blob: 2b53a1f7abf6bf57509279cff831b7082040e558 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09002 * Linux NET3: GRE over IP protocol decoder.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
4 * Authors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Randy Dunlap4fc268d2006-01-11 12:17:47 -080013#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/module.h>
15#include <linux/types.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <linux/kernel.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090017#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <asm/uaccess.h>
19#include <linux/skbuff.h>
20#include <linux/netdevice.h>
21#include <linux/in.h>
22#include <linux/tcp.h>
23#include <linux/udp.h>
24#include <linux/if_arp.h>
25#include <linux/mroute.h>
26#include <linux/init.h>
27#include <linux/in6.h>
28#include <linux/inetdevice.h>
29#include <linux/igmp.h>
30#include <linux/netfilter_ipv4.h>
Herbert Xue1a80002008-10-09 12:00:17 -070031#include <linux/etherdevice.h>
Kris Katterjohn46f25df2006-01-05 16:35:42 -080032#include <linux/if_ether.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070033
34#include <net/sock.h>
35#include <net/ip.h>
36#include <net/icmp.h>
37#include <net/protocol.h>
38#include <net/ipip.h>
39#include <net/arp.h>
40#include <net/checksum.h>
41#include <net/dsfield.h>
42#include <net/inet_ecn.h>
43#include <net/xfrm.h>
Pavel Emelyanov59a4c752008-04-16 01:08:53 -070044#include <net/net_namespace.h>
45#include <net/netns/generic.h>
Herbert Xuc19e6542008-10-09 11:59:55 -070046#include <net/rtnetlink.h>
Dmitry Kozlov00959ad2010-08-21 23:05:39 -070047#include <net/gre.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Eric Dumazetdfd56b82011-12-10 09:48:31 +000049#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -070050#include <net/ipv6.h>
51#include <net/ip6_fib.h>
52#include <net/ip6_route.h>
53#endif
54
55/*
56 Problems & solutions
57 --------------------
58
59 1. The most important issue is detecting local dead loops.
60 They would cause complete host lockup in transmit, which
61 would be "resolved" by stack overflow or, if queueing is enabled,
62 with infinite looping in net_bh.
63
64 We cannot track such dead loops during route installation,
65 it is infeasible task. The most general solutions would be
66 to keep skb->encapsulation counter (sort of local ttl),
Eric Dumazet6d0722a2010-09-29 23:35:10 -070067 and silently drop packet when it expires. It is a good
Linus Torvalds1da177e2005-04-16 15:20:36 -070068 solution, but it supposes maintaing new variable in ALL
69 skb, even if no tunneling is used.
70
Eric Dumazet6d0722a2010-09-29 23:35:10 -070071 Current solution: xmit_recursion breaks dead loops. This is a percpu
72 counter, since when we enter the first ndo_xmit(), cpu migration is
73 forbidden. We force an exit if this counter reaches RECURSION_LIMIT
Linus Torvalds1da177e2005-04-16 15:20:36 -070074
75 2. Networking dead loops would not kill routers, but would really
76 kill network. IP hop limit plays role of "t->recursion" in this case,
77 if we copy it from packet being encapsulated to upper header.
78 It is very good solution, but it introduces two problems:
79
80 - Routing protocols, using packets with ttl=1 (OSPF, RIP2),
81 do not work over tunnels.
82 - traceroute does not work. I planned to relay ICMP from tunnel,
83 so that this problem would be solved and traceroute output
84 would even more informative. This idea appeared to be wrong:
85 only Linux complies to rfc1812 now (yes, guys, Linux is the only
86 true router now :-)), all routers (at least, in neighbourhood of mine)
87 return only 8 bytes of payload. It is the end.
88
89 Hence, if we want that OSPF worked or traceroute said something reasonable,
90 we should search for another solution.
91
92 One of them is to parse packet trying to detect inner encapsulation
93 made by our node. It is difficult or even impossible, especially,
94 taking into account fragmentation. TO be short, tt is not solution at all.
95
96 Current solution: The solution was UNEXPECTEDLY SIMPLE.
97 We force DF flag on tunnels with preconfigured hop limit,
98 that is ALL. :-) Well, it does not remove the problem completely,
99 but exponential growth of network traffic is changed to linear
100 (branches, that exceed pmtu are pruned) and tunnel mtu
101 fastly degrades to value <68, where looping stops.
102 Yes, it is not good if there exists a router in the loop,
103 which does not force DF, even when encapsulating packets have DF set.
104 But it is not our problem! Nobody could accuse us, we made
105 all that we could make. Even if it is your gated who injected
106 fatal route to network, even if it were you who configured
107 fatal static route: you are innocent. :-)
108
109
110
111 3. Really, ipv4/ipip.c, ipv4/ip_gre.c and ipv6/sit.c contain
112 practically identical code. It would be good to glue them
113 together, but it is not very evident, how to make them modular.
114 sit is integral part of IPv6, ipip and gre are naturally modular.
115 We could extract common parts (hash table, ioctl etc)
116 to a separate module (ip_tunnel.c).
117
118 Alexey Kuznetsov.
119 */
120
Herbert Xuc19e6542008-10-09 11:59:55 -0700121static struct rtnl_link_ops ipgre_link_ops __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122static int ipgre_tunnel_init(struct net_device *dev);
123static void ipgre_tunnel_setup(struct net_device *dev);
Herbert Xu42aa9162008-10-09 11:59:32 -0700124static int ipgre_tunnel_bind_dev(struct net_device *dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125
126/* Fallback tunnel: no source, no destination, no key, no options */
127
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700128#define HASH_SIZE 16
129
Eric Dumazetf99189b2009-11-17 10:42:49 +0000130static int ipgre_net_id __read_mostly;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700131struct ipgre_net {
Eric Dumazet15078502010-09-15 11:07:53 +0000132 struct ip_tunnel __rcu *tunnels[4][HASH_SIZE];
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700133
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700134 struct net_device *fb_tunnel_dev;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -0700135};
136
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137/* Tunnel hash table */
138
139/*
140 4 hash tables:
141
142 3: (remote,local)
143 2: (remote,*)
144 1: (*,local)
145 0: (*,*)
146
147 We require exact key match i.e. if a key is present in packet
148 it will match only tunnel with the same key; if it is not present,
149 it will match only keyless tunnel.
150
151 All keysless packets, if not matched configured keyless tunnels
152 will match fallback tunnel.
153 */
154
Al Virod5a0a1e2006-11-08 00:23:14 -0800155#define HASH(addr) (((__force u32)addr^((__force u32)addr>>4))&0xF)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700157#define tunnels_r_l tunnels[3]
158#define tunnels_r tunnels[2]
159#define tunnels_l tunnels[1]
160#define tunnels_wc tunnels[0]
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000161/*
Eric Dumazet15078502010-09-15 11:07:53 +0000162 * Locking : hash tables are protected by RCU and RTNL
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000163 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000165#define for_each_ip_tunnel_rcu(start) \
166 for (t = rcu_dereference(start); t; t = rcu_dereference(t->next))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167
Eric Dumazete985aad2010-09-27 03:57:11 +0000168/* often modified stats are per cpu, other are shared (netdev->stats) */
169struct pcpu_tstats {
170 unsigned long rx_packets;
171 unsigned long rx_bytes;
172 unsigned long tx_packets;
173 unsigned long tx_bytes;
Eric Dumazet8ce120f2011-11-04 23:19:28 +0000174} __attribute__((aligned(4*sizeof(unsigned long))));
Eric Dumazete985aad2010-09-27 03:57:11 +0000175
176static struct net_device_stats *ipgre_get_stats(struct net_device *dev)
177{
178 struct pcpu_tstats sum = { 0 };
179 int i;
180
181 for_each_possible_cpu(i) {
182 const struct pcpu_tstats *tstats = per_cpu_ptr(dev->tstats, i);
183
184 sum.rx_packets += tstats->rx_packets;
185 sum.rx_bytes += tstats->rx_bytes;
186 sum.tx_packets += tstats->tx_packets;
187 sum.tx_bytes += tstats->tx_bytes;
188 }
189 dev->stats.rx_packets = sum.rx_packets;
190 dev->stats.rx_bytes = sum.rx_bytes;
191 dev->stats.tx_packets = sum.tx_packets;
192 dev->stats.tx_bytes = sum.tx_bytes;
193 return &dev->stats;
194}
195
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196/* Given src, dst and key, find appropriate for input tunnel. */
197
Timo Teras749c10f2009-01-19 17:22:12 -0800198static struct ip_tunnel * ipgre_tunnel_lookup(struct net_device *dev,
Herbert Xue1a80002008-10-09 12:00:17 -0700199 __be32 remote, __be32 local,
200 __be32 key, __be16 gre_proto)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201{
Timo Teras749c10f2009-01-19 17:22:12 -0800202 struct net *net = dev_net(dev);
203 int link = dev->ifindex;
Eric Dumazet15078502010-09-15 11:07:53 +0000204 unsigned int h0 = HASH(remote);
205 unsigned int h1 = HASH(key);
Timo Terasafcf1242009-01-26 20:56:10 -0800206 struct ip_tunnel *t, *cand = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700207 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Herbert Xue1a80002008-10-09 12:00:17 -0700208 int dev_type = (gre_proto == htons(ETH_P_TEB)) ?
209 ARPHRD_ETHER : ARPHRD_IPGRE;
Timo Terasafcf1242009-01-26 20:56:10 -0800210 int score, cand_score = 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000212 for_each_ip_tunnel_rcu(ign->tunnels_r_l[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800213 if (local != t->parms.iph.saddr ||
214 remote != t->parms.iph.daddr ||
215 key != t->parms.i_key ||
216 !(t->dev->flags & IFF_UP))
217 continue;
218
219 if (t->dev->type != ARPHRD_IPGRE &&
220 t->dev->type != dev_type)
221 continue;
222
Timo Terasafcf1242009-01-26 20:56:10 -0800223 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800224 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800225 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800226 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800227 score |= 2;
228 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800229 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800230
231 if (score < cand_score) {
232 cand = t;
233 cand_score = score;
234 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235 }
Herbert Xue1a80002008-10-09 12:00:17 -0700236
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000237 for_each_ip_tunnel_rcu(ign->tunnels_r[h0 ^ h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800238 if (remote != t->parms.iph.daddr ||
239 key != t->parms.i_key ||
240 !(t->dev->flags & IFF_UP))
241 continue;
242
243 if (t->dev->type != ARPHRD_IPGRE &&
244 t->dev->type != dev_type)
245 continue;
246
Timo Terasafcf1242009-01-26 20:56:10 -0800247 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800248 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800249 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800250 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800251 score |= 2;
252 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800253 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800254
255 if (score < cand_score) {
256 cand = t;
257 cand_score = score;
258 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259 }
Herbert Xue1a80002008-10-09 12:00:17 -0700260
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000261 for_each_ip_tunnel_rcu(ign->tunnels_l[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800262 if ((local != t->parms.iph.saddr &&
263 (local != t->parms.iph.daddr ||
264 !ipv4_is_multicast(local))) ||
265 key != t->parms.i_key ||
266 !(t->dev->flags & IFF_UP))
267 continue;
268
269 if (t->dev->type != ARPHRD_IPGRE &&
270 t->dev->type != dev_type)
271 continue;
272
Timo Terasafcf1242009-01-26 20:56:10 -0800273 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800274 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800275 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800276 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800277 score |= 2;
278 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800279 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800280
281 if (score < cand_score) {
282 cand = t;
283 cand_score = score;
284 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 }
Herbert Xue1a80002008-10-09 12:00:17 -0700286
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000287 for_each_ip_tunnel_rcu(ign->tunnels_wc[h1]) {
Timo Teras749c10f2009-01-19 17:22:12 -0800288 if (t->parms.i_key != key ||
289 !(t->dev->flags & IFF_UP))
290 continue;
291
292 if (t->dev->type != ARPHRD_IPGRE &&
293 t->dev->type != dev_type)
294 continue;
295
Timo Terasafcf1242009-01-26 20:56:10 -0800296 score = 0;
Timo Teras749c10f2009-01-19 17:22:12 -0800297 if (t->parms.link != link)
Timo Terasafcf1242009-01-26 20:56:10 -0800298 score |= 1;
Timo Teras749c10f2009-01-19 17:22:12 -0800299 if (t->dev->type != dev_type)
Timo Terasafcf1242009-01-26 20:56:10 -0800300 score |= 2;
301 if (score == 0)
Timo Teras749c10f2009-01-19 17:22:12 -0800302 return t;
Timo Terasafcf1242009-01-26 20:56:10 -0800303
304 if (score < cand_score) {
305 cand = t;
306 cand_score = score;
307 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308 }
309
Timo Terasafcf1242009-01-26 20:56:10 -0800310 if (cand != NULL)
311 return cand;
Herbert Xue1a80002008-10-09 12:00:17 -0700312
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000313 dev = ign->fb_tunnel_dev;
314 if (dev->flags & IFF_UP)
315 return netdev_priv(dev);
Timo Teras749c10f2009-01-19 17:22:12 -0800316
Linus Torvalds1da177e2005-04-16 15:20:36 -0700317 return NULL;
318}
319
Eric Dumazet15078502010-09-15 11:07:53 +0000320static struct ip_tunnel __rcu **__ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700321 struct ip_tunnel_parm *parms)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700322{
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900323 __be32 remote = parms->iph.daddr;
324 __be32 local = parms->iph.saddr;
325 __be32 key = parms->i_key;
Eric Dumazet15078502010-09-15 11:07:53 +0000326 unsigned int h = HASH(key);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700327 int prio = 0;
328
329 if (local)
330 prio |= 1;
Joe Perchesf97c1e02007-12-16 13:45:43 -0800331 if (remote && !ipv4_is_multicast(remote)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700332 prio |= 2;
333 h ^= HASH(remote);
334 }
335
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -0700336 return &ign->tunnels[prio][h];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700337}
338
Eric Dumazet15078502010-09-15 11:07:53 +0000339static inline struct ip_tunnel __rcu **ipgre_bucket(struct ipgre_net *ign,
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700340 struct ip_tunnel *t)
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900341{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700342 return __ipgre_bucket(ign, &t->parms);
YOSHIFUJI Hideaki5056a1e2007-04-24 20:44:48 +0900343}
344
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700345static void ipgre_tunnel_link(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346{
Eric Dumazet15078502010-09-15 11:07:53 +0000347 struct ip_tunnel __rcu **tp = ipgre_bucket(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348
Eric Dumazet15078502010-09-15 11:07:53 +0000349 rcu_assign_pointer(t->next, rtnl_dereference(*tp));
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000350 rcu_assign_pointer(*tp, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351}
352
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700353static void ipgre_tunnel_unlink(struct ipgre_net *ign, struct ip_tunnel *t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700354{
Eric Dumazet15078502010-09-15 11:07:53 +0000355 struct ip_tunnel __rcu **tp;
356 struct ip_tunnel *iter;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357
Eric Dumazet15078502010-09-15 11:07:53 +0000358 for (tp = ipgre_bucket(ign, t);
359 (iter = rtnl_dereference(*tp)) != NULL;
360 tp = &iter->next) {
361 if (t == iter) {
362 rcu_assign_pointer(*tp, t->next);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700363 break;
364 }
365 }
366}
367
Herbert Xue1a80002008-10-09 12:00:17 -0700368static struct ip_tunnel *ipgre_tunnel_find(struct net *net,
369 struct ip_tunnel_parm *parms,
370 int type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371{
Al Virod5a0a1e2006-11-08 00:23:14 -0800372 __be32 remote = parms->iph.daddr;
373 __be32 local = parms->iph.saddr;
374 __be32 key = parms->i_key;
Timo Teras749c10f2009-01-19 17:22:12 -0800375 int link = parms->link;
Eric Dumazet15078502010-09-15 11:07:53 +0000376 struct ip_tunnel *t;
377 struct ip_tunnel __rcu **tp;
Herbert Xue1a80002008-10-09 12:00:17 -0700378 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
379
Eric Dumazet15078502010-09-15 11:07:53 +0000380 for (tp = __ipgre_bucket(ign, parms);
381 (t = rtnl_dereference(*tp)) != NULL;
382 tp = &t->next)
Herbert Xue1a80002008-10-09 12:00:17 -0700383 if (local == t->parms.iph.saddr &&
384 remote == t->parms.iph.daddr &&
385 key == t->parms.i_key &&
Timo Teras749c10f2009-01-19 17:22:12 -0800386 link == t->parms.link &&
Herbert Xue1a80002008-10-09 12:00:17 -0700387 type == t->dev->type)
388 break;
389
390 return t;
391}
392
Eric Dumazet15078502010-09-15 11:07:53 +0000393static struct ip_tunnel *ipgre_tunnel_locate(struct net *net,
Herbert Xue1a80002008-10-09 12:00:17 -0700394 struct ip_tunnel_parm *parms, int create)
395{
396 struct ip_tunnel *t, *nt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700397 struct net_device *dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398 char name[IFNAMSIZ];
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700399 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400
Herbert Xue1a80002008-10-09 12:00:17 -0700401 t = ipgre_tunnel_find(net, parms, ARPHRD_IPGRE);
402 if (t || !create)
403 return t;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404
405 if (parms->name[0])
406 strlcpy(name, parms->name, IFNAMSIZ);
Pavel Emelyanov34cc7ba2008-02-23 20:19:20 -0800407 else
stephen hemminger407d6fc2010-11-29 09:47:47 +0000408 strcpy(name, "gre%d");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409
410 dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup);
411 if (!dev)
stephen hemminger407d6fc2010-11-29 09:47:47 +0000412 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700413
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -0700414 dev_net_set(dev, net);
415
Patrick McHardy2941a482006-01-08 22:05:26 -0800416 nt = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417 nt->parms = *parms;
Herbert Xuc19e6542008-10-09 11:59:55 -0700418 dev->rtnl_link_ops = &ipgre_link_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419
Herbert Xu42aa9162008-10-09 11:59:32 -0700420 dev->mtu = ipgre_tunnel_bind_dev(dev);
421
Pavel Emelyanovb37d4282008-02-26 23:51:04 -0800422 if (register_netdevice(dev) < 0)
423 goto failed_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425 dev_hold(dev);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700426 ipgre_tunnel_link(ign, nt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 return nt;
428
Pavel Emelyanovb37d4282008-02-26 23:51:04 -0800429failed_free:
430 free_netdev(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431 return NULL;
432}
433
434static void ipgre_tunnel_uninit(struct net_device *dev)
435{
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700436 struct net *net = dev_net(dev);
437 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
438
439 ipgre_tunnel_unlink(ign, netdev_priv(dev));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 dev_put(dev);
441}
442
443
444static void ipgre_err(struct sk_buff *skb, u32 info)
445{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700446
Rami Rosen071f92d2008-05-21 17:47:54 -0700447/* All the routers (except for Linux) return only
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448 8 bytes of packet payload. It means, that precise relaying of
449 ICMP in the real Internet is absolutely infeasible.
450
451 Moreover, Cisco "wise men" put GRE key to the third word
452 in GRE header. It makes impossible maintaining even soft state for keyed
453 GRE tunnels with enabled checksum. Tell them "thank you".
454
455 Well, I wonder, rfc1812 was written by Cisco employee,
456 what the hell these idiots break standrads established
457 by themself???
458 */
459
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000460 const struct iphdr *iph = (const struct iphdr *)skb->data;
Al Virod5a0a1e2006-11-08 00:23:14 -0800461 __be16 *p = (__be16*)(skb->data+(iph->ihl<<2));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 int grehlen = (iph->ihl<<2) + 4;
Arnaldo Carvalho de Melo88c76642007-03-13 14:43:18 -0300463 const int type = icmp_hdr(skb)->type;
464 const int code = icmp_hdr(skb)->code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465 struct ip_tunnel *t;
Al Virod5a0a1e2006-11-08 00:23:14 -0800466 __be16 flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467
468 flags = p[0];
469 if (flags&(GRE_CSUM|GRE_KEY|GRE_SEQ|GRE_ROUTING|GRE_VERSION)) {
470 if (flags&(GRE_VERSION|GRE_ROUTING))
471 return;
472 if (flags&GRE_KEY) {
473 grehlen += 4;
474 if (flags&GRE_CSUM)
475 grehlen += 4;
476 }
477 }
478
479 /* If only 8 bytes returned, keyed message will be dropped here */
480 if (skb_headlen(skb) < grehlen)
481 return;
482
483 switch (type) {
484 default:
485 case ICMP_PARAMETERPROB:
486 return;
487
488 case ICMP_DEST_UNREACH:
489 switch (code) {
490 case ICMP_SR_FAILED:
491 case ICMP_PORT_UNREACH:
492 /* Impossible event. */
493 return;
494 case ICMP_FRAG_NEEDED:
495 /* Soft state for pmtu is maintained by IP core. */
496 return;
497 default:
498 /* All others are translated to HOST_UNREACH.
499 rfc2003 contains "deep thoughts" about NET_UNREACH,
500 I believe they are just ether pollution. --ANK
501 */
502 break;
503 }
504 break;
505 case ICMP_TIME_EXCEEDED:
506 if (code != ICMP_EXC_TTL)
507 return;
508 break;
509 }
510
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000511 rcu_read_lock();
Timo Teras749c10f2009-01-19 17:22:12 -0800512 t = ipgre_tunnel_lookup(skb->dev, iph->daddr, iph->saddr,
Herbert Xue1a80002008-10-09 12:00:17 -0700513 flags & GRE_KEY ?
514 *(((__be32 *)p) + (grehlen / 4) - 1) : 0,
515 p[1]);
Joe Perchesf97c1e02007-12-16 13:45:43 -0800516 if (t == NULL || t->parms.iph.daddr == 0 ||
517 ipv4_is_multicast(t->parms.iph.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518 goto out;
519
520 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
521 goto out;
522
Wei Yongjunda6185d82009-02-24 23:34:48 -0800523 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524 t->err_count++;
525 else
526 t->err_count = 1;
527 t->err_time = jiffies;
528out:
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000529 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700530}
531
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000532static inline void ipgre_ecn_decapsulate(const struct iphdr *iph, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700533{
534 if (INET_ECN_is_ce(iph->tos)) {
535 if (skb->protocol == htons(ETH_P_IP)) {
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700536 IP_ECN_set_ce(ip_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537 } else if (skb->protocol == htons(ETH_P_IPV6)) {
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700538 IP6_ECN_set_ce(ipv6_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 }
540 }
541}
542
543static inline u8
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000544ipgre_ecn_encapsulate(u8 tos, const struct iphdr *old_iph, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545{
546 u8 inner = 0;
547 if (skb->protocol == htons(ETH_P_IP))
548 inner = old_iph->tos;
549 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000550 inner = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700551 return INET_ECN_encapsulate(tos, inner);
552}
553
554static int ipgre_rcv(struct sk_buff *skb)
555{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000556 const struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700557 u8 *h;
Al Virod5a0a1e2006-11-08 00:23:14 -0800558 __be16 flags;
Al Virod3bc23e2006-11-14 21:24:49 -0800559 __sum16 csum = 0;
Al Virod5a0a1e2006-11-08 00:23:14 -0800560 __be32 key = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700561 u32 seqno = 0;
562 struct ip_tunnel *tunnel;
563 int offset = 4;
Herbert Xue1a80002008-10-09 12:00:17 -0700564 __be16 gre_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700565
566 if (!pskb_may_pull(skb, 16))
567 goto drop_nolock;
568
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700569 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570 h = skb->data;
Al Virod5a0a1e2006-11-08 00:23:14 -0800571 flags = *(__be16*)h;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700572
573 if (flags&(GRE_CSUM|GRE_KEY|GRE_ROUTING|GRE_SEQ|GRE_VERSION)) {
574 /* - Version must be 0.
575 - We do not support routing headers.
576 */
577 if (flags&(GRE_VERSION|GRE_ROUTING))
578 goto drop_nolock;
579
580 if (flags&GRE_CSUM) {
Herbert Xufb286bb2005-11-10 13:01:24 -0800581 switch (skb->ip_summed) {
Patrick McHardy84fa7932006-08-29 16:44:56 -0700582 case CHECKSUM_COMPLETE:
Al Virod3bc23e2006-11-14 21:24:49 -0800583 csum = csum_fold(skb->csum);
Herbert Xufb286bb2005-11-10 13:01:24 -0800584 if (!csum)
585 break;
586 /* fall through */
587 case CHECKSUM_NONE:
588 skb->csum = 0;
589 csum = __skb_checksum_complete(skb);
Patrick McHardy84fa7932006-08-29 16:44:56 -0700590 skb->ip_summed = CHECKSUM_COMPLETE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591 }
592 offset += 4;
593 }
594 if (flags&GRE_KEY) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800595 key = *(__be32*)(h + offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596 offset += 4;
597 }
598 if (flags&GRE_SEQ) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800599 seqno = ntohl(*(__be32*)(h + offset));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 offset += 4;
601 }
602 }
603
Herbert Xue1a80002008-10-09 12:00:17 -0700604 gre_proto = *(__be16 *)(h + 2);
605
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000606 rcu_read_lock();
Timo Teras749c10f2009-01-19 17:22:12 -0800607 if ((tunnel = ipgre_tunnel_lookup(skb->dev,
Herbert Xue1a80002008-10-09 12:00:17 -0700608 iph->saddr, iph->daddr, key,
609 gre_proto))) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000610 struct pcpu_tstats *tstats;
Pavel Emelyanovaddd68e2008-05-21 14:14:22 -0700611
Linus Torvalds1da177e2005-04-16 15:20:36 -0700612 secpath_reset(skb);
613
Herbert Xue1a80002008-10-09 12:00:17 -0700614 skb->protocol = gre_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700615 /* WCCP version 1 and 2 protocol decoding.
616 * - Change protocol to IP
617 * - When dealing with WCCPv2, Skip extra 4 bytes in GRE header
618 */
Herbert Xue1a80002008-10-09 12:00:17 -0700619 if (flags == 0 && gre_proto == htons(ETH_P_WCCP)) {
YOSHIFUJI Hideaki496c98d2006-10-10 19:41:21 -0700620 skb->protocol = htons(ETH_P_IP);
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +0900621 if ((*(h + offset) & 0xF0) != 0x40)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700622 offset += 4;
623 }
624
Timo Teras1d069162007-12-20 00:10:33 -0800625 skb->mac_header = skb->network_header;
Arnaldo Carvalho de Melo4209fb62007-03-10 18:42:03 -0300626 __pskb_pull(skb, offset);
Arnaldo Carvalho de Melo9c702202007-04-25 18:04:18 -0700627 skb_postpull_rcsum(skb, skb_transport_header(skb), offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628 skb->pkt_type = PACKET_HOST;
629#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -0800630 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631 /* Looped back packet, drop it! */
David S. Millerc7537962010-11-11 17:07:48 -0800632 if (rt_is_output_route(skb_rtable(skb)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633 goto drop;
Eric Dumazete985aad2010-09-27 03:57:11 +0000634 tunnel->dev->stats.multicast++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635 skb->pkt_type = PACKET_BROADCAST;
636 }
637#endif
638
639 if (((flags&GRE_CSUM) && csum) ||
640 (!(flags&GRE_CSUM) && tunnel->parms.i_flags&GRE_CSUM)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000641 tunnel->dev->stats.rx_crc_errors++;
642 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700643 goto drop;
644 }
645 if (tunnel->parms.i_flags&GRE_SEQ) {
646 if (!(flags&GRE_SEQ) ||
647 (tunnel->i_seqno && (s32)(seqno - tunnel->i_seqno) < 0)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000648 tunnel->dev->stats.rx_fifo_errors++;
649 tunnel->dev->stats.rx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 goto drop;
651 }
652 tunnel->i_seqno = seqno + 1;
653 }
Herbert Xue1a80002008-10-09 12:00:17 -0700654
655 /* Warning: All skb pointers will be invalidated! */
656 if (tunnel->dev->type == ARPHRD_ETHER) {
657 if (!pskb_may_pull(skb, ETH_HLEN)) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000658 tunnel->dev->stats.rx_length_errors++;
659 tunnel->dev->stats.rx_errors++;
Herbert Xue1a80002008-10-09 12:00:17 -0700660 goto drop;
661 }
662
663 iph = ip_hdr(skb);
664 skb->protocol = eth_type_trans(skb, tunnel->dev);
665 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
666 }
667
Eric Dumazete985aad2010-09-27 03:57:11 +0000668 tstats = this_cpu_ptr(tunnel->dev->tstats);
669 tstats->rx_packets++;
670 tstats->rx_bytes += skb->len;
671
672 __skb_tunnel_rx(skb, tunnel->dev);
Herbert Xue1a80002008-10-09 12:00:17 -0700673
674 skb_reset_network_header(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 ipgre_ecn_decapsulate(iph, skb);
Herbert Xue1a80002008-10-09 12:00:17 -0700676
Eric Dumazetcaf586e2010-09-30 21:06:55 +0000677 netif_rx(skb);
Eric Dumazet8990f462010-09-20 00:12:11 +0000678
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000679 rcu_read_unlock();
Eric Dumazet8990f462010-09-20 00:12:11 +0000680 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700681 }
Herbert Xu45af08b2006-04-05 22:31:19 -0700682 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700683
684drop:
Eric Dumazet8d5b2c02009-10-23 06:14:38 +0000685 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700686drop_nolock:
687 kfree_skb(skb);
Eric Dumazeta02cec22010-09-22 20:43:57 +0000688 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689}
690
Stephen Hemminger6fef4c02009-08-31 19:50:41 +0000691static netdev_tx_t ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692{
Patrick McHardy2941a482006-01-08 22:05:26 -0800693 struct ip_tunnel *tunnel = netdev_priv(dev);
Eric Dumazete985aad2010-09-27 03:57:11 +0000694 struct pcpu_tstats *tstats;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000695 const struct iphdr *old_iph = ip_hdr(skb);
696 const struct iphdr *tiph;
David S. Millercbb1e852011-05-04 12:33:34 -0700697 struct flowi4 fl4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700698 u8 tos;
Al Virod5a0a1e2006-11-08 00:23:14 -0800699 __be16 df;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700700 struct rtable *rt; /* Route to the other host */
Eric Dumazet15078502010-09-15 11:07:53 +0000701 struct net_device *tdev; /* Device to other host */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700702 struct iphdr *iph; /* Our new IP header */
Chuck Leverc2636b42007-10-23 21:07:32 -0700703 unsigned int max_headroom; /* The extra header space needed */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700704 int gre_hlen;
Al Virod5a0a1e2006-11-08 00:23:14 -0800705 __be32 dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700706 int mtu;
707
Herbert Xue1a80002008-10-09 12:00:17 -0700708 if (dev->type == ARPHRD_ETHER)
709 IPCB(skb)->flags = 0;
710
711 if (dev->header_ops && dev->type == ARPHRD_IPGRE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700712 gre_hlen = 0;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000713 tiph = (const struct iphdr *)skb->data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 } else {
715 gre_hlen = tunnel->hlen;
716 tiph = &tunnel->parms.iph;
717 }
718
719 if ((dst = tiph->daddr) == 0) {
720 /* NBMA tunnel */
721
Eric Dumazetadf30902009-06-02 05:19:30 +0000722 if (skb_dst(skb) == NULL) {
Eric Dumazete985aad2010-09-27 03:57:11 +0000723 dev->stats.tx_fifo_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 goto tx_error;
725 }
726
727 if (skb->protocol == htons(ETH_P_IP)) {
Eric Dumazet511c3f92009-06-02 05:14:27 +0000728 rt = skb_rtable(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700729 if ((dst = rt->rt_gateway) == 0)
730 goto tx_error_icmp;
731 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000732#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700733 else if (skb->protocol == htons(ETH_P_IPV6)) {
David Miller27217452011-12-02 16:52:08 +0000734 struct neighbour *neigh = dst_get_neighbour_noref(skb_dst(skb));
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000735 const struct in6_addr *addr6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736 int addr_type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737
738 if (neigh == NULL)
739 goto tx_error;
740
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000741 addr6 = (const struct in6_addr *)&neigh->primary_key;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742 addr_type = ipv6_addr_type(addr6);
743
744 if (addr_type == IPV6_ADDR_ANY) {
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700745 addr6 = &ipv6_hdr(skb)->daddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700746 addr_type = ipv6_addr_type(addr6);
747 }
748
749 if ((addr_type & IPV6_ADDR_COMPATv4) == 0)
750 goto tx_error_icmp;
751
752 dst = addr6->s6_addr32[3];
753 }
754#endif
755 else
756 goto tx_error;
757 }
758
759 tos = tiph->tos;
Andreas Jaggiee686ca2009-07-14 09:35:59 -0700760 if (tos == 1) {
761 tos = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700762 if (skb->protocol == htons(ETH_P_IP))
763 tos = old_iph->tos;
Stephen Hemmingerdd4ba832010-07-08 21:35:58 -0700764 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000765 tos = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700766 }
767
David S. Millercbb1e852011-05-04 12:33:34 -0700768 rt = ip_route_output_gre(dev_net(dev), &fl4, dst, tiph->saddr,
David S. Miller78fbfd82011-03-12 00:00:52 -0500769 tunnel->parms.o_key, RT_TOS(tos),
770 tunnel->parms.link);
771 if (IS_ERR(rt)) {
772 dev->stats.tx_carrier_errors++;
773 goto tx_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700774 }
Changli Gaod8d1f302010-06-10 23:31:35 -0700775 tdev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700776
777 if (tdev == dev) {
778 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000779 dev->stats.collisions++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780 goto tx_error;
781 }
782
783 df = tiph->frag_off;
784 if (df)
Changli Gaod8d1f302010-06-10 23:31:35 -0700785 mtu = dst_mtu(&rt->dst) - dev->hard_header_len - tunnel->hlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700786 else
Eric Dumazetadf30902009-06-02 05:19:30 +0000787 mtu = skb_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700788
Eric Dumazetadf30902009-06-02 05:19:30 +0000789 if (skb_dst(skb))
790 skb_dst(skb)->ops->update_pmtu(skb_dst(skb), mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700791
792 if (skb->protocol == htons(ETH_P_IP)) {
793 df |= (old_iph->frag_off&htons(IP_DF));
794
795 if ((old_iph->frag_off&htons(IP_DF)) &&
796 mtu < ntohs(old_iph->tot_len)) {
797 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, htonl(mtu));
798 ip_rt_put(rt);
799 goto tx_error;
800 }
801 }
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000802#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700803 else if (skb->protocol == htons(ETH_P_IPV6)) {
Eric Dumazetadf30902009-06-02 05:19:30 +0000804 struct rt6_info *rt6 = (struct rt6_info *)skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700805
Eric Dumazetadf30902009-06-02 05:19:30 +0000806 if (rt6 && mtu < dst_mtu(skb_dst(skb)) && mtu >= IPV6_MIN_MTU) {
Joe Perchesf97c1e02007-12-16 13:45:43 -0800807 if ((tunnel->parms.iph.daddr &&
808 !ipv4_is_multicast(tunnel->parms.iph.daddr)) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700809 rt6->rt6i_dst.plen == 128) {
810 rt6->rt6i_flags |= RTF_MODIFIED;
David S. Millerdefb3512010-12-08 21:16:57 -0800811 dst_metric_set(skb_dst(skb), RTAX_MTU, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700812 }
813 }
814
815 if (mtu >= IPV6_MIN_MTU && mtu < skb->len - tunnel->hlen + gre_hlen) {
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000816 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700817 ip_rt_put(rt);
818 goto tx_error;
819 }
820 }
821#endif
822
823 if (tunnel->err_count > 0) {
Wei Yongjunda6185d82009-02-24 23:34:48 -0800824 if (time_before(jiffies,
825 tunnel->err_time + IPTUNNEL_ERR_TIMEO)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826 tunnel->err_count--;
827
828 dst_link_failure(skb);
829 } else
830 tunnel->err_count = 0;
831 }
832
Changli Gaod8d1f302010-06-10 23:31:35 -0700833 max_headroom = LL_RESERVED_SPACE(tdev) + gre_hlen + rt->dst.header_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700834
Patrick McHardycfbba492007-07-09 15:33:40 -0700835 if (skb_headroom(skb) < max_headroom || skb_shared(skb)||
836 (skb_cloned(skb) && !skb_clone_writable(skb, 0))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700837 struct sk_buff *new_skb = skb_realloc_headroom(skb, max_headroom);
Herbert Xu805dc1d2011-11-18 02:20:06 +0000838 if (max_headroom > dev->needed_headroom)
839 dev->needed_headroom = max_headroom;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700840 if (!new_skb) {
841 ip_rt_put(rt);
Eric Dumazete985aad2010-09-27 03:57:11 +0000842 dev->stats.tx_dropped++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700843 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000844 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700845 }
846 if (skb->sk)
847 skb_set_owner_w(new_skb, skb->sk);
848 dev_kfree_skb(skb);
849 skb = new_skb;
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700850 old_iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700851 }
852
Herbert Xu64194c32008-10-09 12:03:17 -0700853 skb_reset_transport_header(skb);
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700854 skb_push(skb, gre_hlen);
855 skb_reset_network_header(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700856 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
Patrick McHardy48d5cad2006-02-15 15:10:22 -0800857 IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
858 IPSKB_REROUTED);
Eric Dumazetadf30902009-06-02 05:19:30 +0000859 skb_dst_drop(skb);
Changli Gaod8d1f302010-06-10 23:31:35 -0700860 skb_dst_set(skb, &rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700861
862 /*
863 * Push down and install the IPIP header.
864 */
865
Arnaldo Carvalho de Meloeddc9ec2007-04-20 22:47:35 -0700866 iph = ip_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700867 iph->version = 4;
868 iph->ihl = sizeof(struct iphdr) >> 2;
869 iph->frag_off = df;
870 iph->protocol = IPPROTO_GRE;
871 iph->tos = ipgre_ecn_encapsulate(tos, old_iph, skb);
David S. Millercbb1e852011-05-04 12:33:34 -0700872 iph->daddr = fl4.daddr;
873 iph->saddr = fl4.saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700874
875 if ((iph->ttl = tiph->ttl) == 0) {
876 if (skb->protocol == htons(ETH_P_IP))
877 iph->ttl = old_iph->ttl;
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000878#if IS_ENABLED(CONFIG_IPV6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700879 else if (skb->protocol == htons(ETH_P_IPV6))
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000880 iph->ttl = ((const struct ipv6hdr *)old_iph)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700881#endif
882 else
David S. Miller323e1262010-12-12 21:55:08 -0800883 iph->ttl = ip4_dst_hoplimit(&rt->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700884 }
885
Herbert Xue1a80002008-10-09 12:00:17 -0700886 ((__be16 *)(iph + 1))[0] = tunnel->parms.o_flags;
887 ((__be16 *)(iph + 1))[1] = (dev->type == ARPHRD_ETHER) ?
888 htons(ETH_P_TEB) : skb->protocol;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700889
890 if (tunnel->parms.o_flags&(GRE_KEY|GRE_CSUM|GRE_SEQ)) {
Al Virod5a0a1e2006-11-08 00:23:14 -0800891 __be32 *ptr = (__be32*)(((u8*)iph) + tunnel->hlen - 4);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700892
893 if (tunnel->parms.o_flags&GRE_SEQ) {
894 ++tunnel->o_seqno;
895 *ptr = htonl(tunnel->o_seqno);
896 ptr--;
897 }
898 if (tunnel->parms.o_flags&GRE_KEY) {
899 *ptr = tunnel->parms.o_key;
900 ptr--;
901 }
902 if (tunnel->parms.o_flags&GRE_CSUM) {
903 *ptr = 0;
Al Viro5f92a732006-11-14 21:36:54 -0800904 *(__sum16*)ptr = ip_compute_csum((void*)(iph+1), skb->len - sizeof(struct iphdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700905 }
906 }
907
908 nf_reset(skb);
Eric Dumazete985aad2010-09-27 03:57:11 +0000909 tstats = this_cpu_ptr(dev->tstats);
910 __IPTUNNEL_XMIT(tstats, &dev->stats);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000911 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700912
913tx_error_icmp:
914 dst_link_failure(skb);
915
916tx_error:
Eric Dumazete985aad2010-09-27 03:57:11 +0000917 dev->stats.tx_errors++;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700918 dev_kfree_skb(skb);
Patrick McHardy6ed10652009-06-23 06:03:08 +0000919 return NETDEV_TX_OK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700920}
921
Herbert Xu42aa9162008-10-09 11:59:32 -0700922static int ipgre_tunnel_bind_dev(struct net_device *dev)
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800923{
924 struct net_device *tdev = NULL;
925 struct ip_tunnel *tunnel;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000926 const struct iphdr *iph;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800927 int hlen = LL_MAX_HEADER;
928 int mtu = ETH_DATA_LEN;
929 int addend = sizeof(struct iphdr) + 4;
930
931 tunnel = netdev_priv(dev);
932 iph = &tunnel->parms.iph;
933
Herbert Xuc95b8192008-10-09 11:58:54 -0700934 /* Guess output device to choose reasonable mtu and needed_headroom */
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800935
936 if (iph->daddr) {
David S. Millercbb1e852011-05-04 12:33:34 -0700937 struct flowi4 fl4;
938 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +0000939
David S. Millercbb1e852011-05-04 12:33:34 -0700940 rt = ip_route_output_gre(dev_net(dev), &fl4,
941 iph->daddr, iph->saddr,
942 tunnel->parms.o_key,
943 RT_TOS(iph->tos),
944 tunnel->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -0800945 if (!IS_ERR(rt)) {
Changli Gaod8d1f302010-06-10 23:31:35 -0700946 tdev = rt->dst.dev;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800947 ip_rt_put(rt);
948 }
Herbert Xue1a80002008-10-09 12:00:17 -0700949
950 if (dev->type != ARPHRD_ETHER)
951 dev->flags |= IFF_POINTOPOINT;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800952 }
953
954 if (!tdev && tunnel->parms.link)
Pavel Emelyanov96635522008-04-16 01:10:44 -0700955 tdev = __dev_get_by_index(dev_net(dev), tunnel->parms.link);
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800956
957 if (tdev) {
Herbert Xuc95b8192008-10-09 11:58:54 -0700958 hlen = tdev->hard_header_len + tdev->needed_headroom;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800959 mtu = tdev->mtu;
960 }
961 dev->iflink = tunnel->parms.link;
962
963 /* Precalculate GRE options length */
964 if (tunnel->parms.o_flags&(GRE_CSUM|GRE_KEY|GRE_SEQ)) {
965 if (tunnel->parms.o_flags&GRE_CSUM)
966 addend += 4;
967 if (tunnel->parms.o_flags&GRE_KEY)
968 addend += 4;
969 if (tunnel->parms.o_flags&GRE_SEQ)
970 addend += 4;
971 }
Herbert Xuc95b8192008-10-09 11:58:54 -0700972 dev->needed_headroom = addend + hlen;
Tom Goff8cdb0452009-08-14 16:33:56 -0700973 mtu -= dev->hard_header_len + addend;
Herbert Xu42aa9162008-10-09 11:59:32 -0700974
975 if (mtu < 68)
976 mtu = 68;
977
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800978 tunnel->hlen = addend;
979
Herbert Xu42aa9162008-10-09 11:59:32 -0700980 return mtu;
Michal Schmidtee34c1e2007-12-13 09:46:32 -0800981}
982
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983static int
984ipgre_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
985{
986 int err = 0;
987 struct ip_tunnel_parm p;
988 struct ip_tunnel *t;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -0700989 struct net *net = dev_net(dev);
990 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700991
992 switch (cmd) {
993 case SIOCGETTUNNEL:
994 t = NULL;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -0700995 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700996 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) {
997 err = -EFAULT;
998 break;
999 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001000 t = ipgre_tunnel_locate(net, &p, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001001 }
1002 if (t == NULL)
Patrick McHardy2941a482006-01-08 22:05:26 -08001003 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001004 memcpy(&p, &t->parms, sizeof(p));
1005 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
1006 err = -EFAULT;
1007 break;
1008
1009 case SIOCADDTUNNEL:
1010 case SIOCCHGTUNNEL:
1011 err = -EPERM;
1012 if (!capable(CAP_NET_ADMIN))
1013 goto done;
1014
1015 err = -EFAULT;
1016 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1017 goto done;
1018
1019 err = -EINVAL;
1020 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
1021 p.iph.ihl != 5 || (p.iph.frag_off&htons(~IP_DF)) ||
1022 ((p.i_flags|p.o_flags)&(GRE_VERSION|GRE_ROUTING)))
1023 goto done;
1024 if (p.iph.ttl)
1025 p.iph.frag_off |= htons(IP_DF);
1026
1027 if (!(p.i_flags&GRE_KEY))
1028 p.i_key = 0;
1029 if (!(p.o_flags&GRE_KEY))
1030 p.o_key = 0;
1031
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001032 t = ipgre_tunnel_locate(net, &p, cmd == SIOCADDTUNNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001033
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001034 if (dev != ign->fb_tunnel_dev && cmd == SIOCCHGTUNNEL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001035 if (t != NULL) {
1036 if (t->dev != dev) {
1037 err = -EEXIST;
1038 break;
1039 }
1040 } else {
Eric Dumazet15078502010-09-15 11:07:53 +00001041 unsigned int nflags = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001042
Patrick McHardy2941a482006-01-08 22:05:26 -08001043 t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001044
Joe Perchesf97c1e02007-12-16 13:45:43 -08001045 if (ipv4_is_multicast(p.iph.daddr))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001046 nflags = IFF_BROADCAST;
1047 else if (p.iph.daddr)
1048 nflags = IFF_POINTOPOINT;
1049
1050 if ((dev->flags^nflags)&(IFF_POINTOPOINT|IFF_BROADCAST)) {
1051 err = -EINVAL;
1052 break;
1053 }
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001054 ipgre_tunnel_unlink(ign, t);
Pavel Emelyanov74b0b852010-10-27 05:43:53 +00001055 synchronize_net();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001056 t->parms.iph.saddr = p.iph.saddr;
1057 t->parms.iph.daddr = p.iph.daddr;
1058 t->parms.i_key = p.i_key;
1059 t->parms.o_key = p.o_key;
1060 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1061 memcpy(dev->broadcast, &p.iph.daddr, 4);
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001062 ipgre_tunnel_link(ign, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001063 netdev_state_change(dev);
1064 }
1065 }
1066
1067 if (t) {
1068 err = 0;
1069 if (cmd == SIOCCHGTUNNEL) {
1070 t->parms.iph.ttl = p.iph.ttl;
1071 t->parms.iph.tos = p.iph.tos;
1072 t->parms.iph.frag_off = p.iph.frag_off;
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001073 if (t->parms.link != p.link) {
1074 t->parms.link = p.link;
Herbert Xu42aa9162008-10-09 11:59:32 -07001075 dev->mtu = ipgre_tunnel_bind_dev(dev);
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001076 netdev_state_change(dev);
1077 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001078 }
1079 if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
1080 err = -EFAULT;
1081 } else
1082 err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT);
1083 break;
1084
1085 case SIOCDELTUNNEL:
1086 err = -EPERM;
1087 if (!capable(CAP_NET_ADMIN))
1088 goto done;
1089
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001090 if (dev == ign->fb_tunnel_dev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001091 err = -EFAULT;
1092 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1093 goto done;
1094 err = -ENOENT;
Pavel Emelyanovf57e7d52008-04-16 01:09:22 -07001095 if ((t = ipgre_tunnel_locate(net, &p, 0)) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001096 goto done;
1097 err = -EPERM;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001098 if (t == netdev_priv(ign->fb_tunnel_dev))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001099 goto done;
1100 dev = t->dev;
1101 }
Stephen Hemminger22f8cde2007-02-07 00:09:58 -08001102 unregister_netdevice(dev);
1103 err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001104 break;
1105
1106 default:
1107 err = -EINVAL;
1108 }
1109
1110done:
1111 return err;
1112}
1113
Linus Torvalds1da177e2005-04-16 15:20:36 -07001114static int ipgre_tunnel_change_mtu(struct net_device *dev, int new_mtu)
1115{
Patrick McHardy2941a482006-01-08 22:05:26 -08001116 struct ip_tunnel *tunnel = netdev_priv(dev);
Herbert Xuc95b8192008-10-09 11:58:54 -07001117 if (new_mtu < 68 ||
1118 new_mtu > 0xFFF8 - dev->hard_header_len - tunnel->hlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001119 return -EINVAL;
1120 dev->mtu = new_mtu;
1121 return 0;
1122}
1123
Linus Torvalds1da177e2005-04-16 15:20:36 -07001124/* Nice toy. Unfortunately, useless in real life :-)
1125 It allows to construct virtual multiprotocol broadcast "LAN"
1126 over the Internet, provided multicast routing is tuned.
1127
1128
1129 I have no idea was this bicycle invented before me,
1130 so that I had to set ARPHRD_IPGRE to a random value.
1131 I have an impression, that Cisco could make something similar,
1132 but this feature is apparently missing in IOS<=11.2(8).
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001133
Linus Torvalds1da177e2005-04-16 15:20:36 -07001134 I set up 10.66.66/24 and fec0:6666:6666::0/96 as virtual networks
1135 with broadcast 224.66.66.66. If you have access to mbone, play with me :-)
1136
1137 ping -t 255 224.66.66.66
1138
1139 If nobody answers, mbone does not work.
1140
1141 ip tunnel add Universe mode gre remote 224.66.66.66 local <Your_real_addr> ttl 255
1142 ip addr add 10.66.66.<somewhat>/24 dev Universe
1143 ifconfig Universe up
1144 ifconfig Universe add fe80::<Your_real_addr>/10
1145 ifconfig Universe add fec0:6666:6666::<Your_real_addr>/96
1146 ftp 10.66.66.66
1147 ...
1148 ftp fec0:6666:6666::193.233.7.65
1149 ...
1150
1151 */
1152
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001153static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
1154 unsigned short type,
Eric Dumazet15078502010-09-15 11:07:53 +00001155 const void *daddr, const void *saddr, unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001156{
Patrick McHardy2941a482006-01-08 22:05:26 -08001157 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001158 struct iphdr *iph = (struct iphdr *)skb_push(skb, t->hlen);
Al Virod5a0a1e2006-11-08 00:23:14 -08001159 __be16 *p = (__be16*)(iph+1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001160
1161 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
1162 p[0] = t->parms.o_flags;
1163 p[1] = htons(type);
1164
1165 /*
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001166 * Set the source hardware address.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001167 */
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001168
Linus Torvalds1da177e2005-04-16 15:20:36 -07001169 if (saddr)
1170 memcpy(&iph->saddr, saddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001171 if (daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001172 memcpy(&iph->daddr, daddr, 4);
Timo Teräs6d55cb92010-03-03 04:01:13 +00001173 if (iph->daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001174 return t->hlen;
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001175
Linus Torvalds1da177e2005-04-16 15:20:36 -07001176 return -t->hlen;
1177}
1178
Timo Teras6a5f44d2007-10-23 20:31:53 -07001179static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
1180{
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001181 const struct iphdr *iph = (const struct iphdr *) skb_mac_header(skb);
Timo Teras6a5f44d2007-10-23 20:31:53 -07001182 memcpy(haddr, &iph->saddr, 4);
1183 return 4;
1184}
1185
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001186static const struct header_ops ipgre_header_ops = {
1187 .create = ipgre_header,
Timo Teras6a5f44d2007-10-23 20:31:53 -07001188 .parse = ipgre_header_parse,
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001189};
1190
Timo Teras6a5f44d2007-10-23 20:31:53 -07001191#ifdef CONFIG_NET_IPGRE_BROADCAST
Linus Torvalds1da177e2005-04-16 15:20:36 -07001192static int ipgre_open(struct net_device *dev)
1193{
Patrick McHardy2941a482006-01-08 22:05:26 -08001194 struct ip_tunnel *t = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001195
Joe Perchesf97c1e02007-12-16 13:45:43 -08001196 if (ipv4_is_multicast(t->parms.iph.daddr)) {
David S. Millercbb1e852011-05-04 12:33:34 -07001197 struct flowi4 fl4;
1198 struct rtable *rt;
Eric Dumazete985aad2010-09-27 03:57:11 +00001199
David S. Millercbb1e852011-05-04 12:33:34 -07001200 rt = ip_route_output_gre(dev_net(dev), &fl4,
1201 t->parms.iph.daddr,
1202 t->parms.iph.saddr,
1203 t->parms.o_key,
1204 RT_TOS(t->parms.iph.tos),
1205 t->parms.link);
David S. Millerb23dd4f2011-03-02 14:31:35 -08001206 if (IS_ERR(rt))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001207 return -EADDRNOTAVAIL;
Changli Gaod8d1f302010-06-10 23:31:35 -07001208 dev = rt->dst.dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001209 ip_rt_put(rt);
Herbert Xue5ed6392005-10-03 14:35:55 -07001210 if (__in_dev_get_rtnl(dev) == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001211 return -EADDRNOTAVAIL;
1212 t->mlink = dev->ifindex;
Herbert Xue5ed6392005-10-03 14:35:55 -07001213 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001214 }
1215 return 0;
1216}
1217
1218static int ipgre_close(struct net_device *dev)
1219{
Patrick McHardy2941a482006-01-08 22:05:26 -08001220 struct ip_tunnel *t = netdev_priv(dev);
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001221
Joe Perchesf97c1e02007-12-16 13:45:43 -08001222 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
Denis V. Lunev7fee0ca2008-01-21 17:32:38 -08001223 struct in_device *in_dev;
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +09001224 in_dev = inetdev_by_index(dev_net(dev), t->mlink);
Eric Dumazet8723e1b2010-10-19 00:39:26 +00001225 if (in_dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001226 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001227 }
1228 return 0;
1229}
1230
1231#endif
1232
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001233static const struct net_device_ops ipgre_netdev_ops = {
1234 .ndo_init = ipgre_tunnel_init,
1235 .ndo_uninit = ipgre_tunnel_uninit,
1236#ifdef CONFIG_NET_IPGRE_BROADCAST
1237 .ndo_open = ipgre_open,
1238 .ndo_stop = ipgre_close,
1239#endif
1240 .ndo_start_xmit = ipgre_tunnel_xmit,
1241 .ndo_do_ioctl = ipgre_tunnel_ioctl,
1242 .ndo_change_mtu = ipgre_tunnel_change_mtu,
Eric Dumazete985aad2010-09-27 03:57:11 +00001243 .ndo_get_stats = ipgre_get_stats,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001244};
1245
Eric Dumazete985aad2010-09-27 03:57:11 +00001246static void ipgre_dev_free(struct net_device *dev)
1247{
1248 free_percpu(dev->tstats);
1249 free_netdev(dev);
1250}
1251
Linus Torvalds1da177e2005-04-16 15:20:36 -07001252static void ipgre_tunnel_setup(struct net_device *dev)
1253{
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001254 dev->netdev_ops = &ipgre_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001255 dev->destructor = ipgre_dev_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001256
1257 dev->type = ARPHRD_IPGRE;
Herbert Xuc95b8192008-10-09 11:58:54 -07001258 dev->needed_headroom = LL_MAX_HEADER + sizeof(struct iphdr) + 4;
Kris Katterjohn46f25df2006-01-05 16:35:42 -08001259 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001260 dev->flags = IFF_NOARP;
1261 dev->iflink = 0;
1262 dev->addr_len = 4;
Pavel Emelyanov0b67ece2008-04-16 01:11:13 -07001263 dev->features |= NETIF_F_NETNS_LOCAL;
Eric Dumazet108bfa82009-05-28 22:35:10 +00001264 dev->priv_flags &= ~IFF_XMIT_DST_RELEASE;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001265}
1266
1267static int ipgre_tunnel_init(struct net_device *dev)
1268{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001269 struct ip_tunnel *tunnel;
1270 struct iphdr *iph;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001271
Patrick McHardy2941a482006-01-08 22:05:26 -08001272 tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001273 iph = &tunnel->parms.iph;
1274
1275 tunnel->dev = dev;
1276 strcpy(tunnel->parms.name, dev->name);
1277
1278 memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
1279 memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
1280
Linus Torvalds1da177e2005-04-16 15:20:36 -07001281 if (iph->daddr) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001282#ifdef CONFIG_NET_IPGRE_BROADCAST
Joe Perchesf97c1e02007-12-16 13:45:43 -08001283 if (ipv4_is_multicast(iph->daddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001284 if (!iph->saddr)
1285 return -EINVAL;
1286 dev->flags = IFF_BROADCAST;
Stephen Hemminger3b04ddd2007-10-09 01:40:57 -07001287 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001288 }
1289#endif
Michal Schmidtee34c1e2007-12-13 09:46:32 -08001290 } else
Timo Teras6a5f44d2007-10-23 20:31:53 -07001291 dev->header_ops = &ipgre_header_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001292
Eric Dumazete985aad2010-09-27 03:57:11 +00001293 dev->tstats = alloc_percpu(struct pcpu_tstats);
1294 if (!dev->tstats)
1295 return -ENOMEM;
1296
Linus Torvalds1da177e2005-04-16 15:20:36 -07001297 return 0;
1298}
1299
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001300static void ipgre_fb_tunnel_init(struct net_device *dev)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001301{
Patrick McHardy2941a482006-01-08 22:05:26 -08001302 struct ip_tunnel *tunnel = netdev_priv(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001303 struct iphdr *iph = &tunnel->parms.iph;
1304
1305 tunnel->dev = dev;
1306 strcpy(tunnel->parms.name, dev->name);
1307
1308 iph->version = 4;
1309 iph->protocol = IPPROTO_GRE;
1310 iph->ihl = 5;
1311 tunnel->hlen = sizeof(struct iphdr) + 4;
1312
1313 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001314}
1315
1316
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001317static const struct gre_protocol ipgre_protocol = {
1318 .handler = ipgre_rcv,
1319 .err_handler = ipgre_err,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001320};
1321
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001322static void ipgre_destroy_tunnels(struct ipgre_net *ign, struct list_head *head)
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001323{
1324 int prio;
1325
1326 for (prio = 0; prio < 4; prio++) {
1327 int h;
1328 for (h = 0; h < HASH_SIZE; h++) {
Eric Dumazet15078502010-09-15 11:07:53 +00001329 struct ip_tunnel *t;
1330
1331 t = rtnl_dereference(ign->tunnels[prio][h]);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001332
1333 while (t != NULL) {
1334 unregister_netdevice_queue(t->dev, head);
Eric Dumazet15078502010-09-15 11:07:53 +00001335 t = rtnl_dereference(t->next);
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001336 }
Pavel Emelyanoveb8ce742008-04-16 01:10:26 -07001337 }
1338 }
1339}
1340
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001341static int __net_init ipgre_init_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001342{
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001343 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001344 int err;
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001345
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001346 ign->fb_tunnel_dev = alloc_netdev(sizeof(struct ip_tunnel), "gre0",
1347 ipgre_tunnel_setup);
1348 if (!ign->fb_tunnel_dev) {
1349 err = -ENOMEM;
1350 goto err_alloc_dev;
1351 }
Alexey Dobriyanbe77e592008-11-23 17:26:26 -08001352 dev_net_set(ign->fb_tunnel_dev, net);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001353
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001354 ipgre_fb_tunnel_init(ign->fb_tunnel_dev);
Herbert Xuc19e6542008-10-09 11:59:55 -07001355 ign->fb_tunnel_dev->rtnl_link_ops = &ipgre_link_ops;
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001356
1357 if ((err = register_netdev(ign->fb_tunnel_dev)))
1358 goto err_reg_dev;
1359
Eric Dumazet3285ee32010-10-30 16:21:28 -07001360 rcu_assign_pointer(ign->tunnels_wc[0],
1361 netdev_priv(ign->fb_tunnel_dev));
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001362 return 0;
1363
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001364err_reg_dev:
Eric Dumazet3285ee32010-10-30 16:21:28 -07001365 ipgre_dev_free(ign->fb_tunnel_dev);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001366err_alloc_dev:
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001367 return err;
1368}
1369
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001370static void __net_exit ipgre_exit_net(struct net *net)
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001371{
1372 struct ipgre_net *ign;
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001373 LIST_HEAD(list);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001374
1375 ign = net_generic(net, ipgre_net_id);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001376 rtnl_lock();
Eric Dumazeteef6dd62009-10-27 07:07:16 +00001377 ipgre_destroy_tunnels(ign, &list);
1378 unregister_netdevice_many(&list);
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001379 rtnl_unlock();
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001380}
1381
1382static struct pernet_operations ipgre_net_ops = {
1383 .init = ipgre_init_net,
1384 .exit = ipgre_exit_net,
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001385 .id = &ipgre_net_id,
1386 .size = sizeof(struct ipgre_net),
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001387};
Linus Torvalds1da177e2005-04-16 15:20:36 -07001388
Herbert Xuc19e6542008-10-09 11:59:55 -07001389static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[])
1390{
1391 __be16 flags;
1392
1393 if (!data)
1394 return 0;
1395
1396 flags = 0;
1397 if (data[IFLA_GRE_IFLAGS])
1398 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1399 if (data[IFLA_GRE_OFLAGS])
1400 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1401 if (flags & (GRE_VERSION|GRE_ROUTING))
1402 return -EINVAL;
1403
1404 return 0;
1405}
1406
Herbert Xue1a80002008-10-09 12:00:17 -07001407static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[])
1408{
1409 __be32 daddr;
1410
1411 if (tb[IFLA_ADDRESS]) {
1412 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1413 return -EINVAL;
1414 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1415 return -EADDRNOTAVAIL;
1416 }
1417
1418 if (!data)
1419 goto out;
1420
1421 if (data[IFLA_GRE_REMOTE]) {
1422 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1423 if (!daddr)
1424 return -EINVAL;
1425 }
1426
1427out:
1428 return ipgre_tunnel_validate(tb, data);
1429}
1430
Herbert Xuc19e6542008-10-09 11:59:55 -07001431static void ipgre_netlink_parms(struct nlattr *data[],
1432 struct ip_tunnel_parm *parms)
1433{
Herbert Xu7bb82d92008-10-11 12:20:15 -07001434 memset(parms, 0, sizeof(*parms));
Herbert Xuc19e6542008-10-09 11:59:55 -07001435
1436 parms->iph.protocol = IPPROTO_GRE;
1437
1438 if (!data)
1439 return;
1440
1441 if (data[IFLA_GRE_LINK])
1442 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1443
1444 if (data[IFLA_GRE_IFLAGS])
1445 parms->i_flags = nla_get_be16(data[IFLA_GRE_IFLAGS]);
1446
1447 if (data[IFLA_GRE_OFLAGS])
1448 parms->o_flags = nla_get_be16(data[IFLA_GRE_OFLAGS]);
1449
1450 if (data[IFLA_GRE_IKEY])
1451 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1452
1453 if (data[IFLA_GRE_OKEY])
1454 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1455
1456 if (data[IFLA_GRE_LOCAL])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001457 parms->iph.saddr = nla_get_be32(data[IFLA_GRE_LOCAL]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001458
1459 if (data[IFLA_GRE_REMOTE])
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001460 parms->iph.daddr = nla_get_be32(data[IFLA_GRE_REMOTE]);
Herbert Xuc19e6542008-10-09 11:59:55 -07001461
1462 if (data[IFLA_GRE_TTL])
1463 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1464
1465 if (data[IFLA_GRE_TOS])
1466 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1467
1468 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC]))
1469 parms->iph.frag_off = htons(IP_DF);
1470}
1471
Herbert Xue1a80002008-10-09 12:00:17 -07001472static int ipgre_tap_init(struct net_device *dev)
1473{
1474 struct ip_tunnel *tunnel;
1475
1476 tunnel = netdev_priv(dev);
1477
1478 tunnel->dev = dev;
1479 strcpy(tunnel->parms.name, dev->name);
1480
1481 ipgre_tunnel_bind_dev(dev);
1482
Eric Dumazete985aad2010-09-27 03:57:11 +00001483 dev->tstats = alloc_percpu(struct pcpu_tstats);
1484 if (!dev->tstats)
1485 return -ENOMEM;
1486
Herbert Xue1a80002008-10-09 12:00:17 -07001487 return 0;
1488}
1489
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001490static const struct net_device_ops ipgre_tap_netdev_ops = {
1491 .ndo_init = ipgre_tap_init,
1492 .ndo_uninit = ipgre_tunnel_uninit,
1493 .ndo_start_xmit = ipgre_tunnel_xmit,
1494 .ndo_set_mac_address = eth_mac_addr,
1495 .ndo_validate_addr = eth_validate_addr,
1496 .ndo_change_mtu = ipgre_tunnel_change_mtu,
Eric Dumazete985aad2010-09-27 03:57:11 +00001497 .ndo_get_stats = ipgre_get_stats,
Stephen Hemmingerb8c26a32008-11-20 20:34:29 -08001498};
1499
Herbert Xue1a80002008-10-09 12:00:17 -07001500static void ipgre_tap_setup(struct net_device *dev)
1501{
1502
1503 ether_setup(dev);
1504
Herbert Xu2e9526b2009-10-30 05:51:48 +00001505 dev->netdev_ops = &ipgre_tap_netdev_ops;
Eric Dumazete985aad2010-09-27 03:57:11 +00001506 dev->destructor = ipgre_dev_free;
Herbert Xue1a80002008-10-09 12:00:17 -07001507
1508 dev->iflink = 0;
1509 dev->features |= NETIF_F_NETNS_LOCAL;
1510}
1511
Eric W. Biederman81adee42009-11-08 00:53:51 -08001512static int ipgre_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[],
Herbert Xuc19e6542008-10-09 11:59:55 -07001513 struct nlattr *data[])
1514{
1515 struct ip_tunnel *nt;
1516 struct net *net = dev_net(dev);
1517 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1518 int mtu;
1519 int err;
1520
1521 nt = netdev_priv(dev);
1522 ipgre_netlink_parms(data, &nt->parms);
1523
Herbert Xue1a80002008-10-09 12:00:17 -07001524 if (ipgre_tunnel_find(net, &nt->parms, dev->type))
Herbert Xuc19e6542008-10-09 11:59:55 -07001525 return -EEXIST;
1526
Herbert Xue1a80002008-10-09 12:00:17 -07001527 if (dev->type == ARPHRD_ETHER && !tb[IFLA_ADDRESS])
1528 random_ether_addr(dev->dev_addr);
1529
Herbert Xuc19e6542008-10-09 11:59:55 -07001530 mtu = ipgre_tunnel_bind_dev(dev);
1531 if (!tb[IFLA_MTU])
1532 dev->mtu = mtu;
1533
Eric Dumazetb790e012010-09-27 23:05:47 +00001534 /* Can use a lockless transmit, unless we generate output sequences */
1535 if (!(nt->parms.o_flags & GRE_SEQ))
1536 dev->features |= NETIF_F_LLTX;
1537
Herbert Xuc19e6542008-10-09 11:59:55 -07001538 err = register_netdevice(dev);
1539 if (err)
1540 goto out;
1541
1542 dev_hold(dev);
1543 ipgre_tunnel_link(ign, nt);
1544
1545out:
1546 return err;
1547}
1548
1549static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1550 struct nlattr *data[])
1551{
1552 struct ip_tunnel *t, *nt;
1553 struct net *net = dev_net(dev);
1554 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1555 struct ip_tunnel_parm p;
1556 int mtu;
1557
1558 if (dev == ign->fb_tunnel_dev)
1559 return -EINVAL;
1560
1561 nt = netdev_priv(dev);
1562 ipgre_netlink_parms(data, &p);
1563
1564 t = ipgre_tunnel_locate(net, &p, 0);
1565
1566 if (t) {
1567 if (t->dev != dev)
1568 return -EEXIST;
1569 } else {
Herbert Xuc19e6542008-10-09 11:59:55 -07001570 t = nt;
1571
Herbert Xu2e9526b2009-10-30 05:51:48 +00001572 if (dev->type != ARPHRD_ETHER) {
Eric Dumazet15078502010-09-15 11:07:53 +00001573 unsigned int nflags = 0;
Herbert Xuc19e6542008-10-09 11:59:55 -07001574
Herbert Xu2e9526b2009-10-30 05:51:48 +00001575 if (ipv4_is_multicast(p.iph.daddr))
1576 nflags = IFF_BROADCAST;
1577 else if (p.iph.daddr)
1578 nflags = IFF_POINTOPOINT;
1579
1580 if ((dev->flags ^ nflags) &
1581 (IFF_POINTOPOINT | IFF_BROADCAST))
1582 return -EINVAL;
1583 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001584
1585 ipgre_tunnel_unlink(ign, t);
1586 t->parms.iph.saddr = p.iph.saddr;
1587 t->parms.iph.daddr = p.iph.daddr;
1588 t->parms.i_key = p.i_key;
Herbert Xu2e9526b2009-10-30 05:51:48 +00001589 if (dev->type != ARPHRD_ETHER) {
1590 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1591 memcpy(dev->broadcast, &p.iph.daddr, 4);
1592 }
Herbert Xuc19e6542008-10-09 11:59:55 -07001593 ipgre_tunnel_link(ign, t);
1594 netdev_state_change(dev);
1595 }
1596
1597 t->parms.o_key = p.o_key;
1598 t->parms.iph.ttl = p.iph.ttl;
1599 t->parms.iph.tos = p.iph.tos;
1600 t->parms.iph.frag_off = p.iph.frag_off;
1601
1602 if (t->parms.link != p.link) {
1603 t->parms.link = p.link;
1604 mtu = ipgre_tunnel_bind_dev(dev);
1605 if (!tb[IFLA_MTU])
1606 dev->mtu = mtu;
1607 netdev_state_change(dev);
1608 }
1609
1610 return 0;
1611}
1612
1613static size_t ipgre_get_size(const struct net_device *dev)
1614{
1615 return
1616 /* IFLA_GRE_LINK */
1617 nla_total_size(4) +
1618 /* IFLA_GRE_IFLAGS */
1619 nla_total_size(2) +
1620 /* IFLA_GRE_OFLAGS */
1621 nla_total_size(2) +
1622 /* IFLA_GRE_IKEY */
1623 nla_total_size(4) +
1624 /* IFLA_GRE_OKEY */
1625 nla_total_size(4) +
1626 /* IFLA_GRE_LOCAL */
1627 nla_total_size(4) +
1628 /* IFLA_GRE_REMOTE */
1629 nla_total_size(4) +
1630 /* IFLA_GRE_TTL */
1631 nla_total_size(1) +
1632 /* IFLA_GRE_TOS */
1633 nla_total_size(1) +
1634 /* IFLA_GRE_PMTUDISC */
1635 nla_total_size(1) +
1636 0;
1637}
1638
1639static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1640{
1641 struct ip_tunnel *t = netdev_priv(dev);
1642 struct ip_tunnel_parm *p = &t->parms;
1643
1644 NLA_PUT_U32(skb, IFLA_GRE_LINK, p->link);
1645 NLA_PUT_BE16(skb, IFLA_GRE_IFLAGS, p->i_flags);
1646 NLA_PUT_BE16(skb, IFLA_GRE_OFLAGS, p->o_flags);
Patrick McHardyba9e64b2008-10-10 12:10:30 -07001647 NLA_PUT_BE32(skb, IFLA_GRE_IKEY, p->i_key);
1648 NLA_PUT_BE32(skb, IFLA_GRE_OKEY, p->o_key);
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001649 NLA_PUT_BE32(skb, IFLA_GRE_LOCAL, p->iph.saddr);
1650 NLA_PUT_BE32(skb, IFLA_GRE_REMOTE, p->iph.daddr);
Herbert Xuc19e6542008-10-09 11:59:55 -07001651 NLA_PUT_U8(skb, IFLA_GRE_TTL, p->iph.ttl);
1652 NLA_PUT_U8(skb, IFLA_GRE_TOS, p->iph.tos);
1653 NLA_PUT_U8(skb, IFLA_GRE_PMTUDISC, !!(p->iph.frag_off & htons(IP_DF)));
1654
1655 return 0;
1656
1657nla_put_failure:
1658 return -EMSGSIZE;
1659}
1660
1661static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1662 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1663 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1664 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1665 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1666 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001667 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1668 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
Herbert Xuc19e6542008-10-09 11:59:55 -07001669 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1670 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1671 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1672};
1673
1674static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1675 .kind = "gre",
1676 .maxtype = IFLA_GRE_MAX,
1677 .policy = ipgre_policy,
1678 .priv_size = sizeof(struct ip_tunnel),
1679 .setup = ipgre_tunnel_setup,
1680 .validate = ipgre_tunnel_validate,
1681 .newlink = ipgre_newlink,
1682 .changelink = ipgre_changelink,
1683 .get_size = ipgre_get_size,
1684 .fill_info = ipgre_fill_info,
1685};
1686
Herbert Xue1a80002008-10-09 12:00:17 -07001687static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1688 .kind = "gretap",
1689 .maxtype = IFLA_GRE_MAX,
1690 .policy = ipgre_policy,
1691 .priv_size = sizeof(struct ip_tunnel),
1692 .setup = ipgre_tap_setup,
1693 .validate = ipgre_tap_validate,
1694 .newlink = ipgre_newlink,
1695 .changelink = ipgre_changelink,
1696 .get_size = ipgre_get_size,
1697 .fill_info = ipgre_fill_info,
1698};
1699
Linus Torvalds1da177e2005-04-16 15:20:36 -07001700/*
1701 * And now the modules code and kernel interface.
1702 */
1703
1704static int __init ipgre_init(void)
1705{
1706 int err;
1707
1708 printk(KERN_INFO "GRE over IPv4 tunneling driver\n");
1709
Eric W. Biedermancfb8fbf2009-11-29 15:46:13 +00001710 err = register_pernet_device(&ipgre_net_ops);
Pavel Emelyanov59a4c752008-04-16 01:08:53 -07001711 if (err < 0)
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001712 return err;
1713
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001714 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001715 if (err < 0) {
1716 printk(KERN_INFO "ipgre init: can't add protocol\n");
1717 goto add_proto_failed;
1718 }
Pavel Emelyanov7daa0002008-04-16 01:10:05 -07001719
Herbert Xuc19e6542008-10-09 11:59:55 -07001720 err = rtnl_link_register(&ipgre_link_ops);
1721 if (err < 0)
1722 goto rtnl_link_failed;
1723
Herbert Xue1a80002008-10-09 12:00:17 -07001724 err = rtnl_link_register(&ipgre_tap_ops);
1725 if (err < 0)
1726 goto tap_ops_failed;
1727
Herbert Xuc19e6542008-10-09 11:59:55 -07001728out:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001729 return err;
Herbert Xuc19e6542008-10-09 11:59:55 -07001730
Herbert Xue1a80002008-10-09 12:00:17 -07001731tap_ops_failed:
1732 rtnl_link_unregister(&ipgre_link_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001733rtnl_link_failed:
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001734 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001735add_proto_failed:
1736 unregister_pernet_device(&ipgre_net_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001737 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001738}
1739
Alexey Kuznetsovdb445752005-07-30 17:46:44 -07001740static void __exit ipgre_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001741{
Herbert Xue1a80002008-10-09 12:00:17 -07001742 rtnl_link_unregister(&ipgre_tap_ops);
Herbert Xuc19e6542008-10-09 11:59:55 -07001743 rtnl_link_unregister(&ipgre_link_ops);
Dmitry Kozlov00959ad2010-08-21 23:05:39 -07001744 if (gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO) < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001745 printk(KERN_INFO "ipgre close: can't remove protocol\n");
Alexey Dobriyanc2892f02010-02-16 07:57:44 +00001746 unregister_pernet_device(&ipgre_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001747}
1748
1749module_init(ipgre_init);
1750module_exit(ipgre_fini);
1751MODULE_LICENSE("GPL");
Patrick McHardy4d74f8b2008-10-10 12:11:06 -07001752MODULE_ALIAS_RTNL_LINK("gre");
1753MODULE_ALIAS_RTNL_LINK("gretap");
Vasiliy Kulikov8909c9a2011-03-02 00:33:13 +03001754MODULE_ALIAS_NETDEV("gre0");