blob: ef0b861ce0447f56bbd5313262e8a39c8024e4e1 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09002 * Linux NET3: GRE over IP protocol decoder.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
4 * Authors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Joe Perchesafd465032012-03-12 07:03:32 +000013#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
14
Randy Dunlap4fc268d2006-01-11 12:17:47 -080015#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <linux/module.h>
17#include <linux/types.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/kernel.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090019#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <asm/uaccess.h>
21#include <linux/skbuff.h>
22#include <linux/netdevice.h>
23#include <linux/in.h>
24#include <linux/tcp.h>
25#include <linux/udp.h>
26#include <linux/if_arp.h>
27#include <linux/mroute.h>
28#include <linux/init.h>
29#include <linux/in6.h>
30#include <linux/inetdevice.h>
31#include <linux/igmp.h>
32#include <linux/netfilter_ipv4.h>
Herbert Xue1a80002008-10-09 12:00:17 -070033#include <linux/etherdevice.h>
Kris Katterjohn46f25df2006-01-05 16:35:42 -080034#include <linux/if_ether.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
36#include <net/sock.h>
37#include <net/ip.h>
38#include <net/icmp.h>
39#include <net/protocol.h>
40#include <net/ipip.h>
41#include <net/arp.h>
42#include <net/checksum.h>
43#include <net/dsfield.h>
44#include <net/inet_ecn.h>
45#include <net/xfrm.h>
Pavel Emelyanov59a4c752008-04-16 01:08:53 -070046#include <net/net_namespace.h>
47#include <net/netns/generic.h>
Herbert Xuc19e6542008-10-09 11:59:55 -070048#include <net/rtnetlink.h>
Dmitry Kozlov00959ad2010-08-21 23:05:39 -070049#include <net/gre.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070050
Eric Dumazetdfd56b82011-12-10 09:48:31 +000051#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -070052#include <net/ipv6.h>
53#include <net/ip6_fib.h>
54#include <net/ip6_route.h>
55#endif
56
57/*
58 Problems & solutions
59 --------------------
60
61 1. The most important issue is detecting local dead loops.
62 They would cause complete host lockup in transmit, which
63 would be "resolved" by stack overflow or, if queueing is enabled,
64 with infinite looping in net_bh.
65
66 We cannot track such dead loops during route installation,
67 it is infeasible task. The most general solutions would be
68 to keep skb->encapsulation counter (sort of local ttl),
Eric Dumazet6d0722a2010-09-29 23:35:10 -070069 and silently drop packet when it expires. It is a good
stephen hemmingerbff52852012-02-24 08:08:20 +000070 solution, but it supposes maintaining new variable in ALL
Linus Torvalds1da177e2005-04-16 15:20:36 -070071 skb, even if no tunneling is used.
72
Eric Dumazet6d0722a2010-09-29 23:35:10 -070073 Current solution: xmit_recursion breaks dead loops. This is a percpu
74 counter, since when we enter the first ndo_xmit(), cpu migration is
75 forbidden. We force an exit if this counter reaches RECURSION_LIMIT
Linus Torvalds1da177e2005-04-16 15:20:36 -070076
77 2. Networking dead loops would not kill routers, but would really
78 kill network. IP hop limit plays role of "t->recursion" in this case,
79 if we copy it from packet being encapsulated to upper header.
80 It is very good solution, but it introduces two problems:
81
82 - Routing protocols, using packets with ttl=1 (OSPF, RIP2),
83 do not work over tunnels.
84 - traceroute does not work. I planned to relay ICMP from tunnel,
85 so that this problem would be solved and traceroute output
86 would even more informative. This idea appeared to be wrong:
87 only Linux complies to rfc1812 now (yes, guys, Linux is the only
88 true router now :-)), all routers (at least, in neighbourhood of mine)
89 return only 8 bytes of payload. It is the end.
90
91 Hence, if we want that OSPF worked or traceroute said something reasonable,
92 we should search for another solution.
93
94 One of them is to parse packet trying to detect inner encapsulation
95 made by our node. It is difficult or even impossible, especially,
stephen hemmingerbff52852012-02-24 08:08:20 +000096 taking into account fragmentation. TO be short, ttl is not solution at all.
Linus Torvalds1da177e2005-04-16 15:20:36 -070097
98 Current solution: The solution was UNEXPECTEDLY SIMPLE.
99 We force DF flag on tunnels with preconfigured hop limit,
100 that is ALL. :-) Well, it does not remove the problem completely,
101 but exponential growth of network traffic is changed to linear
102 (branches, that exceed pmtu are pruned) and tunnel mtu
stephen hemmingerbff52852012-02-24 08:08:20 +0000103 rapidly degrades to value <68, where looping stops.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 Yes, it is not good if there exists a router in the loop,
105 which does not force DF, even when encapsulating packets have DF set.
106 But it is not our problem! Nobody could accuse us, we made
107 all that we could make. Even if it is your gated who injected
108 fatal route to network, even if it were you who configured
109 fatal static route: you are innocent. :-)
110
111
112
113 3. Really, ipv4/ipip.c, ipv4/ip_gre.c and ipv6/sit.c contain
114 practically identical code. It would be good to glue them
115 together, but it is not very evident, how to make them modular.
116 sit is integral part of IPv6, ipip and gre are naturally modular.
117 We could extract common parts (hash table, ioctl etc)
118 to a separate module (ip_tunnel.c).
119
120 Alexey Kuznetsov.
121 */
122
stephen hemmingereccc1bb2012-09-25 11:02:48 +0000123static bool log_ecn_error = true;
124module_param(log_ecn_error, bool, 0644);
125MODULE_PARM_DESC(log_ecn_error, "Log packets received with corrupted ECN");
126
Herbert Xuc19e6542008-10-09 11:59:55 -0700127static struct rtnl_link_ops ipgre_link_ops __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128static int ipgre_tunnel_init(struct net_device *dev);
129static void ipgre_tunnel_setup(struct net_device *dev);
Herbert Xu42aa9162008-10-09 11:59:32 -0700130static int ipgre_tunnel_bind_dev(struct net_device *dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131
132/* Fallback tunnel: no source, no destination, no key, no options */
133
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700134#define HASH_SIZE 16
135
Eric Dumazetf99189b2009-11-17 10:42:49 +0000136static int ipgre_net_id __read_mostly;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700137struct ipgre_net {
Eric Dumazet15078502010-09-15 11:07:53 +0000138 struct ip_tunnel __rcu *tunnels[4][HASH_SIZE];
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700139
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700140 struct net_device *fb_tunnel_dev;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700141};
142
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143/* Tunnel hash table */
144
145/*
146 4 hash tables:
147
148 3: (remote,local)
149 2: (remote,*)
150 1: (*,local)
151 0: (*,*)
152
153 We require exact key match i.e. if a key is present in packet
154 it will match only tunnel with the same key; if it is not present,
155 it will match only keyless tunnel.
156
157 All keysless packets, if not matched configured keyless tunnels
158 will match fallback tunnel.
159 */
160
Al Virod5a0a1e2006-11-08 00:23:14 -0800161#define HASH(addr) (((__force u32)addr^((__force u32)addr>>4))&0xF)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700162
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700163#define tunnels_r_l tunnels[3]
164#define tunnels_r tunnels[2]
165#define tunnels_l tunnels[1]
166#define tunnels_wc tunnels[0]
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000167/*
Eric Dumazet15078502010-09-15 11:07:53 +0000168 * Locking : hash tables are protected by RCU and RTNL
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000169 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000171#define for_each_ip_tunnel_rcu(start) \
172 for (t = rcu_dereference(start); t; t = rcu_dereference(t->next))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173
Eric Dumazete985aad2010-09-27 03:57:11 +0000174/* often modified stats are per cpu, other are shared (netdev->stats) */
175struct pcpu_tstats {
stephen hemminger87b6d212012-04-12 06:31:16 +0000176 u64 rx_packets;
177 u64 rx_bytes;
178 u64 tx_packets;
179 u64 tx_bytes;
180 struct u64_stats_sync syncp;
181};
Eric Dumazete985aad2010-09-27 03:57:11 +0000182
stephen hemminger87b6d212012-04-12 06:31:16 +0000183static struct rtnl_link_stats64 *ipgre_get_stats64(struct net_device *dev,
184 struct rtnl_link_stats64 *tot)
Eric Dumazete985aad2010-09-27 03:57:11 +0000185{
Eric Dumazete985aad2010-09-27 03:57:11 +0000186 int i;
187
188 for_each_possible_cpu(i) {
189 const struct pcpu_tstats *tstats = per_cpu_ptr(dev->tstats, i);
stephen hemminger87b6d212012-04-12 06:31:16 +0000190 u64 rx_packets, rx_bytes, tx_packets, tx_bytes;
191 unsigned int start;
Eric Dumazete985aad2010-09-27 03:57:11 +0000192
stephen hemminger87b6d212012-04-12 06:31:16 +0000193 do {
194 start = u64_stats_fetch_begin_bh(&tstats->syncp);
195 rx_packets = tstats->rx_packets;
196 tx_packets = tstats->tx_packets;
197 rx_bytes = tstats->rx_bytes;
198 tx_bytes = tstats->tx_bytes;
199 } while (u64_stats_fetch_retry_bh(&tstats->syncp, start));
200
201 tot->rx_packets += rx_packets;
202 tot->tx_packets += tx_packets;
203 tot->rx_bytes += rx_bytes;
204 tot->tx_bytes += tx_bytes;
Eric Dumazete985aad2010-09-27 03:57:11 +0000205 }
stephen hemminger87b6d212012-04-12 06:31:16 +0000206
207 tot->multicast = dev->stats.multicast;
208 tot->rx_crc_errors = dev->stats.rx_crc_errors;
209 tot->rx_fifo_errors = dev->stats.rx_fifo_errors;
210 tot->rx_length_errors = dev->stats.rx_length_errors;
stephen hemmingereccc1bb2012-09-25 11:02:48 +0000211 tot->rx_frame_errors = dev->stats.rx_frame_errors;
stephen hemminger87b6d212012-04-12 06:31:16 +0000212 tot->rx_errors = dev->stats.rx_errors;
stephen hemmingereccc1bb2012-09-25 11:02:48 +0000213
stephen hemminger87b6d212012-04-12 06:31:16 +0000214 tot->tx_fifo_errors = dev->stats.tx_fifo_errors;
215 tot->tx_carrier_errors = dev->stats.tx_carrier_errors;
216 tot->tx_dropped = dev->stats.tx_dropped;
217 tot->tx_aborted_errors = dev->stats.tx_aborted_errors;
218 tot->tx_errors = dev->stats.tx_errors;
219
220 return tot;
Eric Dumazete985aad2010-09-27 03:57:11 +0000221}
222
stephen hemmingerd2083282012-09-24 18:12:23 +0000223/* Does key in tunnel parameters match packet */
224static bool ipgre_key_match(const struct ip_tunnel_parm *p,
225 __u32 flags, __be32 key)
226{
227 if (p->i_flags & GRE_KEY) {
228 if (flags & GRE_KEY)
229 return key == p->i_key;
230 else
231 return false; /* key expected, none present */
232 } else
233 return !(flags & GRE_KEY);
234}
235
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236/* Given src, dst and key, find appropriate for input tunnel. */
237
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000238static struct ip_tunnel *ipgre_tunnel_lookup(struct net_device *dev,
239 __be32 remote, __be32 local,
stephen hemmingerd2083282012-09-24 18:12:23 +0000240 __u32 flags, __be32 key,
241 __be16 gre_proto)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242{
Timo Teras749c10f2009-01-19 17:22:12 -0800243 struct net *net = dev_net(dev);
244 int link = dev->ifindex;
Eric Dumazet15078502010-09-15 11:07:53 +0000245 unsigned int h0 = HASH(remote);
246 unsigned int h1 = HASH(key);
Timo Terasafcf1242009-01-26 20:56:10 -0800247 struct ip_tunnel *t, *cand = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700248 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Herbert Xue1a80002008-10-09 12:00:17 -0700249 int dev_type = (gre_proto == htons(ETH_P_TEB)) ?
250 ARPHRD_ETHER : ARPHRD_IPGRE;
Timo Terasafcf1242009-01-26 20:56:10 -0800251 int score, cand_score = 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000253 for_each_ip_tunnel_rcu(ign->tunnels_r_l[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800254 if (local != t->parms.iph.saddr ||
255 remote != t->parms.iph.daddr ||
Timo Teras749c10f2009-01-19 17:22:12 -0800256 !(t->dev->flags & IFF_UP))
257 continue;
258
stephen hemmingerd2083282012-09-24 18:12:23 +0000259 if (!ipgre_key_match(&t->parms, flags, key))
260 continue;
261
Timo Teras749c10f2009-01-19 17:22:12 -0800262 if (t->dev->type != ARPHRD_IPGRE &&
263 t->dev->type != dev_type)
264 continue;
265
Timo Terasafcf1242009-01-26 20:56:10 -0800266 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800267 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800268 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800269 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800270 score |= 2;
271 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800272 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800273
274 if (score < cand_score) {
275 cand = t;
276 cand_score = score;
277 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700278 }
Herbert Xue1a80002008-10-09 12:00:17 -0700279
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000280 for_each_ip_tunnel_rcu(ign->tunnels_r[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800281 if (remote != t->parms.iph.daddr ||
Timo Teras749c10f2009-01-19 17:22:12 -0800282 !(t->dev->flags & IFF_UP))
283 continue;
284
stephen hemmingerd2083282012-09-24 18:12:23 +0000285 if (!ipgre_key_match(&t->parms, flags, key))
286 continue;
287
Timo Teras749c10f2009-01-19 17:22:12 -0800288 if (t->dev->type != ARPHRD_IPGRE &&
289 t->dev->type != dev_type)
290 continue;
291
Timo Terasafcf1242009-01-26 20:56:10 -0800292 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800293 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800294 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800295 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800296 score |= 2;
297 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800298 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800299
300 if (score < cand_score) {
301 cand = t;
302 cand_score = score;
303 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700304 }
Herbert Xue1a80002008-10-09 12:00:17 -0700305
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000306 for_each_ip_tunnel_rcu(ign->tunnels_l[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800307 if ((local != t->parms.iph.saddr &&
308 (local != t->parms.iph.daddr ||
309 !ipv4_is_multicast(local))) ||
Timo Teras749c10f2009-01-19 17:22:12 -0800310 !(t->dev->flags & IFF_UP))
311 continue;
312
stephen hemmingerd2083282012-09-24 18:12:23 +0000313 if (!ipgre_key_match(&t->parms, flags, key))
314 continue;
315
Timo Teras749c10f2009-01-19 17:22:12 -0800316 if (t->dev->type != ARPHRD_IPGRE &&
317 t->dev->type != dev_type)
318 continue;
319
Timo Terasafcf1242009-01-26 20:56:10 -0800320 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800321 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800322 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800323 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800324 score |= 2;
325 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800326 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800327
328 if (score < cand_score) {
329 cand = t;
330 cand_score = score;
331 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700332 }
Herbert Xue1a80002008-10-09 12:00:17 -0700333
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000334 for_each_ip_tunnel_rcu(ign->tunnels_wc[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800335 if (t->parms.i_key != key ||
336 !(t->dev->flags & IFF_UP))
337 continue;
338
339 if (t->dev->type != ARPHRD_IPGRE &&
340 t->dev->type != dev_type)
341 continue;
342
Timo Terasafcf1242009-01-26 20:56:10 -0800343 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800344 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800345 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800346 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800347 score |= 2;
348 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800349 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800350
351 if (score < cand_score) {
352 cand = t;
353 cand_score = score;
354 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700355 }
356
Timo Terasafcf1242009-01-26 20:56:10 -0800357 if (cand != NULL)
358 return cand;
Herbert Xue1a80002008-10-09 12:00:17 -0700359
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000360 dev = ign->fb_tunnel_dev;
361 if (dev->flags & IFF_UP)
362 return netdev_priv(dev);
Timo Teras749c10f2009-01-19 17:22:12 -0800363
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364 return NULL;
365}
366
Eric Dumazet15078502010-09-15 11:07:53 +0000367static struct ip_tunnel __rcu **__ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700368 struct ip_tunnel_parm *parms)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369{
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900370 __be32 remote = parms->iph.daddr;
371 __be32 local = parms->iph.saddr;
372 __be32 key = parms->i_key;
Eric Dumazet15078502010-09-15 11:07:53 +0000373 unsigned int h = HASH(key);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700374 int prio = 0;
375
376 if (local)
377 prio |= 1;
Joe Perchesf97c1e02007-12-16 13:45:43 -0800378 if (remote && !ipv4_is_multicast(remote)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700379 prio |= 2;
380 h ^= HASH(remote);
381 }
382
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700383 return &ign->tunnels[prio][h];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384}
385
Eric Dumazet15078502010-09-15 11:07:53 +0000386static inline struct ip_tunnel __rcu **ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700387 struct ip_tunnel *t)
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900388{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700389 return __ipgre_bucket(ign, &t->parms);
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900390}
391
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700392static void ipgre_tunnel_link(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393{
Eric Dumazet15078502010-09-15 11:07:53 +0000394 struct ip_tunnel __rcu **tp = ipgre_bucket(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395
Eric Dumazet15078502010-09-15 11:07:53 +0000396 rcu_assign_pointer(t->next, rtnl_dereference(*tp));
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000397 rcu_assign_pointer(*tp, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398}
399
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700400static void ipgre_tunnel_unlink(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401{
Eric Dumazet15078502010-09-15 11:07:53 +0000402 struct ip_tunnel __rcu **tp;
403 struct ip_tunnel *iter;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404
Eric Dumazet15078502010-09-15 11:07:53 +0000405 for (tp = ipgre_bucket(ign, t);
406 (iter = rtnl_dereference(*tp)) != NULL;
407 tp = &iter->next) {
408 if (t == iter) {
409 rcu_assign_pointer(*tp, t->next);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 break;
411 }
412 }
413}
414
Herbert Xue1a80002008-10-09 12:00:17 -0700415static struct ip_tunnel *ipgre_tunnel_find(struct net *net,
416 struct ip_tunnel_parm *parms,
417 int type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418{
Al Virod5a0a1e2006-11-08 00:23:14 -0800419 __be32 remote = parms->iph.daddr;
420 __be32 local = parms->iph.saddr;
421 __be32 key = parms->i_key;
Timo Teras749c10f2009-01-19 17:22:12 -0800422 int link = parms->link;
Eric Dumazet15078502010-09-15 11:07:53 +0000423 struct ip_tunnel *t;
424 struct ip_tunnel __rcu **tp;
Herbert Xue1a80002008-10-09 12:00:17 -0700425 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
426
Eric Dumazet15078502010-09-15 11:07:53 +0000427 for (tp = __ipgre_bucket(ign, parms);
428 (t = rtnl_dereference(*tp)) != NULL;
429 tp = &t->next)
Herbert Xue1a80002008-10-09 12:00:17 -0700430 if (local == t->parms.iph.saddr &&
431 remote == t->parms.iph.daddr &&
432 key == t->parms.i_key &&
Timo Teras749c10f2009-01-19 17:22:12 -0800433 link == t->parms.link &&
Herbert Xue1a80002008-10-09 12:00:17 -0700434 type == t->dev->type)
435 break;
436
437 return t;
438}
439
Eric Dumazet15078502010-09-15 11:07:53 +0000440static struct ip_tunnel *ipgre_tunnel_locate(struct net *net,
Herbert Xue1a80002008-10-09 12:00:17 -0700441 struct ip_tunnel_parm *parms, int create)
442{
443 struct ip_tunnel *t, *nt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 struct net_device *dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700445 char name[IFNAMSIZ];
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700446 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447
Herbert Xue1a80002008-10-09 12:00:17 -0700448 t = ipgre_tunnel_find(net, parms, ARPHRD_IPGRE);
449 if (t || !create)
450 return t;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451
452 if (parms->name[0])
453 strlcpy(name, parms->name, IFNAMSIZ);
Pavel Emelyanov34cc7ba2008-02-23 20:19:20 -0800454 else
stephen hemminger407d6fc2010-11-29 09:47:47 +0000455 strcpy(name, "gre%d");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456
457 dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup);
458 if (!dev)
stephen hemminger407d6fc2010-11-29 09:47:47 +0000459 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -0700461 dev_net_set(dev, net);
462
Patrick McHardy2941a482006-01-08 22:05:26 -0800463 nt = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700464 nt->parms = *parms;
Herbert Xuc19e6542008-10-09 11:59:55 -0700465 dev->rtnl_link_ops = &ipgre_link_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466
Herbert Xu42aa9162008-10-09 11:59:32 -0700467 dev->mtu = ipgre_tunnel_bind_dev(dev);
468
Pavel Emelyanovb37d428b2008-02-26 23:51:04 -0800469 if (register_netdevice(dev) < 0)
470 goto failed_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471
Willem de Bruijnf2b3ee92012-01-26 10:34:35 +0000472 /* Can use a lockless transmit, unless we generate output sequences */
473 if (!(nt->parms.o_flags & GRE_SEQ))
474 dev->features |= NETIF_F_LLTX;
475
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 dev_hold(dev);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700477 ipgre_tunnel_link(ign, nt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478 return nt;
479
Pavel Emelyanovb37d428b2008-02-26 23:51:04 -0800480failed_free:
481 free_netdev(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482 return NULL;
483}
484
485static void ipgre_tunnel_uninit(struct net_device *dev)
486{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700487 struct net *net = dev_net(dev);
488 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
489
490 ipgre_tunnel_unlink(ign, netdev_priv(dev));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 dev_put(dev);
492}
493
494
495static void ipgre_err(struct sk_buff *skb, u32 info)
496{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497
Rami Rosen071f92d2008-05-21 17:47:54 -0700498/* All the routers (except for Linux) return only
Linus Torvalds1da177e2005-04-16 15:20:36 -0700499 8 bytes of packet payload. It means, that precise relaying of
500 ICMP in the real Internet is absolutely infeasible.
501
502 Moreover, Cisco "wise men" put GRE key to the third word
503 in GRE header. It makes impossible maintaining even soft state for keyed
504 GRE tunnels with enabled checksum. Tell them "thank you".
505
506 Well, I wonder, rfc1812 was written by Cisco employee,
stephen hemmingerbff52852012-02-24 08:08:20 +0000507 what the hell these idiots break standards established
508 by themselves???
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509 */
510
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000511 const struct iphdr *iph = (const struct iphdr *)skb->data;
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000512 __be16 *p = (__be16 *)(skb->data+(iph->ihl<<2));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513 int grehlen = (iph->ihl<<2) + 4;
Arnaldo Carvalho de Melo88c76642007-03-13 14:43:18 -0300514 const int type = icmp_hdr(skb)->type;
515 const int code = icmp_hdr(skb)->code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700516 struct ip_tunnel *t;
Al Virod5a0a1e2006-11-08 00:23:14 -0800517 __be16 flags;
stephen hemmingerd2083282012-09-24 18:12:23 +0000518 __be32 key = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519
520 flags = p[0];
521 if (flags&(GRE_CSUM|GRE_KEY|GRE_SEQ|GRE_ROUTING|GRE_VERSION)) {
522 if (flags&(GRE_VERSION|GRE_ROUTING))
523 return;
524 if (flags&GRE_KEY) {
525 grehlen += 4;
526 if (flags&GRE_CSUM)
527 grehlen += 4;
528 }
529 }
530
531 /* If only 8 bytes returned, keyed message will be dropped here */
532 if (skb_headlen(skb) < grehlen)
533 return;
534
stephen hemmingerd2083282012-09-24 18:12:23 +0000535 if (flags & GRE_KEY)
536 key = *(((__be32 *)p) + (grehlen / 4) - 1);
537
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538 switch (type) {
539 default:
540 case ICMP_PARAMETERPROB:
541 return;
542
543 case ICMP_DEST_UNREACH:
544 switch (code) {
545 case ICMP_SR_FAILED:
546 case ICMP_PORT_UNREACH:
547 /* Impossible event. */
548 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700549 default:
550 /* All others are translated to HOST_UNREACH.
551 rfc2003 contains "deep thoughts" about NET_UNREACH,
552 I believe they are just ether pollution. --ANK
553 */
554 break;
555 }
556 break;
557 case ICMP_TIME_EXCEEDED:
558 if (code != ICMP_EXC_TTL)
559 return;
560 break;
David S. Miller55be7a92012-07-11 21:27:49 -0700561
562 case ICMP_REDIRECT:
563 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700564 }
565
Timo Teras749c10f2009-01-19 17:22:12 -0800566 t = ipgre_tunnel_lookup(skb->dev, iph->daddr, iph->saddr,
stephen hemmingerd2083282012-09-24 18:12:23 +0000567 flags, key, p[1]);
568
David S. Miller36393392012-06-14 22:21:46 -0700569 if (t == NULL)
stephen hemminger0c5794a2012-09-24 18:12:24 +0000570 return;
David S. Miller36393392012-06-14 22:21:46 -0700571
572 if (type == ICMP_DEST_UNREACH && code == ICMP_FRAG_NEEDED) {
573 ipv4_update_pmtu(skb, dev_net(skb->dev), info,
574 t->parms.link, 0, IPPROTO_GRE, 0);
stephen hemminger0c5794a2012-09-24 18:12:24 +0000575 return;
David S. Miller36393392012-06-14 22:21:46 -0700576 }
David S. Miller55be7a92012-07-11 21:27:49 -0700577 if (type == ICMP_REDIRECT) {
578 ipv4_redirect(skb, dev_net(skb->dev), t->parms.link, 0,
579 IPPROTO_GRE, 0);
stephen hemminger0c5794a2012-09-24 18:12:24 +0000580 return;
David S. Miller55be7a92012-07-11 21:27:49 -0700581 }
David S. Miller36393392012-06-14 22:21:46 -0700582 if (t->parms.iph.daddr == 0 ||
Joe Perchesf97c1e02007-12-16 13:45:43 -0800583 ipv4_is_multicast(t->parms.iph.daddr))
stephen hemminger0c5794a2012-09-24 18:12:24 +0000584 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585
586 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
stephen hemminger0c5794a2012-09-24 18:12:24 +0000587 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588
Wei Yongjunda6185d82009-02-24 23:34:48 -0800589 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700590 t->err_count++;
591 else
592 t->err_count = 1;
593 t->err_time = jiffies;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700594}
595
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596static inline u8
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000597ipgre_ecn_encapsulate(u8 tos, const struct iphdr *old_iph, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700598{
599 u8 inner = 0;
600 if (skb->protocol == htons(ETH_P_IP))
601 inner = old_iph->tos;
602 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000603 inner = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 return INET_ECN_encapsulate(tos, inner);
605}
606
607static int ipgre_rcv(struct sk_buff *skb)
608{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000609 const struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700610 u8 *h;
Al Virod5a0a1e2006-11-08 00:23:14 -0800611 __be16 flags;
Al Virod3bc23e2006-11-14 21:24:49 -0800612 __sum16 csum = 0;
Al Virod5a0a1e2006-11-08 00:23:14 -0800613 __be32 key = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 u32 seqno = 0;
615 struct ip_tunnel *tunnel;
616 int offset = 4;
Herbert Xue1a80002008-10-09 12:00:17 -0700617 __be16 gre_proto;
stephen hemmingereccc1bb2012-09-25 11:02:48 +0000618 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619
620 if (!pskb_may_pull(skb, 16))
stephen hemminger0c5794a2012-09-24 18:12:24 +0000621 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700622
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700623 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700624 h = skb->data;
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000625 flags = *(__be16 *)h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700626
627 if (flags&(GRE_CSUM|GRE_KEY|GRE_ROUTING|GRE_SEQ|GRE_VERSION)) {
628 /* - Version must be 0.
629 - We do not support routing headers.
630 */
631 if (flags&(GRE_VERSION|GRE_ROUTING))
stephen hemminger0c5794a2012-09-24 18:12:24 +0000632 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633
634 if (flags&GRE_CSUM) {
Herbert Xufb286bb2005-11-10 13:01:24 -0800635 switch (skb->ip_summed) {
Patrick McHardy84fa7932006-08-29 16:44:56 -0700636 case CHECKSUM_COMPLETE:
Al Virod3bc23e2006-11-14 21:24:49 -0800637 csum = csum_fold(skb->csum);
Herbert Xufb286bb2005-11-10 13:01:24 -0800638 if (!csum)
639 break;
640 /* fall through */
641 case CHECKSUM_NONE:
642 skb->csum = 0;
643 csum = __skb_checksum_complete(skb);
Patrick McHardy84fa7932006-08-29 16:44:56 -0700644 skb->ip_summed = CHECKSUM_COMPLETE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700645 }
646 offset += 4;
647 }
648 if (flags&GRE_KEY) {
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000649 key = *(__be32 *)(h + offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 offset += 4;
651 }
652 if (flags&GRE_SEQ) {
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000653 seqno = ntohl(*(__be32 *)(h + offset));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654 offset += 4;
655 }
656 }
657
Herbert Xue1a80002008-10-09 12:00:17 -0700658 gre_proto = *(__be16 *)(h + 2);
659
stephen hemmingerd2083282012-09-24 18:12:23 +0000660 tunnel = ipgre_tunnel_lookup(skb->dev,
661 iph->saddr, iph->daddr, flags, key,
662 gre_proto);
663 if (tunnel) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000664 struct pcpu_tstats *tstats;
Pavel Emelyanovaddd68e2008-05-21 14:14:22 -0700665
Linus Torvalds1da177e2005-04-16 15:20:36 -0700666 secpath_reset(skb);
667
Herbert Xue1a80002008-10-09 12:00:17 -0700668 skb->protocol = gre_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700669 /* WCCP version 1 and 2 protocol decoding.
670 * - Change protocol to IP
671 * - When dealing with WCCPv2, Skip extra 4 bytes in GRE header
672 */
Herbert Xue1a80002008-10-09 12:00:17 -0700673 if (flags == 0 && gre_proto == htons(ETH_P_WCCP)) {
YOSHIFUJI Hideaki496c98d2006-10-10 19:41:21 -0700674 skb->protocol = htons(ETH_P_IP);
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900675 if ((*(h + offset) & 0xF0) != 0x40)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676 offset += 4;
677 }
678
Timo Teras1d069162007-12-20 00:10:33 -0800679 skb->mac_header = skb->network_header;
Arnaldo Carvalho de Melo4209fb62007-03-10 18:42:03 -0300680 __pskb_pull(skb, offset);
Arnaldo Carvalho de Melo9c702202007-04-25 18:04:18 -0700681 skb_postpull_rcsum(skb, skb_transport_header(skb), offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700682 skb->pkt_type = PACKET_HOST;
683#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -0800684 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700685 /* Looped back packet, drop it! */
David S. Millerc7537962010-11-11 17:07:48 -0800686 if (rt_is_output_route(skb_rtable(skb)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700687 goto drop;
Eric Dumazete985aad2010-09-27 03:57:11 +0000688 tunnel->dev->stats.multicast++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689 skb->pkt_type = PACKET_BROADCAST;
690 }
691#endif
692
693 if (((flags&GRE_CSUM) && csum) ||
694 (!(flags&GRE_CSUM) && tunnel->parms.i_flags&GRE_CSUM)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000695 tunnel->dev->stats.rx_crc_errors++;
696 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700697 goto drop;
698 }
699 if (tunnel->parms.i_flags&GRE_SEQ) {
700 if (!(flags&GRE_SEQ) ||
701 (tunnel->i_seqno && (s32)(seqno - tunnel->i_seqno) < 0)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000702 tunnel->dev->stats.rx_fifo_errors++;
703 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700704 goto drop;
705 }
706 tunnel->i_seqno = seqno + 1;
707 }
Herbert Xue1a80002008-10-09 12:00:17 -0700708
709 /* Warning: All skb pointers will be invalidated! */
710 if (tunnel->dev->type == ARPHRD_ETHER) {
711 if (!pskb_may_pull(skb, ETH_HLEN)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000712 tunnel->dev->stats.rx_length_errors++;
713 tunnel->dev->stats.rx_errors++;
Herbert Xue1a80002008-10-09 12:00:17 -0700714 goto drop;
715 }
716
717 iph = ip_hdr(skb);
718 skb->protocol = eth_type_trans(skb, tunnel->dev);
719 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
720 }
721
stephen hemmingereccc1bb2012-09-25 11:02:48 +0000722 __skb_tunnel_rx(skb, tunnel->dev);
723
724 skb_reset_network_header(skb);
725 err = IP_ECN_decapsulate(iph, skb);
726 if (unlikely(err)) {
727 if (log_ecn_error)
728 net_info_ratelimited("non-ECT from %pI4 with TOS=%#x\n",
729 &iph->saddr, iph->tos);
730 if (err > 1) {
731 ++tunnel->dev->stats.rx_frame_errors;
732 ++tunnel->dev->stats.rx_errors;
733 goto drop;
734 }
735 }
736
Eric Dumazete985aad2010-09-27 03:57:11 +0000737 tstats = this_cpu_ptr(tunnel->dev->tstats);
stephen hemminger87b6d212012-04-12 06:31:16 +0000738 u64_stats_update_begin(&tstats->syncp);
Eric Dumazete985aad2010-09-27 03:57:11 +0000739 tstats->rx_packets++;
740 tstats->rx_bytes += skb->len;
stephen hemminger87b6d212012-04-12 06:31:16 +0000741 u64_stats_update_end(&tstats->syncp);
Eric Dumazete985aad2010-09-27 03:57:11 +0000742
Eric Dumazetcaf586e2010-09-30 21:06:55 +0000743 netif_rx(skb);
Eric Dumazet8990f462010-09-20 00:12:11 +0000744
Eric Dumazet8990f462010-09-20 00:12:11 +0000745 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700746 }
Herbert Xu45af08b2006-04-05 22:31:19 -0700747 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748
749drop:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700750 kfree_skb(skb);
Eric Dumazeta02cec22010-09-22 20:43:57 +0000751 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700752}
753
Stephen Hemminger6fef4c02009-08-31 19:50:41 +0000754static netdev_tx_t ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755{
Patrick McHardy2941a482006-01-08 22:05:26 -0800756 struct ip_tunnel *tunnel = netdev_priv(dev);
Eric Dumazete985aad2010-09-27 03:57:11 +0000757 struct pcpu_tstats *tstats;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000758 const struct iphdr *old_iph = ip_hdr(skb);
759 const struct iphdr *tiph;
David S. Millercbb1e852011-05-04 12:33:34 -0700760 struct flowi4 fl4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700761 u8 tos;
Al Virod5a0a1e2006-11-08 00:23:14 -0800762 __be16 df;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763 struct rtable *rt; /* Route to the other host */
Eric Dumazet15078502010-09-15 11:07:53 +0000764 struct net_device *tdev; /* Device to other host */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700765 struct iphdr *iph; /* Our new IP header */
Chuck Leverc2636b42007-10-23 21:07:32 -0700766 unsigned int max_headroom; /* The extra header space needed */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700767 int gre_hlen;
Al Virod5a0a1e2006-11-08 00:23:14 -0800768 __be32 dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700769 int mtu;
770
Eric Dumazet6b78f162012-09-13 21:25:33 +0000771 if (skb->ip_summed == CHECKSUM_PARTIAL &&
772 skb_checksum_help(skb))
773 goto tx_error;
774
Herbert Xue1a80002008-10-09 12:00:17 -0700775 if (dev->type == ARPHRD_ETHER)
776 IPCB(skb)->flags = 0;
777
778 if (dev->header_ops && dev->type == ARPHRD_IPGRE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700779 gre_hlen = 0;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000780 tiph = (const struct iphdr *)skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700781 } else {
782 gre_hlen = tunnel->hlen;
783 tiph = &tunnel->parms.iph;
784 }
785
786 if ((dst = tiph->daddr) == 0) {
787 /* NBMA tunnel */
788
Eric Dumazetadf30902009-06-02 05:19:30 +0000789 if (skb_dst(skb) == NULL) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000790 dev->stats.tx_fifo_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700791 goto tx_error;
792 }
793
David S. Miller61d57f82012-01-24 18:23:30 -0500794 if (skb->protocol == htons(ETH_P_IP)) {
Eric Dumazet511c3f92009-06-02 05:14:27 +0000795 rt = skb_rtable(skb);
David S. Millerf8126f12012-07-13 05:03:45 -0700796 dst = rt_nexthop(rt, old_iph->daddr);
David S. Miller61d57f82012-01-24 18:23:30 -0500797 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000798#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700799 else if (skb->protocol == htons(ETH_P_IPV6)) {
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000800 const struct in6_addr *addr6;
David S. Miller0ec88662012-01-27 15:01:08 -0800801 struct neighbour *neigh;
802 bool do_tx_error_icmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700803 int addr_type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700804
David S. Miller0ec88662012-01-27 15:01:08 -0800805 neigh = dst_neigh_lookup(skb_dst(skb), &ipv6_hdr(skb)->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806 if (neigh == NULL)
807 goto tx_error;
808
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000809 addr6 = (const struct in6_addr *)&neigh->primary_key;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700810 addr_type = ipv6_addr_type(addr6);
811
812 if (addr_type == IPV6_ADDR_ANY) {
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700813 addr6 = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700814 addr_type = ipv6_addr_type(addr6);
815 }
816
817 if ((addr_type & IPV6_ADDR_COMPATv4) == 0)
David S. Miller0ec88662012-01-27 15:01:08 -0800818 do_tx_error_icmp = true;
819 else {
820 do_tx_error_icmp = false;
821 dst = addr6->s6_addr32[3];
822 }
823 neigh_release(neigh);
824 if (do_tx_error_icmp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700825 goto tx_error_icmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826 }
827#endif
828 else
829 goto tx_error;
830 }
831
832 tos = tiph->tos;
Andreas Jaggiee686ca2009-07-14 09:35:59 -0700833 if (tos == 1) {
834 tos = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700835 if (skb->protocol == htons(ETH_P_IP))
836 tos = old_iph->tos;
Stephen Hemmingerdd4ba832010-07-08 21:35:58 -0700837 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000838 tos = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700839 }
840
David S. Millercbb1e852011-05-04 12:33:34 -0700841 rt = ip_route_output_gre(dev_net(dev), &fl4, dst, tiph->saddr,
David S. Miller78fbfd82011-03-12 00:00:52 -0500842 tunnel->parms.o_key, RT_TOS(tos),
843 tunnel->parms.link);
844 if (IS_ERR(rt)) {
845 dev->stats.tx_carrier_errors++;
846 goto tx_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700847 }
Changli Gaod8d1f302010-06-10 23:31:35 -0700848 tdev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700849
850 if (tdev == dev) {
851 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000852 dev->stats.collisions++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700853 goto tx_error;
854 }
855
856 df = tiph->frag_off;
857 if (df)
Changli Gaod8d1f302010-06-10 23:31:35 -0700858 mtu = dst_mtu(&rt->dst) - dev->hard_header_len - tunnel->hlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700859 else
Eric Dumazetadf30902009-06-02 05:19:30 +0000860 mtu = skb_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700861
Eric Dumazetadf30902009-06-02 05:19:30 +0000862 if (skb_dst(skb))
David S. Miller6700c272012-07-17 03:29:28 -0700863 skb_dst(skb)->ops->update_pmtu(skb_dst(skb), NULL, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700864
865 if (skb->protocol == htons(ETH_P_IP)) {
866 df |= (old_iph->frag_off&htons(IP_DF));
867
868 if ((old_iph->frag_off&htons(IP_DF)) &&
869 mtu < ntohs(old_iph->tot_len)) {
870 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, htonl(mtu));
871 ip_rt_put(rt);
872 goto tx_error;
873 }
874 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000875#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700876 else if (skb->protocol == htons(ETH_P_IPV6)) {
Eric Dumazetadf30902009-06-02 05:19:30 +0000877 struct rt6_info *rt6 = (struct rt6_info *)skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700878
Eric Dumazetadf30902009-06-02 05:19:30 +0000879 if (rt6 && mtu < dst_mtu(skb_dst(skb)) && mtu >= IPV6_MIN_MTU) {
Joe Perchesf97c1e02007-12-16 13:45:43 -0800880 if ((tunnel->parms.iph.daddr &&
881 !ipv4_is_multicast(tunnel->parms.iph.daddr)) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700882 rt6->rt6i_dst.plen == 128) {
883 rt6->rt6i_flags |= RTF_MODIFIED;
David S. Millerdefb3512010-12-08 21:16:57 -0800884 dst_metric_set(skb_dst(skb), RTAX_MTU, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700885 }
886 }
887
888 if (mtu >= IPV6_MIN_MTU && mtu < skb->len - tunnel->hlen + gre_hlen) {
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000889 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890 ip_rt_put(rt);
891 goto tx_error;
892 }
893 }
894#endif
895
896 if (tunnel->err_count > 0) {
Wei Yongjunda6185d82009-02-24 23:34:48 -0800897 if (time_before(jiffies,
898 tunnel->err_time + IPTUNNEL_ERR_TIMEO)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700899 tunnel->err_count--;
900
901 dst_link_failure(skb);
902 } else
903 tunnel->err_count = 0;
904 }
905
Changli Gaod8d1f302010-06-10 23:31:35 -0700906 max_headroom = LL_RESERVED_SPACE(tdev) + gre_hlen + rt->dst.header_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700907
Patrick McHardycfbba492007-07-09 15:33:40 -0700908 if (skb_headroom(skb) < max_headroom || skb_shared(skb)||
909 (skb_cloned(skb) && !skb_clone_writable(skb, 0))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700910 struct sk_buff *new_skb = skb_realloc_headroom(skb, max_headroom);
Herbert Xu805dc1d2011-11-18 02:20:06 +0000911 if (max_headroom > dev->needed_headroom)
912 dev->needed_headroom = max_headroom;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700913 if (!new_skb) {
914 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000915 dev->stats.tx_dropped++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700916 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000917 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700918 }
919 if (skb->sk)
920 skb_set_owner_w(new_skb, skb->sk);
921 dev_kfree_skb(skb);
922 skb = new_skb;
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700923 old_iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700924 }
925
Herbert Xu64194c32008-10-09 12:03:17 -0700926 skb_reset_transport_header(skb);
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700927 skb_push(skb, gre_hlen);
928 skb_reset_network_header(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700929 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
Patrick McHardy48d5cad2006-02-15 15:10:22 -0800930 IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
931 IPSKB_REROUTED);
Eric Dumazetadf30902009-06-02 05:19:30 +0000932 skb_dst_drop(skb);
Changli Gaod8d1f302010-06-10 23:31:35 -0700933 skb_dst_set(skb, &rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700934
935 /*
936 * Push down and install the IPIP header.
937 */
938
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700939 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700940 iph->version = 4;
941 iph->ihl = sizeof(struct iphdr) >> 2;
942 iph->frag_off = df;
943 iph->protocol = IPPROTO_GRE;
944 iph->tos = ipgre_ecn_encapsulate(tos, old_iph, skb);
David S. Millercbb1e852011-05-04 12:33:34 -0700945 iph->daddr = fl4.daddr;
946 iph->saddr = fl4.saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700947
948 if ((iph->ttl = tiph->ttl) == 0) {
949 if (skb->protocol == htons(ETH_P_IP))
950 iph->ttl = old_iph->ttl;
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000951#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700952 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000953 iph->ttl = ((const struct ipv6hdr *)old_iph)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700954#endif
955 else
David S. Miller323e1262010-12-12 21:55:08 -0800956 iph->ttl = ip4_dst_hoplimit(&rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700957 }
958
Herbert Xue1a80002008-10-09 12:00:17 -0700959 ((__be16 *)(iph + 1))[0] = tunnel->parms.o_flags;
960 ((__be16 *)(iph + 1))[1] = (dev->type == ARPHRD_ETHER) ?
961 htons(ETH_P_TEB) : skb->protocol;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700962
963 if (tunnel->parms.o_flags&(GRE_KEY|GRE_CSUM|GRE_SEQ)) {
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000964 __be32 *ptr = (__be32 *)(((u8 *)iph) + tunnel->hlen - 4);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700965
966 if (tunnel->parms.o_flags&GRE_SEQ) {
967 ++tunnel->o_seqno;
968 *ptr = htonl(tunnel->o_seqno);
969 ptr--;
970 }
971 if (tunnel->parms.o_flags&GRE_KEY) {
972 *ptr = tunnel->parms.o_key;
973 ptr--;
974 }
975 if (tunnel->parms.o_flags&GRE_CSUM) {
976 *ptr = 0;
Daniel Baluta5e73ea12012-04-15 01:34:41 +0000977 *(__sum16 *)ptr = ip_compute_csum((void *)(iph+1), skb->len - sizeof(struct iphdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700978 }
979 }
980
981 nf_reset(skb);
Eric Dumazete985aad2010-09-27 03:57:11 +0000982 tstats = this_cpu_ptr(dev->tstats);
983 __IPTUNNEL_XMIT(tstats, &dev->stats);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000984 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700985
David S. Miller496053f2012-01-11 16:46:32 -0800986#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987tx_error_icmp:
988 dst_link_failure(skb);
David S. Miller496053f2012-01-11 16:46:32 -0800989#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700990tx_error:
Eric Dumazete985aad2010-09-27 03:57:11 +0000991 dev->stats.tx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700992 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000993 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700994}
995
Herbert Xu42aa9162008-10-09 11:59:32 -0700996static int ipgre_tunnel_bind_dev(struct net_device *dev)
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800997{
998 struct net_device *tdev = NULL;
999 struct ip_tunnel *tunnel;
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001000 const struct iphdr *iph;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001001 int hlen = LL_MAX_HEADER;
1002 int mtu = ETH_DATA_LEN;
1003 int addend = sizeof(struct iphdr) + 4;
1004
1005 tunnel = netdev_priv(dev);
1006 iph = &tunnel->parms.iph;
1007
Herbert Xuc95b8192008-10-09 11:58:54 -07001008 /* Guess output device to choose reasonable mtu and needed_headroom */
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001009
1010 if (iph->daddr) {
David S. Millercbb1e852011-05-04 12:33:34 -07001011 struct flowi4 fl4;
1012 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +00001013
David S. Millercbb1e852011-05-04 12:33:34 -07001014 rt = ip_route_output_gre(dev_net(dev), &fl4,
1015 iph->daddr, iph->saddr,
1016 tunnel->parms.o_key,
1017 RT_TOS(iph->tos),
1018 tunnel->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -08001019 if (!IS_ERR(rt)) {
Changli Gaod8d1f302010-06-10 23:31:35 -07001020 tdev = rt->dst.dev;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001021 ip_rt_put(rt);
1022 }
Herbert Xue1a80002008-10-09 12:00:17 -07001023
1024 if (dev->type != ARPHRD_ETHER)
1025 dev->flags |= IFF_POINTOPOINT;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001026 }
1027
1028 if (!tdev && tunnel->parms.link)
Pavel Emelyanov96635522008-04-16 01:10:44 -07001029 tdev = __dev_get_by_index(dev_net(dev), tunnel->parms.link);
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001030
1031 if (tdev) {
Herbert Xuc95b8192008-10-09 11:58:54 -07001032 hlen = tdev->hard_header_len + tdev->needed_headroom;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001033 mtu = tdev->mtu;
1034 }
1035 dev->iflink = tunnel->parms.link;
1036
1037 /* Precalculate GRE options length */
1038 if (tunnel->parms.o_flags&(GRE_CSUM|GRE_KEY|GRE_SEQ)) {
1039 if (tunnel->parms.o_flags&GRE_CSUM)
1040 addend += 4;
1041 if (tunnel->parms.o_flags&GRE_KEY)
1042 addend += 4;
1043 if (tunnel->parms.o_flags&GRE_SEQ)
1044 addend += 4;
1045 }
Herbert Xuc95b8192008-10-09 11:58:54 -07001046 dev->needed_headroom = addend + hlen;
Tom Goff8cdb0452009-08-14 16:33:56 -07001047 mtu -= dev->hard_header_len + addend;
Herbert Xu42aa9162008-10-09 11:59:32 -07001048
1049 if (mtu < 68)
1050 mtu = 68;
1051
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001052 tunnel->hlen = addend;
1053
Herbert Xu42aa9162008-10-09 11:59:32 -07001054 return mtu;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001055}
1056
Linus Torvalds1da177e2005-04-16 15:20:36 -07001057static int
1058ipgre_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
1059{
1060 int err = 0;
1061 struct ip_tunnel_parm p;
1062 struct ip_tunnel *t;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001063 struct net *net = dev_net(dev);
1064 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001065
1066 switch (cmd) {
1067 case SIOCGETTUNNEL:
1068 t = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001069 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001070 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) {
1071 err = -EFAULT;
1072 break;
1073 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001074 t = ipgre_tunnel_locate(net, &p, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001075 }
1076 if (t == NULL)
Patrick McHardy2941a482006-01-08 22:05:26 -08001077 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001078 memcpy(&p, &t->parms, sizeof(p));
1079 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
1080 err = -EFAULT;
1081 break;
1082
1083 case SIOCADDTUNNEL:
1084 case SIOCCHGTUNNEL:
1085 err = -EPERM;
1086 if (!capable(CAP_NET_ADMIN))
1087 goto done;
1088
1089 err = -EFAULT;
1090 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1091 goto done;
1092
1093 err = -EINVAL;
1094 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
1095 p.iph.ihl != 5 || (p.iph.frag_off&htons(~IP_DF)) ||
1096 ((p.i_flags|p.o_flags)&(GRE_VERSION|GRE_ROUTING)))
1097 goto done;
1098 if (p.iph.ttl)
1099 p.iph.frag_off |= htons(IP_DF);
1100
1101 if (!(p.i_flags&GRE_KEY))
1102 p.i_key = 0;
1103 if (!(p.o_flags&GRE_KEY))
1104 p.o_key = 0;
1105
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001106 t = ipgre_tunnel_locate(net, &p, cmd == SIOCADDTUNNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001107
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001108 if (dev != ign->fb_tunnel_dev && cmd == SIOCCHGTUNNEL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001109 if (t != NULL) {
1110 if (t->dev != dev) {
1111 err = -EEXIST;
1112 break;
1113 }
1114 } else {
Eric Dumazet15078502010-09-15 11:07:53 +00001115 unsigned int nflags = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001116
Patrick McHardy2941a482006-01-08 22:05:26 -08001117 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001118
Joe Perchesf97c1e02007-12-16 13:45:43 -08001119 if (ipv4_is_multicast(p.iph.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001120 nflags = IFF_BROADCAST;
1121 else if (p.iph.daddr)
1122 nflags = IFF_POINTOPOINT;
1123
1124 if ((dev->flags^nflags)&(IFF_POINTOPOINT|IFF_BROADCAST)) {
1125 err = -EINVAL;
1126 break;
1127 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001128 ipgre_tunnel_unlink(ign, t);
Pavel Emelyanov74b0b852010-10-27 05:43:53 +00001129 synchronize_net();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001130 t->parms.iph.saddr = p.iph.saddr;
1131 t->parms.iph.daddr = p.iph.daddr;
1132 t->parms.i_key = p.i_key;
1133 t->parms.o_key = p.o_key;
1134 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1135 memcpy(dev->broadcast, &p.iph.daddr, 4);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001136 ipgre_tunnel_link(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001137 netdev_state_change(dev);
1138 }
1139 }
1140
1141 if (t) {
1142 err = 0;
1143 if (cmd == SIOCCHGTUNNEL) {
1144 t->parms.iph.ttl = p.iph.ttl;
1145 t->parms.iph.tos = p.iph.tos;
1146 t->parms.iph.frag_off = p.iph.frag_off;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001147 if (t->parms.link != p.link) {
1148 t->parms.link = p.link;
Herbert Xu42aa9162008-10-09 11:59:32 -07001149 dev->mtu = ipgre_tunnel_bind_dev(dev);
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001150 netdev_state_change(dev);
1151 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001152 }
1153 if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
1154 err = -EFAULT;
1155 } else
1156 err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT);
1157 break;
1158
1159 case SIOCDELTUNNEL:
1160 err = -EPERM;
1161 if (!capable(CAP_NET_ADMIN))
1162 goto done;
1163
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001164 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001165 err = -EFAULT;
1166 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1167 goto done;
1168 err = -ENOENT;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001169 if ((t = ipgre_tunnel_locate(net, &p, 0)) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001170 goto done;
1171 err = -EPERM;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001172 if (t == netdev_priv(ign->fb_tunnel_dev))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001173 goto done;
1174 dev = t->dev;
1175 }
Stephen Hemminger22f8cde2007-02-07 00:09:58 -08001176 unregister_netdevice(dev);
1177 err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001178 break;
1179
1180 default:
1181 err = -EINVAL;
1182 }
1183
1184done:
1185 return err;
1186}
1187
Linus Torvalds1da177e2005-04-16 15:20:36 -07001188static int ipgre_tunnel_change_mtu(struct net_device *dev, int new_mtu)
1189{
Patrick McHardy2941a482006-01-08 22:05:26 -08001190 struct ip_tunnel *tunnel = netdev_priv(dev);
Herbert Xuc95b8192008-10-09 11:58:54 -07001191 if (new_mtu < 68 ||
1192 new_mtu > 0xFFF8 - dev->hard_header_len - tunnel->hlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001193 return -EINVAL;
1194 dev->mtu = new_mtu;
1195 return 0;
1196}
1197
Linus Torvalds1da177e2005-04-16 15:20:36 -07001198/* Nice toy. Unfortunately, useless in real life :-)
1199 It allows to construct virtual multiprotocol broadcast "LAN"
1200 over the Internet, provided multicast routing is tuned.
1201
1202
1203 I have no idea was this bicycle invented before me,
1204 so that I had to set ARPHRD_IPGRE to a random value.
1205 I have an impression, that Cisco could make something similar,
1206 but this feature is apparently missing in IOS<=11.2(8).
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001207
Linus Torvalds1da177e2005-04-16 15:20:36 -07001208 I set up 10.66.66/24 and fec0:6666:6666::0/96 as virtual networks
1209 with broadcast 224.66.66.66. If you have access to mbone, play with me :-)
1210
1211 ping -t 255 224.66.66.66
1212
1213 If nobody answers, mbone does not work.
1214
1215 ip tunnel add Universe mode gre remote 224.66.66.66 local <Your_real_addr> ttl 255
1216 ip addr add 10.66.66.<somewhat>/24 dev Universe
1217 ifconfig Universe up
1218 ifconfig Universe add fe80::<Your_real_addr>/10
1219 ifconfig Universe add fec0:6666:6666::<Your_real_addr>/96
1220 ftp 10.66.66.66
1221 ...
1222 ftp fec0:6666:6666::193.233.7.65
1223 ...
1224
1225 */
1226
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001227static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
1228 unsigned short type,
Eric Dumazet15078502010-09-15 11:07:53 +00001229 const void *daddr, const void *saddr, unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001230{
Patrick McHardy2941a482006-01-08 22:05:26 -08001231 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001232 struct iphdr *iph = (struct iphdr *)skb_push(skb, t->hlen);
Daniel Baluta5e73ea12012-04-15 01:34:41 +00001233 __be16 *p = (__be16 *)(iph+1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001234
1235 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
1236 p[0] = t->parms.o_flags;
1237 p[1] = htons(type);
1238
1239 /*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001240 * Set the source hardware address.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001241 */
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001242
Linus Torvalds1da177e2005-04-16 15:20:36 -07001243 if (saddr)
1244 memcpy(&iph->saddr, saddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001245 if (daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001246 memcpy(&iph->daddr, daddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001247 if (iph->daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001248 return t->hlen;
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001249
Linus Torvalds1da177e2005-04-16 15:20:36 -07001250 return -t->hlen;
1251}
1252
Timo Teras6a5f44d2007-10-23 20:31:53 -07001253static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
1254{
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001255 const struct iphdr *iph = (const struct iphdr *) skb_mac_header(skb);
Timo Teras6a5f44d2007-10-23 20:31:53 -07001256 memcpy(haddr, &iph->saddr, 4);
1257 return 4;
1258}
1259
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001260static const struct header_ops ipgre_header_ops = {
1261 .create = ipgre_header,
Timo Teras6a5f44d2007-10-23 20:31:53 -07001262 .parse = ipgre_header_parse,
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001263};
1264
Timo Teras6a5f44d2007-10-23 20:31:53 -07001265#ifdef CONFIG_NET_IPGRE_BROADCAST
Linus Torvalds1da177e2005-04-16 15:20:36 -07001266static int ipgre_open(struct net_device *dev)
1267{
Patrick McHardy2941a482006-01-08 22:05:26 -08001268 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001269
Joe Perchesf97c1e02007-12-16 13:45:43 -08001270 if (ipv4_is_multicast(t->parms.iph.daddr)) {
David S. Millercbb1e852011-05-04 12:33:34 -07001271 struct flowi4 fl4;
1272 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +00001273
David S. Millercbb1e852011-05-04 12:33:34 -07001274 rt = ip_route_output_gre(dev_net(dev), &fl4,
1275 t->parms.iph.daddr,
1276 t->parms.iph.saddr,
1277 t->parms.o_key,
1278 RT_TOS(t->parms.iph.tos),
1279 t->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -08001280 if (IS_ERR(rt))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001281 return -EADDRNOTAVAIL;
Changli Gaod8d1f302010-06-10 23:31:35 -07001282 dev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001283 ip_rt_put(rt);
Herbert Xue5ed6392005-10-03 14:35:55 -07001284 if (__in_dev_get_rtnl(dev) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001285 return -EADDRNOTAVAIL;
1286 t->mlink = dev->ifindex;
Herbert Xue5ed6392005-10-03 14:35:55 -07001287 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001288 }
1289 return 0;
1290}
1291
1292static int ipgre_close(struct net_device *dev)
1293{
Patrick McHardy2941a482006-01-08 22:05:26 -08001294 struct ip_tunnel *t = netdev_priv(dev);
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001295
Joe Perchesf97c1e02007-12-16 13:45:43 -08001296 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
Denis V. Lunev7fee0ca2008-01-21 17:32:38 -08001297 struct in_device *in_dev;
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +09001298 in_dev = inetdev_by_index(dev_net(dev), t->mlink);
Eric Dumazet8723e1b2010-10-19 00:39:26 +00001299 if (in_dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001300 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001301 }
1302 return 0;
1303}
1304
1305#endif
1306
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001307static const struct net_device_ops ipgre_netdev_ops = {
1308 .ndo_init = ipgre_tunnel_init,
1309 .ndo_uninit = ipgre_tunnel_uninit,
1310#ifdef CONFIG_NET_IPGRE_BROADCAST
1311 .ndo_open = ipgre_open,
1312 .ndo_stop = ipgre_close,
1313#endif
1314 .ndo_start_xmit = ipgre_tunnel_xmit,
1315 .ndo_do_ioctl = ipgre_tunnel_ioctl,
1316 .ndo_change_mtu = ipgre_tunnel_change_mtu,
stephen hemminger87b6d212012-04-12 06:31:16 +00001317 .ndo_get_stats64 = ipgre_get_stats64,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001318};
1319
Eric Dumazete985aad2010-09-27 03:57:11 +00001320static void ipgre_dev_free(struct net_device *dev)
1321{
1322 free_percpu(dev->tstats);
1323 free_netdev(dev);
1324}
1325
Eric Dumazet6b78f162012-09-13 21:25:33 +00001326#define GRE_FEATURES (NETIF_F_SG | \
1327 NETIF_F_FRAGLIST | \
1328 NETIF_F_HIGHDMA | \
1329 NETIF_F_HW_CSUM)
1330
Linus Torvalds1da177e2005-04-16 15:20:36 -07001331static void ipgre_tunnel_setup(struct net_device *dev)
1332{
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001333 dev->netdev_ops = &ipgre_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001334 dev->destructor = ipgre_dev_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001335
1336 dev->type = ARPHRD_IPGRE;
Herbert Xuc95b8192008-10-09 11:58:54 -07001337 dev->needed_headroom = LL_MAX_HEADER + sizeof(struct iphdr) + 4;
Kris Katterjohn46f25df2006-01-05 16:35:42 -08001338 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001339 dev->flags = IFF_NOARP;
1340 dev->iflink = 0;
1341 dev->addr_len = 4;
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -07001342 dev->features |= NETIF_F_NETNS_LOCAL;
Eric Dumazet108bfa82009-05-28 22:35:10 +00001343 dev->priv_flags &= ~IFF_XMIT_DST_RELEASE;
Eric Dumazet6b78f162012-09-13 21:25:33 +00001344
1345 dev->features |= GRE_FEATURES;
1346 dev->hw_features |= GRE_FEATURES;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001347}
1348
1349static int ipgre_tunnel_init(struct net_device *dev)
1350{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001351 struct ip_tunnel *tunnel;
1352 struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001353
Patrick McHardy2941a482006-01-08 22:05:26 -08001354 tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001355 iph = &tunnel->parms.iph;
1356
1357 tunnel->dev = dev;
1358 strcpy(tunnel->parms.name, dev->name);
1359
1360 memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
1361 memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
1362
Linus Torvalds1da177e2005-04-16 15:20:36 -07001363 if (iph->daddr) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001364#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -08001365 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001366 if (!iph->saddr)
1367 return -EINVAL;
1368 dev->flags = IFF_BROADCAST;
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001369 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001370 }
1371#endif
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001372 } else
Timo Teras6a5f44d2007-10-23 20:31:53 -07001373 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001374
Eric Dumazete985aad2010-09-27 03:57:11 +00001375 dev->tstats = alloc_percpu(struct pcpu_tstats);
1376 if (!dev->tstats)
1377 return -ENOMEM;
1378
Linus Torvalds1da177e2005-04-16 15:20:36 -07001379 return 0;
1380}
1381
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001382static void ipgre_fb_tunnel_init(struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001383{
Patrick McHardy2941a482006-01-08 22:05:26 -08001384 struct ip_tunnel *tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001385 struct iphdr *iph = &tunnel->parms.iph;
1386
1387 tunnel->dev = dev;
1388 strcpy(tunnel->parms.name, dev->name);
1389
1390 iph->version = 4;
1391 iph->protocol = IPPROTO_GRE;
1392 iph->ihl = 5;
1393 tunnel->hlen = sizeof(struct iphdr) + 4;
1394
1395 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001396}
1397
1398
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001399static const struct gre_protocol ipgre_protocol = {
1400 .handler = ipgre_rcv,
1401 .err_handler = ipgre_err,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001402};
1403
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001404static void ipgre_destroy_tunnels(struct ipgre_net *ign, struct list_head *head)
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001405{
1406 int prio;
1407
1408 for (prio = 0; prio < 4; prio++) {
1409 int h;
1410 for (h = 0; h < HASH_SIZE; h++) {
Eric Dumazet15078502010-09-15 11:07:53 +00001411 struct ip_tunnel *t;
1412
1413 t = rtnl_dereference(ign->tunnels[prio][h]);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001414
1415 while (t != NULL) {
1416 unregister_netdevice_queue(t->dev, head);
Eric Dumazet15078502010-09-15 11:07:53 +00001417 t = rtnl_dereference(t->next);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001418 }
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001419 }
1420 }
1421}
1422
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001423static int __net_init ipgre_init_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001424{
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001425 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001426 int err;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001427
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001428 ign->fb_tunnel_dev = alloc_netdev(sizeof(struct ip_tunnel), "gre0",
1429 ipgre_tunnel_setup);
1430 if (!ign->fb_tunnel_dev) {
1431 err = -ENOMEM;
1432 goto err_alloc_dev;
1433 }
Alexey Dobriyanbe77e592008-11-23 17:26:26 -08001434 dev_net_set(ign->fb_tunnel_dev, net);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001435
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001436 ipgre_fb_tunnel_init(ign->fb_tunnel_dev);
Herbert Xuc19e6542008-10-09 11:59:55 -07001437 ign->fb_tunnel_dev->rtnl_link_ops = &ipgre_link_ops;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001438
1439 if ((err = register_netdev(ign->fb_tunnel_dev)))
1440 goto err_reg_dev;
1441
Eric Dumazet3285ee32010-10-30 16:21:28 -07001442 rcu_assign_pointer(ign->tunnels_wc[0],
1443 netdev_priv(ign->fb_tunnel_dev));
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001444 return 0;
1445
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001446err_reg_dev:
Eric Dumazet3285ee32010-10-30 16:21:28 -07001447 ipgre_dev_free(ign->fb_tunnel_dev);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001448err_alloc_dev:
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001449 return err;
1450}
1451
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001452static void __net_exit ipgre_exit_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001453{
1454 struct ipgre_net *ign;
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001455 LIST_HEAD(list);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001456
1457 ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001458 rtnl_lock();
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001459 ipgre_destroy_tunnels(ign, &list);
1460 unregister_netdevice_many(&list);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001461 rtnl_unlock();
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001462}
1463
1464static struct pernet_operations ipgre_net_ops = {
1465 .init = ipgre_init_net,
1466 .exit = ipgre_exit_net,
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001467 .id = &ipgre_net_id,
1468 .size = sizeof(struct ipgre_net),
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001469};
Linus Torvalds1da177e2005-04-16 15:20:36 -07001470
Herbert Xuc19e6542008-10-09 11:59:55 -07001471static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[])
1472{
1473 __be16 flags;
1474
1475 if (!data)
1476 return 0;
1477
1478 flags = 0;
1479 if (data[IFLA_GRE_IFLAGS])
1480 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1481 if (data[IFLA_GRE_OFLAGS])
1482 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1483 if (flags & (GRE_VERSION|GRE_ROUTING))
1484 return -EINVAL;
1485
1486 return 0;
1487}
1488
Herbert Xue1a80002008-10-09 12:00:17 -07001489static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[])
1490{
1491 __be32 daddr;
1492
1493 if (tb[IFLA_ADDRESS]) {
1494 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1495 return -EINVAL;
1496 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1497 return -EADDRNOTAVAIL;
1498 }
1499
1500 if (!data)
1501 goto out;
1502
1503 if (data[IFLA_GRE_REMOTE]) {
1504 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1505 if (!daddr)
1506 return -EINVAL;
1507 }
1508
1509out:
1510 return ipgre_tunnel_validate(tb, data);
1511}
1512
Herbert Xuc19e6542008-10-09 11:59:55 -07001513static void ipgre_netlink_parms(struct nlattr *data[],
1514 struct ip_tunnel_parm *parms)
1515{
Herbert Xu7bb82d92008-10-11 12:20:15 -07001516 memset(parms, 0, sizeof(*parms));
Herbert Xuc19e6542008-10-09 11:59:55 -07001517
1518 parms->iph.protocol = IPPROTO_GRE;
1519
1520 if (!data)
1521 return;
1522
1523 if (data[IFLA_GRE_LINK])
1524 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1525
1526 if (data[IFLA_GRE_IFLAGS])
1527 parms->i_flags = nla_get_be16(data[IFLA_GRE_IFLAGS]);
1528
1529 if (data[IFLA_GRE_OFLAGS])
1530 parms->o_flags = nla_get_be16(data[IFLA_GRE_OFLAGS]);
1531
1532 if (data[IFLA_GRE_IKEY])
1533 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1534
1535 if (data[IFLA_GRE_OKEY])
1536 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1537
1538 if (data[IFLA_GRE_LOCAL])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001539 parms->iph.saddr = nla_get_be32(data[IFLA_GRE_LOCAL]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001540
1541 if (data[IFLA_GRE_REMOTE])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001542 parms->iph.daddr = nla_get_be32(data[IFLA_GRE_REMOTE]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001543
1544 if (data[IFLA_GRE_TTL])
1545 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1546
1547 if (data[IFLA_GRE_TOS])
1548 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1549
1550 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC]))
1551 parms->iph.frag_off = htons(IP_DF);
1552}
1553
Herbert Xue1a80002008-10-09 12:00:17 -07001554static int ipgre_tap_init(struct net_device *dev)
1555{
1556 struct ip_tunnel *tunnel;
1557
1558 tunnel = netdev_priv(dev);
1559
1560 tunnel->dev = dev;
1561 strcpy(tunnel->parms.name, dev->name);
1562
1563 ipgre_tunnel_bind_dev(dev);
1564
Eric Dumazete985aad2010-09-27 03:57:11 +00001565 dev->tstats = alloc_percpu(struct pcpu_tstats);
1566 if (!dev->tstats)
1567 return -ENOMEM;
1568
Herbert Xue1a80002008-10-09 12:00:17 -07001569 return 0;
1570}
1571
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001572static const struct net_device_ops ipgre_tap_netdev_ops = {
1573 .ndo_init = ipgre_tap_init,
1574 .ndo_uninit = ipgre_tunnel_uninit,
1575 .ndo_start_xmit = ipgre_tunnel_xmit,
1576 .ndo_set_mac_address = eth_mac_addr,
1577 .ndo_validate_addr = eth_validate_addr,
1578 .ndo_change_mtu = ipgre_tunnel_change_mtu,
stephen hemminger87b6d212012-04-12 06:31:16 +00001579 .ndo_get_stats64 = ipgre_get_stats64,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001580};
1581
Herbert Xue1a80002008-10-09 12:00:17 -07001582static void ipgre_tap_setup(struct net_device *dev)
1583{
1584
1585 ether_setup(dev);
1586
Herbert Xu2e9526b2009-10-30 05:51:48 +00001587 dev->netdev_ops = &ipgre_tap_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001588 dev->destructor = ipgre_dev_free;
Herbert Xue1a80002008-10-09 12:00:17 -07001589
1590 dev->iflink = 0;
1591 dev->features |= NETIF_F_NETNS_LOCAL;
1592}
1593
Eric W. Biederman81adee42009-11-08 00:53:51 -08001594static int ipgre_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[],
Herbert Xuc19e6542008-10-09 11:59:55 -07001595 struct nlattr *data[])
1596{
1597 struct ip_tunnel *nt;
1598 struct net *net = dev_net(dev);
1599 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1600 int mtu;
1601 int err;
1602
1603 nt = netdev_priv(dev);
1604 ipgre_netlink_parms(data, &nt->parms);
1605
Herbert Xue1a80002008-10-09 12:00:17 -07001606 if (ipgre_tunnel_find(net, &nt->parms, dev->type))
Herbert Xuc19e6542008-10-09 11:59:55 -07001607 return -EEXIST;
1608
Herbert Xue1a80002008-10-09 12:00:17 -07001609 if (dev->type == ARPHRD_ETHER && !tb[IFLA_ADDRESS])
Danny Kukawkaf2cedb62012-02-15 06:45:39 +00001610 eth_hw_addr_random(dev);
Herbert Xue1a80002008-10-09 12:00:17 -07001611
Herbert Xuc19e6542008-10-09 11:59:55 -07001612 mtu = ipgre_tunnel_bind_dev(dev);
1613 if (!tb[IFLA_MTU])
1614 dev->mtu = mtu;
1615
Eric Dumazetb790e012010-09-27 23:05:47 +00001616 /* Can use a lockless transmit, unless we generate output sequences */
1617 if (!(nt->parms.o_flags & GRE_SEQ))
1618 dev->features |= NETIF_F_LLTX;
1619
Herbert Xuc19e6542008-10-09 11:59:55 -07001620 err = register_netdevice(dev);
1621 if (err)
1622 goto out;
1623
1624 dev_hold(dev);
1625 ipgre_tunnel_link(ign, nt);
1626
1627out:
1628 return err;
1629}
1630
1631static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1632 struct nlattr *data[])
1633{
1634 struct ip_tunnel *t, *nt;
1635 struct net *net = dev_net(dev);
1636 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1637 struct ip_tunnel_parm p;
1638 int mtu;
1639
1640 if (dev == ign->fb_tunnel_dev)
1641 return -EINVAL;
1642
1643 nt = netdev_priv(dev);
1644 ipgre_netlink_parms(data, &p);
1645
1646 t = ipgre_tunnel_locate(net, &p, 0);
1647
1648 if (t) {
1649 if (t->dev != dev)
1650 return -EEXIST;
1651 } else {
Herbert Xuc19e6542008-10-09 11:59:55 -07001652 t = nt;
1653
Herbert Xu2e9526b2009-10-30 05:51:48 +00001654 if (dev->type != ARPHRD_ETHER) {
Eric Dumazet15078502010-09-15 11:07:53 +00001655 unsigned int nflags = 0;
Herbert Xuc19e6542008-10-09 11:59:55 -07001656
Herbert Xu2e9526b2009-10-30 05:51:48 +00001657 if (ipv4_is_multicast(p.iph.daddr))
1658 nflags = IFF_BROADCAST;
1659 else if (p.iph.daddr)
1660 nflags = IFF_POINTOPOINT;
1661
1662 if ((dev->flags ^ nflags) &
1663 (IFF_POINTOPOINT | IFF_BROADCAST))
1664 return -EINVAL;
1665 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001666
1667 ipgre_tunnel_unlink(ign, t);
1668 t->parms.iph.saddr = p.iph.saddr;
1669 t->parms.iph.daddr = p.iph.daddr;
1670 t->parms.i_key = p.i_key;
Herbert Xu2e9526b2009-10-30 05:51:48 +00001671 if (dev->type != ARPHRD_ETHER) {
1672 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1673 memcpy(dev->broadcast, &p.iph.daddr, 4);
1674 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001675 ipgre_tunnel_link(ign, t);
1676 netdev_state_change(dev);
1677 }
1678
1679 t->parms.o_key = p.o_key;
1680 t->parms.iph.ttl = p.iph.ttl;
1681 t->parms.iph.tos = p.iph.tos;
1682 t->parms.iph.frag_off = p.iph.frag_off;
1683
1684 if (t->parms.link != p.link) {
1685 t->parms.link = p.link;
1686 mtu = ipgre_tunnel_bind_dev(dev);
1687 if (!tb[IFLA_MTU])
1688 dev->mtu = mtu;
1689 netdev_state_change(dev);
1690 }
1691
1692 return 0;
1693}
1694
1695static size_t ipgre_get_size(const struct net_device *dev)
1696{
1697 return
1698 /* IFLA_GRE_LINK */
1699 nla_total_size(4) +
1700 /* IFLA_GRE_IFLAGS */
1701 nla_total_size(2) +
1702 /* IFLA_GRE_OFLAGS */
1703 nla_total_size(2) +
1704 /* IFLA_GRE_IKEY */
1705 nla_total_size(4) +
1706 /* IFLA_GRE_OKEY */
1707 nla_total_size(4) +
1708 /* IFLA_GRE_LOCAL */
1709 nla_total_size(4) +
1710 /* IFLA_GRE_REMOTE */
1711 nla_total_size(4) +
1712 /* IFLA_GRE_TTL */
1713 nla_total_size(1) +
1714 /* IFLA_GRE_TOS */
1715 nla_total_size(1) +
1716 /* IFLA_GRE_PMTUDISC */
1717 nla_total_size(1) +
1718 0;
1719}
1720
1721static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1722{
1723 struct ip_tunnel *t = netdev_priv(dev);
1724 struct ip_tunnel_parm *p = &t->parms;
1725
David S. Millerf3756b72012-04-01 20:39:02 -04001726 if (nla_put_u32(skb, IFLA_GRE_LINK, p->link) ||
1727 nla_put_be16(skb, IFLA_GRE_IFLAGS, p->i_flags) ||
1728 nla_put_be16(skb, IFLA_GRE_OFLAGS, p->o_flags) ||
1729 nla_put_be32(skb, IFLA_GRE_IKEY, p->i_key) ||
1730 nla_put_be32(skb, IFLA_GRE_OKEY, p->o_key) ||
1731 nla_put_be32(skb, IFLA_GRE_LOCAL, p->iph.saddr) ||
1732 nla_put_be32(skb, IFLA_GRE_REMOTE, p->iph.daddr) ||
1733 nla_put_u8(skb, IFLA_GRE_TTL, p->iph.ttl) ||
1734 nla_put_u8(skb, IFLA_GRE_TOS, p->iph.tos) ||
1735 nla_put_u8(skb, IFLA_GRE_PMTUDISC,
1736 !!(p->iph.frag_off & htons(IP_DF))))
1737 goto nla_put_failure;
Herbert Xuc19e6542008-10-09 11:59:55 -07001738 return 0;
1739
1740nla_put_failure:
1741 return -EMSGSIZE;
1742}
1743
1744static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1745 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1746 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1747 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1748 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1749 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001750 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1751 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
Herbert Xuc19e6542008-10-09 11:59:55 -07001752 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1753 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1754 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1755};
1756
1757static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1758 .kind = "gre",
1759 .maxtype = IFLA_GRE_MAX,
1760 .policy = ipgre_policy,
1761 .priv_size = sizeof(struct ip_tunnel),
1762 .setup = ipgre_tunnel_setup,
1763 .validate = ipgre_tunnel_validate,
1764 .newlink = ipgre_newlink,
1765 .changelink = ipgre_changelink,
1766 .get_size = ipgre_get_size,
1767 .fill_info = ipgre_fill_info,
1768};
1769
Herbert Xue1a80002008-10-09 12:00:17 -07001770static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1771 .kind = "gretap",
1772 .maxtype = IFLA_GRE_MAX,
1773 .policy = ipgre_policy,
1774 .priv_size = sizeof(struct ip_tunnel),
1775 .setup = ipgre_tap_setup,
1776 .validate = ipgre_tap_validate,
1777 .newlink = ipgre_newlink,
1778 .changelink = ipgre_changelink,
1779 .get_size = ipgre_get_size,
1780 .fill_info = ipgre_fill_info,
1781};
1782
Linus Torvalds1da177e2005-04-16 15:20:36 -07001783/*
1784 * And now the modules code and kernel interface.
1785 */
1786
1787static int __init ipgre_init(void)
1788{
1789 int err;
1790
Joe Perches058bd4d2012-03-11 18:36:11 +00001791 pr_info("GRE over IPv4 tunneling driver\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001792
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001793 err = register_pernet_device(&ipgre_net_ops);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001794 if (err < 0)
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001795 return err;
1796
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001797 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001798 if (err < 0) {
Joe Perches058bd4d2012-03-11 18:36:11 +00001799 pr_info("%s: can't add protocol\n", __func__);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001800 goto add_proto_failed;
1801 }
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001802
Herbert Xuc19e6542008-10-09 11:59:55 -07001803 err = rtnl_link_register(&ipgre_link_ops);
1804 if (err < 0)
1805 goto rtnl_link_failed;
1806
Herbert Xue1a80002008-10-09 12:00:17 -07001807 err = rtnl_link_register(&ipgre_tap_ops);
1808 if (err < 0)
1809 goto tap_ops_failed;
1810
Herbert Xuc19e6542008-10-09 11:59:55 -07001811out:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001812 return err;
Herbert Xuc19e6542008-10-09 11:59:55 -07001813
Herbert Xue1a80002008-10-09 12:00:17 -07001814tap_ops_failed:
1815 rtnl_link_unregister(&ipgre_link_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001816rtnl_link_failed:
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001817 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001818add_proto_failed:
1819 unregister_pernet_device(&ipgre_net_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001820 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001821}
1822
Alexey Kuznetsovdb445752005-07-30 17:46:44 -07001823static void __exit ipgre_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001824{
Herbert Xue1a80002008-10-09 12:00:17 -07001825 rtnl_link_unregister(&ipgre_tap_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001826 rtnl_link_unregister(&ipgre_link_ops);
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001827 if (gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO) < 0)
Joe Perches058bd4d2012-03-11 18:36:11 +00001828 pr_info("%s: can't remove protocol\n", __func__);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001829 unregister_pernet_device(&ipgre_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001830}
1831
1832module_init(ipgre_init);
1833module_exit(ipgre_fini);
1834MODULE_LICENSE("GPL");
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001835MODULE_ALIAS_RTNL_LINK("gre");
1836MODULE_ALIAS_RTNL_LINK("gretap");
Vasiliy Kulikov8909c9a2011-03-02 00:33:13 +03001837MODULE_ALIAS_NETDEV("gre0");