1131 lines
		
	
	
		
			32 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			1131 lines
		
	
	
		
			32 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: BSD-3-Clause OR GPL-2.0
 | |
| /* Copyright (c) 2017-2018 Mellanox Technologies. All rights reserved */
 | |
| 
 | |
| #include <linux/kernel.h>
 | |
| #include <linux/slab.h>
 | |
| #include <linux/errno.h>
 | |
| #include <linux/list.h>
 | |
| #include <linux/string.h>
 | |
| #include <linux/rhashtable.h>
 | |
| #include <linux/netdevice.h>
 | |
| #include <linux/mutex.h>
 | |
| #include <linux/refcount.h>
 | |
| #include <net/net_namespace.h>
 | |
| #include <net/tc_act/tc_vlan.h>
 | |
| 
 | |
| #include "reg.h"
 | |
| #include "core.h"
 | |
| #include "resources.h"
 | |
| #include "spectrum.h"
 | |
| #include "core_acl_flex_keys.h"
 | |
| #include "core_acl_flex_actions.h"
 | |
| #include "spectrum_acl_tcam.h"
 | |
| 
 | |
| struct mlxsw_sp_acl {
 | |
| 	struct mlxsw_sp *mlxsw_sp;
 | |
| 	struct mlxsw_afk *afk;
 | |
| 	struct mlxsw_sp_fid *dummy_fid;
 | |
| 	struct rhashtable ruleset_ht;
 | |
| 	struct list_head rules;
 | |
| 	struct mutex rules_lock; /* Protects rules list */
 | |
| 	struct {
 | |
| 		struct delayed_work dw;
 | |
| 		unsigned long interval;	/* ms */
 | |
| #define MLXSW_SP_ACL_RULE_ACTIVITY_UPDATE_PERIOD_MS 1000
 | |
| 	} rule_activity_update;
 | |
| 	struct mlxsw_sp_acl_tcam tcam;
 | |
| };
 | |
| 
 | |
| struct mlxsw_afk *mlxsw_sp_acl_afk(struct mlxsw_sp_acl *acl)
 | |
| {
 | |
| 	return acl->afk;
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_tcam *mlxsw_sp_acl_to_tcam(struct mlxsw_sp_acl *acl)
 | |
| {
 | |
| 	return &acl->tcam;
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_ruleset_ht_key {
 | |
| 	struct mlxsw_sp_flow_block *block;
 | |
| 	u32 chain_index;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops;
 | |
| };
 | |
| 
 | |
| struct mlxsw_sp_acl_ruleset {
 | |
| 	struct rhash_head ht_node; /* Member of acl HT */
 | |
| 	struct mlxsw_sp_acl_ruleset_ht_key ht_key;
 | |
| 	struct rhashtable rule_ht;
 | |
| 	refcount_t ref_count;
 | |
| 	unsigned int min_prio;
 | |
| 	unsigned int max_prio;
 | |
| 	unsigned long priv[];
 | |
| 	/* priv has to be always the last item */
 | |
| };
 | |
| 
 | |
| struct mlxsw_sp_acl_rule {
 | |
| 	struct rhash_head ht_node; /* Member of rule HT */
 | |
| 	struct list_head list;
 | |
| 	unsigned long cookie; /* HT key */
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset;
 | |
| 	struct mlxsw_sp_acl_rule_info *rulei;
 | |
| 	u64 last_used;
 | |
| 	u64 last_packets;
 | |
| 	u64 last_bytes;
 | |
| 	u64 last_drops;
 | |
| 	unsigned long priv[];
 | |
| 	/* priv has to be always the last item */
 | |
| };
 | |
| 
 | |
| static const struct rhashtable_params mlxsw_sp_acl_ruleset_ht_params = {
 | |
| 	.key_len = sizeof(struct mlxsw_sp_acl_ruleset_ht_key),
 | |
| 	.key_offset = offsetof(struct mlxsw_sp_acl_ruleset, ht_key),
 | |
| 	.head_offset = offsetof(struct mlxsw_sp_acl_ruleset, ht_node),
 | |
| 	.automatic_shrinking = true,
 | |
| };
 | |
| 
 | |
| static const struct rhashtable_params mlxsw_sp_acl_rule_ht_params = {
 | |
| 	.key_len = sizeof(unsigned long),
 | |
| 	.key_offset = offsetof(struct mlxsw_sp_acl_rule, cookie),
 | |
| 	.head_offset = offsetof(struct mlxsw_sp_acl_rule, ht_node),
 | |
| 	.automatic_shrinking = true,
 | |
| };
 | |
| 
 | |
| struct mlxsw_sp_fid *mlxsw_sp_acl_dummy_fid(struct mlxsw_sp *mlxsw_sp)
 | |
| {
 | |
| 	return mlxsw_sp->acl->dummy_fid;
 | |
| }
 | |
| 
 | |
| static bool
 | |
| mlxsw_sp_acl_ruleset_is_singular(const struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	/* We hold a reference on ruleset ourselves */
 | |
| 	return refcount_read(&ruleset->ref_count) == 2;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_ruleset_bind(struct mlxsw_sp *mlxsw_sp,
 | |
| 			      struct mlxsw_sp_flow_block *block,
 | |
| 			      struct mlxsw_sp_flow_block_binding *binding)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = block->ruleset_zero;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 
 | |
| 	return ops->ruleset_bind(mlxsw_sp, ruleset->priv,
 | |
| 				 binding->mlxsw_sp_port, binding->ingress);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_ruleset_unbind(struct mlxsw_sp *mlxsw_sp,
 | |
| 				 struct mlxsw_sp_flow_block *block,
 | |
| 				 struct mlxsw_sp_flow_block_binding *binding)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = block->ruleset_zero;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 
 | |
| 	ops->ruleset_unbind(mlxsw_sp, ruleset->priv,
 | |
| 			    binding->mlxsw_sp_port, binding->ingress);
 | |
| }
 | |
| 
 | |
| static int
 | |
| mlxsw_sp_acl_ruleset_block_bind(struct mlxsw_sp *mlxsw_sp,
 | |
| 				struct mlxsw_sp_acl_ruleset *ruleset,
 | |
| 				struct mlxsw_sp_flow_block *block)
 | |
| {
 | |
| 	struct mlxsw_sp_flow_block_binding *binding;
 | |
| 	int err;
 | |
| 
 | |
| 	block->ruleset_zero = ruleset;
 | |
| 	list_for_each_entry(binding, &block->binding_list, list) {
 | |
| 		err = mlxsw_sp_acl_ruleset_bind(mlxsw_sp, block, binding);
 | |
| 		if (err)
 | |
| 			goto rollback;
 | |
| 	}
 | |
| 	return 0;
 | |
| 
 | |
| rollback:
 | |
| 	list_for_each_entry_continue_reverse(binding, &block->binding_list,
 | |
| 					     list)
 | |
| 		mlxsw_sp_acl_ruleset_unbind(mlxsw_sp, block, binding);
 | |
| 	block->ruleset_zero = NULL;
 | |
| 
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| static void
 | |
| mlxsw_sp_acl_ruleset_block_unbind(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_ruleset *ruleset,
 | |
| 				  struct mlxsw_sp_flow_block *block)
 | |
| {
 | |
| 	struct mlxsw_sp_flow_block_binding *binding;
 | |
| 
 | |
| 	list_for_each_entry(binding, &block->binding_list, list)
 | |
| 		mlxsw_sp_acl_ruleset_unbind(mlxsw_sp, block, binding);
 | |
| 	block->ruleset_zero = NULL;
 | |
| }
 | |
| 
 | |
| static struct mlxsw_sp_acl_ruleset *
 | |
| mlxsw_sp_acl_ruleset_create(struct mlxsw_sp *mlxsw_sp,
 | |
| 			    struct mlxsw_sp_flow_block *block, u32 chain_index,
 | |
| 			    const struct mlxsw_sp_acl_profile_ops *ops,
 | |
| 			    struct mlxsw_afk_element_usage *tmplt_elusage)
 | |
| {
 | |
| 	struct mlxsw_sp_acl *acl = mlxsw_sp->acl;
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset;
 | |
| 	size_t alloc_size;
 | |
| 	int err;
 | |
| 
 | |
| 	alloc_size = sizeof(*ruleset) + ops->ruleset_priv_size;
 | |
| 	ruleset = kzalloc(alloc_size, GFP_KERNEL);
 | |
| 	if (!ruleset)
 | |
| 		return ERR_PTR(-ENOMEM);
 | |
| 	refcount_set(&ruleset->ref_count, 1);
 | |
| 	ruleset->ht_key.block = block;
 | |
| 	ruleset->ht_key.chain_index = chain_index;
 | |
| 	ruleset->ht_key.ops = ops;
 | |
| 
 | |
| 	err = rhashtable_init(&ruleset->rule_ht, &mlxsw_sp_acl_rule_ht_params);
 | |
| 	if (err)
 | |
| 		goto err_rhashtable_init;
 | |
| 
 | |
| 	err = ops->ruleset_add(mlxsw_sp, &acl->tcam, ruleset->priv,
 | |
| 			       tmplt_elusage, &ruleset->min_prio,
 | |
| 			       &ruleset->max_prio);
 | |
| 	if (err)
 | |
| 		goto err_ops_ruleset_add;
 | |
| 
 | |
| 	err = rhashtable_insert_fast(&acl->ruleset_ht, &ruleset->ht_node,
 | |
| 				     mlxsw_sp_acl_ruleset_ht_params);
 | |
| 	if (err)
 | |
| 		goto err_ht_insert;
 | |
| 
 | |
| 	return ruleset;
 | |
| 
 | |
| err_ht_insert:
 | |
| 	ops->ruleset_del(mlxsw_sp, ruleset->priv);
 | |
| err_ops_ruleset_add:
 | |
| 	rhashtable_destroy(&ruleset->rule_ht);
 | |
| err_rhashtable_init:
 | |
| 	kfree(ruleset);
 | |
| 	return ERR_PTR(err);
 | |
| }
 | |
| 
 | |
| static void mlxsw_sp_acl_ruleset_destroy(struct mlxsw_sp *mlxsw_sp,
 | |
| 					 struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	struct mlxsw_sp_acl *acl = mlxsw_sp->acl;
 | |
| 
 | |
| 	rhashtable_remove_fast(&acl->ruleset_ht, &ruleset->ht_node,
 | |
| 			       mlxsw_sp_acl_ruleset_ht_params);
 | |
| 	ops->ruleset_del(mlxsw_sp, ruleset->priv);
 | |
| 	rhashtable_destroy(&ruleset->rule_ht);
 | |
| 	kfree(ruleset);
 | |
| }
 | |
| 
 | |
| static void mlxsw_sp_acl_ruleset_ref_inc(struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	refcount_inc(&ruleset->ref_count);
 | |
| }
 | |
| 
 | |
| static void mlxsw_sp_acl_ruleset_ref_dec(struct mlxsw_sp *mlxsw_sp,
 | |
| 					 struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	if (!refcount_dec_and_test(&ruleset->ref_count))
 | |
| 		return;
 | |
| 	mlxsw_sp_acl_ruleset_destroy(mlxsw_sp, ruleset);
 | |
| }
 | |
| 
 | |
| static struct mlxsw_sp_acl_ruleset *
 | |
| __mlxsw_sp_acl_ruleset_lookup(struct mlxsw_sp_acl *acl,
 | |
| 			      struct mlxsw_sp_flow_block *block, u32 chain_index,
 | |
| 			      const struct mlxsw_sp_acl_profile_ops *ops)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset_ht_key ht_key;
 | |
| 
 | |
| 	memset(&ht_key, 0, sizeof(ht_key));
 | |
| 	ht_key.block = block;
 | |
| 	ht_key.chain_index = chain_index;
 | |
| 	ht_key.ops = ops;
 | |
| 	return rhashtable_lookup_fast(&acl->ruleset_ht, &ht_key,
 | |
| 				      mlxsw_sp_acl_ruleset_ht_params);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_ruleset *
 | |
| mlxsw_sp_acl_ruleset_lookup(struct mlxsw_sp *mlxsw_sp,
 | |
| 			    struct mlxsw_sp_flow_block *block, u32 chain_index,
 | |
| 			    enum mlxsw_sp_acl_profile profile)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops;
 | |
| 	struct mlxsw_sp_acl *acl = mlxsw_sp->acl;
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset;
 | |
| 
 | |
| 	ops = mlxsw_sp_acl_tcam_profile_ops(mlxsw_sp, profile);
 | |
| 	if (!ops)
 | |
| 		return ERR_PTR(-EINVAL);
 | |
| 	ruleset = __mlxsw_sp_acl_ruleset_lookup(acl, block, chain_index, ops);
 | |
| 	if (!ruleset)
 | |
| 		return ERR_PTR(-ENOENT);
 | |
| 	return ruleset;
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_ruleset *
 | |
| mlxsw_sp_acl_ruleset_get(struct mlxsw_sp *mlxsw_sp,
 | |
| 			 struct mlxsw_sp_flow_block *block, u32 chain_index,
 | |
| 			 enum mlxsw_sp_acl_profile profile,
 | |
| 			 struct mlxsw_afk_element_usage *tmplt_elusage)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops;
 | |
| 	struct mlxsw_sp_acl *acl = mlxsw_sp->acl;
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset;
 | |
| 
 | |
| 	ops = mlxsw_sp_acl_tcam_profile_ops(mlxsw_sp, profile);
 | |
| 	if (!ops)
 | |
| 		return ERR_PTR(-EINVAL);
 | |
| 
 | |
| 	ruleset = __mlxsw_sp_acl_ruleset_lookup(acl, block, chain_index, ops);
 | |
| 	if (ruleset) {
 | |
| 		mlxsw_sp_acl_ruleset_ref_inc(ruleset);
 | |
| 		return ruleset;
 | |
| 	}
 | |
| 	return mlxsw_sp_acl_ruleset_create(mlxsw_sp, block, chain_index, ops,
 | |
| 					   tmplt_elusage);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_ruleset_put(struct mlxsw_sp *mlxsw_sp,
 | |
| 			      struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	mlxsw_sp_acl_ruleset_ref_dec(mlxsw_sp, ruleset);
 | |
| }
 | |
| 
 | |
| u16 mlxsw_sp_acl_ruleset_group_id(struct mlxsw_sp_acl_ruleset *ruleset)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 
 | |
| 	return ops->ruleset_group_id(ruleset->priv);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_ruleset_prio_get(struct mlxsw_sp_acl_ruleset *ruleset,
 | |
| 				   unsigned int *p_min_prio,
 | |
| 				   unsigned int *p_max_prio)
 | |
| {
 | |
| 	*p_min_prio = ruleset->min_prio;
 | |
| 	*p_max_prio = ruleset->max_prio;
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_rule_info *
 | |
| mlxsw_sp_acl_rulei_create(struct mlxsw_sp_acl *acl,
 | |
| 			  struct mlxsw_afa_block *afa_block)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_rule_info *rulei;
 | |
| 	int err;
 | |
| 
 | |
| 	rulei = kzalloc(sizeof(*rulei), GFP_KERNEL);
 | |
| 	if (!rulei)
 | |
| 		return ERR_PTR(-ENOMEM);
 | |
| 
 | |
| 	if (afa_block) {
 | |
| 		rulei->act_block = afa_block;
 | |
| 		return rulei;
 | |
| 	}
 | |
| 
 | |
| 	rulei->act_block = mlxsw_afa_block_create(acl->mlxsw_sp->afa);
 | |
| 	if (IS_ERR(rulei->act_block)) {
 | |
| 		err = PTR_ERR(rulei->act_block);
 | |
| 		goto err_afa_block_create;
 | |
| 	}
 | |
| 	rulei->action_created = 1;
 | |
| 	return rulei;
 | |
| 
 | |
| err_afa_block_create:
 | |
| 	kfree(rulei);
 | |
| 	return ERR_PTR(err);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rulei_destroy(struct mlxsw_sp *mlxsw_sp,
 | |
| 				struct mlxsw_sp_acl_rule_info *rulei)
 | |
| {
 | |
| 	if (rulei->action_created)
 | |
| 		mlxsw_afa_block_destroy(rulei->act_block);
 | |
| 	if (rulei->src_port_range_reg_valid)
 | |
| 		mlxsw_sp_port_range_reg_put(mlxsw_sp,
 | |
| 					    rulei->src_port_range_reg_index);
 | |
| 	if (rulei->dst_port_range_reg_valid)
 | |
| 		mlxsw_sp_port_range_reg_put(mlxsw_sp,
 | |
| 					    rulei->dst_port_range_reg_index);
 | |
| 	kfree(rulei);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_commit(struct mlxsw_sp_acl_rule_info *rulei)
 | |
| {
 | |
| 	return mlxsw_afa_block_commit(rulei->act_block);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rulei_priority(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				 unsigned int priority)
 | |
| {
 | |
| 	rulei->priority = priority;
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rulei_keymask_u32(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				    enum mlxsw_afk_element element,
 | |
| 				    u32 key_value, u32 mask_value)
 | |
| {
 | |
| 	mlxsw_afk_values_add_u32(&rulei->values, element,
 | |
| 				 key_value, mask_value);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rulei_keymask_buf(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				    enum mlxsw_afk_element element,
 | |
| 				    const char *key_value,
 | |
| 				    const char *mask_value, unsigned int len)
 | |
| {
 | |
| 	mlxsw_afk_values_add_buf(&rulei->values, element,
 | |
| 				 key_value, mask_value, len);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_continue(struct mlxsw_sp_acl_rule_info *rulei)
 | |
| {
 | |
| 	return mlxsw_afa_block_continue(rulei->act_block);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_jump(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				u16 group_id)
 | |
| {
 | |
| 	return mlxsw_afa_block_jump(rulei->act_block, group_id);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_terminate(struct mlxsw_sp_acl_rule_info *rulei)
 | |
| {
 | |
| 	return mlxsw_afa_block_terminate(rulei->act_block);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_drop(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				bool ingress,
 | |
| 				const struct flow_action_cookie *fa_cookie,
 | |
| 				struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	return mlxsw_afa_block_append_drop(rulei->act_block, ingress,
 | |
| 					   fa_cookie, extack);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_trap(struct mlxsw_sp_acl_rule_info *rulei)
 | |
| {
 | |
| 	return mlxsw_afa_block_append_trap(rulei->act_block,
 | |
| 					   MLXSW_TRAP_ID_ACL0);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_fwd(struct mlxsw_sp *mlxsw_sp,
 | |
| 			       struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 			       struct net_device *out_dev,
 | |
| 			       struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	struct mlxsw_sp_port *mlxsw_sp_port;
 | |
| 	u16 local_port;
 | |
| 	bool in_port;
 | |
| 
 | |
| 	if (out_dev) {
 | |
| 		if (!mlxsw_sp_port_dev_check(out_dev)) {
 | |
| 			NL_SET_ERR_MSG_MOD(extack, "Invalid output device");
 | |
| 			return -EINVAL;
 | |
| 		}
 | |
| 		mlxsw_sp_port = netdev_priv(out_dev);
 | |
| 		if (mlxsw_sp_port->mlxsw_sp != mlxsw_sp) {
 | |
| 			NL_SET_ERR_MSG_MOD(extack, "Invalid output device");
 | |
| 			return -EINVAL;
 | |
| 		}
 | |
| 		local_port = mlxsw_sp_port->local_port;
 | |
| 		in_port = false;
 | |
| 	} else {
 | |
| 		/* If out_dev is NULL, the caller wants to
 | |
| 		 * set forward to ingress port.
 | |
| 		 */
 | |
| 		local_port = 0;
 | |
| 		in_port = true;
 | |
| 	}
 | |
| 	return mlxsw_afa_block_append_fwd(rulei->act_block,
 | |
| 					  local_port, in_port, extack);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_mirror(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				  struct mlxsw_sp_flow_block *block,
 | |
| 				  struct net_device *out_dev,
 | |
| 				  struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	struct mlxsw_sp_flow_block_binding *binding;
 | |
| 	struct mlxsw_sp_port *in_port;
 | |
| 
 | |
| 	if (!list_is_singular(&block->binding_list)) {
 | |
| 		NL_SET_ERR_MSG_MOD(extack, "Only a single mirror source is allowed");
 | |
| 		return -EOPNOTSUPP;
 | |
| 	}
 | |
| 	binding = list_first_entry(&block->binding_list,
 | |
| 				   struct mlxsw_sp_flow_block_binding, list);
 | |
| 	in_port = binding->mlxsw_sp_port;
 | |
| 
 | |
| 	return mlxsw_afa_block_append_mirror(rulei->act_block,
 | |
| 					     in_port->local_port,
 | |
| 					     out_dev,
 | |
| 					     binding->ingress,
 | |
| 					     extack);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_vlan(struct mlxsw_sp *mlxsw_sp,
 | |
| 				struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				u32 action, u16 vid, u16 proto, u8 prio,
 | |
| 				struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	u8 ethertype;
 | |
| 
 | |
| 	if (action == FLOW_ACTION_VLAN_MANGLE) {
 | |
| 		switch (proto) {
 | |
| 		case ETH_P_8021Q:
 | |
| 			ethertype = 0;
 | |
| 			break;
 | |
| 		case ETH_P_8021AD:
 | |
| 			ethertype = 1;
 | |
| 			break;
 | |
| 		default:
 | |
| 			NL_SET_ERR_MSG_MOD(extack, "Unsupported VLAN protocol");
 | |
| 			dev_err(mlxsw_sp->bus_info->dev, "Unsupported VLAN protocol %#04x\n",
 | |
| 				proto);
 | |
| 			return -EINVAL;
 | |
| 		}
 | |
| 
 | |
| 		return mlxsw_afa_block_append_vlan_modify(rulei->act_block,
 | |
| 							  vid, prio, ethertype,
 | |
| 							  extack);
 | |
| 	} else {
 | |
| 		NL_SET_ERR_MSG_MOD(extack, "Unsupported VLAN action");
 | |
| 		dev_err(mlxsw_sp->bus_info->dev, "Unsupported VLAN action\n");
 | |
| 		return -EINVAL;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_priority(struct mlxsw_sp *mlxsw_sp,
 | |
| 				    struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				    u32 prio, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	/* Even though both Linux and Spectrum switches support 16 priorities,
 | |
| 	 * spectrum_qdisc only processes the first eight priomap elements, and
 | |
| 	 * the DCB and PFC features are tied to 8 priorities as well. Therefore
 | |
| 	 * bounce attempts to prioritize packets to higher priorities.
 | |
| 	 */
 | |
| 	if (prio >= IEEE_8021QAZ_MAX_TCS) {
 | |
| 		NL_SET_ERR_MSG_MOD(extack, "Only priorities 0..7 are supported");
 | |
| 		return -EINVAL;
 | |
| 	}
 | |
| 	return mlxsw_afa_block_append_qos_switch_prio(rulei->act_block, prio,
 | |
| 						      extack);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_mangle_action {
 | |
| 	enum flow_action_mangle_base htype;
 | |
| 	/* Offset is u32-aligned. */
 | |
| 	u32 offset;
 | |
| 	/* Mask bits are unset for the modified field. */
 | |
| 	u32 mask;
 | |
| 	/* Shift required to extract the set value. */
 | |
| 	u32 shift;
 | |
| 	enum mlxsw_sp_acl_mangle_field field;
 | |
| };
 | |
| 
 | |
| #define MLXSW_SP_ACL_MANGLE_ACTION(_htype, _offset, _mask, _shift, _field) \
 | |
| 	{								\
 | |
| 		.htype = _htype,					\
 | |
| 		.offset = _offset,					\
 | |
| 		.mask = _mask,						\
 | |
| 		.shift = _shift,					\
 | |
| 		.field = MLXSW_SP_ACL_MANGLE_FIELD_##_field,		\
 | |
| 	}
 | |
| 
 | |
| #define MLXSW_SP_ACL_MANGLE_ACTION_IP4(_offset, _mask, _shift, _field) \
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION(FLOW_ACT_MANGLE_HDR_TYPE_IP4,       \
 | |
| 				   _offset, _mask, _shift, _field)
 | |
| 
 | |
| #define MLXSW_SP_ACL_MANGLE_ACTION_IP6(_offset, _mask, _shift, _field) \
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION(FLOW_ACT_MANGLE_HDR_TYPE_IP6,       \
 | |
| 				   _offset, _mask, _shift, _field)
 | |
| 
 | |
| #define MLXSW_SP_ACL_MANGLE_ACTION_TCP(_offset, _mask, _shift, _field) \
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION(FLOW_ACT_MANGLE_HDR_TYPE_TCP, _offset, _mask, _shift, _field)
 | |
| 
 | |
| #define MLXSW_SP_ACL_MANGLE_ACTION_UDP(_offset, _mask, _shift, _field) \
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION(FLOW_ACT_MANGLE_HDR_TYPE_UDP, _offset, _mask, _shift, _field)
 | |
| 
 | |
| static struct mlxsw_sp_acl_mangle_action mlxsw_sp_acl_mangle_actions[] = {
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP4(0, 0xff00ffff, 16, IP_DSFIELD),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP4(0, 0xff03ffff, 18, IP_DSCP),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP4(0, 0xfffcffff, 16, IP_ECN),
 | |
| 
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(0, 0xf00fffff, 20, IP_DSFIELD),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(0, 0xf03fffff, 22, IP_DSCP),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(0, 0xffcfffff, 20, IP_ECN),
 | |
| 
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_TCP(0, 0x0000ffff, 16, IP_SPORT),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_TCP(0, 0xffff0000, 0,  IP_DPORT),
 | |
| 
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_UDP(0, 0x0000ffff, 16, IP_SPORT),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_UDP(0, 0xffff0000, 0,  IP_DPORT),
 | |
| 
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP4(12, 0x00000000, 0, IP4_SIP),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP4(16, 0x00000000, 0, IP4_DIP),
 | |
| 
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(8, 0x00000000, 0, IP6_SIP_1),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(12, 0x00000000, 0, IP6_SIP_2),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(16, 0x00000000, 0, IP6_SIP_3),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(20, 0x00000000, 0, IP6_SIP_4),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(24, 0x00000000, 0, IP6_DIP_1),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(28, 0x00000000, 0, IP6_DIP_2),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(32, 0x00000000, 0, IP6_DIP_3),
 | |
| 	MLXSW_SP_ACL_MANGLE_ACTION_IP6(36, 0x00000000, 0, IP6_DIP_4),
 | |
| };
 | |
| 
 | |
| static int
 | |
| mlxsw_sp_acl_rulei_act_mangle_field(struct mlxsw_sp *mlxsw_sp,
 | |
| 				    struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				    struct mlxsw_sp_acl_mangle_action *mact,
 | |
| 				    u32 val, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	switch (mact->field) {
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP_DSFIELD:
 | |
| 		return mlxsw_afa_block_append_qos_dsfield(rulei->act_block,
 | |
| 							  val, extack);
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP_DSCP:
 | |
| 		return mlxsw_afa_block_append_qos_dscp(rulei->act_block,
 | |
| 						       val, extack);
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP_ECN:
 | |
| 		return mlxsw_afa_block_append_qos_ecn(rulei->act_block,
 | |
| 						      val, extack);
 | |
| 	default:
 | |
| 		return -EOPNOTSUPP;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static int mlxsw_sp1_acl_rulei_act_mangle_field(struct mlxsw_sp *mlxsw_sp,
 | |
| 						struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 						struct mlxsw_sp_acl_mangle_action *mact,
 | |
| 						u32 val, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	err = mlxsw_sp_acl_rulei_act_mangle_field(mlxsw_sp, rulei, mact, val, extack);
 | |
| 	if (err != -EOPNOTSUPP)
 | |
| 		return err;
 | |
| 
 | |
| 	NL_SET_ERR_MSG_MOD(extack, "Unsupported mangle field");
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| static int
 | |
| mlxsw_sp2_acl_rulei_act_mangle_field_ip_odd(struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 					    enum mlxsw_sp_acl_mangle_field field,
 | |
| 					    u32 val, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	if (!rulei->ipv6_valid) {
 | |
| 		rulei->ipv6.prev_val = val;
 | |
| 		rulei->ipv6_valid = true;
 | |
| 		rulei->ipv6.prev_field = field;
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	NL_SET_ERR_MSG_MOD(extack, "Unsupported mangle field order");
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| 
 | |
| static int mlxsw_sp2_acl_rulei_act_mangle_field(struct mlxsw_sp *mlxsw_sp,
 | |
| 						struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 						struct mlxsw_sp_acl_mangle_action *mact,
 | |
| 						u32 val, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	err = mlxsw_sp_acl_rulei_act_mangle_field(mlxsw_sp, rulei, mact, val, extack);
 | |
| 	if (err != -EOPNOTSUPP)
 | |
| 		return err;
 | |
| 
 | |
| 	switch (mact->field) {
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP_SPORT:
 | |
| 		return mlxsw_afa_block_append_l4port(rulei->act_block, false, val, extack);
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP_DPORT:
 | |
| 		return mlxsw_afa_block_append_l4port(rulei->act_block, true, val, extack);
 | |
| 	/* IPv4 fields */
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP4_SIP:
 | |
| 		return mlxsw_afa_block_append_ip(rulei->act_block, false,
 | |
| 						 true, val, 0, extack);
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP4_DIP:
 | |
| 		return mlxsw_afa_block_append_ip(rulei->act_block, true,
 | |
| 						 true, val, 0, extack);
 | |
| 	/* IPv6 fields */
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_1:
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_3:
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_1:
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_3:
 | |
| 		return mlxsw_sp2_acl_rulei_act_mangle_field_ip_odd(rulei,
 | |
| 								   mact->field,
 | |
| 								   val, extack);
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_2:
 | |
| 		if (rulei->ipv6_valid &&
 | |
| 		    rulei->ipv6.prev_field == MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_1) {
 | |
| 			rulei->ipv6_valid = false;
 | |
| 			return mlxsw_afa_block_append_ip(rulei->act_block,
 | |
| 							 false, false, val,
 | |
| 							 rulei->ipv6.prev_val,
 | |
| 							 extack);
 | |
| 		}
 | |
| 		break;
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_4:
 | |
| 		if (rulei->ipv6_valid &&
 | |
| 		    rulei->ipv6.prev_field == MLXSW_SP_ACL_MANGLE_FIELD_IP6_SIP_3) {
 | |
| 			rulei->ipv6_valid = false;
 | |
| 			return mlxsw_afa_block_append_ip(rulei->act_block,
 | |
| 							 false, true, val,
 | |
| 							 rulei->ipv6.prev_val,
 | |
| 							 extack);
 | |
| 		}
 | |
| 		break;
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_2:
 | |
| 		if (rulei->ipv6_valid &&
 | |
| 		    rulei->ipv6.prev_field == MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_1) {
 | |
| 			rulei->ipv6_valid = false;
 | |
| 			return mlxsw_afa_block_append_ip(rulei->act_block,
 | |
| 							 true, false, val,
 | |
| 							 rulei->ipv6.prev_val,
 | |
| 							 extack);
 | |
| 		}
 | |
| 		break;
 | |
| 	case MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_4:
 | |
| 		if (rulei->ipv6_valid &&
 | |
| 		    rulei->ipv6.prev_field == MLXSW_SP_ACL_MANGLE_FIELD_IP6_DIP_3) {
 | |
| 			rulei->ipv6_valid = false;
 | |
| 			return mlxsw_afa_block_append_ip(rulei->act_block,
 | |
| 							 true, true, val,
 | |
| 							 rulei->ipv6.prev_val,
 | |
| 							 extack);
 | |
| 		}
 | |
| 		break;
 | |
| 	default:
 | |
| 		break;
 | |
| 	}
 | |
| 
 | |
| 	NL_SET_ERR_MSG_MOD(extack, "Unsupported mangle field");
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_mangle(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				  enum flow_action_mangle_base htype,
 | |
| 				  u32 offset, u32 mask, u32 val,
 | |
| 				  struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_rulei_ops *acl_rulei_ops = mlxsw_sp->acl_rulei_ops;
 | |
| 	struct mlxsw_sp_acl_mangle_action *mact;
 | |
| 	size_t i;
 | |
| 
 | |
| 	for (i = 0; i < ARRAY_SIZE(mlxsw_sp_acl_mangle_actions); ++i) {
 | |
| 		mact = &mlxsw_sp_acl_mangle_actions[i];
 | |
| 		if (mact->htype == htype &&
 | |
| 		    mact->offset == offset &&
 | |
| 		    mact->mask == mask) {
 | |
| 			val >>= mact->shift;
 | |
| 			return acl_rulei_ops->act_mangle_field(mlxsw_sp,
 | |
| 							       rulei, mact,
 | |
| 							       val, extack);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	NL_SET_ERR_MSG_MOD(extack, "Unknown mangle field");
 | |
| 	return -EINVAL;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_police(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				  u32 index, u64 rate_bytes_ps,
 | |
| 				  u32 burst, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	err = mlxsw_afa_block_append_police(rulei->act_block, index,
 | |
| 					    rate_bytes_ps, burst,
 | |
| 					    &rulei->policer_index, extack);
 | |
| 	if (err)
 | |
| 		return err;
 | |
| 
 | |
| 	rulei->policer_index_valid = true;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_count(struct mlxsw_sp *mlxsw_sp,
 | |
| 				 struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				 struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	err = mlxsw_afa_block_append_counter(rulei->act_block,
 | |
| 					     &rulei->counter_index, extack);
 | |
| 	if (err)
 | |
| 		return err;
 | |
| 	rulei->counter_valid = true;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_fid_set(struct mlxsw_sp *mlxsw_sp,
 | |
| 				   struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				   u16 fid, struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	return mlxsw_afa_block_append_fid_set(rulei->act_block, fid, extack);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_ignore(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				  bool disable_learning, bool disable_security)
 | |
| {
 | |
| 	return mlxsw_afa_block_append_ignore(rulei->act_block,
 | |
| 					     disable_learning,
 | |
| 					     disable_security);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rulei_act_sample(struct mlxsw_sp *mlxsw_sp,
 | |
| 				  struct mlxsw_sp_acl_rule_info *rulei,
 | |
| 				  struct mlxsw_sp_flow_block *block,
 | |
| 				  struct psample_group *psample_group, u32 rate,
 | |
| 				  u32 trunc_size, bool truncate,
 | |
| 				  struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	struct mlxsw_sp_flow_block_binding *binding;
 | |
| 	struct mlxsw_sp_port *mlxsw_sp_port;
 | |
| 
 | |
| 	if (!list_is_singular(&block->binding_list)) {
 | |
| 		NL_SET_ERR_MSG_MOD(extack, "Only a single sampling source is allowed");
 | |
| 		return -EOPNOTSUPP;
 | |
| 	}
 | |
| 	binding = list_first_entry(&block->binding_list,
 | |
| 				   struct mlxsw_sp_flow_block_binding, list);
 | |
| 	mlxsw_sp_port = binding->mlxsw_sp_port;
 | |
| 
 | |
| 	return mlxsw_afa_block_append_sampler(rulei->act_block,
 | |
| 					      mlxsw_sp_port->local_port,
 | |
| 					      psample_group, rate, trunc_size,
 | |
| 					      truncate, binding->ingress,
 | |
| 					      extack);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_rule *
 | |
| mlxsw_sp_acl_rule_create(struct mlxsw_sp *mlxsw_sp,
 | |
| 			 struct mlxsw_sp_acl_ruleset *ruleset,
 | |
| 			 unsigned long cookie,
 | |
| 			 struct mlxsw_afa_block *afa_block,
 | |
| 			 struct netlink_ext_ack *extack)
 | |
| {
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	struct mlxsw_sp_acl_rule *rule;
 | |
| 	int err;
 | |
| 
 | |
| 	mlxsw_sp_acl_ruleset_ref_inc(ruleset);
 | |
| 	rule = kzalloc(sizeof(*rule) + ops->rule_priv_size,
 | |
| 		       GFP_KERNEL);
 | |
| 	if (!rule) {
 | |
| 		err = -ENOMEM;
 | |
| 		goto err_alloc;
 | |
| 	}
 | |
| 	rule->cookie = cookie;
 | |
| 	rule->ruleset = ruleset;
 | |
| 
 | |
| 	rule->rulei = mlxsw_sp_acl_rulei_create(mlxsw_sp->acl, afa_block);
 | |
| 	if (IS_ERR(rule->rulei)) {
 | |
| 		err = PTR_ERR(rule->rulei);
 | |
| 		goto err_rulei_create;
 | |
| 	}
 | |
| 
 | |
| 	return rule;
 | |
| 
 | |
| err_rulei_create:
 | |
| 	kfree(rule);
 | |
| err_alloc:
 | |
| 	mlxsw_sp_acl_ruleset_ref_dec(mlxsw_sp, ruleset);
 | |
| 	return ERR_PTR(err);
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rule_destroy(struct mlxsw_sp *mlxsw_sp,
 | |
| 			       struct mlxsw_sp_acl_rule *rule)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = rule->ruleset;
 | |
| 
 | |
| 	mlxsw_sp_acl_rulei_destroy(mlxsw_sp, rule->rulei);
 | |
| 	kfree(rule);
 | |
| 	mlxsw_sp_acl_ruleset_ref_dec(mlxsw_sp, ruleset);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rule_add(struct mlxsw_sp *mlxsw_sp,
 | |
| 			  struct mlxsw_sp_acl_rule *rule)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = rule->ruleset;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	struct mlxsw_sp_flow_block *block = ruleset->ht_key.block;
 | |
| 	int err;
 | |
| 
 | |
| 	err = ops->rule_add(mlxsw_sp, ruleset->priv, rule->priv, rule->rulei);
 | |
| 	if (err)
 | |
| 		return err;
 | |
| 
 | |
| 	err = rhashtable_insert_fast(&ruleset->rule_ht, &rule->ht_node,
 | |
| 				     mlxsw_sp_acl_rule_ht_params);
 | |
| 	if (err)
 | |
| 		goto err_rhashtable_insert;
 | |
| 
 | |
| 	if (!ruleset->ht_key.chain_index &&
 | |
| 	    mlxsw_sp_acl_ruleset_is_singular(ruleset)) {
 | |
| 		/* We only need ruleset with chain index 0, the implicit
 | |
| 		 * one, to be directly bound to device. The rest of the
 | |
| 		 * rulesets are bound by "Goto action set".
 | |
| 		 */
 | |
| 		err = mlxsw_sp_acl_ruleset_block_bind(mlxsw_sp, ruleset, block);
 | |
| 		if (err)
 | |
| 			goto err_ruleset_block_bind;
 | |
| 	}
 | |
| 
 | |
| 	mutex_lock(&mlxsw_sp->acl->rules_lock);
 | |
| 	list_add_tail(&rule->list, &mlxsw_sp->acl->rules);
 | |
| 	mutex_unlock(&mlxsw_sp->acl->rules_lock);
 | |
| 	block->rule_count++;
 | |
| 	block->ingress_blocker_rule_count += rule->rulei->ingress_bind_blocker;
 | |
| 	block->egress_blocker_rule_count += rule->rulei->egress_bind_blocker;
 | |
| 	return 0;
 | |
| 
 | |
| err_ruleset_block_bind:
 | |
| 	rhashtable_remove_fast(&ruleset->rule_ht, &rule->ht_node,
 | |
| 			       mlxsw_sp_acl_rule_ht_params);
 | |
| err_rhashtable_insert:
 | |
| 	ops->rule_del(mlxsw_sp, rule->priv);
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_rule_del(struct mlxsw_sp *mlxsw_sp,
 | |
| 			   struct mlxsw_sp_acl_rule *rule)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = rule->ruleset;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	struct mlxsw_sp_flow_block *block = ruleset->ht_key.block;
 | |
| 
 | |
| 	block->egress_blocker_rule_count -= rule->rulei->egress_bind_blocker;
 | |
| 	block->ingress_blocker_rule_count -= rule->rulei->ingress_bind_blocker;
 | |
| 	block->rule_count--;
 | |
| 	mutex_lock(&mlxsw_sp->acl->rules_lock);
 | |
| 	list_del(&rule->list);
 | |
| 	mutex_unlock(&mlxsw_sp->acl->rules_lock);
 | |
| 	if (!ruleset->ht_key.chain_index &&
 | |
| 	    mlxsw_sp_acl_ruleset_is_singular(ruleset))
 | |
| 		mlxsw_sp_acl_ruleset_block_unbind(mlxsw_sp, ruleset, block);
 | |
| 	rhashtable_remove_fast(&ruleset->rule_ht, &rule->ht_node,
 | |
| 			       mlxsw_sp_acl_rule_ht_params);
 | |
| 	ops->rule_del(mlxsw_sp, rule->priv);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rule_action_replace(struct mlxsw_sp *mlxsw_sp,
 | |
| 				     struct mlxsw_sp_acl_rule *rule,
 | |
| 				     struct mlxsw_afa_block *afa_block)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = rule->ruleset;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	struct mlxsw_sp_acl_rule_info *rulei;
 | |
| 
 | |
| 	rulei = mlxsw_sp_acl_rule_rulei(rule);
 | |
| 	rulei->act_block = afa_block;
 | |
| 
 | |
| 	return ops->rule_action_replace(mlxsw_sp, rule->priv, rule->rulei);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_rule *
 | |
| mlxsw_sp_acl_rule_lookup(struct mlxsw_sp *mlxsw_sp,
 | |
| 			 struct mlxsw_sp_acl_ruleset *ruleset,
 | |
| 			 unsigned long cookie)
 | |
| {
 | |
| 	return rhashtable_lookup_fast(&ruleset->rule_ht, &cookie,
 | |
| 				       mlxsw_sp_acl_rule_ht_params);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_rule_info *
 | |
| mlxsw_sp_acl_rule_rulei(struct mlxsw_sp_acl_rule *rule)
 | |
| {
 | |
| 	return rule->rulei;
 | |
| }
 | |
| 
 | |
| static int mlxsw_sp_acl_rule_activity_update(struct mlxsw_sp *mlxsw_sp,
 | |
| 					     struct mlxsw_sp_acl_rule *rule)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_ruleset *ruleset = rule->ruleset;
 | |
| 	const struct mlxsw_sp_acl_profile_ops *ops = ruleset->ht_key.ops;
 | |
| 	bool active;
 | |
| 	int err;
 | |
| 
 | |
| 	err = ops->rule_activity_get(mlxsw_sp, rule->priv, &active);
 | |
| 	if (err)
 | |
| 		return err;
 | |
| 	if (active)
 | |
| 		rule->last_used = jiffies;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int mlxsw_sp_acl_rules_activity_update(struct mlxsw_sp_acl *acl)
 | |
| {
 | |
| 	struct mlxsw_sp_acl_rule *rule;
 | |
| 	int err;
 | |
| 
 | |
| 	mutex_lock(&acl->rules_lock);
 | |
| 	list_for_each_entry(rule, &acl->rules, list) {
 | |
| 		err = mlxsw_sp_acl_rule_activity_update(acl->mlxsw_sp,
 | |
| 							rule);
 | |
| 		if (err)
 | |
| 			goto err_rule_update;
 | |
| 	}
 | |
| 	mutex_unlock(&acl->rules_lock);
 | |
| 	return 0;
 | |
| 
 | |
| err_rule_update:
 | |
| 	mutex_unlock(&acl->rules_lock);
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| static void mlxsw_sp_acl_rule_activity_work_schedule(struct mlxsw_sp_acl *acl)
 | |
| {
 | |
| 	unsigned long interval = acl->rule_activity_update.interval;
 | |
| 
 | |
| 	mlxsw_core_schedule_dw(&acl->rule_activity_update.dw,
 | |
| 			       msecs_to_jiffies(interval));
 | |
| }
 | |
| 
 | |
| static void mlxsw_sp_acl_rule_activity_update_work(struct work_struct *work)
 | |
| {
 | |
| 	struct mlxsw_sp_acl *acl = container_of(work, struct mlxsw_sp_acl,
 | |
| 						rule_activity_update.dw.work);
 | |
| 	int err;
 | |
| 
 | |
| 	err = mlxsw_sp_acl_rules_activity_update(acl);
 | |
| 	if (err)
 | |
| 		dev_err(acl->mlxsw_sp->bus_info->dev, "Could not update acl activity");
 | |
| 
 | |
| 	mlxsw_sp_acl_rule_activity_work_schedule(acl);
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_rule_get_stats(struct mlxsw_sp *mlxsw_sp,
 | |
| 				struct mlxsw_sp_acl_rule *rule,
 | |
| 				u64 *packets, u64 *bytes, u64 *drops,
 | |
| 				u64 *last_use,
 | |
| 				enum flow_action_hw_stats *used_hw_stats)
 | |
| 
 | |
| {
 | |
| 	enum mlxsw_sp_policer_type type = MLXSW_SP_POLICER_TYPE_SINGLE_RATE;
 | |
| 	struct mlxsw_sp_acl_rule_info *rulei;
 | |
| 	u64 current_packets = 0;
 | |
| 	u64 current_bytes = 0;
 | |
| 	u64 current_drops = 0;
 | |
| 	int err;
 | |
| 
 | |
| 	rulei = mlxsw_sp_acl_rule_rulei(rule);
 | |
| 	if (rulei->counter_valid) {
 | |
| 		err = mlxsw_sp_flow_counter_get(mlxsw_sp, rulei->counter_index,
 | |
| 						false, ¤t_packets,
 | |
| 						¤t_bytes);
 | |
| 		if (err)
 | |
| 			return err;
 | |
| 		*used_hw_stats = FLOW_ACTION_HW_STATS_IMMEDIATE;
 | |
| 	}
 | |
| 	if (rulei->policer_index_valid) {
 | |
| 		err = mlxsw_sp_policer_drops_counter_get(mlxsw_sp, type,
 | |
| 							 rulei->policer_index,
 | |
| 							 ¤t_drops);
 | |
| 		if (err)
 | |
| 			return err;
 | |
| 	}
 | |
| 	*packets = current_packets - rule->last_packets;
 | |
| 	*bytes = current_bytes - rule->last_bytes;
 | |
| 	*drops = current_drops - rule->last_drops;
 | |
| 	*last_use = rule->last_used;
 | |
| 
 | |
| 	rule->last_bytes = current_bytes;
 | |
| 	rule->last_packets = current_packets;
 | |
| 	rule->last_drops = current_drops;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int mlxsw_sp_acl_init(struct mlxsw_sp *mlxsw_sp)
 | |
| {
 | |
| 	struct mlxsw_sp_fid *fid;
 | |
| 	struct mlxsw_sp_acl *acl;
 | |
| 	size_t alloc_size;
 | |
| 	int err;
 | |
| 
 | |
| 	alloc_size = sizeof(*acl) + mlxsw_sp_acl_tcam_priv_size(mlxsw_sp);
 | |
| 	acl = kzalloc(alloc_size, GFP_KERNEL);
 | |
| 	if (!acl)
 | |
| 		return -ENOMEM;
 | |
| 	mlxsw_sp->acl = acl;
 | |
| 	acl->mlxsw_sp = mlxsw_sp;
 | |
| 	acl->afk = mlxsw_afk_create(MLXSW_CORE_RES_GET(mlxsw_sp->core,
 | |
| 						       ACL_FLEX_KEYS),
 | |
| 				    mlxsw_sp->afk_ops);
 | |
| 	if (!acl->afk) {
 | |
| 		err = -ENOMEM;
 | |
| 		goto err_afk_create;
 | |
| 	}
 | |
| 
 | |
| 	err = rhashtable_init(&acl->ruleset_ht,
 | |
| 			      &mlxsw_sp_acl_ruleset_ht_params);
 | |
| 	if (err)
 | |
| 		goto err_rhashtable_init;
 | |
| 
 | |
| 	fid = mlxsw_sp_fid_dummy_get(mlxsw_sp);
 | |
| 	if (IS_ERR(fid)) {
 | |
| 		err = PTR_ERR(fid);
 | |
| 		goto err_fid_get;
 | |
| 	}
 | |
| 	acl->dummy_fid = fid;
 | |
| 
 | |
| 	INIT_LIST_HEAD(&acl->rules);
 | |
| 	mutex_init(&acl->rules_lock);
 | |
| 	err = mlxsw_sp_acl_tcam_init(mlxsw_sp, &acl->tcam);
 | |
| 	if (err)
 | |
| 		goto err_acl_ops_init;
 | |
| 
 | |
| 	/* Create the delayed work for the rule activity_update */
 | |
| 	INIT_DELAYED_WORK(&acl->rule_activity_update.dw,
 | |
| 			  mlxsw_sp_acl_rule_activity_update_work);
 | |
| 	acl->rule_activity_update.interval = MLXSW_SP_ACL_RULE_ACTIVITY_UPDATE_PERIOD_MS;
 | |
| 	mlxsw_core_schedule_dw(&acl->rule_activity_update.dw, 0);
 | |
| 	return 0;
 | |
| 
 | |
| err_acl_ops_init:
 | |
| 	mutex_destroy(&acl->rules_lock);
 | |
| 	mlxsw_sp_fid_put(fid);
 | |
| err_fid_get:
 | |
| 	rhashtable_destroy(&acl->ruleset_ht);
 | |
| err_rhashtable_init:
 | |
| 	mlxsw_afk_destroy(acl->afk);
 | |
| err_afk_create:
 | |
| 	kfree(acl);
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| void mlxsw_sp_acl_fini(struct mlxsw_sp *mlxsw_sp)
 | |
| {
 | |
| 	struct mlxsw_sp_acl *acl = mlxsw_sp->acl;
 | |
| 
 | |
| 	cancel_delayed_work_sync(&mlxsw_sp->acl->rule_activity_update.dw);
 | |
| 	mlxsw_sp_acl_tcam_fini(mlxsw_sp, &acl->tcam);
 | |
| 	mutex_destroy(&acl->rules_lock);
 | |
| 	WARN_ON(!list_empty(&acl->rules));
 | |
| 	mlxsw_sp_fid_put(acl->dummy_fid);
 | |
| 	rhashtable_destroy(&acl->ruleset_ht);
 | |
| 	mlxsw_afk_destroy(acl->afk);
 | |
| 	kfree(acl);
 | |
| }
 | |
| 
 | |
| struct mlxsw_sp_acl_rulei_ops mlxsw_sp1_acl_rulei_ops = {
 | |
| 	.act_mangle_field = mlxsw_sp1_acl_rulei_act_mangle_field,
 | |
| };
 | |
| 
 | |
| struct mlxsw_sp_acl_rulei_ops mlxsw_sp2_acl_rulei_ops = {
 | |
| 	.act_mangle_field = mlxsw_sp2_acl_rulei_act_mangle_field,
 | |
| };
 |