br_vlan_tunnel.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * Bridge per vlan tunnel port dst_metadata handling code
  4. *
  5. * Authors:
  6. * Roopa Prabhu <roopa@cumulusnetworks.com>
  7. */
  8. #include <linux/kernel.h>
  9. #include <linux/netdevice.h>
  10. #include <linux/rtnetlink.h>
  11. #include <linux/slab.h>
  12. #include <net/switchdev.h>
  13. #include <net/dst_metadata.h>
  14. #include "br_private.h"
  15. #include "br_private_tunnel.h"
  16. static inline int br_vlan_tunid_cmp(struct rhashtable_compare_arg *arg,
  17. const void *ptr)
  18. {
  19. const struct net_bridge_vlan *vle = ptr;
  20. __be64 tunid = *(__be64 *)arg->key;
  21. return vle->tinfo.tunnel_id != tunid;
  22. }
  23. static const struct rhashtable_params br_vlan_tunnel_rht_params = {
  24. .head_offset = offsetof(struct net_bridge_vlan, tnode),
  25. .key_offset = offsetof(struct net_bridge_vlan, tinfo.tunnel_id),
  26. .key_len = sizeof(__be64),
  27. .nelem_hint = 3,
  28. .obj_cmpfn = br_vlan_tunid_cmp,
  29. .automatic_shrinking = true,
  30. };
  31. static struct net_bridge_vlan *br_vlan_tunnel_lookup(struct rhashtable *tbl,
  32. u64 tunnel_id)
  33. {
  34. return rhashtable_lookup_fast(tbl, &tunnel_id,
  35. br_vlan_tunnel_rht_params);
  36. }
  37. static void vlan_tunnel_info_release(struct net_bridge_vlan *vlan)
  38. {
  39. struct metadata_dst *tdst = rtnl_dereference(vlan->tinfo.tunnel_dst);
  40. WRITE_ONCE(vlan->tinfo.tunnel_id, 0);
  41. RCU_INIT_POINTER(vlan->tinfo.tunnel_dst, NULL);
  42. dst_release(&tdst->dst);
  43. }
  44. void vlan_tunnel_info_del(struct net_bridge_vlan_group *vg,
  45. struct net_bridge_vlan *vlan)
  46. {
  47. if (!rcu_access_pointer(vlan->tinfo.tunnel_dst))
  48. return;
  49. rhashtable_remove_fast(&vg->tunnel_hash, &vlan->tnode,
  50. br_vlan_tunnel_rht_params);
  51. vlan_tunnel_info_release(vlan);
  52. }
  53. static int __vlan_tunnel_info_add(struct net_bridge_vlan_group *vg,
  54. struct net_bridge_vlan *vlan, u32 tun_id)
  55. {
  56. struct metadata_dst *metadata = rtnl_dereference(vlan->tinfo.tunnel_dst);
  57. __be64 key = key32_to_tunnel_id(cpu_to_be32(tun_id));
  58. int err;
  59. if (metadata)
  60. return -EEXIST;
  61. metadata = __ip_tun_set_dst(0, 0, 0, 0, 0, TUNNEL_KEY,
  62. key, 0);
  63. if (!metadata)
  64. return -EINVAL;
  65. metadata->u.tun_info.mode |= IP_TUNNEL_INFO_TX | IP_TUNNEL_INFO_BRIDGE;
  66. rcu_assign_pointer(vlan->tinfo.tunnel_dst, metadata);
  67. WRITE_ONCE(vlan->tinfo.tunnel_id, key);
  68. err = rhashtable_lookup_insert_fast(&vg->tunnel_hash, &vlan->tnode,
  69. br_vlan_tunnel_rht_params);
  70. if (err)
  71. goto out;
  72. return 0;
  73. out:
  74. vlan_tunnel_info_release(vlan);
  75. return err;
  76. }
  77. /* Must be protected by RTNL.
  78. * Must be called with vid in range from 1 to 4094 inclusive.
  79. */
  80. int nbp_vlan_tunnel_info_add(const struct net_bridge_port *port, u16 vid,
  81. u32 tun_id)
  82. {
  83. struct net_bridge_vlan_group *vg;
  84. struct net_bridge_vlan *vlan;
  85. ASSERT_RTNL();
  86. vg = nbp_vlan_group(port);
  87. vlan = br_vlan_find(vg, vid);
  88. if (!vlan)
  89. return -EINVAL;
  90. return __vlan_tunnel_info_add(vg, vlan, tun_id);
  91. }
  92. /* Must be protected by RTNL.
  93. * Must be called with vid in range from 1 to 4094 inclusive.
  94. */
  95. int nbp_vlan_tunnel_info_delete(const struct net_bridge_port *port, u16 vid)
  96. {
  97. struct net_bridge_vlan_group *vg;
  98. struct net_bridge_vlan *v;
  99. ASSERT_RTNL();
  100. vg = nbp_vlan_group(port);
  101. v = br_vlan_find(vg, vid);
  102. if (!v)
  103. return -ENOENT;
  104. vlan_tunnel_info_del(vg, v);
  105. return 0;
  106. }
  107. static void __vlan_tunnel_info_flush(struct net_bridge_vlan_group *vg)
  108. {
  109. struct net_bridge_vlan *vlan, *tmp;
  110. list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
  111. vlan_tunnel_info_del(vg, vlan);
  112. }
  113. void nbp_vlan_tunnel_info_flush(struct net_bridge_port *port)
  114. {
  115. struct net_bridge_vlan_group *vg;
  116. ASSERT_RTNL();
  117. vg = nbp_vlan_group(port);
  118. __vlan_tunnel_info_flush(vg);
  119. }
  120. int vlan_tunnel_init(struct net_bridge_vlan_group *vg)
  121. {
  122. return rhashtable_init(&vg->tunnel_hash, &br_vlan_tunnel_rht_params);
  123. }
  124. void vlan_tunnel_deinit(struct net_bridge_vlan_group *vg)
  125. {
  126. rhashtable_destroy(&vg->tunnel_hash);
  127. }
  128. int br_handle_ingress_vlan_tunnel(struct sk_buff *skb,
  129. struct net_bridge_port *p,
  130. struct net_bridge_vlan_group *vg)
  131. {
  132. struct ip_tunnel_info *tinfo = skb_tunnel_info(skb);
  133. struct net_bridge_vlan *vlan;
  134. if (!vg || !tinfo)
  135. return 0;
  136. /* if already tagged, ignore */
  137. if (skb_vlan_tagged(skb))
  138. return 0;
  139. /* lookup vid, given tunnel id */
  140. vlan = br_vlan_tunnel_lookup(&vg->tunnel_hash, tinfo->key.tun_id);
  141. if (!vlan)
  142. return 0;
  143. skb_dst_drop(skb);
  144. __vlan_hwaccel_put_tag(skb, p->br->vlan_proto, vlan->vid);
  145. return 0;
  146. }
  147. int br_handle_egress_vlan_tunnel(struct sk_buff *skb,
  148. struct net_bridge_vlan *vlan)
  149. {
  150. struct metadata_dst *tunnel_dst;
  151. __be64 tunnel_id;
  152. int err;
  153. if (!vlan)
  154. return 0;
  155. tunnel_id = READ_ONCE(vlan->tinfo.tunnel_id);
  156. if (!tunnel_id || unlikely(!skb_vlan_tag_present(skb)))
  157. return 0;
  158. skb_dst_drop(skb);
  159. err = skb_vlan_pop(skb);
  160. if (err)
  161. return err;
  162. tunnel_dst = rcu_dereference(vlan->tinfo.tunnel_dst);
  163. if (tunnel_dst && dst_hold_safe(&tunnel_dst->dst))
  164. skb_dst_set(skb, &tunnel_dst->dst);
  165. return 0;
  166. }