new file mode 100644
@@ -0,0 +1,25 @@
+/* Header file for NSH target extension for xtables.
+ *
+ * Copyright (c) 2016 by Brocade Communications Systems, Inc.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ */
+#ifndef _XT_NSH_H
+#define _XT_NSH_H
+
+struct xt_nsh_info {
+ __u32 service_path_id;
+ __u8 service_index;
+ __u8 metadata_type;
+ __u16 t2_class;
+ __u8 t2_type;
+ __u8 t2_len;
+ __u32 value1;
+ __u32 value2;
+ __u32 value3;
+ __u32 value4;
+};
+
+#endif /* _XT_NSH_H */
@@ -863,6 +863,15 @@ config NETFILTER_XT_TARGET_NOTRACK
depends on NETFILTER_ADVANCED
select NETFILTER_XT_TARGET_CT
+config NETFILTER_XT_TARGET_NSH
+ tristate '"NSH" target support'
+ depends on NETFILTER_ADVANCED
+ help
+ This options adds a `NSH' target, which allows to add NSH metadata
+ to outgoing packets.
+
+ To compile it as a module, choose M here. If unsure, say N.
+
config NETFILTER_XT_TARGET_RATEEST
tristate '"RATEEST" target support'
depends on NETFILTER_ADVANCED
@@ -120,6 +120,7 @@ obj-$(CONFIG_NETFILTER_XT_TARGET_LOG) += xt_LOG.o
obj-$(CONFIG_NETFILTER_XT_TARGET_NETMAP) += xt_NETMAP.o
obj-$(CONFIG_NETFILTER_XT_TARGET_NFLOG) += xt_NFLOG.o
obj-$(CONFIG_NETFILTER_XT_TARGET_NFQUEUE) += xt_NFQUEUE.o
+obj-$(CONFIG_NETFILTER_XT_TARGET_NSH) += xt_NSH.o
obj-$(CONFIG_NETFILTER_XT_TARGET_RATEEST) += xt_RATEEST.o
obj-$(CONFIG_NETFILTER_XT_TARGET_REDIRECT) += xt_REDIRECT.o
obj-$(CONFIG_NETFILTER_XT_TARGET_SECMARK) += xt_SECMARK.o
new file mode 100644
@@ -0,0 +1,95 @@
+/* Network Service Header (NSH) target extension for xtables.
+ *
+ * Copyright (c) 2016 by Brocade Communications Systems, Inc.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ */
+#include <linux/module.h>
+#include <linux/netfilter.h>
+#include <linux/skbuff.h>
+#include <linux/notifier.h>
+#include <linux/netfilter/x_tables.h>
+#include <uapi/linux/netfilter/xt_NSH.h>
+#include <net/nsh.h>
+
+static unsigned int nsh_tg(struct sk_buff *skb,
+ const struct xt_action_param *par)
+{
+ const struct xt_nsh_info *info = par->targinfo;
+ struct nsh_metadata ctx_hdr;
+ u32 data[4];
+ int err;
+
+ skb->protocol = htons(ETH_P_NSH);
+
+ if (info->metadata_type == NSH_MD_TYPE_1) {
+ ctx_hdr.class = NSH_MD_CLASS_TYPE_1;
+ ctx_hdr.type = NSH_MD_TYPE_TYPE_1;
+ ctx_hdr.len = NSH_MD_LEN_TYPE_1;
+ } else {
+ ctx_hdr.class = info->t2_class;
+ ctx_hdr.type = info->t2_type;
+ ctx_hdr.len = info->t2_len;
+ }
+
+ data[0] = info->value1;
+ data[1] = info->value2;
+ data[2] = info->value3;
+ data[3] = info->value4;
+
+ ctx_hdr.data = &data;
+ ctx_hdr.crit = 1;
+
+ err = nsh_encap(skb, info->service_path_id, info->service_index,
+ NSH_NEXT_PROTO_IPv4, 1, &ctx_hdr);
+ if (err < 0)
+ return NF_DROP;
+
+ return NF_ACCEPT;
+}
+
+static int nsh_tg_check(const struct xt_tgchk_param *par)
+{
+ struct xt_nsh_info *info = par->targinfo;
+
+ if (info->metadata_type != NSH_MD_TYPE_1 &&
+ info->metadata_type != NSH_MD_TYPE_2)
+ return -EINVAL;
+ if (info->service_path_id >= NSH_N_SPI)
+ return -EINVAL;
+ if (info->metadata_type == NSH_MD_TYPE_2 &&
+ (info->t2_len > 4 || info->t2_class == NSH_MD_CLASS_TYPE_1))
+ return -EINVAL;
+ return 0;
+}
+
+static struct xt_target nsh_tg_reg[] __read_mostly = {
+ {
+ .name = "NSH",
+ .revision = 0,
+ .family = NFPROTO_IPV4,
+ .target = nsh_tg,
+ .targetsize = sizeof(struct xt_nsh_info),
+ .checkentry = nsh_tg_check,
+ .me = THIS_MODULE,
+ },
+};
+
+static int __init nsh_tg_init(void)
+{
+ return xt_register_targets(nsh_tg_reg, ARRAY_SIZE(nsh_tg_reg));
+}
+
+static void __exit nsh_tg_exit(void)
+{
+ xt_unregister_targets(nsh_tg_reg, ARRAY_SIZE(nsh_tg_reg));
+}
+
+module_init(nsh_tg_init);
+module_exit(nsh_tg_exit);
+MODULE_AUTHOR("Brian Russell <brussell@brocade.com>");
+MODULE_DESCRIPTION("Xtables: Add NSH metadata");
+MODULE_LICENSE("GPL");
+MODULE_ALIAS("ipt_NSH");
Add an NSH netfilter target, to add NSH encap'd metadata to outgoing packets. Signed-off-by: Brian Russell <brussell@brocade.com> --- include/uapi/linux/netfilter/xt_NSH.h | 25 +++++++++ net/netfilter/Kconfig | 9 ++++ net/netfilter/Makefile | 1 + net/netfilter/xt_NSH.c | 95 +++++++++++++++++++++++++++++++++++ 4 files changed, 130 insertions(+) create mode 100644 include/uapi/linux/netfilter/xt_NSH.h create mode 100644 net/netfilter/xt_NSH.c