xref: /OK3568_Linux_fs/kernel/net/sched/act_bpf.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright (c) 2015 Jiri Pirko <jiri@resnulli.us>
4*4882a593Smuzhiyun  */
5*4882a593Smuzhiyun 
6*4882a593Smuzhiyun #include <linux/module.h>
7*4882a593Smuzhiyun #include <linux/init.h>
8*4882a593Smuzhiyun #include <linux/kernel.h>
9*4882a593Smuzhiyun #include <linux/skbuff.h>
10*4882a593Smuzhiyun #include <linux/rtnetlink.h>
11*4882a593Smuzhiyun #include <linux/filter.h>
12*4882a593Smuzhiyun #include <linux/bpf.h>
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun #include <net/netlink.h>
15*4882a593Smuzhiyun #include <net/sock.h>
16*4882a593Smuzhiyun #include <net/pkt_sched.h>
17*4882a593Smuzhiyun #include <net/pkt_cls.h>
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #include <linux/tc_act/tc_bpf.h>
20*4882a593Smuzhiyun #include <net/tc_act/tc_bpf.h>
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #define ACT_BPF_NAME_LEN	256
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun struct tcf_bpf_cfg {
25*4882a593Smuzhiyun 	struct bpf_prog *filter;
26*4882a593Smuzhiyun 	struct sock_filter *bpf_ops;
27*4882a593Smuzhiyun 	const char *bpf_name;
28*4882a593Smuzhiyun 	u16 bpf_num_ops;
29*4882a593Smuzhiyun 	bool is_ebpf;
30*4882a593Smuzhiyun };
31*4882a593Smuzhiyun 
32*4882a593Smuzhiyun static unsigned int bpf_net_id;
33*4882a593Smuzhiyun static struct tc_action_ops act_bpf_ops;
34*4882a593Smuzhiyun 
tcf_bpf_act(struct sk_buff * skb,const struct tc_action * act,struct tcf_result * res)35*4882a593Smuzhiyun static int tcf_bpf_act(struct sk_buff *skb, const struct tc_action *act,
36*4882a593Smuzhiyun 		       struct tcf_result *res)
37*4882a593Smuzhiyun {
38*4882a593Smuzhiyun 	bool at_ingress = skb_at_tc_ingress(skb);
39*4882a593Smuzhiyun 	struct tcf_bpf *prog = to_bpf(act);
40*4882a593Smuzhiyun 	struct bpf_prog *filter;
41*4882a593Smuzhiyun 	int action, filter_res;
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun 	tcf_lastuse_update(&prog->tcf_tm);
44*4882a593Smuzhiyun 	bstats_cpu_update(this_cpu_ptr(prog->common.cpu_bstats), skb);
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun 	rcu_read_lock();
47*4882a593Smuzhiyun 	filter = rcu_dereference(prog->filter);
48*4882a593Smuzhiyun 	if (at_ingress) {
49*4882a593Smuzhiyun 		__skb_push(skb, skb->mac_len);
50*4882a593Smuzhiyun 		bpf_compute_data_pointers(skb);
51*4882a593Smuzhiyun 		filter_res = BPF_PROG_RUN(filter, skb);
52*4882a593Smuzhiyun 		__skb_pull(skb, skb->mac_len);
53*4882a593Smuzhiyun 	} else {
54*4882a593Smuzhiyun 		bpf_compute_data_pointers(skb);
55*4882a593Smuzhiyun 		filter_res = BPF_PROG_RUN(filter, skb);
56*4882a593Smuzhiyun 	}
57*4882a593Smuzhiyun 	if (skb_sk_is_prefetched(skb) && filter_res != TC_ACT_OK)
58*4882a593Smuzhiyun 		skb_orphan(skb);
59*4882a593Smuzhiyun 	rcu_read_unlock();
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 	/* A BPF program may overwrite the default action opcode.
62*4882a593Smuzhiyun 	 * Similarly as in cls_bpf, if filter_res == -1 we use the
63*4882a593Smuzhiyun 	 * default action specified from tc.
64*4882a593Smuzhiyun 	 *
65*4882a593Smuzhiyun 	 * In case a different well-known TC_ACT opcode has been
66*4882a593Smuzhiyun 	 * returned, it will overwrite the default one.
67*4882a593Smuzhiyun 	 *
68*4882a593Smuzhiyun 	 * For everything else that is unkown, TC_ACT_UNSPEC is
69*4882a593Smuzhiyun 	 * returned.
70*4882a593Smuzhiyun 	 */
71*4882a593Smuzhiyun 	switch (filter_res) {
72*4882a593Smuzhiyun 	case TC_ACT_PIPE:
73*4882a593Smuzhiyun 	case TC_ACT_RECLASSIFY:
74*4882a593Smuzhiyun 	case TC_ACT_OK:
75*4882a593Smuzhiyun 	case TC_ACT_REDIRECT:
76*4882a593Smuzhiyun 		action = filter_res;
77*4882a593Smuzhiyun 		break;
78*4882a593Smuzhiyun 	case TC_ACT_SHOT:
79*4882a593Smuzhiyun 		action = filter_res;
80*4882a593Smuzhiyun 		qstats_drop_inc(this_cpu_ptr(prog->common.cpu_qstats));
81*4882a593Smuzhiyun 		break;
82*4882a593Smuzhiyun 	case TC_ACT_UNSPEC:
83*4882a593Smuzhiyun 		action = prog->tcf_action;
84*4882a593Smuzhiyun 		break;
85*4882a593Smuzhiyun 	default:
86*4882a593Smuzhiyun 		action = TC_ACT_UNSPEC;
87*4882a593Smuzhiyun 		break;
88*4882a593Smuzhiyun 	}
89*4882a593Smuzhiyun 
90*4882a593Smuzhiyun 	return action;
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun 
tcf_bpf_is_ebpf(const struct tcf_bpf * prog)93*4882a593Smuzhiyun static bool tcf_bpf_is_ebpf(const struct tcf_bpf *prog)
94*4882a593Smuzhiyun {
95*4882a593Smuzhiyun 	return !prog->bpf_ops;
96*4882a593Smuzhiyun }
97*4882a593Smuzhiyun 
tcf_bpf_dump_bpf_info(const struct tcf_bpf * prog,struct sk_buff * skb)98*4882a593Smuzhiyun static int tcf_bpf_dump_bpf_info(const struct tcf_bpf *prog,
99*4882a593Smuzhiyun 				 struct sk_buff *skb)
100*4882a593Smuzhiyun {
101*4882a593Smuzhiyun 	struct nlattr *nla;
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun 	if (nla_put_u16(skb, TCA_ACT_BPF_OPS_LEN, prog->bpf_num_ops))
104*4882a593Smuzhiyun 		return -EMSGSIZE;
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun 	nla = nla_reserve(skb, TCA_ACT_BPF_OPS, prog->bpf_num_ops *
107*4882a593Smuzhiyun 			  sizeof(struct sock_filter));
108*4882a593Smuzhiyun 	if (nla == NULL)
109*4882a593Smuzhiyun 		return -EMSGSIZE;
110*4882a593Smuzhiyun 
111*4882a593Smuzhiyun 	memcpy(nla_data(nla), prog->bpf_ops, nla_len(nla));
112*4882a593Smuzhiyun 
113*4882a593Smuzhiyun 	return 0;
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun 
tcf_bpf_dump_ebpf_info(const struct tcf_bpf * prog,struct sk_buff * skb)116*4882a593Smuzhiyun static int tcf_bpf_dump_ebpf_info(const struct tcf_bpf *prog,
117*4882a593Smuzhiyun 				  struct sk_buff *skb)
118*4882a593Smuzhiyun {
119*4882a593Smuzhiyun 	struct nlattr *nla;
120*4882a593Smuzhiyun 
121*4882a593Smuzhiyun 	if (prog->bpf_name &&
122*4882a593Smuzhiyun 	    nla_put_string(skb, TCA_ACT_BPF_NAME, prog->bpf_name))
123*4882a593Smuzhiyun 		return -EMSGSIZE;
124*4882a593Smuzhiyun 
125*4882a593Smuzhiyun 	if (nla_put_u32(skb, TCA_ACT_BPF_ID, prog->filter->aux->id))
126*4882a593Smuzhiyun 		return -EMSGSIZE;
127*4882a593Smuzhiyun 
128*4882a593Smuzhiyun 	nla = nla_reserve(skb, TCA_ACT_BPF_TAG, sizeof(prog->filter->tag));
129*4882a593Smuzhiyun 	if (nla == NULL)
130*4882a593Smuzhiyun 		return -EMSGSIZE;
131*4882a593Smuzhiyun 
132*4882a593Smuzhiyun 	memcpy(nla_data(nla), prog->filter->tag, nla_len(nla));
133*4882a593Smuzhiyun 
134*4882a593Smuzhiyun 	return 0;
135*4882a593Smuzhiyun }
136*4882a593Smuzhiyun 
tcf_bpf_dump(struct sk_buff * skb,struct tc_action * act,int bind,int ref)137*4882a593Smuzhiyun static int tcf_bpf_dump(struct sk_buff *skb, struct tc_action *act,
138*4882a593Smuzhiyun 			int bind, int ref)
139*4882a593Smuzhiyun {
140*4882a593Smuzhiyun 	unsigned char *tp = skb_tail_pointer(skb);
141*4882a593Smuzhiyun 	struct tcf_bpf *prog = to_bpf(act);
142*4882a593Smuzhiyun 	struct tc_act_bpf opt = {
143*4882a593Smuzhiyun 		.index   = prog->tcf_index,
144*4882a593Smuzhiyun 		.refcnt  = refcount_read(&prog->tcf_refcnt) - ref,
145*4882a593Smuzhiyun 		.bindcnt = atomic_read(&prog->tcf_bindcnt) - bind,
146*4882a593Smuzhiyun 	};
147*4882a593Smuzhiyun 	struct tcf_t tm;
148*4882a593Smuzhiyun 	int ret;
149*4882a593Smuzhiyun 
150*4882a593Smuzhiyun 	spin_lock_bh(&prog->tcf_lock);
151*4882a593Smuzhiyun 	opt.action = prog->tcf_action;
152*4882a593Smuzhiyun 	if (nla_put(skb, TCA_ACT_BPF_PARMS, sizeof(opt), &opt))
153*4882a593Smuzhiyun 		goto nla_put_failure;
154*4882a593Smuzhiyun 
155*4882a593Smuzhiyun 	if (tcf_bpf_is_ebpf(prog))
156*4882a593Smuzhiyun 		ret = tcf_bpf_dump_ebpf_info(prog, skb);
157*4882a593Smuzhiyun 	else
158*4882a593Smuzhiyun 		ret = tcf_bpf_dump_bpf_info(prog, skb);
159*4882a593Smuzhiyun 	if (ret)
160*4882a593Smuzhiyun 		goto nla_put_failure;
161*4882a593Smuzhiyun 
162*4882a593Smuzhiyun 	tcf_tm_dump(&tm, &prog->tcf_tm);
163*4882a593Smuzhiyun 	if (nla_put_64bit(skb, TCA_ACT_BPF_TM, sizeof(tm), &tm,
164*4882a593Smuzhiyun 			  TCA_ACT_BPF_PAD))
165*4882a593Smuzhiyun 		goto nla_put_failure;
166*4882a593Smuzhiyun 
167*4882a593Smuzhiyun 	spin_unlock_bh(&prog->tcf_lock);
168*4882a593Smuzhiyun 	return skb->len;
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun nla_put_failure:
171*4882a593Smuzhiyun 	spin_unlock_bh(&prog->tcf_lock);
172*4882a593Smuzhiyun 	nlmsg_trim(skb, tp);
173*4882a593Smuzhiyun 	return -1;
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun 
176*4882a593Smuzhiyun static const struct nla_policy act_bpf_policy[TCA_ACT_BPF_MAX + 1] = {
177*4882a593Smuzhiyun 	[TCA_ACT_BPF_PARMS]	= { .len = sizeof(struct tc_act_bpf) },
178*4882a593Smuzhiyun 	[TCA_ACT_BPF_FD]	= { .type = NLA_U32 },
179*4882a593Smuzhiyun 	[TCA_ACT_BPF_NAME]	= { .type = NLA_NUL_STRING,
180*4882a593Smuzhiyun 				    .len = ACT_BPF_NAME_LEN },
181*4882a593Smuzhiyun 	[TCA_ACT_BPF_OPS_LEN]	= { .type = NLA_U16 },
182*4882a593Smuzhiyun 	[TCA_ACT_BPF_OPS]	= { .type = NLA_BINARY,
183*4882a593Smuzhiyun 				    .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
184*4882a593Smuzhiyun };
185*4882a593Smuzhiyun 
tcf_bpf_init_from_ops(struct nlattr ** tb,struct tcf_bpf_cfg * cfg)186*4882a593Smuzhiyun static int tcf_bpf_init_from_ops(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
187*4882a593Smuzhiyun {
188*4882a593Smuzhiyun 	struct sock_filter *bpf_ops;
189*4882a593Smuzhiyun 	struct sock_fprog_kern fprog_tmp;
190*4882a593Smuzhiyun 	struct bpf_prog *fp;
191*4882a593Smuzhiyun 	u16 bpf_size, bpf_num_ops;
192*4882a593Smuzhiyun 	int ret;
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 	bpf_num_ops = nla_get_u16(tb[TCA_ACT_BPF_OPS_LEN]);
195*4882a593Smuzhiyun 	if (bpf_num_ops	> BPF_MAXINSNS || bpf_num_ops == 0)
196*4882a593Smuzhiyun 		return -EINVAL;
197*4882a593Smuzhiyun 
198*4882a593Smuzhiyun 	bpf_size = bpf_num_ops * sizeof(*bpf_ops);
199*4882a593Smuzhiyun 	if (bpf_size != nla_len(tb[TCA_ACT_BPF_OPS]))
200*4882a593Smuzhiyun 		return -EINVAL;
201*4882a593Smuzhiyun 
202*4882a593Smuzhiyun 	bpf_ops = kmemdup(nla_data(tb[TCA_ACT_BPF_OPS]), bpf_size, GFP_KERNEL);
203*4882a593Smuzhiyun 	if (bpf_ops == NULL)
204*4882a593Smuzhiyun 		return -ENOMEM;
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun 	fprog_tmp.len = bpf_num_ops;
207*4882a593Smuzhiyun 	fprog_tmp.filter = bpf_ops;
208*4882a593Smuzhiyun 
209*4882a593Smuzhiyun 	ret = bpf_prog_create(&fp, &fprog_tmp);
210*4882a593Smuzhiyun 	if (ret < 0) {
211*4882a593Smuzhiyun 		kfree(bpf_ops);
212*4882a593Smuzhiyun 		return ret;
213*4882a593Smuzhiyun 	}
214*4882a593Smuzhiyun 
215*4882a593Smuzhiyun 	cfg->bpf_ops = bpf_ops;
216*4882a593Smuzhiyun 	cfg->bpf_num_ops = bpf_num_ops;
217*4882a593Smuzhiyun 	cfg->filter = fp;
218*4882a593Smuzhiyun 	cfg->is_ebpf = false;
219*4882a593Smuzhiyun 
220*4882a593Smuzhiyun 	return 0;
221*4882a593Smuzhiyun }
222*4882a593Smuzhiyun 
tcf_bpf_init_from_efd(struct nlattr ** tb,struct tcf_bpf_cfg * cfg)223*4882a593Smuzhiyun static int tcf_bpf_init_from_efd(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
224*4882a593Smuzhiyun {
225*4882a593Smuzhiyun 	struct bpf_prog *fp;
226*4882a593Smuzhiyun 	char *name = NULL;
227*4882a593Smuzhiyun 	u32 bpf_fd;
228*4882a593Smuzhiyun 
229*4882a593Smuzhiyun 	bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]);
230*4882a593Smuzhiyun 
231*4882a593Smuzhiyun 	fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT);
232*4882a593Smuzhiyun 	if (IS_ERR(fp))
233*4882a593Smuzhiyun 		return PTR_ERR(fp);
234*4882a593Smuzhiyun 
235*4882a593Smuzhiyun 	if (tb[TCA_ACT_BPF_NAME]) {
236*4882a593Smuzhiyun 		name = nla_memdup(tb[TCA_ACT_BPF_NAME], GFP_KERNEL);
237*4882a593Smuzhiyun 		if (!name) {
238*4882a593Smuzhiyun 			bpf_prog_put(fp);
239*4882a593Smuzhiyun 			return -ENOMEM;
240*4882a593Smuzhiyun 		}
241*4882a593Smuzhiyun 	}
242*4882a593Smuzhiyun 
243*4882a593Smuzhiyun 	cfg->bpf_name = name;
244*4882a593Smuzhiyun 	cfg->filter = fp;
245*4882a593Smuzhiyun 	cfg->is_ebpf = true;
246*4882a593Smuzhiyun 
247*4882a593Smuzhiyun 	return 0;
248*4882a593Smuzhiyun }
249*4882a593Smuzhiyun 
tcf_bpf_cfg_cleanup(const struct tcf_bpf_cfg * cfg)250*4882a593Smuzhiyun static void tcf_bpf_cfg_cleanup(const struct tcf_bpf_cfg *cfg)
251*4882a593Smuzhiyun {
252*4882a593Smuzhiyun 	struct bpf_prog *filter = cfg->filter;
253*4882a593Smuzhiyun 
254*4882a593Smuzhiyun 	if (filter) {
255*4882a593Smuzhiyun 		if (cfg->is_ebpf)
256*4882a593Smuzhiyun 			bpf_prog_put(filter);
257*4882a593Smuzhiyun 		else
258*4882a593Smuzhiyun 			bpf_prog_destroy(filter);
259*4882a593Smuzhiyun 	}
260*4882a593Smuzhiyun 
261*4882a593Smuzhiyun 	kfree(cfg->bpf_ops);
262*4882a593Smuzhiyun 	kfree(cfg->bpf_name);
263*4882a593Smuzhiyun }
264*4882a593Smuzhiyun 
tcf_bpf_prog_fill_cfg(const struct tcf_bpf * prog,struct tcf_bpf_cfg * cfg)265*4882a593Smuzhiyun static void tcf_bpf_prog_fill_cfg(const struct tcf_bpf *prog,
266*4882a593Smuzhiyun 				  struct tcf_bpf_cfg *cfg)
267*4882a593Smuzhiyun {
268*4882a593Smuzhiyun 	cfg->is_ebpf = tcf_bpf_is_ebpf(prog);
269*4882a593Smuzhiyun 	/* updates to prog->filter are prevented, since it's called either
270*4882a593Smuzhiyun 	 * with tcf lock or during final cleanup in rcu callback
271*4882a593Smuzhiyun 	 */
272*4882a593Smuzhiyun 	cfg->filter = rcu_dereference_protected(prog->filter, 1);
273*4882a593Smuzhiyun 
274*4882a593Smuzhiyun 	cfg->bpf_ops = prog->bpf_ops;
275*4882a593Smuzhiyun 	cfg->bpf_name = prog->bpf_name;
276*4882a593Smuzhiyun }
277*4882a593Smuzhiyun 
tcf_bpf_init(struct net * net,struct nlattr * nla,struct nlattr * est,struct tc_action ** act,int replace,int bind,bool rtnl_held,struct tcf_proto * tp,u32 flags,struct netlink_ext_ack * extack)278*4882a593Smuzhiyun static int tcf_bpf_init(struct net *net, struct nlattr *nla,
279*4882a593Smuzhiyun 			struct nlattr *est, struct tc_action **act,
280*4882a593Smuzhiyun 			int replace, int bind, bool rtnl_held,
281*4882a593Smuzhiyun 			struct tcf_proto *tp, u32 flags,
282*4882a593Smuzhiyun 			struct netlink_ext_ack *extack)
283*4882a593Smuzhiyun {
284*4882a593Smuzhiyun 	struct tc_action_net *tn = net_generic(net, bpf_net_id);
285*4882a593Smuzhiyun 	struct nlattr *tb[TCA_ACT_BPF_MAX + 1];
286*4882a593Smuzhiyun 	struct tcf_chain *goto_ch = NULL;
287*4882a593Smuzhiyun 	struct tcf_bpf_cfg cfg, old;
288*4882a593Smuzhiyun 	struct tc_act_bpf *parm;
289*4882a593Smuzhiyun 	struct tcf_bpf *prog;
290*4882a593Smuzhiyun 	bool is_bpf, is_ebpf;
291*4882a593Smuzhiyun 	int ret, res = 0;
292*4882a593Smuzhiyun 	u32 index;
293*4882a593Smuzhiyun 
294*4882a593Smuzhiyun 	if (!nla)
295*4882a593Smuzhiyun 		return -EINVAL;
296*4882a593Smuzhiyun 
297*4882a593Smuzhiyun 	ret = nla_parse_nested_deprecated(tb, TCA_ACT_BPF_MAX, nla,
298*4882a593Smuzhiyun 					  act_bpf_policy, NULL);
299*4882a593Smuzhiyun 	if (ret < 0)
300*4882a593Smuzhiyun 		return ret;
301*4882a593Smuzhiyun 
302*4882a593Smuzhiyun 	if (!tb[TCA_ACT_BPF_PARMS])
303*4882a593Smuzhiyun 		return -EINVAL;
304*4882a593Smuzhiyun 
305*4882a593Smuzhiyun 	parm = nla_data(tb[TCA_ACT_BPF_PARMS]);
306*4882a593Smuzhiyun 	index = parm->index;
307*4882a593Smuzhiyun 	ret = tcf_idr_check_alloc(tn, &index, act, bind);
308*4882a593Smuzhiyun 	if (!ret) {
309*4882a593Smuzhiyun 		ret = tcf_idr_create(tn, index, est, act,
310*4882a593Smuzhiyun 				     &act_bpf_ops, bind, true, 0);
311*4882a593Smuzhiyun 		if (ret < 0) {
312*4882a593Smuzhiyun 			tcf_idr_cleanup(tn, index);
313*4882a593Smuzhiyun 			return ret;
314*4882a593Smuzhiyun 		}
315*4882a593Smuzhiyun 
316*4882a593Smuzhiyun 		res = ACT_P_CREATED;
317*4882a593Smuzhiyun 	} else if (ret > 0) {
318*4882a593Smuzhiyun 		/* Don't override defaults. */
319*4882a593Smuzhiyun 		if (bind)
320*4882a593Smuzhiyun 			return 0;
321*4882a593Smuzhiyun 
322*4882a593Smuzhiyun 		if (!replace) {
323*4882a593Smuzhiyun 			tcf_idr_release(*act, bind);
324*4882a593Smuzhiyun 			return -EEXIST;
325*4882a593Smuzhiyun 		}
326*4882a593Smuzhiyun 	} else {
327*4882a593Smuzhiyun 		return ret;
328*4882a593Smuzhiyun 	}
329*4882a593Smuzhiyun 
330*4882a593Smuzhiyun 	ret = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack);
331*4882a593Smuzhiyun 	if (ret < 0)
332*4882a593Smuzhiyun 		goto release_idr;
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun 	is_bpf = tb[TCA_ACT_BPF_OPS_LEN] && tb[TCA_ACT_BPF_OPS];
335*4882a593Smuzhiyun 	is_ebpf = tb[TCA_ACT_BPF_FD];
336*4882a593Smuzhiyun 
337*4882a593Smuzhiyun 	if ((!is_bpf && !is_ebpf) || (is_bpf && is_ebpf)) {
338*4882a593Smuzhiyun 		ret = -EINVAL;
339*4882a593Smuzhiyun 		goto put_chain;
340*4882a593Smuzhiyun 	}
341*4882a593Smuzhiyun 
342*4882a593Smuzhiyun 	memset(&cfg, 0, sizeof(cfg));
343*4882a593Smuzhiyun 
344*4882a593Smuzhiyun 	ret = is_bpf ? tcf_bpf_init_from_ops(tb, &cfg) :
345*4882a593Smuzhiyun 		       tcf_bpf_init_from_efd(tb, &cfg);
346*4882a593Smuzhiyun 	if (ret < 0)
347*4882a593Smuzhiyun 		goto put_chain;
348*4882a593Smuzhiyun 
349*4882a593Smuzhiyun 	prog = to_bpf(*act);
350*4882a593Smuzhiyun 
351*4882a593Smuzhiyun 	spin_lock_bh(&prog->tcf_lock);
352*4882a593Smuzhiyun 	if (res != ACT_P_CREATED)
353*4882a593Smuzhiyun 		tcf_bpf_prog_fill_cfg(prog, &old);
354*4882a593Smuzhiyun 
355*4882a593Smuzhiyun 	prog->bpf_ops = cfg.bpf_ops;
356*4882a593Smuzhiyun 	prog->bpf_name = cfg.bpf_name;
357*4882a593Smuzhiyun 
358*4882a593Smuzhiyun 	if (cfg.bpf_num_ops)
359*4882a593Smuzhiyun 		prog->bpf_num_ops = cfg.bpf_num_ops;
360*4882a593Smuzhiyun 
361*4882a593Smuzhiyun 	goto_ch = tcf_action_set_ctrlact(*act, parm->action, goto_ch);
362*4882a593Smuzhiyun 	rcu_assign_pointer(prog->filter, cfg.filter);
363*4882a593Smuzhiyun 	spin_unlock_bh(&prog->tcf_lock);
364*4882a593Smuzhiyun 
365*4882a593Smuzhiyun 	if (goto_ch)
366*4882a593Smuzhiyun 		tcf_chain_put_by_act(goto_ch);
367*4882a593Smuzhiyun 
368*4882a593Smuzhiyun 	if (res != ACT_P_CREATED) {
369*4882a593Smuzhiyun 		/* make sure the program being replaced is no longer executing */
370*4882a593Smuzhiyun 		synchronize_rcu();
371*4882a593Smuzhiyun 		tcf_bpf_cfg_cleanup(&old);
372*4882a593Smuzhiyun 	}
373*4882a593Smuzhiyun 
374*4882a593Smuzhiyun 	return res;
375*4882a593Smuzhiyun 
376*4882a593Smuzhiyun put_chain:
377*4882a593Smuzhiyun 	if (goto_ch)
378*4882a593Smuzhiyun 		tcf_chain_put_by_act(goto_ch);
379*4882a593Smuzhiyun 
380*4882a593Smuzhiyun release_idr:
381*4882a593Smuzhiyun 	tcf_idr_release(*act, bind);
382*4882a593Smuzhiyun 	return ret;
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun 
tcf_bpf_cleanup(struct tc_action * act)385*4882a593Smuzhiyun static void tcf_bpf_cleanup(struct tc_action *act)
386*4882a593Smuzhiyun {
387*4882a593Smuzhiyun 	struct tcf_bpf_cfg tmp;
388*4882a593Smuzhiyun 
389*4882a593Smuzhiyun 	tcf_bpf_prog_fill_cfg(to_bpf(act), &tmp);
390*4882a593Smuzhiyun 	tcf_bpf_cfg_cleanup(&tmp);
391*4882a593Smuzhiyun }
392*4882a593Smuzhiyun 
tcf_bpf_walker(struct net * net,struct sk_buff * skb,struct netlink_callback * cb,int type,const struct tc_action_ops * ops,struct netlink_ext_ack * extack)393*4882a593Smuzhiyun static int tcf_bpf_walker(struct net *net, struct sk_buff *skb,
394*4882a593Smuzhiyun 			  struct netlink_callback *cb, int type,
395*4882a593Smuzhiyun 			  const struct tc_action_ops *ops,
396*4882a593Smuzhiyun 			  struct netlink_ext_ack *extack)
397*4882a593Smuzhiyun {
398*4882a593Smuzhiyun 	struct tc_action_net *tn = net_generic(net, bpf_net_id);
399*4882a593Smuzhiyun 
400*4882a593Smuzhiyun 	return tcf_generic_walker(tn, skb, cb, type, ops, extack);
401*4882a593Smuzhiyun }
402*4882a593Smuzhiyun 
tcf_bpf_search(struct net * net,struct tc_action ** a,u32 index)403*4882a593Smuzhiyun static int tcf_bpf_search(struct net *net, struct tc_action **a, u32 index)
404*4882a593Smuzhiyun {
405*4882a593Smuzhiyun 	struct tc_action_net *tn = net_generic(net, bpf_net_id);
406*4882a593Smuzhiyun 
407*4882a593Smuzhiyun 	return tcf_idr_search(tn, a, index);
408*4882a593Smuzhiyun }
409*4882a593Smuzhiyun 
410*4882a593Smuzhiyun static struct tc_action_ops act_bpf_ops __read_mostly = {
411*4882a593Smuzhiyun 	.kind		=	"bpf",
412*4882a593Smuzhiyun 	.id		=	TCA_ID_BPF,
413*4882a593Smuzhiyun 	.owner		=	THIS_MODULE,
414*4882a593Smuzhiyun 	.act		=	tcf_bpf_act,
415*4882a593Smuzhiyun 	.dump		=	tcf_bpf_dump,
416*4882a593Smuzhiyun 	.cleanup	=	tcf_bpf_cleanup,
417*4882a593Smuzhiyun 	.init		=	tcf_bpf_init,
418*4882a593Smuzhiyun 	.walk		=	tcf_bpf_walker,
419*4882a593Smuzhiyun 	.lookup		=	tcf_bpf_search,
420*4882a593Smuzhiyun 	.size		=	sizeof(struct tcf_bpf),
421*4882a593Smuzhiyun };
422*4882a593Smuzhiyun 
bpf_init_net(struct net * net)423*4882a593Smuzhiyun static __net_init int bpf_init_net(struct net *net)
424*4882a593Smuzhiyun {
425*4882a593Smuzhiyun 	struct tc_action_net *tn = net_generic(net, bpf_net_id);
426*4882a593Smuzhiyun 
427*4882a593Smuzhiyun 	return tc_action_net_init(net, tn, &act_bpf_ops);
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun 
bpf_exit_net(struct list_head * net_list)430*4882a593Smuzhiyun static void __net_exit bpf_exit_net(struct list_head *net_list)
431*4882a593Smuzhiyun {
432*4882a593Smuzhiyun 	tc_action_net_exit(net_list, bpf_net_id);
433*4882a593Smuzhiyun }
434*4882a593Smuzhiyun 
435*4882a593Smuzhiyun static struct pernet_operations bpf_net_ops = {
436*4882a593Smuzhiyun 	.init = bpf_init_net,
437*4882a593Smuzhiyun 	.exit_batch = bpf_exit_net,
438*4882a593Smuzhiyun 	.id   = &bpf_net_id,
439*4882a593Smuzhiyun 	.size = sizeof(struct tc_action_net),
440*4882a593Smuzhiyun };
441*4882a593Smuzhiyun 
bpf_init_module(void)442*4882a593Smuzhiyun static int __init bpf_init_module(void)
443*4882a593Smuzhiyun {
444*4882a593Smuzhiyun 	return tcf_register_action(&act_bpf_ops, &bpf_net_ops);
445*4882a593Smuzhiyun }
446*4882a593Smuzhiyun 
bpf_cleanup_module(void)447*4882a593Smuzhiyun static void __exit bpf_cleanup_module(void)
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun 	tcf_unregister_action(&act_bpf_ops, &bpf_net_ops);
450*4882a593Smuzhiyun }
451*4882a593Smuzhiyun 
452*4882a593Smuzhiyun module_init(bpf_init_module);
453*4882a593Smuzhiyun module_exit(bpf_cleanup_module);
454*4882a593Smuzhiyun 
455*4882a593Smuzhiyun MODULE_AUTHOR("Jiri Pirko <jiri@resnulli.us>");
456*4882a593Smuzhiyun MODULE_DESCRIPTION("TC BPF based action");
457*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
458