext_ack *extack)
1da177e4 695{
8113c095 696 struct tc_u_hnode *ht = arg;
1ce87720 697 struct tc_u_hnode *root_ht = rtnl_dereference(tp->root);
763dbf63
WC
698 struct tc_u_common *tp_c = tp->data;
699 int ret = 0;
1da177e4
LT
700
701 if (ht == NULL)
763dbf63 702 goto out;
1da177e4 703
a1b7c5fd 704 if (TC_U32_KEY(ht->handle)) {
458e704d 705 u32_remove_hw_knode(tp, (struct tc_u_knode *)ht, extack);
763dbf63
WC
706 ret = u32_delete_key(tp, (struct tc_u_knode *)ht);
707 goto out;
a1b7c5fd 708 }
1da177e4 709
4b981dbc
AA
710 if (root_ht == ht) {
711 NL_SET_ERR_MSG_MOD(extack, "Not allowed to delete root node");
1da177e4 712 return -EINVAL;
4b981dbc 713 }
1da177e4 714
e56cfad1
JP
715 if (ht->refcnt == 1) {
716 ht->refcnt--;
458e704d 717 u32_destroy_hnode(tp, ht, extack);
e56cfad1 718 } else {
4b981dbc 719 NL_SET_ERR_MSG_MOD(extack, "Can not delete in-use filter");
e56cfad1
JP
720 return -EBUSY;
721 }
1da177e4 722
763dbf63
WC
723out:
724 *last = true;
725 if (root_ht) {
726 if (root_ht->refcnt > 1) {
727 *last = false;
728 goto ret;
729 }
730 if (root_ht->refcnt == 1) {
731 if (!ht_empty(root_ht)) {
732 *last = false;
733 goto ret;
734 }
735 }
736 }
737
738 if (tp_c->refcnt > 1) {
739 *last = false;
740 goto ret;
741 }
742
743 if (tp_c->refcnt == 1) {
744 struct tc_u_hnode *ht;
745
746 for (ht = rtnl_dereference(tp_c->hlist);
747 ht;
748 ht = rtnl_dereference(ht->next))
749 if (!ht_empty(ht)) {
750 *last = false;
751 break;
752 }
753 }
754
755ret:
756 return ret;
1da177e4
LT
757}
758
e7614370 759static u32 gen_new_kid(struct tc_u_hnode *ht, u32 htid)
1da177e4 760{
f730cb93 761 u32 index = htid | 0x800;
e7614370 762 u32 max = htid | 0xFFF;
e7614370 763
f730cb93
MW
764 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max, GFP_KERNEL)) {
765 index = htid + 1;
766 if (idr_alloc_u32(&ht->handle_idr, NULL, &index, max,
767 GFP_KERNEL))
768 index = max;
e7614370 769 }
7801db8a 770
f730cb93 771 return index;
1da177e4
LT
772}
773
6fa8c014
PM
774static const struct nla_policy u32_policy[TCA_U32_MAX + 1] = {
775 [TCA_U32_CLASSID] = { .type = NLA_U32 },
776 [TCA_U32_HASH] = { .type = NLA_U32 },
777 [TCA_U32_LINK] = { .type = NLA_U32 },
778 [TCA_U32_DIVISOR] = { .type = NLA_U32 },
779 [TCA_U32_SEL] = { .len = sizeof(struct tc_u32_sel) },
780 [TCA_U32_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ },
781 [TCA_U32_MARK] = { .len = sizeof(struct tc_u32_mark) },
9e8ce79c 782 [TCA_U32_FLAGS] = { .type = NLA_U32 },
6fa8c014
PM
783};
784
c1b52739
BL
785static int u32_set_parms(struct net *net, struct tcf_proto *tp,
786 unsigned long base, struct tc_u_hnode *ht,
add93b61 787 struct tc_u_knode *n, struct nlattr **tb,
50a56190
AA
788 struct nlattr *est, bool ovr,
789 struct netlink_ext_ack *extack)
1da177e4 790{
b9a24bb7 791 int err;
1da177e4 792
50a56190 793 err = tcf_exts_validate(net, tp, tb, est, &n->exts, ovr, extack);
1da177e4
LT
794 if (err < 0)
795 return err;
796
add93b61 797 if (tb[TCA_U32_LINK]) {
1587bac4 798 u32 handle = nla_get_u32(tb[TCA_U32_LINK]);
47a1a1d4 799 struct tc_u_hnode *ht_down = NULL, *ht_old;
1da177e4 800
4b981dbc
AA
801 if (TC_U32_KEY(handle)) {
802 NL_SET_ERR_MSG_MOD(extack, "u32 Link handle must be a hash table");
705c7091 803 return -EINVAL;
4b981dbc 804 }
1da177e4
LT
805
806 if (handle) {
807 ht_down = u32_lookup_ht(ht->tp_c, handle);
808
4b981dbc
AA
809 if (!ht_down) {
810 NL_SET_ERR_MSG_MOD(extack, "Link hash table not found");
705c7091 811 return -EINVAL;
4b981dbc 812 }
1da177e4
LT
813 ht_down->refcnt++;
814 }
815
1ce87720
JF
816 ht_old = rtnl_dereference(n->ht_down);
817 rcu_assign_pointer(n->ht_down, ht_down);
1da177e4 818
47a1a1d4
PM
819 if (ht_old)
820 ht_old->refcnt--;
1da177e4 821 }
add93b61 822 if (tb[TCA_U32_CLASSID]) {
1587bac4 823 n->res.classid = nla_get_u32(tb[TCA_U32_CLASSID]);
1da177e4
LT
824 tcf_bind_filter(tp, &n->res, base);
825 }
826
827#ifdef CONFIG_NET_CLS_IND
add93b61 828 if (tb[TCA_U32_INDEV]) {
2519a602 829 int ret;
1057c55f 830 ret = tcf_change_indev(net, tb[TCA_U32_INDEV], extack);
2519a602 831 if (ret < 0)
705c7091 832 return -EINVAL;
2519a602 833 n->ifindex = ret;
1da177e4
LT
834 }
835#endif
1da177e4 836 return 0;
1da177e4
LT
837}
838
5a7a5555 839static void u32_replace_knode(struct tcf_proto *tp, struct tc_u_common *tp_c,
de5df632
JF
840 struct tc_u_knode *n)
841{
842 struct tc_u_knode __rcu **ins;
843 struct tc_u_knode *pins;
844 struct tc_u_hnode *ht;
845
846 if (TC_U32_HTID(n->handle) == TC_U32_ROOT)
847 ht = rtnl_dereference(tp->root);
848 else
849 ht = u32_lookup_ht(tp_c, TC_U32_HTID(n->handle));
850
851 ins = &ht->ht[TC_U32_HASH(n->handle)];
852
853 /* The node must always exist for it to be replaced if this is not the
854 * case then something went very wrong elsewhere.
855 */
856 for (pins = rtnl_dereference(*ins); ;
857 ins = &pins->next, pins = rtnl_dereference(*ins))
858 if (pins->handle == n->handle)
859 break;
860
234a4624 861 idr_replace(&ht->handle_idr, n, n->handle);
de5df632
JF
862 RCU_INIT_POINTER(n->next, pins->next);
863 rcu_assign_pointer(*ins, n);
864}
865
866static struct tc_u_knode *u32_init_knode(struct tcf_proto *tp,
867 struct tc_u_knode *n)
868{
058a6c03 869 struct tc_u_hnode *ht = rtnl_dereference(n->ht_down);
de5df632 870 struct tc_u32_sel *s = &n->sel;
058a6c03 871 struct tc_u_knode *new;
de5df632
JF
872
873 new = kzalloc(sizeof(*n) + s->nkeys*sizeof(struct tc_u32_key),
874 GFP_KERNEL);
875
876 if (!new)
877 return NULL;
878
879 RCU_INIT_POINTER(new->next, n->next);
880 new->handle = n->handle;
881 RCU_INIT_POINTER(new->ht_up, n->ht_up);
882
883#ifdef CONFIG_NET_CLS_IND
884 new->ifindex = n->ifindex;
885#endif
886 new->fshift = n->fshift;
887 new->res = n->res;
9e8ce79c 888 new->flags = n->flags;
058a6c03 889 RCU_INIT_POINTER(new->ht_down, ht);
de5df632
JF
890
891 /* bump reference count as long as we hold pointer to structure */
058a6c03
PA
892 if (ht)
893 ht->refcnt++;
de5df632
JF
894
895#ifdef CONFIG_CLS_U32_PERF
896 /* Statistics may be incremented by readers during update
897 * so we must keep them in tact. When the node is later destroyed
898 * a special destroy call must be made to not free the pf memory.
899 */
900 new->pf = n->pf;
901#endif
902
903#ifdef CONFIG_CLS_U32_MARK
904 new->val = n->val;
905 new->mask = n->mask;
906 /* Similarly success statistics must be moved as pointers */
907 new->pcpu_success = n->pcpu_success;
908#endif
909 new->tp = tp;
910 memcpy(&new->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
911
b9a24bb7
WC
912 if (tcf_exts_init(&new->exts, TCA_U32_ACT, TCA_U32_POLICE)) {
913 kfree(new);
914 return NULL;
915 }
de5df632
JF
916
917 return new;
918}
919
c1b52739 920static int u32_change(struct net *net, struct sk_buff *in_skb,
af4c6641 921 struct tcf_proto *tp, unsigned long base, u32 handle,
7306db38
AA
922 struct nlattr **tca, void **arg, bool ovr,
923 struct netlink_ext_ack *extack)
1da177e4
LT
924{
925 struct tc_u_common *tp_c = tp->data;
926 struct tc_u_hnode *ht;
927 struct tc_u_knode *n;
928 struct tc_u32_sel *s;
add93b61
PM
929 struct nlattr *opt = tca[TCA_OPTIONS];
930 struct nlattr *tb[TCA_U32_MAX + 1];
9e8ce79c 931 u32 htid, flags = 0;
1da177e4 932 int err;
459d5f62
JF
933#ifdef CONFIG_CLS_U32_PERF
934 size_t size;
935#endif
1da177e4 936
4b981dbc
AA
937 if (!opt) {
938 if (handle) {
939 NL_SET_ERR_MSG_MOD(extack, "Filter handle requires options");
940 return -EINVAL;
941 } else {
942 return 0;
943 }
944 }
1da177e4 945
4b981dbc 946 err = nla_parse_nested(tb, TCA_U32_MAX, opt, u32_policy, extack);
cee63723
PM
947 if (err < 0)
948 return err;
1da177e4 949
d34e3e18 950 if (tb[TCA_U32_FLAGS]) {
9e8ce79c 951 flags = nla_get_u32(tb[TCA_U32_FLAGS]);
4b981dbc
AA
952 if (!tc_flags_valid(flags)) {
953 NL_SET_ERR_MSG_MOD(extack, "Invalid filter flags");
1a0f7d29 954 return -EINVAL;
4b981dbc 955 }
d34e3e18 956 }
9e8ce79c 957
8113c095 958 n = *arg;
cc7ec456 959 if (n) {
de5df632
JF
960 struct tc_u_knode *new;
961
4b981dbc
AA
962 if (TC_U32_KEY(n->handle) == 0) {
963 NL_SET_ERR_MSG_MOD(extack, "Key node id cannot be zero");
1da177e4 964 return -EINVAL;
4b981dbc 965 }
1da177e4 966
eb53f7af
IV
967 if ((n->flags ^ flags) &
968 ~(TCA_CLS_FLAGS_IN_HW | TCA_CLS_FLAGS_NOT_IN_HW)) {
4b981dbc 969 NL_SET_ERR_MSG_MOD(extack, "Key node flags do not match passed flags");
9e8ce79c 970 return -EINVAL;
4b981dbc 971 }
9e8ce79c 972
de5df632
JF
973 new = u32_init_knode(tp, n);
974 if (!new)
975 return -ENOMEM;
976
977 err = u32_set_parms(net, tp, base,
978 rtnl_dereference(n->ht_up), new, tb,
50a56190 979 tca[TCA_RATE], ovr, extack);
de5df632
JF
980
981 if (err) {
982 u32_destroy_key(tp, new, false);
983 return err;
984 }
985
10a47e0f 986 err = u32_replace_hw_knode(tp, new, flags, extack);
d34e3e18
SS
987 if (err) {
988 u32_destroy_key(tp, new, false);
989 return err;
990 }
991
24d3dc6d
OG
992 if (!tc_in_hw(new->flags))
993 new->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
994
de5df632 995 u32_replace_knode(tp, tp_c, new);
a0efb80c 996 tcf_unbind_filter(tp, &n->res);
35c55fc1 997 tcf_exts_get_net(&n->exts);
de5df632
JF
998 call_rcu(&n->rcu, u32_delete_key_rcu);
999 return 0;
1da177e4
LT
1000 }
1001
add93b61 1002 if (tb[TCA_U32_DIVISOR]) {
cc7ec456 1003 unsigned int divisor = nla_get_u32(tb[TCA_U32_DIVISOR]);
1da177e4 1004
4b981dbc
AA
1005 if (--divisor > 0x100) {
1006 NL_SET_ERR_MSG_MOD(extack, "Exceeded maximum 256 hash buckets");
1da177e4 1007 return -EINVAL;
4b981dbc
AA
1008 }
1009 if (TC_U32_KEY(handle)) {
1010 NL_SET_ERR_MSG_MOD(extack, "Divisor can only be used on a hash table");
1da177e4 1011 return -EINVAL;
4b981dbc 1012 }
cc7ec456 1013 ht = kzalloc(sizeof(*ht) + divisor*sizeof(void *), GFP_KERNEL);
1da177e4
LT
1014 if (ht == NULL)
1015 return -ENOBUFS;
e7614370
CW
1016 if (handle == 0) {
1017 handle = gen_new_htid(tp->data, ht);
1018 if (handle == 0) {
1019 kfree(ht);
1020 return -ENOMEM;
1021 }
1022 } else {
f730cb93
MW
1023 err = idr_alloc_u32(&tp_c->handle_idr, ht, &handle,
1024 handle, GFP_KERNEL);
e7614370
CW
1025 if (err) {
1026 kfree(ht);
1027 return err;
1028 }
1029 }
1da177e4 1030 ht->tp_c = tp_c;
e56cfad1 1031 ht->refcnt = 1;
1da177e4
LT
1032 ht->divisor = divisor;
1033 ht->handle = handle;
1034 ht->prio = tp->prio;
e7614370 1035 idr_init(&ht->handle_idr);
f40fe58d 1036 ht->flags = flags;
6eef3801 1037
10a47e0f 1038 err = u32_replace_hw_hnode(tp, ht, flags, extack);
6eef3801 1039 if (err) {
9c160941 1040 idr_remove(&tp_c->handle_idr, handle);
6eef3801
JK
1041 kfree(ht);
1042 return err;
1043 }
1044
1ce87720
JF
1045 RCU_INIT_POINTER(ht->next, tp_c->hlist);
1046 rcu_assign_pointer(tp_c->hlist, ht);
8113c095 1047 *arg = ht;
a1b7c5fd 1048
1da177e4
LT
1049 return 0;
1050 }
1051
add93b61 1052 if (tb[TCA_U32_HASH]) {
1587bac4 1053 htid = nla_get_u32(tb[TCA_U32_HASH]);
1da177e4 1054 if (TC_U32_HTID(htid) == TC_U32_ROOT) {
1ce87720 1055 ht = rtnl_dereference(tp->root);
1da177e4
LT
1056 htid = ht->handle;
1057 } else {
1058 ht = u32_lookup_ht(tp->data, TC_U32_HTID(htid));
4b981dbc
AA
1059 if (!ht) {
1060 NL_SET_ERR_MSG_MOD(extack, "Specified hash table not found");
1da177e4 1061 return -EINVAL;
4b981dbc 1062 }
1da177e4
LT
1063 }
1064 } else {
1ce87720 1065 ht = rtnl_dereference(tp->root);
1da177e4
LT
1066 htid = ht->handle;
1067 }
1068
4b981dbc
AA
1069 if (ht->divisor < TC_U32_HASH(htid)) {
1070 NL_SET_ERR_MSG_MOD(extack, "Specified hash table buckets exceed configured value");
1da177e4 1071 return -EINVAL;
4b981dbc 1072 }
1da177e4
LT
1073
1074 if (handle) {
4b981dbc
AA
1075 if (TC_U32_HTID(handle) && TC_U32_HTID(handle ^ htid)) {
1076 NL_SET_ERR_MSG_MOD(extack, "Handle specified hash table address mismatch");
1da177e4 1077 return -EINVAL;
4b981dbc 1078 }
1da177e4 1079 handle = htid | TC_U32_NODE(handle);
f730cb93 1080 err = idr_alloc_u32(&ht->handle_idr, NULL, &handle, handle,
e7614370
CW
1081 GFP_KERNEL);
1082 if (err)
1083 return err;
1da177e4
LT
1084 } else
1085 handle = gen_new_kid(ht, htid);
1086
e7614370 1087 if (tb[TCA_U32_SEL] == NULL) {
4b981dbc 1088 NL_SET_ERR_MSG_MOD(extack, "Selector not specified");
e7614370
CW
1089 err = -EINVAL;
1090 goto erridr;
1091 }
1da177e4 1092
add93b61 1093 s = nla_data(tb[TCA_U32_SEL]);
1da177e4 1094
0da974f4 1095 n = kzalloc(sizeof(*n) + s->nkeys*sizeof(struct tc_u32_key), GFP_KERNEL);
e7614370
CW
1096 if (n == NULL) {
1097 err = -ENOBUFS;
1098 goto erridr;
1099 }
1da177e4 1100
1da177e4 1101#ifdef CONFIG_CLS_U32_PERF
459d5f62
JF
1102 size = sizeof(struct tc_u32_pcnt) + s->nkeys * sizeof(u64);
1103 n->pf = __alloc_percpu(size, __alignof__(struct tc_u32_pcnt));
1104 if (!n->pf) {
e7614370
CW
1105 err = -ENOBUFS;
1106 goto errfree;
1da177e4 1107 }
1da177e4
LT
1108#endif
1109
1110 memcpy(&n->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
a96366bf 1111 RCU_INIT_POINTER(n->ht_up, ht);
1da177e4 1112 n->handle = handle;
b2268016 1113 n->fshift = s->hmask ? ffs(ntohl(s->hmask)) - 1 : 0;
9e8ce79c 1114 n->flags = flags;
1ce87720 1115 n->tp = tp;
1da177e4 1116
b9a24bb7
WC
1117 err = tcf_exts_init(&n->exts, TCA_U32_ACT, TCA_U32_POLICE);
1118 if (err < 0)
1119 goto errout;
1120
1da177e4 1121#ifdef CONFIG_CLS_U32_MARK
459d5f62 1122 n->pcpu_success = alloc_percpu(u32);
a1ddcfee
JF
1123 if (!n->pcpu_success) {
1124 err = -ENOMEM;
1125 goto errout;
1126 }
459d5f62 1127
add93b61 1128 if (tb[TCA_U32_MARK]) {
1da177e4
LT
1129 struct tc_u32_mark *mark;
1130
add93b61 1131 mark = nla_data(tb[TCA_U32_MARK]);
459d5f62
JF
1132 n->val = mark->val;
1133 n->mask = mark->mask;
1da177e4
LT
1134 }
1135#endif
1136
50a56190
AA
1137 err = u32_set_parms(net, tp, base, ht, n, tb, tca[TCA_RATE], ovr,
1138 extack);
1da177e4 1139 if (err == 0) {
1ce87720
JF
1140 struct tc_u_knode __rcu **ins;
1141 struct tc_u_knode *pins;
1142
10a47e0f 1143 err = u32_replace_hw_knode(tp, n, flags, extack);
d34e3e18
SS
1144 if (err)
1145 goto errhw;
1146
24d3dc6d
OG
1147 if (!tc_in_hw(n->flags))
1148 n->flags |= TCA_CLS_FLAGS_NOT_IN_HW;
1149
1ce87720
JF
1150 ins = &ht->ht[TC_U32_HASH(handle)];
1151 for (pins = rtnl_dereference(*ins); pins;
1152 ins = &pins->next, pins = rtnl_dereference(*ins))
1153 if (TC_U32_NODE(handle) < TC_U32_NODE(pins->handle))
1da177e4
LT
1154 break;
1155
1ce87720
JF
1156 RCU_INIT_POINTER(n->next, pins);
1157 rcu_assign_pointer(*ins, n);
8113c095 1158 *arg = n;
1da177e4
LT
1159 return 0;
1160 }
a1ddcfee 1161
d34e3e18 1162errhw:
a1ddcfee
JF
1163#ifdef CONFIG_CLS_U32_MARK
1164 free_percpu(n->pcpu_success);
1165#endif
1166
b9a24bb7
WC
1167errout:
1168 tcf_exts_destroy(&n->exts);
1da177e4 1169#ifdef CONFIG_CLS_U32_PERF
e7614370 1170errfree:
1ce87720 1171 free_percpu(n->pf);
1da177e4
LT
1172#endif
1173 kfree(n);
e7614370 1174erridr:
9c160941 1175 idr_remove(&ht->handle_idr, handle);
1da177e4
LT
1176 return err;
1177}
1178
1179static void u32_walk(struct tcf_proto *tp, struct tcf_walker *arg)
1180{
1181 struct tc_u_common *tp_c = tp->data;
1182 struct tc_u_hnode *ht;
1183 struct tc_u_knode *n;
cc7ec456 1184 unsigned int h;
1da177e4
LT
1185
1186 if (arg->stop)
1187 return;
1188
1ce87720
JF
1189 for (ht = rtnl_dereference(tp_c->hlist);
1190 ht;
1191 ht = rtnl_dereference(ht->next)) {
1da177e4
LT
1192 if (ht->prio != tp->prio)
1193 continue;
1194 if (arg->count >= arg->skip) {
8113c095 1195 if (arg->fn(tp, ht, arg) < 0) {
1da177e4
LT
1196 arg->stop = 1;
1197 return;
1198 }
1199 }
1200 arg->count++;
1201 for (h = 0; h <= ht->divisor; h++) {
1ce87720
JF
1202 for (n = rtnl_dereference(ht->ht[h]);
1203 n;
1204 n = rtnl_dereference(n->next)) {
1da177e4
LT
1205 if (arg->count < arg->skip) {
1206 arg->count++;
1207 continue;
1208 }
8113c095 1209 if (arg->fn(tp, n, arg) < 0) {
1da177e4
LT
1210 arg->stop = 1;
1211 return;
1212 }
1213 arg->count++;
1214 }
1215 }
1216 }
1217}
1218
07d79fc7
CW
1219static void u32_bind_class(void *fh, u32 classid, unsigned long cl)
1220{
1221 struct tc_u_knode *n = fh;
1222
1223 if (n && n->res.classid == classid)
1224 n->res.class = cl;
1225}
1226
8113c095 1227static int u32_dump(struct net *net, struct tcf_proto *tp, void *fh,
5a7a5555 1228 struct sk_buff *skb, struct tcmsg *t)
1da177e4 1229{
8113c095 1230 struct tc_u_knode *n = fh;
1ce87720 1231 struct tc_u_hnode *ht_up, *ht_down;
4b3550ef 1232 struct nlattr *nest;
1da177e4
LT
1233
1234 if (n == NULL)
1235 return skb->len;
1236
1237 t->tcm_handle = n->handle;
1238
4b3550ef
PM
1239 nest = nla_nest_start(skb, TCA_OPTIONS);
1240 if (nest == NULL)
1241 goto nla_put_failure;
1da177e4
LT
1242
1243 if (TC_U32_KEY(n->handle) == 0) {
8113c095 1244 struct tc_u_hnode *ht = fh;
cc7ec456
ED
1245 u32 divisor = ht->divisor + 1;
1246
1b34ec43
DM
1247 if (nla_put_u32(skb, TCA_U32_DIVISOR, divisor))
1248 goto nla_put_failure;
1da177e4 1249 } else {
459d5f62
JF
1250#ifdef CONFIG_CLS_U32_PERF
1251 struct tc_u32_pcnt *gpf;
459d5f62 1252 int cpu;
80aab73d 1253#endif
459d5f62 1254
1b34ec43
DM
1255 if (nla_put(skb, TCA_U32_SEL,
1256 sizeof(n->sel) + n->sel.nkeys*sizeof(struct tc_u32_key),
1257 &n->sel))
1258 goto nla_put_failure;
1ce87720
JF
1259
1260 ht_up = rtnl_dereference(n->ht_up);
1261 if (ht_up) {
1da177e4 1262 u32 htid = n->handle & 0xFFFFF000;
1b34ec43
DM
1263 if (nla_put_u32(skb, TCA_U32_HASH, htid))
1264 goto nla_put_failure;
1da177e4 1265 }
1b34ec43
DM
1266 if (n->res.classid &&
1267 nla_put_u32(skb, TCA_U32_CLASSID, n->res.classid))
1268 goto nla_put_failure;
1ce87720
JF
1269
1270 ht_down = rtnl_dereference(n->ht_down);
1271 if (ht_down &&
1272 nla_put_u32(skb, TCA_U32_LINK, ht_down->handle))
1b34ec43 1273 goto nla_put_failure;
1da177e4 1274
9e8ce79c
JF
1275 if (n->flags && nla_put_u32(skb, TCA_U32_FLAGS, n->flags))
1276 goto nla_put_failure;
1277
1da177e4 1278#ifdef CONFIG_CLS_U32_MARK
459d5f62
JF
1279 if ((n->val || n->mask)) {
1280 struct tc_u32_mark mark = {.val = n->val,
1281 .mask = n->mask,
1282 .success = 0};
80aab73d 1283 int cpum;
459d5f62 1284
80aab73d
JF
1285 for_each_possible_cpu(cpum) {
1286 __u32 cnt = *per_cpu_ptr(n->pcpu_success, cpum);
459d5f62
JF
1287
1288 mark.success += cnt;
1289 }
1290
1291 if (nla_put(skb, TCA_U32_MARK, sizeof(mark), &mark))
1292 goto nla_put_failure;
1293 }
1da177e4
LT
1294#endif
1295
5da57f42 1296 if (tcf_exts_dump(skb, &n->exts) < 0)
add93b61 1297 goto nla_put_failure;
1da177e4
LT
1298
1299#ifdef CONFIG_NET_CLS_IND
2519a602
WC
1300 if (n->ifindex) {
1301 struct net_device *dev;
1302 dev = __dev_get_by_index(net, n->ifindex);
1303 if (dev && nla_put_string(skb, TCA_U32_INDEV, dev->name))
1304 goto nla_put_failure;
1305 }
1da177e4
LT
1306#endif
1307#ifdef CONFIG_CLS_U32_PERF
459d5f62
JF
1308 gpf = kzalloc(sizeof(struct tc_u32_pcnt) +
1309 n->sel.nkeys * sizeof(u64),
1310 GFP_KERNEL);
1311 if (!gpf)
1312 goto nla_put_failure;
1313
1314 for_each_possible_cpu(cpu) {
1315 int i;
1316 struct tc_u32_pcnt *pf = per_cpu_ptr(n->pf, cpu);
1317
1318 gpf->rcnt += pf->rcnt;
1319 gpf->rhit += pf->rhit;
1320 for (i = 0; i < n->sel.nkeys; i++)
1321 gpf->kcnts[i] += pf->kcnts[i];
1322 }
1323
9854518e
ND
1324 if (nla_put_64bit(skb, TCA_U32_PCNT,
1325 sizeof(struct tc_u32_pcnt) +
1326 n->sel.nkeys * sizeof(u64),
1327 gpf, TCA_U32_PAD)) {
459d5f62 1328 kfree(gpf);
1b34ec43 1329 goto nla_put_failure;
459d5f62
JF
1330 }
1331 kfree(gpf);
1da177e4
LT
1332#endif
1333 }
1334
4b3550ef
PM
1335 nla_nest_end(skb, nest);
1336
1da177e4 1337 if (TC_U32_KEY(n->handle))
5da57f42 1338 if (tcf_exts_dump_stats(skb, &n->exts) < 0)
add93b61 1339 goto nla_put_failure;
1da177e4
LT
1340 return skb->len;
1341
add93b61 1342nla_put_failure:
4b3550ef 1343 nla_nest_cancel(skb, nest);
1da177e4
LT
1344 return -1;
1345}
1346
2eb9d75c 1347static struct tcf_proto_ops cls_u32_ops __read_mostly = {
1da177e4
LT
1348 .kind = "u32",
1349 .classify = u32_classify,
1350 .init = u32_init,
1351 .destroy = u32_destroy,
1352 .get = u32_get,
1da177e4
LT
1353 .change = u32_change,
1354 .delete = u32_delete,
1355 .walk = u32_walk,
1356 .dump = u32_dump,
07d79fc7 1357 .bind_class = u32_bind_class,
1da177e4
LT
1358 .owner = THIS_MODULE,
1359};
1360
1361static int __init init_u32(void)
1362{
3cd904ec
WC
1363 int i, ret;
1364
6ff9c364 1365 pr_info("u32 classifier\n");
1da177e4 1366#ifdef CONFIG_CLS_U32_PERF
6ff9c364 1367 pr_info(" Performance counters on\n");
1da177e4 1368#endif
1da177e4 1369#ifdef CONFIG_NET_CLS_IND
6ff9c364 1370 pr_info(" input device check on\n");
1da177e4
LT
1371#endif
1372#ifdef CONFIG_NET_CLS_ACT
6ff9c364 1373 pr_info(" Actions configured\n");
1da177e4 1374#endif
3cd904ec
WC
1375 tc_u_common_hash = kvmalloc_array(U32_HASH_SIZE,
1376 sizeof(struct hlist_head),
1377 GFP_KERNEL);
1378 if (!tc_u_common_hash)
1379 return -ENOMEM;
1380
1381 for (i = 0; i < U32_HASH_SIZE; i++)
1382 INIT_HLIST_HEAD(&tc_u_common_hash[i]);
1383
1384 ret = register_tcf_proto_ops(&cls_u32_ops);
1385 if (ret)
1386 kvfree(tc_u_common_hash);
1387 return ret;
1da177e4
LT
1388}
1389
10297b99 1390static void __exit exit_u32(void)
1da177e4
LT
1391{
1392 unregister_tcf_proto_ops(&cls_u32_ops);
3cd904ec 1393 kvfree(tc_u_common_hash);
1da177e4
LT
1394}
1395
1396module_init(init_u32)
1397module_exit(exit_u32)
1398MODULE_LICENSE("GPL");