cls_api.c 54.7 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
/*
 * net/sched/cls_api.c	Packet classifier API.
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 *
 * Authors:	Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
 *
 * Changes:
 *
 * Eduardo J. Blanco <ejbs@netlabs.com.uy> :990222: kmod support
 *
 */

#include <linux/module.h>
#include <linux/types.h>
#include <linux/kernel.h>
#include <linux/string.h>
#include <linux/errno.h>
22
#include <linux/err.h>
L
Linus Torvalds 已提交
23 24 25
#include <linux/skbuff.h>
#include <linux/init.h>
#include <linux/kmod.h>
26
#include <linux/slab.h>
27
#include <linux/idr.h>
28 29
#include <net/net_namespace.h>
#include <net/sock.h>
30
#include <net/netlink.h>
L
Linus Torvalds 已提交
31 32 33 34
#include <net/pkt_sched.h>
#include <net/pkt_cls.h>

/* The list of all installed classifier types */
35
static LIST_HEAD(tcf_proto_base);
L
Linus Torvalds 已提交
36 37 38 39 40 41

/* Protects list of registered TC modules. It is pure SMP lock. */
static DEFINE_RWLOCK(cls_mod_lock);

/* Find classifier type by string name */

42
static const struct tcf_proto_ops *__tcf_proto_lookup_ops(const char *kind)
L
Linus Torvalds 已提交
43
{
44
	const struct tcf_proto_ops *t, *res = NULL;
L
Linus Torvalds 已提交
45 46 47

	if (kind) {
		read_lock(&cls_mod_lock);
48
		list_for_each_entry(t, &tcf_proto_base, head) {
49
			if (strcmp(kind, t->kind) == 0) {
50 51
				if (try_module_get(t->owner))
					res = t;
L
Linus Torvalds 已提交
52 53 54 55 56
				break;
			}
		}
		read_unlock(&cls_mod_lock);
	}
57
	return res;
L
Linus Torvalds 已提交
58 59
}

60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86
static const struct tcf_proto_ops *
tcf_proto_lookup_ops(const char *kind, struct netlink_ext_ack *extack)
{
	const struct tcf_proto_ops *ops;

	ops = __tcf_proto_lookup_ops(kind);
	if (ops)
		return ops;
#ifdef CONFIG_MODULES
	rtnl_unlock();
	request_module("cls_%s", kind);
	rtnl_lock();
	ops = __tcf_proto_lookup_ops(kind);
	/* We dropped the RTNL semaphore in order to perform
	 * the module load. So, even if we succeeded in loading
	 * the module we have to replay the request. We indicate
	 * this using -EAGAIN.
	 */
	if (ops) {
		module_put(ops->owner);
		return ERR_PTR(-EAGAIN);
	}
#endif
	NL_SET_ERR_MSG(extack, "TC classifier not found");
	return ERR_PTR(-ENOENT);
}

L
Linus Torvalds 已提交
87 88 89 90
/* Register(unregister) new classifier type */

int register_tcf_proto_ops(struct tcf_proto_ops *ops)
{
91
	struct tcf_proto_ops *t;
L
Linus Torvalds 已提交
92 93 94
	int rc = -EEXIST;

	write_lock(&cls_mod_lock);
95
	list_for_each_entry(t, &tcf_proto_base, head)
L
Linus Torvalds 已提交
96 97 98
		if (!strcmp(ops->kind, t->kind))
			goto out;

99
	list_add_tail(&ops->head, &tcf_proto_base);
L
Linus Torvalds 已提交
100 101 102 103 104
	rc = 0;
out:
	write_unlock(&cls_mod_lock);
	return rc;
}
105
EXPORT_SYMBOL(register_tcf_proto_ops);
L
Linus Torvalds 已提交
106

107 108
static struct workqueue_struct *tc_filter_wq;

L
Linus Torvalds 已提交
109 110
int unregister_tcf_proto_ops(struct tcf_proto_ops *ops)
{
111
	struct tcf_proto_ops *t;
L
Linus Torvalds 已提交
112 113
	int rc = -ENOENT;

114 115 116 117
	/* Wait for outstanding call_rcu()s, if any, from a
	 * tcf_proto_ops's destroy() handler.
	 */
	rcu_barrier();
118
	flush_workqueue(tc_filter_wq);
119

L
Linus Torvalds 已提交
120
	write_lock(&cls_mod_lock);
121 122 123 124
	list_for_each_entry(t, &tcf_proto_base, head) {
		if (t == ops) {
			list_del(&t->head);
			rc = 0;
L
Linus Torvalds 已提交
125
			break;
126 127
		}
	}
L
Linus Torvalds 已提交
128 129 130
	write_unlock(&cls_mod_lock);
	return rc;
}
131
EXPORT_SYMBOL(unregister_tcf_proto_ops);
L
Linus Torvalds 已提交
132

C
Cong Wang 已提交
133
bool tcf_queue_work(struct rcu_work *rwork, work_func_t func)
134
{
C
Cong Wang 已提交
135 136
	INIT_RCU_WORK(rwork, func);
	return queue_rcu_work(tc_filter_wq, rwork);
137 138 139
}
EXPORT_SYMBOL(tcf_queue_work);

L
Linus Torvalds 已提交
140 141
/* Select new prio value from the range, managed by kernel. */

142
static inline u32 tcf_auto_prio(struct tcf_proto *tp)
L
Linus Torvalds 已提交
143
{
144
	u32 first = TC_H_MAKE(0xC0000000U, 0U);
L
Linus Torvalds 已提交
145 146

	if (tp)
E
Eric Dumazet 已提交
147
		first = tp->prio - 1;
L
Linus Torvalds 已提交
148

149
	return TC_H_MAJ(first);
L
Linus Torvalds 已提交
150 151
}

152
static struct tcf_proto *tcf_proto_create(const char *kind, u32 protocol,
153 154
					  u32 prio, struct tcf_chain *chain,
					  struct netlink_ext_ack *extack)
155 156 157 158 159 160 161 162
{
	struct tcf_proto *tp;
	int err;

	tp = kzalloc(sizeof(*tp), GFP_KERNEL);
	if (!tp)
		return ERR_PTR(-ENOBUFS);

163 164 165
	tp->ops = tcf_proto_lookup_ops(kind, extack);
	if (IS_ERR(tp->ops)) {
		err = PTR_ERR(tp->ops);
166
		goto errout;
167 168 169 170
	}
	tp->classify = tp->ops->classify;
	tp->protocol = protocol;
	tp->prio = prio;
171
	tp->chain = chain;
172 173 174 175 176 177 178 179 180 181 182 183 184

	err = tp->ops->init(tp);
	if (err) {
		module_put(tp->ops->owner);
		goto errout;
	}
	return tp;

errout:
	kfree(tp);
	return ERR_PTR(err);
}

185 186
static void tcf_proto_destroy(struct tcf_proto *tp,
			      struct netlink_ext_ack *extack)
187
{
188
	tp->ops->destroy(tp, extack);
189 190
	module_put(tp->ops->owner);
	kfree_rcu(tp, rcu);
191 192
}

193 194 195 196 197 198
struct tcf_filter_chain_list_item {
	struct list_head list;
	tcf_chain_head_change_t *chain_head_change;
	void *chain_head_change_priv;
};

199 200
static struct tcf_chain *tcf_chain_create(struct tcf_block *block,
					  u32 chain_index)
201
{
202 203 204 205 206 207 208 209
	struct tcf_chain *chain;

	chain = kzalloc(sizeof(*chain), GFP_KERNEL);
	if (!chain)
		return NULL;
	list_add_tail(&chain->list, &block->chain_list);
	chain->block = block;
	chain->index = chain_index;
210
	chain->refcnt = 1;
211 212
	if (!chain->index)
		block->chain0.chain = chain;
213
	return chain;
214 215
}

216 217 218 219 220 221
static void tcf_chain_head_change_item(struct tcf_filter_chain_list_item *item,
				       struct tcf_proto *tp_head)
{
	if (item->chain_head_change)
		item->chain_head_change(tp_head, item->chain_head_change_priv);
}
222 223 224

static void tcf_chain0_head_change(struct tcf_chain *chain,
				   struct tcf_proto *tp_head)
225
{
226
	struct tcf_filter_chain_list_item *item;
227
	struct tcf_block *block = chain->block;
228

229 230 231
	if (chain->index)
		return;
	list_for_each_entry(item, &block->chain0.filter_chain_list, list)
232
		tcf_chain_head_change_item(item, tp_head);
233 234
}

J
Jiri Pirko 已提交
235 236
static void tcf_chain_destroy(struct tcf_chain *chain)
{
237 238
	struct tcf_block *block = chain->block;

239
	list_del(&chain->list);
240 241
	if (!chain->index)
		block->chain0.chain = NULL;
242
	kfree(chain);
243
	if (list_empty(&block->chain_list) && block->refcnt == 0)
244
		kfree(block);
245
}
246

247 248 249
static void tcf_chain_hold(struct tcf_chain *chain)
{
	++chain->refcnt;
250 251
}

252
static bool tcf_chain_held_by_acts_only(struct tcf_chain *chain)
253 254
{
	/* In case all the references are action references, this
255
	 * chain should not be shown to the user.
256 257 258 259
	 */
	return chain->refcnt == chain->action_refcnt;
}

260 261
static struct tcf_chain *tcf_chain_lookup(struct tcf_block *block,
					  u32 chain_index)
262 263 264 265
{
	struct tcf_chain *chain;

	list_for_each_entry(chain, &block->chain_list, list) {
266
		if (chain->index == chain_index)
267
			return chain;
268 269 270 271 272 273 274
	}
	return NULL;
}

static int tc_chain_notify(struct tcf_chain *chain, struct sk_buff *oskb,
			   u32 seq, u16 flags, int event, bool unicast);

275 276 277
static struct tcf_chain *__tcf_chain_get(struct tcf_block *block,
					 u32 chain_index, bool create,
					 bool by_act)
278 279 280 281 282
{
	struct tcf_chain *chain = tcf_chain_lookup(block, chain_index);

	if (chain) {
		tcf_chain_hold(chain);
283 284 285 286 287 288
	} else {
		if (!create)
			return NULL;
		chain = tcf_chain_create(block, chain_index);
		if (!chain)
			return NULL;
289
	}
290

291 292 293 294 295 296 297 298 299 300 301 302
	if (by_act)
		++chain->action_refcnt;

	/* Send notification only in case we got the first
	 * non-action reference. Until then, the chain acts only as
	 * a placeholder for actions pointing to it and user ought
	 * not know about them.
	 */
	if (chain->refcnt - chain->action_refcnt == 1 && !by_act)
		tc_chain_notify(chain, NULL, 0, NLM_F_CREATE | NLM_F_EXCL,
				RTM_NEWCHAIN, false);

303
	return chain;
304
}
305

306 307
static struct tcf_chain *tcf_chain_get(struct tcf_block *block, u32 chain_index,
				       bool create)
308 309 310
{
	return __tcf_chain_get(block, chain_index, create, false);
}
311

312 313
struct tcf_chain *tcf_chain_get_by_act(struct tcf_block *block, u32 chain_index)
{
314
	return __tcf_chain_get(block, chain_index, true, true);
315 316 317
}
EXPORT_SYMBOL(tcf_chain_get_by_act);

318 319
static void tc_chain_tmplt_del(struct tcf_chain *chain);

320
static void __tcf_chain_put(struct tcf_chain *chain, bool by_act)
321
{
322 323 324 325 326 327
	if (by_act)
		chain->action_refcnt--;
	chain->refcnt--;

	/* The last dropped non-action reference will trigger notification. */
	if (chain->refcnt - chain->action_refcnt == 0 && !by_act)
328
		tc_chain_notify(chain, NULL, 0, 0, RTM_DELCHAIN, false);
329 330

	if (chain->refcnt == 0) {
331
		tc_chain_tmplt_del(chain);
332
		tcf_chain_destroy(chain);
333
	}
334
}
335

336
static void tcf_chain_put(struct tcf_chain *chain)
337 338 339
{
	__tcf_chain_put(chain, false);
}
340

341 342
void tcf_chain_put_by_act(struct tcf_chain *chain)
{
343
	__tcf_chain_put(chain, true);
344 345 346
}
EXPORT_SYMBOL(tcf_chain_put_by_act);

347 348 349 350 351 352
static void tcf_chain_put_explicitly_created(struct tcf_chain *chain)
{
	if (chain->explicitly_created)
		tcf_chain_put(chain);
}

353 354 355 356 357 358 359 360 361 362 363 364 365
static void tcf_chain_flush(struct tcf_chain *chain)
{
	struct tcf_proto *tp = rtnl_dereference(chain->filter_chain);

	tcf_chain0_head_change(chain, NULL);
	while (tp) {
		RCU_INIT_POINTER(chain->filter_chain, tp->next);
		tcf_proto_destroy(tp, NULL);
		tp = rtnl_dereference(chain->filter_chain);
		tcf_chain_put(chain);
	}
}

366 367 368 369 370 371 372 373
static bool tcf_block_offload_in_use(struct tcf_block *block)
{
	return block->offloadcnt;
}

static int tcf_block_offload_cmd(struct tcf_block *block,
				 struct net_device *dev,
				 struct tcf_block_ext_info *ei,
374 375
				 enum tc_block_command command,
				 struct netlink_ext_ack *extack)
376 377 378 379 380 381
{
	struct tc_block_offload bo = {};

	bo.command = command;
	bo.binder_type = ei->binder_type;
	bo.block = block;
382
	bo.extack = extack;
383
	return dev->netdev_ops->ndo_setup_tc(dev, TC_SETUP_BLOCK, &bo);
384 385
}

386
static int tcf_block_offload_bind(struct tcf_block *block, struct Qdisc *q,
387 388
				  struct tcf_block_ext_info *ei,
				  struct netlink_ext_ack *extack)
389
{
390 391 392 393 394 395 396 397 398
	struct net_device *dev = q->dev_queue->dev;
	int err;

	if (!dev->netdev_ops->ndo_setup_tc)
		goto no_offload_dev_inc;

	/* If tc offload feature is disabled and the block we try to bind
	 * to already has some offloaded filters, forbid to bind.
	 */
399 400
	if (!tc_can_offload(dev) && tcf_block_offload_in_use(block)) {
		NL_SET_ERR_MSG(extack, "Bind to offloaded block failed as dev has offload disabled");
401
		return -EOPNOTSUPP;
402
	}
403

404
	err = tcf_block_offload_cmd(block, dev, ei, TC_BLOCK_BIND, extack);
405 406 407 408 409 410 411 412 413
	if (err == -EOPNOTSUPP)
		goto no_offload_dev_inc;
	return err;

no_offload_dev_inc:
	if (tcf_block_offload_in_use(block))
		return -EOPNOTSUPP;
	block->nooffloaddevcnt++;
	return 0;
414 415 416 417 418
}

static void tcf_block_offload_unbind(struct tcf_block *block, struct Qdisc *q,
				     struct tcf_block_ext_info *ei)
{
419 420 421 422 423
	struct net_device *dev = q->dev_queue->dev;
	int err;

	if (!dev->netdev_ops->ndo_setup_tc)
		goto no_offload_dev_dec;
424
	err = tcf_block_offload_cmd(block, dev, ei, TC_BLOCK_UNBIND, NULL);
425 426 427 428 429 430
	if (err == -EOPNOTSUPP)
		goto no_offload_dev_dec;
	return;

no_offload_dev_dec:
	WARN_ON(block->nooffloaddevcnt-- == 0);
431 432
}

433
static int
434 435 436
tcf_chain0_head_change_cb_add(struct tcf_block *block,
			      struct tcf_block_ext_info *ei,
			      struct netlink_ext_ack *extack)
437
{
438
	struct tcf_chain *chain0 = block->chain0.chain;
439 440 441 442 443 444 445 446 447
	struct tcf_filter_chain_list_item *item;

	item = kmalloc(sizeof(*item), GFP_KERNEL);
	if (!item) {
		NL_SET_ERR_MSG(extack, "Memory allocation for head change callback item failed");
		return -ENOMEM;
	}
	item->chain_head_change = ei->chain_head_change;
	item->chain_head_change_priv = ei->chain_head_change_priv;
448 449 450
	if (chain0 && chain0->filter_chain)
		tcf_chain_head_change_item(item, chain0->filter_chain);
	list_add(&item->list, &block->chain0.filter_chain_list);
451 452 453 454
	return 0;
}

static void
455 456
tcf_chain0_head_change_cb_del(struct tcf_block *block,
			      struct tcf_block_ext_info *ei)
457
{
458
	struct tcf_chain *chain0 = block->chain0.chain;
459 460
	struct tcf_filter_chain_list_item *item;

461
	list_for_each_entry(item, &block->chain0.filter_chain_list, list) {
462 463 464
		if ((!ei->chain_head_change && !ei->chain_head_change_priv) ||
		    (item->chain_head_change == ei->chain_head_change &&
		     item->chain_head_change_priv == ei->chain_head_change_priv)) {
465 466
			if (chain0)
				tcf_chain_head_change_item(item, NULL);
467 468 469 470 471 472 473 474
			list_del(&item->list);
			kfree(item);
			return;
		}
	}
	WARN_ON(1);
}

475 476 477 478 479 480 481
struct tcf_net {
	struct idr idr;
};

static unsigned int tcf_net_id;

static int tcf_block_insert(struct tcf_block *block, struct net *net,
482
			    struct netlink_ext_ack *extack)
483
{
484 485
	struct tcf_net *tn = net_generic(net, tcf_net_id);

486 487
	return idr_alloc_u32(&tn->idr, block, &block->index, block->index,
			     GFP_KERNEL);
488 489
}

490 491 492 493
static void tcf_block_remove(struct tcf_block *block, struct net *net)
{
	struct tcf_net *tn = net_generic(net, tcf_net_id);

494
	idr_remove(&tn->idr, block->index);
495 496 497
}

static struct tcf_block *tcf_block_create(struct net *net, struct Qdisc *q,
498
					  u32 block_index,
499
					  struct netlink_ext_ack *extack)
500
{
501
	struct tcf_block *block;
502

503
	block = kzalloc(sizeof(*block), GFP_KERNEL);
504 505
	if (!block) {
		NL_SET_ERR_MSG(extack, "Memory allocation for block failed");
506
		return ERR_PTR(-ENOMEM);
507
	}
508
	INIT_LIST_HEAD(&block->chain_list);
509
	INIT_LIST_HEAD(&block->cb_list);
510
	INIT_LIST_HEAD(&block->owner_list);
511
	INIT_LIST_HEAD(&block->chain0.filter_chain_list);
512

513 514
	block->refcnt = 1;
	block->net = net;
515 516 517 518 519
	block->index = block_index;

	/* Don't store q pointer for blocks which are shared */
	if (!tcf_block_shared(block))
		block->q = q;
520 521 522 523 524 525 526
	return block;
}

static struct tcf_block *tcf_block_lookup(struct net *net, u32 block_index)
{
	struct tcf_net *tn = net_generic(net, tcf_net_id);

527
	return idr_find(&tn->idr, block_index);
528 529
}

530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601
/* Find tcf block.
 * Set q, parent, cl when appropriate.
 */

static struct tcf_block *tcf_block_find(struct net *net, struct Qdisc **q,
					u32 *parent, unsigned long *cl,
					int ifindex, u32 block_index,
					struct netlink_ext_ack *extack)
{
	struct tcf_block *block;

	if (ifindex == TCM_IFINDEX_MAGIC_BLOCK) {
		block = tcf_block_lookup(net, block_index);
		if (!block) {
			NL_SET_ERR_MSG(extack, "Block of given index was not found");
			return ERR_PTR(-EINVAL);
		}
	} else {
		const struct Qdisc_class_ops *cops;
		struct net_device *dev;

		/* Find link */
		dev = __dev_get_by_index(net, ifindex);
		if (!dev)
			return ERR_PTR(-ENODEV);

		/* Find qdisc */
		if (!*parent) {
			*q = dev->qdisc;
			*parent = (*q)->handle;
		} else {
			*q = qdisc_lookup(dev, TC_H_MAJ(*parent));
			if (!*q) {
				NL_SET_ERR_MSG(extack, "Parent Qdisc doesn't exists");
				return ERR_PTR(-EINVAL);
			}
		}

		/* Is it classful? */
		cops = (*q)->ops->cl_ops;
		if (!cops) {
			NL_SET_ERR_MSG(extack, "Qdisc not classful");
			return ERR_PTR(-EINVAL);
		}

		if (!cops->tcf_block) {
			NL_SET_ERR_MSG(extack, "Class doesn't support blocks");
			return ERR_PTR(-EOPNOTSUPP);
		}

		/* Do we search for filter, attached to class? */
		if (TC_H_MIN(*parent)) {
			*cl = cops->find(*q, *parent);
			if (*cl == 0) {
				NL_SET_ERR_MSG(extack, "Specified class doesn't exist");
				return ERR_PTR(-ENOENT);
			}
		}

		/* And the last stroke */
		block = cops->tcf_block(*q, *cl, extack);
		if (!block)
			return ERR_PTR(-EINVAL);
		if (tcf_block_shared(block)) {
			NL_SET_ERR_MSG(extack, "This filter block is shared. Please use the block index to manipulate the filters");
			return ERR_PTR(-EOPNOTSUPP);
		}
	}

	return block;
}

602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660
struct tcf_block_owner_item {
	struct list_head list;
	struct Qdisc *q;
	enum tcf_block_binder_type binder_type;
};

static void
tcf_block_owner_netif_keep_dst(struct tcf_block *block,
			       struct Qdisc *q,
			       enum tcf_block_binder_type binder_type)
{
	if (block->keep_dst &&
	    binder_type != TCF_BLOCK_BINDER_TYPE_CLSACT_INGRESS &&
	    binder_type != TCF_BLOCK_BINDER_TYPE_CLSACT_EGRESS)
		netif_keep_dst(qdisc_dev(q));
}

void tcf_block_netif_keep_dst(struct tcf_block *block)
{
	struct tcf_block_owner_item *item;

	block->keep_dst = true;
	list_for_each_entry(item, &block->owner_list, list)
		tcf_block_owner_netif_keep_dst(block, item->q,
					       item->binder_type);
}
EXPORT_SYMBOL(tcf_block_netif_keep_dst);

static int tcf_block_owner_add(struct tcf_block *block,
			       struct Qdisc *q,
			       enum tcf_block_binder_type binder_type)
{
	struct tcf_block_owner_item *item;

	item = kmalloc(sizeof(*item), GFP_KERNEL);
	if (!item)
		return -ENOMEM;
	item->q = q;
	item->binder_type = binder_type;
	list_add(&item->list, &block->owner_list);
	return 0;
}

static void tcf_block_owner_del(struct tcf_block *block,
				struct Qdisc *q,
				enum tcf_block_binder_type binder_type)
{
	struct tcf_block_owner_item *item;

	list_for_each_entry(item, &block->owner_list, list) {
		if (item->q == q && item->binder_type == binder_type) {
			list_del(&item->list);
			kfree(item);
			return;
		}
	}
	WARN_ON(1);
}

661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677
int tcf_block_get_ext(struct tcf_block **p_block, struct Qdisc *q,
		      struct tcf_block_ext_info *ei,
		      struct netlink_ext_ack *extack)
{
	struct net *net = qdisc_net(q);
	struct tcf_block *block = NULL;
	bool created = false;
	int err;

	if (ei->block_index) {
		/* block_index not 0 means the shared block is requested */
		block = tcf_block_lookup(net, ei->block_index);
		if (block)
			block->refcnt++;
	}

	if (!block) {
678
		block = tcf_block_create(net, q, ei->block_index, extack);
679 680 681
		if (IS_ERR(block))
			return PTR_ERR(block);
		created = true;
682 683
		if (tcf_block_shared(block)) {
			err = tcf_block_insert(block, net, extack);
684 685 686 687 688
			if (err)
				goto err_block_insert;
		}
	}

689 690 691 692 693 694
	err = tcf_block_owner_add(block, q, ei->binder_type);
	if (err)
		goto err_block_owner_add;

	tcf_block_owner_netif_keep_dst(block, q, ei->binder_type);

695
	err = tcf_chain0_head_change_cb_add(block, ei, extack);
696
	if (err)
697
		goto err_chain0_head_change_cb_add;
698

699
	err = tcf_block_offload_bind(block, q, ei, extack);
700 701 702
	if (err)
		goto err_block_offload_bind;

703 704
	*p_block = block;
	return 0;
705

706
err_block_offload_bind:
707 708
	tcf_chain0_head_change_cb_del(block, ei);
err_chain0_head_change_cb_add:
709 710
	tcf_block_owner_del(block, q, ei->binder_type);
err_block_owner_add:
711 712 713 714 715 716 717 718
	if (created) {
		if (tcf_block_shared(block))
			tcf_block_remove(block, net);
err_block_insert:
		kfree(block);
	} else {
		block->refcnt--;
	}
719
	return err;
720
}
721 722
EXPORT_SYMBOL(tcf_block_get_ext);

723 724 725 726 727 728 729
static void tcf_chain_head_change_dflt(struct tcf_proto *tp_head, void *priv)
{
	struct tcf_proto __rcu **p_filter_chain = priv;

	rcu_assign_pointer(*p_filter_chain, tp_head);
}

730
int tcf_block_get(struct tcf_block **p_block,
731 732
		  struct tcf_proto __rcu **p_filter_chain, struct Qdisc *q,
		  struct netlink_ext_ack *extack)
733
{
734 735 736 737
	struct tcf_block_ext_info ei = {
		.chain_head_change = tcf_chain_head_change_dflt,
		.chain_head_change_priv = p_filter_chain,
	};
738

739
	WARN_ON(!p_filter_chain);
740
	return tcf_block_get_ext(p_block, q, &ei, extack);
741
}
742 743
EXPORT_SYMBOL(tcf_block_get);

744
/* XXX: Standalone actions are not allowed to jump to any chain, and bound
745
 * actions should be all removed after flushing.
746
 */
747
void tcf_block_put_ext(struct tcf_block *block, struct Qdisc *q,
748
		       struct tcf_block_ext_info *ei)
749
{
750
	struct tcf_chain *chain, *tmp;
751

752 753
	if (!block)
		return;
754
	tcf_chain0_head_change_cb_del(block, ei);
755
	tcf_block_owner_del(block, q, ei->binder_type);
756

757
	if (block->refcnt == 1) {
758 759 760 761 762 763 764 765 766 767 768 769
		if (tcf_block_shared(block))
			tcf_block_remove(block, block->net);

		/* Hold a refcnt for all chains, so that they don't disappear
		 * while we are iterating.
		 */
		list_for_each_entry(chain, &block->chain_list, list)
			tcf_chain_hold(chain);

		list_for_each_entry(chain, &block->chain_list, list)
			tcf_chain_flush(chain);
	}
770

771 772
	tcf_block_offload_unbind(block, q, ei);

773
	if (block->refcnt == 1) {
774
		/* At this point, all the chains should have refcnt >= 1. */
775 776
		list_for_each_entry_safe(chain, tmp, &block->chain_list, list) {
			tcf_chain_put_explicitly_created(chain);
777
			tcf_chain_put(chain);
778
		}
779

780 781 782
		block->refcnt--;
		if (list_empty(&block->chain_list))
			kfree(block);
783 784
	} else {
		block->refcnt--;
785
	}
786
}
787 788 789 790 791 792
EXPORT_SYMBOL(tcf_block_put_ext);

void tcf_block_put(struct tcf_block *block)
{
	struct tcf_block_ext_info ei = {0, };

793 794
	if (!block)
		return;
795
	tcf_block_put_ext(block, block->q, &ei);
796
}
797

798
EXPORT_SYMBOL(tcf_block_put);
799

800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836
struct tcf_block_cb {
	struct list_head list;
	tc_setup_cb_t *cb;
	void *cb_ident;
	void *cb_priv;
	unsigned int refcnt;
};

void *tcf_block_cb_priv(struct tcf_block_cb *block_cb)
{
	return block_cb->cb_priv;
}
EXPORT_SYMBOL(tcf_block_cb_priv);

struct tcf_block_cb *tcf_block_cb_lookup(struct tcf_block *block,
					 tc_setup_cb_t *cb, void *cb_ident)
{	struct tcf_block_cb *block_cb;

	list_for_each_entry(block_cb, &block->cb_list, list)
		if (block_cb->cb == cb && block_cb->cb_ident == cb_ident)
			return block_cb;
	return NULL;
}
EXPORT_SYMBOL(tcf_block_cb_lookup);

void tcf_block_cb_incref(struct tcf_block_cb *block_cb)
{
	block_cb->refcnt++;
}
EXPORT_SYMBOL(tcf_block_cb_incref);

unsigned int tcf_block_cb_decref(struct tcf_block_cb *block_cb)
{
	return --block_cb->refcnt;
}
EXPORT_SYMBOL(tcf_block_cb_decref);

837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869
static int
tcf_block_playback_offloads(struct tcf_block *block, tc_setup_cb_t *cb,
			    void *cb_priv, bool add, bool offload_in_use,
			    struct netlink_ext_ack *extack)
{
	struct tcf_chain *chain;
	struct tcf_proto *tp;
	int err;

	list_for_each_entry(chain, &block->chain_list, list) {
		for (tp = rtnl_dereference(chain->filter_chain); tp;
		     tp = rtnl_dereference(tp->next)) {
			if (tp->ops->reoffload) {
				err = tp->ops->reoffload(tp, add, cb, cb_priv,
							 extack);
				if (err && add)
					goto err_playback_remove;
			} else if (add && offload_in_use) {
				err = -EOPNOTSUPP;
				NL_SET_ERR_MSG(extack, "Filter HW offload failed - classifier without re-offloading support");
				goto err_playback_remove;
			}
		}
	}

	return 0;

err_playback_remove:
	tcf_block_playback_offloads(block, cb, cb_priv, false, offload_in_use,
				    extack);
	return err;
}

870 871
struct tcf_block_cb *__tcf_block_cb_register(struct tcf_block *block,
					     tc_setup_cb_t *cb, void *cb_ident,
872 873
					     void *cb_priv,
					     struct netlink_ext_ack *extack)
874 875
{
	struct tcf_block_cb *block_cb;
876
	int err;
877

878 879 880 881 882 883
	/* Replay any already present rules */
	err = tcf_block_playback_offloads(block, cb, cb_priv, true,
					  tcf_block_offload_in_use(block),
					  extack);
	if (err)
		return ERR_PTR(err);
884

885 886
	block_cb = kzalloc(sizeof(*block_cb), GFP_KERNEL);
	if (!block_cb)
887
		return ERR_PTR(-ENOMEM);
888 889 890 891 892 893 894 895 896 897
	block_cb->cb = cb;
	block_cb->cb_ident = cb_ident;
	block_cb->cb_priv = cb_priv;
	list_add(&block_cb->list, &block->cb_list);
	return block_cb;
}
EXPORT_SYMBOL(__tcf_block_cb_register);

int tcf_block_cb_register(struct tcf_block *block,
			  tc_setup_cb_t *cb, void *cb_ident,
898
			  void *cb_priv, struct netlink_ext_ack *extack)
899 900 901
{
	struct tcf_block_cb *block_cb;

902 903
	block_cb = __tcf_block_cb_register(block, cb, cb_ident, cb_priv,
					   extack);
904
	return PTR_ERR_OR_ZERO(block_cb);
905 906 907
}
EXPORT_SYMBOL(tcf_block_cb_register);

908 909
void __tcf_block_cb_unregister(struct tcf_block *block,
			       struct tcf_block_cb *block_cb)
910
{
911 912 913
	tcf_block_playback_offloads(block, block_cb->cb, block_cb->cb_priv,
				    false, tcf_block_offload_in_use(block),
				    NULL);
914 915 916 917 918 919 920 921 922 923 924 925 926
	list_del(&block_cb->list);
	kfree(block_cb);
}
EXPORT_SYMBOL(__tcf_block_cb_unregister);

void tcf_block_cb_unregister(struct tcf_block *block,
			     tc_setup_cb_t *cb, void *cb_ident)
{
	struct tcf_block_cb *block_cb;

	block_cb = tcf_block_cb_lookup(block, cb, cb_ident);
	if (!block_cb)
		return;
927
	__tcf_block_cb_unregister(block, block_cb);
928 929 930 931 932 933 934 935 936 937
}
EXPORT_SYMBOL(tcf_block_cb_unregister);

static int tcf_block_cb_call(struct tcf_block *block, enum tc_setup_type type,
			     void *type_data, bool err_stop)
{
	struct tcf_block_cb *block_cb;
	int ok_count = 0;
	int err;

938 939 940 941
	/* Make sure all netdevs sharing this block are offload-capable. */
	if (block->nooffloaddevcnt && err_stop)
		return -EOPNOTSUPP;

942 943 944 945 946 947 948 949 950 951 952 953
	list_for_each_entry(block_cb, &block->cb_list, list) {
		err = block_cb->cb(type, type_data, block_cb->cb_priv);
		if (err) {
			if (err_stop)
				return err;
		} else {
			ok_count++;
		}
	}
	return ok_count;
}

954 955 956 957 958 959 960 961 962 963
/* Main classifier routine: scans classifier chain attached
 * to this qdisc, (optionally) tests for protocol and asks
 * specific classifiers.
 */
int tcf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
		 struct tcf_result *res, bool compat_mode)
{
	__be16 protocol = tc_skb_protocol(skb);
#ifdef CONFIG_NET_CLS_ACT
	const int max_reclassify_loop = 4;
964 965
	const struct tcf_proto *orig_tp = tp;
	const struct tcf_proto *first_tp;
966 967 968 969 970 971 972 973 974 975 976 977 978
	int limit = 0;

reclassify:
#endif
	for (; tp; tp = rcu_dereference_bh(tp->next)) {
		int err;

		if (tp->protocol != protocol &&
		    tp->protocol != htons(ETH_P_ALL))
			continue;

		err = tp->classify(skb, tp, res);
#ifdef CONFIG_NET_CLS_ACT
979
		if (unlikely(err == TC_ACT_RECLASSIFY && !compat_mode)) {
980
			first_tp = orig_tp;
981
			goto reset;
982
		} else if (unlikely(TC_ACT_EXT_CMP(err, TC_ACT_GOTO_CHAIN))) {
983
			first_tp = res->goto_tp;
984 985
			goto reset;
		}
986 987 988 989 990 991 992 993 994
#endif
		if (err >= 0)
			return err;
	}

	return TC_ACT_UNSPEC; /* signal: continue lookup */
#ifdef CONFIG_NET_CLS_ACT
reset:
	if (unlikely(limit++ >= max_reclassify_loop)) {
995 996 997
		net_notice_ratelimited("%u: reclassify loop, rule prio %u, protocol %02x\n",
				       tp->chain->block->index,
				       tp->prio & 0xffff,
998 999 1000 1001
				       ntohs(tp->protocol));
		return TC_ACT_SHOT;
	}

1002
	tp = first_tp;
1003 1004 1005 1006 1007 1008
	protocol = tc_skb_protocol(skb);
	goto reclassify;
#endif
}
EXPORT_SYMBOL(tcf_classify);

1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022
struct tcf_chain_info {
	struct tcf_proto __rcu **pprev;
	struct tcf_proto __rcu *next;
};

static struct tcf_proto *tcf_chain_tp_prev(struct tcf_chain_info *chain_info)
{
	return rtnl_dereference(*chain_info->pprev);
}

static void tcf_chain_tp_insert(struct tcf_chain *chain,
				struct tcf_chain_info *chain_info,
				struct tcf_proto *tp)
{
1023
	if (*chain_info->pprev == chain->filter_chain)
1024
		tcf_chain0_head_change(chain, tp);
1025 1026
	RCU_INIT_POINTER(tp->next, tcf_chain_tp_prev(chain_info));
	rcu_assign_pointer(*chain_info->pprev, tp);
1027
	tcf_chain_hold(chain);
1028 1029 1030 1031 1032 1033 1034 1035
}

static void tcf_chain_tp_remove(struct tcf_chain *chain,
				struct tcf_chain_info *chain_info,
				struct tcf_proto *tp)
{
	struct tcf_proto *next = rtnl_dereference(chain_info->next);

1036
	if (tp == chain->filter_chain)
1037
		tcf_chain0_head_change(chain, next);
1038
	RCU_INIT_POINTER(*chain_info->pprev, next);
1039
	tcf_chain_put(chain);
1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068
}

static struct tcf_proto *tcf_chain_tp_find(struct tcf_chain *chain,
					   struct tcf_chain_info *chain_info,
					   u32 protocol, u32 prio,
					   bool prio_allocate)
{
	struct tcf_proto **pprev;
	struct tcf_proto *tp;

	/* Check the chain for existence of proto-tcf with this priority */
	for (pprev = &chain->filter_chain;
	     (tp = rtnl_dereference(*pprev)); pprev = &tp->next) {
		if (tp->prio >= prio) {
			if (tp->prio == prio) {
				if (prio_allocate ||
				    (tp->protocol != protocol && protocol))
					return ERR_PTR(-EINVAL);
			} else {
				tp = NULL;
			}
			break;
		}
	}
	chain_info->pprev = pprev;
	chain_info->next = tp ? tp->next : NULL;
	return tp;
}

1069
static int tcf_fill_node(struct net *net, struct sk_buff *skb,
1070 1071 1072
			 struct tcf_proto *tp, struct tcf_block *block,
			 struct Qdisc *q, u32 parent, void *fh,
			 u32 portid, u32 seq, u16 flags, int event)
1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084
{
	struct tcmsg *tcm;
	struct nlmsghdr  *nlh;
	unsigned char *b = skb_tail_pointer(skb);

	nlh = nlmsg_put(skb, portid, seq, event, sizeof(*tcm), flags);
	if (!nlh)
		goto out_nlmsg_trim;
	tcm = nlmsg_data(nlh);
	tcm->tcm_family = AF_UNSPEC;
	tcm->tcm__pad1 = 0;
	tcm->tcm__pad2 = 0;
1085 1086 1087 1088 1089 1090 1091
	if (q) {
		tcm->tcm_ifindex = qdisc_dev(q)->ifindex;
		tcm->tcm_parent = parent;
	} else {
		tcm->tcm_ifindex = TCM_IFINDEX_MAGIC_BLOCK;
		tcm->tcm_block_index = block->index;
	}
1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113
	tcm->tcm_info = TC_H_MAKE(tp->prio, tp->protocol);
	if (nla_put_string(skb, TCA_KIND, tp->ops->kind))
		goto nla_put_failure;
	if (nla_put_u32(skb, TCA_CHAIN, tp->chain->index))
		goto nla_put_failure;
	if (!fh) {
		tcm->tcm_handle = 0;
	} else {
		if (tp->ops->dump && tp->ops->dump(net, tp, fh, skb, tcm) < 0)
			goto nla_put_failure;
	}
	nlh->nlmsg_len = skb_tail_pointer(skb) - b;
	return skb->len;

out_nlmsg_trim:
nla_put_failure:
	nlmsg_trim(skb, b);
	return -1;
}

static int tfilter_notify(struct net *net, struct sk_buff *oskb,
			  struct nlmsghdr *n, struct tcf_proto *tp,
1114 1115
			  struct tcf_block *block, struct Qdisc *q,
			  u32 parent, void *fh, int event, bool unicast)
1116 1117 1118 1119 1120 1121 1122 1123
{
	struct sk_buff *skb;
	u32 portid = oskb ? NETLINK_CB(oskb).portid : 0;

	skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
	if (!skb)
		return -ENOBUFS;

1124 1125
	if (tcf_fill_node(net, skb, tp, block, q, parent, fh, portid,
			  n->nlmsg_seq, n->nlmsg_flags, event) <= 0) {
1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138
		kfree_skb(skb);
		return -EINVAL;
	}

	if (unicast)
		return netlink_unicast(net->rtnl, skb, portid, MSG_DONTWAIT);

	return rtnetlink_send(skb, net, portid, RTNLGRP_TC,
			      n->nlmsg_flags & NLM_F_ECHO);
}

static int tfilter_del_notify(struct net *net, struct sk_buff *oskb,
			      struct nlmsghdr *n, struct tcf_proto *tp,
1139
			      struct tcf_block *block, struct Qdisc *q,
1140 1141
			      u32 parent, void *fh, bool unicast, bool *last,
			      struct netlink_ext_ack *extack)
1142 1143 1144 1145 1146 1147 1148 1149 1150
{
	struct sk_buff *skb;
	u32 portid = oskb ? NETLINK_CB(oskb).portid : 0;
	int err;

	skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
	if (!skb)
		return -ENOBUFS;

1151 1152
	if (tcf_fill_node(net, skb, tp, block, q, parent, fh, portid,
			  n->nlmsg_seq, n->nlmsg_flags, RTM_DELTFILTER) <= 0) {
1153
		NL_SET_ERR_MSG(extack, "Failed to build del event notification");
1154 1155 1156 1157
		kfree_skb(skb);
		return -EINVAL;
	}

1158
	err = tp->ops->delete(tp, fh, last, extack);
1159 1160 1161 1162 1163 1164 1165 1166
	if (err) {
		kfree_skb(skb);
		return err;
	}

	if (unicast)
		return netlink_unicast(net->rtnl, skb, portid, MSG_DONTWAIT);

1167 1168 1169 1170 1171
	err = rtnetlink_send(skb, net, portid, RTNLGRP_TC,
			     n->nlmsg_flags & NLM_F_ECHO);
	if (err < 0)
		NL_SET_ERR_MSG(extack, "Failed to send filter delete notification");
	return err;
1172 1173 1174
}

static void tfilter_notify_chain(struct net *net, struct sk_buff *oskb,
1175 1176
				 struct tcf_block *block, struct Qdisc *q,
				 u32 parent, struct nlmsghdr *n,
1177 1178 1179 1180 1181 1182
				 struct tcf_chain *chain, int event)
{
	struct tcf_proto *tp;

	for (tp = rtnl_dereference(chain->filter_chain);
	     tp; tp = rtnl_dereference(tp->next))
1183
		tfilter_notify(net, oskb, n, tp, block,
1184
			       q, parent, NULL, event, false);
1185 1186
}

1187
static int tc_new_tfilter(struct sk_buff *skb, struct nlmsghdr *n,
1188
			  struct netlink_ext_ack *extack)
L
Linus Torvalds 已提交
1189
{
1190
	struct net *net = sock_net(skb->sk);
1191
	struct nlattr *tca[TCA_MAX + 1];
L
Linus Torvalds 已提交
1192 1193 1194
	struct tcmsg *t;
	u32 protocol;
	u32 prio;
1195
	bool prio_allocate;
L
Linus Torvalds 已提交
1196
	u32 parent;
1197
	u32 chain_index;
1198
	struct Qdisc *q = NULL;
1199
	struct tcf_chain_info chain_info;
1200
	struct tcf_chain *chain = NULL;
1201
	struct tcf_block *block;
L
Linus Torvalds 已提交
1202 1203
	struct tcf_proto *tp;
	unsigned long cl;
1204
	void *fh;
L
Linus Torvalds 已提交
1205
	int err;
1206
	int tp_created;
L
Linus Torvalds 已提交
1207

1208
	if (!netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN))
1209
		return -EPERM;
1210

L
Linus Torvalds 已提交
1211
replay:
1212 1213
	tp_created = 0;

1214
	err = nlmsg_parse(n, sizeof(*t), tca, TCA_MAX, NULL, extack);
1215 1216 1217
	if (err < 0)
		return err;

1218
	t = nlmsg_data(n);
L
Linus Torvalds 已提交
1219 1220
	protocol = TC_H_MIN(t->tcm_info);
	prio = TC_H_MAJ(t->tcm_info);
1221
	prio_allocate = false;
L
Linus Torvalds 已提交
1222 1223 1224 1225
	parent = t->tcm_parent;
	cl = 0;

	if (prio == 0) {
1226 1227 1228 1229 1230 1231 1232
		/* If no priority is provided by the user,
		 * we allocate one.
		 */
		if (n->nlmsg_flags & NLM_F_CREATE) {
			prio = TC_H_MAKE(0x80000000U, 0U);
			prio_allocate = true;
		} else {
1233
			NL_SET_ERR_MSG(extack, "Invalid filter command with priority of zero");
L
Linus Torvalds 已提交
1234
			return -ENOENT;
1235
		}
L
Linus Torvalds 已提交
1236 1237 1238 1239
	}

	/* Find head of filter chain. */

1240 1241 1242 1243 1244
	block = tcf_block_find(net, &q, &parent, &cl,
			       t->tcm_ifindex, t->tcm_block_index, extack);
	if (IS_ERR(block)) {
		err = PTR_ERR(block);
		goto errout;
1245
	}
1246 1247 1248

	chain_index = tca[TCA_CHAIN] ? nla_get_u32(tca[TCA_CHAIN]) : 0;
	if (chain_index > TC_ACT_EXT_VAL_MASK) {
1249
		NL_SET_ERR_MSG(extack, "Specified chain index exceeds upper limit");
1250 1251 1252
		err = -EINVAL;
		goto errout;
	}
1253
	chain = tcf_chain_get(block, chain_index, true);
1254
	if (!chain) {
1255
		NL_SET_ERR_MSG(extack, "Cannot create specified filter chain");
1256
		err = -ENOMEM;
1257 1258
		goto errout;
	}
L
Linus Torvalds 已提交
1259

1260 1261 1262
	tp = tcf_chain_tp_find(chain, &chain_info, protocol,
			       prio, prio_allocate);
	if (IS_ERR(tp)) {
1263
		NL_SET_ERR_MSG(extack, "Filter with specified priority/protocol not found");
1264 1265
		err = PTR_ERR(tp);
		goto errout;
L
Linus Torvalds 已提交
1266 1267 1268 1269 1270
	}

	if (tp == NULL) {
		/* Proto-tcf does not exist, create new one */

1271
		if (tca[TCA_KIND] == NULL || !protocol) {
1272
			NL_SET_ERR_MSG(extack, "Filter kind and protocol must be specified");
1273
			err = -EINVAL;
L
Linus Torvalds 已提交
1274
			goto errout;
1275
		}
L
Linus Torvalds 已提交
1276

1277
		if (!(n->nlmsg_flags & NLM_F_CREATE)) {
1278
			NL_SET_ERR_MSG(extack, "Need both RTM_NEWTFILTER and NLM_F_CREATE to create a new filter");
1279
			err = -ENOENT;
L
Linus Torvalds 已提交
1280
			goto errout;
1281
		}
L
Linus Torvalds 已提交
1282

1283
		if (prio_allocate)
1284
			prio = tcf_auto_prio(tcf_chain_tp_prev(&chain_info));
L
Linus Torvalds 已提交
1285

1286
		tp = tcf_proto_create(nla_data(tca[TCA_KIND]),
1287
				      protocol, prio, chain, extack);
1288 1289
		if (IS_ERR(tp)) {
			err = PTR_ERR(tp);
L
Linus Torvalds 已提交
1290 1291
			goto errout;
		}
1292
		tp_created = 1;
1293
	} else if (tca[TCA_KIND] && nla_strcmp(tca[TCA_KIND], tp->ops->kind)) {
1294
		NL_SET_ERR_MSG(extack, "Specified filter kind does not match existing one");
1295
		err = -EINVAL;
L
Linus Torvalds 已提交
1296
		goto errout;
1297
	}
L
Linus Torvalds 已提交
1298 1299 1300

	fh = tp->ops->get(tp, t->tcm_handle);

1301
	if (!fh) {
1302
		if (!(n->nlmsg_flags & NLM_F_CREATE)) {
1303
			NL_SET_ERR_MSG(extack, "Need both RTM_NEWTFILTER and NLM_F_CREATE to create a new filter");
1304
			err = -ENOENT;
L
Linus Torvalds 已提交
1305
			goto errout;
1306
		}
1307 1308 1309 1310
	} else if (n->nlmsg_flags & NLM_F_EXCL) {
		NL_SET_ERR_MSG(extack, "Filter already exists");
		err = -EEXIST;
		goto errout;
L
Linus Torvalds 已提交
1311 1312
	}

1313 1314 1315 1316 1317 1318
	if (chain->tmplt_ops && chain->tmplt_ops != tp->ops) {
		NL_SET_ERR_MSG(extack, "Chain template is set to a different filter kind");
		err = -EINVAL;
		goto errout;
	}

1319
	err = tp->ops->change(net, skb, tp, cl, t->tcm_handle, tca, &fh,
1320 1321
			      n->nlmsg_flags & NLM_F_CREATE ? TCA_ACT_NOREPLACE : TCA_ACT_REPLACE,
			      extack);
1322
	if (err == 0) {
1323 1324
		if (tp_created)
			tcf_chain_tp_insert(chain, &chain_info, tp);
1325
		tfilter_notify(net, skb, n, tp, block, q, parent, fh,
1326
			       RTM_NEWTFILTER, false);
1327 1328
	} else {
		if (tp_created)
1329
			tcf_proto_destroy(tp, NULL);
1330
	}
L
Linus Torvalds 已提交
1331 1332

errout:
1333 1334
	if (chain)
		tcf_chain_put(chain);
L
Linus Torvalds 已提交
1335 1336 1337 1338 1339 1340
	if (err == -EAGAIN)
		/* Replay the request. */
		goto replay;
	return err;
}

1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393
static int tc_del_tfilter(struct sk_buff *skb, struct nlmsghdr *n,
			  struct netlink_ext_ack *extack)
{
	struct net *net = sock_net(skb->sk);
	struct nlattr *tca[TCA_MAX + 1];
	struct tcmsg *t;
	u32 protocol;
	u32 prio;
	u32 parent;
	u32 chain_index;
	struct Qdisc *q = NULL;
	struct tcf_chain_info chain_info;
	struct tcf_chain *chain = NULL;
	struct tcf_block *block;
	struct tcf_proto *tp = NULL;
	unsigned long cl = 0;
	void *fh = NULL;
	int err;

	if (!netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN))
		return -EPERM;

	err = nlmsg_parse(n, sizeof(*t), tca, TCA_MAX, NULL, extack);
	if (err < 0)
		return err;

	t = nlmsg_data(n);
	protocol = TC_H_MIN(t->tcm_info);
	prio = TC_H_MAJ(t->tcm_info);
	parent = t->tcm_parent;

	if (prio == 0 && (protocol || t->tcm_handle || tca[TCA_KIND])) {
		NL_SET_ERR_MSG(extack, "Cannot flush filters with protocol, handle or kind set");
		return -ENOENT;
	}

	/* Find head of filter chain. */

	block = tcf_block_find(net, &q, &parent, &cl,
			       t->tcm_ifindex, t->tcm_block_index, extack);
	if (IS_ERR(block)) {
		err = PTR_ERR(block);
		goto errout;
	}

	chain_index = tca[TCA_CHAIN] ? nla_get_u32(tca[TCA_CHAIN]) : 0;
	if (chain_index > TC_ACT_EXT_VAL_MASK) {
		NL_SET_ERR_MSG(extack, "Specified chain index exceeds upper limit");
		err = -EINVAL;
		goto errout;
	}
	chain = tcf_chain_get(block, chain_index, false);
	if (!chain) {
1394 1395 1396 1397 1398 1399 1400
		/* User requested flush on non-existent chain. Nothing to do,
		 * so just return success.
		 */
		if (prio == 0) {
			err = 0;
			goto errout;
		}
1401
		NL_SET_ERR_MSG(extack, "Cannot find specified filter chain");
1402
		err = -ENOENT;
1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417
		goto errout;
	}

	if (prio == 0) {
		tfilter_notify_chain(net, skb, block, q, parent, n,
				     chain, RTM_DELTFILTER);
		tcf_chain_flush(chain);
		err = 0;
		goto errout;
	}

	tp = tcf_chain_tp_find(chain, &chain_info, protocol,
			       prio, false);
	if (!tp || IS_ERR(tp)) {
		NL_SET_ERR_MSG(extack, "Filter with specified priority/protocol not found");
1418
		err = tp ? PTR_ERR(tp) : -ENOENT;
1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517
		goto errout;
	} else if (tca[TCA_KIND] && nla_strcmp(tca[TCA_KIND], tp->ops->kind)) {
		NL_SET_ERR_MSG(extack, "Specified filter kind does not match existing one");
		err = -EINVAL;
		goto errout;
	}

	fh = tp->ops->get(tp, t->tcm_handle);

	if (!fh) {
		if (t->tcm_handle == 0) {
			tcf_chain_tp_remove(chain, &chain_info, tp);
			tfilter_notify(net, skb, n, tp, block, q, parent, fh,
				       RTM_DELTFILTER, false);
			tcf_proto_destroy(tp, extack);
			err = 0;
		} else {
			NL_SET_ERR_MSG(extack, "Specified filter handle not found");
			err = -ENOENT;
		}
	} else {
		bool last;

		err = tfilter_del_notify(net, skb, n, tp, block,
					 q, parent, fh, false, &last,
					 extack);
		if (err)
			goto errout;
		if (last) {
			tcf_chain_tp_remove(chain, &chain_info, tp);
			tcf_proto_destroy(tp, extack);
		}
	}

errout:
	if (chain)
		tcf_chain_put(chain);
	return err;
}

static int tc_get_tfilter(struct sk_buff *skb, struct nlmsghdr *n,
			  struct netlink_ext_ack *extack)
{
	struct net *net = sock_net(skb->sk);
	struct nlattr *tca[TCA_MAX + 1];
	struct tcmsg *t;
	u32 protocol;
	u32 prio;
	u32 parent;
	u32 chain_index;
	struct Qdisc *q = NULL;
	struct tcf_chain_info chain_info;
	struct tcf_chain *chain = NULL;
	struct tcf_block *block;
	struct tcf_proto *tp = NULL;
	unsigned long cl = 0;
	void *fh = NULL;
	int err;

	err = nlmsg_parse(n, sizeof(*t), tca, TCA_MAX, NULL, extack);
	if (err < 0)
		return err;

	t = nlmsg_data(n);
	protocol = TC_H_MIN(t->tcm_info);
	prio = TC_H_MAJ(t->tcm_info);
	parent = t->tcm_parent;

	if (prio == 0) {
		NL_SET_ERR_MSG(extack, "Invalid filter command with priority of zero");
		return -ENOENT;
	}

	/* Find head of filter chain. */

	block = tcf_block_find(net, &q, &parent, &cl,
			       t->tcm_ifindex, t->tcm_block_index, extack);
	if (IS_ERR(block)) {
		err = PTR_ERR(block);
		goto errout;
	}

	chain_index = tca[TCA_CHAIN] ? nla_get_u32(tca[TCA_CHAIN]) : 0;
	if (chain_index > TC_ACT_EXT_VAL_MASK) {
		NL_SET_ERR_MSG(extack, "Specified chain index exceeds upper limit");
		err = -EINVAL;
		goto errout;
	}
	chain = tcf_chain_get(block, chain_index, false);
	if (!chain) {
		NL_SET_ERR_MSG(extack, "Cannot find specified filter chain");
		err = -EINVAL;
		goto errout;
	}

	tp = tcf_chain_tp_find(chain, &chain_info, protocol,
			       prio, false);
	if (!tp || IS_ERR(tp)) {
		NL_SET_ERR_MSG(extack, "Filter with specified priority/protocol not found");
1518
		err = tp ? PTR_ERR(tp) : -ENOENT;
1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543
		goto errout;
	} else if (tca[TCA_KIND] && nla_strcmp(tca[TCA_KIND], tp->ops->kind)) {
		NL_SET_ERR_MSG(extack, "Specified filter kind does not match existing one");
		err = -EINVAL;
		goto errout;
	}

	fh = tp->ops->get(tp, t->tcm_handle);

	if (!fh) {
		NL_SET_ERR_MSG(extack, "Specified filter handle not found");
		err = -ENOENT;
	} else {
		err = tfilter_notify(net, skb, n, tp, block, q, parent,
				     fh, RTM_NEWTFILTER, true);
		if (err < 0)
			NL_SET_ERR_MSG(extack, "Failed to send filter notify message");
	}

errout:
	if (chain)
		tcf_chain_put(chain);
	return err;
}

1544
struct tcf_dump_args {
L
Linus Torvalds 已提交
1545 1546 1547
	struct tcf_walker w;
	struct sk_buff *skb;
	struct netlink_callback *cb;
1548
	struct tcf_block *block;
1549 1550
	struct Qdisc *q;
	u32 parent;
L
Linus Torvalds 已提交
1551 1552
};

1553
static int tcf_node_dump(struct tcf_proto *tp, void *n, struct tcf_walker *arg)
L
Linus Torvalds 已提交
1554
{
1555
	struct tcf_dump_args *a = (void *)arg;
1556
	struct net *net = sock_net(a->skb->sk);
L
Linus Torvalds 已提交
1557

1558
	return tcf_fill_node(net, a->skb, tp, a->block, a->q, a->parent,
1559
			     n, NETLINK_CB(a->cb->skb).portid,
J
Jamal Hadi Salim 已提交
1560 1561
			     a->cb->nlh->nlmsg_seq, NLM_F_MULTI,
			     RTM_NEWTFILTER);
L
Linus Torvalds 已提交
1562 1563
}

1564 1565
static bool tcf_chain_dump(struct tcf_chain *chain, struct Qdisc *q, u32 parent,
			   struct sk_buff *skb, struct netlink_callback *cb,
1566 1567 1568
			   long index_start, long *p_index)
{
	struct net *net = sock_net(skb->sk);
1569
	struct tcf_block *block = chain->block;
1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587
	struct tcmsg *tcm = nlmsg_data(cb->nlh);
	struct tcf_dump_args arg;
	struct tcf_proto *tp;

	for (tp = rtnl_dereference(chain->filter_chain);
	     tp; tp = rtnl_dereference(tp->next), (*p_index)++) {
		if (*p_index < index_start)
			continue;
		if (TC_H_MAJ(tcm->tcm_info) &&
		    TC_H_MAJ(tcm->tcm_info) != tp->prio)
			continue;
		if (TC_H_MIN(tcm->tcm_info) &&
		    TC_H_MIN(tcm->tcm_info) != tp->protocol)
			continue;
		if (*p_index > index_start)
			memset(&cb->args[1], 0,
			       sizeof(cb->args) - sizeof(cb->args[0]));
		if (cb->args[1] == 0) {
1588
			if (tcf_fill_node(net, skb, tp, block, q, parent, NULL,
1589 1590 1591
					  NETLINK_CB(cb->skb).portid,
					  cb->nlh->nlmsg_seq, NLM_F_MULTI,
					  RTM_NEWTFILTER) <= 0)
1592
				return false;
1593 1594 1595 1596 1597 1598 1599 1600

			cb->args[1] = 1;
		}
		if (!tp->ops->walk)
			continue;
		arg.w.fn = tcf_node_dump;
		arg.skb = skb;
		arg.cb = cb;
1601
		arg.block = block;
1602 1603
		arg.q = q;
		arg.parent = parent;
1604 1605 1606
		arg.w.stop = 0;
		arg.w.skip = cb->args[1] - 1;
		arg.w.count = 0;
1607
		arg.w.cookie = cb->args[2];
1608
		tp->ops->walk(tp, &arg.w);
1609
		cb->args[2] = arg.w.cookie;
1610 1611
		cb->args[1] = arg.w.count + 1;
		if (arg.w.stop)
1612
			return false;
1613
	}
1614
	return true;
1615 1616
}

E
Eric Dumazet 已提交
1617
/* called with RTNL */
L
Linus Torvalds 已提交
1618 1619
static int tc_dump_tfilter(struct sk_buff *skb, struct netlink_callback *cb)
{
1620
	struct net *net = sock_net(skb->sk);
1621
	struct nlattr *tca[TCA_MAX + 1];
1622
	struct Qdisc *q = NULL;
1623
	struct tcf_block *block;
1624
	struct tcf_chain *chain;
1625
	struct tcmsg *tcm = nlmsg_data(cb->nlh);
1626 1627
	long index_start;
	long index;
1628
	u32 parent;
1629
	int err;
L
Linus Torvalds 已提交
1630

1631
	if (nlmsg_len(cb->nlh) < sizeof(*tcm))
L
Linus Torvalds 已提交
1632
		return skb->len;
1633 1634 1635 1636 1637

	err = nlmsg_parse(cb->nlh, sizeof(*tcm), tca, TCA_MAX, NULL, NULL);
	if (err)
		return err;

1638 1639 1640 1641
	if (tcm->tcm_ifindex == TCM_IFINDEX_MAGIC_BLOCK) {
		block = tcf_block_lookup(net, tcm->tcm_block_index);
		if (!block)
			goto out;
1642 1643 1644 1645 1646 1647 1648
		/* If we work with block index, q is NULL and parent value
		 * will never be used in the following code. The check
		 * in tcf_fill_node prevents it. However, compiler does not
		 * see that far, so set parent to zero to silence the warning
		 * about parent being uninitialized.
		 */
		parent = 0;
1649
	} else {
1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668
		const struct Qdisc_class_ops *cops;
		struct net_device *dev;
		unsigned long cl = 0;

		dev = __dev_get_by_index(net, tcm->tcm_ifindex);
		if (!dev)
			return skb->len;

		parent = tcm->tcm_parent;
		if (!parent) {
			q = dev->qdisc;
			parent = q->handle;
		} else {
			q = qdisc_lookup(dev, TC_H_MAJ(tcm->tcm_parent));
		}
		if (!q)
			goto out;
		cops = q->ops->cl_ops;
		if (!cops)
1669
			goto out;
1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681
		if (!cops->tcf_block)
			goto out;
		if (TC_H_MIN(tcm->tcm_parent)) {
			cl = cops->find(q, tcm->tcm_parent);
			if (cl == 0)
				goto out;
		}
		block = cops->tcf_block(q, cl, NULL);
		if (!block)
			goto out;
		if (tcf_block_shared(block))
			q = NULL;
L
Linus Torvalds 已提交
1682 1683
	}

1684 1685
	index_start = cb->args[0];
	index = 0;
1686 1687 1688 1689 1690

	list_for_each_entry(chain, &block->chain_list, list) {
		if (tca[TCA_CHAIN] &&
		    nla_get_u32(tca[TCA_CHAIN]) != chain->index)
			continue;
1691
		if (!tcf_chain_dump(chain, q, parent, skb, cb,
1692 1693
				    index_start, &index)) {
			err = -EMSGSIZE;
1694
			break;
1695
		}
1696 1697
	}

1698
	cb->args[0] = index;
L
Linus Torvalds 已提交
1699 1700

out:
1701 1702 1703
	/* If we did no progress, the error (EMSGSIZE) is real */
	if (skb->len == 0 && err)
		return err;
L
Linus Torvalds 已提交
1704 1705 1706
	return skb->len;
}

1707 1708 1709 1710 1711
static int tc_chain_fill_node(struct tcf_chain *chain, struct net *net,
			      struct sk_buff *skb, struct tcf_block *block,
			      u32 portid, u32 seq, u16 flags, int event)
{
	unsigned char *b = skb_tail_pointer(skb);
1712
	const struct tcf_proto_ops *ops;
1713 1714
	struct nlmsghdr *nlh;
	struct tcmsg *tcm;
1715 1716 1717 1718
	void *priv;

	ops = chain->tmplt_ops;
	priv = chain->tmplt_priv;
1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738

	nlh = nlmsg_put(skb, portid, seq, event, sizeof(*tcm), flags);
	if (!nlh)
		goto out_nlmsg_trim;
	tcm = nlmsg_data(nlh);
	tcm->tcm_family = AF_UNSPEC;
	tcm->tcm__pad1 = 0;
	tcm->tcm__pad2 = 0;
	tcm->tcm_handle = 0;
	if (block->q) {
		tcm->tcm_ifindex = qdisc_dev(block->q)->ifindex;
		tcm->tcm_parent = block->q->handle;
	} else {
		tcm->tcm_ifindex = TCM_IFINDEX_MAGIC_BLOCK;
		tcm->tcm_block_index = block->index;
	}

	if (nla_put_u32(skb, TCA_CHAIN, chain->index))
		goto nla_put_failure;

1739 1740 1741 1742 1743 1744 1745
	if (ops) {
		if (nla_put_string(skb, TCA_KIND, ops->kind))
			goto nla_put_failure;
		if (ops->tmplt_dump(skb, net, priv) < 0)
			goto nla_put_failure;
	}

1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778
	nlh->nlmsg_len = skb_tail_pointer(skb) - b;
	return skb->len;

out_nlmsg_trim:
nla_put_failure:
	nlmsg_trim(skb, b);
	return -EMSGSIZE;
}

static int tc_chain_notify(struct tcf_chain *chain, struct sk_buff *oskb,
			   u32 seq, u16 flags, int event, bool unicast)
{
	u32 portid = oskb ? NETLINK_CB(oskb).portid : 0;
	struct tcf_block *block = chain->block;
	struct net *net = block->net;
	struct sk_buff *skb;

	skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
	if (!skb)
		return -ENOBUFS;

	if (tc_chain_fill_node(chain, net, skb, block, portid,
			       seq, flags, event) <= 0) {
		kfree_skb(skb);
		return -EINVAL;
	}

	if (unicast)
		return netlink_unicast(net->rtnl, skb, portid, MSG_DONTWAIT);

	return rtnetlink_send(skb, net, portid, RTNLGRP_TC, flags & NLM_F_ECHO);
}

1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819
static int tc_chain_tmplt_add(struct tcf_chain *chain, struct net *net,
			      struct nlattr **tca,
			      struct netlink_ext_ack *extack)
{
	const struct tcf_proto_ops *ops;
	void *tmplt_priv;

	/* If kind is not set, user did not specify template. */
	if (!tca[TCA_KIND])
		return 0;

	ops = tcf_proto_lookup_ops(nla_data(tca[TCA_KIND]), extack);
	if (IS_ERR(ops))
		return PTR_ERR(ops);
	if (!ops->tmplt_create || !ops->tmplt_destroy || !ops->tmplt_dump) {
		NL_SET_ERR_MSG(extack, "Chain templates are not supported with specified classifier");
		return -EOPNOTSUPP;
	}

	tmplt_priv = ops->tmplt_create(net, chain, tca, extack);
	if (IS_ERR(tmplt_priv)) {
		module_put(ops->owner);
		return PTR_ERR(tmplt_priv);
	}
	chain->tmplt_ops = ops;
	chain->tmplt_priv = tmplt_priv;
	return 0;
}

static void tc_chain_tmplt_del(struct tcf_chain *chain)
{
	const struct tcf_proto_ops *ops = chain->tmplt_ops;

	/* If template ops are set, no work to do for us. */
	if (!ops)
		return;

	ops->tmplt_destroy(chain->tmplt_priv);
	module_put(ops->owner);
}

1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861
/* Add/delete/get a chain */

static int tc_ctl_chain(struct sk_buff *skb, struct nlmsghdr *n,
			struct netlink_ext_ack *extack)
{
	struct net *net = sock_net(skb->sk);
	struct nlattr *tca[TCA_MAX + 1];
	struct tcmsg *t;
	u32 parent;
	u32 chain_index;
	struct Qdisc *q = NULL;
	struct tcf_chain *chain = NULL;
	struct tcf_block *block;
	unsigned long cl;
	int err;

	if (n->nlmsg_type != RTM_GETCHAIN &&
	    !netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN))
		return -EPERM;

replay:
	err = nlmsg_parse(n, sizeof(*t), tca, TCA_MAX, NULL, extack);
	if (err < 0)
		return err;

	t = nlmsg_data(n);
	parent = t->tcm_parent;
	cl = 0;

	block = tcf_block_find(net, &q, &parent, &cl,
			       t->tcm_ifindex, t->tcm_block_index, extack);
	if (IS_ERR(block))
		return PTR_ERR(block);

	chain_index = tca[TCA_CHAIN] ? nla_get_u32(tca[TCA_CHAIN]) : 0;
	if (chain_index > TC_ACT_EXT_VAL_MASK) {
		NL_SET_ERR_MSG(extack, "Specified chain index exceeds upper limit");
		return -EINVAL;
	}
	chain = tcf_chain_lookup(block, chain_index);
	if (n->nlmsg_type == RTM_NEWCHAIN) {
		if (chain) {
1862
			if (tcf_chain_held_by_acts_only(chain)) {
1863
				/* The chain exists only because there is
1864
				 * some action referencing it.
1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880
				 */
				tcf_chain_hold(chain);
			} else {
				NL_SET_ERR_MSG(extack, "Filter chain already exists");
				return -EEXIST;
			}
		} else {
			if (!(n->nlmsg_flags & NLM_F_CREATE)) {
				NL_SET_ERR_MSG(extack, "Need both RTM_NEWCHAIN and NLM_F_CREATE to create a new chain");
				return -ENOENT;
			}
			chain = tcf_chain_create(block, chain_index);
			if (!chain) {
				NL_SET_ERR_MSG(extack, "Failed to create filter chain");
				return -ENOMEM;
			}
1881 1882
		}
	} else {
1883
		if (!chain || tcf_chain_held_by_acts_only(chain)) {
1884 1885 1886 1887 1888 1889 1890 1891
			NL_SET_ERR_MSG(extack, "Cannot find specified filter chain");
			return -EINVAL;
		}
		tcf_chain_hold(chain);
	}

	switch (n->nlmsg_type) {
	case RTM_NEWCHAIN:
1892 1893 1894
		err = tc_chain_tmplt_add(chain, net, tca, extack);
		if (err)
			goto errout;
1895 1896 1897 1898 1899 1900 1901 1902 1903 1904
		/* In case the chain was successfully added, take a reference
		 * to the chain. This ensures that an empty chain
		 * does not disappear at the end of this function.
		 */
		tcf_chain_hold(chain);
		chain->explicitly_created = true;
		tc_chain_notify(chain, NULL, 0, NLM_F_CREATE | NLM_F_EXCL,
				RTM_NEWCHAIN, false);
		break;
	case RTM_DELCHAIN:
1905 1906
		tfilter_notify_chain(net, skb, block, q, parent, n,
				     chain, RTM_DELTFILTER);
1907 1908 1909 1910 1911 1912
		/* Flush the chain first as the user requested chain removal. */
		tcf_chain_flush(chain);
		/* In case the chain was successfully deleted, put a reference
		 * to the chain previously taken during addition.
		 */
		tcf_chain_put_explicitly_created(chain);
1913
		chain->explicitly_created = false;
1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
		break;
	case RTM_GETCHAIN:
		err = tc_chain_notify(chain, skb, n->nlmsg_seq,
				      n->nlmsg_seq, n->nlmsg_type, true);
		if (err < 0)
			NL_SET_ERR_MSG(extack, "Failed to send chain notify message");
		break;
	default:
		err = -EOPNOTSUPP;
		NL_SET_ERR_MSG(extack, "Unsupported message type");
		goto errout;
	}

errout:
	tcf_chain_put(chain);
	if (err == -EAGAIN)
		/* Replay the request. */
		goto replay;
	return err;
}

/* called with RTNL */
static int tc_dump_chain(struct sk_buff *skb, struct netlink_callback *cb)
{
	struct net *net = sock_net(skb->sk);
	struct nlattr *tca[TCA_MAX + 1];
	struct Qdisc *q = NULL;
	struct tcf_block *block;
	struct tcf_chain *chain;
	struct tcmsg *tcm = nlmsg_data(cb->nlh);
	long index_start;
	long index;
	u32 parent;
	int err;

	if (nlmsg_len(cb->nlh) < sizeof(*tcm))
		return skb->len;

	err = nlmsg_parse(cb->nlh, sizeof(*tcm), tca, TCA_MAX, NULL, NULL);
	if (err)
		return err;

	if (tcm->tcm_ifindex == TCM_IFINDEX_MAGIC_BLOCK) {
		block = tcf_block_lookup(net, tcm->tcm_block_index);
		if (!block)
			goto out;
		/* If we work with block index, q is NULL and parent value
		 * will never be used in the following code. The check
		 * in tcf_fill_node prevents it. However, compiler does not
		 * see that far, so set parent to zero to silence the warning
		 * about parent being uninitialized.
		 */
		parent = 0;
	} else {
		const struct Qdisc_class_ops *cops;
		struct net_device *dev;
		unsigned long cl = 0;

		dev = __dev_get_by_index(net, tcm->tcm_ifindex);
		if (!dev)
			return skb->len;

		parent = tcm->tcm_parent;
		if (!parent) {
			q = dev->qdisc;
			parent = q->handle;
		} else {
			q = qdisc_lookup(dev, TC_H_MAJ(tcm->tcm_parent));
		}
		if (!q)
			goto out;
		cops = q->ops->cl_ops;
		if (!cops)
			goto out;
		if (!cops->tcf_block)
			goto out;
		if (TC_H_MIN(tcm->tcm_parent)) {
			cl = cops->find(q, tcm->tcm_parent);
			if (cl == 0)
				goto out;
		}
		block = cops->tcf_block(q, cl, NULL);
		if (!block)
			goto out;
		if (tcf_block_shared(block))
			q = NULL;
	}

	index_start = cb->args[0];
	index = 0;

	list_for_each_entry(chain, &block->chain_list, list) {
		if ((tca[TCA_CHAIN] &&
		     nla_get_u32(tca[TCA_CHAIN]) != chain->index))
			continue;
		if (index < index_start) {
			index++;
			continue;
		}
2013
		if (tcf_chain_held_by_acts_only(chain))
2014
			continue;
2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032
		err = tc_chain_fill_node(chain, net, skb, block,
					 NETLINK_CB(cb->skb).portid,
					 cb->nlh->nlmsg_seq, NLM_F_MULTI,
					 RTM_NEWCHAIN);
		if (err <= 0)
			break;
		index++;
	}

	cb->args[0] = index;

out:
	/* If we did no progress, the error (EMSGSIZE) is real */
	if (skb->len == 0 && err)
		return err;
	return skb->len;
}

2033
void tcf_exts_destroy(struct tcf_exts *exts)
L
Linus Torvalds 已提交
2034 2035
{
#ifdef CONFIG_NET_CLS_ACT
2036
	tcf_action_destroy(exts->actions, TCA_ACT_UNBIND);
2037 2038
	kfree(exts->actions);
	exts->nr_actions = 0;
L
Linus Torvalds 已提交
2039 2040
#endif
}
2041
EXPORT_SYMBOL(tcf_exts_destroy);
L
Linus Torvalds 已提交
2042

2043
int tcf_exts_validate(struct net *net, struct tcf_proto *tp, struct nlattr **tb,
2044 2045
		      struct nlattr *rate_tlv, struct tcf_exts *exts, bool ovr,
		      struct netlink_ext_ack *extack)
L
Linus Torvalds 已提交
2046 2047 2048 2049
{
#ifdef CONFIG_NET_CLS_ACT
	{
		struct tc_action *act;
2050
		size_t attr_size = 0;
L
Linus Torvalds 已提交
2051

2052
		if (exts->police && tb[exts->police]) {
2053 2054
			act = tcf_action_init_1(net, tp, tb[exts->police],
						rate_tlv, "police", ovr,
2055
						TCA_ACT_BIND, true, extack);
2056 2057
			if (IS_ERR(act))
				return PTR_ERR(act);
L
Linus Torvalds 已提交
2058

2059
			act->type = exts->type = TCA_OLD_COMPAT;
2060 2061
			exts->actions[0] = act;
			exts->nr_actions = 1;
2062
		} else if (exts->action && tb[exts->action]) {
2063
			int err;
2064

2065 2066
			err = tcf_action_init(net, tp, tb[exts->action],
					      rate_tlv, NULL, ovr, TCA_ACT_BIND,
2067
					      exts->actions, &attr_size, true,
2068
					      extack);
2069
			if (err < 0)
2070
				return err;
2071
			exts->nr_actions = err;
L
Linus Torvalds 已提交
2072
		}
2073
		exts->net = net;
L
Linus Torvalds 已提交
2074 2075
	}
#else
2076
	if ((exts->action && tb[exts->action]) ||
2077 2078
	    (exts->police && tb[exts->police])) {
		NL_SET_ERR_MSG(extack, "Classifier actions are not supported per compile options (CONFIG_NET_CLS_ACT)");
L
Linus Torvalds 已提交
2079
		return -EOPNOTSUPP;
2080
	}
L
Linus Torvalds 已提交
2081 2082 2083 2084
#endif

	return 0;
}
2085
EXPORT_SYMBOL(tcf_exts_validate);
L
Linus Torvalds 已提交
2086

2087
void tcf_exts_change(struct tcf_exts *dst, struct tcf_exts *src)
L
Linus Torvalds 已提交
2088 2089
{
#ifdef CONFIG_NET_CLS_ACT
2090 2091
	struct tcf_exts old = *dst;

2092
	*dst = *src;
2093
	tcf_exts_destroy(&old);
L
Linus Torvalds 已提交
2094 2095
#endif
}
2096
EXPORT_SYMBOL(tcf_exts_change);
L
Linus Torvalds 已提交
2097

2098 2099 2100 2101 2102 2103 2104 2105 2106
#ifdef CONFIG_NET_CLS_ACT
static struct tc_action *tcf_exts_first_act(struct tcf_exts *exts)
{
	if (exts->nr_actions == 0)
		return NULL;
	else
		return exts->actions[0];
}
#endif
2107

2108
int tcf_exts_dump(struct sk_buff *skb, struct tcf_exts *exts)
L
Linus Torvalds 已提交
2109 2110
{
#ifdef CONFIG_NET_CLS_ACT
2111 2112
	struct nlattr *nest;

2113
	if (exts->action && tcf_exts_has_actions(exts)) {
L
Linus Torvalds 已提交
2114 2115 2116 2117 2118
		/*
		 * again for backward compatible mode - we want
		 * to work with both old and new modes of entering
		 * tc data even if iproute2  was newer - jhs
		 */
2119
		if (exts->type != TCA_OLD_COMPAT) {
2120
			nest = nla_nest_start(skb, exts->action);
2121 2122
			if (nest == NULL)
				goto nla_put_failure;
2123

2124
			if (tcf_action_dump(skb, exts->actions, 0, 0) < 0)
2125
				goto nla_put_failure;
2126
			nla_nest_end(skb, nest);
2127
		} else if (exts->police) {
2128
			struct tc_action *act = tcf_exts_first_act(exts);
2129
			nest = nla_nest_start(skb, exts->police);
2130
			if (nest == NULL || !act)
2131
				goto nla_put_failure;
2132
			if (tcf_action_dump_old(skb, act, 0, 0) < 0)
2133
				goto nla_put_failure;
2134
			nla_nest_end(skb, nest);
L
Linus Torvalds 已提交
2135 2136 2137
		}
	}
	return 0;
2138 2139 2140

nla_put_failure:
	nla_nest_cancel(skb, nest);
L
Linus Torvalds 已提交
2141
	return -1;
2142 2143 2144
#else
	return 0;
#endif
L
Linus Torvalds 已提交
2145
}
2146
EXPORT_SYMBOL(tcf_exts_dump);
L
Linus Torvalds 已提交
2147

2148

2149
int tcf_exts_dump_stats(struct sk_buff *skb, struct tcf_exts *exts)
L
Linus Torvalds 已提交
2150 2151
{
#ifdef CONFIG_NET_CLS_ACT
2152
	struct tc_action *a = tcf_exts_first_act(exts);
2153
	if (a != NULL && tcf_action_copy_stats(skb, a, 1) < 0)
2154
		return -1;
L
Linus Torvalds 已提交
2155 2156 2157
#endif
	return 0;
}
2158
EXPORT_SYMBOL(tcf_exts_dump_stats);
L
Linus Torvalds 已提交
2159

2160 2161 2162
static int tc_exts_setup_cb_egdev_call(struct tcf_exts *exts,
				       enum tc_setup_type type,
				       void *type_data, bool err_stop)
2163 2164 2165 2166 2167
{
	int ok_count = 0;
#ifdef CONFIG_NET_CLS_ACT
	const struct tc_action *a;
	struct net_device *dev;
2168
	int i, ret;
2169 2170 2171 2172

	if (!tcf_exts_has_actions(exts))
		return 0;

2173 2174
	for (i = 0; i < exts->nr_actions; i++) {
		a = exts->actions[i];
2175 2176 2177
		if (!a->ops->get_dev)
			continue;
		dev = a->ops->get_dev(a);
2178
		if (!dev)
2179 2180
			continue;
		ret = tc_setup_cb_egdev_call(dev, type, type_data, err_stop);
2181
		a->ops->put_dev(dev);
2182 2183 2184 2185 2186 2187 2188
		if (ret < 0)
			return ret;
		ok_count += ret;
	}
#endif
	return ok_count;
}
2189

2190 2191
int tc_setup_cb_call(struct tcf_block *block, struct tcf_exts *exts,
		     enum tc_setup_type type, void *type_data, bool err_stop)
2192
{
2193
	int ok_count;
2194 2195
	int ret;

2196 2197 2198 2199
	ret = tcf_block_cb_call(block, type, type_data, err_stop);
	if (ret < 0)
		return ret;
	ok_count = ret;
2200

2201
	if (!exts || ok_count)
2202
		return ok_count;
2203 2204 2205 2206 2207 2208
	ret = tc_exts_setup_cb_egdev_call(exts, type, type_data, err_stop);
	if (ret < 0)
		return ret;
	ok_count += ret;

	return ok_count;
2209 2210
}
EXPORT_SYMBOL(tc_setup_cb_call);
2211

2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233
static __net_init int tcf_net_init(struct net *net)
{
	struct tcf_net *tn = net_generic(net, tcf_net_id);

	idr_init(&tn->idr);
	return 0;
}

static void __net_exit tcf_net_exit(struct net *net)
{
	struct tcf_net *tn = net_generic(net, tcf_net_id);

	idr_destroy(&tn->idr);
}

static struct pernet_operations tcf_net_ops = {
	.init = tcf_net_init,
	.exit = tcf_net_exit,
	.id   = &tcf_net_id,
	.size = sizeof(struct tcf_net),
};

L
Linus Torvalds 已提交
2234 2235
static int __init tc_filter_init(void)
{
2236 2237
	int err;

2238 2239 2240 2241
	tc_filter_wq = alloc_ordered_workqueue("tc_filter_workqueue", 0);
	if (!tc_filter_wq)
		return -ENOMEM;

2242 2243 2244 2245
	err = register_pernet_subsys(&tcf_net_ops);
	if (err)
		goto err_register_pernet_subsys;

2246 2247 2248
	rtnl_register(PF_UNSPEC, RTM_NEWTFILTER, tc_new_tfilter, NULL, 0);
	rtnl_register(PF_UNSPEC, RTM_DELTFILTER, tc_del_tfilter, NULL, 0);
	rtnl_register(PF_UNSPEC, RTM_GETTFILTER, tc_get_tfilter,
2249
		      tc_dump_tfilter, 0);
2250 2251 2252 2253
	rtnl_register(PF_UNSPEC, RTM_NEWCHAIN, tc_ctl_chain, NULL, 0);
	rtnl_register(PF_UNSPEC, RTM_DELCHAIN, tc_ctl_chain, NULL, 0);
	rtnl_register(PF_UNSPEC, RTM_GETCHAIN, tc_ctl_chain,
		      tc_dump_chain, 0);
L
Linus Torvalds 已提交
2254 2255

	return 0;
2256 2257 2258 2259

err_register_pernet_subsys:
	destroy_workqueue(tc_filter_wq);
	return err;
L
Linus Torvalds 已提交
2260 2261 2262
}

subsys_initcall(tc_filter_init);