forked from Minki/linux
f9c4bb0b24
This patch adds vnifiltering support to collect metadata device. Motivation: You can only use a single vxlan collect metadata device for a given vxlan udp port in the system today. The vxlan collect metadata device terminates all received vxlan packets. As shown in the below diagram, there are use-cases where you need to support multiple such vxlan devices in independent bridge domains. Each vxlan device must terminate the vni's it is configured for. Example usecase: In a service provider network a service provider typically supports multiple bridge domains with overlapping vlans. One bridge domain per customer. Vlans in each bridge domain are mapped to globally unique vxlan ranges assigned to each customer. vnifiltering support in collect metadata devices terminates only configured vnis. This is similar to vlan filtering in bridge driver. The vni filtering capability is provided by a new flag on collect metadata device. In the below pic: - customer1 is mapped to br1 bridge domain - customer2 is mapped to br2 bridge domain - customer1 vlan 10-11 is mapped to vni 1001-1002 - customer2 vlan 10-11 is mapped to vni 2001-2002 - br1 and br2 are vlan filtering bridges - vxlan1 and vxlan2 are collect metadata devices with vnifiltering enabled ┌──────────────────────────────────────────────────────────────────┐ │ switch │ │ │ │ ┌───────────┐ ┌───────────┐ │ │ │ │ │ │ │ │ │ br1 │ │ br2 │ │ │ └┬─────────┬┘ └──┬───────┬┘ │ │ vlans│ │ vlans │ │ │ │ 10,11│ │ 10,11│ │ │ │ │ vlanvnimap: │ vlanvnimap: │ │ │ 10-1001,11-1002 │ 10-2001,11-2002 │ │ │ │ │ │ │ │ ┌──────┴┐ ┌──┴─────────┐ ┌───┴────┐ │ │ │ │ swp1 │ │vxlan1 │ │ swp2 │ ┌┴─────────────┐ │ │ │ │ │ vnifilter:│ │ │ │vxlan2 │ │ │ └───┬───┘ │ 1001,1002│ └───┬────┘ │ vnifilter: │ │ │ │ └────────────┘ │ │ 2001,2002 │ │ │ │ │ └──────────────┘ │ │ │ │ │ └───────┼──────────────────────────────────┼───────────────────────┘ │ │ │ │ ┌─────┴───────┐ │ │ customer1 │ ┌─────┴──────┐ │ host/VM │ │customer2 │ └─────────────┘ │ host/VM │ └────────────┘ With this implementation, vxlan dst metadata device can be associated with range of vnis. struct vxlan_vni_node is introduced to represent a configured vni. We start with vni and its associated remote_ip in this structure. This structure can be extended to bring in other per vni attributes if there are usecases for it. A vni inherits an attribute from the base vxlan device if there is no per vni attributes defined. struct vxlan_dev gets a new rhashtable for vnis called vxlan_vni_group. vxlan_vnifilter.c implements the necessary netlink api, notifications and helper functions to process and manage lifecycle of vxlan_vni_node. This patch also adds new helper functions in vxlan_multicast.c to handle per vni remote_ip multicast groups which are part of vxlan_vni_group. Fix build problems: Reported-by: kernel test robot <lkp@intel.com> Signed-off-by: Roopa Prabhu <roopa@nvidia.com> Signed-off-by: David S. Miller <davem@davemloft.net>
273 lines
6.6 KiB
C
273 lines
6.6 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Vxlan multicast group handling
|
|
*
|
|
*/
|
|
#include <linux/kernel.h>
|
|
#include <net/net_namespace.h>
|
|
#include <net/sock.h>
|
|
#include <linux/igmp.h>
|
|
#include <net/vxlan.h>
|
|
|
|
#include "vxlan_private.h"
|
|
|
|
/* Update multicast group membership when first VNI on
|
|
* multicast address is brought up
|
|
*/
|
|
int vxlan_igmp_join(struct vxlan_dev *vxlan, union vxlan_addr *rip,
|
|
int rifindex)
|
|
{
|
|
union vxlan_addr *ip = (rip ? : &vxlan->default_dst.remote_ip);
|
|
int ifindex = (rifindex ? : vxlan->default_dst.remote_ifindex);
|
|
int ret = -EINVAL;
|
|
struct sock *sk;
|
|
|
|
if (ip->sa.sa_family == AF_INET) {
|
|
struct vxlan_sock *sock4 = rtnl_dereference(vxlan->vn4_sock);
|
|
struct ip_mreqn mreq = {
|
|
.imr_multiaddr.s_addr = ip->sin.sin_addr.s_addr,
|
|
.imr_ifindex = ifindex,
|
|
};
|
|
|
|
sk = sock4->sock->sk;
|
|
lock_sock(sk);
|
|
ret = ip_mc_join_group(sk, &mreq);
|
|
release_sock(sk);
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
} else {
|
|
struct vxlan_sock *sock6 = rtnl_dereference(vxlan->vn6_sock);
|
|
|
|
sk = sock6->sock->sk;
|
|
lock_sock(sk);
|
|
ret = ipv6_stub->ipv6_sock_mc_join(sk, ifindex,
|
|
&ip->sin6.sin6_addr);
|
|
release_sock(sk);
|
|
#endif
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int vxlan_igmp_leave(struct vxlan_dev *vxlan, union vxlan_addr *rip,
|
|
int rifindex)
|
|
{
|
|
union vxlan_addr *ip = (rip ? : &vxlan->default_dst.remote_ip);
|
|
int ifindex = (rifindex ? : vxlan->default_dst.remote_ifindex);
|
|
int ret = -EINVAL;
|
|
struct sock *sk;
|
|
|
|
if (ip->sa.sa_family == AF_INET) {
|
|
struct vxlan_sock *sock4 = rtnl_dereference(vxlan->vn4_sock);
|
|
struct ip_mreqn mreq = {
|
|
.imr_multiaddr.s_addr = ip->sin.sin_addr.s_addr,
|
|
.imr_ifindex = ifindex,
|
|
};
|
|
|
|
sk = sock4->sock->sk;
|
|
lock_sock(sk);
|
|
ret = ip_mc_leave_group(sk, &mreq);
|
|
release_sock(sk);
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
} else {
|
|
struct vxlan_sock *sock6 = rtnl_dereference(vxlan->vn6_sock);
|
|
|
|
sk = sock6->sock->sk;
|
|
lock_sock(sk);
|
|
ret = ipv6_stub->ipv6_sock_mc_drop(sk, ifindex,
|
|
&ip->sin6.sin6_addr);
|
|
release_sock(sk);
|
|
#endif
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static bool vxlan_group_used_match(union vxlan_addr *ip, int ifindex,
|
|
union vxlan_addr *rip, int rifindex)
|
|
{
|
|
if (!vxlan_addr_multicast(rip))
|
|
return false;
|
|
|
|
if (!vxlan_addr_equal(rip, ip))
|
|
return false;
|
|
|
|
if (rifindex != ifindex)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool vxlan_group_used_by_vnifilter(struct vxlan_dev *vxlan,
|
|
union vxlan_addr *ip, int ifindex)
|
|
{
|
|
struct vxlan_vni_group *vg = rtnl_dereference(vxlan->vnigrp);
|
|
struct vxlan_vni_node *v, *tmp;
|
|
|
|
if (vxlan_group_used_match(ip, ifindex,
|
|
&vxlan->default_dst.remote_ip,
|
|
vxlan->default_dst.remote_ifindex))
|
|
return true;
|
|
|
|
list_for_each_entry_safe(v, tmp, &vg->vni_list, vlist) {
|
|
if (!vxlan_addr_multicast(&v->remote_ip))
|
|
continue;
|
|
|
|
if (vxlan_group_used_match(ip, ifindex,
|
|
&v->remote_ip,
|
|
vxlan->default_dst.remote_ifindex))
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/* See if multicast group is already in use by other ID */
|
|
bool vxlan_group_used(struct vxlan_net *vn, struct vxlan_dev *dev,
|
|
__be32 vni, union vxlan_addr *rip, int rifindex)
|
|
{
|
|
union vxlan_addr *ip = (rip ? : &dev->default_dst.remote_ip);
|
|
int ifindex = (rifindex ? : dev->default_dst.remote_ifindex);
|
|
struct vxlan_dev *vxlan;
|
|
struct vxlan_sock *sock4;
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
struct vxlan_sock *sock6;
|
|
#endif
|
|
unsigned short family = dev->default_dst.remote_ip.sa.sa_family;
|
|
|
|
sock4 = rtnl_dereference(dev->vn4_sock);
|
|
|
|
/* The vxlan_sock is only used by dev, leaving group has
|
|
* no effect on other vxlan devices.
|
|
*/
|
|
if (family == AF_INET && sock4 && refcount_read(&sock4->refcnt) == 1)
|
|
return false;
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
sock6 = rtnl_dereference(dev->vn6_sock);
|
|
if (family == AF_INET6 && sock6 && refcount_read(&sock6->refcnt) == 1)
|
|
return false;
|
|
#endif
|
|
|
|
list_for_each_entry(vxlan, &vn->vxlan_list, next) {
|
|
if (!netif_running(vxlan->dev) || vxlan == dev)
|
|
continue;
|
|
|
|
if (family == AF_INET &&
|
|
rtnl_dereference(vxlan->vn4_sock) != sock4)
|
|
continue;
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
if (family == AF_INET6 &&
|
|
rtnl_dereference(vxlan->vn6_sock) != sock6)
|
|
continue;
|
|
#endif
|
|
if (vxlan->cfg.flags & VXLAN_F_VNIFILTER) {
|
|
if (!vxlan_group_used_by_vnifilter(vxlan, ip, ifindex))
|
|
continue;
|
|
} else {
|
|
if (!vxlan_group_used_match(ip, ifindex,
|
|
&vxlan->default_dst.remote_ip,
|
|
vxlan->default_dst.remote_ifindex))
|
|
continue;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static int vxlan_multicast_join_vnigrp(struct vxlan_dev *vxlan)
|
|
{
|
|
struct vxlan_vni_group *vg = rtnl_dereference(vxlan->vnigrp);
|
|
struct vxlan_vni_node *v, *tmp, *vgood = NULL;
|
|
int ret = 0;
|
|
|
|
list_for_each_entry_safe(v, tmp, &vg->vni_list, vlist) {
|
|
if (!vxlan_addr_multicast(&v->remote_ip))
|
|
continue;
|
|
/* skip if address is same as default address */
|
|
if (vxlan_addr_equal(&v->remote_ip,
|
|
&vxlan->default_dst.remote_ip))
|
|
continue;
|
|
ret = vxlan_igmp_join(vxlan, &v->remote_ip, 0);
|
|
if (ret == -EADDRINUSE)
|
|
ret = 0;
|
|
if (ret)
|
|
goto out;
|
|
vgood = v;
|
|
}
|
|
out:
|
|
if (ret) {
|
|
list_for_each_entry_safe(v, tmp, &vg->vni_list, vlist) {
|
|
if (!vxlan_addr_multicast(&v->remote_ip))
|
|
continue;
|
|
if (vxlan_addr_equal(&v->remote_ip,
|
|
&vxlan->default_dst.remote_ip))
|
|
continue;
|
|
vxlan_igmp_leave(vxlan, &v->remote_ip, 0);
|
|
if (v == vgood)
|
|
break;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int vxlan_multicast_leave_vnigrp(struct vxlan_dev *vxlan)
|
|
{
|
|
struct vxlan_net *vn = net_generic(vxlan->net, vxlan_net_id);
|
|
struct vxlan_vni_group *vg = rtnl_dereference(vxlan->vnigrp);
|
|
struct vxlan_vni_node *v, *tmp;
|
|
int last_err = 0, ret;
|
|
|
|
list_for_each_entry_safe(v, tmp, &vg->vni_list, vlist) {
|
|
if (vxlan_addr_multicast(&v->remote_ip) &&
|
|
!vxlan_group_used(vn, vxlan, v->vni, &v->remote_ip,
|
|
0)) {
|
|
ret = vxlan_igmp_leave(vxlan, &v->remote_ip, 0);
|
|
if (ret)
|
|
last_err = ret;
|
|
}
|
|
}
|
|
|
|
return last_err;
|
|
}
|
|
|
|
int vxlan_multicast_join(struct vxlan_dev *vxlan)
|
|
{
|
|
int ret = 0;
|
|
|
|
if (vxlan_addr_multicast(&vxlan->default_dst.remote_ip)) {
|
|
ret = vxlan_igmp_join(vxlan, &vxlan->default_dst.remote_ip,
|
|
vxlan->default_dst.remote_ifindex);
|
|
if (ret == -EADDRINUSE)
|
|
ret = 0;
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
if (vxlan->cfg.flags & VXLAN_F_VNIFILTER)
|
|
return vxlan_multicast_join_vnigrp(vxlan);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int vxlan_multicast_leave(struct vxlan_dev *vxlan)
|
|
{
|
|
struct vxlan_net *vn = net_generic(vxlan->net, vxlan_net_id);
|
|
int ret = 0;
|
|
|
|
if (vxlan_addr_multicast(&vxlan->default_dst.remote_ip) &&
|
|
!vxlan_group_used(vn, vxlan, 0, NULL, 0)) {
|
|
ret = vxlan_igmp_leave(vxlan, &vxlan->default_dst.remote_ip,
|
|
vxlan->default_dst.remote_ifindex);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
if (vxlan->cfg.flags & VXLAN_F_VNIFILTER)
|
|
return vxlan_multicast_leave_vnigrp(vxlan);
|
|
|
|
return 0;
|
|
}
|