xref: /kernel/linux/linux-5.10/net/sched/cls_bpf.c (revision 8c2ecf20)
18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * Berkeley Packet Filter based traffic classifier
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * Might be used to classify traffic through flexible, user-defined and
68c2ecf20Sopenharmony_ci * possibly JIT-ed BPF filters for traffic control as an alternative to
78c2ecf20Sopenharmony_ci * ematches.
88c2ecf20Sopenharmony_ci *
98c2ecf20Sopenharmony_ci * (C) 2013 Daniel Borkmann <dborkman@redhat.com>
108c2ecf20Sopenharmony_ci */
118c2ecf20Sopenharmony_ci
128c2ecf20Sopenharmony_ci#include <linux/module.h>
138c2ecf20Sopenharmony_ci#include <linux/types.h>
148c2ecf20Sopenharmony_ci#include <linux/skbuff.h>
158c2ecf20Sopenharmony_ci#include <linux/filter.h>
168c2ecf20Sopenharmony_ci#include <linux/bpf.h>
178c2ecf20Sopenharmony_ci#include <linux/idr.h>
188c2ecf20Sopenharmony_ci
198c2ecf20Sopenharmony_ci#include <net/rtnetlink.h>
208c2ecf20Sopenharmony_ci#include <net/pkt_cls.h>
218c2ecf20Sopenharmony_ci#include <net/sock.h>
228c2ecf20Sopenharmony_ci
238c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
248c2ecf20Sopenharmony_ciMODULE_AUTHOR("Daniel Borkmann <dborkman@redhat.com>");
258c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("TC BPF based classifier");
268c2ecf20Sopenharmony_ci
278c2ecf20Sopenharmony_ci#define CLS_BPF_NAME_LEN	256
288c2ecf20Sopenharmony_ci#define CLS_BPF_SUPPORTED_GEN_FLAGS		\
298c2ecf20Sopenharmony_ci	(TCA_CLS_FLAGS_SKIP_HW | TCA_CLS_FLAGS_SKIP_SW)
308c2ecf20Sopenharmony_ci
318c2ecf20Sopenharmony_cistruct cls_bpf_head {
328c2ecf20Sopenharmony_ci	struct list_head plist;
338c2ecf20Sopenharmony_ci	struct idr handle_idr;
348c2ecf20Sopenharmony_ci	struct rcu_head rcu;
358c2ecf20Sopenharmony_ci};
368c2ecf20Sopenharmony_ci
378c2ecf20Sopenharmony_cistruct cls_bpf_prog {
388c2ecf20Sopenharmony_ci	struct bpf_prog *filter;
398c2ecf20Sopenharmony_ci	struct list_head link;
408c2ecf20Sopenharmony_ci	struct tcf_result res;
418c2ecf20Sopenharmony_ci	bool exts_integrated;
428c2ecf20Sopenharmony_ci	u32 gen_flags;
438c2ecf20Sopenharmony_ci	unsigned int in_hw_count;
448c2ecf20Sopenharmony_ci	struct tcf_exts exts;
458c2ecf20Sopenharmony_ci	u32 handle;
468c2ecf20Sopenharmony_ci	u16 bpf_num_ops;
478c2ecf20Sopenharmony_ci	struct sock_filter *bpf_ops;
488c2ecf20Sopenharmony_ci	const char *bpf_name;
498c2ecf20Sopenharmony_ci	struct tcf_proto *tp;
508c2ecf20Sopenharmony_ci	struct rcu_work rwork;
518c2ecf20Sopenharmony_ci};
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_cistatic const struct nla_policy bpf_policy[TCA_BPF_MAX + 1] = {
548c2ecf20Sopenharmony_ci	[TCA_BPF_CLASSID]	= { .type = NLA_U32 },
558c2ecf20Sopenharmony_ci	[TCA_BPF_FLAGS]		= { .type = NLA_U32 },
568c2ecf20Sopenharmony_ci	[TCA_BPF_FLAGS_GEN]	= { .type = NLA_U32 },
578c2ecf20Sopenharmony_ci	[TCA_BPF_FD]		= { .type = NLA_U32 },
588c2ecf20Sopenharmony_ci	[TCA_BPF_NAME]		= { .type = NLA_NUL_STRING,
598c2ecf20Sopenharmony_ci				    .len = CLS_BPF_NAME_LEN },
608c2ecf20Sopenharmony_ci	[TCA_BPF_OPS_LEN]	= { .type = NLA_U16 },
618c2ecf20Sopenharmony_ci	[TCA_BPF_OPS]		= { .type = NLA_BINARY,
628c2ecf20Sopenharmony_ci				    .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
638c2ecf20Sopenharmony_ci};
648c2ecf20Sopenharmony_ci
658c2ecf20Sopenharmony_cistatic int cls_bpf_exec_opcode(int code)
668c2ecf20Sopenharmony_ci{
678c2ecf20Sopenharmony_ci	switch (code) {
688c2ecf20Sopenharmony_ci	case TC_ACT_OK:
698c2ecf20Sopenharmony_ci	case TC_ACT_SHOT:
708c2ecf20Sopenharmony_ci	case TC_ACT_STOLEN:
718c2ecf20Sopenharmony_ci	case TC_ACT_TRAP:
728c2ecf20Sopenharmony_ci	case TC_ACT_REDIRECT:
738c2ecf20Sopenharmony_ci	case TC_ACT_UNSPEC:
748c2ecf20Sopenharmony_ci		return code;
758c2ecf20Sopenharmony_ci	default:
768c2ecf20Sopenharmony_ci		return TC_ACT_UNSPEC;
778c2ecf20Sopenharmony_ci	}
788c2ecf20Sopenharmony_ci}
798c2ecf20Sopenharmony_ci
808c2ecf20Sopenharmony_cistatic int cls_bpf_classify(struct sk_buff *skb, const struct tcf_proto *tp,
818c2ecf20Sopenharmony_ci			    struct tcf_result *res)
828c2ecf20Sopenharmony_ci{
838c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rcu_dereference_bh(tp->root);
848c2ecf20Sopenharmony_ci	bool at_ingress = skb_at_tc_ingress(skb);
858c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog;
868c2ecf20Sopenharmony_ci	int ret = -1;
878c2ecf20Sopenharmony_ci
888c2ecf20Sopenharmony_ci	/* Needed here for accessing maps. */
898c2ecf20Sopenharmony_ci	rcu_read_lock();
908c2ecf20Sopenharmony_ci	list_for_each_entry_rcu(prog, &head->plist, link) {
918c2ecf20Sopenharmony_ci		int filter_res;
928c2ecf20Sopenharmony_ci
938c2ecf20Sopenharmony_ci		qdisc_skb_cb(skb)->tc_classid = prog->res.classid;
948c2ecf20Sopenharmony_ci
958c2ecf20Sopenharmony_ci		if (tc_skip_sw(prog->gen_flags)) {
968c2ecf20Sopenharmony_ci			filter_res = prog->exts_integrated ? TC_ACT_UNSPEC : 0;
978c2ecf20Sopenharmony_ci		} else if (at_ingress) {
988c2ecf20Sopenharmony_ci			/* It is safe to push/pull even if skb_shared() */
998c2ecf20Sopenharmony_ci			__skb_push(skb, skb->mac_len);
1008c2ecf20Sopenharmony_ci			bpf_compute_data_pointers(skb);
1018c2ecf20Sopenharmony_ci			filter_res = BPF_PROG_RUN(prog->filter, skb);
1028c2ecf20Sopenharmony_ci			__skb_pull(skb, skb->mac_len);
1038c2ecf20Sopenharmony_ci		} else {
1048c2ecf20Sopenharmony_ci			bpf_compute_data_pointers(skb);
1058c2ecf20Sopenharmony_ci			filter_res = BPF_PROG_RUN(prog->filter, skb);
1068c2ecf20Sopenharmony_ci		}
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci		if (prog->exts_integrated) {
1098c2ecf20Sopenharmony_ci			res->class   = 0;
1108c2ecf20Sopenharmony_ci			res->classid = TC_H_MAJ(prog->res.classid) |
1118c2ecf20Sopenharmony_ci				       qdisc_skb_cb(skb)->tc_classid;
1128c2ecf20Sopenharmony_ci
1138c2ecf20Sopenharmony_ci			ret = cls_bpf_exec_opcode(filter_res);
1148c2ecf20Sopenharmony_ci			if (ret == TC_ACT_UNSPEC)
1158c2ecf20Sopenharmony_ci				continue;
1168c2ecf20Sopenharmony_ci			break;
1178c2ecf20Sopenharmony_ci		}
1188c2ecf20Sopenharmony_ci
1198c2ecf20Sopenharmony_ci		if (filter_res == 0)
1208c2ecf20Sopenharmony_ci			continue;
1218c2ecf20Sopenharmony_ci		if (filter_res != -1) {
1228c2ecf20Sopenharmony_ci			res->class   = 0;
1238c2ecf20Sopenharmony_ci			res->classid = filter_res;
1248c2ecf20Sopenharmony_ci		} else {
1258c2ecf20Sopenharmony_ci			*res = prog->res;
1268c2ecf20Sopenharmony_ci		}
1278c2ecf20Sopenharmony_ci
1288c2ecf20Sopenharmony_ci		ret = tcf_exts_exec(skb, &prog->exts, res);
1298c2ecf20Sopenharmony_ci		if (ret < 0)
1308c2ecf20Sopenharmony_ci			continue;
1318c2ecf20Sopenharmony_ci
1328c2ecf20Sopenharmony_ci		break;
1338c2ecf20Sopenharmony_ci	}
1348c2ecf20Sopenharmony_ci	rcu_read_unlock();
1358c2ecf20Sopenharmony_ci
1368c2ecf20Sopenharmony_ci	return ret;
1378c2ecf20Sopenharmony_ci}
1388c2ecf20Sopenharmony_ci
1398c2ecf20Sopenharmony_cistatic bool cls_bpf_is_ebpf(const struct cls_bpf_prog *prog)
1408c2ecf20Sopenharmony_ci{
1418c2ecf20Sopenharmony_ci	return !prog->bpf_ops;
1428c2ecf20Sopenharmony_ci}
1438c2ecf20Sopenharmony_ci
1448c2ecf20Sopenharmony_cistatic int cls_bpf_offload_cmd(struct tcf_proto *tp, struct cls_bpf_prog *prog,
1458c2ecf20Sopenharmony_ci			       struct cls_bpf_prog *oldprog,
1468c2ecf20Sopenharmony_ci			       struct netlink_ext_ack *extack)
1478c2ecf20Sopenharmony_ci{
1488c2ecf20Sopenharmony_ci	struct tcf_block *block = tp->chain->block;
1498c2ecf20Sopenharmony_ci	struct tc_cls_bpf_offload cls_bpf = {};
1508c2ecf20Sopenharmony_ci	struct cls_bpf_prog *obj;
1518c2ecf20Sopenharmony_ci	bool skip_sw;
1528c2ecf20Sopenharmony_ci	int err;
1538c2ecf20Sopenharmony_ci
1548c2ecf20Sopenharmony_ci	skip_sw = prog && tc_skip_sw(prog->gen_flags);
1558c2ecf20Sopenharmony_ci	obj = prog ?: oldprog;
1568c2ecf20Sopenharmony_ci
1578c2ecf20Sopenharmony_ci	tc_cls_common_offload_init(&cls_bpf.common, tp, obj->gen_flags, extack);
1588c2ecf20Sopenharmony_ci	cls_bpf.command = TC_CLSBPF_OFFLOAD;
1598c2ecf20Sopenharmony_ci	cls_bpf.exts = &obj->exts;
1608c2ecf20Sopenharmony_ci	cls_bpf.prog = prog ? prog->filter : NULL;
1618c2ecf20Sopenharmony_ci	cls_bpf.oldprog = oldprog ? oldprog->filter : NULL;
1628c2ecf20Sopenharmony_ci	cls_bpf.name = obj->bpf_name;
1638c2ecf20Sopenharmony_ci	cls_bpf.exts_integrated = obj->exts_integrated;
1648c2ecf20Sopenharmony_ci
1658c2ecf20Sopenharmony_ci	if (oldprog && prog)
1668c2ecf20Sopenharmony_ci		err = tc_setup_cb_replace(block, tp, TC_SETUP_CLSBPF, &cls_bpf,
1678c2ecf20Sopenharmony_ci					  skip_sw, &oldprog->gen_flags,
1688c2ecf20Sopenharmony_ci					  &oldprog->in_hw_count,
1698c2ecf20Sopenharmony_ci					  &prog->gen_flags, &prog->in_hw_count,
1708c2ecf20Sopenharmony_ci					  true);
1718c2ecf20Sopenharmony_ci	else if (prog)
1728c2ecf20Sopenharmony_ci		err = tc_setup_cb_add(block, tp, TC_SETUP_CLSBPF, &cls_bpf,
1738c2ecf20Sopenharmony_ci				      skip_sw, &prog->gen_flags,
1748c2ecf20Sopenharmony_ci				      &prog->in_hw_count, true);
1758c2ecf20Sopenharmony_ci	else
1768c2ecf20Sopenharmony_ci		err = tc_setup_cb_destroy(block, tp, TC_SETUP_CLSBPF, &cls_bpf,
1778c2ecf20Sopenharmony_ci					  skip_sw, &oldprog->gen_flags,
1788c2ecf20Sopenharmony_ci					  &oldprog->in_hw_count, true);
1798c2ecf20Sopenharmony_ci
1808c2ecf20Sopenharmony_ci	if (prog && err) {
1818c2ecf20Sopenharmony_ci		cls_bpf_offload_cmd(tp, oldprog, prog, extack);
1828c2ecf20Sopenharmony_ci		return err;
1838c2ecf20Sopenharmony_ci	}
1848c2ecf20Sopenharmony_ci
1858c2ecf20Sopenharmony_ci	if (prog && skip_sw && !(prog->gen_flags & TCA_CLS_FLAGS_IN_HW))
1868c2ecf20Sopenharmony_ci		return -EINVAL;
1878c2ecf20Sopenharmony_ci
1888c2ecf20Sopenharmony_ci	return 0;
1898c2ecf20Sopenharmony_ci}
1908c2ecf20Sopenharmony_ci
1918c2ecf20Sopenharmony_cistatic u32 cls_bpf_flags(u32 flags)
1928c2ecf20Sopenharmony_ci{
1938c2ecf20Sopenharmony_ci	return flags & CLS_BPF_SUPPORTED_GEN_FLAGS;
1948c2ecf20Sopenharmony_ci}
1958c2ecf20Sopenharmony_ci
1968c2ecf20Sopenharmony_cistatic int cls_bpf_offload(struct tcf_proto *tp, struct cls_bpf_prog *prog,
1978c2ecf20Sopenharmony_ci			   struct cls_bpf_prog *oldprog,
1988c2ecf20Sopenharmony_ci			   struct netlink_ext_ack *extack)
1998c2ecf20Sopenharmony_ci{
2008c2ecf20Sopenharmony_ci	if (prog && oldprog &&
2018c2ecf20Sopenharmony_ci	    cls_bpf_flags(prog->gen_flags) !=
2028c2ecf20Sopenharmony_ci	    cls_bpf_flags(oldprog->gen_flags))
2038c2ecf20Sopenharmony_ci		return -EINVAL;
2048c2ecf20Sopenharmony_ci
2058c2ecf20Sopenharmony_ci	if (prog && tc_skip_hw(prog->gen_flags))
2068c2ecf20Sopenharmony_ci		prog = NULL;
2078c2ecf20Sopenharmony_ci	if (oldprog && tc_skip_hw(oldprog->gen_flags))
2088c2ecf20Sopenharmony_ci		oldprog = NULL;
2098c2ecf20Sopenharmony_ci	if (!prog && !oldprog)
2108c2ecf20Sopenharmony_ci		return 0;
2118c2ecf20Sopenharmony_ci
2128c2ecf20Sopenharmony_ci	return cls_bpf_offload_cmd(tp, prog, oldprog, extack);
2138c2ecf20Sopenharmony_ci}
2148c2ecf20Sopenharmony_ci
2158c2ecf20Sopenharmony_cistatic void cls_bpf_stop_offload(struct tcf_proto *tp,
2168c2ecf20Sopenharmony_ci				 struct cls_bpf_prog *prog,
2178c2ecf20Sopenharmony_ci				 struct netlink_ext_ack *extack)
2188c2ecf20Sopenharmony_ci{
2198c2ecf20Sopenharmony_ci	int err;
2208c2ecf20Sopenharmony_ci
2218c2ecf20Sopenharmony_ci	err = cls_bpf_offload_cmd(tp, NULL, prog, extack);
2228c2ecf20Sopenharmony_ci	if (err)
2238c2ecf20Sopenharmony_ci		pr_err("Stopping hardware offload failed: %d\n", err);
2248c2ecf20Sopenharmony_ci}
2258c2ecf20Sopenharmony_ci
2268c2ecf20Sopenharmony_cistatic void cls_bpf_offload_update_stats(struct tcf_proto *tp,
2278c2ecf20Sopenharmony_ci					 struct cls_bpf_prog *prog)
2288c2ecf20Sopenharmony_ci{
2298c2ecf20Sopenharmony_ci	struct tcf_block *block = tp->chain->block;
2308c2ecf20Sopenharmony_ci	struct tc_cls_bpf_offload cls_bpf = {};
2318c2ecf20Sopenharmony_ci
2328c2ecf20Sopenharmony_ci	tc_cls_common_offload_init(&cls_bpf.common, tp, prog->gen_flags, NULL);
2338c2ecf20Sopenharmony_ci	cls_bpf.command = TC_CLSBPF_STATS;
2348c2ecf20Sopenharmony_ci	cls_bpf.exts = &prog->exts;
2358c2ecf20Sopenharmony_ci	cls_bpf.prog = prog->filter;
2368c2ecf20Sopenharmony_ci	cls_bpf.name = prog->bpf_name;
2378c2ecf20Sopenharmony_ci	cls_bpf.exts_integrated = prog->exts_integrated;
2388c2ecf20Sopenharmony_ci
2398c2ecf20Sopenharmony_ci	tc_setup_cb_call(block, TC_SETUP_CLSBPF, &cls_bpf, false, true);
2408c2ecf20Sopenharmony_ci}
2418c2ecf20Sopenharmony_ci
2428c2ecf20Sopenharmony_cistatic int cls_bpf_init(struct tcf_proto *tp)
2438c2ecf20Sopenharmony_ci{
2448c2ecf20Sopenharmony_ci	struct cls_bpf_head *head;
2458c2ecf20Sopenharmony_ci
2468c2ecf20Sopenharmony_ci	head = kzalloc(sizeof(*head), GFP_KERNEL);
2478c2ecf20Sopenharmony_ci	if (head == NULL)
2488c2ecf20Sopenharmony_ci		return -ENOBUFS;
2498c2ecf20Sopenharmony_ci
2508c2ecf20Sopenharmony_ci	INIT_LIST_HEAD_RCU(&head->plist);
2518c2ecf20Sopenharmony_ci	idr_init(&head->handle_idr);
2528c2ecf20Sopenharmony_ci	rcu_assign_pointer(tp->root, head);
2538c2ecf20Sopenharmony_ci
2548c2ecf20Sopenharmony_ci	return 0;
2558c2ecf20Sopenharmony_ci}
2568c2ecf20Sopenharmony_ci
2578c2ecf20Sopenharmony_cistatic void cls_bpf_free_parms(struct cls_bpf_prog *prog)
2588c2ecf20Sopenharmony_ci{
2598c2ecf20Sopenharmony_ci	if (cls_bpf_is_ebpf(prog))
2608c2ecf20Sopenharmony_ci		bpf_prog_put(prog->filter);
2618c2ecf20Sopenharmony_ci	else
2628c2ecf20Sopenharmony_ci		bpf_prog_destroy(prog->filter);
2638c2ecf20Sopenharmony_ci
2648c2ecf20Sopenharmony_ci	kfree(prog->bpf_name);
2658c2ecf20Sopenharmony_ci	kfree(prog->bpf_ops);
2668c2ecf20Sopenharmony_ci}
2678c2ecf20Sopenharmony_ci
2688c2ecf20Sopenharmony_cistatic void __cls_bpf_delete_prog(struct cls_bpf_prog *prog)
2698c2ecf20Sopenharmony_ci{
2708c2ecf20Sopenharmony_ci	tcf_exts_destroy(&prog->exts);
2718c2ecf20Sopenharmony_ci	tcf_exts_put_net(&prog->exts);
2728c2ecf20Sopenharmony_ci
2738c2ecf20Sopenharmony_ci	cls_bpf_free_parms(prog);
2748c2ecf20Sopenharmony_ci	kfree(prog);
2758c2ecf20Sopenharmony_ci}
2768c2ecf20Sopenharmony_ci
2778c2ecf20Sopenharmony_cistatic void cls_bpf_delete_prog_work(struct work_struct *work)
2788c2ecf20Sopenharmony_ci{
2798c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog = container_of(to_rcu_work(work),
2808c2ecf20Sopenharmony_ci						 struct cls_bpf_prog,
2818c2ecf20Sopenharmony_ci						 rwork);
2828c2ecf20Sopenharmony_ci	rtnl_lock();
2838c2ecf20Sopenharmony_ci	__cls_bpf_delete_prog(prog);
2848c2ecf20Sopenharmony_ci	rtnl_unlock();
2858c2ecf20Sopenharmony_ci}
2868c2ecf20Sopenharmony_ci
2878c2ecf20Sopenharmony_cistatic void __cls_bpf_delete(struct tcf_proto *tp, struct cls_bpf_prog *prog,
2888c2ecf20Sopenharmony_ci			     struct netlink_ext_ack *extack)
2898c2ecf20Sopenharmony_ci{
2908c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
2918c2ecf20Sopenharmony_ci
2928c2ecf20Sopenharmony_ci	idr_remove(&head->handle_idr, prog->handle);
2938c2ecf20Sopenharmony_ci	cls_bpf_stop_offload(tp, prog, extack);
2948c2ecf20Sopenharmony_ci	list_del_rcu(&prog->link);
2958c2ecf20Sopenharmony_ci	tcf_unbind_filter(tp, &prog->res);
2968c2ecf20Sopenharmony_ci	if (tcf_exts_get_net(&prog->exts))
2978c2ecf20Sopenharmony_ci		tcf_queue_work(&prog->rwork, cls_bpf_delete_prog_work);
2988c2ecf20Sopenharmony_ci	else
2998c2ecf20Sopenharmony_ci		__cls_bpf_delete_prog(prog);
3008c2ecf20Sopenharmony_ci}
3018c2ecf20Sopenharmony_ci
3028c2ecf20Sopenharmony_cistatic int cls_bpf_delete(struct tcf_proto *tp, void *arg, bool *last,
3038c2ecf20Sopenharmony_ci			  bool rtnl_held, struct netlink_ext_ack *extack)
3048c2ecf20Sopenharmony_ci{
3058c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
3068c2ecf20Sopenharmony_ci
3078c2ecf20Sopenharmony_ci	__cls_bpf_delete(tp, arg, extack);
3088c2ecf20Sopenharmony_ci	*last = list_empty(&head->plist);
3098c2ecf20Sopenharmony_ci	return 0;
3108c2ecf20Sopenharmony_ci}
3118c2ecf20Sopenharmony_ci
3128c2ecf20Sopenharmony_cistatic void cls_bpf_destroy(struct tcf_proto *tp, bool rtnl_held,
3138c2ecf20Sopenharmony_ci			    struct netlink_ext_ack *extack)
3148c2ecf20Sopenharmony_ci{
3158c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
3168c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog, *tmp;
3178c2ecf20Sopenharmony_ci
3188c2ecf20Sopenharmony_ci	list_for_each_entry_safe(prog, tmp, &head->plist, link)
3198c2ecf20Sopenharmony_ci		__cls_bpf_delete(tp, prog, extack);
3208c2ecf20Sopenharmony_ci
3218c2ecf20Sopenharmony_ci	idr_destroy(&head->handle_idr);
3228c2ecf20Sopenharmony_ci	kfree_rcu(head, rcu);
3238c2ecf20Sopenharmony_ci}
3248c2ecf20Sopenharmony_ci
3258c2ecf20Sopenharmony_cistatic void *cls_bpf_get(struct tcf_proto *tp, u32 handle)
3268c2ecf20Sopenharmony_ci{
3278c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
3288c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog;
3298c2ecf20Sopenharmony_ci
3308c2ecf20Sopenharmony_ci	list_for_each_entry(prog, &head->plist, link) {
3318c2ecf20Sopenharmony_ci		if (prog->handle == handle)
3328c2ecf20Sopenharmony_ci			return prog;
3338c2ecf20Sopenharmony_ci	}
3348c2ecf20Sopenharmony_ci
3358c2ecf20Sopenharmony_ci	return NULL;
3368c2ecf20Sopenharmony_ci}
3378c2ecf20Sopenharmony_ci
3388c2ecf20Sopenharmony_cistatic int cls_bpf_prog_from_ops(struct nlattr **tb, struct cls_bpf_prog *prog)
3398c2ecf20Sopenharmony_ci{
3408c2ecf20Sopenharmony_ci	struct sock_filter *bpf_ops;
3418c2ecf20Sopenharmony_ci	struct sock_fprog_kern fprog_tmp;
3428c2ecf20Sopenharmony_ci	struct bpf_prog *fp;
3438c2ecf20Sopenharmony_ci	u16 bpf_size, bpf_num_ops;
3448c2ecf20Sopenharmony_ci	int ret;
3458c2ecf20Sopenharmony_ci
3468c2ecf20Sopenharmony_ci	bpf_num_ops = nla_get_u16(tb[TCA_BPF_OPS_LEN]);
3478c2ecf20Sopenharmony_ci	if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0)
3488c2ecf20Sopenharmony_ci		return -EINVAL;
3498c2ecf20Sopenharmony_ci
3508c2ecf20Sopenharmony_ci	bpf_size = bpf_num_ops * sizeof(*bpf_ops);
3518c2ecf20Sopenharmony_ci	if (bpf_size != nla_len(tb[TCA_BPF_OPS]))
3528c2ecf20Sopenharmony_ci		return -EINVAL;
3538c2ecf20Sopenharmony_ci
3548c2ecf20Sopenharmony_ci	bpf_ops = kmemdup(nla_data(tb[TCA_BPF_OPS]), bpf_size, GFP_KERNEL);
3558c2ecf20Sopenharmony_ci	if (bpf_ops == NULL)
3568c2ecf20Sopenharmony_ci		return -ENOMEM;
3578c2ecf20Sopenharmony_ci
3588c2ecf20Sopenharmony_ci	fprog_tmp.len = bpf_num_ops;
3598c2ecf20Sopenharmony_ci	fprog_tmp.filter = bpf_ops;
3608c2ecf20Sopenharmony_ci
3618c2ecf20Sopenharmony_ci	ret = bpf_prog_create(&fp, &fprog_tmp);
3628c2ecf20Sopenharmony_ci	if (ret < 0) {
3638c2ecf20Sopenharmony_ci		kfree(bpf_ops);
3648c2ecf20Sopenharmony_ci		return ret;
3658c2ecf20Sopenharmony_ci	}
3668c2ecf20Sopenharmony_ci
3678c2ecf20Sopenharmony_ci	prog->bpf_ops = bpf_ops;
3688c2ecf20Sopenharmony_ci	prog->bpf_num_ops = bpf_num_ops;
3698c2ecf20Sopenharmony_ci	prog->bpf_name = NULL;
3708c2ecf20Sopenharmony_ci	prog->filter = fp;
3718c2ecf20Sopenharmony_ci
3728c2ecf20Sopenharmony_ci	return 0;
3738c2ecf20Sopenharmony_ci}
3748c2ecf20Sopenharmony_ci
3758c2ecf20Sopenharmony_cistatic int cls_bpf_prog_from_efd(struct nlattr **tb, struct cls_bpf_prog *prog,
3768c2ecf20Sopenharmony_ci				 u32 gen_flags, const struct tcf_proto *tp)
3778c2ecf20Sopenharmony_ci{
3788c2ecf20Sopenharmony_ci	struct bpf_prog *fp;
3798c2ecf20Sopenharmony_ci	char *name = NULL;
3808c2ecf20Sopenharmony_ci	bool skip_sw;
3818c2ecf20Sopenharmony_ci	u32 bpf_fd;
3828c2ecf20Sopenharmony_ci
3838c2ecf20Sopenharmony_ci	bpf_fd = nla_get_u32(tb[TCA_BPF_FD]);
3848c2ecf20Sopenharmony_ci	skip_sw = gen_flags & TCA_CLS_FLAGS_SKIP_SW;
3858c2ecf20Sopenharmony_ci
3868c2ecf20Sopenharmony_ci	fp = bpf_prog_get_type_dev(bpf_fd, BPF_PROG_TYPE_SCHED_CLS, skip_sw);
3878c2ecf20Sopenharmony_ci	if (IS_ERR(fp))
3888c2ecf20Sopenharmony_ci		return PTR_ERR(fp);
3898c2ecf20Sopenharmony_ci
3908c2ecf20Sopenharmony_ci	if (tb[TCA_BPF_NAME]) {
3918c2ecf20Sopenharmony_ci		name = nla_memdup(tb[TCA_BPF_NAME], GFP_KERNEL);
3928c2ecf20Sopenharmony_ci		if (!name) {
3938c2ecf20Sopenharmony_ci			bpf_prog_put(fp);
3948c2ecf20Sopenharmony_ci			return -ENOMEM;
3958c2ecf20Sopenharmony_ci		}
3968c2ecf20Sopenharmony_ci	}
3978c2ecf20Sopenharmony_ci
3988c2ecf20Sopenharmony_ci	prog->bpf_ops = NULL;
3998c2ecf20Sopenharmony_ci	prog->bpf_name = name;
4008c2ecf20Sopenharmony_ci	prog->filter = fp;
4018c2ecf20Sopenharmony_ci
4028c2ecf20Sopenharmony_ci	if (fp->dst_needed)
4038c2ecf20Sopenharmony_ci		tcf_block_netif_keep_dst(tp->chain->block);
4048c2ecf20Sopenharmony_ci
4058c2ecf20Sopenharmony_ci	return 0;
4068c2ecf20Sopenharmony_ci}
4078c2ecf20Sopenharmony_ci
4088c2ecf20Sopenharmony_cistatic int cls_bpf_set_parms(struct net *net, struct tcf_proto *tp,
4098c2ecf20Sopenharmony_ci			     struct cls_bpf_prog *prog, unsigned long base,
4108c2ecf20Sopenharmony_ci			     struct nlattr **tb, struct nlattr *est, bool ovr,
4118c2ecf20Sopenharmony_ci			     struct netlink_ext_ack *extack)
4128c2ecf20Sopenharmony_ci{
4138c2ecf20Sopenharmony_ci	bool is_bpf, is_ebpf, have_exts = false;
4148c2ecf20Sopenharmony_ci	u32 gen_flags = 0;
4158c2ecf20Sopenharmony_ci	int ret;
4168c2ecf20Sopenharmony_ci
4178c2ecf20Sopenharmony_ci	is_bpf = tb[TCA_BPF_OPS_LEN] && tb[TCA_BPF_OPS];
4188c2ecf20Sopenharmony_ci	is_ebpf = tb[TCA_BPF_FD];
4198c2ecf20Sopenharmony_ci	if ((!is_bpf && !is_ebpf) || (is_bpf && is_ebpf))
4208c2ecf20Sopenharmony_ci		return -EINVAL;
4218c2ecf20Sopenharmony_ci
4228c2ecf20Sopenharmony_ci	ret = tcf_exts_validate(net, tp, tb, est, &prog->exts, ovr, true,
4238c2ecf20Sopenharmony_ci				extack);
4248c2ecf20Sopenharmony_ci	if (ret < 0)
4258c2ecf20Sopenharmony_ci		return ret;
4268c2ecf20Sopenharmony_ci
4278c2ecf20Sopenharmony_ci	if (tb[TCA_BPF_FLAGS]) {
4288c2ecf20Sopenharmony_ci		u32 bpf_flags = nla_get_u32(tb[TCA_BPF_FLAGS]);
4298c2ecf20Sopenharmony_ci
4308c2ecf20Sopenharmony_ci		if (bpf_flags & ~TCA_BPF_FLAG_ACT_DIRECT)
4318c2ecf20Sopenharmony_ci			return -EINVAL;
4328c2ecf20Sopenharmony_ci
4338c2ecf20Sopenharmony_ci		have_exts = bpf_flags & TCA_BPF_FLAG_ACT_DIRECT;
4348c2ecf20Sopenharmony_ci	}
4358c2ecf20Sopenharmony_ci	if (tb[TCA_BPF_FLAGS_GEN]) {
4368c2ecf20Sopenharmony_ci		gen_flags = nla_get_u32(tb[TCA_BPF_FLAGS_GEN]);
4378c2ecf20Sopenharmony_ci		if (gen_flags & ~CLS_BPF_SUPPORTED_GEN_FLAGS ||
4388c2ecf20Sopenharmony_ci		    !tc_flags_valid(gen_flags))
4398c2ecf20Sopenharmony_ci			return -EINVAL;
4408c2ecf20Sopenharmony_ci	}
4418c2ecf20Sopenharmony_ci
4428c2ecf20Sopenharmony_ci	prog->exts_integrated = have_exts;
4438c2ecf20Sopenharmony_ci	prog->gen_flags = gen_flags;
4448c2ecf20Sopenharmony_ci
4458c2ecf20Sopenharmony_ci	ret = is_bpf ? cls_bpf_prog_from_ops(tb, prog) :
4468c2ecf20Sopenharmony_ci		       cls_bpf_prog_from_efd(tb, prog, gen_flags, tp);
4478c2ecf20Sopenharmony_ci	if (ret < 0)
4488c2ecf20Sopenharmony_ci		return ret;
4498c2ecf20Sopenharmony_ci
4508c2ecf20Sopenharmony_ci	if (tb[TCA_BPF_CLASSID]) {
4518c2ecf20Sopenharmony_ci		prog->res.classid = nla_get_u32(tb[TCA_BPF_CLASSID]);
4528c2ecf20Sopenharmony_ci		tcf_bind_filter(tp, &prog->res, base);
4538c2ecf20Sopenharmony_ci	}
4548c2ecf20Sopenharmony_ci
4558c2ecf20Sopenharmony_ci	return 0;
4568c2ecf20Sopenharmony_ci}
4578c2ecf20Sopenharmony_ci
4588c2ecf20Sopenharmony_cistatic int cls_bpf_change(struct net *net, struct sk_buff *in_skb,
4598c2ecf20Sopenharmony_ci			  struct tcf_proto *tp, unsigned long base,
4608c2ecf20Sopenharmony_ci			  u32 handle, struct nlattr **tca,
4618c2ecf20Sopenharmony_ci			  void **arg, bool ovr, bool rtnl_held,
4628c2ecf20Sopenharmony_ci			  struct netlink_ext_ack *extack)
4638c2ecf20Sopenharmony_ci{
4648c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
4658c2ecf20Sopenharmony_ci	struct cls_bpf_prog *oldprog = *arg;
4668c2ecf20Sopenharmony_ci	struct nlattr *tb[TCA_BPF_MAX + 1];
4678c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog;
4688c2ecf20Sopenharmony_ci	int ret;
4698c2ecf20Sopenharmony_ci
4708c2ecf20Sopenharmony_ci	if (tca[TCA_OPTIONS] == NULL)
4718c2ecf20Sopenharmony_ci		return -EINVAL;
4728c2ecf20Sopenharmony_ci
4738c2ecf20Sopenharmony_ci	ret = nla_parse_nested_deprecated(tb, TCA_BPF_MAX, tca[TCA_OPTIONS],
4748c2ecf20Sopenharmony_ci					  bpf_policy, NULL);
4758c2ecf20Sopenharmony_ci	if (ret < 0)
4768c2ecf20Sopenharmony_ci		return ret;
4778c2ecf20Sopenharmony_ci
4788c2ecf20Sopenharmony_ci	prog = kzalloc(sizeof(*prog), GFP_KERNEL);
4798c2ecf20Sopenharmony_ci	if (!prog)
4808c2ecf20Sopenharmony_ci		return -ENOBUFS;
4818c2ecf20Sopenharmony_ci
4828c2ecf20Sopenharmony_ci	ret = tcf_exts_init(&prog->exts, net, TCA_BPF_ACT, TCA_BPF_POLICE);
4838c2ecf20Sopenharmony_ci	if (ret < 0)
4848c2ecf20Sopenharmony_ci		goto errout;
4858c2ecf20Sopenharmony_ci
4868c2ecf20Sopenharmony_ci	if (oldprog) {
4878c2ecf20Sopenharmony_ci		if (handle && oldprog->handle != handle) {
4888c2ecf20Sopenharmony_ci			ret = -EINVAL;
4898c2ecf20Sopenharmony_ci			goto errout;
4908c2ecf20Sopenharmony_ci		}
4918c2ecf20Sopenharmony_ci	}
4928c2ecf20Sopenharmony_ci
4938c2ecf20Sopenharmony_ci	if (handle == 0) {
4948c2ecf20Sopenharmony_ci		handle = 1;
4958c2ecf20Sopenharmony_ci		ret = idr_alloc_u32(&head->handle_idr, prog, &handle,
4968c2ecf20Sopenharmony_ci				    INT_MAX, GFP_KERNEL);
4978c2ecf20Sopenharmony_ci	} else if (!oldprog) {
4988c2ecf20Sopenharmony_ci		ret = idr_alloc_u32(&head->handle_idr, prog, &handle,
4998c2ecf20Sopenharmony_ci				    handle, GFP_KERNEL);
5008c2ecf20Sopenharmony_ci	}
5018c2ecf20Sopenharmony_ci
5028c2ecf20Sopenharmony_ci	if (ret)
5038c2ecf20Sopenharmony_ci		goto errout;
5048c2ecf20Sopenharmony_ci	prog->handle = handle;
5058c2ecf20Sopenharmony_ci
5068c2ecf20Sopenharmony_ci	ret = cls_bpf_set_parms(net, tp, prog, base, tb, tca[TCA_RATE], ovr,
5078c2ecf20Sopenharmony_ci				extack);
5088c2ecf20Sopenharmony_ci	if (ret < 0)
5098c2ecf20Sopenharmony_ci		goto errout_idr;
5108c2ecf20Sopenharmony_ci
5118c2ecf20Sopenharmony_ci	ret = cls_bpf_offload(tp, prog, oldprog, extack);
5128c2ecf20Sopenharmony_ci	if (ret)
5138c2ecf20Sopenharmony_ci		goto errout_parms;
5148c2ecf20Sopenharmony_ci
5158c2ecf20Sopenharmony_ci	if (!tc_in_hw(prog->gen_flags))
5168c2ecf20Sopenharmony_ci		prog->gen_flags |= TCA_CLS_FLAGS_NOT_IN_HW;
5178c2ecf20Sopenharmony_ci
5188c2ecf20Sopenharmony_ci	if (oldprog) {
5198c2ecf20Sopenharmony_ci		idr_replace(&head->handle_idr, prog, handle);
5208c2ecf20Sopenharmony_ci		list_replace_rcu(&oldprog->link, &prog->link);
5218c2ecf20Sopenharmony_ci		tcf_unbind_filter(tp, &oldprog->res);
5228c2ecf20Sopenharmony_ci		tcf_exts_get_net(&oldprog->exts);
5238c2ecf20Sopenharmony_ci		tcf_queue_work(&oldprog->rwork, cls_bpf_delete_prog_work);
5248c2ecf20Sopenharmony_ci	} else {
5258c2ecf20Sopenharmony_ci		list_add_rcu(&prog->link, &head->plist);
5268c2ecf20Sopenharmony_ci	}
5278c2ecf20Sopenharmony_ci
5288c2ecf20Sopenharmony_ci	*arg = prog;
5298c2ecf20Sopenharmony_ci	return 0;
5308c2ecf20Sopenharmony_ci
5318c2ecf20Sopenharmony_cierrout_parms:
5328c2ecf20Sopenharmony_ci	cls_bpf_free_parms(prog);
5338c2ecf20Sopenharmony_cierrout_idr:
5348c2ecf20Sopenharmony_ci	if (!oldprog)
5358c2ecf20Sopenharmony_ci		idr_remove(&head->handle_idr, prog->handle);
5368c2ecf20Sopenharmony_cierrout:
5378c2ecf20Sopenharmony_ci	tcf_exts_destroy(&prog->exts);
5388c2ecf20Sopenharmony_ci	kfree(prog);
5398c2ecf20Sopenharmony_ci	return ret;
5408c2ecf20Sopenharmony_ci}
5418c2ecf20Sopenharmony_ci
5428c2ecf20Sopenharmony_cistatic int cls_bpf_dump_bpf_info(const struct cls_bpf_prog *prog,
5438c2ecf20Sopenharmony_ci				 struct sk_buff *skb)
5448c2ecf20Sopenharmony_ci{
5458c2ecf20Sopenharmony_ci	struct nlattr *nla;
5468c2ecf20Sopenharmony_ci
5478c2ecf20Sopenharmony_ci	if (nla_put_u16(skb, TCA_BPF_OPS_LEN, prog->bpf_num_ops))
5488c2ecf20Sopenharmony_ci		return -EMSGSIZE;
5498c2ecf20Sopenharmony_ci
5508c2ecf20Sopenharmony_ci	nla = nla_reserve(skb, TCA_BPF_OPS, prog->bpf_num_ops *
5518c2ecf20Sopenharmony_ci			  sizeof(struct sock_filter));
5528c2ecf20Sopenharmony_ci	if (nla == NULL)
5538c2ecf20Sopenharmony_ci		return -EMSGSIZE;
5548c2ecf20Sopenharmony_ci
5558c2ecf20Sopenharmony_ci	memcpy(nla_data(nla), prog->bpf_ops, nla_len(nla));
5568c2ecf20Sopenharmony_ci
5578c2ecf20Sopenharmony_ci	return 0;
5588c2ecf20Sopenharmony_ci}
5598c2ecf20Sopenharmony_ci
5608c2ecf20Sopenharmony_cistatic int cls_bpf_dump_ebpf_info(const struct cls_bpf_prog *prog,
5618c2ecf20Sopenharmony_ci				  struct sk_buff *skb)
5628c2ecf20Sopenharmony_ci{
5638c2ecf20Sopenharmony_ci	struct nlattr *nla;
5648c2ecf20Sopenharmony_ci
5658c2ecf20Sopenharmony_ci	if (prog->bpf_name &&
5668c2ecf20Sopenharmony_ci	    nla_put_string(skb, TCA_BPF_NAME, prog->bpf_name))
5678c2ecf20Sopenharmony_ci		return -EMSGSIZE;
5688c2ecf20Sopenharmony_ci
5698c2ecf20Sopenharmony_ci	if (nla_put_u32(skb, TCA_BPF_ID, prog->filter->aux->id))
5708c2ecf20Sopenharmony_ci		return -EMSGSIZE;
5718c2ecf20Sopenharmony_ci
5728c2ecf20Sopenharmony_ci	nla = nla_reserve(skb, TCA_BPF_TAG, sizeof(prog->filter->tag));
5738c2ecf20Sopenharmony_ci	if (nla == NULL)
5748c2ecf20Sopenharmony_ci		return -EMSGSIZE;
5758c2ecf20Sopenharmony_ci
5768c2ecf20Sopenharmony_ci	memcpy(nla_data(nla), prog->filter->tag, nla_len(nla));
5778c2ecf20Sopenharmony_ci
5788c2ecf20Sopenharmony_ci	return 0;
5798c2ecf20Sopenharmony_ci}
5808c2ecf20Sopenharmony_ci
5818c2ecf20Sopenharmony_cistatic int cls_bpf_dump(struct net *net, struct tcf_proto *tp, void *fh,
5828c2ecf20Sopenharmony_ci			struct sk_buff *skb, struct tcmsg *tm, bool rtnl_held)
5838c2ecf20Sopenharmony_ci{
5848c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog = fh;
5858c2ecf20Sopenharmony_ci	struct nlattr *nest;
5868c2ecf20Sopenharmony_ci	u32 bpf_flags = 0;
5878c2ecf20Sopenharmony_ci	int ret;
5888c2ecf20Sopenharmony_ci
5898c2ecf20Sopenharmony_ci	if (prog == NULL)
5908c2ecf20Sopenharmony_ci		return skb->len;
5918c2ecf20Sopenharmony_ci
5928c2ecf20Sopenharmony_ci	tm->tcm_handle = prog->handle;
5938c2ecf20Sopenharmony_ci
5948c2ecf20Sopenharmony_ci	cls_bpf_offload_update_stats(tp, prog);
5958c2ecf20Sopenharmony_ci
5968c2ecf20Sopenharmony_ci	nest = nla_nest_start_noflag(skb, TCA_OPTIONS);
5978c2ecf20Sopenharmony_ci	if (nest == NULL)
5988c2ecf20Sopenharmony_ci		goto nla_put_failure;
5998c2ecf20Sopenharmony_ci
6008c2ecf20Sopenharmony_ci	if (prog->res.classid &&
6018c2ecf20Sopenharmony_ci	    nla_put_u32(skb, TCA_BPF_CLASSID, prog->res.classid))
6028c2ecf20Sopenharmony_ci		goto nla_put_failure;
6038c2ecf20Sopenharmony_ci
6048c2ecf20Sopenharmony_ci	if (cls_bpf_is_ebpf(prog))
6058c2ecf20Sopenharmony_ci		ret = cls_bpf_dump_ebpf_info(prog, skb);
6068c2ecf20Sopenharmony_ci	else
6078c2ecf20Sopenharmony_ci		ret = cls_bpf_dump_bpf_info(prog, skb);
6088c2ecf20Sopenharmony_ci	if (ret)
6098c2ecf20Sopenharmony_ci		goto nla_put_failure;
6108c2ecf20Sopenharmony_ci
6118c2ecf20Sopenharmony_ci	if (tcf_exts_dump(skb, &prog->exts) < 0)
6128c2ecf20Sopenharmony_ci		goto nla_put_failure;
6138c2ecf20Sopenharmony_ci
6148c2ecf20Sopenharmony_ci	if (prog->exts_integrated)
6158c2ecf20Sopenharmony_ci		bpf_flags |= TCA_BPF_FLAG_ACT_DIRECT;
6168c2ecf20Sopenharmony_ci	if (bpf_flags && nla_put_u32(skb, TCA_BPF_FLAGS, bpf_flags))
6178c2ecf20Sopenharmony_ci		goto nla_put_failure;
6188c2ecf20Sopenharmony_ci	if (prog->gen_flags &&
6198c2ecf20Sopenharmony_ci	    nla_put_u32(skb, TCA_BPF_FLAGS_GEN, prog->gen_flags))
6208c2ecf20Sopenharmony_ci		goto nla_put_failure;
6218c2ecf20Sopenharmony_ci
6228c2ecf20Sopenharmony_ci	nla_nest_end(skb, nest);
6238c2ecf20Sopenharmony_ci
6248c2ecf20Sopenharmony_ci	if (tcf_exts_dump_stats(skb, &prog->exts) < 0)
6258c2ecf20Sopenharmony_ci		goto nla_put_failure;
6268c2ecf20Sopenharmony_ci
6278c2ecf20Sopenharmony_ci	return skb->len;
6288c2ecf20Sopenharmony_ci
6298c2ecf20Sopenharmony_cinla_put_failure:
6308c2ecf20Sopenharmony_ci	nla_nest_cancel(skb, nest);
6318c2ecf20Sopenharmony_ci	return -1;
6328c2ecf20Sopenharmony_ci}
6338c2ecf20Sopenharmony_ci
6348c2ecf20Sopenharmony_cistatic void cls_bpf_bind_class(void *fh, u32 classid, unsigned long cl,
6358c2ecf20Sopenharmony_ci			       void *q, unsigned long base)
6368c2ecf20Sopenharmony_ci{
6378c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog = fh;
6388c2ecf20Sopenharmony_ci
6398c2ecf20Sopenharmony_ci	if (prog && prog->res.classid == classid) {
6408c2ecf20Sopenharmony_ci		if (cl)
6418c2ecf20Sopenharmony_ci			__tcf_bind_filter(q, &prog->res, base);
6428c2ecf20Sopenharmony_ci		else
6438c2ecf20Sopenharmony_ci			__tcf_unbind_filter(q, &prog->res);
6448c2ecf20Sopenharmony_ci	}
6458c2ecf20Sopenharmony_ci}
6468c2ecf20Sopenharmony_ci
6478c2ecf20Sopenharmony_cistatic void cls_bpf_walk(struct tcf_proto *tp, struct tcf_walker *arg,
6488c2ecf20Sopenharmony_ci			 bool rtnl_held)
6498c2ecf20Sopenharmony_ci{
6508c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
6518c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog;
6528c2ecf20Sopenharmony_ci
6538c2ecf20Sopenharmony_ci	list_for_each_entry(prog, &head->plist, link) {
6548c2ecf20Sopenharmony_ci		if (arg->count < arg->skip)
6558c2ecf20Sopenharmony_ci			goto skip;
6568c2ecf20Sopenharmony_ci		if (arg->fn(tp, prog, arg) < 0) {
6578c2ecf20Sopenharmony_ci			arg->stop = 1;
6588c2ecf20Sopenharmony_ci			break;
6598c2ecf20Sopenharmony_ci		}
6608c2ecf20Sopenharmony_ciskip:
6618c2ecf20Sopenharmony_ci		arg->count++;
6628c2ecf20Sopenharmony_ci	}
6638c2ecf20Sopenharmony_ci}
6648c2ecf20Sopenharmony_ci
6658c2ecf20Sopenharmony_cistatic int cls_bpf_reoffload(struct tcf_proto *tp, bool add, flow_setup_cb_t *cb,
6668c2ecf20Sopenharmony_ci			     void *cb_priv, struct netlink_ext_ack *extack)
6678c2ecf20Sopenharmony_ci{
6688c2ecf20Sopenharmony_ci	struct cls_bpf_head *head = rtnl_dereference(tp->root);
6698c2ecf20Sopenharmony_ci	struct tcf_block *block = tp->chain->block;
6708c2ecf20Sopenharmony_ci	struct tc_cls_bpf_offload cls_bpf = {};
6718c2ecf20Sopenharmony_ci	struct cls_bpf_prog *prog;
6728c2ecf20Sopenharmony_ci	int err;
6738c2ecf20Sopenharmony_ci
6748c2ecf20Sopenharmony_ci	list_for_each_entry(prog, &head->plist, link) {
6758c2ecf20Sopenharmony_ci		if (tc_skip_hw(prog->gen_flags))
6768c2ecf20Sopenharmony_ci			continue;
6778c2ecf20Sopenharmony_ci
6788c2ecf20Sopenharmony_ci		tc_cls_common_offload_init(&cls_bpf.common, tp, prog->gen_flags,
6798c2ecf20Sopenharmony_ci					   extack);
6808c2ecf20Sopenharmony_ci		cls_bpf.command = TC_CLSBPF_OFFLOAD;
6818c2ecf20Sopenharmony_ci		cls_bpf.exts = &prog->exts;
6828c2ecf20Sopenharmony_ci		cls_bpf.prog = add ? prog->filter : NULL;
6838c2ecf20Sopenharmony_ci		cls_bpf.oldprog = add ? NULL : prog->filter;
6848c2ecf20Sopenharmony_ci		cls_bpf.name = prog->bpf_name;
6858c2ecf20Sopenharmony_ci		cls_bpf.exts_integrated = prog->exts_integrated;
6868c2ecf20Sopenharmony_ci
6878c2ecf20Sopenharmony_ci		err = tc_setup_cb_reoffload(block, tp, add, cb, TC_SETUP_CLSBPF,
6888c2ecf20Sopenharmony_ci					    &cls_bpf, cb_priv, &prog->gen_flags,
6898c2ecf20Sopenharmony_ci					    &prog->in_hw_count);
6908c2ecf20Sopenharmony_ci		if (err)
6918c2ecf20Sopenharmony_ci			return err;
6928c2ecf20Sopenharmony_ci	}
6938c2ecf20Sopenharmony_ci
6948c2ecf20Sopenharmony_ci	return 0;
6958c2ecf20Sopenharmony_ci}
6968c2ecf20Sopenharmony_ci
6978c2ecf20Sopenharmony_cistatic struct tcf_proto_ops cls_bpf_ops __read_mostly = {
6988c2ecf20Sopenharmony_ci	.kind		=	"bpf",
6998c2ecf20Sopenharmony_ci	.owner		=	THIS_MODULE,
7008c2ecf20Sopenharmony_ci	.classify	=	cls_bpf_classify,
7018c2ecf20Sopenharmony_ci	.init		=	cls_bpf_init,
7028c2ecf20Sopenharmony_ci	.destroy	=	cls_bpf_destroy,
7038c2ecf20Sopenharmony_ci	.get		=	cls_bpf_get,
7048c2ecf20Sopenharmony_ci	.change		=	cls_bpf_change,
7058c2ecf20Sopenharmony_ci	.delete		=	cls_bpf_delete,
7068c2ecf20Sopenharmony_ci	.walk		=	cls_bpf_walk,
7078c2ecf20Sopenharmony_ci	.reoffload	=	cls_bpf_reoffload,
7088c2ecf20Sopenharmony_ci	.dump		=	cls_bpf_dump,
7098c2ecf20Sopenharmony_ci	.bind_class	=	cls_bpf_bind_class,
7108c2ecf20Sopenharmony_ci};
7118c2ecf20Sopenharmony_ci
7128c2ecf20Sopenharmony_cistatic int __init cls_bpf_init_mod(void)
7138c2ecf20Sopenharmony_ci{
7148c2ecf20Sopenharmony_ci	return register_tcf_proto_ops(&cls_bpf_ops);
7158c2ecf20Sopenharmony_ci}
7168c2ecf20Sopenharmony_ci
7178c2ecf20Sopenharmony_cistatic void __exit cls_bpf_exit_mod(void)
7188c2ecf20Sopenharmony_ci{
7198c2ecf20Sopenharmony_ci	unregister_tcf_proto_ops(&cls_bpf_ops);
7208c2ecf20Sopenharmony_ci}
7218c2ecf20Sopenharmony_ci
7228c2ecf20Sopenharmony_cimodule_init(cls_bpf_init_mod);
7238c2ecf20Sopenharmony_cimodule_exit(cls_bpf_exit_mod);
724