br_vlan_tunnel.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * Bridge per vlan tunnel port dst_metadata handling code
  4. *
  5. * Authors:
  6. * Roopa Prabhu <roopa@cumulusnetworks.com>
  7. */
  8. #include <linux/kernel.h>
  9. #include <linux/netdevice.h>
  10. #include <linux/rtnetlink.h>
  11. #include <linux/slab.h>
  12. #include <net/switchdev.h>
  13. #include <net/dst_metadata.h>
  14. #include "br_private.h"
  15. #include "br_private_tunnel.h"
  16. static inline int br_vlan_tunid_cmp(struct rhashtable_compare_arg *arg,
  17. const void *ptr)
  18. {
  19. const struct net_bridge_vlan *vle = ptr;
  20. __be64 tunid = *(__be64 *)arg->key;
  21. return vle->tinfo.tunnel_id != tunid;
  22. }
  23. static const struct rhashtable_params br_vlan_tunnel_rht_params = {
  24. .head_offset = offsetof(struct net_bridge_vlan, tnode),
  25. .key_offset = offsetof(struct net_bridge_vlan, tinfo.tunnel_id),
  26. .key_len = sizeof(__be64),
  27. .nelem_hint = 3,
  28. .obj_cmpfn = br_vlan_tunid_cmp,
  29. .automatic_shrinking = true,
  30. };
  31. static struct net_bridge_vlan *br_vlan_tunnel_lookup(struct rhashtable *tbl,
  32. __be64 tunnel_id)
  33. {
  34. return rhashtable_lookup_fast(tbl, &tunnel_id,
  35. br_vlan_tunnel_rht_params);
  36. }
  37. static void vlan_tunnel_info_release(struct net_bridge_vlan *vlan)
  38. {
  39. struct metadata_dst *tdst = rtnl_dereference(vlan->tinfo.tunnel_dst);
  40. WRITE_ONCE(vlan->tinfo.tunnel_id, 0);
  41. RCU_INIT_POINTER(vlan->tinfo.tunnel_dst, NULL);
  42. dst_release(&tdst->dst);
  43. }
  44. void vlan_tunnel_info_del(struct net_bridge_vlan_group *vg,
  45. struct net_bridge_vlan *vlan)
  46. {
  47. if (!rcu_access_pointer(vlan->tinfo.tunnel_dst))
  48. return;
  49. rhashtable_remove_fast(&vg->tunnel_hash, &vlan->tnode,
  50. br_vlan_tunnel_rht_params);
  51. vlan_tunnel_info_release(vlan);
  52. }
  53. static int __vlan_tunnel_info_add(struct net_bridge_vlan_group *vg,
  54. struct net_bridge_vlan *vlan, u32 tun_id)
  55. {
  56. struct metadata_dst *metadata = rtnl_dereference(vlan->tinfo.tunnel_dst);
  57. __be64 key = key32_to_tunnel_id(cpu_to_be32(tun_id));
  58. IP_TUNNEL_DECLARE_FLAGS(flags) = { };
  59. int err;
  60. if (metadata)
  61. return -EEXIST;
  62. __set_bit(IP_TUNNEL_KEY_BIT, flags);
  63. metadata = __ip_tun_set_dst(0, 0, 0, 0, 0, flags, key, 0);
  64. if (!metadata)
  65. return -EINVAL;
  66. metadata->u.tun_info.mode |= IP_TUNNEL_INFO_TX | IP_TUNNEL_INFO_BRIDGE;
  67. rcu_assign_pointer(vlan->tinfo.tunnel_dst, metadata);
  68. WRITE_ONCE(vlan->tinfo.tunnel_id, key);
  69. err = rhashtable_lookup_insert_fast(&vg->tunnel_hash, &vlan->tnode,
  70. br_vlan_tunnel_rht_params);
  71. if (err)
  72. goto out;
  73. return 0;
  74. out:
  75. vlan_tunnel_info_release(vlan);
  76. return err;
  77. }
  78. /* Must be protected by RTNL.
  79. * Must be called with vid in range from 1 to 4094 inclusive.
  80. */
  81. int nbp_vlan_tunnel_info_add(const struct net_bridge_port *port, u16 vid,
  82. u32 tun_id)
  83. {
  84. struct net_bridge_vlan_group *vg;
  85. struct net_bridge_vlan *vlan;
  86. ASSERT_RTNL();
  87. vg = nbp_vlan_group(port);
  88. vlan = br_vlan_find(vg, vid);
  89. if (!vlan)
  90. return -EINVAL;
  91. return __vlan_tunnel_info_add(vg, vlan, tun_id);
  92. }
  93. /* Must be protected by RTNL.
  94. * Must be called with vid in range from 1 to 4094 inclusive.
  95. */
  96. int nbp_vlan_tunnel_info_delete(const struct net_bridge_port *port, u16 vid)
  97. {
  98. struct net_bridge_vlan_group *vg;
  99. struct net_bridge_vlan *v;
  100. ASSERT_RTNL();
  101. vg = nbp_vlan_group(port);
  102. v = br_vlan_find(vg, vid);
  103. if (!v)
  104. return -ENOENT;
  105. vlan_tunnel_info_del(vg, v);
  106. return 0;
  107. }
  108. static void __vlan_tunnel_info_flush(struct net_bridge_vlan_group *vg)
  109. {
  110. struct net_bridge_vlan *vlan, *tmp;
  111. list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
  112. vlan_tunnel_info_del(vg, vlan);
  113. }
  114. void nbp_vlan_tunnel_info_flush(struct net_bridge_port *port)
  115. {
  116. struct net_bridge_vlan_group *vg;
  117. ASSERT_RTNL();
  118. vg = nbp_vlan_group(port);
  119. __vlan_tunnel_info_flush(vg);
  120. }
  121. int vlan_tunnel_init(struct net_bridge_vlan_group *vg)
  122. {
  123. return rhashtable_init(&vg->tunnel_hash, &br_vlan_tunnel_rht_params);
  124. }
  125. void vlan_tunnel_deinit(struct net_bridge_vlan_group *vg)
  126. {
  127. rhashtable_destroy(&vg->tunnel_hash);
  128. }
  129. void br_handle_ingress_vlan_tunnel(struct sk_buff *skb,
  130. struct net_bridge_port *p,
  131. struct net_bridge_vlan_group *vg)
  132. {
  133. struct ip_tunnel_info *tinfo = skb_tunnel_info(skb);
  134. struct net_bridge_vlan *vlan;
  135. if (!vg || !tinfo)
  136. return;
  137. /* if already tagged, ignore */
  138. if (skb_vlan_tagged(skb))
  139. return;
  140. /* lookup vid, given tunnel id */
  141. vlan = br_vlan_tunnel_lookup(&vg->tunnel_hash, tinfo->key.tun_id);
  142. if (!vlan)
  143. return;
  144. skb_dst_drop(skb);
  145. __vlan_hwaccel_put_tag(skb, p->br->vlan_proto, vlan->vid);
  146. }
  147. int br_handle_egress_vlan_tunnel(struct sk_buff *skb,
  148. struct net_bridge_vlan *vlan)
  149. {
  150. IP_TUNNEL_DECLARE_FLAGS(flags) = { };
  151. struct metadata_dst *tunnel_dst;
  152. __be64 tunnel_id;
  153. int err;
  154. if (!vlan)
  155. return 0;
  156. tunnel_id = READ_ONCE(vlan->tinfo.tunnel_id);
  157. if (!tunnel_id || unlikely(!skb_vlan_tag_present(skb)))
  158. return 0;
  159. skb_dst_drop(skb);
  160. err = skb_vlan_pop(skb);
  161. if (err)
  162. return err;
  163. if (BR_INPUT_SKB_CB(skb)->backup_nhid) {
  164. __set_bit(IP_TUNNEL_KEY_BIT, flags);
  165. tunnel_dst = __ip_tun_set_dst(0, 0, 0, 0, 0, flags,
  166. tunnel_id, 0);
  167. if (!tunnel_dst)
  168. return -ENOMEM;
  169. tunnel_dst->u.tun_info.mode |= IP_TUNNEL_INFO_TX |
  170. IP_TUNNEL_INFO_BRIDGE;
  171. tunnel_dst->u.tun_info.key.nhid =
  172. BR_INPUT_SKB_CB(skb)->backup_nhid;
  173. skb_dst_set(skb, &tunnel_dst->dst);
  174. return 0;
  175. }
  176. tunnel_dst = rcu_dereference(vlan->tinfo.tunnel_dst);
  177. if (tunnel_dst && dst_hold_safe(&tunnel_dst->dst))
  178. skb_dst_set(skb, &tunnel_dst->dst);
  179. return 0;
  180. }