1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Copyright (c) 2015 Jiri Pirko <jiri@resnulli.us>
4*4882a593Smuzhiyun */
5*4882a593Smuzhiyun
6*4882a593Smuzhiyun #include <linux/module.h>
7*4882a593Smuzhiyun #include <linux/init.h>
8*4882a593Smuzhiyun #include <linux/kernel.h>
9*4882a593Smuzhiyun #include <linux/skbuff.h>
10*4882a593Smuzhiyun #include <linux/rtnetlink.h>
11*4882a593Smuzhiyun #include <linux/filter.h>
12*4882a593Smuzhiyun #include <linux/bpf.h>
13*4882a593Smuzhiyun
14*4882a593Smuzhiyun #include <net/netlink.h>
15*4882a593Smuzhiyun #include <net/sock.h>
16*4882a593Smuzhiyun #include <net/pkt_sched.h>
17*4882a593Smuzhiyun #include <net/pkt_cls.h>
18*4882a593Smuzhiyun
19*4882a593Smuzhiyun #include <linux/tc_act/tc_bpf.h>
20*4882a593Smuzhiyun #include <net/tc_act/tc_bpf.h>
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun #define ACT_BPF_NAME_LEN 256
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun struct tcf_bpf_cfg {
25*4882a593Smuzhiyun struct bpf_prog *filter;
26*4882a593Smuzhiyun struct sock_filter *bpf_ops;
27*4882a593Smuzhiyun const char *bpf_name;
28*4882a593Smuzhiyun u16 bpf_num_ops;
29*4882a593Smuzhiyun bool is_ebpf;
30*4882a593Smuzhiyun };
31*4882a593Smuzhiyun
32*4882a593Smuzhiyun static unsigned int bpf_net_id;
33*4882a593Smuzhiyun static struct tc_action_ops act_bpf_ops;
34*4882a593Smuzhiyun
tcf_bpf_act(struct sk_buff * skb,const struct tc_action * act,struct tcf_result * res)35*4882a593Smuzhiyun static int tcf_bpf_act(struct sk_buff *skb, const struct tc_action *act,
36*4882a593Smuzhiyun struct tcf_result *res)
37*4882a593Smuzhiyun {
38*4882a593Smuzhiyun bool at_ingress = skb_at_tc_ingress(skb);
39*4882a593Smuzhiyun struct tcf_bpf *prog = to_bpf(act);
40*4882a593Smuzhiyun struct bpf_prog *filter;
41*4882a593Smuzhiyun int action, filter_res;
42*4882a593Smuzhiyun
43*4882a593Smuzhiyun tcf_lastuse_update(&prog->tcf_tm);
44*4882a593Smuzhiyun bstats_cpu_update(this_cpu_ptr(prog->common.cpu_bstats), skb);
45*4882a593Smuzhiyun
46*4882a593Smuzhiyun rcu_read_lock();
47*4882a593Smuzhiyun filter = rcu_dereference(prog->filter);
48*4882a593Smuzhiyun if (at_ingress) {
49*4882a593Smuzhiyun __skb_push(skb, skb->mac_len);
50*4882a593Smuzhiyun bpf_compute_data_pointers(skb);
51*4882a593Smuzhiyun filter_res = BPF_PROG_RUN(filter, skb);
52*4882a593Smuzhiyun __skb_pull(skb, skb->mac_len);
53*4882a593Smuzhiyun } else {
54*4882a593Smuzhiyun bpf_compute_data_pointers(skb);
55*4882a593Smuzhiyun filter_res = BPF_PROG_RUN(filter, skb);
56*4882a593Smuzhiyun }
57*4882a593Smuzhiyun if (skb_sk_is_prefetched(skb) && filter_res != TC_ACT_OK)
58*4882a593Smuzhiyun skb_orphan(skb);
59*4882a593Smuzhiyun rcu_read_unlock();
60*4882a593Smuzhiyun
61*4882a593Smuzhiyun /* A BPF program may overwrite the default action opcode.
62*4882a593Smuzhiyun * Similarly as in cls_bpf, if filter_res == -1 we use the
63*4882a593Smuzhiyun * default action specified from tc.
64*4882a593Smuzhiyun *
65*4882a593Smuzhiyun * In case a different well-known TC_ACT opcode has been
66*4882a593Smuzhiyun * returned, it will overwrite the default one.
67*4882a593Smuzhiyun *
68*4882a593Smuzhiyun * For everything else that is unkown, TC_ACT_UNSPEC is
69*4882a593Smuzhiyun * returned.
70*4882a593Smuzhiyun */
71*4882a593Smuzhiyun switch (filter_res) {
72*4882a593Smuzhiyun case TC_ACT_PIPE:
73*4882a593Smuzhiyun case TC_ACT_RECLASSIFY:
74*4882a593Smuzhiyun case TC_ACT_OK:
75*4882a593Smuzhiyun case TC_ACT_REDIRECT:
76*4882a593Smuzhiyun action = filter_res;
77*4882a593Smuzhiyun break;
78*4882a593Smuzhiyun case TC_ACT_SHOT:
79*4882a593Smuzhiyun action = filter_res;
80*4882a593Smuzhiyun qstats_drop_inc(this_cpu_ptr(prog->common.cpu_qstats));
81*4882a593Smuzhiyun break;
82*4882a593Smuzhiyun case TC_ACT_UNSPEC:
83*4882a593Smuzhiyun action = prog->tcf_action;
84*4882a593Smuzhiyun break;
85*4882a593Smuzhiyun default:
86*4882a593Smuzhiyun action = TC_ACT_UNSPEC;
87*4882a593Smuzhiyun break;
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun return action;
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun
tcf_bpf_is_ebpf(const struct tcf_bpf * prog)93*4882a593Smuzhiyun static bool tcf_bpf_is_ebpf(const struct tcf_bpf *prog)
94*4882a593Smuzhiyun {
95*4882a593Smuzhiyun return !prog->bpf_ops;
96*4882a593Smuzhiyun }
97*4882a593Smuzhiyun
tcf_bpf_dump_bpf_info(const struct tcf_bpf * prog,struct sk_buff * skb)98*4882a593Smuzhiyun static int tcf_bpf_dump_bpf_info(const struct tcf_bpf *prog,
99*4882a593Smuzhiyun struct sk_buff *skb)
100*4882a593Smuzhiyun {
101*4882a593Smuzhiyun struct nlattr *nla;
102*4882a593Smuzhiyun
103*4882a593Smuzhiyun if (nla_put_u16(skb, TCA_ACT_BPF_OPS_LEN, prog->bpf_num_ops))
104*4882a593Smuzhiyun return -EMSGSIZE;
105*4882a593Smuzhiyun
106*4882a593Smuzhiyun nla = nla_reserve(skb, TCA_ACT_BPF_OPS, prog->bpf_num_ops *
107*4882a593Smuzhiyun sizeof(struct sock_filter));
108*4882a593Smuzhiyun if (nla == NULL)
109*4882a593Smuzhiyun return -EMSGSIZE;
110*4882a593Smuzhiyun
111*4882a593Smuzhiyun memcpy(nla_data(nla), prog->bpf_ops, nla_len(nla));
112*4882a593Smuzhiyun
113*4882a593Smuzhiyun return 0;
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun
tcf_bpf_dump_ebpf_info(const struct tcf_bpf * prog,struct sk_buff * skb)116*4882a593Smuzhiyun static int tcf_bpf_dump_ebpf_info(const struct tcf_bpf *prog,
117*4882a593Smuzhiyun struct sk_buff *skb)
118*4882a593Smuzhiyun {
119*4882a593Smuzhiyun struct nlattr *nla;
120*4882a593Smuzhiyun
121*4882a593Smuzhiyun if (prog->bpf_name &&
122*4882a593Smuzhiyun nla_put_string(skb, TCA_ACT_BPF_NAME, prog->bpf_name))
123*4882a593Smuzhiyun return -EMSGSIZE;
124*4882a593Smuzhiyun
125*4882a593Smuzhiyun if (nla_put_u32(skb, TCA_ACT_BPF_ID, prog->filter->aux->id))
126*4882a593Smuzhiyun return -EMSGSIZE;
127*4882a593Smuzhiyun
128*4882a593Smuzhiyun nla = nla_reserve(skb, TCA_ACT_BPF_TAG, sizeof(prog->filter->tag));
129*4882a593Smuzhiyun if (nla == NULL)
130*4882a593Smuzhiyun return -EMSGSIZE;
131*4882a593Smuzhiyun
132*4882a593Smuzhiyun memcpy(nla_data(nla), prog->filter->tag, nla_len(nla));
133*4882a593Smuzhiyun
134*4882a593Smuzhiyun return 0;
135*4882a593Smuzhiyun }
136*4882a593Smuzhiyun
tcf_bpf_dump(struct sk_buff * skb,struct tc_action * act,int bind,int ref)137*4882a593Smuzhiyun static int tcf_bpf_dump(struct sk_buff *skb, struct tc_action *act,
138*4882a593Smuzhiyun int bind, int ref)
139*4882a593Smuzhiyun {
140*4882a593Smuzhiyun unsigned char *tp = skb_tail_pointer(skb);
141*4882a593Smuzhiyun struct tcf_bpf *prog = to_bpf(act);
142*4882a593Smuzhiyun struct tc_act_bpf opt = {
143*4882a593Smuzhiyun .index = prog->tcf_index,
144*4882a593Smuzhiyun .refcnt = refcount_read(&prog->tcf_refcnt) - ref,
145*4882a593Smuzhiyun .bindcnt = atomic_read(&prog->tcf_bindcnt) - bind,
146*4882a593Smuzhiyun };
147*4882a593Smuzhiyun struct tcf_t tm;
148*4882a593Smuzhiyun int ret;
149*4882a593Smuzhiyun
150*4882a593Smuzhiyun spin_lock_bh(&prog->tcf_lock);
151*4882a593Smuzhiyun opt.action = prog->tcf_action;
152*4882a593Smuzhiyun if (nla_put(skb, TCA_ACT_BPF_PARMS, sizeof(opt), &opt))
153*4882a593Smuzhiyun goto nla_put_failure;
154*4882a593Smuzhiyun
155*4882a593Smuzhiyun if (tcf_bpf_is_ebpf(prog))
156*4882a593Smuzhiyun ret = tcf_bpf_dump_ebpf_info(prog, skb);
157*4882a593Smuzhiyun else
158*4882a593Smuzhiyun ret = tcf_bpf_dump_bpf_info(prog, skb);
159*4882a593Smuzhiyun if (ret)
160*4882a593Smuzhiyun goto nla_put_failure;
161*4882a593Smuzhiyun
162*4882a593Smuzhiyun tcf_tm_dump(&tm, &prog->tcf_tm);
163*4882a593Smuzhiyun if (nla_put_64bit(skb, TCA_ACT_BPF_TM, sizeof(tm), &tm,
164*4882a593Smuzhiyun TCA_ACT_BPF_PAD))
165*4882a593Smuzhiyun goto nla_put_failure;
166*4882a593Smuzhiyun
167*4882a593Smuzhiyun spin_unlock_bh(&prog->tcf_lock);
168*4882a593Smuzhiyun return skb->len;
169*4882a593Smuzhiyun
170*4882a593Smuzhiyun nla_put_failure:
171*4882a593Smuzhiyun spin_unlock_bh(&prog->tcf_lock);
172*4882a593Smuzhiyun nlmsg_trim(skb, tp);
173*4882a593Smuzhiyun return -1;
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun
176*4882a593Smuzhiyun static const struct nla_policy act_bpf_policy[TCA_ACT_BPF_MAX + 1] = {
177*4882a593Smuzhiyun [TCA_ACT_BPF_PARMS] = { .len = sizeof(struct tc_act_bpf) },
178*4882a593Smuzhiyun [TCA_ACT_BPF_FD] = { .type = NLA_U32 },
179*4882a593Smuzhiyun [TCA_ACT_BPF_NAME] = { .type = NLA_NUL_STRING,
180*4882a593Smuzhiyun .len = ACT_BPF_NAME_LEN },
181*4882a593Smuzhiyun [TCA_ACT_BPF_OPS_LEN] = { .type = NLA_U16 },
182*4882a593Smuzhiyun [TCA_ACT_BPF_OPS] = { .type = NLA_BINARY,
183*4882a593Smuzhiyun .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
184*4882a593Smuzhiyun };
185*4882a593Smuzhiyun
tcf_bpf_init_from_ops(struct nlattr ** tb,struct tcf_bpf_cfg * cfg)186*4882a593Smuzhiyun static int tcf_bpf_init_from_ops(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
187*4882a593Smuzhiyun {
188*4882a593Smuzhiyun struct sock_filter *bpf_ops;
189*4882a593Smuzhiyun struct sock_fprog_kern fprog_tmp;
190*4882a593Smuzhiyun struct bpf_prog *fp;
191*4882a593Smuzhiyun u16 bpf_size, bpf_num_ops;
192*4882a593Smuzhiyun int ret;
193*4882a593Smuzhiyun
194*4882a593Smuzhiyun bpf_num_ops = nla_get_u16(tb[TCA_ACT_BPF_OPS_LEN]);
195*4882a593Smuzhiyun if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0)
196*4882a593Smuzhiyun return -EINVAL;
197*4882a593Smuzhiyun
198*4882a593Smuzhiyun bpf_size = bpf_num_ops * sizeof(*bpf_ops);
199*4882a593Smuzhiyun if (bpf_size != nla_len(tb[TCA_ACT_BPF_OPS]))
200*4882a593Smuzhiyun return -EINVAL;
201*4882a593Smuzhiyun
202*4882a593Smuzhiyun bpf_ops = kmemdup(nla_data(tb[TCA_ACT_BPF_OPS]), bpf_size, GFP_KERNEL);
203*4882a593Smuzhiyun if (bpf_ops == NULL)
204*4882a593Smuzhiyun return -ENOMEM;
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun fprog_tmp.len = bpf_num_ops;
207*4882a593Smuzhiyun fprog_tmp.filter = bpf_ops;
208*4882a593Smuzhiyun
209*4882a593Smuzhiyun ret = bpf_prog_create(&fp, &fprog_tmp);
210*4882a593Smuzhiyun if (ret < 0) {
211*4882a593Smuzhiyun kfree(bpf_ops);
212*4882a593Smuzhiyun return ret;
213*4882a593Smuzhiyun }
214*4882a593Smuzhiyun
215*4882a593Smuzhiyun cfg->bpf_ops = bpf_ops;
216*4882a593Smuzhiyun cfg->bpf_num_ops = bpf_num_ops;
217*4882a593Smuzhiyun cfg->filter = fp;
218*4882a593Smuzhiyun cfg->is_ebpf = false;
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun return 0;
221*4882a593Smuzhiyun }
222*4882a593Smuzhiyun
tcf_bpf_init_from_efd(struct nlattr ** tb,struct tcf_bpf_cfg * cfg)223*4882a593Smuzhiyun static int tcf_bpf_init_from_efd(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
224*4882a593Smuzhiyun {
225*4882a593Smuzhiyun struct bpf_prog *fp;
226*4882a593Smuzhiyun char *name = NULL;
227*4882a593Smuzhiyun u32 bpf_fd;
228*4882a593Smuzhiyun
229*4882a593Smuzhiyun bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]);
230*4882a593Smuzhiyun
231*4882a593Smuzhiyun fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT);
232*4882a593Smuzhiyun if (IS_ERR(fp))
233*4882a593Smuzhiyun return PTR_ERR(fp);
234*4882a593Smuzhiyun
235*4882a593Smuzhiyun if (tb[TCA_ACT_BPF_NAME]) {
236*4882a593Smuzhiyun name = nla_memdup(tb[TCA_ACT_BPF_NAME], GFP_KERNEL);
237*4882a593Smuzhiyun if (!name) {
238*4882a593Smuzhiyun bpf_prog_put(fp);
239*4882a593Smuzhiyun return -ENOMEM;
240*4882a593Smuzhiyun }
241*4882a593Smuzhiyun }
242*4882a593Smuzhiyun
243*4882a593Smuzhiyun cfg->bpf_name = name;
244*4882a593Smuzhiyun cfg->filter = fp;
245*4882a593Smuzhiyun cfg->is_ebpf = true;
246*4882a593Smuzhiyun
247*4882a593Smuzhiyun return 0;
248*4882a593Smuzhiyun }
249*4882a593Smuzhiyun
tcf_bpf_cfg_cleanup(const struct tcf_bpf_cfg * cfg)250*4882a593Smuzhiyun static void tcf_bpf_cfg_cleanup(const struct tcf_bpf_cfg *cfg)
251*4882a593Smuzhiyun {
252*4882a593Smuzhiyun struct bpf_prog *filter = cfg->filter;
253*4882a593Smuzhiyun
254*4882a593Smuzhiyun if (filter) {
255*4882a593Smuzhiyun if (cfg->is_ebpf)
256*4882a593Smuzhiyun bpf_prog_put(filter);
257*4882a593Smuzhiyun else
258*4882a593Smuzhiyun bpf_prog_destroy(filter);
259*4882a593Smuzhiyun }
260*4882a593Smuzhiyun
261*4882a593Smuzhiyun kfree(cfg->bpf_ops);
262*4882a593Smuzhiyun kfree(cfg->bpf_name);
263*4882a593Smuzhiyun }
264*4882a593Smuzhiyun
tcf_bpf_prog_fill_cfg(const struct tcf_bpf * prog,struct tcf_bpf_cfg * cfg)265*4882a593Smuzhiyun static void tcf_bpf_prog_fill_cfg(const struct tcf_bpf *prog,
266*4882a593Smuzhiyun struct tcf_bpf_cfg *cfg)
267*4882a593Smuzhiyun {
268*4882a593Smuzhiyun cfg->is_ebpf = tcf_bpf_is_ebpf(prog);
269*4882a593Smuzhiyun /* updates to prog->filter are prevented, since it's called either
270*4882a593Smuzhiyun * with tcf lock or during final cleanup in rcu callback
271*4882a593Smuzhiyun */
272*4882a593Smuzhiyun cfg->filter = rcu_dereference_protected(prog->filter, 1);
273*4882a593Smuzhiyun
274*4882a593Smuzhiyun cfg->bpf_ops = prog->bpf_ops;
275*4882a593Smuzhiyun cfg->bpf_name = prog->bpf_name;
276*4882a593Smuzhiyun }
277*4882a593Smuzhiyun
tcf_bpf_init(struct net * net,struct nlattr * nla,struct nlattr * est,struct tc_action ** act,int replace,int bind,bool rtnl_held,struct tcf_proto * tp,u32 flags,struct netlink_ext_ack * extack)278*4882a593Smuzhiyun static int tcf_bpf_init(struct net *net, struct nlattr *nla,
279*4882a593Smuzhiyun struct nlattr *est, struct tc_action **act,
280*4882a593Smuzhiyun int replace, int bind, bool rtnl_held,
281*4882a593Smuzhiyun struct tcf_proto *tp, u32 flags,
282*4882a593Smuzhiyun struct netlink_ext_ack *extack)
283*4882a593Smuzhiyun {
284*4882a593Smuzhiyun struct tc_action_net *tn = net_generic(net, bpf_net_id);
285*4882a593Smuzhiyun struct nlattr *tb[TCA_ACT_BPF_MAX + 1];
286*4882a593Smuzhiyun struct tcf_chain *goto_ch = NULL;
287*4882a593Smuzhiyun struct tcf_bpf_cfg cfg, old;
288*4882a593Smuzhiyun struct tc_act_bpf *parm;
289*4882a593Smuzhiyun struct tcf_bpf *prog;
290*4882a593Smuzhiyun bool is_bpf, is_ebpf;
291*4882a593Smuzhiyun int ret, res = 0;
292*4882a593Smuzhiyun u32 index;
293*4882a593Smuzhiyun
294*4882a593Smuzhiyun if (!nla)
295*4882a593Smuzhiyun return -EINVAL;
296*4882a593Smuzhiyun
297*4882a593Smuzhiyun ret = nla_parse_nested_deprecated(tb, TCA_ACT_BPF_MAX, nla,
298*4882a593Smuzhiyun act_bpf_policy, NULL);
299*4882a593Smuzhiyun if (ret < 0)
300*4882a593Smuzhiyun return ret;
301*4882a593Smuzhiyun
302*4882a593Smuzhiyun if (!tb[TCA_ACT_BPF_PARMS])
303*4882a593Smuzhiyun return -EINVAL;
304*4882a593Smuzhiyun
305*4882a593Smuzhiyun parm = nla_data(tb[TCA_ACT_BPF_PARMS]);
306*4882a593Smuzhiyun index = parm->index;
307*4882a593Smuzhiyun ret = tcf_idr_check_alloc(tn, &index, act, bind);
308*4882a593Smuzhiyun if (!ret) {
309*4882a593Smuzhiyun ret = tcf_idr_create(tn, index, est, act,
310*4882a593Smuzhiyun &act_bpf_ops, bind, true, 0);
311*4882a593Smuzhiyun if (ret < 0) {
312*4882a593Smuzhiyun tcf_idr_cleanup(tn, index);
313*4882a593Smuzhiyun return ret;
314*4882a593Smuzhiyun }
315*4882a593Smuzhiyun
316*4882a593Smuzhiyun res = ACT_P_CREATED;
317*4882a593Smuzhiyun } else if (ret > 0) {
318*4882a593Smuzhiyun /* Don't override defaults. */
319*4882a593Smuzhiyun if (bind)
320*4882a593Smuzhiyun return 0;
321*4882a593Smuzhiyun
322*4882a593Smuzhiyun if (!replace) {
323*4882a593Smuzhiyun tcf_idr_release(*act, bind);
324*4882a593Smuzhiyun return -EEXIST;
325*4882a593Smuzhiyun }
326*4882a593Smuzhiyun } else {
327*4882a593Smuzhiyun return ret;
328*4882a593Smuzhiyun }
329*4882a593Smuzhiyun
330*4882a593Smuzhiyun ret = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack);
331*4882a593Smuzhiyun if (ret < 0)
332*4882a593Smuzhiyun goto release_idr;
333*4882a593Smuzhiyun
334*4882a593Smuzhiyun is_bpf = tb[TCA_ACT_BPF_OPS_LEN] && tb[TCA_ACT_BPF_OPS];
335*4882a593Smuzhiyun is_ebpf = tb[TCA_ACT_BPF_FD];
336*4882a593Smuzhiyun
337*4882a593Smuzhiyun if ((!is_bpf && !is_ebpf) || (is_bpf && is_ebpf)) {
338*4882a593Smuzhiyun ret = -EINVAL;
339*4882a593Smuzhiyun goto put_chain;
340*4882a593Smuzhiyun }
341*4882a593Smuzhiyun
342*4882a593Smuzhiyun memset(&cfg, 0, sizeof(cfg));
343*4882a593Smuzhiyun
344*4882a593Smuzhiyun ret = is_bpf ? tcf_bpf_init_from_ops(tb, &cfg) :
345*4882a593Smuzhiyun tcf_bpf_init_from_efd(tb, &cfg);
346*4882a593Smuzhiyun if (ret < 0)
347*4882a593Smuzhiyun goto put_chain;
348*4882a593Smuzhiyun
349*4882a593Smuzhiyun prog = to_bpf(*act);
350*4882a593Smuzhiyun
351*4882a593Smuzhiyun spin_lock_bh(&prog->tcf_lock);
352*4882a593Smuzhiyun if (res != ACT_P_CREATED)
353*4882a593Smuzhiyun tcf_bpf_prog_fill_cfg(prog, &old);
354*4882a593Smuzhiyun
355*4882a593Smuzhiyun prog->bpf_ops = cfg.bpf_ops;
356*4882a593Smuzhiyun prog->bpf_name = cfg.bpf_name;
357*4882a593Smuzhiyun
358*4882a593Smuzhiyun if (cfg.bpf_num_ops)
359*4882a593Smuzhiyun prog->bpf_num_ops = cfg.bpf_num_ops;
360*4882a593Smuzhiyun
361*4882a593Smuzhiyun goto_ch = tcf_action_set_ctrlact(*act, parm->action, goto_ch);
362*4882a593Smuzhiyun rcu_assign_pointer(prog->filter, cfg.filter);
363*4882a593Smuzhiyun spin_unlock_bh(&prog->tcf_lock);
364*4882a593Smuzhiyun
365*4882a593Smuzhiyun if (goto_ch)
366*4882a593Smuzhiyun tcf_chain_put_by_act(goto_ch);
367*4882a593Smuzhiyun
368*4882a593Smuzhiyun if (res != ACT_P_CREATED) {
369*4882a593Smuzhiyun /* make sure the program being replaced is no longer executing */
370*4882a593Smuzhiyun synchronize_rcu();
371*4882a593Smuzhiyun tcf_bpf_cfg_cleanup(&old);
372*4882a593Smuzhiyun }
373*4882a593Smuzhiyun
374*4882a593Smuzhiyun return res;
375*4882a593Smuzhiyun
376*4882a593Smuzhiyun put_chain:
377*4882a593Smuzhiyun if (goto_ch)
378*4882a593Smuzhiyun tcf_chain_put_by_act(goto_ch);
379*4882a593Smuzhiyun
380*4882a593Smuzhiyun release_idr:
381*4882a593Smuzhiyun tcf_idr_release(*act, bind);
382*4882a593Smuzhiyun return ret;
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun
tcf_bpf_cleanup(struct tc_action * act)385*4882a593Smuzhiyun static void tcf_bpf_cleanup(struct tc_action *act)
386*4882a593Smuzhiyun {
387*4882a593Smuzhiyun struct tcf_bpf_cfg tmp;
388*4882a593Smuzhiyun
389*4882a593Smuzhiyun tcf_bpf_prog_fill_cfg(to_bpf(act), &tmp);
390*4882a593Smuzhiyun tcf_bpf_cfg_cleanup(&tmp);
391*4882a593Smuzhiyun }
392*4882a593Smuzhiyun
tcf_bpf_walker(struct net * net,struct sk_buff * skb,struct netlink_callback * cb,int type,const struct tc_action_ops * ops,struct netlink_ext_ack * extack)393*4882a593Smuzhiyun static int tcf_bpf_walker(struct net *net, struct sk_buff *skb,
394*4882a593Smuzhiyun struct netlink_callback *cb, int type,
395*4882a593Smuzhiyun const struct tc_action_ops *ops,
396*4882a593Smuzhiyun struct netlink_ext_ack *extack)
397*4882a593Smuzhiyun {
398*4882a593Smuzhiyun struct tc_action_net *tn = net_generic(net, bpf_net_id);
399*4882a593Smuzhiyun
400*4882a593Smuzhiyun return tcf_generic_walker(tn, skb, cb, type, ops, extack);
401*4882a593Smuzhiyun }
402*4882a593Smuzhiyun
tcf_bpf_search(struct net * net,struct tc_action ** a,u32 index)403*4882a593Smuzhiyun static int tcf_bpf_search(struct net *net, struct tc_action **a, u32 index)
404*4882a593Smuzhiyun {
405*4882a593Smuzhiyun struct tc_action_net *tn = net_generic(net, bpf_net_id);
406*4882a593Smuzhiyun
407*4882a593Smuzhiyun return tcf_idr_search(tn, a, index);
408*4882a593Smuzhiyun }
409*4882a593Smuzhiyun
410*4882a593Smuzhiyun static struct tc_action_ops act_bpf_ops __read_mostly = {
411*4882a593Smuzhiyun .kind = "bpf",
412*4882a593Smuzhiyun .id = TCA_ID_BPF,
413*4882a593Smuzhiyun .owner = THIS_MODULE,
414*4882a593Smuzhiyun .act = tcf_bpf_act,
415*4882a593Smuzhiyun .dump = tcf_bpf_dump,
416*4882a593Smuzhiyun .cleanup = tcf_bpf_cleanup,
417*4882a593Smuzhiyun .init = tcf_bpf_init,
418*4882a593Smuzhiyun .walk = tcf_bpf_walker,
419*4882a593Smuzhiyun .lookup = tcf_bpf_search,
420*4882a593Smuzhiyun .size = sizeof(struct tcf_bpf),
421*4882a593Smuzhiyun };
422*4882a593Smuzhiyun
bpf_init_net(struct net * net)423*4882a593Smuzhiyun static __net_init int bpf_init_net(struct net *net)
424*4882a593Smuzhiyun {
425*4882a593Smuzhiyun struct tc_action_net *tn = net_generic(net, bpf_net_id);
426*4882a593Smuzhiyun
427*4882a593Smuzhiyun return tc_action_net_init(net, tn, &act_bpf_ops);
428*4882a593Smuzhiyun }
429*4882a593Smuzhiyun
bpf_exit_net(struct list_head * net_list)430*4882a593Smuzhiyun static void __net_exit bpf_exit_net(struct list_head *net_list)
431*4882a593Smuzhiyun {
432*4882a593Smuzhiyun tc_action_net_exit(net_list, bpf_net_id);
433*4882a593Smuzhiyun }
434*4882a593Smuzhiyun
435*4882a593Smuzhiyun static struct pernet_operations bpf_net_ops = {
436*4882a593Smuzhiyun .init = bpf_init_net,
437*4882a593Smuzhiyun .exit_batch = bpf_exit_net,
438*4882a593Smuzhiyun .id = &bpf_net_id,
439*4882a593Smuzhiyun .size = sizeof(struct tc_action_net),
440*4882a593Smuzhiyun };
441*4882a593Smuzhiyun
bpf_init_module(void)442*4882a593Smuzhiyun static int __init bpf_init_module(void)
443*4882a593Smuzhiyun {
444*4882a593Smuzhiyun return tcf_register_action(&act_bpf_ops, &bpf_net_ops);
445*4882a593Smuzhiyun }
446*4882a593Smuzhiyun
bpf_cleanup_module(void)447*4882a593Smuzhiyun static void __exit bpf_cleanup_module(void)
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun tcf_unregister_action(&act_bpf_ops, &bpf_net_ops);
450*4882a593Smuzhiyun }
451*4882a593Smuzhiyun
452*4882a593Smuzhiyun module_init(bpf_init_module);
453*4882a593Smuzhiyun module_exit(bpf_cleanup_module);
454*4882a593Smuzhiyun
455*4882a593Smuzhiyun MODULE_AUTHOR("Jiri Pirko <jiri@resnulli.us>");
456*4882a593Smuzhiyun MODULE_DESCRIPTION("TC BPF based action");
457*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
458