1 /* 2 * SR-IPv6 implementation 3 * 4 * Authors: 5 * David Lebrun <david.lebrun@uclouvain.be> 6 * eBPF support: Mathieu Xhonneux <m.xhonneux@gmail.com> 7 * 8 * 9 * This program is free software; you can redistribute it and/or 10 * modify it under the terms of the GNU General Public License 11 * as published by the Free Software Foundation; either version 12 * 2 of the License, or (at your option) any later version. 13 */ 14 15 #include <linux/types.h> 16 #include <linux/skbuff.h> 17 #include <linux/net.h> 18 #include <linux/module.h> 19 #include <net/ip.h> 20 #include <net/lwtunnel.h> 21 #include <net/netevent.h> 22 #include <net/netns/generic.h> 23 #include <net/ip6_fib.h> 24 #include <net/route.h> 25 #include <net/seg6.h> 26 #include <linux/seg6.h> 27 #include <linux/seg6_local.h> 28 #include <net/addrconf.h> 29 #include <net/ip6_route.h> 30 #include <net/dst_cache.h> 31 #ifdef CONFIG_IPV6_SEG6_HMAC 32 #include <net/seg6_hmac.h> 33 #endif 34 #include <net/seg6_local.h> 35 #include <linux/etherdevice.h> 36 #include <linux/bpf.h> 37 38 struct seg6_local_lwt; 39 40 struct seg6_action_desc { 41 int action; 42 unsigned long attrs; 43 int (*input)(struct sk_buff *skb, struct seg6_local_lwt *slwt); 44 int static_headroom; 45 }; 46 47 struct bpf_lwt_prog { 48 struct bpf_prog *prog; 49 char *name; 50 }; 51 52 struct seg6_local_lwt { 53 int action; 54 struct ipv6_sr_hdr *srh; 55 int table; 56 struct in_addr nh4; 57 struct in6_addr nh6; 58 int iif; 59 int oif; 60 struct bpf_lwt_prog bpf; 61 62 int headroom; 63 struct seg6_action_desc *desc; 64 }; 65 66 static struct seg6_local_lwt *seg6_local_lwtunnel(struct lwtunnel_state *lwt) 67 { 68 return (struct seg6_local_lwt *)lwt->data; 69 } 70 71 static struct ipv6_sr_hdr *get_srh(struct sk_buff *skb) 72 { 73 struct ipv6_sr_hdr *srh; 74 int len, srhoff = 0; 75 76 if (ipv6_find_hdr(skb, &srhoff, IPPROTO_ROUTING, NULL, NULL) < 0) 77 return NULL; 78 79 if (!pskb_may_pull(skb, srhoff + sizeof(*srh))) 80 return NULL; 81 82 srh = (struct ipv6_sr_hdr *)(skb->data + srhoff); 83 84 len = (srh->hdrlen + 1) << 3; 85 86 if (!pskb_may_pull(skb, srhoff + len)) 87 return NULL; 88 89 if (!seg6_validate_srh(srh, len)) 90 return NULL; 91 92 return srh; 93 } 94 95 static struct ipv6_sr_hdr *get_and_validate_srh(struct sk_buff *skb) 96 { 97 struct ipv6_sr_hdr *srh; 98 99 srh = get_srh(skb); 100 if (!srh) 101 return NULL; 102 103 if (srh->segments_left == 0) 104 return NULL; 105 106 #ifdef CONFIG_IPV6_SEG6_HMAC 107 if (!seg6_hmac_validate_skb(skb)) 108 return NULL; 109 #endif 110 111 return srh; 112 } 113 114 static bool decap_and_validate(struct sk_buff *skb, int proto) 115 { 116 struct ipv6_sr_hdr *srh; 117 unsigned int off = 0; 118 119 srh = get_srh(skb); 120 if (srh && srh->segments_left > 0) 121 return false; 122 123 #ifdef CONFIG_IPV6_SEG6_HMAC 124 if (srh && !seg6_hmac_validate_skb(skb)) 125 return false; 126 #endif 127 128 if (ipv6_find_hdr(skb, &off, proto, NULL, NULL) < 0) 129 return false; 130 131 if (!pskb_pull(skb, off)) 132 return false; 133 134 skb_postpull_rcsum(skb, skb_network_header(skb), off); 135 136 skb_reset_network_header(skb); 137 skb_reset_transport_header(skb); 138 skb->encapsulation = 0; 139 140 return true; 141 } 142 143 static void advance_nextseg(struct ipv6_sr_hdr *srh, struct in6_addr *daddr) 144 { 145 struct in6_addr *addr; 146 147 srh->segments_left--; 148 addr = srh->segments + srh->segments_left; 149 *daddr = *addr; 150 } 151 152 int seg6_lookup_nexthop(struct sk_buff *skb, struct in6_addr *nhaddr, 153 u32 tbl_id) 154 { 155 struct net *net = dev_net(skb->dev); 156 struct ipv6hdr *hdr = ipv6_hdr(skb); 157 int flags = RT6_LOOKUP_F_HAS_SADDR; 158 struct dst_entry *dst = NULL; 159 struct rt6_info *rt; 160 struct flowi6 fl6; 161 162 fl6.flowi6_iif = skb->dev->ifindex; 163 fl6.daddr = nhaddr ? *nhaddr : hdr->daddr; 164 fl6.saddr = hdr->saddr; 165 fl6.flowlabel = ip6_flowinfo(hdr); 166 fl6.flowi6_mark = skb->mark; 167 fl6.flowi6_proto = hdr->nexthdr; 168 169 if (nhaddr) 170 fl6.flowi6_flags = FLOWI_FLAG_KNOWN_NH; 171 172 if (!tbl_id) { 173 dst = ip6_route_input_lookup(net, skb->dev, &fl6, skb, flags); 174 } else { 175 struct fib6_table *table; 176 177 table = fib6_get_table(net, tbl_id); 178 if (!table) 179 goto out; 180 181 rt = ip6_pol_route(net, table, 0, &fl6, skb, flags); 182 dst = &rt->dst; 183 } 184 185 if (dst && dst->dev->flags & IFF_LOOPBACK && !dst->error) { 186 dst_release(dst); 187 dst = NULL; 188 } 189 190 out: 191 if (!dst) { 192 rt = net->ipv6.ip6_blk_hole_entry; 193 dst = &rt->dst; 194 dst_hold(dst); 195 } 196 197 skb_dst_drop(skb); 198 skb_dst_set(skb, dst); 199 return dst->error; 200 } 201 202 /* regular endpoint function */ 203 static int input_action_end(struct sk_buff *skb, struct seg6_local_lwt *slwt) 204 { 205 struct ipv6_sr_hdr *srh; 206 207 srh = get_and_validate_srh(skb); 208 if (!srh) 209 goto drop; 210 211 advance_nextseg(srh, &ipv6_hdr(skb)->daddr); 212 213 seg6_lookup_nexthop(skb, NULL, 0); 214 215 return dst_input(skb); 216 217 drop: 218 kfree_skb(skb); 219 return -EINVAL; 220 } 221 222 /* regular endpoint, and forward to specified nexthop */ 223 static int input_action_end_x(struct sk_buff *skb, struct seg6_local_lwt *slwt) 224 { 225 struct ipv6_sr_hdr *srh; 226 227 srh = get_and_validate_srh(skb); 228 if (!srh) 229 goto drop; 230 231 advance_nextseg(srh, &ipv6_hdr(skb)->daddr); 232 233 seg6_lookup_nexthop(skb, &slwt->nh6, 0); 234 235 return dst_input(skb); 236 237 drop: 238 kfree_skb(skb); 239 return -EINVAL; 240 } 241 242 static int input_action_end_t(struct sk_buff *skb, struct seg6_local_lwt *slwt) 243 { 244 struct ipv6_sr_hdr *srh; 245 246 srh = get_and_validate_srh(skb); 247 if (!srh) 248 goto drop; 249 250 advance_nextseg(srh, &ipv6_hdr(skb)->daddr); 251 252 seg6_lookup_nexthop(skb, NULL, slwt->table); 253 254 return dst_input(skb); 255 256 drop: 257 kfree_skb(skb); 258 return -EINVAL; 259 } 260 261 /* decapsulate and forward inner L2 frame on specified interface */ 262 static int input_action_end_dx2(struct sk_buff *skb, 263 struct seg6_local_lwt *slwt) 264 { 265 struct net *net = dev_net(skb->dev); 266 struct net_device *odev; 267 struct ethhdr *eth; 268 269 if (!decap_and_validate(skb, NEXTHDR_NONE)) 270 goto drop; 271 272 if (!pskb_may_pull(skb, ETH_HLEN)) 273 goto drop; 274 275 skb_reset_mac_header(skb); 276 eth = (struct ethhdr *)skb->data; 277 278 /* To determine the frame's protocol, we assume it is 802.3. This avoids 279 * a call to eth_type_trans(), which is not really relevant for our 280 * use case. 281 */ 282 if (!eth_proto_is_802_3(eth->h_proto)) 283 goto drop; 284 285 odev = dev_get_by_index_rcu(net, slwt->oif); 286 if (!odev) 287 goto drop; 288 289 /* As we accept Ethernet frames, make sure the egress device is of 290 * the correct type. 291 */ 292 if (odev->type != ARPHRD_ETHER) 293 goto drop; 294 295 if (!(odev->flags & IFF_UP) || !netif_carrier_ok(odev)) 296 goto drop; 297 298 skb_orphan(skb); 299 300 if (skb_warn_if_lro(skb)) 301 goto drop; 302 303 skb_forward_csum(skb); 304 305 if (skb->len - ETH_HLEN > odev->mtu) 306 goto drop; 307 308 skb->dev = odev; 309 skb->protocol = eth->h_proto; 310 311 return dev_queue_xmit(skb); 312 313 drop: 314 kfree_skb(skb); 315 return -EINVAL; 316 } 317 318 /* decapsulate and forward to specified nexthop */ 319 static int input_action_end_dx6(struct sk_buff *skb, 320 struct seg6_local_lwt *slwt) 321 { 322 struct in6_addr *nhaddr = NULL; 323 324 /* this function accepts IPv6 encapsulated packets, with either 325 * an SRH with SL=0, or no SRH. 326 */ 327 328 if (!decap_and_validate(skb, IPPROTO_IPV6)) 329 goto drop; 330 331 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) 332 goto drop; 333 334 /* The inner packet is not associated to any local interface, 335 * so we do not call netif_rx(). 336 * 337 * If slwt->nh6 is set to ::, then lookup the nexthop for the 338 * inner packet's DA. Otherwise, use the specified nexthop. 339 */ 340 341 if (!ipv6_addr_any(&slwt->nh6)) 342 nhaddr = &slwt->nh6; 343 344 seg6_lookup_nexthop(skb, nhaddr, 0); 345 346 return dst_input(skb); 347 drop: 348 kfree_skb(skb); 349 return -EINVAL; 350 } 351 352 static int input_action_end_dx4(struct sk_buff *skb, 353 struct seg6_local_lwt *slwt) 354 { 355 struct iphdr *iph; 356 __be32 nhaddr; 357 int err; 358 359 if (!decap_and_validate(skb, IPPROTO_IPIP)) 360 goto drop; 361 362 if (!pskb_may_pull(skb, sizeof(struct iphdr))) 363 goto drop; 364 365 skb->protocol = htons(ETH_P_IP); 366 367 iph = ip_hdr(skb); 368 369 nhaddr = slwt->nh4.s_addr ?: iph->daddr; 370 371 skb_dst_drop(skb); 372 373 err = ip_route_input(skb, nhaddr, iph->saddr, 0, skb->dev); 374 if (err) 375 goto drop; 376 377 return dst_input(skb); 378 379 drop: 380 kfree_skb(skb); 381 return -EINVAL; 382 } 383 384 static int input_action_end_dt6(struct sk_buff *skb, 385 struct seg6_local_lwt *slwt) 386 { 387 if (!decap_and_validate(skb, IPPROTO_IPV6)) 388 goto drop; 389 390 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) 391 goto drop; 392 393 seg6_lookup_nexthop(skb, NULL, slwt->table); 394 395 return dst_input(skb); 396 397 drop: 398 kfree_skb(skb); 399 return -EINVAL; 400 } 401 402 /* push an SRH on top of the current one */ 403 static int input_action_end_b6(struct sk_buff *skb, struct seg6_local_lwt *slwt) 404 { 405 struct ipv6_sr_hdr *srh; 406 int err = -EINVAL; 407 408 srh = get_and_validate_srh(skb); 409 if (!srh) 410 goto drop; 411 412 err = seg6_do_srh_inline(skb, slwt->srh); 413 if (err) 414 goto drop; 415 416 ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr)); 417 skb_set_transport_header(skb, sizeof(struct ipv6hdr)); 418 419 seg6_lookup_nexthop(skb, NULL, 0); 420 421 return dst_input(skb); 422 423 drop: 424 kfree_skb(skb); 425 return err; 426 } 427 428 /* encapsulate within an outer IPv6 header and a specified SRH */ 429 static int input_action_end_b6_encap(struct sk_buff *skb, 430 struct seg6_local_lwt *slwt) 431 { 432 struct ipv6_sr_hdr *srh; 433 int err = -EINVAL; 434 435 srh = get_and_validate_srh(skb); 436 if (!srh) 437 goto drop; 438 439 advance_nextseg(srh, &ipv6_hdr(skb)->daddr); 440 441 skb_reset_inner_headers(skb); 442 skb->encapsulation = 1; 443 444 err = seg6_do_srh_encap(skb, slwt->srh, IPPROTO_IPV6); 445 if (err) 446 goto drop; 447 448 ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr)); 449 skb_set_transport_header(skb, sizeof(struct ipv6hdr)); 450 451 seg6_lookup_nexthop(skb, NULL, 0); 452 453 return dst_input(skb); 454 455 drop: 456 kfree_skb(skb); 457 return err; 458 } 459 460 DEFINE_PER_CPU(struct seg6_bpf_srh_state, seg6_bpf_srh_states); 461 462 bool seg6_bpf_has_valid_srh(struct sk_buff *skb) 463 { 464 struct seg6_bpf_srh_state *srh_state = 465 this_cpu_ptr(&seg6_bpf_srh_states); 466 struct ipv6_sr_hdr *srh = srh_state->srh; 467 468 if (unlikely(srh == NULL)) 469 return false; 470 471 if (unlikely(!srh_state->valid)) { 472 if ((srh_state->hdrlen & 7) != 0) 473 return false; 474 475 srh->hdrlen = (u8)(srh_state->hdrlen >> 3); 476 if (!seg6_validate_srh(srh, (srh->hdrlen + 1) << 3)) 477 return false; 478 479 srh_state->valid = true; 480 } 481 482 return true; 483 } 484 485 static int input_action_end_bpf(struct sk_buff *skb, 486 struct seg6_local_lwt *slwt) 487 { 488 struct seg6_bpf_srh_state *srh_state = 489 this_cpu_ptr(&seg6_bpf_srh_states); 490 struct ipv6_sr_hdr *srh; 491 int ret; 492 493 srh = get_and_validate_srh(skb); 494 if (!srh) { 495 kfree_skb(skb); 496 return -EINVAL; 497 } 498 advance_nextseg(srh, &ipv6_hdr(skb)->daddr); 499 500 /* preempt_disable is needed to protect the per-CPU buffer srh_state, 501 * which is also accessed by the bpf_lwt_seg6_* helpers 502 */ 503 preempt_disable(); 504 srh_state->srh = srh; 505 srh_state->hdrlen = srh->hdrlen << 3; 506 srh_state->valid = true; 507 508 rcu_read_lock(); 509 bpf_compute_data_pointers(skb); 510 ret = bpf_prog_run_save_cb(slwt->bpf.prog, skb); 511 rcu_read_unlock(); 512 513 switch (ret) { 514 case BPF_OK: 515 case BPF_REDIRECT: 516 break; 517 case BPF_DROP: 518 goto drop; 519 default: 520 pr_warn_once("bpf-seg6local: Illegal return value %u\n", ret); 521 goto drop; 522 } 523 524 if (srh_state->srh && !seg6_bpf_has_valid_srh(skb)) 525 goto drop; 526 527 preempt_enable(); 528 if (ret != BPF_REDIRECT) 529 seg6_lookup_nexthop(skb, NULL, 0); 530 531 return dst_input(skb); 532 533 drop: 534 preempt_enable(); 535 kfree_skb(skb); 536 return -EINVAL; 537 } 538 539 static struct seg6_action_desc seg6_action_table[] = { 540 { 541 .action = SEG6_LOCAL_ACTION_END, 542 .attrs = 0, 543 .input = input_action_end, 544 }, 545 { 546 .action = SEG6_LOCAL_ACTION_END_X, 547 .attrs = (1 << SEG6_LOCAL_NH6), 548 .input = input_action_end_x, 549 }, 550 { 551 .action = SEG6_LOCAL_ACTION_END_T, 552 .attrs = (1 << SEG6_LOCAL_TABLE), 553 .input = input_action_end_t, 554 }, 555 { 556 .action = SEG6_LOCAL_ACTION_END_DX2, 557 .attrs = (1 << SEG6_LOCAL_OIF), 558 .input = input_action_end_dx2, 559 }, 560 { 561 .action = SEG6_LOCAL_ACTION_END_DX6, 562 .attrs = (1 << SEG6_LOCAL_NH6), 563 .input = input_action_end_dx6, 564 }, 565 { 566 .action = SEG6_LOCAL_ACTION_END_DX4, 567 .attrs = (1 << SEG6_LOCAL_NH4), 568 .input = input_action_end_dx4, 569 }, 570 { 571 .action = SEG6_LOCAL_ACTION_END_DT6, 572 .attrs = (1 << SEG6_LOCAL_TABLE), 573 .input = input_action_end_dt6, 574 }, 575 { 576 .action = SEG6_LOCAL_ACTION_END_B6, 577 .attrs = (1 << SEG6_LOCAL_SRH), 578 .input = input_action_end_b6, 579 }, 580 { 581 .action = SEG6_LOCAL_ACTION_END_B6_ENCAP, 582 .attrs = (1 << SEG6_LOCAL_SRH), 583 .input = input_action_end_b6_encap, 584 .static_headroom = sizeof(struct ipv6hdr), 585 }, 586 { 587 .action = SEG6_LOCAL_ACTION_END_BPF, 588 .attrs = (1 << SEG6_LOCAL_BPF), 589 .input = input_action_end_bpf, 590 }, 591 592 }; 593 594 static struct seg6_action_desc *__get_action_desc(int action) 595 { 596 struct seg6_action_desc *desc; 597 int i, count; 598 599 count = ARRAY_SIZE(seg6_action_table); 600 for (i = 0; i < count; i++) { 601 desc = &seg6_action_table[i]; 602 if (desc->action == action) 603 return desc; 604 } 605 606 return NULL; 607 } 608 609 static int seg6_local_input(struct sk_buff *skb) 610 { 611 struct dst_entry *orig_dst = skb_dst(skb); 612 struct seg6_action_desc *desc; 613 struct seg6_local_lwt *slwt; 614 615 if (skb->protocol != htons(ETH_P_IPV6)) { 616 kfree_skb(skb); 617 return -EINVAL; 618 } 619 620 slwt = seg6_local_lwtunnel(orig_dst->lwtstate); 621 desc = slwt->desc; 622 623 return desc->input(skb, slwt); 624 } 625 626 static const struct nla_policy seg6_local_policy[SEG6_LOCAL_MAX + 1] = { 627 [SEG6_LOCAL_ACTION] = { .type = NLA_U32 }, 628 [SEG6_LOCAL_SRH] = { .type = NLA_BINARY }, 629 [SEG6_LOCAL_TABLE] = { .type = NLA_U32 }, 630 [SEG6_LOCAL_NH4] = { .type = NLA_BINARY, 631 .len = sizeof(struct in_addr) }, 632 [SEG6_LOCAL_NH6] = { .type = NLA_BINARY, 633 .len = sizeof(struct in6_addr) }, 634 [SEG6_LOCAL_IIF] = { .type = NLA_U32 }, 635 [SEG6_LOCAL_OIF] = { .type = NLA_U32 }, 636 [SEG6_LOCAL_BPF] = { .type = NLA_NESTED }, 637 }; 638 639 static int parse_nla_srh(struct nlattr **attrs, struct seg6_local_lwt *slwt) 640 { 641 struct ipv6_sr_hdr *srh; 642 int len; 643 644 srh = nla_data(attrs[SEG6_LOCAL_SRH]); 645 len = nla_len(attrs[SEG6_LOCAL_SRH]); 646 647 /* SRH must contain at least one segment */ 648 if (len < sizeof(*srh) + sizeof(struct in6_addr)) 649 return -EINVAL; 650 651 if (!seg6_validate_srh(srh, len)) 652 return -EINVAL; 653 654 slwt->srh = kmemdup(srh, len, GFP_KERNEL); 655 if (!slwt->srh) 656 return -ENOMEM; 657 658 slwt->headroom += len; 659 660 return 0; 661 } 662 663 static int put_nla_srh(struct sk_buff *skb, struct seg6_local_lwt *slwt) 664 { 665 struct ipv6_sr_hdr *srh; 666 struct nlattr *nla; 667 int len; 668 669 srh = slwt->srh; 670 len = (srh->hdrlen + 1) << 3; 671 672 nla = nla_reserve(skb, SEG6_LOCAL_SRH, len); 673 if (!nla) 674 return -EMSGSIZE; 675 676 memcpy(nla_data(nla), srh, len); 677 678 return 0; 679 } 680 681 static int cmp_nla_srh(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 682 { 683 int len = (a->srh->hdrlen + 1) << 3; 684 685 if (len != ((b->srh->hdrlen + 1) << 3)) 686 return 1; 687 688 return memcmp(a->srh, b->srh, len); 689 } 690 691 static int parse_nla_table(struct nlattr **attrs, struct seg6_local_lwt *slwt) 692 { 693 slwt->table = nla_get_u32(attrs[SEG6_LOCAL_TABLE]); 694 695 return 0; 696 } 697 698 static int put_nla_table(struct sk_buff *skb, struct seg6_local_lwt *slwt) 699 { 700 if (nla_put_u32(skb, SEG6_LOCAL_TABLE, slwt->table)) 701 return -EMSGSIZE; 702 703 return 0; 704 } 705 706 static int cmp_nla_table(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 707 { 708 if (a->table != b->table) 709 return 1; 710 711 return 0; 712 } 713 714 static int parse_nla_nh4(struct nlattr **attrs, struct seg6_local_lwt *slwt) 715 { 716 memcpy(&slwt->nh4, nla_data(attrs[SEG6_LOCAL_NH4]), 717 sizeof(struct in_addr)); 718 719 return 0; 720 } 721 722 static int put_nla_nh4(struct sk_buff *skb, struct seg6_local_lwt *slwt) 723 { 724 struct nlattr *nla; 725 726 nla = nla_reserve(skb, SEG6_LOCAL_NH4, sizeof(struct in_addr)); 727 if (!nla) 728 return -EMSGSIZE; 729 730 memcpy(nla_data(nla), &slwt->nh4, sizeof(struct in_addr)); 731 732 return 0; 733 } 734 735 static int cmp_nla_nh4(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 736 { 737 return memcmp(&a->nh4, &b->nh4, sizeof(struct in_addr)); 738 } 739 740 static int parse_nla_nh6(struct nlattr **attrs, struct seg6_local_lwt *slwt) 741 { 742 memcpy(&slwt->nh6, nla_data(attrs[SEG6_LOCAL_NH6]), 743 sizeof(struct in6_addr)); 744 745 return 0; 746 } 747 748 static int put_nla_nh6(struct sk_buff *skb, struct seg6_local_lwt *slwt) 749 { 750 struct nlattr *nla; 751 752 nla = nla_reserve(skb, SEG6_LOCAL_NH6, sizeof(struct in6_addr)); 753 if (!nla) 754 return -EMSGSIZE; 755 756 memcpy(nla_data(nla), &slwt->nh6, sizeof(struct in6_addr)); 757 758 return 0; 759 } 760 761 static int cmp_nla_nh6(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 762 { 763 return memcmp(&a->nh6, &b->nh6, sizeof(struct in6_addr)); 764 } 765 766 static int parse_nla_iif(struct nlattr **attrs, struct seg6_local_lwt *slwt) 767 { 768 slwt->iif = nla_get_u32(attrs[SEG6_LOCAL_IIF]); 769 770 return 0; 771 } 772 773 static int put_nla_iif(struct sk_buff *skb, struct seg6_local_lwt *slwt) 774 { 775 if (nla_put_u32(skb, SEG6_LOCAL_IIF, slwt->iif)) 776 return -EMSGSIZE; 777 778 return 0; 779 } 780 781 static int cmp_nla_iif(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 782 { 783 if (a->iif != b->iif) 784 return 1; 785 786 return 0; 787 } 788 789 static int parse_nla_oif(struct nlattr **attrs, struct seg6_local_lwt *slwt) 790 { 791 slwt->oif = nla_get_u32(attrs[SEG6_LOCAL_OIF]); 792 793 return 0; 794 } 795 796 static int put_nla_oif(struct sk_buff *skb, struct seg6_local_lwt *slwt) 797 { 798 if (nla_put_u32(skb, SEG6_LOCAL_OIF, slwt->oif)) 799 return -EMSGSIZE; 800 801 return 0; 802 } 803 804 static int cmp_nla_oif(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 805 { 806 if (a->oif != b->oif) 807 return 1; 808 809 return 0; 810 } 811 812 #define MAX_PROG_NAME 256 813 static const struct nla_policy bpf_prog_policy[SEG6_LOCAL_BPF_PROG_MAX + 1] = { 814 [SEG6_LOCAL_BPF_PROG] = { .type = NLA_U32, }, 815 [SEG6_LOCAL_BPF_PROG_NAME] = { .type = NLA_NUL_STRING, 816 .len = MAX_PROG_NAME }, 817 }; 818 819 static int parse_nla_bpf(struct nlattr **attrs, struct seg6_local_lwt *slwt) 820 { 821 struct nlattr *tb[SEG6_LOCAL_BPF_PROG_MAX + 1]; 822 struct bpf_prog *p; 823 int ret; 824 u32 fd; 825 826 ret = nla_parse_nested(tb, SEG6_LOCAL_BPF_PROG_MAX, 827 attrs[SEG6_LOCAL_BPF], bpf_prog_policy, NULL); 828 if (ret < 0) 829 return ret; 830 831 if (!tb[SEG6_LOCAL_BPF_PROG] || !tb[SEG6_LOCAL_BPF_PROG_NAME]) 832 return -EINVAL; 833 834 slwt->bpf.name = nla_memdup(tb[SEG6_LOCAL_BPF_PROG_NAME], GFP_KERNEL); 835 if (!slwt->bpf.name) 836 return -ENOMEM; 837 838 fd = nla_get_u32(tb[SEG6_LOCAL_BPF_PROG]); 839 p = bpf_prog_get_type(fd, BPF_PROG_TYPE_LWT_SEG6LOCAL); 840 if (IS_ERR(p)) { 841 kfree(slwt->bpf.name); 842 return PTR_ERR(p); 843 } 844 845 slwt->bpf.prog = p; 846 return 0; 847 } 848 849 static int put_nla_bpf(struct sk_buff *skb, struct seg6_local_lwt *slwt) 850 { 851 struct nlattr *nest; 852 853 if (!slwt->bpf.prog) 854 return 0; 855 856 nest = nla_nest_start(skb, SEG6_LOCAL_BPF); 857 if (!nest) 858 return -EMSGSIZE; 859 860 if (nla_put_u32(skb, SEG6_LOCAL_BPF_PROG, slwt->bpf.prog->aux->id)) 861 return -EMSGSIZE; 862 863 if (slwt->bpf.name && 864 nla_put_string(skb, SEG6_LOCAL_BPF_PROG_NAME, slwt->bpf.name)) 865 return -EMSGSIZE; 866 867 return nla_nest_end(skb, nest); 868 } 869 870 static int cmp_nla_bpf(struct seg6_local_lwt *a, struct seg6_local_lwt *b) 871 { 872 if (!a->bpf.name && !b->bpf.name) 873 return 0; 874 875 if (!a->bpf.name || !b->bpf.name) 876 return 1; 877 878 return strcmp(a->bpf.name, b->bpf.name); 879 } 880 881 struct seg6_action_param { 882 int (*parse)(struct nlattr **attrs, struct seg6_local_lwt *slwt); 883 int (*put)(struct sk_buff *skb, struct seg6_local_lwt *slwt); 884 int (*cmp)(struct seg6_local_lwt *a, struct seg6_local_lwt *b); 885 }; 886 887 static struct seg6_action_param seg6_action_params[SEG6_LOCAL_MAX + 1] = { 888 [SEG6_LOCAL_SRH] = { .parse = parse_nla_srh, 889 .put = put_nla_srh, 890 .cmp = cmp_nla_srh }, 891 892 [SEG6_LOCAL_TABLE] = { .parse = parse_nla_table, 893 .put = put_nla_table, 894 .cmp = cmp_nla_table }, 895 896 [SEG6_LOCAL_NH4] = { .parse = parse_nla_nh4, 897 .put = put_nla_nh4, 898 .cmp = cmp_nla_nh4 }, 899 900 [SEG6_LOCAL_NH6] = { .parse = parse_nla_nh6, 901 .put = put_nla_nh6, 902 .cmp = cmp_nla_nh6 }, 903 904 [SEG6_LOCAL_IIF] = { .parse = parse_nla_iif, 905 .put = put_nla_iif, 906 .cmp = cmp_nla_iif }, 907 908 [SEG6_LOCAL_OIF] = { .parse = parse_nla_oif, 909 .put = put_nla_oif, 910 .cmp = cmp_nla_oif }, 911 912 [SEG6_LOCAL_BPF] = { .parse = parse_nla_bpf, 913 .put = put_nla_bpf, 914 .cmp = cmp_nla_bpf }, 915 916 }; 917 918 static int parse_nla_action(struct nlattr **attrs, struct seg6_local_lwt *slwt) 919 { 920 struct seg6_action_param *param; 921 struct seg6_action_desc *desc; 922 int i, err; 923 924 desc = __get_action_desc(slwt->action); 925 if (!desc) 926 return -EINVAL; 927 928 if (!desc->input) 929 return -EOPNOTSUPP; 930 931 slwt->desc = desc; 932 slwt->headroom += desc->static_headroom; 933 934 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) { 935 if (desc->attrs & (1 << i)) { 936 if (!attrs[i]) 937 return -EINVAL; 938 939 param = &seg6_action_params[i]; 940 941 err = param->parse(attrs, slwt); 942 if (err < 0) 943 return err; 944 } 945 } 946 947 return 0; 948 } 949 950 static int seg6_local_build_state(struct nlattr *nla, unsigned int family, 951 const void *cfg, struct lwtunnel_state **ts, 952 struct netlink_ext_ack *extack) 953 { 954 struct nlattr *tb[SEG6_LOCAL_MAX + 1]; 955 struct lwtunnel_state *newts; 956 struct seg6_local_lwt *slwt; 957 int err; 958 959 if (family != AF_INET6) 960 return -EINVAL; 961 962 err = nla_parse_nested(tb, SEG6_LOCAL_MAX, nla, seg6_local_policy, 963 extack); 964 965 if (err < 0) 966 return err; 967 968 if (!tb[SEG6_LOCAL_ACTION]) 969 return -EINVAL; 970 971 newts = lwtunnel_state_alloc(sizeof(*slwt)); 972 if (!newts) 973 return -ENOMEM; 974 975 slwt = seg6_local_lwtunnel(newts); 976 slwt->action = nla_get_u32(tb[SEG6_LOCAL_ACTION]); 977 978 err = parse_nla_action(tb, slwt); 979 if (err < 0) 980 goto out_free; 981 982 newts->type = LWTUNNEL_ENCAP_SEG6_LOCAL; 983 newts->flags = LWTUNNEL_STATE_INPUT_REDIRECT; 984 newts->headroom = slwt->headroom; 985 986 *ts = newts; 987 988 return 0; 989 990 out_free: 991 kfree(slwt->srh); 992 kfree(newts); 993 return err; 994 } 995 996 static void seg6_local_destroy_state(struct lwtunnel_state *lwt) 997 { 998 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt); 999 1000 kfree(slwt->srh); 1001 1002 if (slwt->desc->attrs & (1 << SEG6_LOCAL_BPF)) { 1003 kfree(slwt->bpf.name); 1004 bpf_prog_put(slwt->bpf.prog); 1005 } 1006 1007 return; 1008 } 1009 1010 static int seg6_local_fill_encap(struct sk_buff *skb, 1011 struct lwtunnel_state *lwt) 1012 { 1013 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt); 1014 struct seg6_action_param *param; 1015 int i, err; 1016 1017 if (nla_put_u32(skb, SEG6_LOCAL_ACTION, slwt->action)) 1018 return -EMSGSIZE; 1019 1020 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) { 1021 if (slwt->desc->attrs & (1 << i)) { 1022 param = &seg6_action_params[i]; 1023 err = param->put(skb, slwt); 1024 if (err < 0) 1025 return err; 1026 } 1027 } 1028 1029 return 0; 1030 } 1031 1032 static int seg6_local_get_encap_size(struct lwtunnel_state *lwt) 1033 { 1034 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt); 1035 unsigned long attrs; 1036 int nlsize; 1037 1038 nlsize = nla_total_size(4); /* action */ 1039 1040 attrs = slwt->desc->attrs; 1041 1042 if (attrs & (1 << SEG6_LOCAL_SRH)) 1043 nlsize += nla_total_size((slwt->srh->hdrlen + 1) << 3); 1044 1045 if (attrs & (1 << SEG6_LOCAL_TABLE)) 1046 nlsize += nla_total_size(4); 1047 1048 if (attrs & (1 << SEG6_LOCAL_NH4)) 1049 nlsize += nla_total_size(4); 1050 1051 if (attrs & (1 << SEG6_LOCAL_NH6)) 1052 nlsize += nla_total_size(16); 1053 1054 if (attrs & (1 << SEG6_LOCAL_IIF)) 1055 nlsize += nla_total_size(4); 1056 1057 if (attrs & (1 << SEG6_LOCAL_OIF)) 1058 nlsize += nla_total_size(4); 1059 1060 if (attrs & (1 << SEG6_LOCAL_BPF)) 1061 nlsize += nla_total_size(sizeof(struct nlattr)) + 1062 nla_total_size(MAX_PROG_NAME) + 1063 nla_total_size(4); 1064 1065 return nlsize; 1066 } 1067 1068 static int seg6_local_cmp_encap(struct lwtunnel_state *a, 1069 struct lwtunnel_state *b) 1070 { 1071 struct seg6_local_lwt *slwt_a, *slwt_b; 1072 struct seg6_action_param *param; 1073 int i; 1074 1075 slwt_a = seg6_local_lwtunnel(a); 1076 slwt_b = seg6_local_lwtunnel(b); 1077 1078 if (slwt_a->action != slwt_b->action) 1079 return 1; 1080 1081 if (slwt_a->desc->attrs != slwt_b->desc->attrs) 1082 return 1; 1083 1084 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) { 1085 if (slwt_a->desc->attrs & (1 << i)) { 1086 param = &seg6_action_params[i]; 1087 if (param->cmp(slwt_a, slwt_b)) 1088 return 1; 1089 } 1090 } 1091 1092 return 0; 1093 } 1094 1095 static const struct lwtunnel_encap_ops seg6_local_ops = { 1096 .build_state = seg6_local_build_state, 1097 .destroy_state = seg6_local_destroy_state, 1098 .input = seg6_local_input, 1099 .fill_encap = seg6_local_fill_encap, 1100 .get_encap_size = seg6_local_get_encap_size, 1101 .cmp_encap = seg6_local_cmp_encap, 1102 .owner = THIS_MODULE, 1103 }; 1104 1105 int __init seg6_local_init(void) 1106 { 1107 return lwtunnel_encap_add_ops(&seg6_local_ops, 1108 LWTUNNEL_ENCAP_SEG6_LOCAL); 1109 } 1110 1111 void seg6_local_exit(void) 1112 { 1113 lwtunnel_encap_del_ops(&seg6_local_ops, LWTUNNEL_ENCAP_SEG6_LOCAL); 1114 } 1115