162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Copyright (c) 2015 Jiri Pirko <jiri@resnulli.us>
462306a36Sopenharmony_ci */
562306a36Sopenharmony_ci
662306a36Sopenharmony_ci#include <linux/module.h>
762306a36Sopenharmony_ci#include <linux/init.h>
862306a36Sopenharmony_ci#include <linux/kernel.h>
962306a36Sopenharmony_ci#include <linux/skbuff.h>
1062306a36Sopenharmony_ci#include <linux/rtnetlink.h>
1162306a36Sopenharmony_ci#include <linux/filter.h>
1262306a36Sopenharmony_ci#include <linux/bpf.h>
1362306a36Sopenharmony_ci
1462306a36Sopenharmony_ci#include <net/netlink.h>
1562306a36Sopenharmony_ci#include <net/sock.h>
1662306a36Sopenharmony_ci#include <net/pkt_sched.h>
1762306a36Sopenharmony_ci#include <net/pkt_cls.h>
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#include <linux/tc_act/tc_bpf.h>
2062306a36Sopenharmony_ci#include <net/tc_act/tc_bpf.h>
2162306a36Sopenharmony_ci#include <net/tc_wrapper.h>
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci#define ACT_BPF_NAME_LEN	256
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_cistruct tcf_bpf_cfg {
2662306a36Sopenharmony_ci	struct bpf_prog *filter;
2762306a36Sopenharmony_ci	struct sock_filter *bpf_ops;
2862306a36Sopenharmony_ci	const char *bpf_name;
2962306a36Sopenharmony_ci	u16 bpf_num_ops;
3062306a36Sopenharmony_ci	bool is_ebpf;
3162306a36Sopenharmony_ci};
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_cistatic struct tc_action_ops act_bpf_ops;
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ciTC_INDIRECT_SCOPE int tcf_bpf_act(struct sk_buff *skb,
3662306a36Sopenharmony_ci				  const struct tc_action *act,
3762306a36Sopenharmony_ci				  struct tcf_result *res)
3862306a36Sopenharmony_ci{
3962306a36Sopenharmony_ci	bool at_ingress = skb_at_tc_ingress(skb);
4062306a36Sopenharmony_ci	struct tcf_bpf *prog = to_bpf(act);
4162306a36Sopenharmony_ci	struct bpf_prog *filter;
4262306a36Sopenharmony_ci	int action, filter_res;
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci	tcf_lastuse_update(&prog->tcf_tm);
4562306a36Sopenharmony_ci	bstats_update(this_cpu_ptr(prog->common.cpu_bstats), skb);
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	filter = rcu_dereference(prog->filter);
4862306a36Sopenharmony_ci	if (at_ingress) {
4962306a36Sopenharmony_ci		__skb_push(skb, skb->mac_len);
5062306a36Sopenharmony_ci		bpf_compute_data_pointers(skb);
5162306a36Sopenharmony_ci		filter_res = bpf_prog_run(filter, skb);
5262306a36Sopenharmony_ci		__skb_pull(skb, skb->mac_len);
5362306a36Sopenharmony_ci	} else {
5462306a36Sopenharmony_ci		bpf_compute_data_pointers(skb);
5562306a36Sopenharmony_ci		filter_res = bpf_prog_run(filter, skb);
5662306a36Sopenharmony_ci	}
5762306a36Sopenharmony_ci	if (unlikely(!skb->tstamp && skb->mono_delivery_time))
5862306a36Sopenharmony_ci		skb->mono_delivery_time = 0;
5962306a36Sopenharmony_ci	if (skb_sk_is_prefetched(skb) && filter_res != TC_ACT_OK)
6062306a36Sopenharmony_ci		skb_orphan(skb);
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_ci	/* A BPF program may overwrite the default action opcode.
6362306a36Sopenharmony_ci	 * Similarly as in cls_bpf, if filter_res == -1 we use the
6462306a36Sopenharmony_ci	 * default action specified from tc.
6562306a36Sopenharmony_ci	 *
6662306a36Sopenharmony_ci	 * In case a different well-known TC_ACT opcode has been
6762306a36Sopenharmony_ci	 * returned, it will overwrite the default one.
6862306a36Sopenharmony_ci	 *
6962306a36Sopenharmony_ci	 * For everything else that is unknown, TC_ACT_UNSPEC is
7062306a36Sopenharmony_ci	 * returned.
7162306a36Sopenharmony_ci	 */
7262306a36Sopenharmony_ci	switch (filter_res) {
7362306a36Sopenharmony_ci	case TC_ACT_PIPE:
7462306a36Sopenharmony_ci	case TC_ACT_RECLASSIFY:
7562306a36Sopenharmony_ci	case TC_ACT_OK:
7662306a36Sopenharmony_ci	case TC_ACT_REDIRECT:
7762306a36Sopenharmony_ci		action = filter_res;
7862306a36Sopenharmony_ci		break;
7962306a36Sopenharmony_ci	case TC_ACT_SHOT:
8062306a36Sopenharmony_ci		action = filter_res;
8162306a36Sopenharmony_ci		qstats_drop_inc(this_cpu_ptr(prog->common.cpu_qstats));
8262306a36Sopenharmony_ci		break;
8362306a36Sopenharmony_ci	case TC_ACT_UNSPEC:
8462306a36Sopenharmony_ci		action = prog->tcf_action;
8562306a36Sopenharmony_ci		break;
8662306a36Sopenharmony_ci	default:
8762306a36Sopenharmony_ci		action = TC_ACT_UNSPEC;
8862306a36Sopenharmony_ci		break;
8962306a36Sopenharmony_ci	}
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	return action;
9262306a36Sopenharmony_ci}
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_cistatic bool tcf_bpf_is_ebpf(const struct tcf_bpf *prog)
9562306a36Sopenharmony_ci{
9662306a36Sopenharmony_ci	return !prog->bpf_ops;
9762306a36Sopenharmony_ci}
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_cistatic int tcf_bpf_dump_bpf_info(const struct tcf_bpf *prog,
10062306a36Sopenharmony_ci				 struct sk_buff *skb)
10162306a36Sopenharmony_ci{
10262306a36Sopenharmony_ci	struct nlattr *nla;
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	if (nla_put_u16(skb, TCA_ACT_BPF_OPS_LEN, prog->bpf_num_ops))
10562306a36Sopenharmony_ci		return -EMSGSIZE;
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_ci	nla = nla_reserve(skb, TCA_ACT_BPF_OPS, prog->bpf_num_ops *
10862306a36Sopenharmony_ci			  sizeof(struct sock_filter));
10962306a36Sopenharmony_ci	if (nla == NULL)
11062306a36Sopenharmony_ci		return -EMSGSIZE;
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	memcpy(nla_data(nla), prog->bpf_ops, nla_len(nla));
11362306a36Sopenharmony_ci
11462306a36Sopenharmony_ci	return 0;
11562306a36Sopenharmony_ci}
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_cistatic int tcf_bpf_dump_ebpf_info(const struct tcf_bpf *prog,
11862306a36Sopenharmony_ci				  struct sk_buff *skb)
11962306a36Sopenharmony_ci{
12062306a36Sopenharmony_ci	struct nlattr *nla;
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ci	if (prog->bpf_name &&
12362306a36Sopenharmony_ci	    nla_put_string(skb, TCA_ACT_BPF_NAME, prog->bpf_name))
12462306a36Sopenharmony_ci		return -EMSGSIZE;
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	if (nla_put_u32(skb, TCA_ACT_BPF_ID, prog->filter->aux->id))
12762306a36Sopenharmony_ci		return -EMSGSIZE;
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	nla = nla_reserve(skb, TCA_ACT_BPF_TAG, sizeof(prog->filter->tag));
13062306a36Sopenharmony_ci	if (nla == NULL)
13162306a36Sopenharmony_ci		return -EMSGSIZE;
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_ci	memcpy(nla_data(nla), prog->filter->tag, nla_len(nla));
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	return 0;
13662306a36Sopenharmony_ci}
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_cistatic int tcf_bpf_dump(struct sk_buff *skb, struct tc_action *act,
13962306a36Sopenharmony_ci			int bind, int ref)
14062306a36Sopenharmony_ci{
14162306a36Sopenharmony_ci	unsigned char *tp = skb_tail_pointer(skb);
14262306a36Sopenharmony_ci	struct tcf_bpf *prog = to_bpf(act);
14362306a36Sopenharmony_ci	struct tc_act_bpf opt = {
14462306a36Sopenharmony_ci		.index   = prog->tcf_index,
14562306a36Sopenharmony_ci		.refcnt  = refcount_read(&prog->tcf_refcnt) - ref,
14662306a36Sopenharmony_ci		.bindcnt = atomic_read(&prog->tcf_bindcnt) - bind,
14762306a36Sopenharmony_ci	};
14862306a36Sopenharmony_ci	struct tcf_t tm;
14962306a36Sopenharmony_ci	int ret;
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci	spin_lock_bh(&prog->tcf_lock);
15262306a36Sopenharmony_ci	opt.action = prog->tcf_action;
15362306a36Sopenharmony_ci	if (nla_put(skb, TCA_ACT_BPF_PARMS, sizeof(opt), &opt))
15462306a36Sopenharmony_ci		goto nla_put_failure;
15562306a36Sopenharmony_ci
15662306a36Sopenharmony_ci	if (tcf_bpf_is_ebpf(prog))
15762306a36Sopenharmony_ci		ret = tcf_bpf_dump_ebpf_info(prog, skb);
15862306a36Sopenharmony_ci	else
15962306a36Sopenharmony_ci		ret = tcf_bpf_dump_bpf_info(prog, skb);
16062306a36Sopenharmony_ci	if (ret)
16162306a36Sopenharmony_ci		goto nla_put_failure;
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ci	tcf_tm_dump(&tm, &prog->tcf_tm);
16462306a36Sopenharmony_ci	if (nla_put_64bit(skb, TCA_ACT_BPF_TM, sizeof(tm), &tm,
16562306a36Sopenharmony_ci			  TCA_ACT_BPF_PAD))
16662306a36Sopenharmony_ci		goto nla_put_failure;
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci	spin_unlock_bh(&prog->tcf_lock);
16962306a36Sopenharmony_ci	return skb->len;
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_cinla_put_failure:
17262306a36Sopenharmony_ci	spin_unlock_bh(&prog->tcf_lock);
17362306a36Sopenharmony_ci	nlmsg_trim(skb, tp);
17462306a36Sopenharmony_ci	return -1;
17562306a36Sopenharmony_ci}
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_cistatic const struct nla_policy act_bpf_policy[TCA_ACT_BPF_MAX + 1] = {
17862306a36Sopenharmony_ci	[TCA_ACT_BPF_PARMS]	= { .len = sizeof(struct tc_act_bpf) },
17962306a36Sopenharmony_ci	[TCA_ACT_BPF_FD]	= { .type = NLA_U32 },
18062306a36Sopenharmony_ci	[TCA_ACT_BPF_NAME]	= { .type = NLA_NUL_STRING,
18162306a36Sopenharmony_ci				    .len = ACT_BPF_NAME_LEN },
18262306a36Sopenharmony_ci	[TCA_ACT_BPF_OPS_LEN]	= { .type = NLA_U16 },
18362306a36Sopenharmony_ci	[TCA_ACT_BPF_OPS]	= { .type = NLA_BINARY,
18462306a36Sopenharmony_ci				    .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
18562306a36Sopenharmony_ci};
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_cistatic int tcf_bpf_init_from_ops(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
18862306a36Sopenharmony_ci{
18962306a36Sopenharmony_ci	struct sock_filter *bpf_ops;
19062306a36Sopenharmony_ci	struct sock_fprog_kern fprog_tmp;
19162306a36Sopenharmony_ci	struct bpf_prog *fp;
19262306a36Sopenharmony_ci	u16 bpf_size, bpf_num_ops;
19362306a36Sopenharmony_ci	int ret;
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	bpf_num_ops = nla_get_u16(tb[TCA_ACT_BPF_OPS_LEN]);
19662306a36Sopenharmony_ci	if (bpf_num_ops	> BPF_MAXINSNS || bpf_num_ops == 0)
19762306a36Sopenharmony_ci		return -EINVAL;
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci	bpf_size = bpf_num_ops * sizeof(*bpf_ops);
20062306a36Sopenharmony_ci	if (bpf_size != nla_len(tb[TCA_ACT_BPF_OPS]))
20162306a36Sopenharmony_ci		return -EINVAL;
20262306a36Sopenharmony_ci
20362306a36Sopenharmony_ci	bpf_ops = kmemdup(nla_data(tb[TCA_ACT_BPF_OPS]), bpf_size, GFP_KERNEL);
20462306a36Sopenharmony_ci	if (bpf_ops == NULL)
20562306a36Sopenharmony_ci		return -ENOMEM;
20662306a36Sopenharmony_ci
20762306a36Sopenharmony_ci	fprog_tmp.len = bpf_num_ops;
20862306a36Sopenharmony_ci	fprog_tmp.filter = bpf_ops;
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	ret = bpf_prog_create(&fp, &fprog_tmp);
21162306a36Sopenharmony_ci	if (ret < 0) {
21262306a36Sopenharmony_ci		kfree(bpf_ops);
21362306a36Sopenharmony_ci		return ret;
21462306a36Sopenharmony_ci	}
21562306a36Sopenharmony_ci
21662306a36Sopenharmony_ci	cfg->bpf_ops = bpf_ops;
21762306a36Sopenharmony_ci	cfg->bpf_num_ops = bpf_num_ops;
21862306a36Sopenharmony_ci	cfg->filter = fp;
21962306a36Sopenharmony_ci	cfg->is_ebpf = false;
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_ci	return 0;
22262306a36Sopenharmony_ci}
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_cistatic int tcf_bpf_init_from_efd(struct nlattr **tb, struct tcf_bpf_cfg *cfg)
22562306a36Sopenharmony_ci{
22662306a36Sopenharmony_ci	struct bpf_prog *fp;
22762306a36Sopenharmony_ci	char *name = NULL;
22862306a36Sopenharmony_ci	u32 bpf_fd;
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	bpf_fd = nla_get_u32(tb[TCA_ACT_BPF_FD]);
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_ci	fp = bpf_prog_get_type(bpf_fd, BPF_PROG_TYPE_SCHED_ACT);
23362306a36Sopenharmony_ci	if (IS_ERR(fp))
23462306a36Sopenharmony_ci		return PTR_ERR(fp);
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	if (tb[TCA_ACT_BPF_NAME]) {
23762306a36Sopenharmony_ci		name = nla_memdup(tb[TCA_ACT_BPF_NAME], GFP_KERNEL);
23862306a36Sopenharmony_ci		if (!name) {
23962306a36Sopenharmony_ci			bpf_prog_put(fp);
24062306a36Sopenharmony_ci			return -ENOMEM;
24162306a36Sopenharmony_ci		}
24262306a36Sopenharmony_ci	}
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_ci	cfg->bpf_name = name;
24562306a36Sopenharmony_ci	cfg->filter = fp;
24662306a36Sopenharmony_ci	cfg->is_ebpf = true;
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_ci	return 0;
24962306a36Sopenharmony_ci}
25062306a36Sopenharmony_ci
25162306a36Sopenharmony_cistatic void tcf_bpf_cfg_cleanup(const struct tcf_bpf_cfg *cfg)
25262306a36Sopenharmony_ci{
25362306a36Sopenharmony_ci	struct bpf_prog *filter = cfg->filter;
25462306a36Sopenharmony_ci
25562306a36Sopenharmony_ci	if (filter) {
25662306a36Sopenharmony_ci		if (cfg->is_ebpf)
25762306a36Sopenharmony_ci			bpf_prog_put(filter);
25862306a36Sopenharmony_ci		else
25962306a36Sopenharmony_ci			bpf_prog_destroy(filter);
26062306a36Sopenharmony_ci	}
26162306a36Sopenharmony_ci
26262306a36Sopenharmony_ci	kfree(cfg->bpf_ops);
26362306a36Sopenharmony_ci	kfree(cfg->bpf_name);
26462306a36Sopenharmony_ci}
26562306a36Sopenharmony_ci
26662306a36Sopenharmony_cistatic void tcf_bpf_prog_fill_cfg(const struct tcf_bpf *prog,
26762306a36Sopenharmony_ci				  struct tcf_bpf_cfg *cfg)
26862306a36Sopenharmony_ci{
26962306a36Sopenharmony_ci	cfg->is_ebpf = tcf_bpf_is_ebpf(prog);
27062306a36Sopenharmony_ci	/* updates to prog->filter are prevented, since it's called either
27162306a36Sopenharmony_ci	 * with tcf lock or during final cleanup in rcu callback
27262306a36Sopenharmony_ci	 */
27362306a36Sopenharmony_ci	cfg->filter = rcu_dereference_protected(prog->filter, 1);
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_ci	cfg->bpf_ops = prog->bpf_ops;
27662306a36Sopenharmony_ci	cfg->bpf_name = prog->bpf_name;
27762306a36Sopenharmony_ci}
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_cistatic int tcf_bpf_init(struct net *net, struct nlattr *nla,
28062306a36Sopenharmony_ci			struct nlattr *est, struct tc_action **act,
28162306a36Sopenharmony_ci			struct tcf_proto *tp, u32 flags,
28262306a36Sopenharmony_ci			struct netlink_ext_ack *extack)
28362306a36Sopenharmony_ci{
28462306a36Sopenharmony_ci	struct tc_action_net *tn = net_generic(net, act_bpf_ops.net_id);
28562306a36Sopenharmony_ci	bool bind = flags & TCA_ACT_FLAGS_BIND;
28662306a36Sopenharmony_ci	struct nlattr *tb[TCA_ACT_BPF_MAX + 1];
28762306a36Sopenharmony_ci	struct tcf_chain *goto_ch = NULL;
28862306a36Sopenharmony_ci	struct tcf_bpf_cfg cfg, old;
28962306a36Sopenharmony_ci	struct tc_act_bpf *parm;
29062306a36Sopenharmony_ci	struct tcf_bpf *prog;
29162306a36Sopenharmony_ci	bool is_bpf, is_ebpf;
29262306a36Sopenharmony_ci	int ret, res = 0;
29362306a36Sopenharmony_ci	u32 index;
29462306a36Sopenharmony_ci
29562306a36Sopenharmony_ci	if (!nla)
29662306a36Sopenharmony_ci		return -EINVAL;
29762306a36Sopenharmony_ci
29862306a36Sopenharmony_ci	ret = nla_parse_nested_deprecated(tb, TCA_ACT_BPF_MAX, nla,
29962306a36Sopenharmony_ci					  act_bpf_policy, NULL);
30062306a36Sopenharmony_ci	if (ret < 0)
30162306a36Sopenharmony_ci		return ret;
30262306a36Sopenharmony_ci
30362306a36Sopenharmony_ci	if (!tb[TCA_ACT_BPF_PARMS])
30462306a36Sopenharmony_ci		return -EINVAL;
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	parm = nla_data(tb[TCA_ACT_BPF_PARMS]);
30762306a36Sopenharmony_ci	index = parm->index;
30862306a36Sopenharmony_ci	ret = tcf_idr_check_alloc(tn, &index, act, bind);
30962306a36Sopenharmony_ci	if (!ret) {
31062306a36Sopenharmony_ci		ret = tcf_idr_create(tn, index, est, act,
31162306a36Sopenharmony_ci				     &act_bpf_ops, bind, true, flags);
31262306a36Sopenharmony_ci		if (ret < 0) {
31362306a36Sopenharmony_ci			tcf_idr_cleanup(tn, index);
31462306a36Sopenharmony_ci			return ret;
31562306a36Sopenharmony_ci		}
31662306a36Sopenharmony_ci
31762306a36Sopenharmony_ci		res = ACT_P_CREATED;
31862306a36Sopenharmony_ci	} else if (ret > 0) {
31962306a36Sopenharmony_ci		/* Don't override defaults. */
32062306a36Sopenharmony_ci		if (bind)
32162306a36Sopenharmony_ci			return 0;
32262306a36Sopenharmony_ci
32362306a36Sopenharmony_ci		if (!(flags & TCA_ACT_FLAGS_REPLACE)) {
32462306a36Sopenharmony_ci			tcf_idr_release(*act, bind);
32562306a36Sopenharmony_ci			return -EEXIST;
32662306a36Sopenharmony_ci		}
32762306a36Sopenharmony_ci	} else {
32862306a36Sopenharmony_ci		return ret;
32962306a36Sopenharmony_ci	}
33062306a36Sopenharmony_ci
33162306a36Sopenharmony_ci	ret = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack);
33262306a36Sopenharmony_ci	if (ret < 0)
33362306a36Sopenharmony_ci		goto release_idr;
33462306a36Sopenharmony_ci
33562306a36Sopenharmony_ci	is_bpf = tb[TCA_ACT_BPF_OPS_LEN] && tb[TCA_ACT_BPF_OPS];
33662306a36Sopenharmony_ci	is_ebpf = tb[TCA_ACT_BPF_FD];
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci	if (is_bpf == is_ebpf) {
33962306a36Sopenharmony_ci		ret = -EINVAL;
34062306a36Sopenharmony_ci		goto put_chain;
34162306a36Sopenharmony_ci	}
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	memset(&cfg, 0, sizeof(cfg));
34462306a36Sopenharmony_ci
34562306a36Sopenharmony_ci	ret = is_bpf ? tcf_bpf_init_from_ops(tb, &cfg) :
34662306a36Sopenharmony_ci		       tcf_bpf_init_from_efd(tb, &cfg);
34762306a36Sopenharmony_ci	if (ret < 0)
34862306a36Sopenharmony_ci		goto put_chain;
34962306a36Sopenharmony_ci
35062306a36Sopenharmony_ci	prog = to_bpf(*act);
35162306a36Sopenharmony_ci
35262306a36Sopenharmony_ci	spin_lock_bh(&prog->tcf_lock);
35362306a36Sopenharmony_ci	if (res != ACT_P_CREATED)
35462306a36Sopenharmony_ci		tcf_bpf_prog_fill_cfg(prog, &old);
35562306a36Sopenharmony_ci
35662306a36Sopenharmony_ci	prog->bpf_ops = cfg.bpf_ops;
35762306a36Sopenharmony_ci	prog->bpf_name = cfg.bpf_name;
35862306a36Sopenharmony_ci
35962306a36Sopenharmony_ci	if (cfg.bpf_num_ops)
36062306a36Sopenharmony_ci		prog->bpf_num_ops = cfg.bpf_num_ops;
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci	goto_ch = tcf_action_set_ctrlact(*act, parm->action, goto_ch);
36362306a36Sopenharmony_ci	rcu_assign_pointer(prog->filter, cfg.filter);
36462306a36Sopenharmony_ci	spin_unlock_bh(&prog->tcf_lock);
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_ci	if (goto_ch)
36762306a36Sopenharmony_ci		tcf_chain_put_by_act(goto_ch);
36862306a36Sopenharmony_ci
36962306a36Sopenharmony_ci	if (res != ACT_P_CREATED) {
37062306a36Sopenharmony_ci		/* make sure the program being replaced is no longer executing */
37162306a36Sopenharmony_ci		synchronize_rcu();
37262306a36Sopenharmony_ci		tcf_bpf_cfg_cleanup(&old);
37362306a36Sopenharmony_ci	}
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_ci	return res;
37662306a36Sopenharmony_ci
37762306a36Sopenharmony_ciput_chain:
37862306a36Sopenharmony_ci	if (goto_ch)
37962306a36Sopenharmony_ci		tcf_chain_put_by_act(goto_ch);
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_cirelease_idr:
38262306a36Sopenharmony_ci	tcf_idr_release(*act, bind);
38362306a36Sopenharmony_ci	return ret;
38462306a36Sopenharmony_ci}
38562306a36Sopenharmony_ci
38662306a36Sopenharmony_cistatic void tcf_bpf_cleanup(struct tc_action *act)
38762306a36Sopenharmony_ci{
38862306a36Sopenharmony_ci	struct tcf_bpf_cfg tmp;
38962306a36Sopenharmony_ci
39062306a36Sopenharmony_ci	tcf_bpf_prog_fill_cfg(to_bpf(act), &tmp);
39162306a36Sopenharmony_ci	tcf_bpf_cfg_cleanup(&tmp);
39262306a36Sopenharmony_ci}
39362306a36Sopenharmony_ci
39462306a36Sopenharmony_cistatic struct tc_action_ops act_bpf_ops __read_mostly = {
39562306a36Sopenharmony_ci	.kind		=	"bpf",
39662306a36Sopenharmony_ci	.id		=	TCA_ID_BPF,
39762306a36Sopenharmony_ci	.owner		=	THIS_MODULE,
39862306a36Sopenharmony_ci	.act		=	tcf_bpf_act,
39962306a36Sopenharmony_ci	.dump		=	tcf_bpf_dump,
40062306a36Sopenharmony_ci	.cleanup	=	tcf_bpf_cleanup,
40162306a36Sopenharmony_ci	.init		=	tcf_bpf_init,
40262306a36Sopenharmony_ci	.size		=	sizeof(struct tcf_bpf),
40362306a36Sopenharmony_ci};
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_cistatic __net_init int bpf_init_net(struct net *net)
40662306a36Sopenharmony_ci{
40762306a36Sopenharmony_ci	struct tc_action_net *tn = net_generic(net, act_bpf_ops.net_id);
40862306a36Sopenharmony_ci
40962306a36Sopenharmony_ci	return tc_action_net_init(net, tn, &act_bpf_ops);
41062306a36Sopenharmony_ci}
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_cistatic void __net_exit bpf_exit_net(struct list_head *net_list)
41362306a36Sopenharmony_ci{
41462306a36Sopenharmony_ci	tc_action_net_exit(net_list, act_bpf_ops.net_id);
41562306a36Sopenharmony_ci}
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_cistatic struct pernet_operations bpf_net_ops = {
41862306a36Sopenharmony_ci	.init = bpf_init_net,
41962306a36Sopenharmony_ci	.exit_batch = bpf_exit_net,
42062306a36Sopenharmony_ci	.id   = &act_bpf_ops.net_id,
42162306a36Sopenharmony_ci	.size = sizeof(struct tc_action_net),
42262306a36Sopenharmony_ci};
42362306a36Sopenharmony_ci
42462306a36Sopenharmony_cistatic int __init bpf_init_module(void)
42562306a36Sopenharmony_ci{
42662306a36Sopenharmony_ci	return tcf_register_action(&act_bpf_ops, &bpf_net_ops);
42762306a36Sopenharmony_ci}
42862306a36Sopenharmony_ci
42962306a36Sopenharmony_cistatic void __exit bpf_cleanup_module(void)
43062306a36Sopenharmony_ci{
43162306a36Sopenharmony_ci	tcf_unregister_action(&act_bpf_ops, &bpf_net_ops);
43262306a36Sopenharmony_ci}
43362306a36Sopenharmony_ci
43462306a36Sopenharmony_cimodule_init(bpf_init_module);
43562306a36Sopenharmony_cimodule_exit(bpf_cleanup_module);
43662306a36Sopenharmony_ci
43762306a36Sopenharmony_ciMODULE_AUTHOR("Jiri Pirko <jiri@resnulli.us>");
43862306a36Sopenharmony_ciMODULE_DESCRIPTION("TC BPF based action");
43962306a36Sopenharmony_ciMODULE_LICENSE("GPL v2");
440