[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20211014121046.29329-10-fw@strlen.de>
Date: Thu, 14 Oct 2021 14:10:45 +0200
From: Florian Westphal <fw@...len.de>
To: <netfilter-devel@...r.kernel.org>
Cc: bpf@...r.kernel.org, netdev@...r.kernel.org, me@...que.spb.ru,
Florian Westphal <fw@...len.de>
Subject: [PATCH RFC nf-next 8/9] netfilter: ingress: switch to invocation via bpf
Signed-off-by: Florian Westphal <fw@...len.de>
---
include/linux/netfilter_ingress.h | 15 +++++++++++++++
1 file changed, 15 insertions(+)
diff --git a/include/linux/netfilter_ingress.h b/include/linux/netfilter_ingress.h
index c95f84a5badc..20e0b1c2c706 100644
--- a/include/linux/netfilter_ingress.h
+++ b/include/linux/netfilter_ingress.h
@@ -19,6 +19,9 @@ static inline bool nf_hook_ingress_active(const struct sk_buff *skb)
static inline int nf_hook_ingress(struct sk_buff *skb)
{
struct nf_hook_entries *e = rcu_dereference(skb->dev->nf_hooks_ingress);
+#if IS_ENABLED(CONFIG_NF_HOOK_BPF)
+ const struct bpf_prog *prog;
+#endif
struct nf_hook_state state;
int ret;
@@ -31,7 +34,19 @@ static inline int nf_hook_ingress(struct sk_buff *skb)
nf_hook_state_init(&state, NF_NETDEV_INGRESS,
NFPROTO_NETDEV, skb->dev, NULL, NULL,
dev_net(skb->dev), NULL);
+
+#if IS_ENABLED(CONFIG_NF_HOOK_BPF)
+ prog = READ_ONCE(e->hook_prog);
+
+ state.priv = (void *)e;
+ state.skb = skb;
+
+ migrate_disable();
+ ret = bpf_prog_run_nf(prog, &state);
+ migrate_enable();
+#else
ret = nf_hook_slow(skb, &state, e);
+#endif
if (ret == 0)
return -1;
--
2.32.0
Powered by blists - more mailing lists