1 /* 2 * net/sched/cls_fw.c Classifier mapping ipchains' fwmark to traffic class. 3 * 4 * This program is free software; you can redistribute it and/or 5 * modify it under the terms of the GNU General Public License 6 * as published by the Free Software Foundation; either version 7 * 2 of the License, or (at your option) any later version. 8 * 9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> 10 * 11 * Changes: 12 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_walk off by one 13 * Karlis Peisenieks <karlis@mt.lv> : 990415 : fw_delete killed all the filter (and kernel). 14 * Alex <alex@pilotsoft.com> : 2004xxyy: Added Action extension 15 * 16 * JHS: We should remove the CONFIG_NET_CLS_IND from here 17 * eventually when the meta match extension is made available 18 * 19 */ 20 21 #include <linux/module.h> 22 #include <linux/slab.h> 23 #include <linux/types.h> 24 #include <linux/kernel.h> 25 #include <linux/string.h> 26 #include <linux/errno.h> 27 #include <linux/skbuff.h> 28 #include <net/netlink.h> 29 #include <net/act_api.h> 30 #include <net/pkt_cls.h> 31 #include <net/sch_generic.h> 32 33 #define HTSIZE 256 34 35 struct fw_head { 36 u32 mask; 37 struct fw_filter __rcu *ht[HTSIZE]; 38 struct rcu_head rcu; 39 }; 40 41 struct fw_filter { 42 struct fw_filter __rcu *next; 43 u32 id; 44 struct tcf_result res; 45 #ifdef CONFIG_NET_CLS_IND 46 int ifindex; 47 #endif /* CONFIG_NET_CLS_IND */ 48 struct tcf_exts exts; 49 struct tcf_proto *tp; 50 struct rcu_work rwork; 51 }; 52 53 static u32 fw_hash(u32 handle) 54 { 55 handle ^= (handle >> 16); 56 handle ^= (handle >> 8); 57 return handle % HTSIZE; 58 } 59 60 static int fw_classify(struct sk_buff *skb, const struct tcf_proto *tp, 61 struct tcf_result *res) 62 { 63 struct fw_head *head = rcu_dereference_bh(tp->root); 64 struct fw_filter *f; 65 int r; 66 u32 id = skb->mark; 67 68 if (head != NULL) { 69 id &= head->mask; 70 71 for (f = rcu_dereference_bh(head->ht[fw_hash(id)]); f; 72 f = rcu_dereference_bh(f->next)) { 73 if (f->id == id) { 74 *res = f->res; 75 #ifdef CONFIG_NET_CLS_IND 76 if (!tcf_match_indev(skb, f->ifindex)) 77 continue; 78 #endif /* CONFIG_NET_CLS_IND */ 79 r = tcf_exts_exec(skb, &f->exts, res); 80 if (r < 0) 81 continue; 82 83 return r; 84 } 85 } 86 } else { 87 struct Qdisc *q = tcf_block_q(tp->chain->block); 88 89 /* Old method: classify the packet using its skb mark. */ 90 if (id && (TC_H_MAJ(id) == 0 || 91 !(TC_H_MAJ(id ^ q->handle)))) { 92 res->classid = id; 93 res->class = 0; 94 return 0; 95 } 96 } 97 98 return -1; 99 } 100 101 static void *fw_get(struct tcf_proto *tp, u32 handle) 102 { 103 struct fw_head *head = rtnl_dereference(tp->root); 104 struct fw_filter *f; 105 106 if (head == NULL) 107 return NULL; 108 109 f = rtnl_dereference(head->ht[fw_hash(handle)]); 110 for (; f; f = rtnl_dereference(f->next)) { 111 if (f->id == handle) 112 return f; 113 } 114 return NULL; 115 } 116 117 static int fw_init(struct tcf_proto *tp) 118 { 119 /* We don't allocate fw_head here, because in the old method 120 * we don't need it at all. 121 */ 122 return 0; 123 } 124 125 static void __fw_delete_filter(struct fw_filter *f) 126 { 127 tcf_exts_destroy(&f->exts); 128 tcf_exts_put_net(&f->exts); 129 kfree(f); 130 } 131 132 static void fw_delete_filter_work(struct work_struct *work) 133 { 134 struct fw_filter *f = container_of(to_rcu_work(work), 135 struct fw_filter, 136 rwork); 137 rtnl_lock(); 138 __fw_delete_filter(f); 139 rtnl_unlock(); 140 } 141 142 static void fw_destroy(struct tcf_proto *tp, bool rtnl_held, 143 struct netlink_ext_ack *extack) 144 { 145 struct fw_head *head = rtnl_dereference(tp->root); 146 struct fw_filter *f; 147 int h; 148 149 if (head == NULL) 150 return; 151 152 for (h = 0; h < HTSIZE; h++) { 153 while ((f = rtnl_dereference(head->ht[h])) != NULL) { 154 RCU_INIT_POINTER(head->ht[h], 155 rtnl_dereference(f->next)); 156 tcf_unbind_filter(tp, &f->res); 157 if (tcf_exts_get_net(&f->exts)) 158 tcf_queue_work(&f->rwork, fw_delete_filter_work); 159 else 160 __fw_delete_filter(f); 161 } 162 } 163 kfree_rcu(head, rcu); 164 } 165 166 static int fw_delete(struct tcf_proto *tp, void *arg, bool *last, 167 bool rtnl_held, struct netlink_ext_ack *extack) 168 { 169 struct fw_head *head = rtnl_dereference(tp->root); 170 struct fw_filter *f = arg; 171 struct fw_filter __rcu **fp; 172 struct fw_filter *pfp; 173 int ret = -EINVAL; 174 int h; 175 176 if (head == NULL || f == NULL) 177 goto out; 178 179 fp = &head->ht[fw_hash(f->id)]; 180 181 for (pfp = rtnl_dereference(*fp); pfp; 182 fp = &pfp->next, pfp = rtnl_dereference(*fp)) { 183 if (pfp == f) { 184 RCU_INIT_POINTER(*fp, rtnl_dereference(f->next)); 185 tcf_unbind_filter(tp, &f->res); 186 tcf_exts_get_net(&f->exts); 187 tcf_queue_work(&f->rwork, fw_delete_filter_work); 188 ret = 0; 189 break; 190 } 191 } 192 193 *last = true; 194 for (h = 0; h < HTSIZE; h++) { 195 if (rcu_access_pointer(head->ht[h])) { 196 *last = false; 197 break; 198 } 199 } 200 201 out: 202 return ret; 203 } 204 205 static const struct nla_policy fw_policy[TCA_FW_MAX + 1] = { 206 [TCA_FW_CLASSID] = { .type = NLA_U32 }, 207 [TCA_FW_INDEV] = { .type = NLA_STRING, .len = IFNAMSIZ }, 208 [TCA_FW_MASK] = { .type = NLA_U32 }, 209 }; 210 211 static int fw_set_parms(struct net *net, struct tcf_proto *tp, 212 struct fw_filter *f, struct nlattr **tb, 213 struct nlattr **tca, unsigned long base, bool ovr, 214 struct netlink_ext_ack *extack) 215 { 216 struct fw_head *head = rtnl_dereference(tp->root); 217 u32 mask; 218 int err; 219 220 err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &f->exts, ovr, 221 true, extack); 222 if (err < 0) 223 return err; 224 225 if (tb[TCA_FW_CLASSID]) { 226 f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]); 227 tcf_bind_filter(tp, &f->res, base); 228 } 229 230 #ifdef CONFIG_NET_CLS_IND 231 if (tb[TCA_FW_INDEV]) { 232 int ret; 233 ret = tcf_change_indev(net, tb[TCA_FW_INDEV], extack); 234 if (ret < 0) 235 return ret; 236 f->ifindex = ret; 237 } 238 #endif /* CONFIG_NET_CLS_IND */ 239 240 err = -EINVAL; 241 if (tb[TCA_FW_MASK]) { 242 mask = nla_get_u32(tb[TCA_FW_MASK]); 243 if (mask != head->mask) 244 return err; 245 } else if (head->mask != 0xFFFFFFFF) 246 return err; 247 248 return 0; 249 } 250 251 static int fw_change(struct net *net, struct sk_buff *in_skb, 252 struct tcf_proto *tp, unsigned long base, 253 u32 handle, struct nlattr **tca, void **arg, 254 bool ovr, bool rtnl_held, 255 struct netlink_ext_ack *extack) 256 { 257 struct fw_head *head = rtnl_dereference(tp->root); 258 struct fw_filter *f = *arg; 259 struct nlattr *opt = tca[TCA_OPTIONS]; 260 struct nlattr *tb[TCA_FW_MAX + 1]; 261 int err; 262 263 if (!opt) 264 return handle ? -EINVAL : 0; /* Succeed if it is old method. */ 265 266 err = nla_parse_nested_deprecated(tb, TCA_FW_MAX, opt, fw_policy, 267 NULL); 268 if (err < 0) 269 return err; 270 271 if (f) { 272 struct fw_filter *pfp, *fnew; 273 struct fw_filter __rcu **fp; 274 275 if (f->id != handle && handle) 276 return -EINVAL; 277 278 fnew = kzalloc(sizeof(struct fw_filter), GFP_KERNEL); 279 if (!fnew) 280 return -ENOBUFS; 281 282 fnew->id = f->id; 283 fnew->res = f->res; 284 #ifdef CONFIG_NET_CLS_IND 285 fnew->ifindex = f->ifindex; 286 #endif /* CONFIG_NET_CLS_IND */ 287 fnew->tp = f->tp; 288 289 err = tcf_exts_init(&fnew->exts, net, TCA_FW_ACT, 290 TCA_FW_POLICE); 291 if (err < 0) { 292 kfree(fnew); 293 return err; 294 } 295 296 err = fw_set_parms(net, tp, fnew, tb, tca, base, ovr, extack); 297 if (err < 0) { 298 tcf_exts_destroy(&fnew->exts); 299 kfree(fnew); 300 return err; 301 } 302 303 fp = &head->ht[fw_hash(fnew->id)]; 304 for (pfp = rtnl_dereference(*fp); pfp; 305 fp = &pfp->next, pfp = rtnl_dereference(*fp)) 306 if (pfp == f) 307 break; 308 309 RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next)); 310 rcu_assign_pointer(*fp, fnew); 311 tcf_unbind_filter(tp, &f->res); 312 tcf_exts_get_net(&f->exts); 313 tcf_queue_work(&f->rwork, fw_delete_filter_work); 314 315 *arg = fnew; 316 return err; 317 } 318 319 if (!handle) 320 return -EINVAL; 321 322 if (!head) { 323 u32 mask = 0xFFFFFFFF; 324 if (tb[TCA_FW_MASK]) 325 mask = nla_get_u32(tb[TCA_FW_MASK]); 326 327 head = kzalloc(sizeof(*head), GFP_KERNEL); 328 if (!head) 329 return -ENOBUFS; 330 head->mask = mask; 331 332 rcu_assign_pointer(tp->root, head); 333 } 334 335 f = kzalloc(sizeof(struct fw_filter), GFP_KERNEL); 336 if (f == NULL) 337 return -ENOBUFS; 338 339 err = tcf_exts_init(&f->exts, net, TCA_FW_ACT, TCA_FW_POLICE); 340 if (err < 0) 341 goto errout; 342 f->id = handle; 343 f->tp = tp; 344 345 err = fw_set_parms(net, tp, f, tb, tca, base, ovr, extack); 346 if (err < 0) 347 goto errout; 348 349 RCU_INIT_POINTER(f->next, head->ht[fw_hash(handle)]); 350 rcu_assign_pointer(head->ht[fw_hash(handle)], f); 351 352 *arg = f; 353 return 0; 354 355 errout: 356 tcf_exts_destroy(&f->exts); 357 kfree(f); 358 return err; 359 } 360 361 static void fw_walk(struct tcf_proto *tp, struct tcf_walker *arg, 362 bool rtnl_held) 363 { 364 struct fw_head *head = rtnl_dereference(tp->root); 365 int h; 366 367 if (head == NULL) 368 arg->stop = 1; 369 370 if (arg->stop) 371 return; 372 373 for (h = 0; h < HTSIZE; h++) { 374 struct fw_filter *f; 375 376 for (f = rtnl_dereference(head->ht[h]); f; 377 f = rtnl_dereference(f->next)) { 378 if (arg->count < arg->skip) { 379 arg->count++; 380 continue; 381 } 382 if (arg->fn(tp, f, arg) < 0) { 383 arg->stop = 1; 384 return; 385 } 386 arg->count++; 387 } 388 } 389 } 390 391 static int fw_dump(struct net *net, struct tcf_proto *tp, void *fh, 392 struct sk_buff *skb, struct tcmsg *t, bool rtnl_held) 393 { 394 struct fw_head *head = rtnl_dereference(tp->root); 395 struct fw_filter *f = fh; 396 struct nlattr *nest; 397 398 if (f == NULL) 399 return skb->len; 400 401 t->tcm_handle = f->id; 402 403 if (!f->res.classid && !tcf_exts_has_actions(&f->exts)) 404 return skb->len; 405 406 nest = nla_nest_start_noflag(skb, TCA_OPTIONS); 407 if (nest == NULL) 408 goto nla_put_failure; 409 410 if (f->res.classid && 411 nla_put_u32(skb, TCA_FW_CLASSID, f->res.classid)) 412 goto nla_put_failure; 413 #ifdef CONFIG_NET_CLS_IND 414 if (f->ifindex) { 415 struct net_device *dev; 416 dev = __dev_get_by_index(net, f->ifindex); 417 if (dev && nla_put_string(skb, TCA_FW_INDEV, dev->name)) 418 goto nla_put_failure; 419 } 420 #endif /* CONFIG_NET_CLS_IND */ 421 if (head->mask != 0xFFFFFFFF && 422 nla_put_u32(skb, TCA_FW_MASK, head->mask)) 423 goto nla_put_failure; 424 425 if (tcf_exts_dump(skb, &f->exts) < 0) 426 goto nla_put_failure; 427 428 nla_nest_end(skb, nest); 429 430 if (tcf_exts_dump_stats(skb, &f->exts) < 0) 431 goto nla_put_failure; 432 433 return skb->len; 434 435 nla_put_failure: 436 nla_nest_cancel(skb, nest); 437 return -1; 438 } 439 440 static void fw_bind_class(void *fh, u32 classid, unsigned long cl) 441 { 442 struct fw_filter *f = fh; 443 444 if (f && f->res.classid == classid) 445 f->res.class = cl; 446 } 447 448 static struct tcf_proto_ops cls_fw_ops __read_mostly = { 449 .kind = "fw", 450 .classify = fw_classify, 451 .init = fw_init, 452 .destroy = fw_destroy, 453 .get = fw_get, 454 .change = fw_change, 455 .delete = fw_delete, 456 .walk = fw_walk, 457 .dump = fw_dump, 458 .bind_class = fw_bind_class, 459 .owner = THIS_MODULE, 460 }; 461 462 static int __init init_fw(void) 463 { 464 return register_tcf_proto_ops(&cls_fw_ops); 465 } 466 467 static void __exit exit_fw(void) 468 { 469 unregister_tcf_proto_ops(&cls_fw_ops); 470 } 471 472 module_init(init_fw) 473 module_exit(exit_fw) 474 MODULE_LICENSE("GPL"); 475