blob: a1b9bfc9de6e33266bef37e77c711fbf048a6282 [file] [log] [blame]
b.liue9582032025-04-17 19:18:16 +08001// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Bridge per vlan tunnel port dst_metadata handling code
4 *
5 * Authors:
6 * Roopa Prabhu <roopa@cumulusnetworks.com>
7 */
8
9#include <linux/kernel.h>
10#include <linux/netdevice.h>
11#include <linux/rtnetlink.h>
12#include <linux/slab.h>
13#include <net/switchdev.h>
14#include <net/dst_metadata.h>
15
16#include "br_private.h"
17#include "br_private_tunnel.h"
18#include "br_private_offload.h"
19
20static inline int br_vlan_tunid_cmp(struct rhashtable_compare_arg *arg,
21 const void *ptr)
22{
23 const struct net_bridge_vlan *vle = ptr;
24 __be64 tunid = *(__be64 *)arg->key;
25
26 return vle->tinfo.tunnel_id != tunid;
27}
28
29static const struct rhashtable_params br_vlan_tunnel_rht_params = {
30 .head_offset = offsetof(struct net_bridge_vlan, tnode),
31 .key_offset = offsetof(struct net_bridge_vlan, tinfo.tunnel_id),
32 .key_len = sizeof(__be64),
33 .nelem_hint = 3,
34 .obj_cmpfn = br_vlan_tunid_cmp,
35 .automatic_shrinking = true,
36};
37
38static struct net_bridge_vlan *br_vlan_tunnel_lookup(struct rhashtable *tbl,
39 u64 tunnel_id)
40{
41 return rhashtable_lookup_fast(tbl, &tunnel_id,
42 br_vlan_tunnel_rht_params);
43}
44
45static void vlan_tunnel_info_release(struct net_bridge_vlan *vlan)
46{
47 struct metadata_dst *tdst = rtnl_dereference(vlan->tinfo.tunnel_dst);
48
49 WRITE_ONCE(vlan->tinfo.tunnel_id, 0);
50 RCU_INIT_POINTER(vlan->tinfo.tunnel_dst, NULL);
51 dst_release(&tdst->dst);
52}
53
54void vlan_tunnel_info_del(struct net_bridge_vlan_group *vg,
55 struct net_bridge_vlan *vlan)
56{
57 if (!rcu_access_pointer(vlan->tinfo.tunnel_dst))
58 return;
59 rhashtable_remove_fast(&vg->tunnel_hash, &vlan->tnode,
60 br_vlan_tunnel_rht_params);
61 vlan_tunnel_info_release(vlan);
62}
63
64static int __vlan_tunnel_info_add(struct net_bridge_vlan_group *vg,
65 struct net_bridge_vlan *vlan, u32 tun_id)
66{
67 struct metadata_dst *metadata = rtnl_dereference(vlan->tinfo.tunnel_dst);
68 __be64 key = key32_to_tunnel_id(cpu_to_be32(tun_id));
69 int err;
70
71 if (metadata)
72 return -EEXIST;
73
74 metadata = __ip_tun_set_dst(0, 0, 0, 0, 0, TUNNEL_KEY,
75 key, 0);
76 if (!metadata)
77 return -EINVAL;
78
79 metadata->u.tun_info.mode |= IP_TUNNEL_INFO_TX | IP_TUNNEL_INFO_BRIDGE;
80 rcu_assign_pointer(vlan->tinfo.tunnel_dst, metadata);
81 WRITE_ONCE(vlan->tinfo.tunnel_id, key);
82
83 err = rhashtable_lookup_insert_fast(&vg->tunnel_hash, &vlan->tnode,
84 br_vlan_tunnel_rht_params);
85 if (err)
86 goto out;
87
88 return 0;
89out:
90 vlan_tunnel_info_release(vlan);
91
92 return err;
93}
94
95/* Must be protected by RTNL.
96 * Must be called with vid in range from 1 to 4094 inclusive.
97 */
98int nbp_vlan_tunnel_info_add(struct net_bridge_port *port, u16 vid, u32 tun_id)
99{
100 struct net_bridge_vlan_group *vg;
101 struct net_bridge_vlan *vlan;
102
103 ASSERT_RTNL();
104
105 vg = nbp_vlan_group(port);
106 vlan = br_vlan_find(vg, vid);
107 if (!vlan)
108 return -EINVAL;
109
110 return __vlan_tunnel_info_add(vg, vlan, tun_id);
111}
112
113/* Must be protected by RTNL.
114 * Must be called with vid in range from 1 to 4094 inclusive.
115 */
116int nbp_vlan_tunnel_info_delete(struct net_bridge_port *port, u16 vid)
117{
118 struct net_bridge_vlan_group *vg;
119 struct net_bridge_vlan *v;
120
121 ASSERT_RTNL();
122
123 vg = nbp_vlan_group(port);
124 v = br_vlan_find(vg, vid);
125 if (!v)
126 return -ENOENT;
127
128 vlan_tunnel_info_del(vg, v);
129
130 return 0;
131}
132
133static void __vlan_tunnel_info_flush(struct net_bridge_vlan_group *vg)
134{
135 struct net_bridge_vlan *vlan, *tmp;
136
137 list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
138 vlan_tunnel_info_del(vg, vlan);
139}
140
141void nbp_vlan_tunnel_info_flush(struct net_bridge_port *port)
142{
143 struct net_bridge_vlan_group *vg;
144
145 ASSERT_RTNL();
146
147 vg = nbp_vlan_group(port);
148 __vlan_tunnel_info_flush(vg);
149}
150
151int vlan_tunnel_init(struct net_bridge_vlan_group *vg)
152{
153 return rhashtable_init(&vg->tunnel_hash, &br_vlan_tunnel_rht_params);
154}
155
156void vlan_tunnel_deinit(struct net_bridge_vlan_group *vg)
157{
158 rhashtable_destroy(&vg->tunnel_hash);
159}
160
161int br_handle_ingress_vlan_tunnel(struct sk_buff *skb,
162 struct net_bridge_port *p,
163 struct net_bridge_vlan_group *vg)
164{
165 struct ip_tunnel_info *tinfo = skb_tunnel_info(skb);
166 struct net_bridge_vlan *vlan;
167
168 if (!vg || !tinfo)
169 return 0;
170
171 /* if already tagged, ignore */
172 if (skb_vlan_tagged(skb))
173 return 0;
174
175 /* lookup vid, given tunnel id */
176 vlan = br_vlan_tunnel_lookup(&vg->tunnel_hash, tinfo->key.tun_id);
177 if (!vlan)
178 return 0;
179
180 skb_dst_drop(skb);
181
182 __vlan_hwaccel_put_tag(skb, p->br->vlan_proto, vlan->vid);
183 br_offload_skb_disable(skb);
184
185 return 0;
186}
187
188int br_handle_egress_vlan_tunnel(struct sk_buff *skb,
189 struct net_bridge_vlan *vlan)
190{
191 struct metadata_dst *tunnel_dst;
192 __be64 tunnel_id;
193 int err;
194
195 if (!vlan)
196 return 0;
197
198 tunnel_id = READ_ONCE(vlan->tinfo.tunnel_id);
199 if (!tunnel_id || unlikely(!skb_vlan_tag_present(skb)))
200 return 0;
201
202 skb_dst_drop(skb);
203 err = skb_vlan_pop(skb);
204 if (err)
205 return err;
206
207 br_offload_skb_disable(skb);
208 tunnel_dst = rcu_dereference(vlan->tinfo.tunnel_dst);
209 if (tunnel_dst && dst_hold_safe(&tunnel_dst->dst))
210 skb_dst_set(skb, &tunnel_dst->dst);
211
212 return 0;
213}