blob: bf9541648b9633dec7b23062e2c668a757385f72 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09002 * Linux NET3: GRE over IP protocol decoder.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
4 * Authors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Randy Dunlap4fc268d2006-01-11 12:17:47 -080013#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/module.h>
15#include <linux/types.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <linux/kernel.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090017#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <asm/uaccess.h>
19#include <linux/skbuff.h>
20#include <linux/netdevice.h>
21#include <linux/in.h>
22#include <linux/tcp.h>
23#include <linux/udp.h>
24#include <linux/if_arp.h>
25#include <linux/mroute.h>
26#include <linux/init.h>
27#include <linux/in6.h>
28#include <linux/inetdevice.h>
29#include <linux/igmp.h>
30#include <linux/netfilter_ipv4.h>
Herbert Xue1a80002008-10-09 12:00:17 -070031#include <linux/etherdevice.h>
Kris Katterjohn46f25df2006-01-05 16:35:42 -080032#include <linux/if_ether.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070033
34#include <net/sock.h>
35#include <net/ip.h>
36#include <net/icmp.h>
37#include <net/protocol.h>
38#include <net/ipip.h>
39#include <net/arp.h>
40#include <net/checksum.h>
41#include <net/dsfield.h>
42#include <net/inet_ecn.h>
43#include <net/xfrm.h>
Pavel Emelyanov59a4c752008-04-16 01:08:53 -070044#include <net/net_namespace.h>
45#include <net/netns/generic.h>
Herbert Xuc19e6542008-10-09 11:59:55 -070046#include <net/rtnetlink.h>
Dmitry Kozlov00959ad2010-08-21 23:05:39 -070047#include <net/gre.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Eric Dumazetdfd56b82011-12-10 09:48:31 +000049#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -070050#include <net/ipv6.h>
51#include <net/ip6_fib.h>
52#include <net/ip6_route.h>
53#endif
54
55/*
56 Problems & solutions
57 --------------------
58
59 1. The most important issue is detecting local dead loops.
60 They would cause complete host lockup in transmit, which
61 would be "resolved" by stack overflow or, if queueing is enabled,
62 with infinite looping in net_bh.
63
64 We cannot track such dead loops during route installation,
65 it is infeasible task. The most general solutions would be
66 to keep skb->encapsulation counter (sort of local ttl),
Eric Dumazet6d0722a2010-09-29 23:35:10 -070067 and silently drop packet when it expires. It is a good
Linus Torvalds1da177e2005-04-16 15:20:36 -070068 solution, but it supposes maintaing new variable in ALL
69 skb, even if no tunneling is used.
70
Eric Dumazet6d0722a2010-09-29 23:35:10 -070071 Current solution: xmit_recursion breaks dead loops. This is a percpu
72 counter, since when we enter the first ndo_xmit(), cpu migration is
73 forbidden. We force an exit if this counter reaches RECURSION_LIMIT
Linus Torvalds1da177e2005-04-16 15:20:36 -070074
75 2. Networking dead loops would not kill routers, but would really
76 kill network. IP hop limit plays role of "t->recursion" in this case,
77 if we copy it from packet being encapsulated to upper header.
78 It is very good solution, but it introduces two problems:
79
80 - Routing protocols, using packets with ttl=1 (OSPF, RIP2),
81 do not work over tunnels.
82 - traceroute does not work. I planned to relay ICMP from tunnel,
83 so that this problem would be solved and traceroute output
84 would even more informative. This idea appeared to be wrong:
85 only Linux complies to rfc1812 now (yes, guys, Linux is the only
86 true router now :-)), all routers (at least, in neighbourhood of mine)
87 return only 8 bytes of payload. It is the end.
88
89 Hence, if we want that OSPF worked or traceroute said something reasonable,
90 we should search for another solution.
91
92 One of them is to parse packet trying to detect inner encapsulation
93 made by our node. It is difficult or even impossible, especially,
94 taking into account fragmentation. TO be short, tt is not solution at all.
95
96 Current solution: The solution was UNEXPECTEDLY SIMPLE.
97 We force DF flag on tunnels with preconfigured hop limit,
98 that is ALL. :-) Well, it does not remove the problem completely,
99 but exponential growth of network traffic is changed to linear
100 (branches, that exceed pmtu are pruned) and tunnel mtu
101 fastly degrades to value <68, where looping stops.
102 Yes, it is not good if there exists a router in the loop,
103 which does not force DF, even when encapsulating packets have DF set.
104 But it is not our problem! Nobody could accuse us, we made
105 all that we could make. Even if it is your gated who injected
106 fatal route to network, even if it were you who configured
107 fatal static route: you are innocent. :-)
108
109
110
111 3. Really, ipv4/ipip.c, ipv4/ip_gre.c and ipv6/sit.c contain
112 practically identical code. It would be good to glue them
113 together, but it is not very evident, how to make them modular.
114 sit is integral part of IPv6, ipip and gre are naturally modular.
115 We could extract common parts (hash table, ioctl etc)
116 to a separate module (ip_tunnel.c).
117
118 Alexey Kuznetsov.
119 */
120
Herbert Xuc19e6542008-10-09 11:59:55 -0700121static struct rtnl_link_ops ipgre_link_ops __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122static int ipgre_tunnel_init(struct net_device *dev);
123static void ipgre_tunnel_setup(struct net_device *dev);
Herbert Xu42aa9162008-10-09 11:59:32 -0700124static int ipgre_tunnel_bind_dev(struct net_device *dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125
126/* Fallback tunnel: no source, no destination, no key, no options */
127
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700128#define HASH_SIZE 16
129
Eric Dumazetf99189b2009-11-17 10:42:49 +0000130static int ipgre_net_id __read_mostly;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700131struct ipgre_net {
Eric Dumazet15078502010-09-15 11:07:53 +0000132 struct ip_tunnel __rcu *tunnels[4][HASH_SIZE];
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700133
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700134 struct net_device *fb_tunnel_dev;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700135};
136
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137/* Tunnel hash table */
138
139/*
140 4 hash tables:
141
142 3: (remote,local)
143 2: (remote,*)
144 1: (*,local)
145 0: (*,*)
146
147 We require exact key match i.e. if a key is present in packet
148 it will match only tunnel with the same key; if it is not present,
149 it will match only keyless tunnel.
150
151 All keysless packets, if not matched configured keyless tunnels
152 will match fallback tunnel.
153 */
154
Al Virod5a0a1e2006-11-08 00:23:14 -0800155#define HASH(addr) (((__force u32)addr^((__force u32)addr>>4))&0xF)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700157#define tunnels_r_l tunnels[3]
158#define tunnels_r tunnels[2]
159#define tunnels_l tunnels[1]
160#define tunnels_wc tunnels[0]
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000161/*
Eric Dumazet15078502010-09-15 11:07:53 +0000162 * Locking : hash tables are protected by RCU and RTNL
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000163 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000165#define for_each_ip_tunnel_rcu(start) \
166 for (t = rcu_dereference(start); t; t = rcu_dereference(t->next))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167
Eric Dumazete985aad2010-09-27 03:57:11 +0000168/* often modified stats are per cpu, other are shared (netdev->stats) */
169struct pcpu_tstats {
170 unsigned long rx_packets;
171 unsigned long rx_bytes;
172 unsigned long tx_packets;
173 unsigned long tx_bytes;
Eric Dumazet8ce120f2011-11-04 23:19:28 +0000174} __attribute__((aligned(4*sizeof(unsigned long))));
Eric Dumazete985aad2010-09-27 03:57:11 +0000175
176static struct net_device_stats *ipgre_get_stats(struct net_device *dev)
177{
178 struct pcpu_tstats sum = { 0 };
179 int i;
180
181 for_each_possible_cpu(i) {
182 const struct pcpu_tstats *tstats = per_cpu_ptr(dev->tstats, i);
183
184 sum.rx_packets += tstats->rx_packets;
185 sum.rx_bytes += tstats->rx_bytes;
186 sum.tx_packets += tstats->tx_packets;
187 sum.tx_bytes += tstats->tx_bytes;
188 }
189 dev->stats.rx_packets = sum.rx_packets;
190 dev->stats.rx_bytes = sum.rx_bytes;
191 dev->stats.tx_packets = sum.tx_packets;
192 dev->stats.tx_bytes = sum.tx_bytes;
193 return &dev->stats;
194}
195
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196/* Given src, dst and key, find appropriate for input tunnel. */
197
Timo Teras749c10f2009-01-19 17:22:12 -0800198static struct ip_tunnel * ipgre_tunnel_lookup(struct net_device *dev,
Herbert Xue1a80002008-10-09 12:00:17 -0700199 __be32 remote, __be32 local,
200 __be32 key, __be16 gre_proto)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201{
Timo Teras749c10f2009-01-19 17:22:12 -0800202 struct net *net = dev_net(dev);
203 int link = dev->ifindex;
Eric Dumazet15078502010-09-15 11:07:53 +0000204 unsigned int h0 = HASH(remote);
205 unsigned int h1 = HASH(key);
Timo Terasafcf1242009-01-26 20:56:10 -0800206 struct ip_tunnel *t, *cand = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700207 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Herbert Xue1a80002008-10-09 12:00:17 -0700208 int dev_type = (gre_proto == htons(ETH_P_TEB)) ?
209 ARPHRD_ETHER : ARPHRD_IPGRE;
Timo Terasafcf1242009-01-26 20:56:10 -0800210 int score, cand_score = 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000212 for_each_ip_tunnel_rcu(ign->tunnels_r_l[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800213 if (local != t->parms.iph.saddr ||
214 remote != t->parms.iph.daddr ||
215 key != t->parms.i_key ||
216 !(t->dev->flags & IFF_UP))
217 continue;
218
219 if (t->dev->type != ARPHRD_IPGRE &&
220 t->dev->type != dev_type)
221 continue;
222
Timo Terasafcf1242009-01-26 20:56:10 -0800223 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800224 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800225 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800226 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800227 score |= 2;
228 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800229 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800230
231 if (score < cand_score) {
232 cand = t;
233 cand_score = score;
234 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235 }
Herbert Xue1a80002008-10-09 12:00:17 -0700236
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000237 for_each_ip_tunnel_rcu(ign->tunnels_r[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800238 if (remote != t->parms.iph.daddr ||
239 key != t->parms.i_key ||
240 !(t->dev->flags & IFF_UP))
241 continue;
242
243 if (t->dev->type != ARPHRD_IPGRE &&
244 t->dev->type != dev_type)
245 continue;
246
Timo Terasafcf1242009-01-26 20:56:10 -0800247 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800248 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800249 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800250 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800251 score |= 2;
252 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800253 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800254
255 if (score < cand_score) {
256 cand = t;
257 cand_score = score;
258 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259 }
Herbert Xue1a80002008-10-09 12:00:17 -0700260
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000261 for_each_ip_tunnel_rcu(ign->tunnels_l[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800262 if ((local != t->parms.iph.saddr &&
263 (local != t->parms.iph.daddr ||
264 !ipv4_is_multicast(local))) ||
265 key != t->parms.i_key ||
266 !(t->dev->flags & IFF_UP))
267 continue;
268
269 if (t->dev->type != ARPHRD_IPGRE &&
270 t->dev->type != dev_type)
271 continue;
272
Timo Terasafcf1242009-01-26 20:56:10 -0800273 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800274 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800275 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800276 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800277 score |= 2;
278 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800279 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800280
281 if (score < cand_score) {
282 cand = t;
283 cand_score = score;
284 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 }
Herbert Xue1a80002008-10-09 12:00:17 -0700286
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000287 for_each_ip_tunnel_rcu(ign->tunnels_wc[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800288 if (t->parms.i_key != key ||
289 !(t->dev->flags & IFF_UP))
290 continue;
291
292 if (t->dev->type != ARPHRD_IPGRE &&
293 t->dev->type != dev_type)
294 continue;
295
Timo Terasafcf1242009-01-26 20:56:10 -0800296 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800297 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800298 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800299 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800300 score |= 2;
301 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800302 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800303
304 if (score < cand_score) {
305 cand = t;
306 cand_score = score;
307 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308 }
309
Timo Terasafcf1242009-01-26 20:56:10 -0800310 if (cand != NULL)
311 return cand;
Herbert Xue1a80002008-10-09 12:00:17 -0700312
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000313 dev = ign->fb_tunnel_dev;
314 if (dev->flags & IFF_UP)
315 return netdev_priv(dev);
Timo Teras749c10f2009-01-19 17:22:12 -0800316
Linus Torvalds1da177e2005-04-16 15:20:36 -0700317 return NULL;
318}
319
Eric Dumazet15078502010-09-15 11:07:53 +0000320static struct ip_tunnel __rcu **__ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700321 struct ip_tunnel_parm *parms)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700322{
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900323 __be32 remote = parms->iph.daddr;
324 __be32 local = parms->iph.saddr;
325 __be32 key = parms->i_key;
Eric Dumazet15078502010-09-15 11:07:53 +0000326 unsigned int h = HASH(key);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700327 int prio = 0;
328
329 if (local)
330 prio |= 1;
Joe Perchesf97c1e02007-12-16 13:45:43 -0800331 if (remote && !ipv4_is_multicast(remote)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700332 prio |= 2;
333 h ^= HASH(remote);
334 }
335
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700336 return &ign->tunnels[prio][h];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700337}
338
Eric Dumazet15078502010-09-15 11:07:53 +0000339static inline struct ip_tunnel __rcu **ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700340 struct ip_tunnel *t)
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900341{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700342 return __ipgre_bucket(ign, &t->parms);
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900343}
344
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700345static void ipgre_tunnel_link(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346{
Eric Dumazet15078502010-09-15 11:07:53 +0000347 struct ip_tunnel __rcu **tp = ipgre_bucket(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348
Eric Dumazet15078502010-09-15 11:07:53 +0000349 rcu_assign_pointer(t->next, rtnl_dereference(*tp));
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000350 rcu_assign_pointer(*tp, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351}
352
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700353static void ipgre_tunnel_unlink(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700354{
Eric Dumazet15078502010-09-15 11:07:53 +0000355 struct ip_tunnel __rcu **tp;
356 struct ip_tunnel *iter;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357
Eric Dumazet15078502010-09-15 11:07:53 +0000358 for (tp = ipgre_bucket(ign, t);
359 (iter = rtnl_dereference(*tp)) != NULL;
360 tp = &iter->next) {
361 if (t == iter) {
362 rcu_assign_pointer(*tp, t->next);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700363 break;
364 }
365 }
366}
367
Herbert Xue1a80002008-10-09 12:00:17 -0700368static struct ip_tunnel *ipgre_tunnel_find(struct net *net,
369 struct ip_tunnel_parm *parms,
370 int type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371{
Al Virod5a0a1e2006-11-08 00:23:14 -0800372 __be32 remote = parms->iph.daddr;
373 __be32 local = parms->iph.saddr;
374 __be32 key = parms->i_key;
Timo Teras749c10f2009-01-19 17:22:12 -0800375 int link = parms->link;
Eric Dumazet15078502010-09-15 11:07:53 +0000376 struct ip_tunnel *t;
377 struct ip_tunnel __rcu **tp;
Herbert Xue1a80002008-10-09 12:00:17 -0700378 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
379
Eric Dumazet15078502010-09-15 11:07:53 +0000380 for (tp = __ipgre_bucket(ign, parms);
381 (t = rtnl_dereference(*tp)) != NULL;
382 tp = &t->next)
Herbert Xue1a80002008-10-09 12:00:17 -0700383 if (local == t->parms.iph.saddr &&
384 remote == t->parms.iph.daddr &&
385 key == t->parms.i_key &&
Timo Teras749c10f2009-01-19 17:22:12 -0800386 link == t->parms.link &&
Herbert Xue1a80002008-10-09 12:00:17 -0700387 type == t->dev->type)
388 break;
389
390 return t;
391}
392
Eric Dumazet15078502010-09-15 11:07:53 +0000393static struct ip_tunnel *ipgre_tunnel_locate(struct net *net,
Herbert Xue1a80002008-10-09 12:00:17 -0700394 struct ip_tunnel_parm *parms, int create)
395{
396 struct ip_tunnel *t, *nt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700397 struct net_device *dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398 char name[IFNAMSIZ];
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700399 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400
Herbert Xue1a80002008-10-09 12:00:17 -0700401 t = ipgre_tunnel_find(net, parms, ARPHRD_IPGRE);
402 if (t || !create)
403 return t;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404
405 if (parms->name[0])
406 strlcpy(name, parms->name, IFNAMSIZ);
Pavel Emelyanov34cc7ba2008-02-23 20:19:20 -0800407 else
stephen hemminger407d6fc2010-11-29 09:47:47 +0000408 strcpy(name, "gre%d");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409
410 dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup);
411 if (!dev)
stephen hemminger407d6fc2010-11-29 09:47:47 +0000412 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700413
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -0700414 dev_net_set(dev, net);
415
Patrick McHardy2941a482006-01-08 22:05:26 -0800416 nt = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417 nt->parms = *parms;
Herbert Xuc19e6542008-10-09 11:59:55 -0700418 dev->rtnl_link_ops = &ipgre_link_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419
Herbert Xu42aa9162008-10-09 11:59:32 -0700420 dev->mtu = ipgre_tunnel_bind_dev(dev);
421
Pavel Emelyanovb37d428b2008-02-26 23:51:04 -0800422 if (register_netdevice(dev) < 0)
423 goto failed_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425 dev_hold(dev);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700426 ipgre_tunnel_link(ign, nt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 return nt;
428
Pavel Emelyanovb37d428b2008-02-26 23:51:04 -0800429failed_free:
430 free_netdev(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431 return NULL;
432}
433
434static void ipgre_tunnel_uninit(struct net_device *dev)
435{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700436 struct net *net = dev_net(dev);
437 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
438
439 ipgre_tunnel_unlink(ign, netdev_priv(dev));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 dev_put(dev);
441}
442
443
444static void ipgre_err(struct sk_buff *skb, u32 info)
445{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700446
Rami Rosen071f92d2008-05-21 17:47:54 -0700447/* All the routers (except for Linux) return only
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448 8 bytes of packet payload. It means, that precise relaying of
449 ICMP in the real Internet is absolutely infeasible.
450
451 Moreover, Cisco "wise men" put GRE key to the third word
452 in GRE header. It makes impossible maintaining even soft state for keyed
453 GRE tunnels with enabled checksum. Tell them "thank you".
454
455 Well, I wonder, rfc1812 was written by Cisco employee,
456 what the hell these idiots break standrads established
457 by themself???
458 */
459
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000460 const struct iphdr *iph = (const struct iphdr *)skb->data;
Al Virod5a0a1e2006-11-08 00:23:14 -0800461 __be16 *p = (__be16*)(skb->data+(iph->ihl<<2));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 int grehlen = (iph->ihl<<2) + 4;
Arnaldo Carvalho de Melo88c76642007-03-13 14:43:18 -0300463 const int type = icmp_hdr(skb)->type;
464 const int code = icmp_hdr(skb)->code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465 struct ip_tunnel *t;
Al Virod5a0a1e2006-11-08 00:23:14 -0800466 __be16 flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467
468 flags = p[0];
469 if (flags&(GRE_CSUM|GRE_KEY|GRE_SEQ|GRE_ROUTING|GRE_VERSION)) {
470 if (flags&(GRE_VERSION|GRE_ROUTING))
471 return;
472 if (flags&GRE_KEY) {
473 grehlen += 4;
474 if (flags&GRE_CSUM)
475 grehlen += 4;
476 }
477 }
478
479 /* If only 8 bytes returned, keyed message will be dropped here */
480 if (skb_headlen(skb) < grehlen)
481 return;
482
483 switch (type) {
484 default:
485 case ICMP_PARAMETERPROB:
486 return;
487
488 case ICMP_DEST_UNREACH:
489 switch (code) {
490 case ICMP_SR_FAILED:
491 case ICMP_PORT_UNREACH:
492 /* Impossible event. */
493 return;
494 case ICMP_FRAG_NEEDED:
495 /* Soft state for pmtu is maintained by IP core. */
496 return;
497 default:
498 /* All others are translated to HOST_UNREACH.
499 rfc2003 contains "deep thoughts" about NET_UNREACH,
500 I believe they are just ether pollution. --ANK
501 */
502 break;
503 }
504 break;
505 case ICMP_TIME_EXCEEDED:
506 if (code != ICMP_EXC_TTL)
507 return;
508 break;
509 }
510
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000511 rcu_read_lock();
Timo Teras749c10f2009-01-19 17:22:12 -0800512 t = ipgre_tunnel_lookup(skb->dev, iph->daddr, iph->saddr,
Herbert Xue1a80002008-10-09 12:00:17 -0700513 flags & GRE_KEY ?
514 *(((__be32 *)p) + (grehlen / 4) - 1) : 0,
515 p[1]);
Joe Perchesf97c1e02007-12-16 13:45:43 -0800516 if (t == NULL || t->parms.iph.daddr == 0 ||
517 ipv4_is_multicast(t->parms.iph.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518 goto out;
519
520 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
521 goto out;
522
Wei Yongjunda6185d82009-02-24 23:34:48 -0800523 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524 t->err_count++;
525 else
526 t->err_count = 1;
527 t->err_time = jiffies;
528out:
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000529 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700530}
531
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000532static inline void ipgre_ecn_decapsulate(const struct iphdr *iph, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700533{
534 if (INET_ECN_is_ce(iph->tos)) {
535 if (skb->protocol == htons(ETH_P_IP)) {
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700536 IP_ECN_set_ce(ip_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537 } else if (skb->protocol == htons(ETH_P_IPV6)) {
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700538 IP6_ECN_set_ce(ipv6_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 }
540 }
541}
542
543static inline u8
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000544ipgre_ecn_encapsulate(u8 tos, const struct iphdr *old_iph, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545{
546 u8 inner = 0;
547 if (skb->protocol == htons(ETH_P_IP))
548 inner = old_iph->tos;
549 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000550 inner = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700551 return INET_ECN_encapsulate(tos, inner);
552}
553
554static int ipgre_rcv(struct sk_buff *skb)
555{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000556 const struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700557 u8 *h;
Al Virod5a0a1e2006-11-08 00:23:14 -0800558 __be16 flags;
Al Virod3bc23e2006-11-14 21:24:49 -0800559 __sum16 csum = 0;
Al Virod5a0a1e2006-11-08 00:23:14 -0800560 __be32 key = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700561 u32 seqno = 0;
562 struct ip_tunnel *tunnel;
563 int offset = 4;
Herbert Xue1a80002008-10-09 12:00:17 -0700564 __be16 gre_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700565
566 if (!pskb_may_pull(skb, 16))
567 goto drop_nolock;
568
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700569 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570 h = skb->data;
Al Virod5a0a1e2006-11-08 00:23:14 -0800571 flags = *(__be16*)h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700572
573 if (flags&(GRE_CSUM|GRE_KEY|GRE_ROUTING|GRE_SEQ|GRE_VERSION)) {
574 /* - Version must be 0.
575 - We do not support routing headers.
576 */
577 if (flags&(GRE_VERSION|GRE_ROUTING))
578 goto drop_nolock;
579
580 if (flags&GRE_CSUM) {
Herbert Xufb286bb2005-11-10 13:01:24 -0800581 switch (skb->ip_summed) {
Patrick McHardy84fa7932006-08-29 16:44:56 -0700582 case CHECKSUM_COMPLETE:
Al Virod3bc23e2006-11-14 21:24:49 -0800583 csum = csum_fold(skb->csum);
Herbert Xufb286bb2005-11-10 13:01:24 -0800584 if (!csum)
585 break;
586 /* fall through */
587 case CHECKSUM_NONE:
588 skb->csum = 0;
589 csum = __skb_checksum_complete(skb);
Patrick McHardy84fa7932006-08-29 16:44:56 -0700590 skb->ip_summed = CHECKSUM_COMPLETE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591 }
592 offset += 4;
593 }
594 if (flags&GRE_KEY) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800595 key = *(__be32*)(h + offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596 offset += 4;
597 }
598 if (flags&GRE_SEQ) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800599 seqno = ntohl(*(__be32*)(h + offset));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 offset += 4;
601 }
602 }
603
Herbert Xue1a80002008-10-09 12:00:17 -0700604 gre_proto = *(__be16 *)(h + 2);
605
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000606 rcu_read_lock();
Timo Teras749c10f2009-01-19 17:22:12 -0800607 if ((tunnel = ipgre_tunnel_lookup(skb->dev,
Herbert Xue1a80002008-10-09 12:00:17 -0700608 iph->saddr, iph->daddr, key,
609 gre_proto))) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000610 struct pcpu_tstats *tstats;
Pavel Emelyanovaddd68e2008-05-21 14:14:22 -0700611
Linus Torvalds1da177e2005-04-16 15:20:36 -0700612 secpath_reset(skb);
613
Herbert Xue1a80002008-10-09 12:00:17 -0700614 skb->protocol = gre_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700615 /* WCCP version 1 and 2 protocol decoding.
616 * - Change protocol to IP
617 * - When dealing with WCCPv2, Skip extra 4 bytes in GRE header
618 */
Herbert Xue1a80002008-10-09 12:00:17 -0700619 if (flags == 0 && gre_proto == htons(ETH_P_WCCP)) {
YOSHIFUJI Hideaki496c98d2006-10-10 19:41:21 -0700620 skb->protocol = htons(ETH_P_IP);
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900621 if ((*(h + offset) & 0xF0) != 0x40)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700622 offset += 4;
623 }
624
Timo Teras1d069162007-12-20 00:10:33 -0800625 skb->mac_header = skb->network_header;
Arnaldo Carvalho de Melo4209fb62007-03-10 18:42:03 -0300626 __pskb_pull(skb, offset);
Arnaldo Carvalho de Melo9c702202007-04-25 18:04:18 -0700627 skb_postpull_rcsum(skb, skb_transport_header(skb), offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628 skb->pkt_type = PACKET_HOST;
629#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -0800630 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631 /* Looped back packet, drop it! */
David S. Millerc7537962010-11-11 17:07:48 -0800632 if (rt_is_output_route(skb_rtable(skb)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633 goto drop;
Eric Dumazete985aad2010-09-27 03:57:11 +0000634 tunnel->dev->stats.multicast++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635 skb->pkt_type = PACKET_BROADCAST;
636 }
637#endif
638
639 if (((flags&GRE_CSUM) && csum) ||
640 (!(flags&GRE_CSUM) && tunnel->parms.i_flags&GRE_CSUM)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000641 tunnel->dev->stats.rx_crc_errors++;
642 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700643 goto drop;
644 }
645 if (tunnel->parms.i_flags&GRE_SEQ) {
646 if (!(flags&GRE_SEQ) ||
647 (tunnel->i_seqno && (s32)(seqno - tunnel->i_seqno) < 0)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000648 tunnel->dev->stats.rx_fifo_errors++;
649 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 goto drop;
651 }
652 tunnel->i_seqno = seqno + 1;
653 }
Herbert Xue1a80002008-10-09 12:00:17 -0700654
655 /* Warning: All skb pointers will be invalidated! */
656 if (tunnel->dev->type == ARPHRD_ETHER) {
657 if (!pskb_may_pull(skb, ETH_HLEN)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000658 tunnel->dev->stats.rx_length_errors++;
659 tunnel->dev->stats.rx_errors++;
Herbert Xue1a80002008-10-09 12:00:17 -0700660 goto drop;
661 }
662
663 iph = ip_hdr(skb);
664 skb->protocol = eth_type_trans(skb, tunnel->dev);
665 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
666 }
667
Eric Dumazete985aad2010-09-27 03:57:11 +0000668 tstats = this_cpu_ptr(tunnel->dev->tstats);
669 tstats->rx_packets++;
670 tstats->rx_bytes += skb->len;
671
672 __skb_tunnel_rx(skb, tunnel->dev);
Herbert Xue1a80002008-10-09 12:00:17 -0700673
674 skb_reset_network_header(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 ipgre_ecn_decapsulate(iph, skb);
Herbert Xue1a80002008-10-09 12:00:17 -0700676
Eric Dumazetcaf586e2010-09-30 21:06:55 +0000677 netif_rx(skb);
Eric Dumazet8990f462010-09-20 00:12:11 +0000678
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000679 rcu_read_unlock();
Eric Dumazet8990f462010-09-20 00:12:11 +0000680 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700681 }
Herbert Xu45af08b2006-04-05 22:31:19 -0700682 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700683
684drop:
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000685 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700686drop_nolock:
687 kfree_skb(skb);
Eric Dumazeta02cec22010-09-22 20:43:57 +0000688 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689}
690
Stephen Hemminger6fef4c02009-08-31 19:50:41 +0000691static netdev_tx_t ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692{
Patrick McHardy2941a482006-01-08 22:05:26 -0800693 struct ip_tunnel *tunnel = netdev_priv(dev);
Eric Dumazete985aad2010-09-27 03:57:11 +0000694 struct pcpu_tstats *tstats;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000695 const struct iphdr *old_iph = ip_hdr(skb);
696 const struct iphdr *tiph;
David S. Millercbb1e852011-05-04 12:33:34 -0700697 struct flowi4 fl4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700698 u8 tos;
Al Virod5a0a1e2006-11-08 00:23:14 -0800699 __be16 df;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700700 struct rtable *rt; /* Route to the other host */
Eric Dumazet15078502010-09-15 11:07:53 +0000701 struct net_device *tdev; /* Device to other host */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700702 struct iphdr *iph; /* Our new IP header */
Chuck Leverc2636b42007-10-23 21:07:32 -0700703 unsigned int max_headroom; /* The extra header space needed */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700704 int gre_hlen;
Al Virod5a0a1e2006-11-08 00:23:14 -0800705 __be32 dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700706 int mtu;
707
Herbert Xue1a80002008-10-09 12:00:17 -0700708 if (dev->type == ARPHRD_ETHER)
709 IPCB(skb)->flags = 0;
710
711 if (dev->header_ops && dev->type == ARPHRD_IPGRE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700712 gre_hlen = 0;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000713 tiph = (const struct iphdr *)skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 } else {
715 gre_hlen = tunnel->hlen;
716 tiph = &tunnel->parms.iph;
717 }
718
719 if ((dst = tiph->daddr) == 0) {
720 /* NBMA tunnel */
721
Eric Dumazetadf30902009-06-02 05:19:30 +0000722 if (skb_dst(skb) == NULL) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000723 dev->stats.tx_fifo_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 goto tx_error;
725 }
726
David S. Miller61d57f82012-01-24 18:23:30 -0500727 if (skb->protocol == htons(ETH_P_IP)) {
Eric Dumazet511c3f92009-06-02 05:14:27 +0000728 rt = skb_rtable(skb);
David S. Miller61d57f82012-01-24 18:23:30 -0500729 dst = rt->rt_gateway;
730 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000731#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700732 else if (skb->protocol == htons(ETH_P_IPV6)) {
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000733 const struct in6_addr *addr6;
David S. Miller0ec88662012-01-27 15:01:08 -0800734 struct neighbour *neigh;
735 bool do_tx_error_icmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736 int addr_type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737
David S. Miller0ec88662012-01-27 15:01:08 -0800738 neigh = dst_neigh_lookup(skb_dst(skb), &ipv6_hdr(skb)->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739 if (neigh == NULL)
740 goto tx_error;
741
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000742 addr6 = (const struct in6_addr *)&neigh->primary_key;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743 addr_type = ipv6_addr_type(addr6);
744
745 if (addr_type == IPV6_ADDR_ANY) {
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700746 addr6 = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747 addr_type = ipv6_addr_type(addr6);
748 }
749
750 if ((addr_type & IPV6_ADDR_COMPATv4) == 0)
David S. Miller0ec88662012-01-27 15:01:08 -0800751 do_tx_error_icmp = true;
752 else {
753 do_tx_error_icmp = false;
754 dst = addr6->s6_addr32[3];
755 }
756 neigh_release(neigh);
757 if (do_tx_error_icmp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700758 goto tx_error_icmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759 }
760#endif
761 else
762 goto tx_error;
763 }
764
765 tos = tiph->tos;
Andreas Jaggiee686ca2009-07-14 09:35:59 -0700766 if (tos == 1) {
767 tos = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768 if (skb->protocol == htons(ETH_P_IP))
769 tos = old_iph->tos;
Stephen Hemmingerdd4ba832010-07-08 21:35:58 -0700770 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000771 tos = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700772 }
773
David S. Millercbb1e852011-05-04 12:33:34 -0700774 rt = ip_route_output_gre(dev_net(dev), &fl4, dst, tiph->saddr,
David S. Miller78fbfd82011-03-12 00:00:52 -0500775 tunnel->parms.o_key, RT_TOS(tos),
776 tunnel->parms.link);
777 if (IS_ERR(rt)) {
778 dev->stats.tx_carrier_errors++;
779 goto tx_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780 }
Changli Gaod8d1f302010-06-10 23:31:35 -0700781 tdev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700782
783 if (tdev == dev) {
784 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000785 dev->stats.collisions++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700786 goto tx_error;
787 }
788
789 df = tiph->frag_off;
790 if (df)
Changli Gaod8d1f302010-06-10 23:31:35 -0700791 mtu = dst_mtu(&rt->dst) - dev->hard_header_len - tunnel->hlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792 else
Eric Dumazetadf30902009-06-02 05:19:30 +0000793 mtu = skb_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700794
Eric Dumazetadf30902009-06-02 05:19:30 +0000795 if (skb_dst(skb))
796 skb_dst(skb)->ops->update_pmtu(skb_dst(skb), mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700797
798 if (skb->protocol == htons(ETH_P_IP)) {
799 df |= (old_iph->frag_off&htons(IP_DF));
800
801 if ((old_iph->frag_off&htons(IP_DF)) &&
802 mtu < ntohs(old_iph->tot_len)) {
803 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, htonl(mtu));
804 ip_rt_put(rt);
805 goto tx_error;
806 }
807 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000808#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700809 else if (skb->protocol == htons(ETH_P_IPV6)) {
Eric Dumazetadf30902009-06-02 05:19:30 +0000810 struct rt6_info *rt6 = (struct rt6_info *)skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700811
Eric Dumazetadf30902009-06-02 05:19:30 +0000812 if (rt6 && mtu < dst_mtu(skb_dst(skb)) && mtu >= IPV6_MIN_MTU) {
Joe Perchesf97c1e02007-12-16 13:45:43 -0800813 if ((tunnel->parms.iph.daddr &&
814 !ipv4_is_multicast(tunnel->parms.iph.daddr)) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700815 rt6->rt6i_dst.plen == 128) {
816 rt6->rt6i_flags |= RTF_MODIFIED;
David S. Millerdefb3512010-12-08 21:16:57 -0800817 dst_metric_set(skb_dst(skb), RTAX_MTU, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818 }
819 }
820
821 if (mtu >= IPV6_MIN_MTU && mtu < skb->len - tunnel->hlen + gre_hlen) {
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000822 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700823 ip_rt_put(rt);
824 goto tx_error;
825 }
826 }
827#endif
828
829 if (tunnel->err_count > 0) {
Wei Yongjunda6185d82009-02-24 23:34:48 -0800830 if (time_before(jiffies,
831 tunnel->err_time + IPTUNNEL_ERR_TIMEO)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832 tunnel->err_count--;
833
834 dst_link_failure(skb);
835 } else
836 tunnel->err_count = 0;
837 }
838
Changli Gaod8d1f302010-06-10 23:31:35 -0700839 max_headroom = LL_RESERVED_SPACE(tdev) + gre_hlen + rt->dst.header_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700840
Patrick McHardycfbba492007-07-09 15:33:40 -0700841 if (skb_headroom(skb) < max_headroom || skb_shared(skb)||
842 (skb_cloned(skb) && !skb_clone_writable(skb, 0))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700843 struct sk_buff *new_skb = skb_realloc_headroom(skb, max_headroom);
Herbert Xu805dc1d2011-11-18 02:20:06 +0000844 if (max_headroom > dev->needed_headroom)
845 dev->needed_headroom = max_headroom;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700846 if (!new_skb) {
847 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000848 dev->stats.tx_dropped++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700849 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000850 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700851 }
852 if (skb->sk)
853 skb_set_owner_w(new_skb, skb->sk);
854 dev_kfree_skb(skb);
855 skb = new_skb;
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700856 old_iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857 }
858
Herbert Xu64194c32008-10-09 12:03:17 -0700859 skb_reset_transport_header(skb);
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700860 skb_push(skb, gre_hlen);
861 skb_reset_network_header(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700862 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
Patrick McHardy48d5cad2006-02-15 15:10:22 -0800863 IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
864 IPSKB_REROUTED);
Eric Dumazetadf30902009-06-02 05:19:30 +0000865 skb_dst_drop(skb);
Changli Gaod8d1f302010-06-10 23:31:35 -0700866 skb_dst_set(skb, &rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867
868 /*
869 * Push down and install the IPIP header.
870 */
871
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700872 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700873 iph->version = 4;
874 iph->ihl = sizeof(struct iphdr) >> 2;
875 iph->frag_off = df;
876 iph->protocol = IPPROTO_GRE;
877 iph->tos = ipgre_ecn_encapsulate(tos, old_iph, skb);
David S. Millercbb1e852011-05-04 12:33:34 -0700878 iph->daddr = fl4.daddr;
879 iph->saddr = fl4.saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700880
881 if ((iph->ttl = tiph->ttl) == 0) {
882 if (skb->protocol == htons(ETH_P_IP))
883 iph->ttl = old_iph->ttl;
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000884#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700885 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000886 iph->ttl = ((const struct ipv6hdr *)old_iph)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700887#endif
888 else
David S. Miller323e1262010-12-12 21:55:08 -0800889 iph->ttl = ip4_dst_hoplimit(&rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890 }
891
Herbert Xue1a80002008-10-09 12:00:17 -0700892 ((__be16 *)(iph + 1))[0] = tunnel->parms.o_flags;
893 ((__be16 *)(iph + 1))[1] = (dev->type == ARPHRD_ETHER) ?
894 htons(ETH_P_TEB) : skb->protocol;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700895
896 if (tunnel->parms.o_flags&(GRE_KEY|GRE_CSUM|GRE_SEQ)) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800897 __be32 *ptr = (__be32*)(((u8*)iph) + tunnel->hlen - 4);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898
899 if (tunnel->parms.o_flags&GRE_SEQ) {
900 ++tunnel->o_seqno;
901 *ptr = htonl(tunnel->o_seqno);
902 ptr--;
903 }
904 if (tunnel->parms.o_flags&GRE_KEY) {
905 *ptr = tunnel->parms.o_key;
906 ptr--;
907 }
908 if (tunnel->parms.o_flags&GRE_CSUM) {
909 *ptr = 0;
Al Viro5f92a732006-11-14 21:36:54 -0800910 *(__sum16*)ptr = ip_compute_csum((void*)(iph+1), skb->len - sizeof(struct iphdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700911 }
912 }
913
914 nf_reset(skb);
Eric Dumazete985aad2010-09-27 03:57:11 +0000915 tstats = this_cpu_ptr(dev->tstats);
916 __IPTUNNEL_XMIT(tstats, &dev->stats);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000917 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700918
David S. Miller496053f2012-01-11 16:46:32 -0800919#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700920tx_error_icmp:
921 dst_link_failure(skb);
David S. Miller496053f2012-01-11 16:46:32 -0800922#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700923tx_error:
Eric Dumazete985aad2010-09-27 03:57:11 +0000924 dev->stats.tx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700925 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000926 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700927}
928
Herbert Xu42aa9162008-10-09 11:59:32 -0700929static int ipgre_tunnel_bind_dev(struct net_device *dev)
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800930{
931 struct net_device *tdev = NULL;
932 struct ip_tunnel *tunnel;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000933 const struct iphdr *iph;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800934 int hlen = LL_MAX_HEADER;
935 int mtu = ETH_DATA_LEN;
936 int addend = sizeof(struct iphdr) + 4;
937
938 tunnel = netdev_priv(dev);
939 iph = &tunnel->parms.iph;
940
Herbert Xuc95b8192008-10-09 11:58:54 -0700941 /* Guess output device to choose reasonable mtu and needed_headroom */
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800942
943 if (iph->daddr) {
David S. Millercbb1e852011-05-04 12:33:34 -0700944 struct flowi4 fl4;
945 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +0000946
David S. Millercbb1e852011-05-04 12:33:34 -0700947 rt = ip_route_output_gre(dev_net(dev), &fl4,
948 iph->daddr, iph->saddr,
949 tunnel->parms.o_key,
950 RT_TOS(iph->tos),
951 tunnel->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -0800952 if (!IS_ERR(rt)) {
Changli Gaod8d1f302010-06-10 23:31:35 -0700953 tdev = rt->dst.dev;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800954 ip_rt_put(rt);
955 }
Herbert Xue1a80002008-10-09 12:00:17 -0700956
957 if (dev->type != ARPHRD_ETHER)
958 dev->flags |= IFF_POINTOPOINT;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800959 }
960
961 if (!tdev && tunnel->parms.link)
Pavel Emelyanov96635522008-04-16 01:10:44 -0700962 tdev = __dev_get_by_index(dev_net(dev), tunnel->parms.link);
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800963
964 if (tdev) {
Herbert Xuc95b8192008-10-09 11:58:54 -0700965 hlen = tdev->hard_header_len + tdev->needed_headroom;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800966 mtu = tdev->mtu;
967 }
968 dev->iflink = tunnel->parms.link;
969
970 /* Precalculate GRE options length */
971 if (tunnel->parms.o_flags&(GRE_CSUM|GRE_KEY|GRE_SEQ)) {
972 if (tunnel->parms.o_flags&GRE_CSUM)
973 addend += 4;
974 if (tunnel->parms.o_flags&GRE_KEY)
975 addend += 4;
976 if (tunnel->parms.o_flags&GRE_SEQ)
977 addend += 4;
978 }
Herbert Xuc95b8192008-10-09 11:58:54 -0700979 dev->needed_headroom = addend + hlen;
Tom Goff8cdb0452009-08-14 16:33:56 -0700980 mtu -= dev->hard_header_len + addend;
Herbert Xu42aa9162008-10-09 11:59:32 -0700981
982 if (mtu < 68)
983 mtu = 68;
984
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800985 tunnel->hlen = addend;
986
Herbert Xu42aa9162008-10-09 11:59:32 -0700987 return mtu;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800988}
989
Linus Torvalds1da177e2005-04-16 15:20:36 -0700990static int
991ipgre_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
992{
993 int err = 0;
994 struct ip_tunnel_parm p;
995 struct ip_tunnel *t;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700996 struct net *net = dev_net(dev);
997 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700998
999 switch (cmd) {
1000 case SIOCGETTUNNEL:
1001 t = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001002 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001003 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) {
1004 err = -EFAULT;
1005 break;
1006 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001007 t = ipgre_tunnel_locate(net, &p, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001008 }
1009 if (t == NULL)
Patrick McHardy2941a482006-01-08 22:05:26 -08001010 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001011 memcpy(&p, &t->parms, sizeof(p));
1012 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
1013 err = -EFAULT;
1014 break;
1015
1016 case SIOCADDTUNNEL:
1017 case SIOCCHGTUNNEL:
1018 err = -EPERM;
1019 if (!capable(CAP_NET_ADMIN))
1020 goto done;
1021
1022 err = -EFAULT;
1023 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1024 goto done;
1025
1026 err = -EINVAL;
1027 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
1028 p.iph.ihl != 5 || (p.iph.frag_off&htons(~IP_DF)) ||
1029 ((p.i_flags|p.o_flags)&(GRE_VERSION|GRE_ROUTING)))
1030 goto done;
1031 if (p.iph.ttl)
1032 p.iph.frag_off |= htons(IP_DF);
1033
1034 if (!(p.i_flags&GRE_KEY))
1035 p.i_key = 0;
1036 if (!(p.o_flags&GRE_KEY))
1037 p.o_key = 0;
1038
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001039 t = ipgre_tunnel_locate(net, &p, cmd == SIOCADDTUNNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001040
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001041 if (dev != ign->fb_tunnel_dev && cmd == SIOCCHGTUNNEL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001042 if (t != NULL) {
1043 if (t->dev != dev) {
1044 err = -EEXIST;
1045 break;
1046 }
1047 } else {
Eric Dumazet15078502010-09-15 11:07:53 +00001048 unsigned int nflags = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001049
Patrick McHardy2941a482006-01-08 22:05:26 -08001050 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001051
Joe Perchesf97c1e02007-12-16 13:45:43 -08001052 if (ipv4_is_multicast(p.iph.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001053 nflags = IFF_BROADCAST;
1054 else if (p.iph.daddr)
1055 nflags = IFF_POINTOPOINT;
1056
1057 if ((dev->flags^nflags)&(IFF_POINTOPOINT|IFF_BROADCAST)) {
1058 err = -EINVAL;
1059 break;
1060 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001061 ipgre_tunnel_unlink(ign, t);
Pavel Emelyanov74b0b852010-10-27 05:43:53 +00001062 synchronize_net();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001063 t->parms.iph.saddr = p.iph.saddr;
1064 t->parms.iph.daddr = p.iph.daddr;
1065 t->parms.i_key = p.i_key;
1066 t->parms.o_key = p.o_key;
1067 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1068 memcpy(dev->broadcast, &p.iph.daddr, 4);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001069 ipgre_tunnel_link(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001070 netdev_state_change(dev);
1071 }
1072 }
1073
1074 if (t) {
1075 err = 0;
1076 if (cmd == SIOCCHGTUNNEL) {
1077 t->parms.iph.ttl = p.iph.ttl;
1078 t->parms.iph.tos = p.iph.tos;
1079 t->parms.iph.frag_off = p.iph.frag_off;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001080 if (t->parms.link != p.link) {
1081 t->parms.link = p.link;
Herbert Xu42aa9162008-10-09 11:59:32 -07001082 dev->mtu = ipgre_tunnel_bind_dev(dev);
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001083 netdev_state_change(dev);
1084 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001085 }
1086 if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
1087 err = -EFAULT;
1088 } else
1089 err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT);
1090 break;
1091
1092 case SIOCDELTUNNEL:
1093 err = -EPERM;
1094 if (!capable(CAP_NET_ADMIN))
1095 goto done;
1096
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001097 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001098 err = -EFAULT;
1099 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1100 goto done;
1101 err = -ENOENT;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001102 if ((t = ipgre_tunnel_locate(net, &p, 0)) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001103 goto done;
1104 err = -EPERM;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001105 if (t == netdev_priv(ign->fb_tunnel_dev))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001106 goto done;
1107 dev = t->dev;
1108 }
Stephen Hemminger22f8cde2007-02-07 00:09:58 -08001109 unregister_netdevice(dev);
1110 err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001111 break;
1112
1113 default:
1114 err = -EINVAL;
1115 }
1116
1117done:
1118 return err;
1119}
1120
Linus Torvalds1da177e2005-04-16 15:20:36 -07001121static int ipgre_tunnel_change_mtu(struct net_device *dev, int new_mtu)
1122{
Patrick McHardy2941a482006-01-08 22:05:26 -08001123 struct ip_tunnel *tunnel = netdev_priv(dev);
Herbert Xuc95b8192008-10-09 11:58:54 -07001124 if (new_mtu < 68 ||
1125 new_mtu > 0xFFF8 - dev->hard_header_len - tunnel->hlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126 return -EINVAL;
1127 dev->mtu = new_mtu;
1128 return 0;
1129}
1130
Linus Torvalds1da177e2005-04-16 15:20:36 -07001131/* Nice toy. Unfortunately, useless in real life :-)
1132 It allows to construct virtual multiprotocol broadcast "LAN"
1133 over the Internet, provided multicast routing is tuned.
1134
1135
1136 I have no idea was this bicycle invented before me,
1137 so that I had to set ARPHRD_IPGRE to a random value.
1138 I have an impression, that Cisco could make something similar,
1139 but this feature is apparently missing in IOS<=11.2(8).
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001140
Linus Torvalds1da177e2005-04-16 15:20:36 -07001141 I set up 10.66.66/24 and fec0:6666:6666::0/96 as virtual networks
1142 with broadcast 224.66.66.66. If you have access to mbone, play with me :-)
1143
1144 ping -t 255 224.66.66.66
1145
1146 If nobody answers, mbone does not work.
1147
1148 ip tunnel add Universe mode gre remote 224.66.66.66 local <Your_real_addr> ttl 255
1149 ip addr add 10.66.66.<somewhat>/24 dev Universe
1150 ifconfig Universe up
1151 ifconfig Universe add fe80::<Your_real_addr>/10
1152 ifconfig Universe add fec0:6666:6666::<Your_real_addr>/96
1153 ftp 10.66.66.66
1154 ...
1155 ftp fec0:6666:6666::193.233.7.65
1156 ...
1157
1158 */
1159
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001160static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
1161 unsigned short type,
Eric Dumazet15078502010-09-15 11:07:53 +00001162 const void *daddr, const void *saddr, unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001163{
Patrick McHardy2941a482006-01-08 22:05:26 -08001164 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001165 struct iphdr *iph = (struct iphdr *)skb_push(skb, t->hlen);
Al Virod5a0a1e2006-11-08 00:23:14 -08001166 __be16 *p = (__be16*)(iph+1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001167
1168 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
1169 p[0] = t->parms.o_flags;
1170 p[1] = htons(type);
1171
1172 /*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001173 * Set the source hardware address.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001174 */
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001175
Linus Torvalds1da177e2005-04-16 15:20:36 -07001176 if (saddr)
1177 memcpy(&iph->saddr, saddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001178 if (daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001179 memcpy(&iph->daddr, daddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001180 if (iph->daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001181 return t->hlen;
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001182
Linus Torvalds1da177e2005-04-16 15:20:36 -07001183 return -t->hlen;
1184}
1185
Timo Teras6a5f44d2007-10-23 20:31:53 -07001186static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
1187{
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001188 const struct iphdr *iph = (const struct iphdr *) skb_mac_header(skb);
Timo Teras6a5f44d2007-10-23 20:31:53 -07001189 memcpy(haddr, &iph->saddr, 4);
1190 return 4;
1191}
1192
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001193static const struct header_ops ipgre_header_ops = {
1194 .create = ipgre_header,
Timo Teras6a5f44d2007-10-23 20:31:53 -07001195 .parse = ipgre_header_parse,
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001196};
1197
Timo Teras6a5f44d2007-10-23 20:31:53 -07001198#ifdef CONFIG_NET_IPGRE_BROADCAST
Linus Torvalds1da177e2005-04-16 15:20:36 -07001199static int ipgre_open(struct net_device *dev)
1200{
Patrick McHardy2941a482006-01-08 22:05:26 -08001201 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001202
Joe Perchesf97c1e02007-12-16 13:45:43 -08001203 if (ipv4_is_multicast(t->parms.iph.daddr)) {
David S. Millercbb1e852011-05-04 12:33:34 -07001204 struct flowi4 fl4;
1205 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +00001206
David S. Millercbb1e852011-05-04 12:33:34 -07001207 rt = ip_route_output_gre(dev_net(dev), &fl4,
1208 t->parms.iph.daddr,
1209 t->parms.iph.saddr,
1210 t->parms.o_key,
1211 RT_TOS(t->parms.iph.tos),
1212 t->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -08001213 if (IS_ERR(rt))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001214 return -EADDRNOTAVAIL;
Changli Gaod8d1f302010-06-10 23:31:35 -07001215 dev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001216 ip_rt_put(rt);
Herbert Xue5ed6392005-10-03 14:35:55 -07001217 if (__in_dev_get_rtnl(dev) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001218 return -EADDRNOTAVAIL;
1219 t->mlink = dev->ifindex;
Herbert Xue5ed6392005-10-03 14:35:55 -07001220 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001221 }
1222 return 0;
1223}
1224
1225static int ipgre_close(struct net_device *dev)
1226{
Patrick McHardy2941a482006-01-08 22:05:26 -08001227 struct ip_tunnel *t = netdev_priv(dev);
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001228
Joe Perchesf97c1e02007-12-16 13:45:43 -08001229 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
Denis V. Lunev7fee0ca2008-01-21 17:32:38 -08001230 struct in_device *in_dev;
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +09001231 in_dev = inetdev_by_index(dev_net(dev), t->mlink);
Eric Dumazet8723e1b2010-10-19 00:39:26 +00001232 if (in_dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001233 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001234 }
1235 return 0;
1236}
1237
1238#endif
1239
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001240static const struct net_device_ops ipgre_netdev_ops = {
1241 .ndo_init = ipgre_tunnel_init,
1242 .ndo_uninit = ipgre_tunnel_uninit,
1243#ifdef CONFIG_NET_IPGRE_BROADCAST
1244 .ndo_open = ipgre_open,
1245 .ndo_stop = ipgre_close,
1246#endif
1247 .ndo_start_xmit = ipgre_tunnel_xmit,
1248 .ndo_do_ioctl = ipgre_tunnel_ioctl,
1249 .ndo_change_mtu = ipgre_tunnel_change_mtu,
Eric Dumazete985aad2010-09-27 03:57:11 +00001250 .ndo_get_stats = ipgre_get_stats,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001251};
1252
Eric Dumazete985aad2010-09-27 03:57:11 +00001253static void ipgre_dev_free(struct net_device *dev)
1254{
1255 free_percpu(dev->tstats);
1256 free_netdev(dev);
1257}
1258
Linus Torvalds1da177e2005-04-16 15:20:36 -07001259static void ipgre_tunnel_setup(struct net_device *dev)
1260{
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001261 dev->netdev_ops = &ipgre_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001262 dev->destructor = ipgre_dev_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001263
1264 dev->type = ARPHRD_IPGRE;
Herbert Xuc95b8192008-10-09 11:58:54 -07001265 dev->needed_headroom = LL_MAX_HEADER + sizeof(struct iphdr) + 4;
Kris Katterjohn46f25df2006-01-05 16:35:42 -08001266 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001267 dev->flags = IFF_NOARP;
1268 dev->iflink = 0;
1269 dev->addr_len = 4;
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -07001270 dev->features |= NETIF_F_NETNS_LOCAL;
Eric Dumazet108bfa82009-05-28 22:35:10 +00001271 dev->priv_flags &= ~IFF_XMIT_DST_RELEASE;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001272}
1273
1274static int ipgre_tunnel_init(struct net_device *dev)
1275{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001276 struct ip_tunnel *tunnel;
1277 struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001278
Patrick McHardy2941a482006-01-08 22:05:26 -08001279 tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001280 iph = &tunnel->parms.iph;
1281
1282 tunnel->dev = dev;
1283 strcpy(tunnel->parms.name, dev->name);
1284
1285 memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
1286 memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
1287
Linus Torvalds1da177e2005-04-16 15:20:36 -07001288 if (iph->daddr) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001289#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -08001290 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001291 if (!iph->saddr)
1292 return -EINVAL;
1293 dev->flags = IFF_BROADCAST;
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001294 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001295 }
1296#endif
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001297 } else
Timo Teras6a5f44d2007-10-23 20:31:53 -07001298 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001299
Eric Dumazete985aad2010-09-27 03:57:11 +00001300 dev->tstats = alloc_percpu(struct pcpu_tstats);
1301 if (!dev->tstats)
1302 return -ENOMEM;
1303
Linus Torvalds1da177e2005-04-16 15:20:36 -07001304 return 0;
1305}
1306
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001307static void ipgre_fb_tunnel_init(struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001308{
Patrick McHardy2941a482006-01-08 22:05:26 -08001309 struct ip_tunnel *tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001310 struct iphdr *iph = &tunnel->parms.iph;
1311
1312 tunnel->dev = dev;
1313 strcpy(tunnel->parms.name, dev->name);
1314
1315 iph->version = 4;
1316 iph->protocol = IPPROTO_GRE;
1317 iph->ihl = 5;
1318 tunnel->hlen = sizeof(struct iphdr) + 4;
1319
1320 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001321}
1322
1323
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001324static const struct gre_protocol ipgre_protocol = {
1325 .handler = ipgre_rcv,
1326 .err_handler = ipgre_err,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001327};
1328
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001329static void ipgre_destroy_tunnels(struct ipgre_net *ign, struct list_head *head)
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001330{
1331 int prio;
1332
1333 for (prio = 0; prio < 4; prio++) {
1334 int h;
1335 for (h = 0; h < HASH_SIZE; h++) {
Eric Dumazet15078502010-09-15 11:07:53 +00001336 struct ip_tunnel *t;
1337
1338 t = rtnl_dereference(ign->tunnels[prio][h]);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001339
1340 while (t != NULL) {
1341 unregister_netdevice_queue(t->dev, head);
Eric Dumazet15078502010-09-15 11:07:53 +00001342 t = rtnl_dereference(t->next);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001343 }
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001344 }
1345 }
1346}
1347
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001348static int __net_init ipgre_init_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001349{
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001350 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001351 int err;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001352
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001353 ign->fb_tunnel_dev = alloc_netdev(sizeof(struct ip_tunnel), "gre0",
1354 ipgre_tunnel_setup);
1355 if (!ign->fb_tunnel_dev) {
1356 err = -ENOMEM;
1357 goto err_alloc_dev;
1358 }
Alexey Dobriyanbe77e592008-11-23 17:26:26 -08001359 dev_net_set(ign->fb_tunnel_dev, net);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001360
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001361 ipgre_fb_tunnel_init(ign->fb_tunnel_dev);
Herbert Xuc19e6542008-10-09 11:59:55 -07001362 ign->fb_tunnel_dev->rtnl_link_ops = &ipgre_link_ops;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001363
1364 if ((err = register_netdev(ign->fb_tunnel_dev)))
1365 goto err_reg_dev;
1366
Eric Dumazet3285ee32010-10-30 16:21:28 -07001367 rcu_assign_pointer(ign->tunnels_wc[0],
1368 netdev_priv(ign->fb_tunnel_dev));
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001369 return 0;
1370
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001371err_reg_dev:
Eric Dumazet3285ee32010-10-30 16:21:28 -07001372 ipgre_dev_free(ign->fb_tunnel_dev);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001373err_alloc_dev:
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001374 return err;
1375}
1376
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001377static void __net_exit ipgre_exit_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001378{
1379 struct ipgre_net *ign;
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001380 LIST_HEAD(list);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001381
1382 ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001383 rtnl_lock();
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001384 ipgre_destroy_tunnels(ign, &list);
1385 unregister_netdevice_many(&list);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001386 rtnl_unlock();
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001387}
1388
1389static struct pernet_operations ipgre_net_ops = {
1390 .init = ipgre_init_net,
1391 .exit = ipgre_exit_net,
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001392 .id = &ipgre_net_id,
1393 .size = sizeof(struct ipgre_net),
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001394};
Linus Torvalds1da177e2005-04-16 15:20:36 -07001395
Herbert Xuc19e6542008-10-09 11:59:55 -07001396static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[])
1397{
1398 __be16 flags;
1399
1400 if (!data)
1401 return 0;
1402
1403 flags = 0;
1404 if (data[IFLA_GRE_IFLAGS])
1405 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1406 if (data[IFLA_GRE_OFLAGS])
1407 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1408 if (flags & (GRE_VERSION|GRE_ROUTING))
1409 return -EINVAL;
1410
1411 return 0;
1412}
1413
Herbert Xue1a80002008-10-09 12:00:17 -07001414static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[])
1415{
1416 __be32 daddr;
1417
1418 if (tb[IFLA_ADDRESS]) {
1419 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1420 return -EINVAL;
1421 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1422 return -EADDRNOTAVAIL;
1423 }
1424
1425 if (!data)
1426 goto out;
1427
1428 if (data[IFLA_GRE_REMOTE]) {
1429 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1430 if (!daddr)
1431 return -EINVAL;
1432 }
1433
1434out:
1435 return ipgre_tunnel_validate(tb, data);
1436}
1437
Herbert Xuc19e6542008-10-09 11:59:55 -07001438static void ipgre_netlink_parms(struct nlattr *data[],
1439 struct ip_tunnel_parm *parms)
1440{
Herbert Xu7bb82d92008-10-11 12:20:15 -07001441 memset(parms, 0, sizeof(*parms));
Herbert Xuc19e6542008-10-09 11:59:55 -07001442
1443 parms->iph.protocol = IPPROTO_GRE;
1444
1445 if (!data)
1446 return;
1447
1448 if (data[IFLA_GRE_LINK])
1449 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1450
1451 if (data[IFLA_GRE_IFLAGS])
1452 parms->i_flags = nla_get_be16(data[IFLA_GRE_IFLAGS]);
1453
1454 if (data[IFLA_GRE_OFLAGS])
1455 parms->o_flags = nla_get_be16(data[IFLA_GRE_OFLAGS]);
1456
1457 if (data[IFLA_GRE_IKEY])
1458 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1459
1460 if (data[IFLA_GRE_OKEY])
1461 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1462
1463 if (data[IFLA_GRE_LOCAL])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001464 parms->iph.saddr = nla_get_be32(data[IFLA_GRE_LOCAL]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001465
1466 if (data[IFLA_GRE_REMOTE])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001467 parms->iph.daddr = nla_get_be32(data[IFLA_GRE_REMOTE]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001468
1469 if (data[IFLA_GRE_TTL])
1470 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1471
1472 if (data[IFLA_GRE_TOS])
1473 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1474
1475 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC]))
1476 parms->iph.frag_off = htons(IP_DF);
1477}
1478
Herbert Xue1a80002008-10-09 12:00:17 -07001479static int ipgre_tap_init(struct net_device *dev)
1480{
1481 struct ip_tunnel *tunnel;
1482
1483 tunnel = netdev_priv(dev);
1484
1485 tunnel->dev = dev;
1486 strcpy(tunnel->parms.name, dev->name);
1487
1488 ipgre_tunnel_bind_dev(dev);
1489
Eric Dumazete985aad2010-09-27 03:57:11 +00001490 dev->tstats = alloc_percpu(struct pcpu_tstats);
1491 if (!dev->tstats)
1492 return -ENOMEM;
1493
Herbert Xue1a80002008-10-09 12:00:17 -07001494 return 0;
1495}
1496
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001497static const struct net_device_ops ipgre_tap_netdev_ops = {
1498 .ndo_init = ipgre_tap_init,
1499 .ndo_uninit = ipgre_tunnel_uninit,
1500 .ndo_start_xmit = ipgre_tunnel_xmit,
1501 .ndo_set_mac_address = eth_mac_addr,
1502 .ndo_validate_addr = eth_validate_addr,
1503 .ndo_change_mtu = ipgre_tunnel_change_mtu,
Eric Dumazete985aad2010-09-27 03:57:11 +00001504 .ndo_get_stats = ipgre_get_stats,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001505};
1506
Herbert Xue1a80002008-10-09 12:00:17 -07001507static void ipgre_tap_setup(struct net_device *dev)
1508{
1509
1510 ether_setup(dev);
1511
Herbert Xu2e9526b2009-10-30 05:51:48 +00001512 dev->netdev_ops = &ipgre_tap_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001513 dev->destructor = ipgre_dev_free;
Herbert Xue1a80002008-10-09 12:00:17 -07001514
1515 dev->iflink = 0;
1516 dev->features |= NETIF_F_NETNS_LOCAL;
1517}
1518
Eric W. Biederman81adee42009-11-08 00:53:51 -08001519static int ipgre_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[],
Herbert Xuc19e6542008-10-09 11:59:55 -07001520 struct nlattr *data[])
1521{
1522 struct ip_tunnel *nt;
1523 struct net *net = dev_net(dev);
1524 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1525 int mtu;
1526 int err;
1527
1528 nt = netdev_priv(dev);
1529 ipgre_netlink_parms(data, &nt->parms);
1530
Herbert Xue1a80002008-10-09 12:00:17 -07001531 if (ipgre_tunnel_find(net, &nt->parms, dev->type))
Herbert Xuc19e6542008-10-09 11:59:55 -07001532 return -EEXIST;
1533
Herbert Xue1a80002008-10-09 12:00:17 -07001534 if (dev->type == ARPHRD_ETHER && !tb[IFLA_ADDRESS])
1535 random_ether_addr(dev->dev_addr);
1536
Herbert Xuc19e6542008-10-09 11:59:55 -07001537 mtu = ipgre_tunnel_bind_dev(dev);
1538 if (!tb[IFLA_MTU])
1539 dev->mtu = mtu;
1540
Eric Dumazetb790e012010-09-27 23:05:47 +00001541 /* Can use a lockless transmit, unless we generate output sequences */
1542 if (!(nt->parms.o_flags & GRE_SEQ))
1543 dev->features |= NETIF_F_LLTX;
1544
Herbert Xuc19e6542008-10-09 11:59:55 -07001545 err = register_netdevice(dev);
1546 if (err)
1547 goto out;
1548
1549 dev_hold(dev);
1550 ipgre_tunnel_link(ign, nt);
1551
1552out:
1553 return err;
1554}
1555
1556static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1557 struct nlattr *data[])
1558{
1559 struct ip_tunnel *t, *nt;
1560 struct net *net = dev_net(dev);
1561 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1562 struct ip_tunnel_parm p;
1563 int mtu;
1564
1565 if (dev == ign->fb_tunnel_dev)
1566 return -EINVAL;
1567
1568 nt = netdev_priv(dev);
1569 ipgre_netlink_parms(data, &p);
1570
1571 t = ipgre_tunnel_locate(net, &p, 0);
1572
1573 if (t) {
1574 if (t->dev != dev)
1575 return -EEXIST;
1576 } else {
Herbert Xuc19e6542008-10-09 11:59:55 -07001577 t = nt;
1578
Herbert Xu2e9526b2009-10-30 05:51:48 +00001579 if (dev->type != ARPHRD_ETHER) {
Eric Dumazet15078502010-09-15 11:07:53 +00001580 unsigned int nflags = 0;
Herbert Xuc19e6542008-10-09 11:59:55 -07001581
Herbert Xu2e9526b2009-10-30 05:51:48 +00001582 if (ipv4_is_multicast(p.iph.daddr))
1583 nflags = IFF_BROADCAST;
1584 else if (p.iph.daddr)
1585 nflags = IFF_POINTOPOINT;
1586
1587 if ((dev->flags ^ nflags) &
1588 (IFF_POINTOPOINT | IFF_BROADCAST))
1589 return -EINVAL;
1590 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001591
1592 ipgre_tunnel_unlink(ign, t);
1593 t->parms.iph.saddr = p.iph.saddr;
1594 t->parms.iph.daddr = p.iph.daddr;
1595 t->parms.i_key = p.i_key;
Herbert Xu2e9526b2009-10-30 05:51:48 +00001596 if (dev->type != ARPHRD_ETHER) {
1597 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1598 memcpy(dev->broadcast, &p.iph.daddr, 4);
1599 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001600 ipgre_tunnel_link(ign, t);
1601 netdev_state_change(dev);
1602 }
1603
1604 t->parms.o_key = p.o_key;
1605 t->parms.iph.ttl = p.iph.ttl;
1606 t->parms.iph.tos = p.iph.tos;
1607 t->parms.iph.frag_off = p.iph.frag_off;
1608
1609 if (t->parms.link != p.link) {
1610 t->parms.link = p.link;
1611 mtu = ipgre_tunnel_bind_dev(dev);
1612 if (!tb[IFLA_MTU])
1613 dev->mtu = mtu;
1614 netdev_state_change(dev);
1615 }
1616
1617 return 0;
1618}
1619
1620static size_t ipgre_get_size(const struct net_device *dev)
1621{
1622 return
1623 /* IFLA_GRE_LINK */
1624 nla_total_size(4) +
1625 /* IFLA_GRE_IFLAGS */
1626 nla_total_size(2) +
1627 /* IFLA_GRE_OFLAGS */
1628 nla_total_size(2) +
1629 /* IFLA_GRE_IKEY */
1630 nla_total_size(4) +
1631 /* IFLA_GRE_OKEY */
1632 nla_total_size(4) +
1633 /* IFLA_GRE_LOCAL */
1634 nla_total_size(4) +
1635 /* IFLA_GRE_REMOTE */
1636 nla_total_size(4) +
1637 /* IFLA_GRE_TTL */
1638 nla_total_size(1) +
1639 /* IFLA_GRE_TOS */
1640 nla_total_size(1) +
1641 /* IFLA_GRE_PMTUDISC */
1642 nla_total_size(1) +
1643 0;
1644}
1645
1646static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1647{
1648 struct ip_tunnel *t = netdev_priv(dev);
1649 struct ip_tunnel_parm *p = &t->parms;
1650
1651 NLA_PUT_U32(skb, IFLA_GRE_LINK, p->link);
1652 NLA_PUT_BE16(skb, IFLA_GRE_IFLAGS, p->i_flags);
1653 NLA_PUT_BE16(skb, IFLA_GRE_OFLAGS, p->o_flags);
Patrick McHardyba9e64b2008-10-10 12:10:30 -07001654 NLA_PUT_BE32(skb, IFLA_GRE_IKEY, p->i_key);
1655 NLA_PUT_BE32(skb, IFLA_GRE_OKEY, p->o_key);
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001656 NLA_PUT_BE32(skb, IFLA_GRE_LOCAL, p->iph.saddr);
1657 NLA_PUT_BE32(skb, IFLA_GRE_REMOTE, p->iph.daddr);
Herbert Xuc19e6542008-10-09 11:59:55 -07001658 NLA_PUT_U8(skb, IFLA_GRE_TTL, p->iph.ttl);
1659 NLA_PUT_U8(skb, IFLA_GRE_TOS, p->iph.tos);
1660 NLA_PUT_U8(skb, IFLA_GRE_PMTUDISC, !!(p->iph.frag_off & htons(IP_DF)));
1661
1662 return 0;
1663
1664nla_put_failure:
1665 return -EMSGSIZE;
1666}
1667
1668static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1669 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1670 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1671 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1672 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1673 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001674 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1675 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
Herbert Xuc19e6542008-10-09 11:59:55 -07001676 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1677 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1678 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1679};
1680
1681static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1682 .kind = "gre",
1683 .maxtype = IFLA_GRE_MAX,
1684 .policy = ipgre_policy,
1685 .priv_size = sizeof(struct ip_tunnel),
1686 .setup = ipgre_tunnel_setup,
1687 .validate = ipgre_tunnel_validate,
1688 .newlink = ipgre_newlink,
1689 .changelink = ipgre_changelink,
1690 .get_size = ipgre_get_size,
1691 .fill_info = ipgre_fill_info,
1692};
1693
Herbert Xue1a80002008-10-09 12:00:17 -07001694static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1695 .kind = "gretap",
1696 .maxtype = IFLA_GRE_MAX,
1697 .policy = ipgre_policy,
1698 .priv_size = sizeof(struct ip_tunnel),
1699 .setup = ipgre_tap_setup,
1700 .validate = ipgre_tap_validate,
1701 .newlink = ipgre_newlink,
1702 .changelink = ipgre_changelink,
1703 .get_size = ipgre_get_size,
1704 .fill_info = ipgre_fill_info,
1705};
1706
Linus Torvalds1da177e2005-04-16 15:20:36 -07001707/*
1708 * And now the modules code and kernel interface.
1709 */
1710
1711static int __init ipgre_init(void)
1712{
1713 int err;
1714
1715 printk(KERN_INFO "GRE over IPv4 tunneling driver\n");
1716
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001717 err = register_pernet_device(&ipgre_net_ops);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001718 if (err < 0)
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001719 return err;
1720
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001721 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001722 if (err < 0) {
1723 printk(KERN_INFO "ipgre init: can't add protocol\n");
1724 goto add_proto_failed;
1725 }
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001726
Herbert Xuc19e6542008-10-09 11:59:55 -07001727 err = rtnl_link_register(&ipgre_link_ops);
1728 if (err < 0)
1729 goto rtnl_link_failed;
1730
Herbert Xue1a80002008-10-09 12:00:17 -07001731 err = rtnl_link_register(&ipgre_tap_ops);
1732 if (err < 0)
1733 goto tap_ops_failed;
1734
Herbert Xuc19e6542008-10-09 11:59:55 -07001735out:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001736 return err;
Herbert Xuc19e6542008-10-09 11:59:55 -07001737
Herbert Xue1a80002008-10-09 12:00:17 -07001738tap_ops_failed:
1739 rtnl_link_unregister(&ipgre_link_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001740rtnl_link_failed:
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001741 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001742add_proto_failed:
1743 unregister_pernet_device(&ipgre_net_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001744 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001745}
1746
Alexey Kuznetsovdb445752005-07-30 17:46:44 -07001747static void __exit ipgre_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001748{
Herbert Xue1a80002008-10-09 12:00:17 -07001749 rtnl_link_unregister(&ipgre_tap_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001750 rtnl_link_unregister(&ipgre_link_ops);
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001751 if (gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO) < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001752 printk(KERN_INFO "ipgre close: can't remove protocol\n");
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001753 unregister_pernet_device(&ipgre_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001754}
1755
1756module_init(ipgre_init);
1757module_exit(ipgre_fini);
1758MODULE_LICENSE("GPL");
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001759MODULE_ALIAS_RTNL_LINK("gre");
1760MODULE_ALIAS_RTNL_LINK("gretap");
Vasiliy Kulikov8909c9a2011-03-02 00:33:13 +03001761MODULE_ALIAS_NETDEV("gre0");