1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Checksum updating actions 4 * 5 * Copyright (c) 2010 Gregoire Baron <baronchon@n7mm.org> 6 */ 7 8 #include <linux/types.h> 9 #include <linux/init.h> 10 #include <linux/kernel.h> 11 #include <linux/module.h> 12 #include <linux/spinlock.h> 13 14 #include <linux/netlink.h> 15 #include <net/netlink.h> 16 #include <linux/rtnetlink.h> 17 18 #include <linux/skbuff.h> 19 20 #include <net/ip.h> 21 #include <net/ipv6.h> 22 #include <net/icmp.h> 23 #include <linux/icmpv6.h> 24 #include <linux/igmp.h> 25 #include <net/tcp.h> 26 #include <net/udp.h> 27 #include <net/ip6_checksum.h> 28 #include <net/sctp/checksum.h> 29 30 #include <net/act_api.h> 31 #include <net/pkt_cls.h> 32 33 #include <linux/tc_act/tc_csum.h> 34 #include <net/tc_act/tc_csum.h> 35 36 static const struct nla_policy csum_policy[TCA_CSUM_MAX + 1] = { 37 [TCA_CSUM_PARMS] = { .len = sizeof(struct tc_csum), }, 38 }; 39 40 static unsigned int csum_net_id; 41 static struct tc_action_ops act_csum_ops; 42 43 static int tcf_csum_init(struct net *net, struct nlattr *nla, 44 struct nlattr *est, struct tc_action **a, int ovr, 45 int bind, bool rtnl_held, struct tcf_proto *tp, 46 u32 flags, struct netlink_ext_ack *extack) 47 { 48 struct tc_action_net *tn = net_generic(net, csum_net_id); 49 struct tcf_csum_params *params_new; 50 struct nlattr *tb[TCA_CSUM_MAX + 1]; 51 struct tcf_chain *goto_ch = NULL; 52 struct tc_csum *parm; 53 struct tcf_csum *p; 54 int ret = 0, err; 55 u32 index; 56 57 if (nla == NULL) 58 return -EINVAL; 59 60 err = nla_parse_nested_deprecated(tb, TCA_CSUM_MAX, nla, csum_policy, 61 NULL); 62 if (err < 0) 63 return err; 64 65 if (tb[TCA_CSUM_PARMS] == NULL) 66 return -EINVAL; 67 parm = nla_data(tb[TCA_CSUM_PARMS]); 68 index = parm->index; 69 err = tcf_idr_check_alloc(tn, &index, a, bind); 70 if (!err) { 71 ret = tcf_idr_create_from_flags(tn, index, est, a, 72 &act_csum_ops, bind, flags); 73 if (ret) { 74 tcf_idr_cleanup(tn, index); 75 return ret; 76 } 77 ret = ACT_P_CREATED; 78 } else if (err > 0) { 79 if (bind)/* dont override defaults */ 80 return 0; 81 if (!ovr) { 82 tcf_idr_release(*a, bind); 83 return -EEXIST; 84 } 85 } else { 86 return err; 87 } 88 89 err = tcf_action_check_ctrlact(parm->action, tp, &goto_ch, extack); 90 if (err < 0) 91 goto release_idr; 92 93 p = to_tcf_csum(*a); 94 95 params_new = kzalloc(sizeof(*params_new), GFP_KERNEL); 96 if (unlikely(!params_new)) { 97 err = -ENOMEM; 98 goto put_chain; 99 } 100 params_new->update_flags = parm->update_flags; 101 102 spin_lock_bh(&p->tcf_lock); 103 goto_ch = tcf_action_set_ctrlact(*a, parm->action, goto_ch); 104 params_new = rcu_replace_pointer(p->params, params_new, 105 lockdep_is_held(&p->tcf_lock)); 106 spin_unlock_bh(&p->tcf_lock); 107 108 if (goto_ch) 109 tcf_chain_put_by_act(goto_ch); 110 if (params_new) 111 kfree_rcu(params_new, rcu); 112 113 if (ret == ACT_P_CREATED) 114 tcf_idr_insert(tn, *a); 115 116 return ret; 117 put_chain: 118 if (goto_ch) 119 tcf_chain_put_by_act(goto_ch); 120 release_idr: 121 tcf_idr_release(*a, bind); 122 return err; 123 } 124 125 /** 126 * tcf_csum_skb_nextlayer - Get next layer pointer 127 * @skb: sk_buff to use 128 * @ihl: previous summed headers length 129 * @ipl: complete packet length 130 * @jhl: next header length 131 * 132 * Check the expected next layer availability in the specified sk_buff. 133 * Return the next layer pointer if pass, NULL otherwise. 134 */ 135 static void *tcf_csum_skb_nextlayer(struct sk_buff *skb, 136 unsigned int ihl, unsigned int ipl, 137 unsigned int jhl) 138 { 139 int ntkoff = skb_network_offset(skb); 140 int hl = ihl + jhl; 141 142 if (!pskb_may_pull(skb, ipl + ntkoff) || (ipl < hl) || 143 skb_try_make_writable(skb, hl + ntkoff)) 144 return NULL; 145 else 146 return (void *)(skb_network_header(skb) + ihl); 147 } 148 149 static int tcf_csum_ipv4_icmp(struct sk_buff *skb, unsigned int ihl, 150 unsigned int ipl) 151 { 152 struct icmphdr *icmph; 153 154 icmph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*icmph)); 155 if (icmph == NULL) 156 return 0; 157 158 icmph->checksum = 0; 159 skb->csum = csum_partial(icmph, ipl - ihl, 0); 160 icmph->checksum = csum_fold(skb->csum); 161 162 skb->ip_summed = CHECKSUM_NONE; 163 164 return 1; 165 } 166 167 static int tcf_csum_ipv4_igmp(struct sk_buff *skb, 168 unsigned int ihl, unsigned int ipl) 169 { 170 struct igmphdr *igmph; 171 172 igmph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*igmph)); 173 if (igmph == NULL) 174 return 0; 175 176 igmph->csum = 0; 177 skb->csum = csum_partial(igmph, ipl - ihl, 0); 178 igmph->csum = csum_fold(skb->csum); 179 180 skb->ip_summed = CHECKSUM_NONE; 181 182 return 1; 183 } 184 185 static int tcf_csum_ipv6_icmp(struct sk_buff *skb, unsigned int ihl, 186 unsigned int ipl) 187 { 188 struct icmp6hdr *icmp6h; 189 const struct ipv6hdr *ip6h; 190 191 icmp6h = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*icmp6h)); 192 if (icmp6h == NULL) 193 return 0; 194 195 ip6h = ipv6_hdr(skb); 196 icmp6h->icmp6_cksum = 0; 197 skb->csum = csum_partial(icmp6h, ipl - ihl, 0); 198 icmp6h->icmp6_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, 199 ipl - ihl, IPPROTO_ICMPV6, 200 skb->csum); 201 202 skb->ip_summed = CHECKSUM_NONE; 203 204 return 1; 205 } 206 207 static int tcf_csum_ipv4_tcp(struct sk_buff *skb, unsigned int ihl, 208 unsigned int ipl) 209 { 210 struct tcphdr *tcph; 211 const struct iphdr *iph; 212 213 if (skb_is_gso(skb) && skb_shinfo(skb)->gso_type & SKB_GSO_TCPV4) 214 return 1; 215 216 tcph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*tcph)); 217 if (tcph == NULL) 218 return 0; 219 220 iph = ip_hdr(skb); 221 tcph->check = 0; 222 skb->csum = csum_partial(tcph, ipl - ihl, 0); 223 tcph->check = tcp_v4_check(ipl - ihl, 224 iph->saddr, iph->daddr, skb->csum); 225 226 skb->ip_summed = CHECKSUM_NONE; 227 228 return 1; 229 } 230 231 static int tcf_csum_ipv6_tcp(struct sk_buff *skb, unsigned int ihl, 232 unsigned int ipl) 233 { 234 struct tcphdr *tcph; 235 const struct ipv6hdr *ip6h; 236 237 if (skb_is_gso(skb) && skb_shinfo(skb)->gso_type & SKB_GSO_TCPV6) 238 return 1; 239 240 tcph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*tcph)); 241 if (tcph == NULL) 242 return 0; 243 244 ip6h = ipv6_hdr(skb); 245 tcph->check = 0; 246 skb->csum = csum_partial(tcph, ipl - ihl, 0); 247 tcph->check = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, 248 ipl - ihl, IPPROTO_TCP, 249 skb->csum); 250 251 skb->ip_summed = CHECKSUM_NONE; 252 253 return 1; 254 } 255 256 static int tcf_csum_ipv4_udp(struct sk_buff *skb, unsigned int ihl, 257 unsigned int ipl, int udplite) 258 { 259 struct udphdr *udph; 260 const struct iphdr *iph; 261 u16 ul; 262 263 if (skb_is_gso(skb) && skb_shinfo(skb)->gso_type & SKB_GSO_UDP) 264 return 1; 265 266 /* 267 * Support both UDP and UDPLITE checksum algorithms, Don't use 268 * udph->len to get the real length without any protocol check, 269 * UDPLITE uses udph->len for another thing, 270 * Use iph->tot_len, or just ipl. 271 */ 272 273 udph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*udph)); 274 if (udph == NULL) 275 return 0; 276 277 iph = ip_hdr(skb); 278 ul = ntohs(udph->len); 279 280 if (udplite || udph->check) { 281 282 udph->check = 0; 283 284 if (udplite) { 285 if (ul == 0) 286 skb->csum = csum_partial(udph, ipl - ihl, 0); 287 else if ((ul >= sizeof(*udph)) && (ul <= ipl - ihl)) 288 skb->csum = csum_partial(udph, ul, 0); 289 else 290 goto ignore_obscure_skb; 291 } else { 292 if (ul != ipl - ihl) 293 goto ignore_obscure_skb; 294 295 skb->csum = csum_partial(udph, ul, 0); 296 } 297 298 udph->check = csum_tcpudp_magic(iph->saddr, iph->daddr, 299 ul, iph->protocol, 300 skb->csum); 301 302 if (!udph->check) 303 udph->check = CSUM_MANGLED_0; 304 } 305 306 skb->ip_summed = CHECKSUM_NONE; 307 308 ignore_obscure_skb: 309 return 1; 310 } 311 312 static int tcf_csum_ipv6_udp(struct sk_buff *skb, unsigned int ihl, 313 unsigned int ipl, int udplite) 314 { 315 struct udphdr *udph; 316 const struct ipv6hdr *ip6h; 317 u16 ul; 318 319 if (skb_is_gso(skb) && skb_shinfo(skb)->gso_type & SKB_GSO_UDP) 320 return 1; 321 322 /* 323 * Support both UDP and UDPLITE checksum algorithms, Don't use 324 * udph->len to get the real length without any protocol check, 325 * UDPLITE uses udph->len for another thing, 326 * Use ip6h->payload_len + sizeof(*ip6h) ... , or just ipl. 327 */ 328 329 udph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*udph)); 330 if (udph == NULL) 331 return 0; 332 333 ip6h = ipv6_hdr(skb); 334 ul = ntohs(udph->len); 335 336 udph->check = 0; 337 338 if (udplite) { 339 if (ul == 0) 340 skb->csum = csum_partial(udph, ipl - ihl, 0); 341 342 else if ((ul >= sizeof(*udph)) && (ul <= ipl - ihl)) 343 skb->csum = csum_partial(udph, ul, 0); 344 345 else 346 goto ignore_obscure_skb; 347 } else { 348 if (ul != ipl - ihl) 349 goto ignore_obscure_skb; 350 351 skb->csum = csum_partial(udph, ul, 0); 352 } 353 354 udph->check = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, ul, 355 udplite ? IPPROTO_UDPLITE : IPPROTO_UDP, 356 skb->csum); 357 358 if (!udph->check) 359 udph->check = CSUM_MANGLED_0; 360 361 skb->ip_summed = CHECKSUM_NONE; 362 363 ignore_obscure_skb: 364 return 1; 365 } 366 367 static int tcf_csum_sctp(struct sk_buff *skb, unsigned int ihl, 368 unsigned int ipl) 369 { 370 struct sctphdr *sctph; 371 372 if (skb_is_gso(skb) && skb_is_gso_sctp(skb)) 373 return 1; 374 375 sctph = tcf_csum_skb_nextlayer(skb, ihl, ipl, sizeof(*sctph)); 376 if (!sctph) 377 return 0; 378 379 sctph->checksum = sctp_compute_cksum(skb, 380 skb_network_offset(skb) + ihl); 381 skb->ip_summed = CHECKSUM_NONE; 382 skb->csum_not_inet = 0; 383 384 return 1; 385 } 386 387 static int tcf_csum_ipv4(struct sk_buff *skb, u32 update_flags) 388 { 389 const struct iphdr *iph; 390 int ntkoff; 391 392 ntkoff = skb_network_offset(skb); 393 394 if (!pskb_may_pull(skb, sizeof(*iph) + ntkoff)) 395 goto fail; 396 397 iph = ip_hdr(skb); 398 399 switch (iph->frag_off & htons(IP_OFFSET) ? 0 : iph->protocol) { 400 case IPPROTO_ICMP: 401 if (update_flags & TCA_CSUM_UPDATE_FLAG_ICMP) 402 if (!tcf_csum_ipv4_icmp(skb, iph->ihl * 4, 403 ntohs(iph->tot_len))) 404 goto fail; 405 break; 406 case IPPROTO_IGMP: 407 if (update_flags & TCA_CSUM_UPDATE_FLAG_IGMP) 408 if (!tcf_csum_ipv4_igmp(skb, iph->ihl * 4, 409 ntohs(iph->tot_len))) 410 goto fail; 411 break; 412 case IPPROTO_TCP: 413 if (update_flags & TCA_CSUM_UPDATE_FLAG_TCP) 414 if (!tcf_csum_ipv4_tcp(skb, iph->ihl * 4, 415 ntohs(iph->tot_len))) 416 goto fail; 417 break; 418 case IPPROTO_UDP: 419 if (update_flags & TCA_CSUM_UPDATE_FLAG_UDP) 420 if (!tcf_csum_ipv4_udp(skb, iph->ihl * 4, 421 ntohs(iph->tot_len), 0)) 422 goto fail; 423 break; 424 case IPPROTO_UDPLITE: 425 if (update_flags & TCA_CSUM_UPDATE_FLAG_UDPLITE) 426 if (!tcf_csum_ipv4_udp(skb, iph->ihl * 4, 427 ntohs(iph->tot_len), 1)) 428 goto fail; 429 break; 430 case IPPROTO_SCTP: 431 if ((update_flags & TCA_CSUM_UPDATE_FLAG_SCTP) && 432 !tcf_csum_sctp(skb, iph->ihl * 4, ntohs(iph->tot_len))) 433 goto fail; 434 break; 435 } 436 437 if (update_flags & TCA_CSUM_UPDATE_FLAG_IPV4HDR) { 438 if (skb_try_make_writable(skb, sizeof(*iph) + ntkoff)) 439 goto fail; 440 441 ip_send_check(ip_hdr(skb)); 442 } 443 444 return 1; 445 446 fail: 447 return 0; 448 } 449 450 static int tcf_csum_ipv6_hopopts(struct ipv6_opt_hdr *ip6xh, unsigned int ixhl, 451 unsigned int *pl) 452 { 453 int off, len, optlen; 454 unsigned char *xh = (void *)ip6xh; 455 456 off = sizeof(*ip6xh); 457 len = ixhl - off; 458 459 while (len > 1) { 460 switch (xh[off]) { 461 case IPV6_TLV_PAD1: 462 optlen = 1; 463 break; 464 case IPV6_TLV_JUMBO: 465 optlen = xh[off + 1] + 2; 466 if (optlen != 6 || len < 6 || (off & 3) != 2) 467 /* wrong jumbo option length/alignment */ 468 return 0; 469 *pl = ntohl(*(__be32 *)(xh + off + 2)); 470 goto done; 471 default: 472 optlen = xh[off + 1] + 2; 473 if (optlen > len) 474 /* ignore obscure options */ 475 goto done; 476 break; 477 } 478 off += optlen; 479 len -= optlen; 480 } 481 482 done: 483 return 1; 484 } 485 486 static int tcf_csum_ipv6(struct sk_buff *skb, u32 update_flags) 487 { 488 struct ipv6hdr *ip6h; 489 struct ipv6_opt_hdr *ip6xh; 490 unsigned int hl, ixhl; 491 unsigned int pl; 492 int ntkoff; 493 u8 nexthdr; 494 495 ntkoff = skb_network_offset(skb); 496 497 hl = sizeof(*ip6h); 498 499 if (!pskb_may_pull(skb, hl + ntkoff)) 500 goto fail; 501 502 ip6h = ipv6_hdr(skb); 503 504 pl = ntohs(ip6h->payload_len); 505 nexthdr = ip6h->nexthdr; 506 507 do { 508 switch (nexthdr) { 509 case NEXTHDR_FRAGMENT: 510 goto ignore_skb; 511 case NEXTHDR_ROUTING: 512 case NEXTHDR_HOP: 513 case NEXTHDR_DEST: 514 if (!pskb_may_pull(skb, hl + sizeof(*ip6xh) + ntkoff)) 515 goto fail; 516 ip6xh = (void *)(skb_network_header(skb) + hl); 517 ixhl = ipv6_optlen(ip6xh); 518 if (!pskb_may_pull(skb, hl + ixhl + ntkoff)) 519 goto fail; 520 ip6xh = (void *)(skb_network_header(skb) + hl); 521 if ((nexthdr == NEXTHDR_HOP) && 522 !(tcf_csum_ipv6_hopopts(ip6xh, ixhl, &pl))) 523 goto fail; 524 nexthdr = ip6xh->nexthdr; 525 hl += ixhl; 526 break; 527 case IPPROTO_ICMPV6: 528 if (update_flags & TCA_CSUM_UPDATE_FLAG_ICMP) 529 if (!tcf_csum_ipv6_icmp(skb, 530 hl, pl + sizeof(*ip6h))) 531 goto fail; 532 goto done; 533 case IPPROTO_TCP: 534 if (update_flags & TCA_CSUM_UPDATE_FLAG_TCP) 535 if (!tcf_csum_ipv6_tcp(skb, 536 hl, pl + sizeof(*ip6h))) 537 goto fail; 538 goto done; 539 case IPPROTO_UDP: 540 if (update_flags & TCA_CSUM_UPDATE_FLAG_UDP) 541 if (!tcf_csum_ipv6_udp(skb, hl, 542 pl + sizeof(*ip6h), 0)) 543 goto fail; 544 goto done; 545 case IPPROTO_UDPLITE: 546 if (update_flags & TCA_CSUM_UPDATE_FLAG_UDPLITE) 547 if (!tcf_csum_ipv6_udp(skb, hl, 548 pl + sizeof(*ip6h), 1)) 549 goto fail; 550 goto done; 551 case IPPROTO_SCTP: 552 if ((update_flags & TCA_CSUM_UPDATE_FLAG_SCTP) && 553 !tcf_csum_sctp(skb, hl, pl + sizeof(*ip6h))) 554 goto fail; 555 goto done; 556 default: 557 goto ignore_skb; 558 } 559 } while (pskb_may_pull(skb, hl + 1 + ntkoff)); 560 561 done: 562 ignore_skb: 563 return 1; 564 565 fail: 566 return 0; 567 } 568 569 static int tcf_csum_act(struct sk_buff *skb, const struct tc_action *a, 570 struct tcf_result *res) 571 { 572 struct tcf_csum *p = to_tcf_csum(a); 573 bool orig_vlan_tag_present = false; 574 unsigned int vlan_hdr_count = 0; 575 struct tcf_csum_params *params; 576 u32 update_flags; 577 __be16 protocol; 578 int action; 579 580 params = rcu_dereference_bh(p->params); 581 582 tcf_lastuse_update(&p->tcf_tm); 583 tcf_action_update_bstats(&p->common, skb); 584 585 action = READ_ONCE(p->tcf_action); 586 if (unlikely(action == TC_ACT_SHOT)) 587 goto drop; 588 589 update_flags = params->update_flags; 590 protocol = skb_protocol(skb, false); 591 again: 592 switch (protocol) { 593 case cpu_to_be16(ETH_P_IP): 594 if (!tcf_csum_ipv4(skb, update_flags)) 595 goto drop; 596 break; 597 case cpu_to_be16(ETH_P_IPV6): 598 if (!tcf_csum_ipv6(skb, update_flags)) 599 goto drop; 600 break; 601 case cpu_to_be16(ETH_P_8021AD): 602 fallthrough; 603 case cpu_to_be16(ETH_P_8021Q): 604 if (skb_vlan_tag_present(skb) && !orig_vlan_tag_present) { 605 protocol = skb->protocol; 606 orig_vlan_tag_present = true; 607 } else { 608 struct vlan_hdr *vlan = (struct vlan_hdr *)skb->data; 609 610 protocol = vlan->h_vlan_encapsulated_proto; 611 skb_pull(skb, VLAN_HLEN); 612 skb_reset_network_header(skb); 613 vlan_hdr_count++; 614 } 615 goto again; 616 } 617 618 out: 619 /* Restore the skb for the pulled VLAN tags */ 620 while (vlan_hdr_count--) { 621 skb_push(skb, VLAN_HLEN); 622 skb_reset_network_header(skb); 623 } 624 625 return action; 626 627 drop: 628 tcf_action_inc_drop_qstats(&p->common); 629 action = TC_ACT_SHOT; 630 goto out; 631 } 632 633 static int tcf_csum_dump(struct sk_buff *skb, struct tc_action *a, int bind, 634 int ref) 635 { 636 unsigned char *b = skb_tail_pointer(skb); 637 struct tcf_csum *p = to_tcf_csum(a); 638 struct tcf_csum_params *params; 639 struct tc_csum opt = { 640 .index = p->tcf_index, 641 .refcnt = refcount_read(&p->tcf_refcnt) - ref, 642 .bindcnt = atomic_read(&p->tcf_bindcnt) - bind, 643 }; 644 struct tcf_t t; 645 646 spin_lock_bh(&p->tcf_lock); 647 params = rcu_dereference_protected(p->params, 648 lockdep_is_held(&p->tcf_lock)); 649 opt.action = p->tcf_action; 650 opt.update_flags = params->update_flags; 651 652 if (nla_put(skb, TCA_CSUM_PARMS, sizeof(opt), &opt)) 653 goto nla_put_failure; 654 655 tcf_tm_dump(&t, &p->tcf_tm); 656 if (nla_put_64bit(skb, TCA_CSUM_TM, sizeof(t), &t, TCA_CSUM_PAD)) 657 goto nla_put_failure; 658 spin_unlock_bh(&p->tcf_lock); 659 660 return skb->len; 661 662 nla_put_failure: 663 spin_unlock_bh(&p->tcf_lock); 664 nlmsg_trim(skb, b); 665 return -1; 666 } 667 668 static void tcf_csum_cleanup(struct tc_action *a) 669 { 670 struct tcf_csum *p = to_tcf_csum(a); 671 struct tcf_csum_params *params; 672 673 params = rcu_dereference_protected(p->params, 1); 674 if (params) 675 kfree_rcu(params, rcu); 676 } 677 678 static int tcf_csum_walker(struct net *net, struct sk_buff *skb, 679 struct netlink_callback *cb, int type, 680 const struct tc_action_ops *ops, 681 struct netlink_ext_ack *extack) 682 { 683 struct tc_action_net *tn = net_generic(net, csum_net_id); 684 685 return tcf_generic_walker(tn, skb, cb, type, ops, extack); 686 } 687 688 static int tcf_csum_search(struct net *net, struct tc_action **a, u32 index) 689 { 690 struct tc_action_net *tn = net_generic(net, csum_net_id); 691 692 return tcf_idr_search(tn, a, index); 693 } 694 695 static size_t tcf_csum_get_fill_size(const struct tc_action *act) 696 { 697 return nla_total_size(sizeof(struct tc_csum)); 698 } 699 700 static struct tc_action_ops act_csum_ops = { 701 .kind = "csum", 702 .id = TCA_ID_CSUM, 703 .owner = THIS_MODULE, 704 .act = tcf_csum_act, 705 .dump = tcf_csum_dump, 706 .init = tcf_csum_init, 707 .cleanup = tcf_csum_cleanup, 708 .walk = tcf_csum_walker, 709 .lookup = tcf_csum_search, 710 .get_fill_size = tcf_csum_get_fill_size, 711 .size = sizeof(struct tcf_csum), 712 }; 713 714 static __net_init int csum_init_net(struct net *net) 715 { 716 struct tc_action_net *tn = net_generic(net, csum_net_id); 717 718 return tc_action_net_init(net, tn, &act_csum_ops); 719 } 720 721 static void __net_exit csum_exit_net(struct list_head *net_list) 722 { 723 tc_action_net_exit(net_list, csum_net_id); 724 } 725 726 static struct pernet_operations csum_net_ops = { 727 .init = csum_init_net, 728 .exit_batch = csum_exit_net, 729 .id = &csum_net_id, 730 .size = sizeof(struct tc_action_net), 731 }; 732 733 MODULE_DESCRIPTION("Checksum updating actions"); 734 MODULE_LICENSE("GPL"); 735 736 static int __init csum_init_module(void) 737 { 738 return tcf_register_action(&act_csum_ops, &csum_net_ops); 739 } 740 741 static void __exit csum_cleanup_module(void) 742 { 743 tcf_unregister_action(&act_csum_ops, &csum_net_ops); 744 } 745 746 module_init(csum_init_module); 747 module_exit(csum_cleanup_module); 748