forked from luck/tmp_suning_uos_patched
netfilter: nft_tunnel: add support for geneve opts
Like vxlan and erspan opts, geneve opts should also be supported in nft_tunnel. The difference is geneve RFC (draft-ietf-nvo3-geneve-14) allows a geneve packet to carry multiple geneve opts. So with this patch, nftables/libnftnl would do: # nft add table ip filter # nft add chain ip filter input { type filter hook input priority 0 \; } # nft add tunnel filter geneve_02 { type geneve\; id 2\; \ ip saddr 192.168.1.1\; ip daddr 192.168.1.2\; \ sport 9000\; dport 9001\; dscp 1234\; ttl 64\; flags 1\; \ opts \"1:1:34567890,2:2:12121212,3:3:1212121234567890\"\; } # nft list tunnels table filter table ip filter { tunnel geneve_02 { id 2 ip saddr 192.168.1.1 ip daddr 192.168.1.2 sport 9000 dport 9001 tos 18 ttl 64 flags 1 geneve opts 1:1:34567890,2:2:12121212,3:3:1212121234567890 } } v1->v2: - no changes, just post it separately. Signed-off-by: Xin Long <lucien.xin@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
68983a354a
commit
925d844696
|
@ -1770,6 +1770,7 @@ enum nft_tunnel_opts_attributes {
|
|||
NFTA_TUNNEL_KEY_OPTS_UNSPEC,
|
||||
NFTA_TUNNEL_KEY_OPTS_VXLAN,
|
||||
NFTA_TUNNEL_KEY_OPTS_ERSPAN,
|
||||
NFTA_TUNNEL_KEY_OPTS_GENEVE,
|
||||
__NFTA_TUNNEL_KEY_OPTS_MAX
|
||||
};
|
||||
#define NFTA_TUNNEL_KEY_OPTS_MAX (__NFTA_TUNNEL_KEY_OPTS_MAX - 1)
|
||||
|
@ -1791,6 +1792,15 @@ enum nft_tunnel_opts_erspan_attributes {
|
|||
};
|
||||
#define NFTA_TUNNEL_KEY_ERSPAN_MAX (__NFTA_TUNNEL_KEY_ERSPAN_MAX - 1)
|
||||
|
||||
enum nft_tunnel_opts_geneve_attributes {
|
||||
NFTA_TUNNEL_KEY_GENEVE_UNSPEC,
|
||||
NFTA_TUNNEL_KEY_GENEVE_CLASS,
|
||||
NFTA_TUNNEL_KEY_GENEVE_TYPE,
|
||||
NFTA_TUNNEL_KEY_GENEVE_DATA,
|
||||
__NFTA_TUNNEL_KEY_GENEVE_MAX
|
||||
};
|
||||
#define NFTA_TUNNEL_KEY_GENEVE_MAX (__NFTA_TUNNEL_KEY_GENEVE_MAX - 1)
|
||||
|
||||
enum nft_tunnel_flags {
|
||||
NFT_TUNNEL_F_ZERO_CSUM_TX = (1 << 0),
|
||||
NFT_TUNNEL_F_DONT_FRAGMENT = (1 << 1),
|
||||
|
|
|
@ -11,6 +11,7 @@
|
|||
#include <net/ip_tunnels.h>
|
||||
#include <net/vxlan.h>
|
||||
#include <net/erspan.h>
|
||||
#include <net/geneve.h>
|
||||
|
||||
struct nft_tunnel {
|
||||
enum nft_tunnel_keys key:8;
|
||||
|
@ -144,6 +145,7 @@ struct nft_tunnel_opts {
|
|||
union {
|
||||
struct vxlan_metadata vxlan;
|
||||
struct erspan_metadata erspan;
|
||||
u8 data[IP_TUNNEL_OPTS_MAX];
|
||||
} u;
|
||||
u32 len;
|
||||
__be16 flags;
|
||||
|
@ -301,9 +303,53 @@ static int nft_tunnel_obj_erspan_init(const struct nlattr *attr,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static const struct nla_policy nft_tunnel_opts_geneve_policy[NFTA_TUNNEL_KEY_GENEVE_MAX + 1] = {
|
||||
[NFTA_TUNNEL_KEY_GENEVE_CLASS] = { .type = NLA_U16 },
|
||||
[NFTA_TUNNEL_KEY_GENEVE_TYPE] = { .type = NLA_U8 },
|
||||
[NFTA_TUNNEL_KEY_GENEVE_DATA] = { .type = NLA_BINARY, .len = 128 },
|
||||
};
|
||||
|
||||
static int nft_tunnel_obj_geneve_init(const struct nlattr *attr,
|
||||
struct nft_tunnel_opts *opts)
|
||||
{
|
||||
struct geneve_opt *opt = (struct geneve_opt *)opts->u.data + opts->len;
|
||||
struct nlattr *tb[NFTA_TUNNEL_KEY_GENEVE_MAX + 1];
|
||||
int err, data_len;
|
||||
|
||||
err = nla_parse_nested(tb, NFTA_TUNNEL_KEY_GENEVE_MAX, attr,
|
||||
nft_tunnel_opts_geneve_policy, NULL);
|
||||
if (err < 0)
|
||||
return err;
|
||||
|
||||
if (!tb[NFTA_TUNNEL_KEY_GENEVE_CLASS] ||
|
||||
!tb[NFTA_TUNNEL_KEY_GENEVE_TYPE] ||
|
||||
!tb[NFTA_TUNNEL_KEY_GENEVE_DATA])
|
||||
return -EINVAL;
|
||||
|
||||
attr = tb[NFTA_TUNNEL_KEY_GENEVE_DATA];
|
||||
data_len = nla_len(attr);
|
||||
if (data_len % 4)
|
||||
return -EINVAL;
|
||||
|
||||
opts->len += sizeof(*opt) + data_len;
|
||||
if (opts->len > IP_TUNNEL_OPTS_MAX)
|
||||
return -EINVAL;
|
||||
|
||||
memcpy(opt->opt_data, nla_data(attr), data_len);
|
||||
opt->length = data_len / 4;
|
||||
opt->opt_class = nla_get_be16(tb[NFTA_TUNNEL_KEY_GENEVE_CLASS]);
|
||||
opt->type = nla_get_u8(tb[NFTA_TUNNEL_KEY_GENEVE_TYPE]);
|
||||
opts->flags = TUNNEL_GENEVE_OPT;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static const struct nla_policy nft_tunnel_opts_policy[NFTA_TUNNEL_KEY_OPTS_MAX + 1] = {
|
||||
[NFTA_TUNNEL_KEY_OPTS_UNSPEC] = {
|
||||
.strict_start_type = NFTA_TUNNEL_KEY_OPTS_GENEVE },
|
||||
[NFTA_TUNNEL_KEY_OPTS_VXLAN] = { .type = NLA_NESTED, },
|
||||
[NFTA_TUNNEL_KEY_OPTS_ERSPAN] = { .type = NLA_NESTED, },
|
||||
[NFTA_TUNNEL_KEY_OPTS_GENEVE] = { .type = NLA_NESTED, },
|
||||
};
|
||||
|
||||
static int nft_tunnel_obj_opts_init(const struct nft_ctx *ctx,
|
||||
|
@ -311,22 +357,43 @@ static int nft_tunnel_obj_opts_init(const struct nft_ctx *ctx,
|
|||
struct ip_tunnel_info *info,
|
||||
struct nft_tunnel_opts *opts)
|
||||
{
|
||||
struct nlattr *tb[NFTA_TUNNEL_KEY_OPTS_MAX + 1];
|
||||
int err;
|
||||
int err, rem, type = 0;
|
||||
struct nlattr *nla;
|
||||
|
||||
err = nla_parse_nested_deprecated(tb, NFTA_TUNNEL_KEY_OPTS_MAX, attr,
|
||||
nft_tunnel_opts_policy, NULL);
|
||||
err = nla_validate_nested_deprecated(attr, NFTA_TUNNEL_KEY_OPTS_MAX,
|
||||
nft_tunnel_opts_policy, NULL);
|
||||
if (err < 0)
|
||||
return err;
|
||||
|
||||
if (tb[NFTA_TUNNEL_KEY_OPTS_VXLAN]) {
|
||||
err = nft_tunnel_obj_vxlan_init(tb[NFTA_TUNNEL_KEY_OPTS_VXLAN],
|
||||
opts);
|
||||
} else if (tb[NFTA_TUNNEL_KEY_OPTS_ERSPAN]) {
|
||||
err = nft_tunnel_obj_erspan_init(tb[NFTA_TUNNEL_KEY_OPTS_ERSPAN],
|
||||
opts);
|
||||
} else {
|
||||
return -EOPNOTSUPP;
|
||||
nla_for_each_attr(nla, nla_data(attr), nla_len(attr), rem) {
|
||||
switch (nla_type(nla)) {
|
||||
case NFTA_TUNNEL_KEY_OPTS_VXLAN:
|
||||
if (type)
|
||||
return -EINVAL;
|
||||
err = nft_tunnel_obj_vxlan_init(nla, opts);
|
||||
if (err)
|
||||
return err;
|
||||
type = TUNNEL_VXLAN_OPT;
|
||||
break;
|
||||
case NFTA_TUNNEL_KEY_OPTS_ERSPAN:
|
||||
if (type)
|
||||
return -EINVAL;
|
||||
err = nft_tunnel_obj_erspan_init(nla, opts);
|
||||
if (err)
|
||||
return err;
|
||||
type = TUNNEL_ERSPAN_OPT;
|
||||
break;
|
||||
case NFTA_TUNNEL_KEY_OPTS_GENEVE:
|
||||
if (type && type != TUNNEL_GENEVE_OPT)
|
||||
return -EINVAL;
|
||||
err = nft_tunnel_obj_geneve_init(nla, opts);
|
||||
if (err)
|
||||
return err;
|
||||
type = TUNNEL_GENEVE_OPT;
|
||||
break;
|
||||
default:
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
}
|
||||
|
||||
return err;
|
||||
|
@ -518,6 +585,25 @@ static int nft_tunnel_opts_dump(struct sk_buff *skb,
|
|||
break;
|
||||
}
|
||||
nla_nest_end(skb, inner);
|
||||
} else if (opts->flags & TUNNEL_GENEVE_OPT) {
|
||||
struct geneve_opt *opt;
|
||||
int offset = 0;
|
||||
|
||||
inner = nla_nest_start_noflag(skb, NFTA_TUNNEL_KEY_OPTS_GENEVE);
|
||||
if (!inner)
|
||||
goto failure;
|
||||
while (opts->len > offset) {
|
||||
opt = (struct geneve_opt *)opts->u.data + offset;
|
||||
if (nla_put_be16(skb, NFTA_TUNNEL_KEY_GENEVE_CLASS,
|
||||
opt->opt_class) ||
|
||||
nla_put_u8(skb, NFTA_TUNNEL_KEY_GENEVE_TYPE,
|
||||
opt->type) ||
|
||||
nla_put(skb, NFTA_TUNNEL_KEY_GENEVE_DATA,
|
||||
opt->length * 4, opt->opt_data))
|
||||
goto inner_failure;
|
||||
offset += sizeof(*opt) + opt->length * 4;
|
||||
}
|
||||
nla_nest_end(skb, inner);
|
||||
}
|
||||
nla_nest_end(skb, nest);
|
||||
return 0;
|
||||
|
|
Loading…
Reference in New Issue
Block a user