Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v6.16-rc4 411 lines 13 kB view raw
1/* SPDX-License-Identifier: GPL-2.0 */ 2#ifndef __NET_UDP_TUNNEL_H 3#define __NET_UDP_TUNNEL_H 4 5#include <net/ip_tunnels.h> 6#include <net/udp.h> 7 8#if IS_ENABLED(CONFIG_IPV6) 9#include <net/ipv6.h> 10#include <net/ipv6_stubs.h> 11#endif 12 13struct udp_port_cfg { 14 u8 family; 15 16 /* Used only for kernel-created sockets */ 17 union { 18 struct in_addr local_ip; 19#if IS_ENABLED(CONFIG_IPV6) 20 struct in6_addr local_ip6; 21#endif 22 }; 23 24 union { 25 struct in_addr peer_ip; 26#if IS_ENABLED(CONFIG_IPV6) 27 struct in6_addr peer_ip6; 28#endif 29 }; 30 31 __be16 local_udp_port; 32 __be16 peer_udp_port; 33 int bind_ifindex; 34 unsigned int use_udp_checksums:1, 35 use_udp6_tx_checksums:1, 36 use_udp6_rx_checksums:1, 37 ipv6_v6only:1; 38}; 39 40int udp_sock_create4(struct net *net, struct udp_port_cfg *cfg, 41 struct socket **sockp); 42 43#if IS_ENABLED(CONFIG_IPV6) 44int udp_sock_create6(struct net *net, struct udp_port_cfg *cfg, 45 struct socket **sockp); 46#else 47static inline int udp_sock_create6(struct net *net, struct udp_port_cfg *cfg, 48 struct socket **sockp) 49{ 50 return 0; 51} 52#endif 53 54static inline int udp_sock_create(struct net *net, 55 struct udp_port_cfg *cfg, 56 struct socket **sockp) 57{ 58 if (cfg->family == AF_INET) 59 return udp_sock_create4(net, cfg, sockp); 60 61 if (cfg->family == AF_INET6) 62 return udp_sock_create6(net, cfg, sockp); 63 64 return -EPFNOSUPPORT; 65} 66 67typedef int (*udp_tunnel_encap_rcv_t)(struct sock *sk, struct sk_buff *skb); 68typedef int (*udp_tunnel_encap_err_lookup_t)(struct sock *sk, 69 struct sk_buff *skb); 70typedef void (*udp_tunnel_encap_err_rcv_t)(struct sock *sk, 71 struct sk_buff *skb, int err, 72 __be16 port, u32 info, u8 *payload); 73typedef void (*udp_tunnel_encap_destroy_t)(struct sock *sk); 74typedef struct sk_buff *(*udp_tunnel_gro_receive_t)(struct sock *sk, 75 struct list_head *head, 76 struct sk_buff *skb); 77typedef int (*udp_tunnel_gro_complete_t)(struct sock *sk, struct sk_buff *skb, 78 int nhoff); 79 80struct udp_tunnel_sock_cfg { 81 void *sk_user_data; /* user data used by encap_rcv call back */ 82 /* Used for setting up udp_sock fields, see udp.h for details */ 83 __u8 encap_type; 84 udp_tunnel_encap_rcv_t encap_rcv; 85 udp_tunnel_encap_err_lookup_t encap_err_lookup; 86 udp_tunnel_encap_err_rcv_t encap_err_rcv; 87 udp_tunnel_encap_destroy_t encap_destroy; 88 udp_tunnel_gro_receive_t gro_receive; 89 udp_tunnel_gro_complete_t gro_complete; 90}; 91 92/* Setup the given (UDP) sock to receive UDP encapsulated packets */ 93void setup_udp_tunnel_sock(struct net *net, struct socket *sock, 94 struct udp_tunnel_sock_cfg *sock_cfg); 95 96/* -- List of parsable UDP tunnel types -- 97 * 98 * Adding to this list will result in serious debate. The main issue is 99 * that this list is essentially a list of workarounds for either poorly 100 * designed tunnels, or poorly designed device offloads. 101 * 102 * The parsing supported via these types should really be used for Rx 103 * traffic only as the network stack will have already inserted offsets for 104 * the location of the headers in the skb. In addition any ports that are 105 * pushed should be kept within the namespace without leaking to other 106 * devices such as VFs or other ports on the same device. 107 * 108 * It is strongly encouraged to use CHECKSUM_COMPLETE for Rx to avoid the 109 * need to use this for Rx checksum offload. It should not be necessary to 110 * call this function to perform Tx offloads on outgoing traffic. 111 */ 112enum udp_parsable_tunnel_type { 113 UDP_TUNNEL_TYPE_VXLAN = BIT(0), /* RFC 7348 */ 114 UDP_TUNNEL_TYPE_GENEVE = BIT(1), /* draft-ietf-nvo3-geneve */ 115 UDP_TUNNEL_TYPE_VXLAN_GPE = BIT(2), /* draft-ietf-nvo3-vxlan-gpe */ 116}; 117 118struct udp_tunnel_info { 119 unsigned short type; 120 sa_family_t sa_family; 121 __be16 port; 122 u8 hw_priv; 123}; 124 125/* Notify network devices of offloadable types */ 126void udp_tunnel_push_rx_port(struct net_device *dev, struct socket *sock, 127 unsigned short type); 128void udp_tunnel_drop_rx_port(struct net_device *dev, struct socket *sock, 129 unsigned short type); 130void udp_tunnel_notify_add_rx_port(struct socket *sock, unsigned short type); 131void udp_tunnel_notify_del_rx_port(struct socket *sock, unsigned short type); 132 133static inline void udp_tunnel_get_rx_info(struct net_device *dev) 134{ 135 ASSERT_RTNL(); 136 if (!(dev->features & NETIF_F_RX_UDP_TUNNEL_PORT)) 137 return; 138 call_netdevice_notifiers(NETDEV_UDP_TUNNEL_PUSH_INFO, dev); 139} 140 141static inline void udp_tunnel_drop_rx_info(struct net_device *dev) 142{ 143 ASSERT_RTNL(); 144 if (!(dev->features & NETIF_F_RX_UDP_TUNNEL_PORT)) 145 return; 146 call_netdevice_notifiers(NETDEV_UDP_TUNNEL_DROP_INFO, dev); 147} 148 149/* Transmit the skb using UDP encapsulation. */ 150void udp_tunnel_xmit_skb(struct rtable *rt, struct sock *sk, struct sk_buff *skb, 151 __be32 src, __be32 dst, __u8 tos, __u8 ttl, 152 __be16 df, __be16 src_port, __be16 dst_port, 153 bool xnet, bool nocheck); 154 155int udp_tunnel6_xmit_skb(struct dst_entry *dst, struct sock *sk, 156 struct sk_buff *skb, 157 struct net_device *dev, 158 const struct in6_addr *saddr, 159 const struct in6_addr *daddr, 160 __u8 prio, __u8 ttl, __be32 label, 161 __be16 src_port, __be16 dst_port, bool nocheck); 162 163void udp_tunnel_sock_release(struct socket *sock); 164 165struct rtable *udp_tunnel_dst_lookup(struct sk_buff *skb, 166 struct net_device *dev, 167 struct net *net, int oif, 168 __be32 *saddr, 169 const struct ip_tunnel_key *key, 170 __be16 sport, __be16 dport, u8 tos, 171 struct dst_cache *dst_cache); 172struct dst_entry *udp_tunnel6_dst_lookup(struct sk_buff *skb, 173 struct net_device *dev, 174 struct net *net, 175 struct socket *sock, int oif, 176 struct in6_addr *saddr, 177 const struct ip_tunnel_key *key, 178 __be16 sport, __be16 dport, u8 dsfield, 179 struct dst_cache *dst_cache); 180 181struct metadata_dst *udp_tun_rx_dst(struct sk_buff *skb, unsigned short family, 182 const unsigned long *flags, 183 __be64 tunnel_id, int md_size); 184 185#ifdef CONFIG_INET 186static inline int udp_tunnel_handle_offloads(struct sk_buff *skb, bool udp_csum) 187{ 188 int type = udp_csum ? SKB_GSO_UDP_TUNNEL_CSUM : SKB_GSO_UDP_TUNNEL; 189 190 return iptunnel_handle_offloads(skb, type); 191} 192#endif 193 194#if IS_ENABLED(CONFIG_NET_UDP_TUNNEL) 195void udp_tunnel_update_gro_lookup(struct net *net, struct sock *sk, bool add); 196void udp_tunnel_update_gro_rcv(struct sock *sk, bool add); 197#else 198static inline void udp_tunnel_update_gro_lookup(struct net *net, 199 struct sock *sk, bool add) {} 200static inline void udp_tunnel_update_gro_rcv(struct sock *sk, bool add) {} 201#endif 202 203static inline void udp_tunnel_cleanup_gro(struct sock *sk) 204{ 205 udp_tunnel_update_gro_rcv(sk, false); 206 udp_tunnel_update_gro_lookup(sock_net(sk), sk, false); 207} 208 209static inline void udp_tunnel_encap_enable(struct sock *sk) 210{ 211 if (udp_test_and_set_bit(ENCAP_ENABLED, sk)) 212 return; 213 214#if IS_ENABLED(CONFIG_IPV6) 215 if (READ_ONCE(sk->sk_family) == PF_INET6) 216 ipv6_stub->udpv6_encap_enable(); 217#endif 218 udp_encap_enable(); 219} 220 221#define UDP_TUNNEL_NIC_MAX_TABLES 4 222 223enum udp_tunnel_nic_info_flags { 224 /* Device callbacks may sleep */ 225 UDP_TUNNEL_NIC_INFO_MAY_SLEEP = BIT(0), 226 /* Device only supports offloads when it's open, all ports 227 * will be removed before close and re-added after open. 228 */ 229 UDP_TUNNEL_NIC_INFO_OPEN_ONLY = BIT(1), 230 /* Device supports only IPv4 tunnels */ 231 UDP_TUNNEL_NIC_INFO_IPV4_ONLY = BIT(2), 232 /* Device has hard-coded the IANA VXLAN port (4789) as VXLAN. 233 * This port must not be counted towards n_entries of any table. 234 * Driver will not receive any callback associated with port 4789. 235 */ 236 UDP_TUNNEL_NIC_INFO_STATIC_IANA_VXLAN = BIT(3), 237}; 238 239struct udp_tunnel_nic; 240 241#define UDP_TUNNEL_NIC_MAX_SHARING_DEVICES (U16_MAX / 2) 242 243struct udp_tunnel_nic_shared { 244 struct udp_tunnel_nic *udp_tunnel_nic_info; 245 246 struct list_head devices; 247}; 248 249struct udp_tunnel_nic_shared_node { 250 struct net_device *dev; 251 struct list_head list; 252}; 253 254/** 255 * struct udp_tunnel_nic_info - driver UDP tunnel offload information 256 * @set_port: callback for adding a new port 257 * @unset_port: callback for removing a port 258 * @sync_table: callback for syncing the entire port table at once 259 * @shared: reference to device global state (optional) 260 * @flags: device flags from enum udp_tunnel_nic_info_flags 261 * @tables: UDP port tables this device has 262 * @tables.n_entries: number of entries in this table 263 * @tables.tunnel_types: types of tunnels this table accepts 264 * 265 * Drivers are expected to provide either @set_port and @unset_port callbacks 266 * or the @sync_table callback. Callbacks are invoked with rtnl lock held. 267 * 268 * Devices which (misguidedly) share the UDP tunnel port table across multiple 269 * netdevs should allocate an instance of struct udp_tunnel_nic_shared and 270 * point @shared at it. 271 * There must never be more than %UDP_TUNNEL_NIC_MAX_SHARING_DEVICES devices 272 * sharing a table. 273 * 274 * Known limitations: 275 * - UDP tunnel port notifications are fundamentally best-effort - 276 * it is likely the driver will both see skbs which use a UDP tunnel port, 277 * while not being a tunneled skb, and tunnel skbs from other ports - 278 * drivers should only use these ports for non-critical RX-side offloads, 279 * e.g. the checksum offload; 280 * - none of the devices care about the socket family at present, so we don't 281 * track it. Please extend this code if you care. 282 */ 283struct udp_tunnel_nic_info { 284 /* one-by-one */ 285 int (*set_port)(struct net_device *dev, 286 unsigned int table, unsigned int entry, 287 struct udp_tunnel_info *ti); 288 int (*unset_port)(struct net_device *dev, 289 unsigned int table, unsigned int entry, 290 struct udp_tunnel_info *ti); 291 292 /* all at once */ 293 int (*sync_table)(struct net_device *dev, unsigned int table); 294 295 struct udp_tunnel_nic_shared *shared; 296 297 unsigned int flags; 298 299 struct udp_tunnel_nic_table_info { 300 unsigned int n_entries; 301 unsigned int tunnel_types; 302 } tables[UDP_TUNNEL_NIC_MAX_TABLES]; 303}; 304 305/* UDP tunnel module dependencies 306 * 307 * Tunnel drivers are expected to have a hard dependency on the udp_tunnel 308 * module. NIC drivers are not, they just attach their 309 * struct udp_tunnel_nic_info to the netdev and wait for callbacks to come. 310 * Loading a tunnel driver will cause the udp_tunnel module to be loaded 311 * and only then will all the required state structures be allocated. 312 * Since we want a weak dependency from the drivers and the core to udp_tunnel 313 * we call things through the following stubs. 314 */ 315struct udp_tunnel_nic_ops { 316 void (*get_port)(struct net_device *dev, unsigned int table, 317 unsigned int idx, struct udp_tunnel_info *ti); 318 void (*set_port_priv)(struct net_device *dev, unsigned int table, 319 unsigned int idx, u8 priv); 320 void (*add_port)(struct net_device *dev, struct udp_tunnel_info *ti); 321 void (*del_port)(struct net_device *dev, struct udp_tunnel_info *ti); 322 void (*reset_ntf)(struct net_device *dev); 323 324 size_t (*dump_size)(struct net_device *dev, unsigned int table); 325 int (*dump_write)(struct net_device *dev, unsigned int table, 326 struct sk_buff *skb); 327}; 328 329#ifdef CONFIG_INET 330extern const struct udp_tunnel_nic_ops *udp_tunnel_nic_ops; 331#else 332#define udp_tunnel_nic_ops ((struct udp_tunnel_nic_ops *)NULL) 333#endif 334 335static inline void 336udp_tunnel_nic_get_port(struct net_device *dev, unsigned int table, 337 unsigned int idx, struct udp_tunnel_info *ti) 338{ 339 /* This helper is used from .sync_table, we indicate empty entries 340 * by zero'ed @ti. Drivers which need to know the details of a port 341 * when it gets deleted should use the .set_port / .unset_port 342 * callbacks. 343 * Zero out here, otherwise !CONFIG_INET causes uninitilized warnings. 344 */ 345 memset(ti, 0, sizeof(*ti)); 346 347 if (udp_tunnel_nic_ops) 348 udp_tunnel_nic_ops->get_port(dev, table, idx, ti); 349} 350 351static inline void 352udp_tunnel_nic_set_port_priv(struct net_device *dev, unsigned int table, 353 unsigned int idx, u8 priv) 354{ 355 if (udp_tunnel_nic_ops) 356 udp_tunnel_nic_ops->set_port_priv(dev, table, idx, priv); 357} 358 359static inline void 360udp_tunnel_nic_add_port(struct net_device *dev, struct udp_tunnel_info *ti) 361{ 362 if (!(dev->features & NETIF_F_RX_UDP_TUNNEL_PORT)) 363 return; 364 if (udp_tunnel_nic_ops) 365 udp_tunnel_nic_ops->add_port(dev, ti); 366} 367 368static inline void 369udp_tunnel_nic_del_port(struct net_device *dev, struct udp_tunnel_info *ti) 370{ 371 if (!(dev->features & NETIF_F_RX_UDP_TUNNEL_PORT)) 372 return; 373 if (udp_tunnel_nic_ops) 374 udp_tunnel_nic_ops->del_port(dev, ti); 375} 376 377/** 378 * udp_tunnel_nic_reset_ntf() - device-originating reset notification 379 * @dev: network interface device structure 380 * 381 * Called by the driver to inform the core that the entire UDP tunnel port 382 * state has been lost, usually due to device reset. Core will assume device 383 * forgot all the ports and issue .set_port and .sync_table callbacks as 384 * necessary. 385 * 386 * This function must be called with rtnl lock held, and will issue all 387 * the callbacks before returning. 388 */ 389static inline void udp_tunnel_nic_reset_ntf(struct net_device *dev) 390{ 391 if (udp_tunnel_nic_ops) 392 udp_tunnel_nic_ops->reset_ntf(dev); 393} 394 395static inline size_t 396udp_tunnel_nic_dump_size(struct net_device *dev, unsigned int table) 397{ 398 if (!udp_tunnel_nic_ops) 399 return 0; 400 return udp_tunnel_nic_ops->dump_size(dev, table); 401} 402 403static inline int 404udp_tunnel_nic_dump_write(struct net_device *dev, unsigned int table, 405 struct sk_buff *skb) 406{ 407 if (!udp_tunnel_nic_ops) 408 return 0; 409 return udp_tunnel_nic_ops->dump_write(dev, table, skb); 410} 411#endif