2016-11-08 16:57:41 +03:00
|
|
|
/*
|
|
|
|
* SR-IPv6 implementation
|
|
|
|
*
|
|
|
|
* Author:
|
|
|
|
* David Lebrun <david.lebrun@uclouvain.be>
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <net/ip.h>
|
|
|
|
#include <net/lwtunnel.h>
|
|
|
|
#include <net/netevent.h>
|
|
|
|
#include <net/netns/generic.h>
|
|
|
|
#include <net/ip6_fib.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
#include <net/seg6.h>
|
|
|
|
#include <linux/seg6.h>
|
|
|
|
#include <linux/seg6_iptunnel.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/dst_cache.h>
|
2016-11-08 16:59:19 +03:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
#include <net/seg6_hmac.h>
|
|
|
|
#endif
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
struct seg6_lwt {
|
|
|
|
struct dst_cache cache;
|
|
|
|
struct seg6_iptunnel_encap tuninfo[0];
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct seg6_lwt *seg6_lwt_lwtunnel(struct lwtunnel_state *lwt)
|
|
|
|
{
|
|
|
|
return (struct seg6_lwt *)lwt->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct seg6_iptunnel_encap *
|
|
|
|
seg6_encap_lwtunnel(struct lwtunnel_state *lwt)
|
|
|
|
{
|
|
|
|
return seg6_lwt_lwtunnel(lwt)->tuninfo;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct nla_policy seg6_iptunnel_policy[SEG6_IPTUNNEL_MAX + 1] = {
|
|
|
|
[SEG6_IPTUNNEL_SRH] = { .type = NLA_BINARY },
|
|
|
|
};
|
|
|
|
|
2017-02-06 19:15:05 +03:00
|
|
|
static int nla_put_srh(struct sk_buff *skb, int attrtype,
|
|
|
|
struct seg6_iptunnel_encap *tuninfo)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
|
|
|
struct seg6_iptunnel_encap *data;
|
|
|
|
struct nlattr *nla;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
len = SEG6_IPTUN_ENCAP_SIZE(tuninfo);
|
|
|
|
|
|
|
|
nla = nla_reserve(skb, attrtype, len);
|
|
|
|
if (!nla)
|
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
data = nla_data(nla);
|
|
|
|
memcpy(data, tuninfo, len);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_tun_src(struct net *net, struct net_device *dev,
|
|
|
|
struct in6_addr *daddr, struct in6_addr *saddr)
|
|
|
|
{
|
|
|
|
struct seg6_pernet_data *sdata = seg6_pernet(net);
|
|
|
|
struct in6_addr *tun_src;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
|
|
|
|
tun_src = rcu_dereference(sdata->tun_src);
|
|
|
|
|
|
|
|
if (!ipv6_addr_any(tun_src)) {
|
|
|
|
memcpy(saddr, tun_src, sizeof(struct in6_addr));
|
|
|
|
} else {
|
|
|
|
ipv6_dev_get_saddr(net, dev, daddr, IPV6_PREFER_SRC_PUBLIC,
|
|
|
|
saddr);
|
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* encapsulate an IPv6 packet within an outer IPv6 header with a given SRH */
|
2017-08-25 10:56:44 +03:00
|
|
|
int seg6_do_srh_encap(struct sk_buff *skb, struct ipv6_sr_hdr *osrh, int proto)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
|
|
|
struct net *net = dev_net(skb_dst(skb)->dev);
|
|
|
|
struct ipv6hdr *hdr, *inner_hdr;
|
|
|
|
struct ipv6_sr_hdr *isrh;
|
|
|
|
int hdrlen, tot_len, err;
|
|
|
|
|
|
|
|
hdrlen = (osrh->hdrlen + 1) << 3;
|
|
|
|
tot_len = hdrlen + sizeof(*hdr);
|
|
|
|
|
ipv6: sr: expand skb head only if necessary
To insert or encapsulate a packet with an SRH, we need a large enough skb
headroom. Currently, we are using pskb_expand_head to inconditionally increase
the size of the headroom by the amount needed by the SRH (and IPv6 header).
If this reallocation is performed by another CPU than the one that initially
allocated the skb, then when the initial CPU kfree the skb, it will enter the
__slab_free slowpath, impacting performances.
This patch replaces pskb_expand_head with skb_cow_head, that will reallocate the
skb head only if the headroom is not large enough.
Performances for SRH encapsulation before the patch:
Result: OK: 7348320(c7347271+d1048) usec, 5000000 (1000byte,0frags)
680427pps 5443Mb/sec (5443416000bps) errors: 0
Performances after the patch:
Result: OK: 5656067(c5655678+d388) usec, 5000000 (1000byte,0frags)
884006pps 7072Mb/sec (7072048000bps) errors: 0
Signed-off-by: David Lebrun <david.lebrun@uclouvain.be>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-03-24 12:46:26 +03:00
|
|
|
err = skb_cow_head(skb, tot_len);
|
2016-11-08 16:57:41 +03:00
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
|
|
|
|
inner_hdr = ipv6_hdr(skb);
|
|
|
|
|
|
|
|
skb_push(skb, tot_len);
|
|
|
|
skb_reset_network_header(skb);
|
|
|
|
skb_mac_header_rebuild(skb);
|
|
|
|
hdr = ipv6_hdr(skb);
|
|
|
|
|
|
|
|
/* inherit tc, flowlabel and hlim
|
|
|
|
* hlim will be decremented in ip6_forward() afterwards and
|
|
|
|
* decapsulation will overwrite inner hlim with outer hlim
|
|
|
|
*/
|
2017-08-25 10:56:44 +03:00
|
|
|
|
|
|
|
if (skb->protocol == htons(ETH_P_IPV6)) {
|
|
|
|
ip6_flow_hdr(hdr, ip6_tclass(ip6_flowinfo(inner_hdr)),
|
|
|
|
ip6_flowlabel(inner_hdr));
|
|
|
|
hdr->hop_limit = inner_hdr->hop_limit;
|
|
|
|
} else {
|
|
|
|
ip6_flow_hdr(hdr, 0, 0);
|
|
|
|
hdr->hop_limit = ip6_dst_hoplimit(skb_dst(skb));
|
|
|
|
}
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
hdr->nexthdr = NEXTHDR_ROUTING;
|
|
|
|
|
|
|
|
isrh = (void *)hdr + sizeof(*hdr);
|
|
|
|
memcpy(isrh, osrh, hdrlen);
|
|
|
|
|
2017-08-25 10:56:44 +03:00
|
|
|
isrh->nexthdr = proto;
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
hdr->daddr = isrh->segments[isrh->first_segment];
|
|
|
|
set_tun_src(net, skb->dev, &hdr->daddr, &hdr->saddr);
|
|
|
|
|
2016-11-08 16:59:19 +03:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
if (sr_has_hmac(isrh)) {
|
|
|
|
err = seg6_push_hmac(net, &hdr->saddr, isrh);
|
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
skb_postpush_rcsum(skb, hdr, tot_len);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2017-08-05 13:38:25 +03:00
|
|
|
EXPORT_SYMBOL_GPL(seg6_do_srh_encap);
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
/* insert an SRH within an IPv6 packet, just after the IPv6 header */
|
2017-08-05 13:38:25 +03:00
|
|
|
int seg6_do_srh_inline(struct sk_buff *skb, struct ipv6_sr_hdr *osrh)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
|
|
|
struct ipv6hdr *hdr, *oldhdr;
|
|
|
|
struct ipv6_sr_hdr *isrh;
|
|
|
|
int hdrlen, err;
|
|
|
|
|
|
|
|
hdrlen = (osrh->hdrlen + 1) << 3;
|
|
|
|
|
ipv6: sr: expand skb head only if necessary
To insert or encapsulate a packet with an SRH, we need a large enough skb
headroom. Currently, we are using pskb_expand_head to inconditionally increase
the size of the headroom by the amount needed by the SRH (and IPv6 header).
If this reallocation is performed by another CPU than the one that initially
allocated the skb, then when the initial CPU kfree the skb, it will enter the
__slab_free slowpath, impacting performances.
This patch replaces pskb_expand_head with skb_cow_head, that will reallocate the
skb head only if the headroom is not large enough.
Performances for SRH encapsulation before the patch:
Result: OK: 7348320(c7347271+d1048) usec, 5000000 (1000byte,0frags)
680427pps 5443Mb/sec (5443416000bps) errors: 0
Performances after the patch:
Result: OK: 5656067(c5655678+d388) usec, 5000000 (1000byte,0frags)
884006pps 7072Mb/sec (7072048000bps) errors: 0
Signed-off-by: David Lebrun <david.lebrun@uclouvain.be>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-03-24 12:46:26 +03:00
|
|
|
err = skb_cow_head(skb, hdrlen);
|
2016-11-08 16:57:41 +03:00
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
|
|
|
|
oldhdr = ipv6_hdr(skb);
|
|
|
|
|
|
|
|
skb_pull(skb, sizeof(struct ipv6hdr));
|
|
|
|
skb_postpull_rcsum(skb, skb_network_header(skb),
|
|
|
|
sizeof(struct ipv6hdr));
|
|
|
|
|
|
|
|
skb_push(skb, sizeof(struct ipv6hdr) + hdrlen);
|
|
|
|
skb_reset_network_header(skb);
|
|
|
|
skb_mac_header_rebuild(skb);
|
|
|
|
|
|
|
|
hdr = ipv6_hdr(skb);
|
|
|
|
|
|
|
|
memmove(hdr, oldhdr, sizeof(*hdr));
|
|
|
|
|
|
|
|
isrh = (void *)hdr + sizeof(*hdr);
|
|
|
|
memcpy(isrh, osrh, hdrlen);
|
|
|
|
|
|
|
|
isrh->nexthdr = hdr->nexthdr;
|
|
|
|
hdr->nexthdr = NEXTHDR_ROUTING;
|
|
|
|
|
|
|
|
isrh->segments[0] = hdr->daddr;
|
|
|
|
hdr->daddr = isrh->segments[isrh->first_segment];
|
|
|
|
|
2016-11-08 16:59:19 +03:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
if (sr_has_hmac(isrh)) {
|
|
|
|
struct net *net = dev_net(skb_dst(skb)->dev);
|
|
|
|
|
|
|
|
err = seg6_push_hmac(net, &hdr->saddr, isrh);
|
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
skb_postpush_rcsum(skb, hdr, sizeof(struct ipv6hdr) + hdrlen);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2017-08-05 13:38:25 +03:00
|
|
|
EXPORT_SYMBOL_GPL(seg6_do_srh_inline);
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
static int seg6_do_srh(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct dst_entry *dst = skb_dst(skb);
|
|
|
|
struct seg6_iptunnel_encap *tinfo;
|
2017-08-25 10:56:44 +03:00
|
|
|
int proto, err = 0;
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
tinfo = seg6_encap_lwtunnel(dst->lwtstate);
|
|
|
|
|
|
|
|
if (likely(!skb->encapsulation)) {
|
|
|
|
skb_reset_inner_headers(skb);
|
|
|
|
skb->encapsulation = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (tinfo->mode) {
|
|
|
|
case SEG6_IPTUN_MODE_INLINE:
|
2017-08-25 10:56:44 +03:00
|
|
|
if (skb->protocol != htons(ETH_P_IPV6))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
err = seg6_do_srh_inline(skb, tinfo->srh);
|
2017-08-25 10:56:44 +03:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
skb_reset_inner_headers(skb);
|
|
|
|
break;
|
|
|
|
case SEG6_IPTUN_MODE_ENCAP:
|
2017-08-25 10:56:44 +03:00
|
|
|
if (skb->protocol == htons(ETH_P_IPV6))
|
|
|
|
proto = IPPROTO_IPV6;
|
|
|
|
else if (skb->protocol == htons(ETH_P_IP))
|
|
|
|
proto = IPPROTO_IPIP;
|
|
|
|
else
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
err = seg6_do_srh_encap(skb, tinfo->srh, proto);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
skb->protocol = htons(ETH_P_IPV6);
|
2016-11-08 16:57:41 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr));
|
|
|
|
skb_set_transport_header(skb, sizeof(struct ipv6hdr));
|
|
|
|
|
|
|
|
skb_set_inner_protocol(skb, skb->protocol);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-02-06 19:15:05 +03:00
|
|
|
static int seg6_input(struct sk_buff *skb)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
2017-03-24 12:46:27 +03:00
|
|
|
struct dst_entry *orig_dst = skb_dst(skb);
|
|
|
|
struct dst_entry *dst = NULL;
|
|
|
|
struct seg6_lwt *slwt;
|
2016-11-08 16:57:41 +03:00
|
|
|
int err;
|
|
|
|
|
|
|
|
err = seg6_do_srh(skb);
|
|
|
|
if (unlikely(err)) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-03-24 12:46:27 +03:00
|
|
|
slwt = seg6_lwt_lwtunnel(orig_dst->lwtstate);
|
|
|
|
|
|
|
|
preempt_disable();
|
|
|
|
dst = dst_cache_get(&slwt->cache);
|
|
|
|
preempt_enable();
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
skb_dst_drop(skb);
|
2017-03-24 12:46:27 +03:00
|
|
|
|
|
|
|
if (!dst) {
|
|
|
|
ip6_route_input(skb);
|
|
|
|
dst = skb_dst(skb);
|
|
|
|
if (!dst->error) {
|
|
|
|
preempt_disable();
|
|
|
|
dst_cache_set_ip6(&slwt->cache, dst,
|
|
|
|
&ipv6_hdr(skb)->saddr);
|
|
|
|
preempt_enable();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
skb_dst_set(skb, dst);
|
|
|
|
}
|
2016-11-08 16:57:41 +03:00
|
|
|
|
2017-04-16 13:27:14 +03:00
|
|
|
err = skb_cow_head(skb, LL_RESERVED_SPACE(dst->dev));
|
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
return dst_input(skb);
|
|
|
|
}
|
|
|
|
|
2017-02-06 19:15:05 +03:00
|
|
|
static int seg6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
|
|
|
struct dst_entry *orig_dst = skb_dst(skb);
|
|
|
|
struct dst_entry *dst = NULL;
|
|
|
|
struct seg6_lwt *slwt;
|
|
|
|
int err = -EINVAL;
|
|
|
|
|
|
|
|
err = seg6_do_srh(skb);
|
|
|
|
if (unlikely(err))
|
|
|
|
goto drop;
|
|
|
|
|
|
|
|
slwt = seg6_lwt_lwtunnel(orig_dst->lwtstate);
|
|
|
|
|
2017-01-12 23:30:01 +03:00
|
|
|
preempt_disable();
|
2016-11-08 16:57:41 +03:00
|
|
|
dst = dst_cache_get(&slwt->cache);
|
2017-01-12 23:30:01 +03:00
|
|
|
preempt_enable();
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
if (unlikely(!dst)) {
|
|
|
|
struct ipv6hdr *hdr = ipv6_hdr(skb);
|
|
|
|
struct flowi6 fl6;
|
|
|
|
|
|
|
|
fl6.daddr = hdr->daddr;
|
|
|
|
fl6.saddr = hdr->saddr;
|
|
|
|
fl6.flowlabel = ip6_flowinfo(hdr);
|
|
|
|
fl6.flowi6_mark = skb->mark;
|
|
|
|
fl6.flowi6_proto = hdr->nexthdr;
|
|
|
|
|
|
|
|
dst = ip6_route_output(net, NULL, &fl6);
|
|
|
|
if (dst->error) {
|
|
|
|
err = dst->error;
|
|
|
|
dst_release(dst);
|
|
|
|
goto drop;
|
|
|
|
}
|
|
|
|
|
2017-01-12 23:30:01 +03:00
|
|
|
preempt_disable();
|
2016-11-08 16:57:41 +03:00
|
|
|
dst_cache_set_ip6(&slwt->cache, dst, &fl6.saddr);
|
2017-01-12 23:30:01 +03:00
|
|
|
preempt_enable();
|
2016-11-08 16:57:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
skb_dst_drop(skb);
|
|
|
|
skb_dst_set(skb, dst);
|
|
|
|
|
2017-04-16 13:27:14 +03:00
|
|
|
err = skb_cow_head(skb, LL_RESERVED_SPACE(dst->dev));
|
|
|
|
if (unlikely(err))
|
|
|
|
goto drop;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
return dst_output(net, sk, skb);
|
|
|
|
drop:
|
|
|
|
kfree_skb(skb);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-01-30 23:07:37 +03:00
|
|
|
static int seg6_build_state(struct nlattr *nla,
|
2016-11-08 16:57:41 +03:00
|
|
|
unsigned int family, const void *cfg,
|
2017-05-28 01:19:28 +03:00
|
|
|
struct lwtunnel_state **ts,
|
|
|
|
struct netlink_ext_ack *extack)
|
2016-11-08 16:57:41 +03:00
|
|
|
{
|
|
|
|
struct nlattr *tb[SEG6_IPTUNNEL_MAX + 1];
|
|
|
|
struct seg6_iptunnel_encap *tuninfo;
|
|
|
|
struct lwtunnel_state *newts;
|
|
|
|
int tuninfo_len, min_size;
|
|
|
|
struct seg6_lwt *slwt;
|
|
|
|
int err;
|
|
|
|
|
2017-08-25 10:56:44 +03:00
|
|
|
if (family != AF_INET && family != AF_INET6)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
err = nla_parse_nested(tb, SEG6_IPTUNNEL_MAX, nla,
|
2017-05-28 01:19:28 +03:00
|
|
|
seg6_iptunnel_policy, extack);
|
2016-11-08 16:57:41 +03:00
|
|
|
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (!tb[SEG6_IPTUNNEL_SRH])
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
tuninfo = nla_data(tb[SEG6_IPTUNNEL_SRH]);
|
|
|
|
tuninfo_len = nla_len(tb[SEG6_IPTUNNEL_SRH]);
|
|
|
|
|
|
|
|
/* tuninfo must contain at least the iptunnel encap structure,
|
|
|
|
* the SRH and one segment
|
|
|
|
*/
|
|
|
|
min_size = sizeof(*tuninfo) + sizeof(struct ipv6_sr_hdr) +
|
|
|
|
sizeof(struct in6_addr);
|
|
|
|
if (tuninfo_len < min_size)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (tuninfo->mode) {
|
|
|
|
case SEG6_IPTUN_MODE_INLINE:
|
2017-08-25 10:56:44 +03:00
|
|
|
if (family != AF_INET6)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2016-11-08 16:57:41 +03:00
|
|
|
break;
|
|
|
|
case SEG6_IPTUN_MODE_ENCAP:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* verify that SRH is consistent */
|
|
|
|
if (!seg6_validate_srh(tuninfo->srh, tuninfo_len - sizeof(*tuninfo)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
newts = lwtunnel_state_alloc(tuninfo_len + sizeof(*slwt));
|
|
|
|
if (!newts)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
slwt = seg6_lwt_lwtunnel(newts);
|
|
|
|
|
|
|
|
err = dst_cache_init(&slwt->cache, GFP_KERNEL);
|
|
|
|
if (err) {
|
|
|
|
kfree(newts);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&slwt->tuninfo, tuninfo, tuninfo_len);
|
|
|
|
|
|
|
|
newts->type = LWTUNNEL_ENCAP_SEG6;
|
|
|
|
newts->flags |= LWTUNNEL_STATE_OUTPUT_REDIRECT |
|
|
|
|
LWTUNNEL_STATE_INPUT_REDIRECT;
|
|
|
|
newts->headroom = seg6_lwt_headroom(tuninfo);
|
|
|
|
|
|
|
|
*ts = newts;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void seg6_destroy_state(struct lwtunnel_state *lwt)
|
|
|
|
{
|
|
|
|
dst_cache_destroy(&seg6_lwt_lwtunnel(lwt)->cache);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int seg6_fill_encap_info(struct sk_buff *skb,
|
|
|
|
struct lwtunnel_state *lwtstate)
|
|
|
|
{
|
|
|
|
struct seg6_iptunnel_encap *tuninfo = seg6_encap_lwtunnel(lwtstate);
|
|
|
|
|
|
|
|
if (nla_put_srh(skb, SEG6_IPTUNNEL_SRH, tuninfo))
|
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int seg6_encap_nlsize(struct lwtunnel_state *lwtstate)
|
|
|
|
{
|
|
|
|
struct seg6_iptunnel_encap *tuninfo = seg6_encap_lwtunnel(lwtstate);
|
|
|
|
|
|
|
|
return nla_total_size(SEG6_IPTUN_ENCAP_SIZE(tuninfo));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int seg6_encap_cmp(struct lwtunnel_state *a, struct lwtunnel_state *b)
|
|
|
|
{
|
|
|
|
struct seg6_iptunnel_encap *a_hdr = seg6_encap_lwtunnel(a);
|
|
|
|
struct seg6_iptunnel_encap *b_hdr = seg6_encap_lwtunnel(b);
|
|
|
|
int len = SEG6_IPTUN_ENCAP_SIZE(a_hdr);
|
|
|
|
|
|
|
|
if (len != SEG6_IPTUN_ENCAP_SIZE(b_hdr))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return memcmp(a_hdr, b_hdr, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct lwtunnel_encap_ops seg6_iptun_ops = {
|
|
|
|
.build_state = seg6_build_state,
|
|
|
|
.destroy_state = seg6_destroy_state,
|
|
|
|
.output = seg6_output,
|
|
|
|
.input = seg6_input,
|
|
|
|
.fill_encap = seg6_fill_encap_info,
|
|
|
|
.get_encap_size = seg6_encap_nlsize,
|
|
|
|
.cmp_encap = seg6_encap_cmp,
|
2017-01-24 19:26:47 +03:00
|
|
|
.owner = THIS_MODULE,
|
2016-11-08 16:57:41 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
int __init seg6_iptunnel_init(void)
|
|
|
|
{
|
|
|
|
return lwtunnel_encap_add_ops(&seg6_iptun_ops, LWTUNNEL_ENCAP_SEG6);
|
|
|
|
}
|
|
|
|
|
|
|
|
void seg6_iptunnel_exit(void)
|
|
|
|
{
|
|
|
|
lwtunnel_encap_del_ops(&seg6_iptun_ops, LWTUNNEL_ENCAP_SEG6);
|
|
|
|
}
|