]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/ipv6/seg6_local.c
Merge tag 'smp-core-2020-03-30' of git://git.kernel.org/pub/scm/linux/kernel/git...
[mirror_ubuntu-jammy-kernel.git] / net / ipv6 / seg6_local.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
d1df6fd8
DL
2/*
3 * SR-IPv6 implementation
4 *
004d4b27 5 * Authors:
d1df6fd8 6 * David Lebrun <david.lebrun@uclouvain.be>
004d4b27 7 * eBPF support: Mathieu Xhonneux <m.xhonneux@gmail.com>
d1df6fd8
DL
8 */
9
10#include <linux/types.h>
11#include <linux/skbuff.h>
12#include <linux/net.h>
13#include <linux/module.h>
14#include <net/ip.h>
15#include <net/lwtunnel.h>
16#include <net/netevent.h>
17#include <net/netns/generic.h>
18#include <net/ip6_fib.h>
19#include <net/route.h>
20#include <net/seg6.h>
21#include <linux/seg6.h>
22#include <linux/seg6_local.h>
23#include <net/addrconf.h>
24#include <net/ip6_route.h>
25#include <net/dst_cache.h>
62ebaeae 26#include <net/ip_tunnels.h>
d1df6fd8
DL
27#ifdef CONFIG_IPV6_SEG6_HMAC
28#include <net/seg6_hmac.h>
29#endif
1c1e761e 30#include <net/seg6_local.h>
891ef8dd 31#include <linux/etherdevice.h>
004d4b27 32#include <linux/bpf.h>
d1df6fd8
DL
33
34struct seg6_local_lwt;
35
36struct seg6_action_desc {
37 int action;
38 unsigned long attrs;
39 int (*input)(struct sk_buff *skb, struct seg6_local_lwt *slwt);
40 int static_headroom;
41};
42
004d4b27
MX
43struct bpf_lwt_prog {
44 struct bpf_prog *prog;
45 char *name;
46};
47
d1df6fd8
DL
48struct seg6_local_lwt {
49 int action;
50 struct ipv6_sr_hdr *srh;
51 int table;
52 struct in_addr nh4;
53 struct in6_addr nh6;
54 int iif;
55 int oif;
004d4b27 56 struct bpf_lwt_prog bpf;
d1df6fd8
DL
57
58 int headroom;
59 struct seg6_action_desc *desc;
60};
61
62static struct seg6_local_lwt *seg6_local_lwtunnel(struct lwtunnel_state *lwt)
63{
64 return (struct seg6_local_lwt *)lwt->data;
65}
66
140f04c3
DL
67static struct ipv6_sr_hdr *get_srh(struct sk_buff *skb)
68{
69 struct ipv6_sr_hdr *srh;
5829d70b 70 int len, srhoff = 0;
140f04c3 71
5829d70b
AA
72 if (ipv6_find_hdr(skb, &srhoff, IPPROTO_ROUTING, NULL, NULL) < 0)
73 return NULL;
74
75 if (!pskb_may_pull(skb, srhoff + sizeof(*srh)))
76 return NULL;
77
78 srh = (struct ipv6_sr_hdr *)(skb->data + srhoff);
79
140f04c3
DL
80 len = (srh->hdrlen + 1) << 3;
81
5829d70b 82 if (!pskb_may_pull(skb, srhoff + len))
140f04c3
DL
83 return NULL;
84
7f91ed8c
AM
85 /* note that pskb_may_pull may change pointers in header;
86 * for this reason it is necessary to reload them when needed.
87 */
88 srh = (struct ipv6_sr_hdr *)(skb->data + srhoff);
89
140f04c3
DL
90 if (!seg6_validate_srh(srh, len))
91 return NULL;
92
93 return srh;
94}
95
96static struct ipv6_sr_hdr *get_and_validate_srh(struct sk_buff *skb)
97{
98 struct ipv6_sr_hdr *srh;
99
100 srh = get_srh(skb);
101 if (!srh)
102 return NULL;
103
104 if (srh->segments_left == 0)
105 return NULL;
106
107#ifdef CONFIG_IPV6_SEG6_HMAC
108 if (!seg6_hmac_validate_skb(skb))
109 return NULL;
110#endif
111
112 return srh;
113}
114
d7a669dd
DL
115static bool decap_and_validate(struct sk_buff *skb, int proto)
116{
117 struct ipv6_sr_hdr *srh;
118 unsigned int off = 0;
119
120 srh = get_srh(skb);
121 if (srh && srh->segments_left > 0)
122 return false;
123
124#ifdef CONFIG_IPV6_SEG6_HMAC
125 if (srh && !seg6_hmac_validate_skb(skb))
126 return false;
127#endif
128
129 if (ipv6_find_hdr(skb, &off, proto, NULL, NULL) < 0)
130 return false;
131
132 if (!pskb_pull(skb, off))
133 return false;
134
135 skb_postpull_rcsum(skb, skb_network_header(skb), off);
136
137 skb_reset_network_header(skb);
138 skb_reset_transport_header(skb);
62ebaeae
YT
139 if (iptunnel_pull_offloads(skb))
140 return false;
d7a669dd
DL
141
142 return true;
143}
144
145static void advance_nextseg(struct ipv6_sr_hdr *srh, struct in6_addr *daddr)
146{
147 struct in6_addr *addr;
148
149 srh->segments_left--;
150 addr = srh->segments + srh->segments_left;
151 *daddr = *addr;
152}
153
fd1fef0c
AM
154static int
155seg6_lookup_any_nexthop(struct sk_buff *skb, struct in6_addr *nhaddr,
156 u32 tbl_id, bool local_delivery)
d7a669dd
DL
157{
158 struct net *net = dev_net(skb->dev);
159 struct ipv6hdr *hdr = ipv6_hdr(skb);
160 int flags = RT6_LOOKUP_F_HAS_SADDR;
161 struct dst_entry *dst = NULL;
162 struct rt6_info *rt;
163 struct flowi6 fl6;
fd1fef0c 164 int dev_flags = 0;
d7a669dd
DL
165
166 fl6.flowi6_iif = skb->dev->ifindex;
167 fl6.daddr = nhaddr ? *nhaddr : hdr->daddr;
168 fl6.saddr = hdr->saddr;
169 fl6.flowlabel = ip6_flowinfo(hdr);
170 fl6.flowi6_mark = skb->mark;
171 fl6.flowi6_proto = hdr->nexthdr;
172
173 if (nhaddr)
174 fl6.flowi6_flags = FLOWI_FLAG_KNOWN_NH;
175
176 if (!tbl_id) {
b75cc8f9 177 dst = ip6_route_input_lookup(net, skb->dev, &fl6, skb, flags);
d7a669dd
DL
178 } else {
179 struct fib6_table *table;
180
181 table = fib6_get_table(net, tbl_id);
182 if (!table)
183 goto out;
184
b75cc8f9 185 rt = ip6_pol_route(net, table, 0, &fl6, skb, flags);
d7a669dd
DL
186 dst = &rt->dst;
187 }
188
fd1fef0c
AM
189 /* we want to discard traffic destined for local packet processing,
190 * if @local_delivery is set to false.
191 */
192 if (!local_delivery)
193 dev_flags |= IFF_LOOPBACK;
194
195 if (dst && (dst->dev->flags & dev_flags) && !dst->error) {
d7a669dd
DL
196 dst_release(dst);
197 dst = NULL;
198 }
199
200out:
201 if (!dst) {
202 rt = net->ipv6.ip6_blk_hole_entry;
203 dst = &rt->dst;
204 dst_hold(dst);
205 }
206
207 skb_dst_drop(skb);
208 skb_dst_set(skb, dst);
1c1e761e 209 return dst->error;
d7a669dd
DL
210}
211
fd1fef0c
AM
212int seg6_lookup_nexthop(struct sk_buff *skb,
213 struct in6_addr *nhaddr, u32 tbl_id)
214{
215 return seg6_lookup_any_nexthop(skb, nhaddr, tbl_id, false);
216}
217
140f04c3
DL
218/* regular endpoint function */
219static int input_action_end(struct sk_buff *skb, struct seg6_local_lwt *slwt)
220{
221 struct ipv6_sr_hdr *srh;
140f04c3
DL
222
223 srh = get_and_validate_srh(skb);
224 if (!srh)
225 goto drop;
226
d7a669dd 227 advance_nextseg(srh, &ipv6_hdr(skb)->daddr);
140f04c3 228
1c1e761e 229 seg6_lookup_nexthop(skb, NULL, 0);
140f04c3
DL
230
231 return dst_input(skb);
232
233drop:
234 kfree_skb(skb);
235 return -EINVAL;
236}
237
238/* regular endpoint, and forward to specified nexthop */
239static int input_action_end_x(struct sk_buff *skb, struct seg6_local_lwt *slwt)
240{
140f04c3 241 struct ipv6_sr_hdr *srh;
140f04c3
DL
242
243 srh = get_and_validate_srh(skb);
244 if (!srh)
245 goto drop;
246
d7a669dd 247 advance_nextseg(srh, &ipv6_hdr(skb)->daddr);
140f04c3 248
1c1e761e 249 seg6_lookup_nexthop(skb, &slwt->nh6, 0);
140f04c3
DL
250
251 return dst_input(skb);
252
253drop:
254 kfree_skb(skb);
255 return -EINVAL;
256}
257
891ef8dd
DL
258static int input_action_end_t(struct sk_buff *skb, struct seg6_local_lwt *slwt)
259{
260 struct ipv6_sr_hdr *srh;
261
262 srh = get_and_validate_srh(skb);
263 if (!srh)
264 goto drop;
265
266 advance_nextseg(srh, &ipv6_hdr(skb)->daddr);
267
1c1e761e 268 seg6_lookup_nexthop(skb, NULL, slwt->table);
891ef8dd
DL
269
270 return dst_input(skb);
271
272drop:
273 kfree_skb(skb);
274 return -EINVAL;
275}
276
277/* decapsulate and forward inner L2 frame on specified interface */
278static int input_action_end_dx2(struct sk_buff *skb,
279 struct seg6_local_lwt *slwt)
280{
281 struct net *net = dev_net(skb->dev);
282 struct net_device *odev;
283 struct ethhdr *eth;
284
26776253 285 if (!decap_and_validate(skb, IPPROTO_ETHERNET))
891ef8dd
DL
286 goto drop;
287
288 if (!pskb_may_pull(skb, ETH_HLEN))
289 goto drop;
290
291 skb_reset_mac_header(skb);
292 eth = (struct ethhdr *)skb->data;
293
294 /* To determine the frame's protocol, we assume it is 802.3. This avoids
295 * a call to eth_type_trans(), which is not really relevant for our
296 * use case.
297 */
298 if (!eth_proto_is_802_3(eth->h_proto))
299 goto drop;
300
301 odev = dev_get_by_index_rcu(net, slwt->oif);
302 if (!odev)
303 goto drop;
304
305 /* As we accept Ethernet frames, make sure the egress device is of
306 * the correct type.
307 */
308 if (odev->type != ARPHRD_ETHER)
309 goto drop;
310
311 if (!(odev->flags & IFF_UP) || !netif_carrier_ok(odev))
312 goto drop;
313
314 skb_orphan(skb);
315
316 if (skb_warn_if_lro(skb))
317 goto drop;
318
319 skb_forward_csum(skb);
320
321 if (skb->len - ETH_HLEN > odev->mtu)
322 goto drop;
323
324 skb->dev = odev;
325 skb->protocol = eth->h_proto;
326
327 return dev_queue_xmit(skb);
328
329drop:
330 kfree_skb(skb);
331 return -EINVAL;
332}
333
140f04c3
DL
334/* decapsulate and forward to specified nexthop */
335static int input_action_end_dx6(struct sk_buff *skb,
336 struct seg6_local_lwt *slwt)
337{
d7a669dd 338 struct in6_addr *nhaddr = NULL;
140f04c3
DL
339
340 /* this function accepts IPv6 encapsulated packets, with either
341 * an SRH with SL=0, or no SRH.
342 */
343
d7a669dd 344 if (!decap_and_validate(skb, IPPROTO_IPV6))
140f04c3 345 goto drop;
140f04c3 346
d7a669dd 347 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
140f04c3
DL
348 goto drop;
349
140f04c3
DL
350 /* The inner packet is not associated to any local interface,
351 * so we do not call netif_rx().
352 *
353 * If slwt->nh6 is set to ::, then lookup the nexthop for the
354 * inner packet's DA. Otherwise, use the specified nexthop.
355 */
356
d7a669dd
DL
357 if (!ipv6_addr_any(&slwt->nh6))
358 nhaddr = &slwt->nh6;
140f04c3 359
c71644d0
AM
360 skb_set_transport_header(skb, sizeof(struct ipv6hdr));
361
1c1e761e 362 seg6_lookup_nexthop(skb, nhaddr, 0);
140f04c3
DL
363
364 return dst_input(skb);
365drop:
366 kfree_skb(skb);
367 return -EINVAL;
368}
369
891ef8dd
DL
370static int input_action_end_dx4(struct sk_buff *skb,
371 struct seg6_local_lwt *slwt)
372{
373 struct iphdr *iph;
374 __be32 nhaddr;
375 int err;
376
377 if (!decap_and_validate(skb, IPPROTO_IPIP))
378 goto drop;
379
380 if (!pskb_may_pull(skb, sizeof(struct iphdr)))
381 goto drop;
382
383 skb->protocol = htons(ETH_P_IP);
384
385 iph = ip_hdr(skb);
386
387 nhaddr = slwt->nh4.s_addr ?: iph->daddr;
388
389 skb_dst_drop(skb);
390
c71644d0
AM
391 skb_set_transport_header(skb, sizeof(struct iphdr));
392
891ef8dd
DL
393 err = ip_route_input(skb, nhaddr, iph->saddr, 0, skb->dev);
394 if (err)
395 goto drop;
396
397 return dst_input(skb);
398
399drop:
400 kfree_skb(skb);
401 return -EINVAL;
402}
403
404static int input_action_end_dt6(struct sk_buff *skb,
405 struct seg6_local_lwt *slwt)
406{
407 if (!decap_and_validate(skb, IPPROTO_IPV6))
408 goto drop;
409
410 if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
411 goto drop;
412
c71644d0
AM
413 skb_set_transport_header(skb, sizeof(struct ipv6hdr));
414
fd1fef0c 415 seg6_lookup_any_nexthop(skb, NULL, slwt->table, true);
891ef8dd
DL
416
417 return dst_input(skb);
418
419drop:
420 kfree_skb(skb);
421 return -EINVAL;
422}
423
140f04c3
DL
424/* push an SRH on top of the current one */
425static int input_action_end_b6(struct sk_buff *skb, struct seg6_local_lwt *slwt)
426{
427 struct ipv6_sr_hdr *srh;
428 int err = -EINVAL;
429
430 srh = get_and_validate_srh(skb);
431 if (!srh)
432 goto drop;
433
434 err = seg6_do_srh_inline(skb, slwt->srh);
435 if (err)
436 goto drop;
437
438 ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr));
439 skb_set_transport_header(skb, sizeof(struct ipv6hdr));
440
1c1e761e 441 seg6_lookup_nexthop(skb, NULL, 0);
140f04c3
DL
442
443 return dst_input(skb);
444
445drop:
446 kfree_skb(skb);
447 return err;
448}
449
450/* encapsulate within an outer IPv6 header and a specified SRH */
451static int input_action_end_b6_encap(struct sk_buff *skb,
452 struct seg6_local_lwt *slwt)
453{
454 struct ipv6_sr_hdr *srh;
140f04c3
DL
455 int err = -EINVAL;
456
457 srh = get_and_validate_srh(skb);
458 if (!srh)
459 goto drop;
460
d7a669dd 461 advance_nextseg(srh, &ipv6_hdr(skb)->daddr);
140f04c3
DL
462
463 skb_reset_inner_headers(skb);
464 skb->encapsulation = 1;
465
32d99d0b 466 err = seg6_do_srh_encap(skb, slwt->srh, IPPROTO_IPV6);
140f04c3
DL
467 if (err)
468 goto drop;
469
470 ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr));
471 skb_set_transport_header(skb, sizeof(struct ipv6hdr));
472
1c1e761e 473 seg6_lookup_nexthop(skb, NULL, 0);
140f04c3
DL
474
475 return dst_input(skb);
476
477drop:
478 kfree_skb(skb);
479 return err;
480}
481
fe94cc29
MX
482DEFINE_PER_CPU(struct seg6_bpf_srh_state, seg6_bpf_srh_states);
483
486cdf21
MX
484bool seg6_bpf_has_valid_srh(struct sk_buff *skb)
485{
486 struct seg6_bpf_srh_state *srh_state =
487 this_cpu_ptr(&seg6_bpf_srh_states);
488 struct ipv6_sr_hdr *srh = srh_state->srh;
489
490 if (unlikely(srh == NULL))
491 return false;
492
493 if (unlikely(!srh_state->valid)) {
494 if ((srh_state->hdrlen & 7) != 0)
495 return false;
496
497 srh->hdrlen = (u8)(srh_state->hdrlen >> 3);
498 if (!seg6_validate_srh(srh, (srh->hdrlen + 1) << 3))
499 return false;
500
501 srh_state->valid = true;
502 }
503
504 return true;
505}
506
004d4b27
MX
507static int input_action_end_bpf(struct sk_buff *skb,
508 struct seg6_local_lwt *slwt)
509{
510 struct seg6_bpf_srh_state *srh_state =
511 this_cpu_ptr(&seg6_bpf_srh_states);
004d4b27 512 struct ipv6_sr_hdr *srh;
004d4b27
MX
513 int ret;
514
515 srh = get_and_validate_srh(skb);
486cdf21
MX
516 if (!srh) {
517 kfree_skb(skb);
518 return -EINVAL;
519 }
004d4b27
MX
520 advance_nextseg(srh, &ipv6_hdr(skb)->daddr);
521
522 /* preempt_disable is needed to protect the per-CPU buffer srh_state,
523 * which is also accessed by the bpf_lwt_seg6_* helpers
524 */
525 preempt_disable();
486cdf21 526 srh_state->srh = srh;
004d4b27 527 srh_state->hdrlen = srh->hdrlen << 3;
486cdf21 528 srh_state->valid = true;
004d4b27
MX
529
530 rcu_read_lock();
531 bpf_compute_data_pointers(skb);
532 ret = bpf_prog_run_save_cb(slwt->bpf.prog, skb);
533 rcu_read_unlock();
534
004d4b27
MX
535 switch (ret) {
536 case BPF_OK:
537 case BPF_REDIRECT:
538 break;
539 case BPF_DROP:
540 goto drop;
541 default:
542 pr_warn_once("bpf-seg6local: Illegal return value %u\n", ret);
543 goto drop;
544 }
545
486cdf21 546 if (srh_state->srh && !seg6_bpf_has_valid_srh(skb))
004d4b27
MX
547 goto drop;
548
486cdf21 549 preempt_enable();
004d4b27
MX
550 if (ret != BPF_REDIRECT)
551 seg6_lookup_nexthop(skb, NULL, 0);
552
553 return dst_input(skb);
554
555drop:
486cdf21 556 preempt_enable();
004d4b27
MX
557 kfree_skb(skb);
558 return -EINVAL;
559}
560
d1df6fd8
DL
561static struct seg6_action_desc seg6_action_table[] = {
562 {
563 .action = SEG6_LOCAL_ACTION_END,
564 .attrs = 0,
140f04c3
DL
565 .input = input_action_end,
566 },
567 {
568 .action = SEG6_LOCAL_ACTION_END_X,
569 .attrs = (1 << SEG6_LOCAL_NH6),
570 .input = input_action_end_x,
d1df6fd8 571 },
891ef8dd
DL
572 {
573 .action = SEG6_LOCAL_ACTION_END_T,
574 .attrs = (1 << SEG6_LOCAL_TABLE),
575 .input = input_action_end_t,
576 },
577 {
578 .action = SEG6_LOCAL_ACTION_END_DX2,
579 .attrs = (1 << SEG6_LOCAL_OIF),
580 .input = input_action_end_dx2,
581 },
140f04c3
DL
582 {
583 .action = SEG6_LOCAL_ACTION_END_DX6,
584 .attrs = (1 << SEG6_LOCAL_NH6),
585 .input = input_action_end_dx6,
586 },
891ef8dd
DL
587 {
588 .action = SEG6_LOCAL_ACTION_END_DX4,
589 .attrs = (1 << SEG6_LOCAL_NH4),
590 .input = input_action_end_dx4,
591 },
592 {
593 .action = SEG6_LOCAL_ACTION_END_DT6,
594 .attrs = (1 << SEG6_LOCAL_TABLE),
595 .input = input_action_end_dt6,
596 },
140f04c3
DL
597 {
598 .action = SEG6_LOCAL_ACTION_END_B6,
599 .attrs = (1 << SEG6_LOCAL_SRH),
600 .input = input_action_end_b6,
601 },
602 {
603 .action = SEG6_LOCAL_ACTION_END_B6_ENCAP,
604 .attrs = (1 << SEG6_LOCAL_SRH),
605 .input = input_action_end_b6_encap,
606 .static_headroom = sizeof(struct ipv6hdr),
004d4b27
MX
607 },
608 {
609 .action = SEG6_LOCAL_ACTION_END_BPF,
610 .attrs = (1 << SEG6_LOCAL_BPF),
611 .input = input_action_end_bpf,
612 },
613
d1df6fd8
DL
614};
615
616static struct seg6_action_desc *__get_action_desc(int action)
617{
618 struct seg6_action_desc *desc;
619 int i, count;
620
709af180 621 count = ARRAY_SIZE(seg6_action_table);
d1df6fd8
DL
622 for (i = 0; i < count; i++) {
623 desc = &seg6_action_table[i];
624 if (desc->action == action)
625 return desc;
626 }
627
628 return NULL;
629}
630
631static int seg6_local_input(struct sk_buff *skb)
632{
633 struct dst_entry *orig_dst = skb_dst(skb);
634 struct seg6_action_desc *desc;
635 struct seg6_local_lwt *slwt;
636
6285217f
DL
637 if (skb->protocol != htons(ETH_P_IPV6)) {
638 kfree_skb(skb);
639 return -EINVAL;
640 }
641
d1df6fd8
DL
642 slwt = seg6_local_lwtunnel(orig_dst->lwtstate);
643 desc = slwt->desc;
644
645 return desc->input(skb, slwt);
646}
647
648static const struct nla_policy seg6_local_policy[SEG6_LOCAL_MAX + 1] = {
649 [SEG6_LOCAL_ACTION] = { .type = NLA_U32 },
650 [SEG6_LOCAL_SRH] = { .type = NLA_BINARY },
651 [SEG6_LOCAL_TABLE] = { .type = NLA_U32 },
652 [SEG6_LOCAL_NH4] = { .type = NLA_BINARY,
653 .len = sizeof(struct in_addr) },
654 [SEG6_LOCAL_NH6] = { .type = NLA_BINARY,
655 .len = sizeof(struct in6_addr) },
656 [SEG6_LOCAL_IIF] = { .type = NLA_U32 },
657 [SEG6_LOCAL_OIF] = { .type = NLA_U32 },
004d4b27 658 [SEG6_LOCAL_BPF] = { .type = NLA_NESTED },
d1df6fd8
DL
659};
660
2d9cc60a
DL
661static int parse_nla_srh(struct nlattr **attrs, struct seg6_local_lwt *slwt)
662{
663 struct ipv6_sr_hdr *srh;
664 int len;
665
666 srh = nla_data(attrs[SEG6_LOCAL_SRH]);
667 len = nla_len(attrs[SEG6_LOCAL_SRH]);
668
669 /* SRH must contain at least one segment */
670 if (len < sizeof(*srh) + sizeof(struct in6_addr))
671 return -EINVAL;
672
673 if (!seg6_validate_srh(srh, len))
674 return -EINVAL;
675
7fa41efa 676 slwt->srh = kmemdup(srh, len, GFP_KERNEL);
2d9cc60a
DL
677 if (!slwt->srh)
678 return -ENOMEM;
679
2d9cc60a
DL
680 slwt->headroom += len;
681
682 return 0;
683}
684
685static int put_nla_srh(struct sk_buff *skb, struct seg6_local_lwt *slwt)
686{
687 struct ipv6_sr_hdr *srh;
688 struct nlattr *nla;
689 int len;
690
691 srh = slwt->srh;
692 len = (srh->hdrlen + 1) << 3;
693
694 nla = nla_reserve(skb, SEG6_LOCAL_SRH, len);
695 if (!nla)
696 return -EMSGSIZE;
697
698 memcpy(nla_data(nla), srh, len);
699
700 return 0;
701}
702
703static int cmp_nla_srh(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
704{
705 int len = (a->srh->hdrlen + 1) << 3;
706
707 if (len != ((b->srh->hdrlen + 1) << 3))
708 return 1;
709
710 return memcmp(a->srh, b->srh, len);
711}
712
713static int parse_nla_table(struct nlattr **attrs, struct seg6_local_lwt *slwt)
714{
715 slwt->table = nla_get_u32(attrs[SEG6_LOCAL_TABLE]);
716
717 return 0;
718}
719
720static int put_nla_table(struct sk_buff *skb, struct seg6_local_lwt *slwt)
721{
722 if (nla_put_u32(skb, SEG6_LOCAL_TABLE, slwt->table))
723 return -EMSGSIZE;
724
725 return 0;
726}
727
728static int cmp_nla_table(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
729{
730 if (a->table != b->table)
731 return 1;
732
733 return 0;
734}
735
736static int parse_nla_nh4(struct nlattr **attrs, struct seg6_local_lwt *slwt)
737{
738 memcpy(&slwt->nh4, nla_data(attrs[SEG6_LOCAL_NH4]),
739 sizeof(struct in_addr));
740
741 return 0;
742}
743
744static int put_nla_nh4(struct sk_buff *skb, struct seg6_local_lwt *slwt)
745{
746 struct nlattr *nla;
747
748 nla = nla_reserve(skb, SEG6_LOCAL_NH4, sizeof(struct in_addr));
749 if (!nla)
750 return -EMSGSIZE;
751
752 memcpy(nla_data(nla), &slwt->nh4, sizeof(struct in_addr));
753
754 return 0;
755}
756
757static int cmp_nla_nh4(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
758{
759 return memcmp(&a->nh4, &b->nh4, sizeof(struct in_addr));
760}
761
762static int parse_nla_nh6(struct nlattr **attrs, struct seg6_local_lwt *slwt)
763{
764 memcpy(&slwt->nh6, nla_data(attrs[SEG6_LOCAL_NH6]),
765 sizeof(struct in6_addr));
766
767 return 0;
768}
769
770static int put_nla_nh6(struct sk_buff *skb, struct seg6_local_lwt *slwt)
771{
772 struct nlattr *nla;
773
774 nla = nla_reserve(skb, SEG6_LOCAL_NH6, sizeof(struct in6_addr));
775 if (!nla)
776 return -EMSGSIZE;
777
778 memcpy(nla_data(nla), &slwt->nh6, sizeof(struct in6_addr));
779
780 return 0;
781}
782
783static int cmp_nla_nh6(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
784{
785 return memcmp(&a->nh6, &b->nh6, sizeof(struct in6_addr));
786}
787
788static int parse_nla_iif(struct nlattr **attrs, struct seg6_local_lwt *slwt)
789{
790 slwt->iif = nla_get_u32(attrs[SEG6_LOCAL_IIF]);
791
792 return 0;
793}
794
795static int put_nla_iif(struct sk_buff *skb, struct seg6_local_lwt *slwt)
796{
797 if (nla_put_u32(skb, SEG6_LOCAL_IIF, slwt->iif))
798 return -EMSGSIZE;
799
800 return 0;
801}
802
803static int cmp_nla_iif(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
804{
805 if (a->iif != b->iif)
806 return 1;
807
808 return 0;
809}
810
811static int parse_nla_oif(struct nlattr **attrs, struct seg6_local_lwt *slwt)
812{
813 slwt->oif = nla_get_u32(attrs[SEG6_LOCAL_OIF]);
814
815 return 0;
816}
817
818static int put_nla_oif(struct sk_buff *skb, struct seg6_local_lwt *slwt)
819{
820 if (nla_put_u32(skb, SEG6_LOCAL_OIF, slwt->oif))
821 return -EMSGSIZE;
822
823 return 0;
824}
825
826static int cmp_nla_oif(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
827{
828 if (a->oif != b->oif)
829 return 1;
830
831 return 0;
832}
833
004d4b27
MX
834#define MAX_PROG_NAME 256
835static const struct nla_policy bpf_prog_policy[SEG6_LOCAL_BPF_PROG_MAX + 1] = {
836 [SEG6_LOCAL_BPF_PROG] = { .type = NLA_U32, },
837 [SEG6_LOCAL_BPF_PROG_NAME] = { .type = NLA_NUL_STRING,
838 .len = MAX_PROG_NAME },
839};
840
841static int parse_nla_bpf(struct nlattr **attrs, struct seg6_local_lwt *slwt)
842{
843 struct nlattr *tb[SEG6_LOCAL_BPF_PROG_MAX + 1];
844 struct bpf_prog *p;
845 int ret;
846 u32 fd;
847
8cb08174
JB
848 ret = nla_parse_nested_deprecated(tb, SEG6_LOCAL_BPF_PROG_MAX,
849 attrs[SEG6_LOCAL_BPF],
850 bpf_prog_policy, NULL);
004d4b27
MX
851 if (ret < 0)
852 return ret;
853
854 if (!tb[SEG6_LOCAL_BPF_PROG] || !tb[SEG6_LOCAL_BPF_PROG_NAME])
855 return -EINVAL;
856
857 slwt->bpf.name = nla_memdup(tb[SEG6_LOCAL_BPF_PROG_NAME], GFP_KERNEL);
858 if (!slwt->bpf.name)
859 return -ENOMEM;
860
861 fd = nla_get_u32(tb[SEG6_LOCAL_BPF_PROG]);
862 p = bpf_prog_get_type(fd, BPF_PROG_TYPE_LWT_SEG6LOCAL);
863 if (IS_ERR(p)) {
864 kfree(slwt->bpf.name);
865 return PTR_ERR(p);
866 }
867
868 slwt->bpf.prog = p;
869 return 0;
870}
871
872static int put_nla_bpf(struct sk_buff *skb, struct seg6_local_lwt *slwt)
873{
874 struct nlattr *nest;
875
876 if (!slwt->bpf.prog)
877 return 0;
878
ae0be8de 879 nest = nla_nest_start_noflag(skb, SEG6_LOCAL_BPF);
004d4b27
MX
880 if (!nest)
881 return -EMSGSIZE;
882
883 if (nla_put_u32(skb, SEG6_LOCAL_BPF_PROG, slwt->bpf.prog->aux->id))
884 return -EMSGSIZE;
885
886 if (slwt->bpf.name &&
887 nla_put_string(skb, SEG6_LOCAL_BPF_PROG_NAME, slwt->bpf.name))
888 return -EMSGSIZE;
889
890 return nla_nest_end(skb, nest);
891}
892
893static int cmp_nla_bpf(struct seg6_local_lwt *a, struct seg6_local_lwt *b)
894{
895 if (!a->bpf.name && !b->bpf.name)
896 return 0;
897
898 if (!a->bpf.name || !b->bpf.name)
899 return 1;
900
901 return strcmp(a->bpf.name, b->bpf.name);
902}
903
d1df6fd8
DL
904struct seg6_action_param {
905 int (*parse)(struct nlattr **attrs, struct seg6_local_lwt *slwt);
906 int (*put)(struct sk_buff *skb, struct seg6_local_lwt *slwt);
907 int (*cmp)(struct seg6_local_lwt *a, struct seg6_local_lwt *b);
908};
909
910static struct seg6_action_param seg6_action_params[SEG6_LOCAL_MAX + 1] = {
2d9cc60a
DL
911 [SEG6_LOCAL_SRH] = { .parse = parse_nla_srh,
912 .put = put_nla_srh,
913 .cmp = cmp_nla_srh },
d1df6fd8 914
2d9cc60a
DL
915 [SEG6_LOCAL_TABLE] = { .parse = parse_nla_table,
916 .put = put_nla_table,
917 .cmp = cmp_nla_table },
d1df6fd8 918
2d9cc60a
DL
919 [SEG6_LOCAL_NH4] = { .parse = parse_nla_nh4,
920 .put = put_nla_nh4,
921 .cmp = cmp_nla_nh4 },
d1df6fd8 922
2d9cc60a
DL
923 [SEG6_LOCAL_NH6] = { .parse = parse_nla_nh6,
924 .put = put_nla_nh6,
925 .cmp = cmp_nla_nh6 },
d1df6fd8 926
2d9cc60a
DL
927 [SEG6_LOCAL_IIF] = { .parse = parse_nla_iif,
928 .put = put_nla_iif,
929 .cmp = cmp_nla_iif },
d1df6fd8 930
2d9cc60a
DL
931 [SEG6_LOCAL_OIF] = { .parse = parse_nla_oif,
932 .put = put_nla_oif,
933 .cmp = cmp_nla_oif },
004d4b27
MX
934
935 [SEG6_LOCAL_BPF] = { .parse = parse_nla_bpf,
936 .put = put_nla_bpf,
937 .cmp = cmp_nla_bpf },
938
d1df6fd8
DL
939};
940
941static int parse_nla_action(struct nlattr **attrs, struct seg6_local_lwt *slwt)
942{
943 struct seg6_action_param *param;
944 struct seg6_action_desc *desc;
945 int i, err;
946
947 desc = __get_action_desc(slwt->action);
948 if (!desc)
949 return -EINVAL;
950
951 if (!desc->input)
952 return -EOPNOTSUPP;
953
954 slwt->desc = desc;
955 slwt->headroom += desc->static_headroom;
956
957 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) {
958 if (desc->attrs & (1 << i)) {
959 if (!attrs[i])
960 return -EINVAL;
961
962 param = &seg6_action_params[i];
963
964 err = param->parse(attrs, slwt);
965 if (err < 0)
966 return err;
967 }
968 }
969
970 return 0;
971}
972
973static int seg6_local_build_state(struct nlattr *nla, unsigned int family,
974 const void *cfg, struct lwtunnel_state **ts,
975 struct netlink_ext_ack *extack)
976{
977 struct nlattr *tb[SEG6_LOCAL_MAX + 1];
978 struct lwtunnel_state *newts;
979 struct seg6_local_lwt *slwt;
980 int err;
981
6285217f
DL
982 if (family != AF_INET6)
983 return -EINVAL;
984
8cb08174
JB
985 err = nla_parse_nested_deprecated(tb, SEG6_LOCAL_MAX, nla,
986 seg6_local_policy, extack);
d1df6fd8
DL
987
988 if (err < 0)
989 return err;
990
991 if (!tb[SEG6_LOCAL_ACTION])
992 return -EINVAL;
993
994 newts = lwtunnel_state_alloc(sizeof(*slwt));
995 if (!newts)
996 return -ENOMEM;
997
998 slwt = seg6_local_lwtunnel(newts);
999 slwt->action = nla_get_u32(tb[SEG6_LOCAL_ACTION]);
1000
1001 err = parse_nla_action(tb, slwt);
1002 if (err < 0)
1003 goto out_free;
1004
1005 newts->type = LWTUNNEL_ENCAP_SEG6_LOCAL;
1006 newts->flags = LWTUNNEL_STATE_INPUT_REDIRECT;
1007 newts->headroom = slwt->headroom;
1008
1009 *ts = newts;
1010
1011 return 0;
1012
1013out_free:
1014 kfree(slwt->srh);
1015 kfree(newts);
1016 return err;
1017}
1018
1019static void seg6_local_destroy_state(struct lwtunnel_state *lwt)
1020{
1021 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt);
1022
1023 kfree(slwt->srh);
004d4b27
MX
1024
1025 if (slwt->desc->attrs & (1 << SEG6_LOCAL_BPF)) {
1026 kfree(slwt->bpf.name);
1027 bpf_prog_put(slwt->bpf.prog);
1028 }
1029
1030 return;
d1df6fd8
DL
1031}
1032
1033static int seg6_local_fill_encap(struct sk_buff *skb,
1034 struct lwtunnel_state *lwt)
1035{
1036 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt);
1037 struct seg6_action_param *param;
1038 int i, err;
1039
1040 if (nla_put_u32(skb, SEG6_LOCAL_ACTION, slwt->action))
1041 return -EMSGSIZE;
1042
1043 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) {
1044 if (slwt->desc->attrs & (1 << i)) {
1045 param = &seg6_action_params[i];
1046 err = param->put(skb, slwt);
1047 if (err < 0)
1048 return err;
1049 }
1050 }
1051
1052 return 0;
1053}
1054
1055static int seg6_local_get_encap_size(struct lwtunnel_state *lwt)
1056{
1057 struct seg6_local_lwt *slwt = seg6_local_lwtunnel(lwt);
1058 unsigned long attrs;
1059 int nlsize;
1060
1061 nlsize = nla_total_size(4); /* action */
1062
1063 attrs = slwt->desc->attrs;
1064
1065 if (attrs & (1 << SEG6_LOCAL_SRH))
1066 nlsize += nla_total_size((slwt->srh->hdrlen + 1) << 3);
1067
1068 if (attrs & (1 << SEG6_LOCAL_TABLE))
1069 nlsize += nla_total_size(4);
1070
1071 if (attrs & (1 << SEG6_LOCAL_NH4))
1072 nlsize += nla_total_size(4);
1073
1074 if (attrs & (1 << SEG6_LOCAL_NH6))
1075 nlsize += nla_total_size(16);
1076
1077 if (attrs & (1 << SEG6_LOCAL_IIF))
1078 nlsize += nla_total_size(4);
1079
1080 if (attrs & (1 << SEG6_LOCAL_OIF))
1081 nlsize += nla_total_size(4);
1082
004d4b27
MX
1083 if (attrs & (1 << SEG6_LOCAL_BPF))
1084 nlsize += nla_total_size(sizeof(struct nlattr)) +
1085 nla_total_size(MAX_PROG_NAME) +
1086 nla_total_size(4);
1087
d1df6fd8
DL
1088 return nlsize;
1089}
1090
1091static int seg6_local_cmp_encap(struct lwtunnel_state *a,
1092 struct lwtunnel_state *b)
1093{
1094 struct seg6_local_lwt *slwt_a, *slwt_b;
1095 struct seg6_action_param *param;
1096 int i;
1097
1098 slwt_a = seg6_local_lwtunnel(a);
1099 slwt_b = seg6_local_lwtunnel(b);
1100
1101 if (slwt_a->action != slwt_b->action)
1102 return 1;
1103
1104 if (slwt_a->desc->attrs != slwt_b->desc->attrs)
1105 return 1;
1106
1107 for (i = 0; i < SEG6_LOCAL_MAX + 1; i++) {
1108 if (slwt_a->desc->attrs & (1 << i)) {
1109 param = &seg6_action_params[i];
1110 if (param->cmp(slwt_a, slwt_b))
1111 return 1;
1112 }
1113 }
1114
1115 return 0;
1116}
1117
1118static const struct lwtunnel_encap_ops seg6_local_ops = {
1119 .build_state = seg6_local_build_state,
1120 .destroy_state = seg6_local_destroy_state,
1121 .input = seg6_local_input,
1122 .fill_encap = seg6_local_fill_encap,
1123 .get_encap_size = seg6_local_get_encap_size,
1124 .cmp_encap = seg6_local_cmp_encap,
1125 .owner = THIS_MODULE,
1126};
1127
1128int __init seg6_local_init(void)
1129{
1130 return lwtunnel_encap_add_ops(&seg6_local_ops,
1131 LWTUNNEL_ENCAP_SEG6_LOCAL);
1132}
1133
1134void seg6_local_exit(void)
1135{
1136 lwtunnel_encap_del_ops(&seg6_local_ops, LWTUNNEL_ENCAP_SEG6_LOCAL);
1137}