2019-06-04 16:11:33 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2015-05-14 00:57:30 +08:00
|
|
|
/*
|
|
|
|
* GENEVE: Generic Network Virtualization Encapsulation
|
|
|
|
*
|
|
|
|
* Copyright (c) 2015 Red Hat, Inc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/etherdevice.h>
|
|
|
|
#include <linux/hash.h>
|
2019-03-22 21:06:09 +08:00
|
|
|
#include <net/ipv6_stubs.h>
|
2015-08-27 14:46:52 +08:00
|
|
|
#include <net/dst_metadata.h>
|
2015-08-29 07:54:40 +08:00
|
|
|
#include <net/gro_cells.h>
|
2015-05-14 00:57:30 +08:00
|
|
|
#include <net/rtnetlink.h>
|
|
|
|
#include <net/geneve.h>
|
2015-08-27 14:46:54 +08:00
|
|
|
#include <net/protocol.h>
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
#define GENEVE_NETDEV_VER "0.6"
|
|
|
|
|
|
|
|
#define GENEVE_N_VID (1u << 24)
|
|
|
|
#define GENEVE_VID_MASK (GENEVE_N_VID - 1)
|
|
|
|
|
|
|
|
#define VNI_HASH_BITS 10
|
|
|
|
#define VNI_HASH_SIZE (1<<VNI_HASH_BITS)
|
|
|
|
|
|
|
|
static bool log_ecn_error = true;
|
|
|
|
module_param(log_ecn_error, bool, 0644);
|
|
|
|
MODULE_PARM_DESC(log_ecn_error, "Log packets received with corrupted ECN");
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
#define GENEVE_VER 0
|
|
|
|
#define GENEVE_BASE_HLEN (sizeof(struct udphdr) + sizeof(struct genevehdr))
|
2018-04-19 20:42:30 +08:00
|
|
|
#define GENEVE_IPV4_HLEN (ETH_HLEN + sizeof(struct iphdr) + GENEVE_BASE_HLEN)
|
|
|
|
#define GENEVE_IPV6_HLEN (ETH_HLEN + sizeof(struct ipv6hdr) + GENEVE_BASE_HLEN)
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
/* per-network namespace private data for this module */
|
|
|
|
struct geneve_net {
|
2015-08-27 14:46:54 +08:00
|
|
|
struct list_head geneve_list;
|
|
|
|
struct list_head sock_list;
|
2015-05-14 00:57:30 +08:00
|
|
|
};
|
|
|
|
|
netns: make struct pernet_operations::id unsigned int
Make struct pernet_operations::id unsigned.
There are 2 reasons to do so:
1)
This field is really an index into an zero based array and
thus is unsigned entity. Using negative value is out-of-bound
access by definition.
2)
On x86_64 unsigned 32-bit data which are mixed with pointers
via array indexing or offsets added or subtracted to pointers
are preffered to signed 32-bit data.
"int" being used as an array index needs to be sign-extended
to 64-bit before being used.
void f(long *p, int i)
{
g(p[i]);
}
roughly translates to
movsx rsi, esi
mov rdi, [rsi+...]
call g
MOVSX is 3 byte instruction which isn't necessary if the variable is
unsigned because x86_64 is zero extending by default.
Now, there is net_generic() function which, you guessed it right, uses
"int" as an array index:
static inline void *net_generic(const struct net *net, int id)
{
...
ptr = ng->ptr[id - 1];
...
}
And this function is used a lot, so those sign extensions add up.
Patch snipes ~1730 bytes on allyesconfig kernel (without all junk
messing with code generation):
add/remove: 0/0 grow/shrink: 70/598 up/down: 396/-2126 (-1730)
Unfortunately some functions actually grow bigger.
This is a semmingly random artefact of code generation with register
allocator being used differently. gcc decides that some variable
needs to live in new r8+ registers and every access now requires REX
prefix. Or it is shifted into r12, so [r12+0] addressing mode has to be
used which is longer than [r8]
However, overall balance is in negative direction:
add/remove: 0/0 grow/shrink: 70/598 up/down: 396/-2126 (-1730)
function old new delta
nfsd4_lock 3886 3959 +73
tipc_link_build_proto_msg 1096 1140 +44
mac80211_hwsim_new_radio 2776 2808 +32
tipc_mon_rcv 1032 1058 +26
svcauth_gss_legacy_init 1413 1429 +16
tipc_bcbase_select_primary 379 392 +13
nfsd4_exchange_id 1247 1260 +13
nfsd4_setclientid_confirm 782 793 +11
...
put_client_renew_locked 494 480 -14
ip_set_sockfn_get 730 716 -14
geneve_sock_add 829 813 -16
nfsd4_sequence_done 721 703 -18
nlmclnt_lookup_host 708 686 -22
nfsd4_lockt 1085 1063 -22
nfs_get_client 1077 1050 -27
tcf_bpf_init 1106 1076 -30
nfsd4_encode_fattr 5997 5930 -67
Total: Before=154856051, After=154854321, chg -0.00%
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-11-17 09:58:21 +08:00
|
|
|
static unsigned int geneve_net_id;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2017-07-03 01:00:58 +08:00
|
|
|
struct geneve_dev_node {
|
|
|
|
struct hlist_node hlist;
|
|
|
|
struct geneve_dev *geneve;
|
|
|
|
};
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config {
|
|
|
|
struct ip_tunnel_info info;
|
|
|
|
bool collect_md;
|
|
|
|
bool use_udp6_rx_checksums;
|
|
|
|
bool ttl_inherit;
|
|
|
|
enum ifla_geneve_df df;
|
|
|
|
};
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
/* Pseudo network device */
|
|
|
|
struct geneve_dev {
|
2017-07-03 01:00:58 +08:00
|
|
|
struct geneve_dev_node hlist4; /* vni hash table for IPv4 socket */
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
struct geneve_dev_node hlist6; /* vni hash table for IPv6 socket */
|
|
|
|
#endif
|
2015-05-14 00:57:30 +08:00
|
|
|
struct net *net; /* netns for packet i/o */
|
|
|
|
struct net_device *dev; /* netdev for geneve tunnel */
|
2016-10-29 00:59:16 +08:00
|
|
|
struct geneve_sock __rcu *sock4; /* IPv4 socket used for geneve tunnel */
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-10-29 00:59:16 +08:00
|
|
|
struct geneve_sock __rcu *sock6; /* IPv6 socket used for geneve tunnel */
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
2015-05-14 00:57:30 +08:00
|
|
|
struct list_head next; /* geneve's per namespace list */
|
2015-08-29 07:54:40 +08:00
|
|
|
struct gro_cells gro_cells;
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config cfg;
|
2015-05-14 00:57:30 +08:00
|
|
|
};
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
struct geneve_sock {
|
|
|
|
bool collect_md;
|
|
|
|
struct list_head list;
|
|
|
|
struct socket *sock;
|
|
|
|
struct rcu_head rcu;
|
|
|
|
int refcnt;
|
2015-08-27 14:46:55 +08:00
|
|
|
struct hlist_head vni_list[VNI_HASH_SIZE];
|
2015-08-27 14:46:54 +08:00
|
|
|
};
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
static inline __u32 geneve_net_vni_hash(u8 vni[3])
|
|
|
|
{
|
|
|
|
__u32 vnid;
|
|
|
|
|
|
|
|
vnid = (vni[0] << 16) | (vni[1] << 8) | vni[2];
|
|
|
|
return hash_32(vnid, VNI_HASH_BITS);
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
static __be64 vni_to_tunnel_id(const __u8 *vni)
|
|
|
|
{
|
|
|
|
#ifdef __BIG_ENDIAN
|
|
|
|
return (vni[0] << 16) | (vni[1] << 8) | vni[2];
|
|
|
|
#else
|
|
|
|
return (__force __be64)(((__force u64)vni[0] << 40) |
|
|
|
|
((__force u64)vni[1] << 48) |
|
|
|
|
((__force u64)vni[2] << 56));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
/* Convert 64 bit tunnel ID to 24 bit VNI. */
|
|
|
|
static void tunnel_id_to_vni(__be64 tun_id, __u8 *vni)
|
|
|
|
{
|
|
|
|
#ifdef __BIG_ENDIAN
|
|
|
|
vni[0] = (__force __u8)(tun_id >> 16);
|
|
|
|
vni[1] = (__force __u8)(tun_id >> 8);
|
|
|
|
vni[2] = (__force __u8)tun_id;
|
|
|
|
#else
|
|
|
|
vni[0] = (__force __u8)((__force u64)tun_id >> 40);
|
|
|
|
vni[1] = (__force __u8)((__force u64)tun_id >> 48);
|
|
|
|
vni[2] = (__force __u8)((__force u64)tun_id >> 56);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-11-22 03:03:01 +08:00
|
|
|
static bool eq_tun_id_and_vni(u8 *tun_id, u8 *vni)
|
|
|
|
{
|
|
|
|
return !memcmp(vni, &tun_id[5], 3);
|
|
|
|
}
|
|
|
|
|
2016-02-18 18:22:49 +08:00
|
|
|
static sa_family_t geneve_get_sk_family(struct geneve_sock *gs)
|
|
|
|
{
|
|
|
|
return gs->sock->sk->sk_family;
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:55 +08:00
|
|
|
static struct geneve_dev *geneve_lookup(struct geneve_sock *gs,
|
2015-08-27 14:46:54 +08:00
|
|
|
__be32 addr, u8 vni[])
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
|
|
|
struct hlist_head *vni_list_head;
|
2017-07-03 01:00:58 +08:00
|
|
|
struct geneve_dev_node *node;
|
2015-05-14 00:57:30 +08:00
|
|
|
__u32 hash;
|
|
|
|
|
|
|
|
/* Find the device for this VNI */
|
2015-08-27 14:46:54 +08:00
|
|
|
hash = geneve_net_vni_hash(vni);
|
2015-08-27 14:46:55 +08:00
|
|
|
vni_list_head = &gs->vni_list[hash];
|
2017-07-03 01:00:58 +08:00
|
|
|
hlist_for_each_entry_rcu(node, vni_list_head, hlist) {
|
2020-07-06 23:18:08 +08:00
|
|
|
if (eq_tun_id_and_vni((u8 *)&node->geneve->cfg.info.key.tun_id, vni) &&
|
|
|
|
addr == node->geneve->cfg.info.key.u.ipv4.dst)
|
2017-07-03 01:00:58 +08:00
|
|
|
return node->geneve;
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
static struct geneve_dev *geneve6_lookup(struct geneve_sock *gs,
|
|
|
|
struct in6_addr addr6, u8 vni[])
|
|
|
|
{
|
|
|
|
struct hlist_head *vni_list_head;
|
2017-07-03 01:00:58 +08:00
|
|
|
struct geneve_dev_node *node;
|
2015-10-27 05:01:44 +08:00
|
|
|
__u32 hash;
|
|
|
|
|
|
|
|
/* Find the device for this VNI */
|
|
|
|
hash = geneve_net_vni_hash(vni);
|
|
|
|
vni_list_head = &gs->vni_list[hash];
|
2017-07-03 01:00:58 +08:00
|
|
|
hlist_for_each_entry_rcu(node, vni_list_head, hlist) {
|
2020-07-06 23:18:08 +08:00
|
|
|
if (eq_tun_id_and_vni((u8 *)&node->geneve->cfg.info.key.tun_id, vni) &&
|
|
|
|
ipv6_addr_equal(&addr6, &node->geneve->cfg.info.key.u.ipv6.dst))
|
2017-07-03 01:00:58 +08:00
|
|
|
return node->geneve;
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
2015-08-27 14:46:52 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
2015-08-27 14:46:52 +08:00
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
static inline struct genevehdr *geneve_hdr(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return (struct genevehdr *)(udp_hdr(skb) + 1);
|
|
|
|
}
|
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
static struct geneve_dev *geneve_lookup_skb(struct geneve_sock *gs,
|
|
|
|
struct sk_buff *skb)
|
2015-08-27 14:46:52 +08:00
|
|
|
{
|
2015-10-27 05:01:44 +08:00
|
|
|
static u8 zero_vni[3];
|
2016-11-22 03:02:58 +08:00
|
|
|
u8 *vni;
|
2015-08-27 14:46:52 +08:00
|
|
|
|
2016-02-18 18:22:49 +08:00
|
|
|
if (geneve_get_sk_family(gs) == AF_INET) {
|
2016-02-18 18:22:50 +08:00
|
|
|
struct iphdr *iph;
|
2016-11-22 03:02:58 +08:00
|
|
|
__be32 addr;
|
2016-02-18 18:22:50 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
iph = ip_hdr(skb); /* outer IP header... */
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
if (gs->collect_md) {
|
|
|
|
vni = zero_vni;
|
|
|
|
addr = 0;
|
|
|
|
} else {
|
2016-02-18 18:22:50 +08:00
|
|
|
vni = geneve_hdr(skb)->vni;
|
2015-10-27 05:01:44 +08:00
|
|
|
addr = iph->saddr;
|
|
|
|
}
|
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
return geneve_lookup(gs, addr, vni);
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-02-18 18:22:49 +08:00
|
|
|
} else if (geneve_get_sk_family(gs) == AF_INET6) {
|
2016-11-22 03:02:58 +08:00
|
|
|
static struct in6_addr zero_addr6;
|
2016-02-18 18:22:50 +08:00
|
|
|
struct ipv6hdr *ip6h;
|
|
|
|
struct in6_addr addr6;
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
ip6h = ipv6_hdr(skb); /* outer IPv6 header... */
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
if (gs->collect_md) {
|
|
|
|
vni = zero_vni;
|
|
|
|
addr6 = zero_addr6;
|
|
|
|
} else {
|
2016-02-18 18:22:50 +08:00
|
|
|
vni = geneve_hdr(skb)->vni;
|
2015-10-27 05:01:44 +08:00
|
|
|
addr6 = ip6h->saddr;
|
|
|
|
}
|
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
return geneve6_lookup(gs, addr6, vni);
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
|
|
|
}
|
2016-02-18 18:22:50 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* geneve receive/decap routine */
|
|
|
|
static void geneve_rx(struct geneve_dev *geneve, struct geneve_sock *gs,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct genevehdr *gnvh = geneve_hdr(skb);
|
|
|
|
struct metadata_dst *tun_dst = NULL;
|
|
|
|
struct pcpu_sw_netstats *stats;
|
2017-06-09 08:07:48 +08:00
|
|
|
unsigned int len;
|
2016-02-18 18:22:50 +08:00
|
|
|
int err = 0;
|
|
|
|
void *oiph;
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
if (ip_tunnel_collect_metadata() || gs->collect_md) {
|
2015-08-27 14:46:52 +08:00
|
|
|
__be16 flags;
|
|
|
|
|
|
|
|
flags = TUNNEL_KEY | TUNNEL_GENEVE_OPT |
|
|
|
|
(gnvh->oam ? TUNNEL_OAM : 0) |
|
|
|
|
(gnvh->critical ? TUNNEL_CRIT_OPT : 0);
|
|
|
|
|
2016-02-18 18:22:49 +08:00
|
|
|
tun_dst = udp_tun_rx_dst(skb, geneve_get_sk_family(gs), flags,
|
2015-08-27 14:46:52 +08:00
|
|
|
vni_to_tunnel_id(gnvh->vni),
|
|
|
|
gnvh->opt_len * 4);
|
2017-06-09 08:07:48 +08:00
|
|
|
if (!tun_dst) {
|
|
|
|
geneve->dev->stats.rx_dropped++;
|
2015-08-27 14:46:52 +08:00
|
|
|
goto drop;
|
2017-06-09 08:07:48 +08:00
|
|
|
}
|
2015-08-27 14:46:52 +08:00
|
|
|
/* Update tunnel dst according to Geneve options. */
|
2015-08-31 09:09:38 +08:00
|
|
|
ip_tunnel_info_opts_set(&tun_dst->u.tun_info,
|
2018-06-27 12:39:36 +08:00
|
|
|
gnvh->options, gnvh->opt_len * 4,
|
|
|
|
TUNNEL_GENEVE_OPT);
|
2015-08-27 14:46:52 +08:00
|
|
|
} else {
|
|
|
|
/* Drop packets w/ critical options,
|
|
|
|
* since we don't support any...
|
|
|
|
*/
|
2017-06-09 08:07:48 +08:00
|
|
|
if (gnvh->critical) {
|
|
|
|
geneve->dev->stats.rx_frame_errors++;
|
|
|
|
geneve->dev->stats.rx_errors++;
|
2015-08-27 14:46:52 +08:00
|
|
|
goto drop;
|
2017-06-09 08:07:48 +08:00
|
|
|
}
|
2015-08-27 14:46:52 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
skb_reset_mac_header(skb);
|
|
|
|
skb->protocol = eth_type_trans(skb, geneve->dev);
|
|
|
|
skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
if (tun_dst)
|
|
|
|
skb_dst_set(skb, &tun_dst->dst);
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
/* Ignore packet loops (and multicast echo) */
|
2017-06-09 08:07:48 +08:00
|
|
|
if (ether_addr_equal(eth_hdr(skb)->h_source, geneve->dev->dev_addr)) {
|
|
|
|
geneve->dev->stats.rx_errors++;
|
2015-05-14 00:57:30 +08:00
|
|
|
goto drop;
|
2017-06-09 08:07:48 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
oiph = skb_network_header(skb);
|
2015-05-14 00:57:30 +08:00
|
|
|
skb_reset_network_header(skb);
|
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
if (geneve_get_sk_family(gs) == AF_INET)
|
|
|
|
err = IP_ECN_decapsulate(oiph, skb);
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-02-18 18:22:50 +08:00
|
|
|
else
|
|
|
|
err = IP6_ECN_decapsulate(oiph, skb);
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
if (unlikely(err)) {
|
2015-10-27 05:01:44 +08:00
|
|
|
if (log_ecn_error) {
|
2016-02-18 18:22:50 +08:00
|
|
|
if (geneve_get_sk_family(gs) == AF_INET)
|
2015-10-27 05:01:44 +08:00
|
|
|
net_info_ratelimited("non-ECT from %pI4 "
|
|
|
|
"with TOS=%#x\n",
|
2016-02-18 18:22:50 +08:00
|
|
|
&((struct iphdr *)oiph)->saddr,
|
|
|
|
((struct iphdr *)oiph)->tos);
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-02-18 18:22:50 +08:00
|
|
|
else
|
2015-10-27 05:01:44 +08:00
|
|
|
net_info_ratelimited("non-ECT from %pI6\n",
|
2016-02-18 18:22:50 +08:00
|
|
|
&((struct ipv6hdr *)oiph)->saddr);
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
if (err > 1) {
|
|
|
|
++geneve->dev->stats.rx_frame_errors;
|
|
|
|
++geneve->dev->stats.rx_errors;
|
|
|
|
goto drop;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-09 08:07:48 +08:00
|
|
|
len = skb->len;
|
|
|
|
err = gro_cells_receive(&geneve->gro_cells, skb);
|
|
|
|
if (likely(err == NET_RX_SUCCESS)) {
|
|
|
|
stats = this_cpu_ptr(geneve->dev->tstats);
|
|
|
|
u64_stats_update_begin(&stats->syncp);
|
|
|
|
stats->rx_packets++;
|
|
|
|
stats->rx_bytes += len;
|
|
|
|
u64_stats_update_end(&stats->syncp);
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
return;
|
|
|
|
drop:
|
|
|
|
/* Consume bad packet */
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup stats when device is created */
|
|
|
|
static int geneve_init(struct net_device *dev)
|
|
|
|
{
|
2015-08-29 07:54:40 +08:00
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
int err;
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
dev->tstats = netdev_alloc_pcpu_stats(struct pcpu_sw_netstats);
|
|
|
|
if (!dev->tstats)
|
|
|
|
return -ENOMEM;
|
2015-08-29 07:54:40 +08:00
|
|
|
|
|
|
|
err = gro_cells_init(&geneve->gro_cells, dev);
|
|
|
|
if (err) {
|
|
|
|
free_percpu(dev->tstats);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
err = dst_cache_init(&geneve->cfg.info.dst_cache, GFP_KERNEL);
|
2016-02-12 22:43:58 +08:00
|
|
|
if (err) {
|
|
|
|
free_percpu(dev->tstats);
|
|
|
|
gro_cells_destroy(&geneve->gro_cells);
|
|
|
|
return err;
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void geneve_uninit(struct net_device *dev)
|
|
|
|
{
|
2015-08-29 07:54:40 +08:00
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
dst_cache_destroy(&geneve->cfg.info.dst_cache);
|
2015-08-29 07:54:40 +08:00
|
|
|
gro_cells_destroy(&geneve->gro_cells);
|
2015-05-14 00:57:30 +08:00
|
|
|
free_percpu(dev->tstats);
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
/* Callback from net/ipv4/udp.c to receive packets */
|
|
|
|
static int geneve_udp_encap_recv(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct genevehdr *geneveh;
|
2016-02-18 18:22:50 +08:00
|
|
|
struct geneve_dev *geneve;
|
2015-08-27 14:46:54 +08:00
|
|
|
struct geneve_sock *gs;
|
|
|
|
int opts_len;
|
|
|
|
|
2017-06-09 08:07:48 +08:00
|
|
|
/* Need UDP and Geneve header to be present */
|
2015-08-27 14:46:54 +08:00
|
|
|
if (unlikely(!pskb_may_pull(skb, GENEVE_BASE_HLEN)))
|
2016-05-19 21:58:33 +08:00
|
|
|
goto drop;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
/* Return packets with reserved bits set */
|
|
|
|
geneveh = geneve_hdr(skb);
|
|
|
|
if (unlikely(geneveh->ver != GENEVE_VER))
|
2016-05-19 21:58:33 +08:00
|
|
|
goto drop;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
if (unlikely(geneveh->proto_type != htons(ETH_P_TEB)))
|
2016-05-19 21:58:33 +08:00
|
|
|
goto drop;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
gs = rcu_dereference_sk_user_data(sk);
|
|
|
|
if (!gs)
|
|
|
|
goto drop;
|
|
|
|
|
|
|
|
geneve = geneve_lookup_skb(gs, skb);
|
|
|
|
if (!geneve)
|
|
|
|
goto drop;
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
opts_len = geneveh->opt_len * 4;
|
|
|
|
if (iptunnel_pull_header(skb, GENEVE_BASE_HLEN + opts_len,
|
2016-02-18 18:22:52 +08:00
|
|
|
htons(ETH_P_TEB),
|
2017-06-09 08:07:48 +08:00
|
|
|
!net_eq(geneve->net, dev_net(geneve->dev)))) {
|
|
|
|
geneve->dev->stats.rx_dropped++;
|
2015-08-27 14:46:54 +08:00
|
|
|
goto drop;
|
2017-06-09 08:07:48 +08:00
|
|
|
}
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2016-02-18 18:22:50 +08:00
|
|
|
geneve_rx(geneve, gs, skb);
|
2015-08-27 14:46:54 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
drop:
|
|
|
|
/* Consume bad packet */
|
|
|
|
kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-11-08 19:19:18 +08:00
|
|
|
/* Callback from net/ipv{4,6}/udp.c to check that we have a tunnel for errors */
|
|
|
|
static int geneve_udp_encap_err_lookup(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct genevehdr *geneveh;
|
|
|
|
struct geneve_sock *gs;
|
|
|
|
u8 zero_vni[3] = { 0 };
|
|
|
|
u8 *vni = zero_vni;
|
|
|
|
|
2019-06-11 06:27:06 +08:00
|
|
|
if (!pskb_may_pull(skb, skb_transport_offset(skb) + GENEVE_BASE_HLEN))
|
2018-11-08 19:19:18 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
geneveh = geneve_hdr(skb);
|
|
|
|
if (geneveh->ver != GENEVE_VER)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (geneveh->proto_type != htons(ETH_P_TEB))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
gs = rcu_dereference_sk_user_data(sk);
|
|
|
|
if (!gs)
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
if (geneve_get_sk_family(gs) == AF_INET) {
|
|
|
|
struct iphdr *iph = ip_hdr(skb);
|
|
|
|
__be32 addr4 = 0;
|
|
|
|
|
|
|
|
if (!gs->collect_md) {
|
|
|
|
vni = geneve_hdr(skb)->vni;
|
|
|
|
addr4 = iph->daddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return geneve_lookup(gs, addr4, vni) ? 0 : -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
if (geneve_get_sk_family(gs) == AF_INET6) {
|
|
|
|
struct ipv6hdr *ip6h = ipv6_hdr(skb);
|
2018-11-17 09:36:27 +08:00
|
|
|
struct in6_addr addr6;
|
|
|
|
|
|
|
|
memset(&addr6, 0, sizeof(struct in6_addr));
|
2018-11-08 19:19:18 +08:00
|
|
|
|
|
|
|
if (!gs->collect_md) {
|
|
|
|
vni = geneve_hdr(skb)->vni;
|
|
|
|
addr6 = ip6h->daddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return geneve6_lookup(gs, addr6, vni) ? 0 : -ENOENT;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
static struct socket *geneve_create_sock(struct net *net, bool ipv6,
|
2016-11-22 03:02:58 +08:00
|
|
|
__be16 port, bool ipv6_rx_csum)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
|
|
|
struct socket *sock;
|
|
|
|
struct udp_port_cfg udp_conf;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
memset(&udp_conf, 0, sizeof(udp_conf));
|
|
|
|
|
|
|
|
if (ipv6) {
|
|
|
|
udp_conf.family = AF_INET6;
|
2015-10-27 05:01:44 +08:00
|
|
|
udp_conf.ipv6_v6only = 1;
|
2016-11-22 03:02:58 +08:00
|
|
|
udp_conf.use_udp6_rx_checksums = ipv6_rx_csum;
|
2015-08-27 14:46:54 +08:00
|
|
|
} else {
|
|
|
|
udp_conf.family = AF_INET;
|
|
|
|
udp_conf.local_ip.s_addr = htonl(INADDR_ANY);
|
|
|
|
}
|
|
|
|
|
|
|
|
udp_conf.local_udp_port = port;
|
|
|
|
|
|
|
|
/* Open UDP socket */
|
|
|
|
err = udp_sock_create(net, &udp_conf, &sock);
|
|
|
|
if (err < 0)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int geneve_hlen(struct genevehdr *gh)
|
|
|
|
{
|
|
|
|
return sizeof(*gh) + gh->opt_len * 4;
|
|
|
|
}
|
|
|
|
|
2018-06-24 13:13:49 +08:00
|
|
|
static struct sk_buff *geneve_gro_receive(struct sock *sk,
|
|
|
|
struct list_head *head,
|
|
|
|
struct sk_buff *skb)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
2018-06-24 13:13:49 +08:00
|
|
|
struct sk_buff *pp = NULL;
|
|
|
|
struct sk_buff *p;
|
2015-08-27 14:46:54 +08:00
|
|
|
struct genevehdr *gh, *gh2;
|
|
|
|
unsigned int hlen, gh_len, off_gnv;
|
|
|
|
const struct packet_offload *ptype;
|
|
|
|
__be16 type;
|
|
|
|
int flush = 1;
|
|
|
|
|
|
|
|
off_gnv = skb_gro_offset(skb);
|
|
|
|
hlen = off_gnv + sizeof(*gh);
|
|
|
|
gh = skb_gro_header_fast(skb, off_gnv);
|
|
|
|
if (skb_gro_header_hard(skb, hlen)) {
|
|
|
|
gh = skb_gro_header_slow(skb, hlen, off_gnv);
|
|
|
|
if (unlikely(!gh))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (gh->ver != GENEVE_VER || gh->oam)
|
|
|
|
goto out;
|
|
|
|
gh_len = geneve_hlen(gh);
|
|
|
|
|
|
|
|
hlen = off_gnv + gh_len;
|
|
|
|
if (skb_gro_header_hard(skb, hlen)) {
|
|
|
|
gh = skb_gro_header_slow(skb, hlen, off_gnv);
|
|
|
|
if (unlikely(!gh))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2018-06-24 13:13:49 +08:00
|
|
|
list_for_each_entry(p, head, list) {
|
2015-08-27 14:46:54 +08:00
|
|
|
if (!NAPI_GRO_CB(p)->same_flow)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
gh2 = (struct genevehdr *)(p->data + off_gnv);
|
|
|
|
if (gh->opt_len != gh2->opt_len ||
|
|
|
|
memcmp(gh, gh2, gh_len)) {
|
|
|
|
NAPI_GRO_CB(p)->same_flow = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type = gh->proto_type;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
ptype = gro_find_receive_by_type(type);
|
2016-03-10 01:24:23 +08:00
|
|
|
if (!ptype)
|
2015-08-27 14:46:54 +08:00
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
skb_gro_pull(skb, gh_len);
|
|
|
|
skb_gro_postpull_rcsum(skb, gh, gh_len);
|
2016-10-20 21:58:02 +08:00
|
|
|
pp = call_gro_receive(ptype->callbacks.gro_receive, head, skb);
|
2016-03-10 01:24:23 +08:00
|
|
|
flush = 0;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
rcu_read_unlock();
|
|
|
|
out:
|
2018-06-30 23:38:55 +08:00
|
|
|
skb_gro_flush_final(skb, pp, flush);
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
return pp;
|
|
|
|
}
|
|
|
|
|
2016-04-05 23:22:55 +08:00
|
|
|
static int geneve_gro_complete(struct sock *sk, struct sk_buff *skb,
|
|
|
|
int nhoff)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
|
|
|
struct genevehdr *gh;
|
|
|
|
struct packet_offload *ptype;
|
|
|
|
__be16 type;
|
|
|
|
int gh_len;
|
|
|
|
int err = -ENOSYS;
|
|
|
|
|
|
|
|
gh = (struct genevehdr *)(skb->data + nhoff);
|
|
|
|
gh_len = geneve_hlen(gh);
|
|
|
|
type = gh->proto_type;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
ptype = gro_find_complete_by_type(type);
|
|
|
|
if (ptype)
|
|
|
|
err = ptype->callbacks.gro_complete(skb, nhoff + gh_len);
|
|
|
|
|
|
|
|
rcu_read_unlock();
|
2016-05-04 07:10:21 +08:00
|
|
|
|
|
|
|
skb_set_inner_mac_header(skb, nhoff + gh_len);
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create new listen socket if needed */
|
|
|
|
static struct geneve_sock *geneve_socket_create(struct net *net, __be16 port,
|
2016-11-22 03:02:58 +08:00
|
|
|
bool ipv6, bool ipv6_rx_csum)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
|
|
|
struct geneve_sock *gs;
|
|
|
|
struct socket *sock;
|
|
|
|
struct udp_tunnel_sock_cfg tunnel_cfg;
|
2015-08-27 14:46:55 +08:00
|
|
|
int h;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
gs = kzalloc(sizeof(*gs), GFP_KERNEL);
|
|
|
|
if (!gs)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
sock = geneve_create_sock(net, ipv6, port, ipv6_rx_csum);
|
2015-08-27 14:46:54 +08:00
|
|
|
if (IS_ERR(sock)) {
|
|
|
|
kfree(gs);
|
|
|
|
return ERR_CAST(sock);
|
|
|
|
}
|
|
|
|
|
|
|
|
gs->sock = sock;
|
|
|
|
gs->refcnt = 1;
|
2015-08-27 14:46:55 +08:00
|
|
|
for (h = 0; h < VNI_HASH_SIZE; ++h)
|
|
|
|
INIT_HLIST_HEAD(&gs->vni_list[h]);
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
/* Initialize the geneve udp offloads structure */
|
2016-06-17 03:20:52 +08:00
|
|
|
udp_tunnel_notify_add_rx_port(gs->sock, UDP_TUNNEL_TYPE_GENEVE);
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
/* Mark socket as an encapsulation socket */
|
2016-04-05 23:22:55 +08:00
|
|
|
memset(&tunnel_cfg, 0, sizeof(tunnel_cfg));
|
2015-08-27 14:46:54 +08:00
|
|
|
tunnel_cfg.sk_user_data = gs;
|
|
|
|
tunnel_cfg.encap_type = 1;
|
2016-04-05 23:22:55 +08:00
|
|
|
tunnel_cfg.gro_receive = geneve_gro_receive;
|
|
|
|
tunnel_cfg.gro_complete = geneve_gro_complete;
|
2015-08-27 14:46:54 +08:00
|
|
|
tunnel_cfg.encap_rcv = geneve_udp_encap_recv;
|
2018-11-08 19:19:18 +08:00
|
|
|
tunnel_cfg.encap_err_lookup = geneve_udp_encap_err_lookup;
|
2015-08-27 14:46:54 +08:00
|
|
|
tunnel_cfg.encap_destroy = NULL;
|
|
|
|
setup_udp_tunnel_sock(net, sock, &tunnel_cfg);
|
|
|
|
list_add(&gs->list, &gn->sock_list);
|
|
|
|
return gs;
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
static void __geneve_sock_release(struct geneve_sock *gs)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
2015-10-27 05:01:44 +08:00
|
|
|
if (!gs || --gs->refcnt)
|
2015-08-27 14:46:54 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
list_del(&gs->list);
|
2016-06-17 03:20:52 +08:00
|
|
|
udp_tunnel_notify_del_rx_port(gs->sock, UDP_TUNNEL_TYPE_GENEVE);
|
2015-08-27 14:46:54 +08:00
|
|
|
udp_tunnel_sock_release(gs->sock);
|
|
|
|
kfree_rcu(gs, rcu);
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
static void geneve_sock_release(struct geneve_dev *geneve)
|
|
|
|
{
|
2016-10-29 00:59:16 +08:00
|
|
|
struct geneve_sock *gs4 = rtnl_dereference(geneve->sock4);
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-10-29 00:59:16 +08:00
|
|
|
struct geneve_sock *gs6 = rtnl_dereference(geneve->sock6);
|
|
|
|
|
|
|
|
rcu_assign_pointer(geneve->sock6, NULL);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
rcu_assign_pointer(geneve->sock4, NULL);
|
|
|
|
synchronize_net();
|
|
|
|
|
|
|
|
__geneve_sock_release(gs4);
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
__geneve_sock_release(gs6);
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
static struct geneve_sock *geneve_find_sock(struct geneve_net *gn,
|
2015-10-27 05:01:44 +08:00
|
|
|
sa_family_t family,
|
2015-08-27 14:46:54 +08:00
|
|
|
__be16 dst_port)
|
|
|
|
{
|
|
|
|
struct geneve_sock *gs;
|
|
|
|
|
|
|
|
list_for_each_entry(gs, &gn->sock_list, list) {
|
|
|
|
if (inet_sk(gs->sock->sk)->inet_sport == dst_port &&
|
2016-02-18 18:22:49 +08:00
|
|
|
geneve_get_sk_family(gs) == family) {
|
2015-08-27 14:46:54 +08:00
|
|
|
return gs;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
static int geneve_sock_add(struct geneve_dev *geneve, bool ipv6)
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
|
|
|
struct net *net = geneve->net;
|
2015-08-27 14:46:54 +08:00
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
2017-07-03 01:00:58 +08:00
|
|
|
struct geneve_dev_node *node;
|
2015-05-14 00:57:30 +08:00
|
|
|
struct geneve_sock *gs;
|
2016-11-22 03:02:58 +08:00
|
|
|
__u8 vni[3];
|
2015-08-27 14:46:55 +08:00
|
|
|
__u32 hash;
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
gs = geneve_find_sock(gn, ipv6 ? AF_INET6 : AF_INET, geneve->cfg.info.key.tp_dst);
|
2015-08-27 14:46:54 +08:00
|
|
|
if (gs) {
|
|
|
|
gs->refcnt++;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
gs = geneve_socket_create(net, geneve->cfg.info.key.tp_dst, ipv6,
|
|
|
|
geneve->cfg.use_udp6_rx_checksums);
|
2015-05-14 00:57:30 +08:00
|
|
|
if (IS_ERR(gs))
|
|
|
|
return PTR_ERR(gs);
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
out:
|
2020-07-06 23:18:08 +08:00
|
|
|
gs->collect_md = geneve->cfg.collect_md;
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-07-03 01:00:58 +08:00
|
|
|
if (ipv6) {
|
2016-10-29 00:59:16 +08:00
|
|
|
rcu_assign_pointer(geneve->sock6, gs);
|
2017-07-03 01:00:58 +08:00
|
|
|
node = &geneve->hlist6;
|
|
|
|
} else
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
2017-07-03 01:00:58 +08:00
|
|
|
{
|
2016-10-29 00:59:16 +08:00
|
|
|
rcu_assign_pointer(geneve->sock4, gs);
|
2017-07-03 01:00:58 +08:00
|
|
|
node = &geneve->hlist4;
|
|
|
|
}
|
|
|
|
node->geneve = geneve;
|
2015-08-27 14:46:55 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
tunnel_id_to_vni(geneve->cfg.info.key.tun_id, vni);
|
2016-11-22 03:02:58 +08:00
|
|
|
hash = geneve_net_vni_hash(vni);
|
2017-07-03 01:00:58 +08:00
|
|
|
hlist_add_head_rcu(&node->hlist, &gs->vni_list[hash]);
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
static int geneve_open(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
2020-07-06 23:18:08 +08:00
|
|
|
bool metadata = geneve->cfg.collect_md;
|
2019-02-28 21:56:04 +08:00
|
|
|
bool ipv4, ipv6;
|
2015-10-27 05:01:44 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
ipv6 = geneve->cfg.info.mode & IP_TUNNEL_INFO_IPV6 || metadata;
|
2019-02-28 21:56:04 +08:00
|
|
|
ipv4 = !ipv6 || metadata;
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2019-02-28 21:56:04 +08:00
|
|
|
if (ipv6) {
|
2015-10-27 05:01:44 +08:00
|
|
|
ret = geneve_sock_add(geneve, true);
|
2019-02-28 21:56:04 +08:00
|
|
|
if (ret < 0 && ret != -EAFNOSUPPORT)
|
|
|
|
ipv4 = false;
|
|
|
|
}
|
2015-10-27 05:01:44 +08:00
|
|
|
#endif
|
2019-02-28 21:56:04 +08:00
|
|
|
if (ipv4)
|
2015-10-27 05:01:44 +08:00
|
|
|
ret = geneve_sock_add(geneve, false);
|
|
|
|
if (ret < 0)
|
|
|
|
geneve_sock_release(geneve);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
static int geneve_stop(struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
|
2017-07-03 01:00:58 +08:00
|
|
|
hlist_del_init_rcu(&geneve->hlist4.hlist);
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
hlist_del_init_rcu(&geneve->hlist6.hlist);
|
|
|
|
#endif
|
2015-10-27 05:01:44 +08:00
|
|
|
geneve_sock_release(geneve);
|
2015-08-27 14:46:54 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
static void geneve_build_header(struct genevehdr *geneveh,
|
2016-11-22 03:02:59 +08:00
|
|
|
const struct ip_tunnel_info *info)
|
2015-10-27 05:01:44 +08:00
|
|
|
{
|
|
|
|
geneveh->ver = GENEVE_VER;
|
2016-11-22 03:02:59 +08:00
|
|
|
geneveh->opt_len = info->options_len / 4;
|
|
|
|
geneveh->oam = !!(info->key.tun_flags & TUNNEL_OAM);
|
|
|
|
geneveh->critical = !!(info->key.tun_flags & TUNNEL_CRIT_OPT);
|
2015-10-27 05:01:44 +08:00
|
|
|
geneveh->rsvd1 = 0;
|
2016-11-22 03:02:59 +08:00
|
|
|
tunnel_id_to_vni(info->key.tun_id, geneveh->vni);
|
2015-10-27 05:01:44 +08:00
|
|
|
geneveh->proto_type = htons(ETH_P_TEB);
|
|
|
|
geneveh->rsvd2 = 0;
|
|
|
|
|
2018-06-27 12:39:36 +08:00
|
|
|
if (info->key.tun_flags & TUNNEL_GENEVE_OPT)
|
|
|
|
ip_tunnel_info_opts_get(geneveh->options, info);
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:59 +08:00
|
|
|
static int geneve_build_skb(struct dst_entry *dst, struct sk_buff *skb,
|
|
|
|
const struct ip_tunnel_info *info,
|
|
|
|
bool xnet, int ip_hdr_len)
|
2015-08-27 14:46:54 +08:00
|
|
|
{
|
2016-11-22 03:02:59 +08:00
|
|
|
bool udp_sum = !!(info->key.tun_flags & TUNNEL_CSUM);
|
2015-10-27 05:01:44 +08:00
|
|
|
struct genevehdr *gnvh;
|
|
|
|
int min_headroom;
|
|
|
|
int err;
|
|
|
|
|
2016-11-22 03:02:59 +08:00
|
|
|
skb_reset_mac_header(skb);
|
2015-10-27 05:01:44 +08:00
|
|
|
skb_scrub_packet(skb, xnet);
|
|
|
|
|
2016-11-22 03:02:59 +08:00
|
|
|
min_headroom = LL_RESERVED_SPACE(dst->dev) + dst->header_len +
|
|
|
|
GENEVE_BASE_HLEN + info->options_len + ip_hdr_len;
|
2015-10-27 05:01:44 +08:00
|
|
|
err = skb_cow_head(skb, min_headroom);
|
2016-04-15 03:33:37 +08:00
|
|
|
if (unlikely(err))
|
2015-10-27 05:01:44 +08:00
|
|
|
goto free_dst;
|
|
|
|
|
2016-04-15 03:33:37 +08:00
|
|
|
err = udp_tunnel_handle_offloads(skb, udp_sum);
|
2016-04-19 22:30:56 +08:00
|
|
|
if (err)
|
2015-10-27 05:01:44 +08:00
|
|
|
goto free_dst;
|
|
|
|
|
networking: make skb_push & __skb_push return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
@@
expression SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- fn(SKB, LEN)[0]
+ *(u8 *)fn(SKB, LEN)
Note that the last part there converts from push(...)[0] to the
more idiomatic *(u8 *)push(...).
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:23 +08:00
|
|
|
gnvh = __skb_push(skb, sizeof(*gnvh) + info->options_len);
|
2016-11-22 03:02:59 +08:00
|
|
|
geneve_build_header(gnvh, info);
|
2015-10-27 05:01:44 +08:00
|
|
|
skb_set_inner_protocol(skb, htons(ETH_P_TEB));
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
free_dst:
|
|
|
|
dst_release(dst);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct rtable *geneve_get_v4_rt(struct sk_buff *skb,
|
|
|
|
struct net_device *dev,
|
2017-07-21 13:44:20 +08:00
|
|
|
struct geneve_sock *gs4,
|
2015-10-27 05:01:44 +08:00
|
|
|
struct flowi4 *fl4,
|
2016-11-22 03:02:59 +08:00
|
|
|
const struct ip_tunnel_info *info)
|
2015-08-27 14:46:52 +08:00
|
|
|
{
|
bpf, vxlan, geneve, gre: fix usage of dst_cache on xmit
The assumptions from commit 0c1d70af924b ("net: use dst_cache for vxlan
device"), 468dfffcd762 ("geneve: add dst caching support") and 3c1cb4d2604c
("net/ipv4: add dst cache support for gre lwtunnels") on dst_cache usage
when ip_tunnel_info is used is unfortunately not always valid as assumed.
While it seems correct for ip_tunnel_info front-ends such as OVS, eBPF
however can fill in ip_tunnel_info for consumers like vxlan, geneve or gre
with different remote dsts, tos, etc, therefore they cannot be assumed as
packet independent.
Right now vxlan, geneve, gre would cache the dst for eBPF and every packet
would reuse the same entry that was first created on the initial route
lookup. eBPF doesn't store/cache the ip_tunnel_info, so each skb may have
a different one.
Fix it by adding a flag that checks the ip_tunnel_info. Also the !tos test
in vxlan needs to be handeled differently in this context as it is currently
inferred from ip_tunnel_info as well if present. ip_tunnel_dst_cache_usable()
helper is added for the three tunnel cases, which checks if we can use dst
cache.
Fixes: 0c1d70af924b ("net: use dst_cache for vxlan device")
Fixes: 468dfffcd762 ("geneve: add dst caching support")
Fixes: 3c1cb4d2604c ("net/ipv4: add dst cache support for gre lwtunnels")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Paolo Abeni <pabeni@redhat.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-03-04 22:15:07 +08:00
|
|
|
bool use_cache = ip_tunnel_dst_cache_usable(skb, info);
|
2015-08-27 14:46:52 +08:00
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
2016-02-12 22:43:58 +08:00
|
|
|
struct dst_cache *dst_cache;
|
2015-08-27 14:46:52 +08:00
|
|
|
struct rtable *rt = NULL;
|
|
|
|
__u8 tos;
|
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (!gs4)
|
2016-10-29 00:59:16 +08:00
|
|
|
return ERR_PTR(-EIO);
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
memset(fl4, 0, sizeof(*fl4));
|
|
|
|
fl4->flowi4_mark = skb->mark;
|
|
|
|
fl4->flowi4_proto = IPPROTO_UDP;
|
2016-11-22 03:02:58 +08:00
|
|
|
fl4->daddr = info->key.u.ipv4.dst;
|
|
|
|
fl4->saddr = info->key.u.ipv4.src;
|
2015-08-27 14:46:52 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
tos = info->key.tos;
|
2020-07-06 23:18:08 +08:00
|
|
|
if ((tos == 1) && !geneve->cfg.collect_md) {
|
2016-11-22 03:02:58 +08:00
|
|
|
tos = ip_tunnel_get_dsfield(ip_hdr(skb), skb);
|
|
|
|
use_cache = false;
|
2016-02-12 22:43:58 +08:00
|
|
|
}
|
2016-11-22 03:02:58 +08:00
|
|
|
fl4->flowi4_tos = RT_TOS(tos);
|
2016-02-12 22:43:58 +08:00
|
|
|
|
2016-11-22 03:02:59 +08:00
|
|
|
dst_cache = (struct dst_cache *)&info->dst_cache;
|
2016-02-12 22:43:58 +08:00
|
|
|
if (use_cache) {
|
|
|
|
rt = dst_cache_get_ip4(dst_cache, &fl4->saddr);
|
|
|
|
if (rt)
|
|
|
|
return rt;
|
2015-08-27 14:46:52 +08:00
|
|
|
}
|
|
|
|
rt = ip_route_output_key(geneve->net, fl4);
|
|
|
|
if (IS_ERR(rt)) {
|
|
|
|
netdev_dbg(dev, "no route to %pI4\n", &fl4->daddr);
|
2015-10-23 09:17:16 +08:00
|
|
|
return ERR_PTR(-ENETUNREACH);
|
2015-08-27 14:46:52 +08:00
|
|
|
}
|
|
|
|
if (rt->dst.dev == dev) { /* is this necessary? */
|
|
|
|
netdev_dbg(dev, "circular route to %pI4\n", &fl4->daddr);
|
|
|
|
ip_rt_put(rt);
|
2015-10-23 09:17:16 +08:00
|
|
|
return ERR_PTR(-ELOOP);
|
2015-08-27 14:46:52 +08:00
|
|
|
}
|
2016-02-12 22:43:58 +08:00
|
|
|
if (use_cache)
|
|
|
|
dst_cache_set_ip4(dst_cache, &rt->dst, fl4->saddr);
|
2015-08-27 14:46:52 +08:00
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
static struct dst_entry *geneve_get_v6_dst(struct sk_buff *skb,
|
|
|
|
struct net_device *dev,
|
2017-07-21 13:44:20 +08:00
|
|
|
struct geneve_sock *gs6,
|
2015-10-27 05:01:44 +08:00
|
|
|
struct flowi6 *fl6,
|
2016-11-22 03:02:59 +08:00
|
|
|
const struct ip_tunnel_info *info)
|
2015-10-27 05:01:44 +08:00
|
|
|
{
|
bpf, vxlan, geneve, gre: fix usage of dst_cache on xmit
The assumptions from commit 0c1d70af924b ("net: use dst_cache for vxlan
device"), 468dfffcd762 ("geneve: add dst caching support") and 3c1cb4d2604c
("net/ipv4: add dst cache support for gre lwtunnels") on dst_cache usage
when ip_tunnel_info is used is unfortunately not always valid as assumed.
While it seems correct for ip_tunnel_info front-ends such as OVS, eBPF
however can fill in ip_tunnel_info for consumers like vxlan, geneve or gre
with different remote dsts, tos, etc, therefore they cannot be assumed as
packet independent.
Right now vxlan, geneve, gre would cache the dst for eBPF and every packet
would reuse the same entry that was first created on the initial route
lookup. eBPF doesn't store/cache the ip_tunnel_info, so each skb may have
a different one.
Fix it by adding a flag that checks the ip_tunnel_info. Also the !tos test
in vxlan needs to be handeled differently in this context as it is currently
inferred from ip_tunnel_info as well if present. ip_tunnel_dst_cache_usable()
helper is added for the three tunnel cases, which checks if we can use dst
cache.
Fixes: 0c1d70af924b ("net: use dst_cache for vxlan device")
Fixes: 468dfffcd762 ("geneve: add dst caching support")
Fixes: 3c1cb4d2604c ("net/ipv4: add dst cache support for gre lwtunnels")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Paolo Abeni <pabeni@redhat.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-03-04 22:15:07 +08:00
|
|
|
bool use_cache = ip_tunnel_dst_cache_usable(skb, info);
|
2015-10-27 05:01:44 +08:00
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
struct dst_entry *dst = NULL;
|
2016-02-12 22:43:58 +08:00
|
|
|
struct dst_cache *dst_cache;
|
2015-10-27 05:01:45 +08:00
|
|
|
__u8 prio;
|
2015-10-27 05:01:44 +08:00
|
|
|
|
2016-10-29 00:59:16 +08:00
|
|
|
if (!gs6)
|
|
|
|
return ERR_PTR(-EIO);
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
memset(fl6, 0, sizeof(*fl6));
|
|
|
|
fl6->flowi6_mark = skb->mark;
|
|
|
|
fl6->flowi6_proto = IPPROTO_UDP;
|
2016-11-22 03:02:58 +08:00
|
|
|
fl6->daddr = info->key.u.ipv6.dst;
|
|
|
|
fl6->saddr = info->key.u.ipv6.src;
|
|
|
|
prio = info->key.tos;
|
2020-07-06 23:18:08 +08:00
|
|
|
if ((prio == 1) && !geneve->cfg.collect_md) {
|
2016-11-22 03:02:58 +08:00
|
|
|
prio = ip_tunnel_get_dsfield(ip_hdr(skb), skb);
|
|
|
|
use_cache = false;
|
2016-02-12 22:43:58 +08:00
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
fl6->flowlabel = ip6_make_flowinfo(RT_TOS(prio),
|
|
|
|
info->key.label);
|
2016-11-22 03:02:59 +08:00
|
|
|
dst_cache = (struct dst_cache *)&info->dst_cache;
|
2016-02-12 22:43:58 +08:00
|
|
|
if (use_cache) {
|
|
|
|
dst = dst_cache_get_ip6(dst_cache, &fl6->saddr);
|
|
|
|
if (dst)
|
|
|
|
return dst;
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
2019-12-04 22:35:53 +08:00
|
|
|
dst = ipv6_stub->ipv6_dst_lookup_flow(geneve->net, gs6->sock->sk, fl6,
|
|
|
|
NULL);
|
|
|
|
if (IS_ERR(dst)) {
|
2015-10-27 05:01:44 +08:00
|
|
|
netdev_dbg(dev, "no route to %pI6\n", &fl6->daddr);
|
|
|
|
return ERR_PTR(-ENETUNREACH);
|
|
|
|
}
|
|
|
|
if (dst->dev == dev) { /* is this necessary? */
|
|
|
|
netdev_dbg(dev, "circular route to %pI6\n", &fl6->daddr);
|
|
|
|
dst_release(dst);
|
|
|
|
return ERR_PTR(-ELOOP);
|
|
|
|
}
|
|
|
|
|
2016-02-12 22:43:58 +08:00
|
|
|
if (use_cache)
|
|
|
|
dst_cache_set_ip6(dst_cache, dst, &fl6->saddr);
|
2015-10-27 05:01:44 +08:00
|
|
|
return dst;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
static int geneve_xmit_skb(struct sk_buff *skb, struct net_device *dev,
|
2016-11-22 03:02:59 +08:00
|
|
|
struct geneve_dev *geneve,
|
|
|
|
const struct ip_tunnel_info *info)
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
2016-11-22 03:02:58 +08:00
|
|
|
bool xnet = !net_eq(geneve->net, dev_net(geneve->dev));
|
|
|
|
struct geneve_sock *gs4 = rcu_dereference(geneve->sock4);
|
|
|
|
const struct ip_tunnel_key *key = &info->key;
|
|
|
|
struct rtable *rt;
|
2015-05-14 00:57:30 +08:00
|
|
|
struct flowi4 fl4;
|
2015-06-02 03:51:34 +08:00
|
|
|
__u8 tos, ttl;
|
2018-11-08 19:19:19 +08:00
|
|
|
__be16 df = 0;
|
2015-08-27 14:46:52 +08:00
|
|
|
__be16 sport;
|
2016-11-22 03:03:00 +08:00
|
|
|
int err;
|
2015-08-27 14:46:49 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
rt = geneve_get_v4_rt(skb, dev, gs4, &fl4, info);
|
2016-11-22 03:02:58 +08:00
|
|
|
if (IS_ERR(rt))
|
|
|
|
return PTR_ERR(rt);
|
2015-08-27 14:46:54 +08:00
|
|
|
|
2018-10-13 05:53:59 +08:00
|
|
|
skb_tunnel_check_pmtu(skb, &rt->dst,
|
tunnels: PMTU discovery support for directly bridged IP packets
It's currently possible to bridge Ethernet tunnels carrying IP
packets directly to external interfaces without assigning them
addresses and routes on the bridged network itself: this is the case
for UDP tunnels bridged with a standard bridge or by Open vSwitch.
PMTU discovery is currently broken with those configurations, because
the encapsulation effectively decreases the MTU of the link, and
while we are able to account for this using PMTU discovery on the
lower layer, we don't have a way to relay ICMP or ICMPv6 messages
needed by the sender, because we don't have valid routes to it.
On the other hand, as a tunnel endpoint, we can't fragment packets
as a general approach: this is for instance clearly forbidden for
VXLAN by RFC 7348, section 4.3:
VTEPs MUST NOT fragment VXLAN packets. Intermediate routers may
fragment encapsulated VXLAN packets due to the larger frame size.
The destination VTEP MAY silently discard such VXLAN fragments.
The same paragraph recommends that the MTU over the physical network
accomodates for encapsulations, but this isn't a practical option for
complex topologies, especially for typical Open vSwitch use cases.
Further, it states that:
Other techniques like Path MTU discovery (see [RFC1191] and
[RFC1981]) MAY be used to address this requirement as well.
Now, PMTU discovery already works for routed interfaces, we get
route exceptions created by the encapsulation device as they receive
ICMP Fragmentation Needed and ICMPv6 Packet Too Big messages, and
we already rebuild those messages with the appropriate MTU and route
them back to the sender.
Add the missing bits for bridged cases:
- checks in skb_tunnel_check_pmtu() to understand if it's appropriate
to trigger a reply according to RFC 1122 section 3.2.2 for ICMP and
RFC 4443 section 2.4 for ICMPv6. This function is already called by
UDP tunnels
- a new function generating those ICMP or ICMPv6 replies. We can't
reuse icmp_send() and icmp6_send() as we don't see the sender as a
valid destination. This doesn't need to be generic, as we don't
cover any other type of ICMP errors given that we only provide an
encapsulation function to the sender
While at it, make the MTU check in skb_tunnel_check_pmtu() accurate:
we might receive GSO buffers here, and the passed headroom already
includes the inner MAC length, so we don't have to account for it
a second time (that would imply three MAC headers on the wire, but
there are just two).
This issue became visible while bridging IPv6 packets with 4500 bytes
of payload over GENEVE using IPv4 with a PMTU of 4000. Given the 50
bytes of encapsulation headroom, we would advertise MTU as 3950, and
we would reject fragmented IPv6 datagrams of 3958 bytes size on the
wire. We're exclusively dealing with network MTU here, though, so we
could get Ethernet frames up to 3964 octets in that case.
v2:
- moved skb_tunnel_check_pmtu() to ip_tunnel_core.c (David Ahern)
- split IPv4/IPv6 functions (David Ahern)
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-08-04 13:53:43 +08:00
|
|
|
GENEVE_IPV4_HLEN + info->options_len, false);
|
2017-12-25 14:43:58 +08:00
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
sport = udp_flow_src_port(geneve->net, skb, 1, USHRT_MAX, true);
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.collect_md) {
|
2016-11-22 03:02:58 +08:00
|
|
|
tos = ip_tunnel_ecn_encap(key->tos, ip_hdr(skb), skb);
|
2015-08-27 14:46:54 +08:00
|
|
|
ttl = key->ttl;
|
2018-11-08 19:19:19 +08:00
|
|
|
|
|
|
|
df = key->tun_flags & TUNNEL_DONT_FRAGMENT ? htons(IP_DF) : 0;
|
2015-08-27 14:46:52 +08:00
|
|
|
} else {
|
2016-11-22 03:02:58 +08:00
|
|
|
tos = ip_tunnel_ecn_encap(fl4.flowi4_tos, ip_hdr(skb), skb);
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.ttl_inherit)
|
2018-09-12 10:04:21 +08:00
|
|
|
ttl = ip_tunnel_get_ttl(ip_hdr(skb), skb);
|
|
|
|
else
|
|
|
|
ttl = key->ttl;
|
|
|
|
ttl = ttl ? : ip4_dst_hoplimit(&rt->dst);
|
2018-11-08 19:19:19 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.df == GENEVE_DF_SET) {
|
2018-11-08 19:19:19 +08:00
|
|
|
df = htons(IP_DF);
|
2020-07-06 23:18:08 +08:00
|
|
|
} else if (geneve->cfg.df == GENEVE_DF_INHERIT) {
|
2018-11-08 19:19:19 +08:00
|
|
|
struct ethhdr *eth = eth_hdr(skb);
|
|
|
|
|
|
|
|
if (ntohs(eth->h_proto) == ETH_P_IPV6) {
|
|
|
|
df = htons(IP_DF);
|
|
|
|
} else if (ntohs(eth->h_proto) == ETH_P_IP) {
|
|
|
|
struct iphdr *iph = ip_hdr(skb);
|
|
|
|
|
|
|
|
if (iph->frag_off & htons(IP_DF))
|
|
|
|
df = htons(IP_DF);
|
|
|
|
}
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:59 +08:00
|
|
|
err = geneve_build_skb(&rt->dst, skb, info, xnet, sizeof(struct iphdr));
|
2016-11-22 03:02:58 +08:00
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
2016-06-21 16:26:49 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
udp_tunnel_xmit_skb(rt, gs4->sock->sk, skb, fl4.saddr, fl4.daddr,
|
2020-07-06 23:18:08 +08:00
|
|
|
tos, ttl, df, sport, geneve->cfg.info.key.tp_dst,
|
2016-11-22 03:02:58 +08:00
|
|
|
!net_eq(geneve->net, dev_net(geneve->dev)),
|
|
|
|
!(info->key.tun_flags & TUNNEL_CSUM));
|
|
|
|
return 0;
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-11-22 03:02:58 +08:00
|
|
|
static int geneve6_xmit_skb(struct sk_buff *skb, struct net_device *dev,
|
2016-11-22 03:02:59 +08:00
|
|
|
struct geneve_dev *geneve,
|
|
|
|
const struct ip_tunnel_info *info)
|
2015-10-27 05:01:44 +08:00
|
|
|
{
|
2016-11-22 03:02:58 +08:00
|
|
|
bool xnet = !net_eq(geneve->net, dev_net(geneve->dev));
|
|
|
|
struct geneve_sock *gs6 = rcu_dereference(geneve->sock6);
|
|
|
|
const struct ip_tunnel_key *key = &info->key;
|
2015-10-27 05:01:44 +08:00
|
|
|
struct dst_entry *dst = NULL;
|
|
|
|
struct flowi6 fl6;
|
2015-10-27 05:01:45 +08:00
|
|
|
__u8 prio, ttl;
|
2015-10-27 05:01:44 +08:00
|
|
|
__be16 sport;
|
2016-11-22 03:03:00 +08:00
|
|
|
int err;
|
2015-10-27 05:01:44 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
dst = geneve_get_v6_dst(skb, dev, gs6, &fl6, info);
|
2016-11-22 03:02:58 +08:00
|
|
|
if (IS_ERR(dst))
|
|
|
|
return PTR_ERR(dst);
|
2015-10-27 05:01:44 +08:00
|
|
|
|
tunnels: PMTU discovery support for directly bridged IP packets
It's currently possible to bridge Ethernet tunnels carrying IP
packets directly to external interfaces without assigning them
addresses and routes on the bridged network itself: this is the case
for UDP tunnels bridged with a standard bridge or by Open vSwitch.
PMTU discovery is currently broken with those configurations, because
the encapsulation effectively decreases the MTU of the link, and
while we are able to account for this using PMTU discovery on the
lower layer, we don't have a way to relay ICMP or ICMPv6 messages
needed by the sender, because we don't have valid routes to it.
On the other hand, as a tunnel endpoint, we can't fragment packets
as a general approach: this is for instance clearly forbidden for
VXLAN by RFC 7348, section 4.3:
VTEPs MUST NOT fragment VXLAN packets. Intermediate routers may
fragment encapsulated VXLAN packets due to the larger frame size.
The destination VTEP MAY silently discard such VXLAN fragments.
The same paragraph recommends that the MTU over the physical network
accomodates for encapsulations, but this isn't a practical option for
complex topologies, especially for typical Open vSwitch use cases.
Further, it states that:
Other techniques like Path MTU discovery (see [RFC1191] and
[RFC1981]) MAY be used to address this requirement as well.
Now, PMTU discovery already works for routed interfaces, we get
route exceptions created by the encapsulation device as they receive
ICMP Fragmentation Needed and ICMPv6 Packet Too Big messages, and
we already rebuild those messages with the appropriate MTU and route
them back to the sender.
Add the missing bits for bridged cases:
- checks in skb_tunnel_check_pmtu() to understand if it's appropriate
to trigger a reply according to RFC 1122 section 3.2.2 for ICMP and
RFC 4443 section 2.4 for ICMPv6. This function is already called by
UDP tunnels
- a new function generating those ICMP or ICMPv6 replies. We can't
reuse icmp_send() and icmp6_send() as we don't see the sender as a
valid destination. This doesn't need to be generic, as we don't
cover any other type of ICMP errors given that we only provide an
encapsulation function to the sender
While at it, make the MTU check in skb_tunnel_check_pmtu() accurate:
we might receive GSO buffers here, and the passed headroom already
includes the inner MAC length, so we don't have to account for it
a second time (that would imply three MAC headers on the wire, but
there are just two).
This issue became visible while bridging IPv6 packets with 4500 bytes
of payload over GENEVE using IPv4 with a PMTU of 4000. Given the 50
bytes of encapsulation headroom, we would advertise MTU as 3950, and
we would reject fragmented IPv6 datagrams of 3958 bytes size on the
wire. We're exclusively dealing with network MTU here, though, so we
could get Ethernet frames up to 3964 octets in that case.
v2:
- moved skb_tunnel_check_pmtu() to ip_tunnel_core.c (David Ahern)
- split IPv4/IPv6 functions (David Ahern)
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Reviewed-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-08-04 13:53:43 +08:00
|
|
|
skb_tunnel_check_pmtu(skb, dst, GENEVE_IPV6_HLEN + info->options_len,
|
|
|
|
false);
|
2017-12-25 14:43:58 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
sport = udp_flow_src_port(geneve->net, skb, 1, USHRT_MAX, true);
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.collect_md) {
|
2016-11-22 03:02:58 +08:00
|
|
|
prio = ip_tunnel_ecn_encap(key->tos, ip_hdr(skb), skb);
|
|
|
|
ttl = key->ttl;
|
|
|
|
} else {
|
|
|
|
prio = ip_tunnel_ecn_encap(ip6_tclass(fl6.flowlabel),
|
|
|
|
ip_hdr(skb), skb);
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.ttl_inherit)
|
2018-09-12 10:04:21 +08:00
|
|
|
ttl = ip_tunnel_get_ttl(ip_hdr(skb), skb);
|
|
|
|
else
|
|
|
|
ttl = key->ttl;
|
|
|
|
ttl = ttl ? : ip6_dst_hoplimit(dst);
|
2016-11-22 03:02:58 +08:00
|
|
|
}
|
2016-11-28 13:26:58 +08:00
|
|
|
err = geneve_build_skb(dst, skb, info, xnet, sizeof(struct ipv6hdr));
|
2016-11-22 03:02:58 +08:00
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
2015-10-27 05:01:44 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
udp_tunnel6_xmit_skb(dst, gs6->sock->sk, skb, dev,
|
|
|
|
&fl6.saddr, &fl6.daddr, prio, ttl,
|
2020-07-06 23:18:08 +08:00
|
|
|
info->key.label, sport, geneve->cfg.info.key.tp_dst,
|
2016-11-22 03:02:58 +08:00
|
|
|
!(info->key.tun_flags & TUNNEL_CSUM));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
2015-10-27 05:01:44 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
static netdev_tx_t geneve_xmit(struct sk_buff *skb, struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
struct ip_tunnel_info *info = NULL;
|
|
|
|
int err;
|
2015-12-11 04:37:45 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.collect_md) {
|
2016-11-22 03:02:58 +08:00
|
|
|
info = skb_tunnel_info(skb);
|
|
|
|
if (unlikely(!info || !(info->mode & IP_TUNNEL_INFO_TX))) {
|
|
|
|
netdev_dbg(dev, "no tunnel metadata\n");
|
geneve: change from tx_error to tx_dropped on missing metadata
If the geneve interface is in collect_md (external) mode, it can't send any
packets submitted directly to its net interface, as such packets won't have
metadata attached. This is expected.
However, the kernel itself sends some packets to the interface, most
notably, IPv6 DAD, IPv6 multicast listener reports, etc. This is not wrong,
as tunnel metadata can be specified in routing table (although technically,
that has never worked for IPv6, but hopefully will be fixed eventually) and
then the interface must correctly participate in IPv6 housekeeping.
The problem is that any such attempt increases the tx_error counter. Just
bringing up a geneve interface with IPv6 enabled is enough to see a number
of tx_errors. That causes confusion among users, prompting them to find
a network error where there is none.
Change the counter used to tx_dropped. That better conveys the meaning
(there's nothing wrong going on, just some packets are getting dropped) and
hopefully will make admins panic less.
Signed-off-by: Jiri Benc <jbenc@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-06-03 17:12:14 +08:00
|
|
|
dev_kfree_skb(skb);
|
|
|
|
dev->stats.tx_dropped++;
|
|
|
|
return NETDEV_TX_OK;
|
2016-11-22 03:02:58 +08:00
|
|
|
}
|
2015-10-27 05:01:44 +08:00
|
|
|
} else {
|
2020-07-06 23:18:08 +08:00
|
|
|
info = &geneve->cfg.info;
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
2016-03-09 10:00:04 +08:00
|
|
|
|
2017-02-25 03:43:37 +08:00
|
|
|
rcu_read_lock();
|
2016-11-22 03:02:58 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
if (info->mode & IP_TUNNEL_INFO_IPV6)
|
|
|
|
err = geneve6_xmit_skb(skb, dev, geneve, info);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
err = geneve_xmit_skb(skb, dev, geneve, info);
|
2017-02-25 03:43:37 +08:00
|
|
|
rcu_read_unlock();
|
2015-10-27 05:01:44 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
if (likely(!err))
|
|
|
|
return NETDEV_TX_OK;
|
geneve: change from tx_error to tx_dropped on missing metadata
If the geneve interface is in collect_md (external) mode, it can't send any
packets submitted directly to its net interface, as such packets won't have
metadata attached. This is expected.
However, the kernel itself sends some packets to the interface, most
notably, IPv6 DAD, IPv6 multicast listener reports, etc. This is not wrong,
as tunnel metadata can be specified in routing table (although technically,
that has never worked for IPv6, but hopefully will be fixed eventually) and
then the interface must correctly participate in IPv6 housekeeping.
The problem is that any such attempt increases the tx_error counter. Just
bringing up a geneve interface with IPv6 enabled is enough to see a number
of tx_errors. That causes confusion among users, prompting them to find
a network error where there is none.
Change the counter used to tx_dropped. That better conveys the meaning
(there's nothing wrong going on, just some packets are getting dropped) and
hopefully will make admins panic less.
Signed-off-by: Jiri Benc <jbenc@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-06-03 17:12:14 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
dev_kfree_skb(skb);
|
2016-04-15 03:33:37 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
if (err == -ELOOP)
|
|
|
|
dev->stats.collisions++;
|
|
|
|
else if (err == -ENETUNREACH)
|
|
|
|
dev->stats.tx_carrier_errors++;
|
2016-06-21 16:26:49 +08:00
|
|
|
|
|
|
|
dev->stats.tx_errors++;
|
2015-10-27 05:01:44 +08:00
|
|
|
return NETDEV_TX_OK;
|
|
|
|
}
|
|
|
|
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
static int geneve_change_mtu(struct net_device *dev, int new_mtu)
|
2016-02-10 08:05:57 +08:00
|
|
|
{
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
if (new_mtu > dev->max_mtu)
|
|
|
|
new_mtu = dev->max_mtu;
|
2018-04-19 20:42:31 +08:00
|
|
|
else if (new_mtu < dev->min_mtu)
|
|
|
|
new_mtu = dev->min_mtu;
|
2016-02-19 01:43:29 +08:00
|
|
|
|
2016-02-10 08:05:57 +08:00
|
|
|
dev->mtu = new_mtu;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-10-23 09:17:16 +08:00
|
|
|
static int geneve_fill_metadata_dst(struct net_device *dev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct ip_tunnel_info *info = skb_tunnel_info(skb);
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
|
2015-10-27 21:49:00 +08:00
|
|
|
if (ip_tunnel_info_af(info) == AF_INET) {
|
2016-11-22 03:02:58 +08:00
|
|
|
struct rtable *rt;
|
|
|
|
struct flowi4 fl4;
|
2017-07-21 13:44:20 +08:00
|
|
|
struct geneve_sock *gs4 = rcu_dereference(geneve->sock4);
|
2016-11-22 03:02:58 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
rt = geneve_get_v4_rt(skb, dev, gs4, &fl4, info);
|
2015-10-27 21:49:00 +08:00
|
|
|
if (IS_ERR(rt))
|
|
|
|
return PTR_ERR(rt);
|
2015-10-23 09:17:16 +08:00
|
|
|
|
2015-10-27 21:49:00 +08:00
|
|
|
ip_rt_put(rt);
|
|
|
|
info->key.u.ipv4.src = fl4.saddr;
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
} else if (ip_tunnel_info_af(info) == AF_INET6) {
|
2016-11-22 03:02:58 +08:00
|
|
|
struct dst_entry *dst;
|
|
|
|
struct flowi6 fl6;
|
2017-07-21 13:44:20 +08:00
|
|
|
struct geneve_sock *gs6 = rcu_dereference(geneve->sock6);
|
2016-11-22 03:02:58 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
dst = geneve_get_v6_dst(skb, dev, gs6, &fl6, info);
|
2015-10-27 21:49:00 +08:00
|
|
|
if (IS_ERR(dst))
|
|
|
|
return PTR_ERR(dst);
|
|
|
|
|
|
|
|
dst_release(dst);
|
|
|
|
info->key.u.ipv6.src = fl6.saddr;
|
|
|
|
#endif
|
|
|
|
} else {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2015-10-23 09:17:16 +08:00
|
|
|
|
|
|
|
info->key.tp_src = udp_flow_src_port(geneve->net, skb,
|
|
|
|
1, USHRT_MAX, true);
|
2020-07-06 23:18:08 +08:00
|
|
|
info->key.tp_dst = geneve->cfg.info.key.tp_dst;
|
2015-10-23 09:17:16 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
static const struct net_device_ops geneve_netdev_ops = {
|
|
|
|
.ndo_init = geneve_init,
|
|
|
|
.ndo_uninit = geneve_uninit,
|
|
|
|
.ndo_open = geneve_open,
|
|
|
|
.ndo_stop = geneve_stop,
|
|
|
|
.ndo_start_xmit = geneve_xmit,
|
|
|
|
.ndo_get_stats64 = ip_tunnel_get_stats64,
|
2016-02-10 08:05:57 +08:00
|
|
|
.ndo_change_mtu = geneve_change_mtu,
|
2015-05-14 00:57:30 +08:00
|
|
|
.ndo_validate_addr = eth_validate_addr,
|
|
|
|
.ndo_set_mac_address = eth_mac_addr,
|
2015-10-23 09:17:16 +08:00
|
|
|
.ndo_fill_metadata_dst = geneve_fill_metadata_dst,
|
2015-05-14 00:57:30 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static void geneve_get_drvinfo(struct net_device *dev,
|
|
|
|
struct ethtool_drvinfo *drvinfo)
|
|
|
|
{
|
|
|
|
strlcpy(drvinfo->version, GENEVE_NETDEV_VER, sizeof(drvinfo->version));
|
|
|
|
strlcpy(drvinfo->driver, "geneve", sizeof(drvinfo->driver));
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct ethtool_ops geneve_ethtool_ops = {
|
|
|
|
.get_drvinfo = geneve_get_drvinfo,
|
|
|
|
.get_link = ethtool_op_get_link,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Info for udev, that this is a virtual tunnel endpoint */
|
|
|
|
static struct device_type geneve_type = {
|
|
|
|
.name = "geneve",
|
|
|
|
};
|
|
|
|
|
2016-07-11 19:12:28 +08:00
|
|
|
/* Calls the ndo_udp_tunnel_add of the caller in order to
|
2015-12-15 04:21:20 +08:00
|
|
|
* supply the listening GENEVE udp ports. Callers are expected
|
2016-07-11 19:12:28 +08:00
|
|
|
* to implement the ndo_udp_tunnel_add.
|
2015-12-15 04:21:20 +08:00
|
|
|
*/
|
2017-07-21 18:49:32 +08:00
|
|
|
static void geneve_offload_rx_ports(struct net_device *dev, bool push)
|
2015-12-15 04:21:20 +08:00
|
|
|
{
|
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
|
|
|
struct geneve_sock *gs;
|
2016-04-19 03:19:48 +08:00
|
|
|
|
2015-12-15 04:21:20 +08:00
|
|
|
rcu_read_lock();
|
2017-07-21 18:49:32 +08:00
|
|
|
list_for_each_entry_rcu(gs, &gn->sock_list, list) {
|
|
|
|
if (push) {
|
|
|
|
udp_tunnel_push_rx_port(dev, gs->sock,
|
|
|
|
UDP_TUNNEL_TYPE_GENEVE);
|
|
|
|
} else {
|
|
|
|
udp_tunnel_drop_rx_port(dev, gs->sock,
|
|
|
|
UDP_TUNNEL_TYPE_GENEVE);
|
|
|
|
}
|
|
|
|
}
|
2015-12-15 04:21:20 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
/* Initialize the device structure. */
|
|
|
|
static void geneve_setup(struct net_device *dev)
|
|
|
|
{
|
|
|
|
ether_setup(dev);
|
|
|
|
|
|
|
|
dev->netdev_ops = &geneve_netdev_ops;
|
|
|
|
dev->ethtool_ops = &geneve_ethtool_ops;
|
net: Fix inconsistent teardown and release of private netdev state.
Network devices can allocate reasources and private memory using
netdev_ops->ndo_init(). However, the release of these resources
can occur in one of two different places.
Either netdev_ops->ndo_uninit() or netdev->destructor().
The decision of which operation frees the resources depends upon
whether it is necessary for all netdev refs to be released before it
is safe to perform the freeing.
netdev_ops->ndo_uninit() presumably can occur right after the
NETDEV_UNREGISTER notifier completes and the unicast and multicast
address lists are flushed.
netdev->destructor(), on the other hand, does not run until the
netdev references all go away.
Further complicating the situation is that netdev->destructor()
almost universally does also a free_netdev().
This creates a problem for the logic in register_netdevice().
Because all callers of register_netdevice() manage the freeing
of the netdev, and invoke free_netdev(dev) if register_netdevice()
fails.
If netdev_ops->ndo_init() succeeds, but something else fails inside
of register_netdevice(), it does call ndo_ops->ndo_uninit(). But
it is not able to invoke netdev->destructor().
This is because netdev->destructor() will do a free_netdev() and
then the caller of register_netdevice() will do the same.
However, this means that the resources that would normally be released
by netdev->destructor() will not be.
Over the years drivers have added local hacks to deal with this, by
invoking their destructor parts by hand when register_netdevice()
fails.
Many drivers do not try to deal with this, and instead we have leaks.
Let's close this hole by formalizing the distinction between what
private things need to be freed up by netdev->destructor() and whether
the driver needs unregister_netdevice() to perform the free_netdev().
netdev->priv_destructor() performs all actions to free up the private
resources that used to be freed by netdev->destructor(), except for
free_netdev().
netdev->needs_free_netdev is a boolean that indicates whether
free_netdev() should be done at the end of unregister_netdevice().
Now, register_netdevice() can sanely release all resources after
ndo_ops->ndo_init() succeeds, by invoking both ndo_ops->ndo_uninit()
and netdev->priv_destructor().
And at the end of unregister_netdevice(), we invoke
netdev->priv_destructor() and optionally call free_netdev().
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-05-09 00:52:56 +08:00
|
|
|
dev->needs_free_netdev = true;
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
SET_NETDEV_DEVTYPE(dev, &geneve_type);
|
|
|
|
|
|
|
|
dev->features |= NETIF_F_LLTX;
|
|
|
|
dev->features |= NETIF_F_SG | NETIF_F_HW_CSUM;
|
|
|
|
dev->features |= NETIF_F_RXCSUM;
|
|
|
|
dev->features |= NETIF_F_GSO_SOFTWARE;
|
|
|
|
|
|
|
|
dev->hw_features |= NETIF_F_SG | NETIF_F_HW_CSUM | NETIF_F_RXCSUM;
|
|
|
|
dev->hw_features |= NETIF_F_GSO_SOFTWARE;
|
|
|
|
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
/* MTU range: 68 - (something less than 65535) */
|
|
|
|
dev->min_mtu = ETH_MIN_MTU;
|
|
|
|
/* The max_mtu calculation does not take account of GENEVE
|
|
|
|
* options, to avoid excluding potentially valid
|
|
|
|
* configurations. This will be further reduced by IPvX hdr size.
|
|
|
|
*/
|
|
|
|
dev->max_mtu = IP_MAX_MTU - GENEVE_BASE_HLEN - dev->hard_header_len;
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
netif_keep_dst(dev);
|
2016-02-17 22:31:35 +08:00
|
|
|
dev->priv_flags &= ~IFF_TX_SKB_SHARING;
|
2015-08-18 16:30:31 +08:00
|
|
|
dev->priv_flags |= IFF_LIVE_ADDR_CHANGE | IFF_NO_QUEUE;
|
2015-08-27 14:46:48 +08:00
|
|
|
eth_hw_addr_random(dev);
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct nla_policy geneve_policy[IFLA_GENEVE_MAX + 1] = {
|
|
|
|
[IFLA_GENEVE_ID] = { .type = NLA_U32 },
|
2019-12-10 02:31:43 +08:00
|
|
|
[IFLA_GENEVE_REMOTE] = { .len = sizeof_field(struct iphdr, daddr) },
|
2015-10-27 05:01:44 +08:00
|
|
|
[IFLA_GENEVE_REMOTE6] = { .len = sizeof(struct in6_addr) },
|
2015-06-02 03:51:34 +08:00
|
|
|
[IFLA_GENEVE_TTL] = { .type = NLA_U8 },
|
2015-06-02 03:51:35 +08:00
|
|
|
[IFLA_GENEVE_TOS] = { .type = NLA_U8 },
|
2016-03-09 10:00:04 +08:00
|
|
|
[IFLA_GENEVE_LABEL] = { .type = NLA_U32 },
|
2015-08-27 14:46:51 +08:00
|
|
|
[IFLA_GENEVE_PORT] = { .type = NLA_U16 },
|
2015-08-27 14:46:52 +08:00
|
|
|
[IFLA_GENEVE_COLLECT_METADATA] = { .type = NLA_FLAG },
|
2015-12-11 04:37:45 +08:00
|
|
|
[IFLA_GENEVE_UDP_CSUM] = { .type = NLA_U8 },
|
|
|
|
[IFLA_GENEVE_UDP_ZERO_CSUM6_TX] = { .type = NLA_U8 },
|
|
|
|
[IFLA_GENEVE_UDP_ZERO_CSUM6_RX] = { .type = NLA_U8 },
|
2018-09-12 10:04:21 +08:00
|
|
|
[IFLA_GENEVE_TTL_INHERIT] = { .type = NLA_U8 },
|
2018-11-08 19:19:19 +08:00
|
|
|
[IFLA_GENEVE_DF] = { .type = NLA_U8 },
|
2015-05-14 00:57:30 +08:00
|
|
|
};
|
|
|
|
|
2017-06-26 05:56:01 +08:00
|
|
|
static int geneve_validate(struct nlattr *tb[], struct nlattr *data[],
|
|
|
|
struct netlink_ext_ack *extack)
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
|
|
|
if (tb[IFLA_ADDRESS]) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN) {
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, tb[IFLA_ADDRESS],
|
|
|
|
"Provided link layer address is not Ethernet");
|
2015-05-14 00:57:30 +08:00
|
|
|
return -EINVAL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2017-08-09 16:09:28 +08:00
|
|
|
if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS]))) {
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, tb[IFLA_ADDRESS],
|
|
|
|
"Provided Ethernet address is not unicast");
|
2015-05-14 00:57:30 +08:00
|
|
|
return -EADDRNOTAVAIL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
2017-08-09 16:09:28 +08:00
|
|
|
if (!data) {
|
|
|
|
NL_SET_ERR_MSG(extack,
|
|
|
|
"Not enough attributes provided to perform the operation");
|
2015-05-14 00:57:30 +08:00
|
|
|
return -EINVAL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
if (data[IFLA_GENEVE_ID]) {
|
|
|
|
__u32 vni = nla_get_u32(data[IFLA_GENEVE_ID]);
|
|
|
|
|
2017-08-09 16:09:28 +08:00
|
|
|
if (vni >= GENEVE_N_VID) {
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_ID],
|
|
|
|
"Geneve ID must be lower than 16777216");
|
2015-05-14 00:57:30 +08:00
|
|
|
return -ERANGE;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
2018-11-08 19:19:19 +08:00
|
|
|
if (data[IFLA_GENEVE_DF]) {
|
|
|
|
enum ifla_geneve_df df = nla_get_u8(data[IFLA_GENEVE_DF]);
|
|
|
|
|
|
|
|
if (df < 0 || df > GENEVE_DF_MAX) {
|
2020-04-22 23:29:51 +08:00
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_DF],
|
2018-11-08 19:19:19 +08:00
|
|
|
"Invalid DF attribute");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:54 +08:00
|
|
|
static struct geneve_dev *geneve_find_dev(struct geneve_net *gn,
|
2016-11-22 03:02:58 +08:00
|
|
|
const struct ip_tunnel_info *info,
|
2015-08-27 14:46:54 +08:00
|
|
|
bool *tun_on_same_port,
|
|
|
|
bool *tun_collect_md)
|
|
|
|
{
|
2016-11-22 03:02:58 +08:00
|
|
|
struct geneve_dev *geneve, *t = NULL;
|
2015-08-27 14:46:54 +08:00
|
|
|
|
|
|
|
*tun_on_same_port = false;
|
|
|
|
*tun_collect_md = false;
|
|
|
|
list_for_each_entry(geneve, &gn->geneve_list, next) {
|
2020-07-06 23:18:08 +08:00
|
|
|
if (info->key.tp_dst == geneve->cfg.info.key.tp_dst) {
|
|
|
|
*tun_collect_md = geneve->cfg.collect_md;
|
2015-08-27 14:46:54 +08:00
|
|
|
*tun_on_same_port = true;
|
|
|
|
}
|
2020-07-06 23:18:08 +08:00
|
|
|
if (info->key.tun_id == geneve->cfg.info.key.tun_id &&
|
|
|
|
info->key.tp_dst == geneve->cfg.info.key.tp_dst &&
|
|
|
|
!memcmp(&info->key.u, &geneve->cfg.info.key.u, sizeof(info->key.u)))
|
2015-08-27 14:46:54 +08:00
|
|
|
t = geneve;
|
|
|
|
}
|
|
|
|
return t;
|
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
static bool is_tnl_info_zero(const struct ip_tunnel_info *info)
|
|
|
|
{
|
2017-10-20 19:31:36 +08:00
|
|
|
return !(info->key.tun_id || info->key.tun_flags || info->key.tos ||
|
|
|
|
info->key.ttl || info->key.label || info->key.tp_src ||
|
|
|
|
memchr_inv(&info->key.u, 0, sizeof(info->key.u)));
|
2016-11-22 03:02:58 +08:00
|
|
|
}
|
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
static bool geneve_dst_addr_equal(struct ip_tunnel_info *a,
|
|
|
|
struct ip_tunnel_info *b)
|
|
|
|
{
|
|
|
|
if (ip_tunnel_info_af(a) == AF_INET)
|
|
|
|
return a->key.u.ipv4.dst == b->key.u.ipv4.dst;
|
|
|
|
else
|
|
|
|
return ipv6_addr_equal(&a->key.u.ipv6.dst, &b->key.u.ipv6.dst);
|
|
|
|
}
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
static int geneve_configure(struct net *net, struct net_device *dev,
|
2017-08-09 16:09:28 +08:00
|
|
|
struct netlink_ext_ack *extack,
|
2020-07-06 23:18:08 +08:00
|
|
|
const struct geneve_config *cfg)
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
2015-08-27 14:46:54 +08:00
|
|
|
struct geneve_dev *t, *geneve = netdev_priv(dev);
|
2020-07-06 23:18:08 +08:00
|
|
|
const struct ip_tunnel_info *info = &cfg->info;
|
2015-08-27 14:46:54 +08:00
|
|
|
bool tun_collect_md, tun_on_same_port;
|
2015-12-23 23:54:27 +08:00
|
|
|
int err, encap_len;
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (cfg->collect_md && !is_tnl_info_zero(info)) {
|
2017-08-09 16:09:28 +08:00
|
|
|
NL_SET_ERR_MSG(extack,
|
|
|
|
"Device is externally controlled, so attributes (VNI, Port, and so on) must not be specified");
|
2015-10-27 05:01:44 +08:00
|
|
|
return -EINVAL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
geneve->net = net;
|
|
|
|
geneve->dev = dev;
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
t = geneve_find_dev(gn, info, &tun_on_same_port, &tun_collect_md);
|
2015-08-27 14:46:54 +08:00
|
|
|
if (t)
|
|
|
|
return -EBUSY;
|
|
|
|
|
2015-12-23 23:54:27 +08:00
|
|
|
/* make enough headroom for basic scenario */
|
|
|
|
encap_len = GENEVE_BASE_HLEN + ETH_HLEN;
|
2020-07-06 23:18:08 +08:00
|
|
|
if (!cfg->collect_md && ip_tunnel_info_af(info) == AF_INET) {
|
2015-12-23 23:54:27 +08:00
|
|
|
encap_len += sizeof(struct iphdr);
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
dev->max_mtu -= sizeof(struct iphdr);
|
|
|
|
} else {
|
2015-12-23 23:54:27 +08:00
|
|
|
encap_len += sizeof(struct ipv6hdr);
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
dev->max_mtu -= sizeof(struct ipv6hdr);
|
|
|
|
}
|
2015-12-23 23:54:27 +08:00
|
|
|
dev->needed_headroom = encap_len + ETH_HLEN;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (cfg->collect_md) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (tun_on_same_port) {
|
|
|
|
NL_SET_ERR_MSG(extack,
|
|
|
|
"There can be only one externally controlled device on a destination port");
|
2015-08-27 14:46:54 +08:00
|
|
|
return -EPERM;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-08-27 14:46:54 +08:00
|
|
|
} else {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (tun_collect_md) {
|
|
|
|
NL_SET_ERR_MSG(extack,
|
|
|
|
"There already exists an externally controlled device on this destination port");
|
2015-08-27 14:46:54 +08:00
|
|
|
return -EPERM;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-08-27 14:46:54 +08:00
|
|
|
}
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
dst_cache_reset(&geneve->cfg.info.dst_cache);
|
|
|
|
memcpy(&geneve->cfg, cfg, sizeof(*cfg));
|
2016-02-12 22:43:58 +08:00
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
err = register_netdevice(dev);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
list_add(&geneve->next, &gn->geneve_list);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
static void init_tnl_info(struct ip_tunnel_info *info, __u16 dst_port)
|
|
|
|
{
|
|
|
|
memset(info, 0, sizeof(*info));
|
|
|
|
info->key.tp_dst = htons(dst_port);
|
|
|
|
}
|
|
|
|
|
2017-08-09 16:09:28 +08:00
|
|
|
static int geneve_nl2info(struct nlattr *tb[], struct nlattr *data[],
|
|
|
|
struct netlink_ext_ack *extack,
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config *cfg, bool changelink)
|
2015-08-27 14:46:52 +08:00
|
|
|
{
|
2020-07-06 23:18:08 +08:00
|
|
|
struct ip_tunnel_info *info = &cfg->info;
|
2017-08-09 16:09:28 +08:00
|
|
|
int attrtype;
|
|
|
|
|
|
|
|
if (data[IFLA_GENEVE_REMOTE] && data[IFLA_GENEVE_REMOTE6]) {
|
|
|
|
NL_SET_ERR_MSG(extack,
|
|
|
|
"Cannot specify both IPv4 and IPv6 Remote addresses");
|
2015-10-27 05:01:44 +08:00
|
|
|
return -EINVAL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2015-10-27 05:01:44 +08:00
|
|
|
|
|
|
|
if (data[IFLA_GENEVE_REMOTE]) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink && (ip_tunnel_info_af(info) == AF_INET6)) {
|
|
|
|
attrtype = IFLA_GENEVE_REMOTE;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
|
|
|
|
info->key.u.ipv4.dst =
|
2015-10-27 05:01:44 +08:00
|
|
|
nla_get_in_addr(data[IFLA_GENEVE_REMOTE]);
|
2016-11-22 03:02:58 +08:00
|
|
|
|
2019-09-03 07:29:36 +08:00
|
|
|
if (ipv4_is_multicast(info->key.u.ipv4.dst)) {
|
2017-08-09 16:09:28 +08:00
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_REMOTE],
|
|
|
|
"Remote IPv4 address cannot be Multicast");
|
2016-11-22 03:02:58 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (data[IFLA_GENEVE_REMOTE6]) {
|
2018-04-19 20:42:29 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink && (ip_tunnel_info_af(info) == AF_INET)) {
|
|
|
|
attrtype = IFLA_GENEVE_REMOTE6;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
|
|
|
|
info->mode = IP_TUNNEL_INFO_IPV6;
|
|
|
|
info->key.u.ipv6.dst =
|
2015-10-27 05:01:44 +08:00
|
|
|
nla_get_in6_addr(data[IFLA_GENEVE_REMOTE6]);
|
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (ipv6_addr_type(&info->key.u.ipv6.dst) &
|
2015-10-27 05:01:44 +08:00
|
|
|
IPV6_ADDR_LINKLOCAL) {
|
2017-08-09 16:09:28 +08:00
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_REMOTE6],
|
|
|
|
"Remote IPv6 address cannot be link-local");
|
2015-10-27 05:01:44 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
if (ipv6_addr_is_multicast(&info->key.u.ipv6.dst)) {
|
2017-08-09 16:09:28 +08:00
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_REMOTE6],
|
|
|
|
"Remote IPv6 address cannot be Multicast");
|
2016-11-22 03:02:58 +08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.tun_flags |= TUNNEL_CSUM;
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->use_udp6_rx_checksums = true;
|
2016-11-22 03:02:58 +08:00
|
|
|
#else
|
2017-08-09 16:09:28 +08:00
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_REMOTE6],
|
|
|
|
"IPv6 support not enabled in the kernel");
|
2016-11-22 03:02:58 +08:00
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
#endif
|
2015-10-27 05:01:44 +08:00
|
|
|
}
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
if (data[IFLA_GENEVE_ID]) {
|
|
|
|
__u32 vni;
|
|
|
|
__u8 tvni[3];
|
2017-07-21 13:44:20 +08:00
|
|
|
__be64 tunid;
|
2016-11-22 03:02:58 +08:00
|
|
|
|
2015-10-17 07:36:00 +08:00
|
|
|
vni = nla_get_u32(data[IFLA_GENEVE_ID]);
|
2016-11-22 03:02:58 +08:00
|
|
|
tvni[0] = (vni & 0x00ff0000) >> 16;
|
|
|
|
tvni[1] = (vni & 0x0000ff00) >> 8;
|
|
|
|
tvni[2] = vni & 0x000000ff;
|
2015-08-27 14:46:52 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
tunid = vni_to_tunnel_id(tvni);
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink && (tunid != info->key.tun_id)) {
|
|
|
|
attrtype = IFLA_GENEVE_ID;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.tun_id = tunid;
|
2016-11-22 03:02:58 +08:00
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
|
2018-09-29 23:06:29 +08:00
|
|
|
if (data[IFLA_GENEVE_TTL_INHERIT]) {
|
|
|
|
if (nla_get_u8(data[IFLA_GENEVE_TTL_INHERIT]))
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->ttl_inherit = true;
|
2018-09-29 23:06:29 +08:00
|
|
|
else
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->ttl_inherit = false;
|
2018-09-29 23:06:29 +08:00
|
|
|
} else if (data[IFLA_GENEVE_TTL]) {
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.ttl = nla_get_u8(data[IFLA_GENEVE_TTL]);
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->ttl_inherit = false;
|
2018-09-29 23:06:29 +08:00
|
|
|
}
|
2018-09-12 10:04:21 +08:00
|
|
|
|
2015-06-02 03:51:35 +08:00
|
|
|
if (data[IFLA_GENEVE_TOS])
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.tos = nla_get_u8(data[IFLA_GENEVE_TOS]);
|
2015-06-02 03:51:35 +08:00
|
|
|
|
2018-11-08 19:19:19 +08:00
|
|
|
if (data[IFLA_GENEVE_DF])
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->df = nla_get_u8(data[IFLA_GENEVE_DF]);
|
2018-11-08 19:19:19 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
if (data[IFLA_GENEVE_LABEL]) {
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.label = nla_get_be32(data[IFLA_GENEVE_LABEL]) &
|
2016-11-22 03:02:58 +08:00
|
|
|
IPV6_FLOWLABEL_MASK;
|
2017-08-09 16:09:28 +08:00
|
|
|
if (info->key.label && (!(info->mode & IP_TUNNEL_INFO_IPV6))) {
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_LABEL],
|
|
|
|
"Label attribute only applies for IPv6 Geneve devices");
|
2016-11-22 03:02:58 +08:00
|
|
|
return -EINVAL;
|
2017-08-09 16:09:28 +08:00
|
|
|
}
|
2016-11-22 03:02:58 +08:00
|
|
|
}
|
2016-03-09 10:00:04 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (data[IFLA_GENEVE_PORT]) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink) {
|
|
|
|
attrtype = IFLA_GENEVE_PORT;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
info->key.tp_dst = nla_get_be16(data[IFLA_GENEVE_PORT]);
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (data[IFLA_GENEVE_COLLECT_METADATA]) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink) {
|
|
|
|
attrtype = IFLA_GENEVE_COLLECT_METADATA;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->collect_md = true;
|
2017-07-21 13:44:20 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (data[IFLA_GENEVE_UDP_CSUM]) {
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink) {
|
|
|
|
attrtype = IFLA_GENEVE_UDP_CSUM;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
if (nla_get_u8(data[IFLA_GENEVE_UDP_CSUM]))
|
|
|
|
info->key.tun_flags |= TUNNEL_CSUM;
|
|
|
|
}
|
2015-12-11 04:37:45 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (data[IFLA_GENEVE_UDP_ZERO_CSUM6_TX]) {
|
2017-11-23 11:27:24 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink) {
|
|
|
|
attrtype = IFLA_GENEVE_UDP_ZERO_CSUM6_TX;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
if (nla_get_u8(data[IFLA_GENEVE_UDP_ZERO_CSUM6_TX]))
|
|
|
|
info->key.tun_flags &= ~TUNNEL_CSUM;
|
2017-11-23 11:27:24 +08:00
|
|
|
#else
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_UDP_ZERO_CSUM6_TX],
|
|
|
|
"IPv6 support not enabled in the kernel");
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
#endif
|
2017-07-21 13:44:20 +08:00
|
|
|
}
|
2015-12-11 04:37:45 +08:00
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
if (data[IFLA_GENEVE_UDP_ZERO_CSUM6_RX]) {
|
2017-11-23 11:27:24 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-08-09 16:09:28 +08:00
|
|
|
if (changelink) {
|
|
|
|
attrtype = IFLA_GENEVE_UDP_ZERO_CSUM6_RX;
|
|
|
|
goto change_notsup;
|
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
if (nla_get_u8(data[IFLA_GENEVE_UDP_ZERO_CSUM6_RX]))
|
2020-07-06 23:18:08 +08:00
|
|
|
cfg->use_udp6_rx_checksums = false;
|
2017-11-23 11:27:24 +08:00
|
|
|
#else
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_UDP_ZERO_CSUM6_RX],
|
|
|
|
"IPv6 support not enabled in the kernel");
|
|
|
|
return -EPFNOSUPPORT;
|
|
|
|
#endif
|
2017-07-21 13:44:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2017-08-09 16:09:28 +08:00
|
|
|
change_notsup:
|
|
|
|
NL_SET_ERR_MSG_ATTR(extack, data[attrtype],
|
|
|
|
"Changing VNI, Port, endpoint IP address family, external, and UDP checksum attributes are not supported");
|
|
|
|
return -EOPNOTSUPP;
|
2017-07-21 13:44:20 +08:00
|
|
|
}
|
|
|
|
|
geneve: configure MTU based on a lower device
Currently, on a new link creation or when 'remote' address parameter
is updated, an MTU is not changed and always equals 1500. When a lower
device has a larger MTU, it might not be efficient, e.g. for UDP, and
requires the manual MTU adjustments to match the MTU of the lower
device.
This patch tries to automate this process, finds a lower device using
the 'remote' address parameter, then uses its MTU to tune GENEVE's MTU:
* on a new link creation
* when 'remote' parameter is changed
Also with this patch, the MTU from a user, on a new link creation, is
passed to geneve_change_mtu() where it is verified, and MTU adjustments
with a lower device is skipped in that case. Prior that change, it was
possible to set the invalid MTU values on a new link creation.
Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-04-19 20:42:32 +08:00
|
|
|
static void geneve_link_config(struct net_device *dev,
|
|
|
|
struct ip_tunnel_info *info, struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
int ldev_mtu = 0;
|
|
|
|
|
|
|
|
if (tb[IFLA_MTU]) {
|
|
|
|
geneve_change_mtu(dev, nla_get_u32(tb[IFLA_MTU]));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (ip_tunnel_info_af(info)) {
|
|
|
|
case AF_INET: {
|
|
|
|
struct flowi4 fl4 = { .daddr = info->key.u.ipv4.dst };
|
|
|
|
struct rtable *rt = ip_route_output_key(geneve->net, &fl4);
|
|
|
|
|
|
|
|
if (!IS_ERR(rt) && rt->dst.dev) {
|
|
|
|
ldev_mtu = rt->dst.dev->mtu - GENEVE_IPV4_HLEN;
|
|
|
|
ip_rt_put(rt);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
case AF_INET6: {
|
2019-02-07 18:36:10 +08:00
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
if (!__in6_dev_get(dev))
|
|
|
|
break;
|
|
|
|
|
|
|
|
rt = rt6_lookup(geneve->net, &info->key.u.ipv6.dst, NULL, 0,
|
|
|
|
NULL, 0);
|
geneve: configure MTU based on a lower device
Currently, on a new link creation or when 'remote' address parameter
is updated, an MTU is not changed and always equals 1500. When a lower
device has a larger MTU, it might not be efficient, e.g. for UDP, and
requires the manual MTU adjustments to match the MTU of the lower
device.
This patch tries to automate this process, finds a lower device using
the 'remote' address parameter, then uses its MTU to tune GENEVE's MTU:
* on a new link creation
* when 'remote' parameter is changed
Also with this patch, the MTU from a user, on a new link creation, is
passed to geneve_change_mtu() where it is verified, and MTU adjustments
with a lower device is skipped in that case. Prior that change, it was
possible to set the invalid MTU values on a new link creation.
Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-04-19 20:42:32 +08:00
|
|
|
|
|
|
|
if (rt && rt->dst.dev)
|
|
|
|
ldev_mtu = rt->dst.dev->mtu - GENEVE_IPV6_HLEN;
|
|
|
|
ip6_rt_put(rt);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ldev_mtu <= 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
geneve_change_mtu(dev, ldev_mtu - info->options_len);
|
|
|
|
}
|
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
static int geneve_newlink(struct net *net, struct net_device *dev,
|
|
|
|
struct nlattr *tb[], struct nlattr *data[],
|
|
|
|
struct netlink_ext_ack *extack)
|
|
|
|
{
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config cfg = {
|
|
|
|
.df = GENEVE_DF_UNSET,
|
|
|
|
.use_udp6_rx_checksums = false,
|
|
|
|
.ttl_inherit = false,
|
|
|
|
.collect_md = false,
|
|
|
|
};
|
2017-07-21 13:44:20 +08:00
|
|
|
int err;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
init_tnl_info(&cfg.info, GENEVE_UDP_PORT);
|
|
|
|
err = geneve_nl2info(tb, data, extack, &cfg, false);
|
2017-07-21 13:44:20 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
2015-12-11 04:37:45 +08:00
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
err = geneve_configure(net, dev, extack, &cfg);
|
geneve: configure MTU based on a lower device
Currently, on a new link creation or when 'remote' address parameter
is updated, an MTU is not changed and always equals 1500. When a lower
device has a larger MTU, it might not be efficient, e.g. for UDP, and
requires the manual MTU adjustments to match the MTU of the lower
device.
This patch tries to automate this process, finds a lower device using
the 'remote' address parameter, then uses its MTU to tune GENEVE's MTU:
* on a new link creation
* when 'remote' parameter is changed
Also with this patch, the MTU from a user, on a new link creation, is
passed to geneve_change_mtu() where it is verified, and MTU adjustments
with a lower device is skipped in that case. Prior that change, it was
possible to set the invalid MTU values on a new link creation.
Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-04-19 20:42:32 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
geneve_link_config(dev, &cfg.info, tb);
|
geneve: configure MTU based on a lower device
Currently, on a new link creation or when 'remote' address parameter
is updated, an MTU is not changed and always equals 1500. When a lower
device has a larger MTU, it might not be efficient, e.g. for UDP, and
requires the manual MTU adjustments to match the MTU of the lower
device.
This patch tries to automate this process, finds a lower device using
the 'remote' address parameter, then uses its MTU to tune GENEVE's MTU:
* on a new link creation
* when 'remote' parameter is changed
Also with this patch, the MTU from a user, on a new link creation, is
passed to geneve_change_mtu() where it is verified, and MTU adjustments
with a lower device is skipped in that case. Prior that change, it was
possible to set the invalid MTU values on a new link creation.
Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-04-19 20:42:32 +08:00
|
|
|
|
|
|
|
return 0;
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
2017-07-21 13:44:20 +08:00
|
|
|
/* Quiesces the geneve device data path for both TX and RX.
|
|
|
|
*
|
|
|
|
* On transmit geneve checks for non-NULL geneve_sock before it proceeds.
|
|
|
|
* So, if we set that socket to NULL under RCU and wait for synchronize_net()
|
|
|
|
* to complete for the existing set of in-flight packets to be transmitted,
|
|
|
|
* then we would have quiesced the transmit data path. All the future packets
|
|
|
|
* will get dropped until we unquiesce the data path.
|
|
|
|
*
|
|
|
|
* On receive geneve dereference the geneve_sock stashed in the socket. So,
|
|
|
|
* if we set that to NULL under RCU and wait for synchronize_net() to
|
|
|
|
* complete, then we would have quiesced the receive data path.
|
|
|
|
*/
|
|
|
|
static void geneve_quiesce(struct geneve_dev *geneve, struct geneve_sock **gs4,
|
|
|
|
struct geneve_sock **gs6)
|
|
|
|
{
|
|
|
|
*gs4 = rtnl_dereference(geneve->sock4);
|
|
|
|
rcu_assign_pointer(geneve->sock4, NULL);
|
|
|
|
if (*gs4)
|
|
|
|
rcu_assign_sk_user_data((*gs4)->sock->sk, NULL);
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
*gs6 = rtnl_dereference(geneve->sock6);
|
|
|
|
rcu_assign_pointer(geneve->sock6, NULL);
|
|
|
|
if (*gs6)
|
|
|
|
rcu_assign_sk_user_data((*gs6)->sock->sk, NULL);
|
|
|
|
#else
|
|
|
|
*gs6 = NULL;
|
|
|
|
#endif
|
|
|
|
synchronize_net();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Resumes the geneve device data path for both TX and RX. */
|
|
|
|
static void geneve_unquiesce(struct geneve_dev *geneve, struct geneve_sock *gs4,
|
|
|
|
struct geneve_sock __maybe_unused *gs6)
|
|
|
|
{
|
|
|
|
rcu_assign_pointer(geneve->sock4, gs4);
|
|
|
|
if (gs4)
|
|
|
|
rcu_assign_sk_user_data(gs4->sock->sk, gs4);
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
rcu_assign_pointer(geneve->sock6, gs6);
|
|
|
|
if (gs6)
|
|
|
|
rcu_assign_sk_user_data(gs6->sock->sk, gs6);
|
|
|
|
#endif
|
|
|
|
synchronize_net();
|
|
|
|
}
|
|
|
|
|
|
|
|
static int geneve_changelink(struct net_device *dev, struct nlattr *tb[],
|
|
|
|
struct nlattr *data[],
|
|
|
|
struct netlink_ext_ack *extack)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
struct geneve_sock *gs4, *gs6;
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config cfg;
|
2017-07-21 13:44:20 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
/* If the geneve device is configured for metadata (or externally
|
|
|
|
* controlled, for example, OVS), then nothing can be changed.
|
|
|
|
*/
|
2020-07-06 23:18:08 +08:00
|
|
|
if (geneve->cfg.collect_md)
|
2017-07-21 13:44:20 +08:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
/* Start with the existing info. */
|
2020-07-06 23:18:08 +08:00
|
|
|
memcpy(&cfg, &geneve->cfg, sizeof(cfg));
|
|
|
|
err = geneve_nl2info(tb, data, extack, &cfg, true);
|
2017-07-21 13:44:20 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (!geneve_dst_addr_equal(&geneve->cfg.info, &cfg.info)) {
|
|
|
|
dst_cache_reset(&cfg.info.dst_cache);
|
|
|
|
geneve_link_config(dev, &cfg.info, tb);
|
geneve: configure MTU based on a lower device
Currently, on a new link creation or when 'remote' address parameter
is updated, an MTU is not changed and always equals 1500. When a lower
device has a larger MTU, it might not be efficient, e.g. for UDP, and
requires the manual MTU adjustments to match the MTU of the lower
device.
This patch tries to automate this process, finds a lower device using
the 'remote' address parameter, then uses its MTU to tune GENEVE's MTU:
* on a new link creation
* when 'remote' parameter is changed
Also with this patch, the MTU from a user, on a new link creation, is
passed to geneve_change_mtu() where it is verified, and MTU adjustments
with a lower device is skipped in that case. Prior that change, it was
possible to set the invalid MTU values on a new link creation.
Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2018-04-19 20:42:32 +08:00
|
|
|
}
|
2017-07-21 13:44:20 +08:00
|
|
|
|
|
|
|
geneve_quiesce(geneve, &gs4, &gs6);
|
2020-07-06 23:18:08 +08:00
|
|
|
memcpy(&geneve->cfg, &cfg, sizeof(cfg));
|
2017-07-21 13:44:20 +08:00
|
|
|
geneve_unquiesce(geneve, gs4, gs6);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
static void geneve_dellink(struct net_device *dev, struct list_head *head)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
|
|
|
|
|
|
|
list_del(&geneve->next);
|
|
|
|
unregister_netdevice_queue(dev, head);
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t geneve_get_size(const struct net_device *dev)
|
|
|
|
{
|
|
|
|
return nla_total_size(sizeof(__u32)) + /* IFLA_GENEVE_ID */
|
2015-10-27 05:01:44 +08:00
|
|
|
nla_total_size(sizeof(struct in6_addr)) + /* IFLA_GENEVE_REMOTE{6} */
|
2015-06-02 03:51:34 +08:00
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_TTL */
|
2015-06-02 03:51:35 +08:00
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_TOS */
|
2018-11-08 19:19:19 +08:00
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_DF */
|
2016-03-09 10:00:04 +08:00
|
|
|
nla_total_size(sizeof(__be32)) + /* IFLA_GENEVE_LABEL */
|
2015-09-23 01:09:32 +08:00
|
|
|
nla_total_size(sizeof(__be16)) + /* IFLA_GENEVE_PORT */
|
2015-08-27 14:46:52 +08:00
|
|
|
nla_total_size(0) + /* IFLA_GENEVE_COLLECT_METADATA */
|
2015-12-11 04:37:45 +08:00
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_UDP_CSUM */
|
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_UDP_ZERO_CSUM6_TX */
|
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_UDP_ZERO_CSUM6_RX */
|
2018-09-12 10:04:21 +08:00
|
|
|
nla_total_size(sizeof(__u8)) + /* IFLA_GENEVE_TTL_INHERIT */
|
2015-05-14 00:57:30 +08:00
|
|
|
0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int geneve_fill_info(struct sk_buff *skb, const struct net_device *dev)
|
|
|
|
{
|
|
|
|
struct geneve_dev *geneve = netdev_priv(dev);
|
2020-07-06 23:18:08 +08:00
|
|
|
struct ip_tunnel_info *info = &geneve->cfg.info;
|
|
|
|
bool ttl_inherit = geneve->cfg.ttl_inherit;
|
|
|
|
bool metadata = geneve->cfg.collect_md;
|
2016-11-22 03:02:58 +08:00
|
|
|
__u8 tmp_vni[3];
|
2015-05-14 00:57:30 +08:00
|
|
|
__u32 vni;
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
tunnel_id_to_vni(info->key.tun_id, tmp_vni);
|
|
|
|
vni = (tmp_vni[0] << 16) | (tmp_vni[1] << 8) | tmp_vni[2];
|
2015-05-14 00:57:30 +08:00
|
|
|
if (nla_put_u32(skb, IFLA_GENEVE_ID, vni))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2017-11-15 09:43:09 +08:00
|
|
|
if (!metadata && ip_tunnel_info_af(info) == AF_INET) {
|
2015-10-27 05:01:44 +08:00
|
|
|
if (nla_put_in_addr(skb, IFLA_GENEVE_REMOTE,
|
2016-11-22 03:02:58 +08:00
|
|
|
info->key.u.ipv4.dst))
|
|
|
|
goto nla_put_failure;
|
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_UDP_CSUM,
|
|
|
|
!!(info->key.tun_flags & TUNNEL_CSUM)))
|
2015-10-27 05:01:44 +08:00
|
|
|
goto nla_put_failure;
|
2016-11-22 03:02:58 +08:00
|
|
|
|
2015-10-27 05:01:44 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-11-15 09:43:09 +08:00
|
|
|
} else if (!metadata) {
|
2015-10-27 05:01:44 +08:00
|
|
|
if (nla_put_in6_addr(skb, IFLA_GENEVE_REMOTE6,
|
2016-11-22 03:02:58 +08:00
|
|
|
&info->key.u.ipv6.dst))
|
|
|
|
goto nla_put_failure;
|
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_UDP_ZERO_CSUM6_TX,
|
|
|
|
!(info->key.tun_flags & TUNNEL_CSUM)))
|
|
|
|
goto nla_put_failure;
|
2017-05-24 06:37:27 +08:00
|
|
|
#endif
|
2017-11-15 09:43:09 +08:00
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_TTL, info->key.ttl) ||
|
|
|
|
nla_put_u8(skb, IFLA_GENEVE_TOS, info->key.tos) ||
|
|
|
|
nla_put_be32(skb, IFLA_GENEVE_LABEL, info->key.label))
|
2015-06-02 03:51:34 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_DF, geneve->cfg.df))
|
2018-11-08 19:19:19 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2016-11-22 03:02:58 +08:00
|
|
|
if (nla_put_be16(skb, IFLA_GENEVE_PORT, info->key.tp_dst))
|
2015-08-27 14:46:51 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2017-11-15 09:43:09 +08:00
|
|
|
if (metadata && nla_put_flag(skb, IFLA_GENEVE_COLLECT_METADATA))
|
2017-11-23 11:27:24 +08:00
|
|
|
goto nla_put_failure;
|
2017-11-15 09:43:09 +08:00
|
|
|
|
2017-11-23 11:27:24 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2017-11-15 09:43:09 +08:00
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_UDP_ZERO_CSUM6_RX,
|
2020-07-06 23:18:08 +08:00
|
|
|
!geneve->cfg.use_udp6_rx_checksums))
|
2017-11-15 09:43:09 +08:00
|
|
|
goto nla_put_failure;
|
2017-11-23 11:27:24 +08:00
|
|
|
#endif
|
2017-11-15 09:43:09 +08:00
|
|
|
|
2018-09-12 10:04:21 +08:00
|
|
|
if (nla_put_u8(skb, IFLA_GENEVE_TTL_INHERIT, ttl_inherit))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct rtnl_link_ops geneve_link_ops __read_mostly = {
|
|
|
|
.kind = "geneve",
|
|
|
|
.maxtype = IFLA_GENEVE_MAX,
|
|
|
|
.policy = geneve_policy,
|
|
|
|
.priv_size = sizeof(struct geneve_dev),
|
|
|
|
.setup = geneve_setup,
|
|
|
|
.validate = geneve_validate,
|
|
|
|
.newlink = geneve_newlink,
|
2017-07-21 13:44:20 +08:00
|
|
|
.changelink = geneve_changelink,
|
2015-05-14 00:57:30 +08:00
|
|
|
.dellink = geneve_dellink,
|
|
|
|
.get_size = geneve_get_size,
|
|
|
|
.fill_info = geneve_fill_info,
|
|
|
|
};
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
struct net_device *geneve_dev_create_fb(struct net *net, const char *name,
|
|
|
|
u8 name_assign_type, u16 dst_port)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[IFLA_MAX + 1];
|
|
|
|
struct net_device *dev;
|
2016-06-13 16:31:04 +08:00
|
|
|
LIST_HEAD(list_kill);
|
2015-08-27 14:46:52 +08:00
|
|
|
int err;
|
2020-07-06 23:18:08 +08:00
|
|
|
struct geneve_config cfg = {
|
|
|
|
.df = GENEVE_DF_UNSET,
|
|
|
|
.use_udp6_rx_checksums = true,
|
|
|
|
.ttl_inherit = false,
|
|
|
|
.collect_md = true,
|
|
|
|
};
|
2015-08-27 14:46:52 +08:00
|
|
|
|
|
|
|
memset(tb, 0, sizeof(tb));
|
|
|
|
dev = rtnl_create_link(net, name, name_assign_type,
|
2018-11-07 04:51:14 +08:00
|
|
|
&geneve_link_ops, tb, NULL);
|
2015-08-27 14:46:52 +08:00
|
|
|
if (IS_ERR(dev))
|
|
|
|
return dev;
|
|
|
|
|
2020-07-06 23:18:08 +08:00
|
|
|
init_tnl_info(&cfg.info, dst_port);
|
|
|
|
err = geneve_configure(net, dev, NULL, &cfg);
|
2016-06-13 16:31:04 +08:00
|
|
|
if (err) {
|
|
|
|
free_netdev(dev);
|
|
|
|
return ERR_PTR(err);
|
|
|
|
}
|
vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices
Prior to 4.3, openvswitch tunnel vports (vxlan, gre and geneve) could
transmit vxlan packets of any size, constrained only by the ability to
send out the resulting packets. 4.3 introduced netdevs corresponding
to tunnel vports. These netdevs have an MTU, which limits the size of
a packet that can be successfully encapsulated. The default MTU
values are low (1500 or less), which is awkwardly small in the context
of physical networks supporting jumbo frames, and leads to a
conspicuous change in behaviour for userspace.
Instead, set the MTU on openvswitch-created netdevs to be the relevant
maximum (i.e. the maximum IP packet size minus any relevant overhead),
effectively restoring the behaviour prior to 4.3.
Signed-off-by: David Wragg <david@weave.works>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-10 08:05:58 +08:00
|
|
|
|
|
|
|
/* openvswitch users expect packet sizes to be unrestricted,
|
|
|
|
* so set the largest MTU we can.
|
|
|
|
*/
|
net: use core MTU range checking in core net infra
geneve:
- Merge __geneve_change_mtu back into geneve_change_mtu, set max_mtu
- This one isn't quite as straight-forward as others, could use some
closer inspection and testing
macvlan:
- set min/max_mtu
tun:
- set min/max_mtu, remove tun_net_change_mtu
vxlan:
- Merge __vxlan_change_mtu back into vxlan_change_mtu
- Set max_mtu to IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
- This one is also not as straight-forward and could use closer inspection
and testing from vxlan folks
bridge:
- set max_mtu of IP_MAX_MTU and retain dynamic MTU range checks in
change_mtu function
openvswitch:
- set min/max_mtu, remove internal_dev_change_mtu
- note: max_mtu wasn't checked previously, it's been set to 65535, which
is the largest possible size supported
sch_teql:
- set min/max_mtu (note: max_mtu previously unchecked, used max of 65535)
macsec:
- min_mtu = 0, max_mtu = 65535
macvlan:
- min_mtu = 0, max_mtu = 65535
ntb_netdev:
- min_mtu = 0, max_mtu = 65535
veth:
- min_mtu = 68, max_mtu = 65535
8021q:
- min_mtu = 0, max_mtu = 65535
CC: netdev@vger.kernel.org
CC: Nicolas Dichtel <nicolas.dichtel@6wind.com>
CC: Hannes Frederic Sowa <hannes@stressinduktion.org>
CC: Tom Herbert <tom@herbertland.com>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: Alexander Duyck <alexander.h.duyck@intel.com>
CC: Paolo Abeni <pabeni@redhat.com>
CC: Jiri Benc <jbenc@redhat.com>
CC: WANG Cong <xiyou.wangcong@gmail.com>
CC: Roopa Prabhu <roopa@cumulusnetworks.com>
CC: Pravin B Shelar <pshelar@ovn.org>
CC: Sabrina Dubroca <sd@queasysnail.net>
CC: Patrick McHardy <kaber@trash.net>
CC: Stephen Hemminger <stephen@networkplumber.org>
CC: Pravin Shelar <pshelar@nicira.com>
CC: Maxim Krasnyansky <maxk@qti.qualcomm.com>
Signed-off-by: Jarod Wilson <jarod@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 01:55:20 +08:00
|
|
|
err = geneve_change_mtu(dev, IP_MAX_MTU);
|
vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices
Prior to 4.3, openvswitch tunnel vports (vxlan, gre and geneve) could
transmit vxlan packets of any size, constrained only by the ability to
send out the resulting packets. 4.3 introduced netdevs corresponding
to tunnel vports. These netdevs have an MTU, which limits the size of
a packet that can be successfully encapsulated. The default MTU
values are low (1500 or less), which is awkwardly small in the context
of physical networks supporting jumbo frames, and leads to a
conspicuous change in behaviour for userspace.
Instead, set the MTU on openvswitch-created netdevs to be the relevant
maximum (i.e. the maximum IP packet size minus any relevant overhead),
effectively restoring the behaviour prior to 4.3.
Signed-off-by: David Wragg <david@weave.works>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-10 08:05:58 +08:00
|
|
|
if (err)
|
|
|
|
goto err;
|
|
|
|
|
2016-06-13 16:31:07 +08:00
|
|
|
err = rtnl_configure_link(dev, NULL);
|
|
|
|
if (err < 0)
|
|
|
|
goto err;
|
|
|
|
|
2015-08-27 14:46:52 +08:00
|
|
|
return dev;
|
2016-11-22 03:02:58 +08:00
|
|
|
err:
|
2016-06-13 16:31:04 +08:00
|
|
|
geneve_dellink(dev, &list_kill);
|
|
|
|
unregister_netdevice_many(&list_kill);
|
vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices
Prior to 4.3, openvswitch tunnel vports (vxlan, gre and geneve) could
transmit vxlan packets of any size, constrained only by the ability to
send out the resulting packets. 4.3 introduced netdevs corresponding
to tunnel vports. These netdevs have an MTU, which limits the size of
a packet that can be successfully encapsulated. The default MTU
values are low (1500 or less), which is awkwardly small in the context
of physical networks supporting jumbo frames, and leads to a
conspicuous change in behaviour for userspace.
Instead, set the MTU on openvswitch-created netdevs to be the relevant
maximum (i.e. the maximum IP packet size minus any relevant overhead),
effectively restoring the behaviour prior to 4.3.
Signed-off-by: David Wragg <david@weave.works>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-10 08:05:58 +08:00
|
|
|
return ERR_PTR(err);
|
2015-08-27 14:46:52 +08:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(geneve_dev_create_fb);
|
|
|
|
|
2016-04-19 03:19:48 +08:00
|
|
|
static int geneve_netdevice_event(struct notifier_block *unused,
|
|
|
|
unsigned long event, void *ptr)
|
|
|
|
{
|
|
|
|
struct net_device *dev = netdev_notifier_info_to_dev(ptr);
|
|
|
|
|
2017-07-21 18:49:32 +08:00
|
|
|
if (event == NETDEV_UDP_TUNNEL_PUSH_INFO ||
|
2017-07-21 18:49:33 +08:00
|
|
|
event == NETDEV_UDP_TUNNEL_DROP_INFO) {
|
2017-07-21 18:49:32 +08:00
|
|
|
geneve_offload_rx_ports(dev, event == NETDEV_UDP_TUNNEL_PUSH_INFO);
|
2017-07-21 18:49:33 +08:00
|
|
|
} else if (event == NETDEV_UNREGISTER) {
|
2020-07-10 08:42:46 +08:00
|
|
|
if (!dev->udp_tunnel_nic_info)
|
|
|
|
geneve_offload_rx_ports(dev, false);
|
2017-07-21 18:49:33 +08:00
|
|
|
} else if (event == NETDEV_REGISTER) {
|
2020-07-10 08:42:46 +08:00
|
|
|
if (!dev->udp_tunnel_nic_info)
|
|
|
|
geneve_offload_rx_ports(dev, true);
|
2017-07-21 18:49:33 +08:00
|
|
|
}
|
2016-04-19 03:19:48 +08:00
|
|
|
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block geneve_notifier_block __read_mostly = {
|
|
|
|
.notifier_call = geneve_netdevice_event,
|
|
|
|
};
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
static __net_init int geneve_init_net(struct net *net)
|
|
|
|
{
|
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&gn->geneve_list);
|
2015-08-27 14:46:54 +08:00
|
|
|
INIT_LIST_HEAD(&gn->sock_list);
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-12-16 17:54:50 +08:00
|
|
|
static void geneve_destroy_tunnels(struct net *net, struct list_head *head)
|
2015-05-14 00:57:30 +08:00
|
|
|
{
|
|
|
|
struct geneve_net *gn = net_generic(net, geneve_net_id);
|
|
|
|
struct geneve_dev *geneve, *next;
|
|
|
|
struct net_device *dev, *aux;
|
|
|
|
|
|
|
|
/* gather any geneve devices that were moved into this ns */
|
|
|
|
for_each_netdev_safe(net, dev, aux)
|
|
|
|
if (dev->rtnl_link_ops == &geneve_link_ops)
|
2017-12-16 17:54:50 +08:00
|
|
|
unregister_netdevice_queue(dev, head);
|
2015-05-14 00:57:30 +08:00
|
|
|
|
|
|
|
/* now gather any other geneve devices that were created in this ns */
|
|
|
|
list_for_each_entry_safe(geneve, next, &gn->geneve_list, next) {
|
|
|
|
/* If geneve->dev is in the same netns, it was already added
|
|
|
|
* to the list by the previous loop.
|
|
|
|
*/
|
|
|
|
if (!net_eq(dev_net(geneve->dev), net))
|
2017-12-16 17:54:50 +08:00
|
|
|
unregister_netdevice_queue(geneve->dev, head);
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
2017-12-16 17:54:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __net_exit geneve_exit_batch_net(struct list_head *net_list)
|
|
|
|
{
|
|
|
|
struct net *net;
|
|
|
|
LIST_HEAD(list);
|
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
list_for_each_entry(net, net_list, exit_list)
|
|
|
|
geneve_destroy_tunnels(net, &list);
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
/* unregister the devices gathered above */
|
|
|
|
unregister_netdevice_many(&list);
|
|
|
|
rtnl_unlock();
|
2020-03-14 15:18:42 +08:00
|
|
|
|
|
|
|
list_for_each_entry(net, net_list, exit_list) {
|
|
|
|
const struct geneve_net *gn = net_generic(net, geneve_net_id);
|
|
|
|
|
|
|
|
WARN_ON_ONCE(!list_empty(&gn->sock_list));
|
|
|
|
}
|
2015-05-14 00:57:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations geneve_net_ops = {
|
|
|
|
.init = geneve_init_net,
|
2017-12-16 17:54:50 +08:00
|
|
|
.exit_batch = geneve_exit_batch_net,
|
2015-05-14 00:57:30 +08:00
|
|
|
.id = &geneve_net_id,
|
|
|
|
.size = sizeof(struct geneve_net),
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init geneve_init_module(void)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = register_pernet_subsys(&geneve_net_ops);
|
|
|
|
if (rc)
|
|
|
|
goto out1;
|
|
|
|
|
2016-04-19 03:19:48 +08:00
|
|
|
rc = register_netdevice_notifier(&geneve_notifier_block);
|
2015-05-14 00:57:30 +08:00
|
|
|
if (rc)
|
|
|
|
goto out2;
|
|
|
|
|
2016-04-19 03:19:48 +08:00
|
|
|
rc = rtnl_link_register(&geneve_link_ops);
|
|
|
|
if (rc)
|
|
|
|
goto out3;
|
|
|
|
|
2015-05-14 00:57:30 +08:00
|
|
|
return 0;
|
2016-04-19 03:19:48 +08:00
|
|
|
out3:
|
|
|
|
unregister_netdevice_notifier(&geneve_notifier_block);
|
2015-05-14 00:57:30 +08:00
|
|
|
out2:
|
|
|
|
unregister_pernet_subsys(&geneve_net_ops);
|
|
|
|
out1:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
late_initcall(geneve_init_module);
|
|
|
|
|
|
|
|
static void __exit geneve_cleanup_module(void)
|
|
|
|
{
|
|
|
|
rtnl_link_unregister(&geneve_link_ops);
|
2016-04-19 03:19:48 +08:00
|
|
|
unregister_netdevice_notifier(&geneve_notifier_block);
|
2015-05-14 00:57:30 +08:00
|
|
|
unregister_pernet_subsys(&geneve_net_ops);
|
|
|
|
}
|
|
|
|
module_exit(geneve_cleanup_module);
|
|
|
|
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_VERSION(GENEVE_NETDEV_VER);
|
|
|
|
MODULE_AUTHOR("John W. Linville <linville@tuxdriver.com>");
|
|
|
|
MODULE_DESCRIPTION("Interface driver for GENEVE encapsulated traffic");
|
|
|
|
MODULE_ALIAS_RTNL_LINK("geneve");
|