2 * Copyright (c) 2016, Amir Vadai <amir@vadai.me>
3 * Copyright (c) 2016, Mellanox Technologies. All rights reserved.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
11 #include <linux/module.h>
12 #include <linux/init.h>
13 #include <linux/kernel.h>
14 #include <linux/skbuff.h>
15 #include <linux/rtnetlink.h>
16 #include <net/netlink.h>
17 #include <net/pkt_sched.h>
19 #include <net/dst_metadata.h>
21 #include <linux/tc_act/tc_tunnel_key.h>
22 #include <net/tc_act/tc_tunnel_key.h>
24 #define TUNNEL_KEY_TAB_MASK 15
26 static int tunnel_key_net_id
;
27 static struct tc_action_ops act_tunnel_key_ops
;
29 static int tunnel_key_act(struct sk_buff
*skb
, const struct tc_action
*a
,
30 struct tcf_result
*res
)
32 struct tcf_tunnel_key
*t
= to_tunnel_key(a
);
33 struct tcf_tunnel_key_params
*params
;
38 params
= rcu_dereference(t
->params
);
40 tcf_lastuse_update(&t
->tcf_tm
);
41 bstats_cpu_update(this_cpu_ptr(t
->common
.cpu_bstats
), skb
);
42 action
= READ_ONCE(t
->tcf_action
);
44 switch (params
->tcft_action
) {
45 case TCA_TUNNEL_KEY_ACT_RELEASE
:
48 case TCA_TUNNEL_KEY_ACT_SET
:
50 skb_dst_set(skb
, dst_clone(¶ms
->tcft_enc_metadata
->dst
));
53 WARN_ONCE(1, "Bad tunnel_key action %d.\n",
63 static const struct nla_policy tunnel_key_policy
[TCA_TUNNEL_KEY_MAX
+ 1] = {
64 [TCA_TUNNEL_KEY_PARMS
] = { .len
= sizeof(struct tc_tunnel_key
) },
65 [TCA_TUNNEL_KEY_ENC_IPV4_SRC
] = { .type
= NLA_U32
},
66 [TCA_TUNNEL_KEY_ENC_IPV4_DST
] = { .type
= NLA_U32
},
67 [TCA_TUNNEL_KEY_ENC_IPV6_SRC
] = { .len
= sizeof(struct in6_addr
) },
68 [TCA_TUNNEL_KEY_ENC_IPV6_DST
] = { .len
= sizeof(struct in6_addr
) },
69 [TCA_TUNNEL_KEY_ENC_KEY_ID
] = { .type
= NLA_U32
},
72 static int tunnel_key_init(struct net
*net
, struct nlattr
*nla
,
73 struct nlattr
*est
, struct tc_action
**a
,
76 struct tc_action_net
*tn
= net_generic(net
, tunnel_key_net_id
);
77 struct nlattr
*tb
[TCA_TUNNEL_KEY_MAX
+ 1];
78 struct tcf_tunnel_key_params
*params_old
;
79 struct tcf_tunnel_key_params
*params_new
;
80 struct metadata_dst
*metadata
= NULL
;
81 struct tc_tunnel_key
*parm
;
82 struct tcf_tunnel_key
*t
;
91 err
= nla_parse_nested(tb
, TCA_TUNNEL_KEY_MAX
, nla
, tunnel_key_policy
);
95 if (!tb
[TCA_TUNNEL_KEY_PARMS
])
98 parm
= nla_data(tb
[TCA_TUNNEL_KEY_PARMS
]);
99 exists
= tcf_hash_check(tn
, parm
->index
, a
, bind
);
103 switch (parm
->t_action
) {
104 case TCA_TUNNEL_KEY_ACT_RELEASE
:
106 case TCA_TUNNEL_KEY_ACT_SET
:
107 if (!tb
[TCA_TUNNEL_KEY_ENC_KEY_ID
]) {
112 key_id
= key32_to_tunnel_id(nla_get_be32(tb
[TCA_TUNNEL_KEY_ENC_KEY_ID
]));
114 if (tb
[TCA_TUNNEL_KEY_ENC_IPV4_SRC
] &&
115 tb
[TCA_TUNNEL_KEY_ENC_IPV4_DST
]) {
119 saddr
= nla_get_in_addr(tb
[TCA_TUNNEL_KEY_ENC_IPV4_SRC
]);
120 daddr
= nla_get_in_addr(tb
[TCA_TUNNEL_KEY_ENC_IPV4_DST
]);
122 metadata
= __ip_tun_set_dst(saddr
, daddr
, 0, 0,
123 TUNNEL_KEY
, key_id
, 0);
124 } else if (tb
[TCA_TUNNEL_KEY_ENC_IPV6_SRC
] &&
125 tb
[TCA_TUNNEL_KEY_ENC_IPV6_DST
]) {
126 struct in6_addr saddr
;
127 struct in6_addr daddr
;
129 saddr
= nla_get_in6_addr(tb
[TCA_TUNNEL_KEY_ENC_IPV6_SRC
]);
130 daddr
= nla_get_in6_addr(tb
[TCA_TUNNEL_KEY_ENC_IPV6_DST
]);
132 metadata
= __ipv6_tun_set_dst(&saddr
, &daddr
, 0, 0, 0,
133 TUNNEL_KEY
, key_id
, 0);
141 metadata
->u
.tun_info
.mode
|= IP_TUNNEL_INFO_TX
;
149 ret
= tcf_hash_create(tn
, parm
->index
, est
, a
,
150 &act_tunnel_key_ops
, bind
, true);
156 tcf_hash_release(*a
, bind
);
161 t
= to_tunnel_key(*a
);
164 params_new
= kzalloc(sizeof(*params_new
), GFP_KERNEL
);
165 if (unlikely(!params_new
)) {
166 if (ret
== ACT_P_CREATED
)
167 tcf_hash_release(*a
, bind
);
171 params_old
= rtnl_dereference(t
->params
);
173 t
->tcf_action
= parm
->action
;
174 params_new
->tcft_action
= parm
->t_action
;
175 params_new
->tcft_enc_metadata
= metadata
;
177 rcu_assign_pointer(t
->params
, params_new
);
180 kfree_rcu(params_old
, rcu
);
182 if (ret
== ACT_P_CREATED
)
183 tcf_hash_insert(tn
, *a
);
189 tcf_hash_release(*a
, bind
);
193 static void tunnel_key_release(struct tc_action
*a
, int bind
)
195 struct tcf_tunnel_key
*t
= to_tunnel_key(a
);
196 struct tcf_tunnel_key_params
*params
;
198 params
= rcu_dereference_protected(t
->params
, 1);
200 if (params
->tcft_action
== TCA_TUNNEL_KEY_ACT_SET
)
201 dst_release(¶ms
->tcft_enc_metadata
->dst
);
203 kfree_rcu(params
, rcu
);
207 static int tunnel_key_dump_addresses(struct sk_buff
*skb
,
208 const struct ip_tunnel_info
*info
)
210 unsigned short family
= ip_tunnel_info_af(info
);
212 if (family
== AF_INET
) {
213 __be32 saddr
= info
->key
.u
.ipv4
.src
;
214 __be32 daddr
= info
->key
.u
.ipv4
.dst
;
216 if (!nla_put_in_addr(skb
, TCA_TUNNEL_KEY_ENC_IPV4_SRC
, saddr
) &&
217 !nla_put_in_addr(skb
, TCA_TUNNEL_KEY_ENC_IPV4_DST
, daddr
))
221 if (family
== AF_INET6
) {
222 const struct in6_addr
*saddr6
= &info
->key
.u
.ipv6
.src
;
223 const struct in6_addr
*daddr6
= &info
->key
.u
.ipv6
.dst
;
225 if (!nla_put_in6_addr(skb
,
226 TCA_TUNNEL_KEY_ENC_IPV6_SRC
, saddr6
) &&
227 !nla_put_in6_addr(skb
,
228 TCA_TUNNEL_KEY_ENC_IPV6_DST
, daddr6
))
235 static int tunnel_key_dump(struct sk_buff
*skb
, struct tc_action
*a
,
238 unsigned char *b
= skb_tail_pointer(skb
);
239 struct tcf_tunnel_key
*t
= to_tunnel_key(a
);
240 struct tcf_tunnel_key_params
*params
;
241 struct tc_tunnel_key opt
= {
242 .index
= t
->tcf_index
,
243 .refcnt
= t
->tcf_refcnt
- ref
,
244 .bindcnt
= t
->tcf_bindcnt
- bind
,
245 .action
= t
->tcf_action
,
249 params
= rtnl_dereference(t
->params
);
251 opt
.t_action
= params
->tcft_action
;
253 if (nla_put(skb
, TCA_TUNNEL_KEY_PARMS
, sizeof(opt
), &opt
))
254 goto nla_put_failure
;
256 if (params
->tcft_action
== TCA_TUNNEL_KEY_ACT_SET
) {
257 struct ip_tunnel_key
*key
=
258 ¶ms
->tcft_enc_metadata
->u
.tun_info
.key
;
259 __be32 key_id
= tunnel_id_to_key32(key
->tun_id
);
261 if (nla_put_be32(skb
, TCA_TUNNEL_KEY_ENC_KEY_ID
, key_id
) ||
262 tunnel_key_dump_addresses(skb
,
263 ¶ms
->tcft_enc_metadata
->u
.tun_info
))
264 goto nla_put_failure
;
267 tcf_tm_dump(&tm
, &t
->tcf_tm
);
268 if (nla_put_64bit(skb
, TCA_TUNNEL_KEY_TM
, sizeof(tm
),
269 &tm
, TCA_TUNNEL_KEY_PAD
))
270 goto nla_put_failure
;
279 static int tunnel_key_walker(struct net
*net
, struct sk_buff
*skb
,
280 struct netlink_callback
*cb
, int type
,
281 const struct tc_action_ops
*ops
)
283 struct tc_action_net
*tn
= net_generic(net
, tunnel_key_net_id
);
285 return tcf_generic_walker(tn
, skb
, cb
, type
, ops
);
288 static int tunnel_key_search(struct net
*net
, struct tc_action
**a
, u32 index
)
290 struct tc_action_net
*tn
= net_generic(net
, tunnel_key_net_id
);
292 return tcf_hash_search(tn
, a
, index
);
295 static struct tc_action_ops act_tunnel_key_ops
= {
296 .kind
= "tunnel_key",
297 .type
= TCA_ACT_TUNNEL_KEY
,
298 .owner
= THIS_MODULE
,
299 .act
= tunnel_key_act
,
300 .dump
= tunnel_key_dump
,
301 .init
= tunnel_key_init
,
302 .cleanup
= tunnel_key_release
,
303 .walk
= tunnel_key_walker
,
304 .lookup
= tunnel_key_search
,
305 .size
= sizeof(struct tcf_tunnel_key
),
308 static __net_init
int tunnel_key_init_net(struct net
*net
)
310 struct tc_action_net
*tn
= net_generic(net
, tunnel_key_net_id
);
312 return tc_action_net_init(tn
, &act_tunnel_key_ops
, TUNNEL_KEY_TAB_MASK
);
315 static void __net_exit
tunnel_key_exit_net(struct net
*net
)
317 struct tc_action_net
*tn
= net_generic(net
, tunnel_key_net_id
);
319 tc_action_net_exit(tn
);
322 static struct pernet_operations tunnel_key_net_ops
= {
323 .init
= tunnel_key_init_net
,
324 .exit
= tunnel_key_exit_net
,
325 .id
= &tunnel_key_net_id
,
326 .size
= sizeof(struct tc_action_net
),
329 static int __init
tunnel_key_init_module(void)
331 return tcf_register_action(&act_tunnel_key_ops
, &tunnel_key_net_ops
);
334 static void __exit
tunnel_key_cleanup_module(void)
336 tcf_unregister_action(&act_tunnel_key_ops
, &tunnel_key_net_ops
);
339 module_init(tunnel_key_init_module
);
340 module_exit(tunnel_key_cleanup_module
);
342 MODULE_AUTHOR("Amir Vadai <amir@vadai.me>");
343 MODULE_DESCRIPTION("ip tunnel manipulation actions");
344 MODULE_LICENSE("GPL v2");