fou: Call setup_udp_tunnel_sock
[linux-block.git] / net / ipv4 / fou.c
CommitLineData
23461551
TH
1#include <linux/module.h>
2#include <linux/errno.h>
3#include <linux/socket.h>
4#include <linux/skbuff.h>
5#include <linux/ip.h>
6#include <linux/udp.h>
7#include <linux/types.h>
8#include <linux/kernel.h>
9#include <net/genetlink.h>
37dd0247 10#include <net/gue.h>
23461551 11#include <net/ip.h>
afe93325 12#include <net/protocol.h>
23461551
TH
13#include <net/udp.h>
14#include <net/udp_tunnel.h>
15#include <net/xfrm.h>
16#include <uapi/linux/fou.h>
17#include <uapi/linux/genetlink.h>
18
23461551
TH
19struct fou {
20 struct socket *sock;
21 u8 protocol;
fe881ef1 22 u8 flags;
4cbcdf2b 23 __be16 port;
7a6c8c34 24 u16 type;
23461551 25 struct list_head list;
3036facb 26 struct rcu_head rcu;
23461551
TH
27};
28
fe881ef1
TH
29#define FOU_F_REMCSUM_NOPARTIAL BIT(0)
30
23461551 31struct fou_cfg {
37dd0247 32 u16 type;
23461551 33 u8 protocol;
fe881ef1 34 u8 flags;
23461551
TH
35 struct udp_port_cfg udp_config;
36};
37
02d793c5
WC
38static unsigned int fou_net_id;
39
40struct fou_net {
41 struct list_head fou_list;
42 struct mutex fou_lock;
43};
44
23461551
TH
45static inline struct fou *fou_from_sock(struct sock *sk)
46{
47 return sk->sk_user_data;
48}
49
a09a4c8d 50static int fou_recv_pull(struct sk_buff *skb, size_t len)
23461551
TH
51{
52 struct iphdr *iph = ip_hdr(skb);
53
54 /* Remove 'len' bytes from the packet (UDP header and
5024c33a 55 * FOU header if present).
23461551
TH
56 */
57 iph->tot_len = htons(ntohs(iph->tot_len) - len);
58 __skb_pull(skb, len);
59 skb_postpull_rcsum(skb, udp_hdr(skb), len);
60 skb_reset_transport_header(skb);
a09a4c8d 61 return iptunnel_pull_offloads(skb);
23461551
TH
62}
63
64static int fou_udp_recv(struct sock *sk, struct sk_buff *skb)
65{
66 struct fou *fou = fou_from_sock(sk);
67
68 if (!fou)
69 return 1;
70
a09a4c8d
JG
71 if (fou_recv_pull(skb, sizeof(struct udphdr)))
72 goto drop;
5024c33a
TH
73
74 return -fou->protocol;
a09a4c8d
JG
75
76drop:
77 kfree_skb(skb);
78 return 0;
5024c33a
TH
79}
80
a8d31c12 81static struct guehdr *gue_remcsum(struct sk_buff *skb, struct guehdr *guehdr,
fe881ef1
TH
82 void *data, size_t hdrlen, u8 ipproto,
83 bool nopartial)
a8d31c12
TH
84{
85 __be16 *pd = data;
4fd671de
TH
86 size_t start = ntohs(pd[0]);
87 size_t offset = ntohs(pd[1]);
b7fe10e5
TH
88 size_t plen = sizeof(struct udphdr) + hdrlen +
89 max_t(size_t, offset + sizeof(u16), start);
90
91 if (skb->remcsum_offload)
92 return guehdr;
a8d31c12 93
a8d31c12
TH
94 if (!pskb_may_pull(skb, plen))
95 return NULL;
96 guehdr = (struct guehdr *)&udp_hdr(skb)[1];
97
fe881ef1
TH
98 skb_remcsum_process(skb, (void *)guehdr + hdrlen,
99 start, offset, nopartial);
a8d31c12
TH
100
101 return guehdr;
102}
103
5024c33a
TH
104static int gue_control_message(struct sk_buff *skb, struct guehdr *guehdr)
105{
106 /* No support yet */
107 kfree_skb(skb);
108 return 0;
23461551
TH
109}
110
37dd0247
TH
111static int gue_udp_recv(struct sock *sk, struct sk_buff *skb)
112{
113 struct fou *fou = fou_from_sock(sk);
5024c33a 114 size_t len, optlen, hdrlen;
37dd0247 115 struct guehdr *guehdr;
5024c33a 116 void *data;
a8d31c12 117 u16 doffset = 0;
37dd0247
TH
118
119 if (!fou)
120 return 1;
121
122 len = sizeof(struct udphdr) + sizeof(struct guehdr);
123 if (!pskb_may_pull(skb, len))
124 goto drop;
125
5024c33a
TH
126 guehdr = (struct guehdr *)&udp_hdr(skb)[1];
127
128 optlen = guehdr->hlen << 2;
129 len += optlen;
37dd0247 130
37dd0247
TH
131 if (!pskb_may_pull(skb, len))
132 goto drop;
133
5024c33a
TH
134 /* guehdr may change after pull */
135 guehdr = (struct guehdr *)&udp_hdr(skb)[1];
d8f00d27 136
5024c33a 137 hdrlen = sizeof(struct guehdr) + optlen;
37dd0247 138
5024c33a 139 if (guehdr->version != 0 || validate_gue_flags(guehdr, optlen))
37dd0247 140 goto drop;
5024c33a 141
a8d31c12
TH
142 hdrlen = sizeof(struct guehdr) + optlen;
143
144 ip_hdr(skb)->tot_len = htons(ntohs(ip_hdr(skb)->tot_len) - len);
145
a8d31c12
TH
146 /* Pull csum through the guehdr now . This can be used if
147 * there is a remote checksum offload.
148 */
149 skb_postpull_rcsum(skb, udp_hdr(skb), len);
5024c33a
TH
150
151 data = &guehdr[1];
152
153 if (guehdr->flags & GUE_FLAG_PRIV) {
a8d31c12
TH
154 __be32 flags = *(__be32 *)(data + doffset);
155
156 doffset += GUE_LEN_PRIV;
157
158 if (flags & GUE_PFLAG_REMCSUM) {
159 guehdr = gue_remcsum(skb, guehdr, data + doffset,
fe881ef1
TH
160 hdrlen, guehdr->proto_ctype,
161 !!(fou->flags &
162 FOU_F_REMCSUM_NOPARTIAL));
a8d31c12
TH
163 if (!guehdr)
164 goto drop;
165
166 data = &guehdr[1];
5024c33a 167
a8d31c12
TH
168 doffset += GUE_PLEN_REMCSUM;
169 }
37dd0247
TH
170 }
171
5024c33a
TH
172 if (unlikely(guehdr->control))
173 return gue_control_message(skb, guehdr);
174
4fd671de 175 __skb_pull(skb, sizeof(struct udphdr) + hdrlen);
a8d31c12
TH
176 skb_reset_transport_header(skb);
177
a09a4c8d
JG
178 if (iptunnel_pull_offloads(skb))
179 goto drop;
180
5024c33a
TH
181 return -guehdr->proto_ctype;
182
37dd0247
TH
183drop:
184 kfree_skb(skb);
185 return 0;
186}
187
d92283e3
TH
188static struct sk_buff **fou_gro_receive(struct sock *sk,
189 struct sk_buff **head,
190 struct sk_buff *skb)
afe93325
TH
191{
192 const struct net_offload *ops;
193 struct sk_buff **pp = NULL;
d92283e3 194 u8 proto = fou_from_sock(sk)->protocol;
efc98d08 195 const struct net_offload **offloads;
afe93325 196
c3483384
AD
197 /* We can clear the encap_mark for FOU as we are essentially doing
198 * one of two possible things. We are either adding an L4 tunnel
199 * header to the outer L3 tunnel header, or we are are simply
200 * treating the GRE tunnel header as though it is a UDP protocol
201 * specific header such as VXLAN or GENEVE.
202 */
203 NAPI_GRO_CB(skb)->encap_mark = 0;
204
a0ca153f
AD
205 /* Flag this frame as already having an outer encap header */
206 NAPI_GRO_CB(skb)->is_fou = 1;
207
afe93325 208 rcu_read_lock();
efc98d08 209 offloads = NAPI_GRO_CB(skb)->is_ipv6 ? inet6_offloads : inet_offloads;
afe93325
TH
210 ops = rcu_dereference(offloads[proto]);
211 if (!ops || !ops->callbacks.gro_receive)
212 goto out_unlock;
213
214 pp = ops->callbacks.gro_receive(head, skb);
215
216out_unlock:
217 rcu_read_unlock();
218
219 return pp;
220}
221
d92283e3
TH
222static int fou_gro_complete(struct sock *sk, struct sk_buff *skb,
223 int nhoff)
afe93325
TH
224{
225 const struct net_offload *ops;
d92283e3 226 u8 proto = fou_from_sock(sk)->protocol;
afe93325 227 int err = -ENOSYS;
efc98d08 228 const struct net_offload **offloads;
afe93325
TH
229
230 rcu_read_lock();
efc98d08 231 offloads = NAPI_GRO_CB(skb)->is_ipv6 ? inet6_offloads : inet_offloads;
afe93325
TH
232 ops = rcu_dereference(offloads[proto]);
233 if (WARN_ON(!ops || !ops->callbacks.gro_complete))
234 goto out_unlock;
235
236 err = ops->callbacks.gro_complete(skb, nhoff);
237
229740c6
JR
238 skb_set_inner_mac_header(skb, nhoff);
239
afe93325
TH
240out_unlock:
241 rcu_read_unlock();
242
243 return err;
244}
245
a8d31c12
TH
246static struct guehdr *gue_gro_remcsum(struct sk_buff *skb, unsigned int off,
247 struct guehdr *guehdr, void *data,
b7fe10e5
TH
248 size_t hdrlen, struct gro_remcsum *grc,
249 bool nopartial)
a8d31c12
TH
250{
251 __be16 *pd = data;
4fd671de
TH
252 size_t start = ntohs(pd[0]);
253 size_t offset = ntohs(pd[1]);
a8d31c12
TH
254
255 if (skb->remcsum_offload)
b7fe10e5 256 return guehdr;
a8d31c12 257
4fd671de 258 if (!NAPI_GRO_CB(skb)->csum_valid)
a8d31c12
TH
259 return NULL;
260
b7fe10e5
TH
261 guehdr = skb_gro_remcsum_process(skb, (void *)guehdr, off, hdrlen,
262 start, offset, grc, nopartial);
a8d31c12
TH
263
264 skb->remcsum_offload = 1;
265
266 return guehdr;
267}
268
d92283e3
TH
269static struct sk_buff **gue_gro_receive(struct sock *sk,
270 struct sk_buff **head,
271 struct sk_buff *skb)
37dd0247
TH
272{
273 const struct net_offload **offloads;
274 const struct net_offload *ops;
275 struct sk_buff **pp = NULL;
276 struct sk_buff *p;
37dd0247 277 struct guehdr *guehdr;
5024c33a
TH
278 size_t len, optlen, hdrlen, off;
279 void *data;
a8d31c12 280 u16 doffset = 0;
37dd0247 281 int flush = 1;
d92283e3 282 struct fou *fou = fou_from_sock(sk);
26c4f7da
TH
283 struct gro_remcsum grc;
284
285 skb_gro_remcsum_init(&grc);
37dd0247
TH
286
287 off = skb_gro_offset(skb);
5024c33a
TH
288 len = off + sizeof(*guehdr);
289
37dd0247 290 guehdr = skb_gro_header_fast(skb, off);
5024c33a
TH
291 if (skb_gro_header_hard(skb, len)) {
292 guehdr = skb_gro_header_slow(skb, len, off);
37dd0247
TH
293 if (unlikely(!guehdr))
294 goto out;
295 }
296
5024c33a
TH
297 optlen = guehdr->hlen << 2;
298 len += optlen;
37dd0247 299
5024c33a
TH
300 if (skb_gro_header_hard(skb, len)) {
301 guehdr = skb_gro_header_slow(skb, len, off);
302 if (unlikely(!guehdr))
303 goto out;
304 }
37dd0247 305
5024c33a
TH
306 if (unlikely(guehdr->control) || guehdr->version != 0 ||
307 validate_gue_flags(guehdr, optlen))
308 goto out;
37dd0247 309
5024c33a
TH
310 hdrlen = sizeof(*guehdr) + optlen;
311
a8d31c12
TH
312 /* Adjust NAPI_GRO_CB(skb)->csum to account for guehdr,
313 * this is needed if there is a remote checkcsum offload.
314 */
5024c33a
TH
315 skb_gro_postpull_rcsum(skb, guehdr, hdrlen);
316
317 data = &guehdr[1];
318
319 if (guehdr->flags & GUE_FLAG_PRIV) {
a8d31c12 320 __be32 flags = *(__be32 *)(data + doffset);
5024c33a 321
a8d31c12
TH
322 doffset += GUE_LEN_PRIV;
323
324 if (flags & GUE_PFLAG_REMCSUM) {
325 guehdr = gue_gro_remcsum(skb, off, guehdr,
b7fe10e5 326 data + doffset, hdrlen, &grc,
fe881ef1
TH
327 !!(fou->flags &
328 FOU_F_REMCSUM_NOPARTIAL));
b7fe10e5 329
a8d31c12
TH
330 if (!guehdr)
331 goto out;
332
333 data = &guehdr[1];
334
335 doffset += GUE_PLEN_REMCSUM;
336 }
37dd0247
TH
337 }
338
a8d31c12
TH
339 skb_gro_pull(skb, hdrlen);
340
37dd0247
TH
341 for (p = *head; p; p = p->next) {
342 const struct guehdr *guehdr2;
343
344 if (!NAPI_GRO_CB(p)->same_flow)
345 continue;
346
347 guehdr2 = (struct guehdr *)(p->data + off);
348
349 /* Compare base GUE header to be equal (covers
5024c33a 350 * hlen, version, proto_ctype, and flags.
37dd0247
TH
351 */
352 if (guehdr->word != guehdr2->word) {
353 NAPI_GRO_CB(p)->same_flow = 0;
354 continue;
355 }
356
357 /* Compare optional fields are the same. */
358 if (guehdr->hlen && memcmp(&guehdr[1], &guehdr2[1],
359 guehdr->hlen << 2)) {
360 NAPI_GRO_CB(p)->same_flow = 0;
361 continue;
362 }
363 }
364
c3483384
AD
365 /* We can clear the encap_mark for GUE as we are essentially doing
366 * one of two possible things. We are either adding an L4 tunnel
367 * header to the outer L3 tunnel header, or we are are simply
368 * treating the GRE tunnel header as though it is a UDP protocol
369 * specific header such as VXLAN or GENEVE.
370 */
371 NAPI_GRO_CB(skb)->encap_mark = 0;
372
a0ca153f
AD
373 /* Flag this frame as already having an outer encap header */
374 NAPI_GRO_CB(skb)->is_fou = 1;
375
5024c33a
TH
376 rcu_read_lock();
377 offloads = NAPI_GRO_CB(skb)->is_ipv6 ? inet6_offloads : inet_offloads;
378 ops = rcu_dereference(offloads[guehdr->proto_ctype]);
27013661 379 if (WARN_ON_ONCE(!ops || !ops->callbacks.gro_receive))
5024c33a 380 goto out_unlock;
37dd0247
TH
381
382 pp = ops->callbacks.gro_receive(head, skb);
c194cf93 383 flush = 0;
37dd0247
TH
384
385out_unlock:
386 rcu_read_unlock();
387out:
388 NAPI_GRO_CB(skb)->flush |= flush;
26c4f7da 389 skb_gro_remcsum_cleanup(skb, &grc);
37dd0247
TH
390
391 return pp;
392}
393
d92283e3 394static int gue_gro_complete(struct sock *sk, struct sk_buff *skb, int nhoff)
37dd0247
TH
395{
396 const struct net_offload **offloads;
397 struct guehdr *guehdr = (struct guehdr *)(skb->data + nhoff);
398 const struct net_offload *ops;
399 unsigned int guehlen;
400 u8 proto;
401 int err = -ENOENT;
402
5024c33a 403 proto = guehdr->proto_ctype;
37dd0247
TH
404
405 guehlen = sizeof(*guehdr) + (guehdr->hlen << 2);
406
407 rcu_read_lock();
408 offloads = NAPI_GRO_CB(skb)->is_ipv6 ? inet6_offloads : inet_offloads;
409 ops = rcu_dereference(offloads[proto]);
410 if (WARN_ON(!ops || !ops->callbacks.gro_complete))
411 goto out_unlock;
412
413 err = ops->callbacks.gro_complete(skb, nhoff + guehlen);
414
229740c6
JR
415 skb_set_inner_mac_header(skb, nhoff + guehlen);
416
37dd0247
TH
417out_unlock:
418 rcu_read_unlock();
419 return err;
420}
421
02d793c5 422static int fou_add_to_port_list(struct net *net, struct fou *fou)
23461551 423{
02d793c5 424 struct fou_net *fn = net_generic(net, fou_net_id);
23461551
TH
425 struct fou *fout;
426
02d793c5
WC
427 mutex_lock(&fn->fou_lock);
428 list_for_each_entry(fout, &fn->fou_list, list) {
23461551 429 if (fou->port == fout->port) {
02d793c5 430 mutex_unlock(&fn->fou_lock);
23461551
TH
431 return -EALREADY;
432 }
433 }
434
02d793c5
WC
435 list_add(&fou->list, &fn->fou_list);
436 mutex_unlock(&fn->fou_lock);
23461551
TH
437
438 return 0;
439}
440
441static void fou_release(struct fou *fou)
442{
443 struct socket *sock = fou->sock;
23461551 444
23461551 445 list_del(&fou->list);
02d793c5 446 udp_tunnel_sock_release(sock);
23461551 447
3036facb 448 kfree_rcu(fou, rcu);
23461551
TH
449}
450
451static int fou_create(struct net *net, struct fou_cfg *cfg,
452 struct socket **sockp)
453{
23461551 454 struct socket *sock = NULL;
02d793c5 455 struct fou *fou = NULL;
23461551 456 struct sock *sk;
440924bb 457 struct udp_tunnel_sock_cfg tunnel_cfg;
02d793c5 458 int err;
23461551
TH
459
460 /* Open UDP socket */
461 err = udp_sock_create(net, &cfg->udp_config, &sock);
462 if (err < 0)
463 goto error;
464
465 /* Allocate FOU port structure */
466 fou = kzalloc(sizeof(*fou), GFP_KERNEL);
467 if (!fou) {
468 err = -ENOMEM;
469 goto error;
470 }
471
472 sk = sock->sk;
473
fe881ef1 474 fou->flags = cfg->flags;
37dd0247 475 fou->port = cfg->udp_config.local_udp_port;
440924bb
TH
476 fou->type = cfg->type;
477 fou->sock = sock;
478
479 memset(&tunnel_cfg, 0, sizeof(tunnel_cfg));
480 tunnel_cfg.encap_type = 1;
481 tunnel_cfg.sk_user_data = fou;
482 tunnel_cfg.encap_destroy = NULL;
37dd0247
TH
483
484 /* Initial for fou type */
485 switch (cfg->type) {
486 case FOU_ENCAP_DIRECT:
440924bb
TH
487 tunnel_cfg.encap_rcv = fou_udp_recv;
488 tunnel_cfg.gro_receive = fou_gro_receive;
489 tunnel_cfg.gro_complete = fou_gro_complete;
490 fou->protocol = cfg->protocol;
37dd0247
TH
491 break;
492 case FOU_ENCAP_GUE:
440924bb
TH
493 tunnel_cfg.encap_rcv = gue_udp_recv;
494 tunnel_cfg.gro_receive = gue_gro_receive;
495 tunnel_cfg.gro_complete = gue_gro_complete;
37dd0247
TH
496 break;
497 default:
498 err = -EINVAL;
499 goto error;
500 }
23461551 501
440924bb 502 setup_udp_tunnel_sock(net, sock, &tunnel_cfg);
23461551
TH
503
504 sk->sk_allocation = GFP_ATOMIC;
505
02d793c5 506 err = fou_add_to_port_list(net, fou);
23461551
TH
507 if (err)
508 goto error;
509
510 if (sockp)
511 *sockp = sock;
512
513 return 0;
514
515error:
516 kfree(fou);
517 if (sock)
02d793c5 518 udp_tunnel_sock_release(sock);
23461551
TH
519
520 return err;
521}
522
523static int fou_destroy(struct net *net, struct fou_cfg *cfg)
524{
02d793c5 525 struct fou_net *fn = net_generic(net, fou_net_id);
4cbcdf2b 526 __be16 port = cfg->udp_config.local_udp_port;
23461551 527 int err = -EINVAL;
02d793c5 528 struct fou *fou;
23461551 529
02d793c5
WC
530 mutex_lock(&fn->fou_lock);
531 list_for_each_entry(fou, &fn->fou_list, list) {
23461551
TH
532 if (fou->port == port) {
533 fou_release(fou);
534 err = 0;
535 break;
536 }
537 }
02d793c5 538 mutex_unlock(&fn->fou_lock);
23461551
TH
539
540 return err;
541}
542
543static struct genl_family fou_nl_family = {
544 .id = GENL_ID_GENERATE,
545 .hdrsize = 0,
546 .name = FOU_GENL_NAME,
547 .version = FOU_GENL_VERSION,
548 .maxattr = FOU_ATTR_MAX,
549 .netnsok = true,
550};
551
552static struct nla_policy fou_nl_policy[FOU_ATTR_MAX + 1] = {
553 [FOU_ATTR_PORT] = { .type = NLA_U16, },
554 [FOU_ATTR_AF] = { .type = NLA_U8, },
555 [FOU_ATTR_IPPROTO] = { .type = NLA_U8, },
37dd0247 556 [FOU_ATTR_TYPE] = { .type = NLA_U8, },
fe881ef1 557 [FOU_ATTR_REMCSUM_NOPARTIAL] = { .type = NLA_FLAG, },
23461551
TH
558};
559
560static int parse_nl_config(struct genl_info *info,
561 struct fou_cfg *cfg)
562{
563 memset(cfg, 0, sizeof(*cfg));
564
565 cfg->udp_config.family = AF_INET;
566
567 if (info->attrs[FOU_ATTR_AF]) {
568 u8 family = nla_get_u8(info->attrs[FOU_ATTR_AF]);
569
b9b6695c 570 if (family != AF_INET)
23461551
TH
571 return -EINVAL;
572
573 cfg->udp_config.family = family;
574 }
575
576 if (info->attrs[FOU_ATTR_PORT]) {
4cbcdf2b 577 __be16 port = nla_get_be16(info->attrs[FOU_ATTR_PORT]);
23461551
TH
578
579 cfg->udp_config.local_udp_port = port;
580 }
581
582 if (info->attrs[FOU_ATTR_IPPROTO])
583 cfg->protocol = nla_get_u8(info->attrs[FOU_ATTR_IPPROTO]);
584
37dd0247
TH
585 if (info->attrs[FOU_ATTR_TYPE])
586 cfg->type = nla_get_u8(info->attrs[FOU_ATTR_TYPE]);
587
fe881ef1
TH
588 if (info->attrs[FOU_ATTR_REMCSUM_NOPARTIAL])
589 cfg->flags |= FOU_F_REMCSUM_NOPARTIAL;
590
23461551
TH
591 return 0;
592}
593
594static int fou_nl_cmd_add_port(struct sk_buff *skb, struct genl_info *info)
595{
02d793c5 596 struct net *net = genl_info_net(info);
23461551
TH
597 struct fou_cfg cfg;
598 int err;
599
600 err = parse_nl_config(info, &cfg);
601 if (err)
602 return err;
603
02d793c5 604 return fou_create(net, &cfg, NULL);
23461551
TH
605}
606
607static int fou_nl_cmd_rm_port(struct sk_buff *skb, struct genl_info *info)
608{
02d793c5 609 struct net *net = genl_info_net(info);
23461551 610 struct fou_cfg cfg;
67270636 611 int err;
23461551 612
67270636
WC
613 err = parse_nl_config(info, &cfg);
614 if (err)
615 return err;
23461551 616
02d793c5 617 return fou_destroy(net, &cfg);
23461551
TH
618}
619
7a6c8c34
WC
620static int fou_fill_info(struct fou *fou, struct sk_buff *msg)
621{
622 if (nla_put_u8(msg, FOU_ATTR_AF, fou->sock->sk->sk_family) ||
623 nla_put_be16(msg, FOU_ATTR_PORT, fou->port) ||
624 nla_put_u8(msg, FOU_ATTR_IPPROTO, fou->protocol) ||
625 nla_put_u8(msg, FOU_ATTR_TYPE, fou->type))
626 return -1;
627
628 if (fou->flags & FOU_F_REMCSUM_NOPARTIAL)
629 if (nla_put_flag(msg, FOU_ATTR_REMCSUM_NOPARTIAL))
630 return -1;
631 return 0;
632}
633
634static int fou_dump_info(struct fou *fou, u32 portid, u32 seq,
635 u32 flags, struct sk_buff *skb, u8 cmd)
636{
637 void *hdr;
638
639 hdr = genlmsg_put(skb, portid, seq, &fou_nl_family, flags, cmd);
640 if (!hdr)
641 return -ENOMEM;
642
643 if (fou_fill_info(fou, skb) < 0)
644 goto nla_put_failure;
645
646 genlmsg_end(skb, hdr);
647 return 0;
648
649nla_put_failure:
650 genlmsg_cancel(skb, hdr);
651 return -EMSGSIZE;
652}
653
654static int fou_nl_cmd_get_port(struct sk_buff *skb, struct genl_info *info)
655{
656 struct net *net = genl_info_net(info);
657 struct fou_net *fn = net_generic(net, fou_net_id);
658 struct sk_buff *msg;
659 struct fou_cfg cfg;
660 struct fou *fout;
661 __be16 port;
662 int ret;
663
664 ret = parse_nl_config(info, &cfg);
665 if (ret)
666 return ret;
667 port = cfg.udp_config.local_udp_port;
668 if (port == 0)
669 return -EINVAL;
670
671 msg = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
672 if (!msg)
673 return -ENOMEM;
674
675 ret = -ESRCH;
676 mutex_lock(&fn->fou_lock);
677 list_for_each_entry(fout, &fn->fou_list, list) {
678 if (port == fout->port) {
679 ret = fou_dump_info(fout, info->snd_portid,
680 info->snd_seq, 0, msg,
681 info->genlhdr->cmd);
682 break;
683 }
684 }
685 mutex_unlock(&fn->fou_lock);
686 if (ret < 0)
687 goto out_free;
688
689 return genlmsg_reply(msg, info);
690
691out_free:
692 nlmsg_free(msg);
693 return ret;
694}
695
696static int fou_nl_dump(struct sk_buff *skb, struct netlink_callback *cb)
697{
698 struct net *net = sock_net(skb->sk);
699 struct fou_net *fn = net_generic(net, fou_net_id);
700 struct fou *fout;
701 int idx = 0, ret;
702
703 mutex_lock(&fn->fou_lock);
704 list_for_each_entry(fout, &fn->fou_list, list) {
705 if (idx++ < cb->args[0])
706 continue;
707 ret = fou_dump_info(fout, NETLINK_CB(cb->skb).portid,
708 cb->nlh->nlmsg_seq, NLM_F_MULTI,
709 skb, FOU_CMD_GET);
710 if (ret)
540207ae 711 break;
7a6c8c34
WC
712 }
713 mutex_unlock(&fn->fou_lock);
714
7a6c8c34
WC
715 cb->args[0] = idx;
716 return skb->len;
717}
718
23461551
TH
719static const struct genl_ops fou_nl_ops[] = {
720 {
721 .cmd = FOU_CMD_ADD,
722 .doit = fou_nl_cmd_add_port,
723 .policy = fou_nl_policy,
724 .flags = GENL_ADMIN_PERM,
725 },
726 {
727 .cmd = FOU_CMD_DEL,
728 .doit = fou_nl_cmd_rm_port,
729 .policy = fou_nl_policy,
730 .flags = GENL_ADMIN_PERM,
731 },
7a6c8c34
WC
732 {
733 .cmd = FOU_CMD_GET,
734 .doit = fou_nl_cmd_get_port,
735 .dumpit = fou_nl_dump,
736 .policy = fou_nl_policy,
737 },
23461551
TH
738};
739
a8c5f90f
TH
740size_t fou_encap_hlen(struct ip_tunnel_encap *e)
741{
742 return sizeof(struct udphdr);
743}
744EXPORT_SYMBOL(fou_encap_hlen);
745
746size_t gue_encap_hlen(struct ip_tunnel_encap *e)
747{
748 size_t len;
749 bool need_priv = false;
750
751 len = sizeof(struct udphdr) + sizeof(struct guehdr);
752
753 if (e->flags & TUNNEL_ENCAP_FLAG_REMCSUM) {
754 len += GUE_PLEN_REMCSUM;
755 need_priv = true;
756 }
757
758 len += need_priv ? GUE_LEN_PRIV : 0;
759
760 return len;
761}
762EXPORT_SYMBOL(gue_encap_hlen);
763
63487bab
TH
764static void fou_build_udp(struct sk_buff *skb, struct ip_tunnel_encap *e,
765 struct flowi4 *fl4, u8 *protocol, __be16 sport)
766{
767 struct udphdr *uh;
768
769 skb_push(skb, sizeof(struct udphdr));
770 skb_reset_transport_header(skb);
771
772 uh = udp_hdr(skb);
773
774 uh->dest = e->dport;
775 uh->source = sport;
776 uh->len = htons(skb->len);
63487bab
TH
777 udp_set_csum(!(e->flags & TUNNEL_ENCAP_FLAG_CSUM), skb,
778 fl4->saddr, fl4->daddr, skb->len);
779
780 *protocol = IPPROTO_UDP;
781}
782
783int fou_build_header(struct sk_buff *skb, struct ip_tunnel_encap *e,
784 u8 *protocol, struct flowi4 *fl4)
785{
06f62292
EC
786 int type = e->flags & TUNNEL_ENCAP_FLAG_CSUM ? SKB_GSO_UDP_TUNNEL_CSUM :
787 SKB_GSO_UDP_TUNNEL;
63487bab 788 __be16 sport;
aed069df 789 int err;
63487bab 790
aed069df
AD
791 err = iptunnel_handle_offloads(skb, type);
792 if (err)
793 return err;
63487bab
TH
794
795 sport = e->sport ? : udp_flow_src_port(dev_net(skb->dev),
796 skb, 0, 0, false);
797 fou_build_udp(skb, e, fl4, protocol, sport);
798
799 return 0;
800}
801EXPORT_SYMBOL(fou_build_header);
802
803int gue_build_header(struct sk_buff *skb, struct ip_tunnel_encap *e,
804 u8 *protocol, struct flowi4 *fl4)
805{
06f62292
EC
806 int type = e->flags & TUNNEL_ENCAP_FLAG_CSUM ? SKB_GSO_UDP_TUNNEL_CSUM :
807 SKB_GSO_UDP_TUNNEL;
63487bab 808 struct guehdr *guehdr;
b17f709a 809 size_t hdrlen, optlen = 0;
63487bab 810 __be16 sport;
5024c33a
TH
811 void *data;
812 bool need_priv = false;
aed069df 813 int err;
5024c33a 814
b17f709a
TH
815 if ((e->flags & TUNNEL_ENCAP_FLAG_REMCSUM) &&
816 skb->ip_summed == CHECKSUM_PARTIAL) {
b17f709a
TH
817 optlen += GUE_PLEN_REMCSUM;
818 type |= SKB_GSO_TUNNEL_REMCSUM;
819 need_priv = true;
820 }
821
5024c33a 822 optlen += need_priv ? GUE_LEN_PRIV : 0;
63487bab 823
aed069df
AD
824 err = iptunnel_handle_offloads(skb, type);
825 if (err)
826 return err;
63487bab
TH
827
828 /* Get source port (based on flow hash) before skb_push */
829 sport = e->sport ? : udp_flow_src_port(dev_net(skb->dev),
830 skb, 0, 0, false);
831
b17f709a
TH
832 hdrlen = sizeof(struct guehdr) + optlen;
833
834 skb_push(skb, hdrlen);
63487bab
TH
835
836 guehdr = (struct guehdr *)skb->data;
837
5024c33a 838 guehdr->control = 0;
63487bab 839 guehdr->version = 0;
5024c33a 840 guehdr->hlen = optlen >> 2;
63487bab 841 guehdr->flags = 0;
5024c33a
TH
842 guehdr->proto_ctype = *protocol;
843
844 data = &guehdr[1];
845
846 if (need_priv) {
847 __be32 *flags = data;
848
849 guehdr->flags |= GUE_FLAG_PRIV;
850 *flags = 0;
851 data += GUE_LEN_PRIV;
852
b17f709a
TH
853 if (type & SKB_GSO_TUNNEL_REMCSUM) {
854 u16 csum_start = skb_checksum_start_offset(skb);
855 __be16 *pd = data;
856
857 if (csum_start < hdrlen)
858 return -EINVAL;
859
860 csum_start -= hdrlen;
861 pd[0] = htons(csum_start);
862 pd[1] = htons(csum_start + skb->csum_offset);
863
864 if (!skb_is_gso(skb)) {
865 skb->ip_summed = CHECKSUM_NONE;
866 skb->encapsulation = 0;
867 }
868
869 *flags |= GUE_PFLAG_REMCSUM;
870 data += GUE_PLEN_REMCSUM;
871 }
872
5024c33a 873 }
63487bab
TH
874
875 fou_build_udp(skb, e, fl4, protocol, sport);
876
877 return 0;
878}
879EXPORT_SYMBOL(gue_build_header);
880
a8c5f90f
TH
881#ifdef CONFIG_NET_FOU_IP_TUNNELS
882
5eeb2922 883static const struct ip_tunnel_encap_ops fou_iptun_ops = {
a8c5f90f
TH
884 .encap_hlen = fou_encap_hlen,
885 .build_header = fou_build_header,
886};
887
5eeb2922 888static const struct ip_tunnel_encap_ops gue_iptun_ops = {
a8c5f90f
TH
889 .encap_hlen = gue_encap_hlen,
890 .build_header = gue_build_header,
891};
892
893static int ip_tunnel_encap_add_fou_ops(void)
894{
895 int ret;
896
897 ret = ip_tunnel_encap_add_ops(&fou_iptun_ops, TUNNEL_ENCAP_FOU);
898 if (ret < 0) {
899 pr_err("can't add fou ops\n");
900 return ret;
901 }
902
903 ret = ip_tunnel_encap_add_ops(&gue_iptun_ops, TUNNEL_ENCAP_GUE);
904 if (ret < 0) {
905 pr_err("can't add gue ops\n");
906 ip_tunnel_encap_del_ops(&fou_iptun_ops, TUNNEL_ENCAP_FOU);
907 return ret;
908 }
909
910 return 0;
911}
912
913static void ip_tunnel_encap_del_fou_ops(void)
914{
915 ip_tunnel_encap_del_ops(&fou_iptun_ops, TUNNEL_ENCAP_FOU);
916 ip_tunnel_encap_del_ops(&gue_iptun_ops, TUNNEL_ENCAP_GUE);
917}
918
919#else
920
921static int ip_tunnel_encap_add_fou_ops(void)
922{
923 return 0;
924}
925
882288c0 926static void ip_tunnel_encap_del_fou_ops(void)
a8c5f90f
TH
927{
928}
929
930#endif
931
02d793c5
WC
932static __net_init int fou_init_net(struct net *net)
933{
934 struct fou_net *fn = net_generic(net, fou_net_id);
935
936 INIT_LIST_HEAD(&fn->fou_list);
937 mutex_init(&fn->fou_lock);
938 return 0;
939}
940
941static __net_exit void fou_exit_net(struct net *net)
942{
943 struct fou_net *fn = net_generic(net, fou_net_id);
944 struct fou *fou, *next;
945
946 /* Close all the FOU sockets */
947 mutex_lock(&fn->fou_lock);
948 list_for_each_entry_safe(fou, next, &fn->fou_list, list)
949 fou_release(fou);
950 mutex_unlock(&fn->fou_lock);
951}
952
953static struct pernet_operations fou_net_ops = {
954 .init = fou_init_net,
955 .exit = fou_exit_net,
956 .id = &fou_net_id,
957 .size = sizeof(struct fou_net),
958};
959
23461551
TH
960static int __init fou_init(void)
961{
962 int ret;
963
02d793c5
WC
964 ret = register_pernet_device(&fou_net_ops);
965 if (ret)
966 goto exit;
967
23461551
TH
968 ret = genl_register_family_with_ops(&fou_nl_family,
969 fou_nl_ops);
a8c5f90f 970 if (ret < 0)
02d793c5 971 goto unregister;
a8c5f90f
TH
972
973 ret = ip_tunnel_encap_add_fou_ops();
02d793c5
WC
974 if (ret == 0)
975 return 0;
a8c5f90f 976
02d793c5
WC
977 genl_unregister_family(&fou_nl_family);
978unregister:
979 unregister_pernet_device(&fou_net_ops);
a8c5f90f 980exit:
23461551
TH
981 return ret;
982}
983
984static void __exit fou_fini(void)
985{
a8c5f90f 986 ip_tunnel_encap_del_fou_ops();
23461551 987 genl_unregister_family(&fou_nl_family);
02d793c5 988 unregister_pernet_device(&fou_net_ops);
23461551
TH
989}
990
991module_init(fou_init);
992module_exit(fou_fini);
993MODULE_AUTHOR("Tom Herbert <therbert@google.com>");
994MODULE_LICENSE("GPL");