Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Bridge per vlan tunnel port dst_metadata handling code
4 *
5 * Authors:
6 * Roopa Prabhu <roopa@cumulusnetworks.com>
7 */
8
9#include <linux/kernel.h>
10#include <linux/netdevice.h>
11#include <linux/rtnetlink.h>
12#include <linux/slab.h>
13#include <net/switchdev.h>
14#include <net/dst_metadata.h>
15
16#include "br_private.h"
17#include "br_private_tunnel.h"
18
19static inline int br_vlan_tunid_cmp(struct rhashtable_compare_arg *arg,
20 const void *ptr)
21{
22 const struct net_bridge_vlan *vle = ptr;
23 __be64 tunid = *(__be64 *)arg->key;
24
25 return vle->tinfo.tunnel_id != tunid;
26}
27
28static const struct rhashtable_params br_vlan_tunnel_rht_params = {
29 .head_offset = offsetof(struct net_bridge_vlan, tnode),
30 .key_offset = offsetof(struct net_bridge_vlan, tinfo.tunnel_id),
31 .key_len = sizeof(__be64),
32 .nelem_hint = 3,
33 .obj_cmpfn = br_vlan_tunid_cmp,
34 .automatic_shrinking = true,
35};
36
37static struct net_bridge_vlan *br_vlan_tunnel_lookup(struct rhashtable *tbl,
38 u64 tunnel_id)
39{
40 return rhashtable_lookup_fast(tbl, &tunnel_id,
41 br_vlan_tunnel_rht_params);
42}
43
44void vlan_tunnel_info_del(struct net_bridge_vlan_group *vg,
45 struct net_bridge_vlan *vlan)
46{
47 if (!vlan->tinfo.tunnel_dst)
48 return;
49 rhashtable_remove_fast(&vg->tunnel_hash, &vlan->tnode,
50 br_vlan_tunnel_rht_params);
51 vlan->tinfo.tunnel_id = 0;
52 dst_release(&vlan->tinfo.tunnel_dst->dst);
53 vlan->tinfo.tunnel_dst = NULL;
54}
55
56static int __vlan_tunnel_info_add(struct net_bridge_vlan_group *vg,
57 struct net_bridge_vlan *vlan, u32 tun_id)
58{
59 struct metadata_dst *metadata = NULL;
60 __be64 key = key32_to_tunnel_id(cpu_to_be32(tun_id));
61 int err;
62
63 if (vlan->tinfo.tunnel_dst)
64 return -EEXIST;
65
66 metadata = __ip_tun_set_dst(0, 0, 0, 0, 0, TUNNEL_KEY,
67 key, 0);
68 if (!metadata)
69 return -EINVAL;
70
71 metadata->u.tun_info.mode |= IP_TUNNEL_INFO_TX | IP_TUNNEL_INFO_BRIDGE;
72 vlan->tinfo.tunnel_dst = metadata;
73 vlan->tinfo.tunnel_id = key;
74
75 err = rhashtable_lookup_insert_fast(&vg->tunnel_hash, &vlan->tnode,
76 br_vlan_tunnel_rht_params);
77 if (err)
78 goto out;
79
80 return 0;
81out:
82 dst_release(&vlan->tinfo.tunnel_dst->dst);
83 vlan->tinfo.tunnel_dst = NULL;
84 vlan->tinfo.tunnel_id = 0;
85
86 return err;
87}
88
89/* Must be protected by RTNL.
90 * Must be called with vid in range from 1 to 4094 inclusive.
91 */
92int nbp_vlan_tunnel_info_add(struct net_bridge_port *port, u16 vid, u32 tun_id)
93{
94 struct net_bridge_vlan_group *vg;
95 struct net_bridge_vlan *vlan;
96
97 ASSERT_RTNL();
98
99 vg = nbp_vlan_group(port);
100 vlan = br_vlan_find(vg, vid);
101 if (!vlan)
102 return -EINVAL;
103
104 return __vlan_tunnel_info_add(vg, vlan, tun_id);
105}
106
107/* Must be protected by RTNL.
108 * Must be called with vid in range from 1 to 4094 inclusive.
109 */
110int nbp_vlan_tunnel_info_delete(struct net_bridge_port *port, u16 vid)
111{
112 struct net_bridge_vlan_group *vg;
113 struct net_bridge_vlan *v;
114
115 ASSERT_RTNL();
116
117 vg = nbp_vlan_group(port);
118 v = br_vlan_find(vg, vid);
119 if (!v)
120 return -ENOENT;
121
122 vlan_tunnel_info_del(vg, v);
123
124 return 0;
125}
126
127static void __vlan_tunnel_info_flush(struct net_bridge_vlan_group *vg)
128{
129 struct net_bridge_vlan *vlan, *tmp;
130
131 list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
132 vlan_tunnel_info_del(vg, vlan);
133}
134
135void nbp_vlan_tunnel_info_flush(struct net_bridge_port *port)
136{
137 struct net_bridge_vlan_group *vg;
138
139 ASSERT_RTNL();
140
141 vg = nbp_vlan_group(port);
142 __vlan_tunnel_info_flush(vg);
143}
144
145int vlan_tunnel_init(struct net_bridge_vlan_group *vg)
146{
147 return rhashtable_init(&vg->tunnel_hash, &br_vlan_tunnel_rht_params);
148}
149
150void vlan_tunnel_deinit(struct net_bridge_vlan_group *vg)
151{
152 rhashtable_destroy(&vg->tunnel_hash);
153}
154
155int br_handle_ingress_vlan_tunnel(struct sk_buff *skb,
156 struct net_bridge_port *p,
157 struct net_bridge_vlan_group *vg)
158{
159 struct ip_tunnel_info *tinfo = skb_tunnel_info(skb);
160 struct net_bridge_vlan *vlan;
161
162 if (!vg || !tinfo)
163 return 0;
164
165 /* if already tagged, ignore */
166 if (skb_vlan_tagged(skb))
167 return 0;
168
169 /* lookup vid, given tunnel id */
170 vlan = br_vlan_tunnel_lookup(&vg->tunnel_hash, tinfo->key.tun_id);
171 if (!vlan)
172 return 0;
173
174 skb_dst_drop(skb);
175
176 __vlan_hwaccel_put_tag(skb, p->br->vlan_proto, vlan->vid);
177
178 return 0;
179}
180
181int br_handle_egress_vlan_tunnel(struct sk_buff *skb,
182 struct net_bridge_vlan *vlan)
183{
184 int err;
185
186 if (!vlan || !vlan->tinfo.tunnel_id)
187 return 0;
188
189 if (unlikely(!skb_vlan_tag_present(skb)))
190 return 0;
191
192 skb_dst_drop(skb);
193 err = skb_vlan_pop(skb);
194 if (err)
195 return err;
196
197 skb_dst_set(skb, dst_clone(&vlan->tinfo.tunnel_dst->dst));
198
199 return 0;
200}
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Bridge per vlan tunnel port dst_metadata handling code
4 *
5 * Authors:
6 * Roopa Prabhu <roopa@cumulusnetworks.com>
7 */
8
9#include <linux/kernel.h>
10#include <linux/netdevice.h>
11#include <linux/rtnetlink.h>
12#include <linux/slab.h>
13#include <net/switchdev.h>
14#include <net/dst_metadata.h>
15
16#include "br_private.h"
17#include "br_private_tunnel.h"
18
19static inline int br_vlan_tunid_cmp(struct rhashtable_compare_arg *arg,
20 const void *ptr)
21{
22 const struct net_bridge_vlan *vle = ptr;
23 __be64 tunid = *(__be64 *)arg->key;
24
25 return vle->tinfo.tunnel_id != tunid;
26}
27
28static const struct rhashtable_params br_vlan_tunnel_rht_params = {
29 .head_offset = offsetof(struct net_bridge_vlan, tnode),
30 .key_offset = offsetof(struct net_bridge_vlan, tinfo.tunnel_id),
31 .key_len = sizeof(__be64),
32 .nelem_hint = 3,
33 .obj_cmpfn = br_vlan_tunid_cmp,
34 .automatic_shrinking = true,
35};
36
37static struct net_bridge_vlan *br_vlan_tunnel_lookup(struct rhashtable *tbl,
38 __be64 tunnel_id)
39{
40 return rhashtable_lookup_fast(tbl, &tunnel_id,
41 br_vlan_tunnel_rht_params);
42}
43
44static void vlan_tunnel_info_release(struct net_bridge_vlan *vlan)
45{
46 struct metadata_dst *tdst = rtnl_dereference(vlan->tinfo.tunnel_dst);
47
48 WRITE_ONCE(vlan->tinfo.tunnel_id, 0);
49 RCU_INIT_POINTER(vlan->tinfo.tunnel_dst, NULL);
50 dst_release(&tdst->dst);
51}
52
53void vlan_tunnel_info_del(struct net_bridge_vlan_group *vg,
54 struct net_bridge_vlan *vlan)
55{
56 if (!rcu_access_pointer(vlan->tinfo.tunnel_dst))
57 return;
58 rhashtable_remove_fast(&vg->tunnel_hash, &vlan->tnode,
59 br_vlan_tunnel_rht_params);
60 vlan_tunnel_info_release(vlan);
61}
62
63static int __vlan_tunnel_info_add(struct net_bridge_vlan_group *vg,
64 struct net_bridge_vlan *vlan, u32 tun_id)
65{
66 struct metadata_dst *metadata = rtnl_dereference(vlan->tinfo.tunnel_dst);
67 __be64 key = key32_to_tunnel_id(cpu_to_be32(tun_id));
68 IP_TUNNEL_DECLARE_FLAGS(flags) = { };
69 int err;
70
71 if (metadata)
72 return -EEXIST;
73
74 __set_bit(IP_TUNNEL_KEY_BIT, flags);
75 metadata = __ip_tun_set_dst(0, 0, 0, 0, 0, flags, key, 0);
76 if (!metadata)
77 return -EINVAL;
78
79 metadata->u.tun_info.mode |= IP_TUNNEL_INFO_TX | IP_TUNNEL_INFO_BRIDGE;
80 rcu_assign_pointer(vlan->tinfo.tunnel_dst, metadata);
81 WRITE_ONCE(vlan->tinfo.tunnel_id, key);
82
83 err = rhashtable_lookup_insert_fast(&vg->tunnel_hash, &vlan->tnode,
84 br_vlan_tunnel_rht_params);
85 if (err)
86 goto out;
87
88 return 0;
89out:
90 vlan_tunnel_info_release(vlan);
91
92 return err;
93}
94
95/* Must be protected by RTNL.
96 * Must be called with vid in range from 1 to 4094 inclusive.
97 */
98int nbp_vlan_tunnel_info_add(const struct net_bridge_port *port, u16 vid,
99 u32 tun_id)
100{
101 struct net_bridge_vlan_group *vg;
102 struct net_bridge_vlan *vlan;
103
104 ASSERT_RTNL();
105
106 vg = nbp_vlan_group(port);
107 vlan = br_vlan_find(vg, vid);
108 if (!vlan)
109 return -EINVAL;
110
111 return __vlan_tunnel_info_add(vg, vlan, tun_id);
112}
113
114/* Must be protected by RTNL.
115 * Must be called with vid in range from 1 to 4094 inclusive.
116 */
117int nbp_vlan_tunnel_info_delete(const struct net_bridge_port *port, u16 vid)
118{
119 struct net_bridge_vlan_group *vg;
120 struct net_bridge_vlan *v;
121
122 ASSERT_RTNL();
123
124 vg = nbp_vlan_group(port);
125 v = br_vlan_find(vg, vid);
126 if (!v)
127 return -ENOENT;
128
129 vlan_tunnel_info_del(vg, v);
130
131 return 0;
132}
133
134static void __vlan_tunnel_info_flush(struct net_bridge_vlan_group *vg)
135{
136 struct net_bridge_vlan *vlan, *tmp;
137
138 list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
139 vlan_tunnel_info_del(vg, vlan);
140}
141
142void nbp_vlan_tunnel_info_flush(struct net_bridge_port *port)
143{
144 struct net_bridge_vlan_group *vg;
145
146 ASSERT_RTNL();
147
148 vg = nbp_vlan_group(port);
149 __vlan_tunnel_info_flush(vg);
150}
151
152int vlan_tunnel_init(struct net_bridge_vlan_group *vg)
153{
154 return rhashtable_init(&vg->tunnel_hash, &br_vlan_tunnel_rht_params);
155}
156
157void vlan_tunnel_deinit(struct net_bridge_vlan_group *vg)
158{
159 rhashtable_destroy(&vg->tunnel_hash);
160}
161
162void br_handle_ingress_vlan_tunnel(struct sk_buff *skb,
163 struct net_bridge_port *p,
164 struct net_bridge_vlan_group *vg)
165{
166 struct ip_tunnel_info *tinfo = skb_tunnel_info(skb);
167 struct net_bridge_vlan *vlan;
168
169 if (!vg || !tinfo)
170 return;
171
172 /* if already tagged, ignore */
173 if (skb_vlan_tagged(skb))
174 return;
175
176 /* lookup vid, given tunnel id */
177 vlan = br_vlan_tunnel_lookup(&vg->tunnel_hash, tinfo->key.tun_id);
178 if (!vlan)
179 return;
180
181 skb_dst_drop(skb);
182
183 __vlan_hwaccel_put_tag(skb, p->br->vlan_proto, vlan->vid);
184}
185
186int br_handle_egress_vlan_tunnel(struct sk_buff *skb,
187 struct net_bridge_vlan *vlan)
188{
189 IP_TUNNEL_DECLARE_FLAGS(flags) = { };
190 struct metadata_dst *tunnel_dst;
191 __be64 tunnel_id;
192 int err;
193
194 if (!vlan)
195 return 0;
196
197 tunnel_id = READ_ONCE(vlan->tinfo.tunnel_id);
198 if (!tunnel_id || unlikely(!skb_vlan_tag_present(skb)))
199 return 0;
200
201 skb_dst_drop(skb);
202 err = skb_vlan_pop(skb);
203 if (err)
204 return err;
205
206 if (BR_INPUT_SKB_CB(skb)->backup_nhid) {
207 __set_bit(IP_TUNNEL_KEY_BIT, flags);
208 tunnel_dst = __ip_tun_set_dst(0, 0, 0, 0, 0, flags,
209 tunnel_id, 0);
210 if (!tunnel_dst)
211 return -ENOMEM;
212
213 tunnel_dst->u.tun_info.mode |= IP_TUNNEL_INFO_TX |
214 IP_TUNNEL_INFO_BRIDGE;
215 tunnel_dst->u.tun_info.key.nhid =
216 BR_INPUT_SKB_CB(skb)->backup_nhid;
217 skb_dst_set(skb, &tunnel_dst->dst);
218
219 return 0;
220 }
221
222 tunnel_dst = rcu_dereference(vlan->tinfo.tunnel_dst);
223 if (tunnel_dst && dst_hold_safe(&tunnel_dst->dst))
224 skb_dst_set(skb, &tunnel_dst->dst);
225
226 return 0;
227}