From patchwork Thu Aug 16 14:51:42 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ahmed Abdelsalam X-Patchwork-Id: 958334 X-Patchwork-Delegate: pablo@netfilter.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netfilter-devel-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="FtIzmTV3"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 41rq6j0rRJz9s4s for ; Fri, 17 Aug 2018 00:51:57 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403960AbeHPRuz (ORCPT ); Thu, 16 Aug 2018 13:50:55 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:33943 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403957AbeHPRuz (ORCPT ); Thu, 16 Aug 2018 13:50:55 -0400 Received: by mail-wm0-f66.google.com with SMTP id l2-v6so15803613wme.1 for ; Thu, 16 Aug 2018 07:51:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=+O1isoOtpmflZUzdFfU/3e9pmeVqM/EthGoVobz5jDg=; b=FtIzmTV3+tl5AY/gHB3NSCEVNgay7RcUT5DEIbwEzyrSRk2T7bdMIb0lqrz0f0/8jZ apVXu5s4ZMHCuzJogKILuGLemy5G07QOjqbVPZcpv7AgTIndSKwV44QgXy0iHDjlhZXc idCVi6GbmM71bX0ez5mzI3ve4A2s7PHltI85yyyF+uQQ+mEk27QGpYYphfrJPXXkeXXv wzXJNiqQVOIVdIRplJORfnfsIJBVOaxIbGt6sNPLpD6zYNfLx1qdbB4Ew5veSs1ZOSah a7aASEKT6TvyRNb0o7bjioixC79ejKDTwhngDhz29iHZx7HX8kZvxqqqNNjqZnFkqOBp DJpA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+O1isoOtpmflZUzdFfU/3e9pmeVqM/EthGoVobz5jDg=; b=BbhFqpdC8La9M902cImwhLKLd6CqoB8sO6OenC+Zb9DLHApwDQXaeoFCDYHNCMr+E1 8VQls6roOYSOP66AZpOzIcfElv/AMX0lYqEhZyqfD/M0LIfZrs/atFT2jd7RvbgZxBvB QsYDI0LM61Fm7uGHXb2HGFPoewZk3tVkb4Lp6kfUHRdioMtIOXHmb8BrMgsgc8owXpdS o4PyZQ+OtV6wFuAbVQEQF3/CnJnTcn/vj+0ODPwZ9C5OMCGTauimCSRCC3U+DFUDjcLk USZ2iZRcx45tbjUjd9EbV0veUHKnPRkSNGCj9H2R4RNyeqTpEvbKk3PzHWOK+AitmRHu sACw== X-Gm-Message-State: AOUpUlEWJ9QWeiT6WkOmQ3CeST1guMsUQ5+AzJ/gbHytuA7qInD90Ku5 Ip2ZvaV5VvoieSB1VA5G5SE= X-Google-Smtp-Source: AA+uWPz/aUMhUmVb+SPhLsQP9W3A/JSqqDEcgZkiHR8J8HGpcVZJ4I8V3TH1qHzxM3tg3c9e4F/DOA== X-Received: by 2002:a1c:ee9a:: with SMTP id j26-v6mr15925209wmi.116.1534431112241; Thu, 16 Aug 2018 07:51:52 -0700 (PDT) Received: from localhost.localdomain ([192.135.27.140]) by smtp.gmail.com with ESMTPSA id p89-v6sm2279734wrc.97.2018.08.16.07.51.50 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 16 Aug 2018 07:51:51 -0700 (PDT) From: Ahmed Abdelsalam To: pablo@netfilter.org, fw@strlen.de, netfilter-devel@vger.kernel.org Cc: davem@davemloft.net, coreteam@netfilter.org, amsalam20@gmail.com Subject: [nf-next 2/3] netfilter: Add support for IPv6 segment routing 'SEG6' target Date: Thu, 16 Aug 2018 16:51:42 +0200 Message-Id: <20180816145143.12963-2-amsalam20@gmail.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20180816145143.12963-1-amsalam20@gmail.com> References: <20180816145143.12963-1-amsalam20@gmail.com> Sender: netfilter-devel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netfilter-devel@vger.kernel.org Service Function Chaining (SFC) is one of the main use-cases of IPv6 Segment Routing (SRv6) [1]. The Segment Routing Header (SRH) allows including a list of segments in the IPv6 packet. This segment list can be used to steer the packetthough a set of Virtual Network Functions (VNFS) e.g., Firewall, DPI, IDS. The edge node (SR ingress node) classifies the traffic and consequently includes the segment lists in the IPv6 packet. The matching of SRH previous, next and last SIDs has been added to ip6tables in kernel 4.16. Once a packet matches one of these options, we can perform some SR specific actions. The IPv6 segment routing 'SEG6' target supports a set of SR-specific actions. The first set of actions include those actions necessary to allow branching within a pre-defined SRv6 SFC policy instead of the usual linear exploration of the VNF chain. This patch implements the following SR-specific actions: (1) go-next: sends packets towards the next SID from SRH. (2) skip-next: skips the next SID in the SRH. (3) go-last: skips the remaining part of the segment list and send the packet towards the last segment. [1] https://tools.ietf.org/html/draft-xuclad-spring-sr-service-programming-00 Signed-off-by: Ahmed Abdelsalam --- include/uapi/linux/netfilter_ipv6/ip6t_SEG6.h | 22 +++++ net/ipv6/netfilter/Kconfig | 15 ++++ net/ipv6/netfilter/Makefile | 1 + net/ipv6/netfilter/ip6t_SEG6.c | 116 ++++++++++++++++++++++++++ 4 files changed, 154 insertions(+) create mode 100644 include/uapi/linux/netfilter_ipv6/ip6t_SEG6.h create mode 100644 net/ipv6/netfilter/ip6t_SEG6.c diff --git a/include/uapi/linux/netfilter_ipv6/ip6t_SEG6.h b/include/uapi/linux/netfilter_ipv6/ip6t_SEG6.h new file mode 100644 index 000000000000..443805d0d1b2 --- /dev/null +++ b/include/uapi/linux/netfilter_ipv6/ip6t_SEG6.h @@ -0,0 +1,22 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ + +#ifndef _IP6T_SEG6_H +#define _IP6T_SEG6_H + +#include + +/* SEG6 action options */ +enum ip6t_seg6_action { + IP6T_SEG6_GO_NEXT, + IP6T_SEG6_SKIP_NEXT, + IP6T_SEG6_GO_LAST, + IP6T_SEG6_BSID, +}; + +struct ip6t_seg6_info { + __u32 action; /* SEG6 action */ + struct in6_addr bsid; /* SRv6 Bind SID */ + unsigned int tbl; /* Routing table of bsid */ +}; + +#endif /*_IP6T_SEG6_H*/ diff --git a/net/ipv6/netfilter/Kconfig b/net/ipv6/netfilter/Kconfig index 339d0762b027..a2502c54a837 100644 --- a/net/ipv6/netfilter/Kconfig +++ b/net/ipv6/netfilter/Kconfig @@ -344,6 +344,21 @@ config IP6_NF_TARGET_NPT endif # IP6_NF_NAT +if IPV6_SEG6_LWTUNNEL + +config IP6_NF_TARGET_SEG6 + tristate 'IPv6 Segment Routing "SEG6" target support' + depends on NETFILTER_ADVANCED + help + SEG6 is an ip6tables target for IPv6 Segment Routing encapsualted + packets. It supports a set of Segment Routing specific actions + that can be applied based on SRH information. It is useful for + SRv6 Service Function chaining use-cases. + + To compile it as a module, choose M here. If unsure, say N. + +endif # IPV6_SEG6_LWTUNNEL + endif # IP6_NF_IPTABLES endmenu diff --git a/net/ipv6/netfilter/Makefile b/net/ipv6/netfilter/Makefile index 200c0c235565..68e86e18f15f 100644 --- a/net/ipv6/netfilter/Makefile +++ b/net/ipv6/netfilter/Makefile @@ -58,3 +58,4 @@ obj-$(CONFIG_IP6_NF_TARGET_MASQUERADE) += ip6t_MASQUERADE.o obj-$(CONFIG_IP6_NF_TARGET_NPT) += ip6t_NPT.o obj-$(CONFIG_IP6_NF_TARGET_REJECT) += ip6t_REJECT.o obj-$(CONFIG_IP6_NF_TARGET_SYNPROXY) += ip6t_SYNPROXY.o +obj-$(CONFIG_IP6_NF_TARGET_SEG6) += ip6t_SEG6.o diff --git a/net/ipv6/netfilter/ip6t_SEG6.c b/net/ipv6/netfilter/ip6t_SEG6.c new file mode 100644 index 000000000000..03b5f1a1c8bf --- /dev/null +++ b/net/ipv6/netfilter/ip6t_SEG6.c @@ -0,0 +1,116 @@ +/** + * IPv6 Segment Routing target module (SEG6). + * + * Author: + * Ahmed Abdelsalam + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + */ + +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt + +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include + +static int seg6_go_next(struct sk_buff *skb, struct ipv6_sr_hdr *srh) +{ + if (srh->segments_left == 0) + return NF_DROP; + seg6_advance_nextseg(srh, &ipv6_hdr(skb)->daddr); + seg6_lookup_nexthop(skb, NULL, 0); + dst_input(skb); + return NF_STOLEN; +} + +static int seg6_skip_next(struct sk_buff *skb, struct ipv6_sr_hdr *srh) +{ + if (srh->segments_left < 2) + return NF_DROP; + seg6_advance_nextseg(srh, &ipv6_hdr(skb)->daddr); + seg6_advance_nextseg(srh, &ipv6_hdr(skb)->daddr); + seg6_lookup_nexthop(skb, NULL, 0); + dst_input(skb); + return NF_STOLEN; +} + +static int seg6_go_last(struct sk_buff *skb, struct ipv6_sr_hdr *srh) +{ + if (srh->segments_left == 0) + return NF_DROP; + srh->segments_left = 1; + seg6_advance_nextseg(srh, &ipv6_hdr(skb)->daddr); + seg6_lookup_nexthop(skb, NULL, 0); + dst_input(skb); + return NF_STOLEN; +} + +static unsigned int +seg6_tg6(struct sk_buff *skb, const struct xt_action_param *par) +{ + struct ipv6_sr_hdr *srh; + const struct ip6t_seg6_info *seg6 = par->targinfo; + + srh = seg6_get_srh(skb); + if (!srh) + return NF_DROP; + + switch (seg6->action) { + case IP6T_SEG6_GO_NEXT: + return seg6_go_next(skb, srh); + case IP6T_SEG6_SKIP_NEXT: + return seg6_skip_next(skb, srh); + case IP6T_SEG6_GO_LAST: + return seg6_go_last(skb, srh); + } + + pr_err("Unknown SEG6 action\n"); + return NF_DROP; +} + +static int seg6_check(const struct xt_tgchk_param *par) +{ + /** + * In the future, some new action may require using + * this function for doing some checks + */ + return 0; +} + +static struct xt_target seg6_tg6_reg __read_mostly = { + .name = "SEG6", + .family = NFPROTO_IPV6, + .target = seg6_tg6, + .targetsize = sizeof(struct ip6t_seg6_info), + .checkentry = seg6_check, + .me = THIS_MODULE +}; + +static int __init seg6_tg6_init(void) +{ + return xt_register_target(&seg6_tg6_reg); +} + +static void __exit seg6_tg6_exit(void) +{ + xt_unregister_target(&seg6_tg6_reg); +} + +module_init(seg6_tg6_init); +module_exit(seg6_tg6_exit); + +MODULE_LICENSE("GPL"); +MODULE_DESCRIPTION("Xtables: IPv6 Segment Routing Target (SEG6)"); +MODULE_AUTHOR("Ahmed Abdelsalam ");