2 * net/sched/cls_flower.c Flower classifier
4 * Copyright (c) 2015 Jiri Pirko <jiri@resnulli.us>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
12 #include <linux/kernel.h>
13 #include <linux/init.h>
14 #include <linux/module.h>
15 #include <linux/rhashtable.h>
17 #include <linux/if_ether.h>
18 #include <linux/in6.h>
21 #include <net/sch_generic.h>
22 #include <net/pkt_cls.h>
24 #include <net/flow_dissector.h>
28 struct flow_dissector_key_control control
;
29 struct flow_dissector_key_basic basic
;
30 struct flow_dissector_key_eth_addrs eth
;
31 struct flow_dissector_key_addrs ipaddrs
;
33 struct flow_dissector_key_ipv4_addrs ipv4
;
34 struct flow_dissector_key_ipv6_addrs ipv6
;
36 struct flow_dissector_key_ports tp
;
37 } __aligned(BITS_PER_LONG
/ 8); /* Ensure that we can do comparisons as longs. */
39 struct fl_flow_mask_range
{
40 unsigned short int start
;
41 unsigned short int end
;
45 struct fl_flow_key key
;
46 struct fl_flow_mask_range range
;
52 struct fl_flow_mask mask
;
53 struct flow_dissector dissector
;
56 struct list_head filters
;
57 struct rhashtable_params ht_params
;
61 struct cls_fl_filter
{
62 struct rhash_head ht_node
;
63 struct fl_flow_key mkey
;
65 struct tcf_result res
;
66 struct fl_flow_key key
;
67 struct list_head list
;
73 static unsigned short int fl_mask_range(const struct fl_flow_mask
*mask
)
75 return mask
->range
.end
- mask
->range
.start
;
78 static void fl_mask_update_range(struct fl_flow_mask
*mask
)
80 const u8
*bytes
= (const u8
*) &mask
->key
;
81 size_t size
= sizeof(mask
->key
);
82 size_t i
, first
= 0, last
= size
- 1;
84 for (i
= 0; i
< sizeof(mask
->key
); i
++) {
91 mask
->range
.start
= rounddown(first
, sizeof(long));
92 mask
->range
.end
= roundup(last
+ 1, sizeof(long));
95 static void *fl_key_get_start(struct fl_flow_key
*key
,
96 const struct fl_flow_mask
*mask
)
98 return (u8
*) key
+ mask
->range
.start
;
101 static void fl_set_masked_key(struct fl_flow_key
*mkey
, struct fl_flow_key
*key
,
102 struct fl_flow_mask
*mask
)
104 const long *lkey
= fl_key_get_start(key
, mask
);
105 const long *lmask
= fl_key_get_start(&mask
->key
, mask
);
106 long *lmkey
= fl_key_get_start(mkey
, mask
);
109 for (i
= 0; i
< fl_mask_range(mask
); i
+= sizeof(long))
110 *lmkey
++ = *lkey
++ & *lmask
++;
113 static void fl_clear_masked_range(struct fl_flow_key
*key
,
114 struct fl_flow_mask
*mask
)
116 memset(fl_key_get_start(key
, mask
), 0, fl_mask_range(mask
));
119 static int fl_classify(struct sk_buff
*skb
, const struct tcf_proto
*tp
,
120 struct tcf_result
*res
)
122 struct cls_fl_head
*head
= rcu_dereference_bh(tp
->root
);
123 struct cls_fl_filter
*f
;
124 struct fl_flow_key skb_key
;
125 struct fl_flow_key skb_mkey
;
127 if (!atomic_read(&head
->ht
.nelems
))
130 fl_clear_masked_range(&skb_key
, &head
->mask
);
131 skb_key
.indev_ifindex
= skb
->skb_iif
;
132 /* skb_flow_dissect() does not set n_proto in case an unknown protocol,
133 * so do it rather here.
135 skb_key
.basic
.n_proto
= skb
->protocol
;
136 skb_flow_dissect(skb
, &head
->dissector
, &skb_key
, 0);
138 fl_set_masked_key(&skb_mkey
, &skb_key
, &head
->mask
);
140 f
= rhashtable_lookup_fast(&head
->ht
,
141 fl_key_get_start(&skb_mkey
, &head
->mask
),
143 if (f
&& !(f
->flags
& TCA_CLS_FLAGS_SKIP_SW
)) {
145 return tcf_exts_exec(skb
, &f
->exts
, res
);
150 static int fl_init(struct tcf_proto
*tp
)
152 struct cls_fl_head
*head
;
154 head
= kzalloc(sizeof(*head
), GFP_KERNEL
);
158 INIT_LIST_HEAD_RCU(&head
->filters
);
159 rcu_assign_pointer(tp
->root
, head
);
164 static void fl_destroy_filter(struct rcu_head
*head
)
166 struct cls_fl_filter
*f
= container_of(head
, struct cls_fl_filter
, rcu
);
168 tcf_exts_destroy(&f
->exts
);
172 static void fl_hw_destroy_filter(struct tcf_proto
*tp
, unsigned long cookie
)
174 struct net_device
*dev
= tp
->q
->dev_queue
->dev
;
175 struct tc_cls_flower_offload offload
= {0};
176 struct tc_to_netdev tc
;
178 if (!tc_should_offload(dev
, 0))
181 offload
.command
= TC_CLSFLOWER_DESTROY
;
182 offload
.cookie
= cookie
;
184 tc
.type
= TC_SETUP_CLSFLOWER
;
185 tc
.cls_flower
= &offload
;
187 dev
->netdev_ops
->ndo_setup_tc(dev
, tp
->q
->handle
, tp
->protocol
, &tc
);
190 static void fl_hw_replace_filter(struct tcf_proto
*tp
,
191 struct flow_dissector
*dissector
,
192 struct fl_flow_key
*mask
,
193 struct fl_flow_key
*key
,
194 struct tcf_exts
*actions
,
195 unsigned long cookie
, u32 flags
)
197 struct net_device
*dev
= tp
->q
->dev_queue
->dev
;
198 struct tc_cls_flower_offload offload
= {0};
199 struct tc_to_netdev tc
;
201 if (!tc_should_offload(dev
, flags
))
204 offload
.command
= TC_CLSFLOWER_REPLACE
;
205 offload
.cookie
= cookie
;
206 offload
.dissector
= dissector
;
209 offload
.exts
= actions
;
211 tc
.type
= TC_SETUP_CLSFLOWER
;
212 tc
.cls_flower
= &offload
;
214 dev
->netdev_ops
->ndo_setup_tc(dev
, tp
->q
->handle
, tp
->protocol
, &tc
);
217 static void fl_hw_update_stats(struct tcf_proto
*tp
, struct cls_fl_filter
*f
)
219 struct net_device
*dev
= tp
->q
->dev_queue
->dev
;
220 struct tc_cls_flower_offload offload
= {0};
221 struct tc_to_netdev tc
;
223 if (!tc_should_offload(dev
, 0))
226 offload
.command
= TC_CLSFLOWER_STATS
;
227 offload
.cookie
= (unsigned long)f
;
228 offload
.exts
= &f
->exts
;
230 tc
.type
= TC_SETUP_CLSFLOWER
;
231 tc
.cls_flower
= &offload
;
233 dev
->netdev_ops
->ndo_setup_tc(dev
, tp
->q
->handle
, tp
->protocol
, &tc
);
236 static bool fl_destroy(struct tcf_proto
*tp
, bool force
)
238 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
239 struct cls_fl_filter
*f
, *next
;
241 if (!force
&& !list_empty(&head
->filters
))
244 list_for_each_entry_safe(f
, next
, &head
->filters
, list
) {
245 fl_hw_destroy_filter(tp
, (unsigned long)f
);
246 list_del_rcu(&f
->list
);
247 call_rcu(&f
->rcu
, fl_destroy_filter
);
249 RCU_INIT_POINTER(tp
->root
, NULL
);
250 if (head
->mask_assigned
)
251 rhashtable_destroy(&head
->ht
);
252 kfree_rcu(head
, rcu
);
256 static unsigned long fl_get(struct tcf_proto
*tp
, u32 handle
)
258 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
259 struct cls_fl_filter
*f
;
261 list_for_each_entry(f
, &head
->filters
, list
)
262 if (f
->handle
== handle
)
263 return (unsigned long) f
;
267 static const struct nla_policy fl_policy
[TCA_FLOWER_MAX
+ 1] = {
268 [TCA_FLOWER_UNSPEC
] = { .type
= NLA_UNSPEC
},
269 [TCA_FLOWER_CLASSID
] = { .type
= NLA_U32
},
270 [TCA_FLOWER_INDEV
] = { .type
= NLA_STRING
,
272 [TCA_FLOWER_KEY_ETH_DST
] = { .len
= ETH_ALEN
},
273 [TCA_FLOWER_KEY_ETH_DST_MASK
] = { .len
= ETH_ALEN
},
274 [TCA_FLOWER_KEY_ETH_SRC
] = { .len
= ETH_ALEN
},
275 [TCA_FLOWER_KEY_ETH_SRC_MASK
] = { .len
= ETH_ALEN
},
276 [TCA_FLOWER_KEY_ETH_TYPE
] = { .type
= NLA_U16
},
277 [TCA_FLOWER_KEY_IP_PROTO
] = { .type
= NLA_U8
},
278 [TCA_FLOWER_KEY_IPV4_SRC
] = { .type
= NLA_U32
},
279 [TCA_FLOWER_KEY_IPV4_SRC_MASK
] = { .type
= NLA_U32
},
280 [TCA_FLOWER_KEY_IPV4_DST
] = { .type
= NLA_U32
},
281 [TCA_FLOWER_KEY_IPV4_DST_MASK
] = { .type
= NLA_U32
},
282 [TCA_FLOWER_KEY_IPV6_SRC
] = { .len
= sizeof(struct in6_addr
) },
283 [TCA_FLOWER_KEY_IPV6_SRC_MASK
] = { .len
= sizeof(struct in6_addr
) },
284 [TCA_FLOWER_KEY_IPV6_DST
] = { .len
= sizeof(struct in6_addr
) },
285 [TCA_FLOWER_KEY_IPV6_DST_MASK
] = { .len
= sizeof(struct in6_addr
) },
286 [TCA_FLOWER_KEY_TCP_SRC
] = { .type
= NLA_U16
},
287 [TCA_FLOWER_KEY_TCP_DST
] = { .type
= NLA_U16
},
288 [TCA_FLOWER_KEY_UDP_SRC
] = { .type
= NLA_U16
},
289 [TCA_FLOWER_KEY_UDP_DST
] = { .type
= NLA_U16
},
292 static void fl_set_key_val(struct nlattr
**tb
,
293 void *val
, int val_type
,
294 void *mask
, int mask_type
, int len
)
298 memcpy(val
, nla_data(tb
[val_type
]), len
);
299 if (mask_type
== TCA_FLOWER_UNSPEC
|| !tb
[mask_type
])
300 memset(mask
, 0xff, len
);
302 memcpy(mask
, nla_data(tb
[mask_type
]), len
);
305 static int fl_set_key(struct net
*net
, struct nlattr
**tb
,
306 struct fl_flow_key
*key
, struct fl_flow_key
*mask
)
308 #ifdef CONFIG_NET_CLS_IND
309 if (tb
[TCA_FLOWER_INDEV
]) {
310 int err
= tcf_change_indev(net
, tb
[TCA_FLOWER_INDEV
]);
313 key
->indev_ifindex
= err
;
314 mask
->indev_ifindex
= 0xffffffff;
318 fl_set_key_val(tb
, key
->eth
.dst
, TCA_FLOWER_KEY_ETH_DST
,
319 mask
->eth
.dst
, TCA_FLOWER_KEY_ETH_DST_MASK
,
320 sizeof(key
->eth
.dst
));
321 fl_set_key_val(tb
, key
->eth
.src
, TCA_FLOWER_KEY_ETH_SRC
,
322 mask
->eth
.src
, TCA_FLOWER_KEY_ETH_SRC_MASK
,
323 sizeof(key
->eth
.src
));
325 fl_set_key_val(tb
, &key
->basic
.n_proto
, TCA_FLOWER_KEY_ETH_TYPE
,
326 &mask
->basic
.n_proto
, TCA_FLOWER_UNSPEC
,
327 sizeof(key
->basic
.n_proto
));
329 if (key
->basic
.n_proto
== htons(ETH_P_IP
) ||
330 key
->basic
.n_proto
== htons(ETH_P_IPV6
)) {
331 fl_set_key_val(tb
, &key
->basic
.ip_proto
, TCA_FLOWER_KEY_IP_PROTO
,
332 &mask
->basic
.ip_proto
, TCA_FLOWER_UNSPEC
,
333 sizeof(key
->basic
.ip_proto
));
336 if (tb
[TCA_FLOWER_KEY_IPV4_SRC
] || tb
[TCA_FLOWER_KEY_IPV4_DST
]) {
337 key
->control
.addr_type
= FLOW_DISSECTOR_KEY_IPV4_ADDRS
;
338 fl_set_key_val(tb
, &key
->ipv4
.src
, TCA_FLOWER_KEY_IPV4_SRC
,
339 &mask
->ipv4
.src
, TCA_FLOWER_KEY_IPV4_SRC_MASK
,
340 sizeof(key
->ipv4
.src
));
341 fl_set_key_val(tb
, &key
->ipv4
.dst
, TCA_FLOWER_KEY_IPV4_DST
,
342 &mask
->ipv4
.dst
, TCA_FLOWER_KEY_IPV4_DST_MASK
,
343 sizeof(key
->ipv4
.dst
));
344 } else if (tb
[TCA_FLOWER_KEY_IPV6_SRC
] || tb
[TCA_FLOWER_KEY_IPV6_DST
]) {
345 key
->control
.addr_type
= FLOW_DISSECTOR_KEY_IPV6_ADDRS
;
346 fl_set_key_val(tb
, &key
->ipv6
.src
, TCA_FLOWER_KEY_IPV6_SRC
,
347 &mask
->ipv6
.src
, TCA_FLOWER_KEY_IPV6_SRC_MASK
,
348 sizeof(key
->ipv6
.src
));
349 fl_set_key_val(tb
, &key
->ipv6
.dst
, TCA_FLOWER_KEY_IPV6_DST
,
350 &mask
->ipv6
.dst
, TCA_FLOWER_KEY_IPV6_DST_MASK
,
351 sizeof(key
->ipv6
.dst
));
354 if (key
->basic
.ip_proto
== IPPROTO_TCP
) {
355 fl_set_key_val(tb
, &key
->tp
.src
, TCA_FLOWER_KEY_TCP_SRC
,
356 &mask
->tp
.src
, TCA_FLOWER_UNSPEC
,
357 sizeof(key
->tp
.src
));
358 fl_set_key_val(tb
, &key
->tp
.dst
, TCA_FLOWER_KEY_TCP_DST
,
359 &mask
->tp
.dst
, TCA_FLOWER_UNSPEC
,
360 sizeof(key
->tp
.dst
));
361 } else if (key
->basic
.ip_proto
== IPPROTO_UDP
) {
362 fl_set_key_val(tb
, &key
->tp
.src
, TCA_FLOWER_KEY_UDP_SRC
,
363 &mask
->tp
.src
, TCA_FLOWER_UNSPEC
,
364 sizeof(key
->tp
.src
));
365 fl_set_key_val(tb
, &key
->tp
.dst
, TCA_FLOWER_KEY_UDP_DST
,
366 &mask
->tp
.dst
, TCA_FLOWER_UNSPEC
,
367 sizeof(key
->tp
.dst
));
373 static bool fl_mask_eq(struct fl_flow_mask
*mask1
,
374 struct fl_flow_mask
*mask2
)
376 const long *lmask1
= fl_key_get_start(&mask1
->key
, mask1
);
377 const long *lmask2
= fl_key_get_start(&mask2
->key
, mask2
);
379 return !memcmp(&mask1
->range
, &mask2
->range
, sizeof(mask1
->range
)) &&
380 !memcmp(lmask1
, lmask2
, fl_mask_range(mask1
));
383 static const struct rhashtable_params fl_ht_params
= {
384 .key_offset
= offsetof(struct cls_fl_filter
, mkey
), /* base offset */
385 .head_offset
= offsetof(struct cls_fl_filter
, ht_node
),
386 .automatic_shrinking
= true,
389 static int fl_init_hashtable(struct cls_fl_head
*head
,
390 struct fl_flow_mask
*mask
)
392 head
->ht_params
= fl_ht_params
;
393 head
->ht_params
.key_len
= fl_mask_range(mask
);
394 head
->ht_params
.key_offset
+= mask
->range
.start
;
396 return rhashtable_init(&head
->ht
, &head
->ht_params
);
399 #define FL_KEY_MEMBER_OFFSET(member) offsetof(struct fl_flow_key, member)
400 #define FL_KEY_MEMBER_SIZE(member) (sizeof(((struct fl_flow_key *) 0)->member))
401 #define FL_KEY_MEMBER_END_OFFSET(member) \
402 (FL_KEY_MEMBER_OFFSET(member) + FL_KEY_MEMBER_SIZE(member))
404 #define FL_KEY_IN_RANGE(mask, member) \
405 (FL_KEY_MEMBER_OFFSET(member) <= (mask)->range.end && \
406 FL_KEY_MEMBER_END_OFFSET(member) >= (mask)->range.start)
408 #define FL_KEY_SET(keys, cnt, id, member) \
410 keys[cnt].key_id = id; \
411 keys[cnt].offset = FL_KEY_MEMBER_OFFSET(member); \
415 #define FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, id, member) \
417 if (FL_KEY_IN_RANGE(mask, member)) \
418 FL_KEY_SET(keys, cnt, id, member); \
421 static void fl_init_dissector(struct cls_fl_head
*head
,
422 struct fl_flow_mask
*mask
)
424 struct flow_dissector_key keys
[FLOW_DISSECTOR_KEY_MAX
];
427 FL_KEY_SET(keys
, cnt
, FLOW_DISSECTOR_KEY_CONTROL
, control
);
428 FL_KEY_SET(keys
, cnt
, FLOW_DISSECTOR_KEY_BASIC
, basic
);
429 FL_KEY_SET_IF_IN_RANGE(mask
, keys
, cnt
,
430 FLOW_DISSECTOR_KEY_ETH_ADDRS
, eth
);
431 FL_KEY_SET_IF_IN_RANGE(mask
, keys
, cnt
,
432 FLOW_DISSECTOR_KEY_IPV4_ADDRS
, ipv4
);
433 FL_KEY_SET_IF_IN_RANGE(mask
, keys
, cnt
,
434 FLOW_DISSECTOR_KEY_IPV6_ADDRS
, ipv6
);
435 FL_KEY_SET_IF_IN_RANGE(mask
, keys
, cnt
,
436 FLOW_DISSECTOR_KEY_PORTS
, tp
);
438 skb_flow_dissector_init(&head
->dissector
, keys
, cnt
);
441 static int fl_check_assign_mask(struct cls_fl_head
*head
,
442 struct fl_flow_mask
*mask
)
446 if (head
->mask_assigned
) {
447 if (!fl_mask_eq(&head
->mask
, mask
))
453 /* Mask is not assigned yet. So assign it and init hashtable
456 err
= fl_init_hashtable(head
, mask
);
459 memcpy(&head
->mask
, mask
, sizeof(head
->mask
));
460 head
->mask_assigned
= true;
462 fl_init_dissector(head
, mask
);
467 static int fl_set_parms(struct net
*net
, struct tcf_proto
*tp
,
468 struct cls_fl_filter
*f
, struct fl_flow_mask
*mask
,
469 unsigned long base
, struct nlattr
**tb
,
470 struct nlattr
*est
, bool ovr
)
475 tcf_exts_init(&e
, TCA_FLOWER_ACT
, 0);
476 err
= tcf_exts_validate(net
, tp
, tb
, est
, &e
, ovr
);
480 if (tb
[TCA_FLOWER_CLASSID
]) {
481 f
->res
.classid
= nla_get_u32(tb
[TCA_FLOWER_CLASSID
]);
482 tcf_bind_filter(tp
, &f
->res
, base
);
485 err
= fl_set_key(net
, tb
, &f
->key
, &mask
->key
);
489 fl_mask_update_range(mask
);
490 fl_set_masked_key(&f
->mkey
, &f
->key
, mask
);
492 tcf_exts_change(tp
, &f
->exts
, &e
);
496 tcf_exts_destroy(&e
);
500 static u32
fl_grab_new_handle(struct tcf_proto
*tp
,
501 struct cls_fl_head
*head
)
503 unsigned int i
= 0x80000000;
507 if (++head
->hgen
== 0x7FFFFFFF)
509 } while (--i
> 0 && fl_get(tp
, head
->hgen
));
511 if (unlikely(i
== 0)) {
512 pr_err("Insufficient number of handles\n");
521 static int fl_change(struct net
*net
, struct sk_buff
*in_skb
,
522 struct tcf_proto
*tp
, unsigned long base
,
523 u32 handle
, struct nlattr
**tca
,
524 unsigned long *arg
, bool ovr
)
526 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
527 struct cls_fl_filter
*fold
= (struct cls_fl_filter
*) *arg
;
528 struct cls_fl_filter
*fnew
;
529 struct nlattr
*tb
[TCA_FLOWER_MAX
+ 1];
530 struct fl_flow_mask mask
= {};
533 if (!tca
[TCA_OPTIONS
])
536 err
= nla_parse_nested(tb
, TCA_FLOWER_MAX
, tca
[TCA_OPTIONS
], fl_policy
);
540 if (fold
&& handle
&& fold
->handle
!= handle
)
543 fnew
= kzalloc(sizeof(*fnew
), GFP_KERNEL
);
547 tcf_exts_init(&fnew
->exts
, TCA_FLOWER_ACT
, 0);
550 handle
= fl_grab_new_handle(tp
, head
);
556 fnew
->handle
= handle
;
558 if (tb
[TCA_FLOWER_FLAGS
]) {
559 fnew
->flags
= nla_get_u32(tb
[TCA_FLOWER_FLAGS
]);
561 if (!tc_flags_valid(fnew
->flags
)) {
567 err
= fl_set_parms(net
, tp
, fnew
, &mask
, base
, tb
, tca
[TCA_RATE
], ovr
);
571 err
= fl_check_assign_mask(head
, &mask
);
575 if (!(fnew
->flags
& TCA_CLS_FLAGS_SKIP_SW
)) {
576 err
= rhashtable_insert_fast(&head
->ht
, &fnew
->ht_node
,
582 fl_hw_replace_filter(tp
,
591 rhashtable_remove_fast(&head
->ht
, &fold
->ht_node
,
593 fl_hw_destroy_filter(tp
, (unsigned long)fold
);
596 *arg
= (unsigned long) fnew
;
599 list_replace_rcu(&fold
->list
, &fnew
->list
);
600 tcf_unbind_filter(tp
, &fold
->res
);
601 call_rcu(&fold
->rcu
, fl_destroy_filter
);
603 list_add_tail_rcu(&fnew
->list
, &head
->filters
);
613 static int fl_delete(struct tcf_proto
*tp
, unsigned long arg
)
615 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
616 struct cls_fl_filter
*f
= (struct cls_fl_filter
*) arg
;
618 rhashtable_remove_fast(&head
->ht
, &f
->ht_node
,
620 list_del_rcu(&f
->list
);
621 fl_hw_destroy_filter(tp
, (unsigned long)f
);
622 tcf_unbind_filter(tp
, &f
->res
);
623 call_rcu(&f
->rcu
, fl_destroy_filter
);
627 static void fl_walk(struct tcf_proto
*tp
, struct tcf_walker
*arg
)
629 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
630 struct cls_fl_filter
*f
;
632 list_for_each_entry_rcu(f
, &head
->filters
, list
) {
633 if (arg
->count
< arg
->skip
)
635 if (arg
->fn(tp
, (unsigned long) f
, arg
) < 0) {
644 static int fl_dump_key_val(struct sk_buff
*skb
,
645 void *val
, int val_type
,
646 void *mask
, int mask_type
, int len
)
650 if (!memchr_inv(mask
, 0, len
))
652 err
= nla_put(skb
, val_type
, len
, val
);
655 if (mask_type
!= TCA_FLOWER_UNSPEC
) {
656 err
= nla_put(skb
, mask_type
, len
, mask
);
663 static int fl_dump(struct net
*net
, struct tcf_proto
*tp
, unsigned long fh
,
664 struct sk_buff
*skb
, struct tcmsg
*t
)
666 struct cls_fl_head
*head
= rtnl_dereference(tp
->root
);
667 struct cls_fl_filter
*f
= (struct cls_fl_filter
*) fh
;
669 struct fl_flow_key
*key
, *mask
;
674 t
->tcm_handle
= f
->handle
;
676 nest
= nla_nest_start(skb
, TCA_OPTIONS
);
678 goto nla_put_failure
;
680 if (f
->res
.classid
&&
681 nla_put_u32(skb
, TCA_FLOWER_CLASSID
, f
->res
.classid
))
682 goto nla_put_failure
;
685 mask
= &head
->mask
.key
;
687 if (mask
->indev_ifindex
) {
688 struct net_device
*dev
;
690 dev
= __dev_get_by_index(net
, key
->indev_ifindex
);
691 if (dev
&& nla_put_string(skb
, TCA_FLOWER_INDEV
, dev
->name
))
692 goto nla_put_failure
;
695 fl_hw_update_stats(tp
, f
);
697 if (fl_dump_key_val(skb
, key
->eth
.dst
, TCA_FLOWER_KEY_ETH_DST
,
698 mask
->eth
.dst
, TCA_FLOWER_KEY_ETH_DST_MASK
,
699 sizeof(key
->eth
.dst
)) ||
700 fl_dump_key_val(skb
, key
->eth
.src
, TCA_FLOWER_KEY_ETH_SRC
,
701 mask
->eth
.src
, TCA_FLOWER_KEY_ETH_SRC_MASK
,
702 sizeof(key
->eth
.src
)) ||
703 fl_dump_key_val(skb
, &key
->basic
.n_proto
, TCA_FLOWER_KEY_ETH_TYPE
,
704 &mask
->basic
.n_proto
, TCA_FLOWER_UNSPEC
,
705 sizeof(key
->basic
.n_proto
)))
706 goto nla_put_failure
;
707 if ((key
->basic
.n_proto
== htons(ETH_P_IP
) ||
708 key
->basic
.n_proto
== htons(ETH_P_IPV6
)) &&
709 fl_dump_key_val(skb
, &key
->basic
.ip_proto
, TCA_FLOWER_KEY_IP_PROTO
,
710 &mask
->basic
.ip_proto
, TCA_FLOWER_UNSPEC
,
711 sizeof(key
->basic
.ip_proto
)))
712 goto nla_put_failure
;
714 if (key
->control
.addr_type
== FLOW_DISSECTOR_KEY_IPV4_ADDRS
&&
715 (fl_dump_key_val(skb
, &key
->ipv4
.src
, TCA_FLOWER_KEY_IPV4_SRC
,
716 &mask
->ipv4
.src
, TCA_FLOWER_KEY_IPV4_SRC_MASK
,
717 sizeof(key
->ipv4
.src
)) ||
718 fl_dump_key_val(skb
, &key
->ipv4
.dst
, TCA_FLOWER_KEY_IPV4_DST
,
719 &mask
->ipv4
.dst
, TCA_FLOWER_KEY_IPV4_DST_MASK
,
720 sizeof(key
->ipv4
.dst
))))
721 goto nla_put_failure
;
722 else if (key
->control
.addr_type
== FLOW_DISSECTOR_KEY_IPV6_ADDRS
&&
723 (fl_dump_key_val(skb
, &key
->ipv6
.src
, TCA_FLOWER_KEY_IPV6_SRC
,
724 &mask
->ipv6
.src
, TCA_FLOWER_KEY_IPV6_SRC_MASK
,
725 sizeof(key
->ipv6
.src
)) ||
726 fl_dump_key_val(skb
, &key
->ipv6
.dst
, TCA_FLOWER_KEY_IPV6_DST
,
727 &mask
->ipv6
.dst
, TCA_FLOWER_KEY_IPV6_DST_MASK
,
728 sizeof(key
->ipv6
.dst
))))
729 goto nla_put_failure
;
731 if (key
->basic
.ip_proto
== IPPROTO_TCP
&&
732 (fl_dump_key_val(skb
, &key
->tp
.src
, TCA_FLOWER_KEY_TCP_SRC
,
733 &mask
->tp
.src
, TCA_FLOWER_UNSPEC
,
734 sizeof(key
->tp
.src
)) ||
735 fl_dump_key_val(skb
, &key
->tp
.dst
, TCA_FLOWER_KEY_TCP_DST
,
736 &mask
->tp
.dst
, TCA_FLOWER_UNSPEC
,
737 sizeof(key
->tp
.dst
))))
738 goto nla_put_failure
;
739 else if (key
->basic
.ip_proto
== IPPROTO_UDP
&&
740 (fl_dump_key_val(skb
, &key
->tp
.src
, TCA_FLOWER_KEY_UDP_SRC
,
741 &mask
->tp
.src
, TCA_FLOWER_UNSPEC
,
742 sizeof(key
->tp
.src
)) ||
743 fl_dump_key_val(skb
, &key
->tp
.dst
, TCA_FLOWER_KEY_UDP_DST
,
744 &mask
->tp
.dst
, TCA_FLOWER_UNSPEC
,
745 sizeof(key
->tp
.dst
))))
746 goto nla_put_failure
;
748 nla_put_u32(skb
, TCA_FLOWER_FLAGS
, f
->flags
);
750 if (tcf_exts_dump(skb
, &f
->exts
))
751 goto nla_put_failure
;
753 nla_nest_end(skb
, nest
);
755 if (tcf_exts_dump_stats(skb
, &f
->exts
) < 0)
756 goto nla_put_failure
;
761 nla_nest_cancel(skb
, nest
);
765 static struct tcf_proto_ops cls_fl_ops __read_mostly
= {
767 .classify
= fl_classify
,
769 .destroy
= fl_destroy
,
775 .owner
= THIS_MODULE
,
778 static int __init
cls_fl_init(void)
780 return register_tcf_proto_ops(&cls_fl_ops
);
783 static void __exit
cls_fl_exit(void)
785 unregister_tcf_proto_ops(&cls_fl_ops
);
788 module_init(cls_fl_init
);
789 module_exit(cls_fl_exit
);
791 MODULE_AUTHOR("Jiri Pirko <jiri@resnulli.us>");
792 MODULE_DESCRIPTION("Flower classifier");
793 MODULE_LICENSE("GPL v2");