This source file includes following definitions.
- ipgre_err
- gre_err
- erspan_rcv
- __ipgre_rcv
- ipgre_rcv
- gre_rcv
- __gre_xmit
- gre_handle_offloads
- gre_fb_xmit
- erspan_fb_xmit
- gre_fill_metadata_dst
- ipgre_xmit
- erspan_xmit
- gre_tap_xmit
- ipgre_link_update
- ipgre_tunnel_ioctl
- ipgre_header
- ipgre_header_parse
- ipgre_open
- ipgre_close
- ipgre_tunnel_setup
- __gre_tunnel_init
- ipgre_tunnel_init
- ipgre_init_net
- ipgre_exit_batch_net
- ipgre_tunnel_validate
- ipgre_tap_validate
- erspan_validate
- ipgre_netlink_parms
- erspan_netlink_parms
- ipgre_netlink_encap_parms
- gre_tap_init
- erspan_tunnel_init
- ipgre_tap_setup
- ipgre_newlink_encap_setup
- ipgre_newlink
- erspan_newlink
- ipgre_changelink
- erspan_changelink
- ipgre_get_size
- ipgre_fill_info
- erspan_setup
- gretap_fb_dev_create
- ipgre_tap_init_net
- ipgre_tap_exit_batch_net
- erspan_init_net
- erspan_exit_batch_net
- ipgre_init
- ipgre_fini
1
2
3
4
5
6
7
8 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
9
10 #include <linux/capability.h>
11 #include <linux/module.h>
12 #include <linux/types.h>
13 #include <linux/kernel.h>
14 #include <linux/slab.h>
15 #include <linux/uaccess.h>
16 #include <linux/skbuff.h>
17 #include <linux/netdevice.h>
18 #include <linux/in.h>
19 #include <linux/tcp.h>
20 #include <linux/udp.h>
21 #include <linux/if_arp.h>
22 #include <linux/if_vlan.h>
23 #include <linux/init.h>
24 #include <linux/in6.h>
25 #include <linux/inetdevice.h>
26 #include <linux/igmp.h>
27 #include <linux/netfilter_ipv4.h>
28 #include <linux/etherdevice.h>
29 #include <linux/if_ether.h>
30
31 #include <net/sock.h>
32 #include <net/ip.h>
33 #include <net/icmp.h>
34 #include <net/protocol.h>
35 #include <net/ip_tunnels.h>
36 #include <net/arp.h>
37 #include <net/checksum.h>
38 #include <net/dsfield.h>
39 #include <net/inet_ecn.h>
40 #include <net/xfrm.h>
41 #include <net/net_namespace.h>
42 #include <net/netns/generic.h>
43 #include <net/rtnetlink.h>
44 #include <net/gre.h>
45 #include <net/dst_metadata.h>
46 #include <net/erspan.h>
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105 static bool log_ecn_error = true;
106 module_param(log_ecn_error, bool, 0644);
107 MODULE_PARM_DESC(log_ecn_error, "Log packets received with corrupted ECN");
108
109 static struct rtnl_link_ops ipgre_link_ops __read_mostly;
110 static int ipgre_tunnel_init(struct net_device *dev);
111 static void erspan_build_header(struct sk_buff *skb,
112 u32 id, u32 index,
113 bool truncate, bool is_ipv4);
114
115 static unsigned int ipgre_net_id __read_mostly;
116 static unsigned int gre_tap_net_id __read_mostly;
117 static unsigned int erspan_net_id __read_mostly;
118
119 static int ipgre_err(struct sk_buff *skb, u32 info,
120 const struct tnl_ptk_info *tpi)
121 {
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136 struct net *net = dev_net(skb->dev);
137 struct ip_tunnel_net *itn;
138 const struct iphdr *iph;
139 const int type = icmp_hdr(skb)->type;
140 const int code = icmp_hdr(skb)->code;
141 unsigned int data_len = 0;
142 struct ip_tunnel *t;
143
144 if (tpi->proto == htons(ETH_P_TEB))
145 itn = net_generic(net, gre_tap_net_id);
146 else if (tpi->proto == htons(ETH_P_ERSPAN) ||
147 tpi->proto == htons(ETH_P_ERSPAN2))
148 itn = net_generic(net, erspan_net_id);
149 else
150 itn = net_generic(net, ipgre_net_id);
151
152 iph = (const struct iphdr *)(icmp_hdr(skb) + 1);
153 t = ip_tunnel_lookup(itn, skb->dev->ifindex, tpi->flags,
154 iph->daddr, iph->saddr, tpi->key);
155
156 if (!t)
157 return -ENOENT;
158
159 switch (type) {
160 default:
161 case ICMP_PARAMETERPROB:
162 return 0;
163
164 case ICMP_DEST_UNREACH:
165 switch (code) {
166 case ICMP_SR_FAILED:
167 case ICMP_PORT_UNREACH:
168
169 return 0;
170 default:
171
172
173
174
175 break;
176 }
177 break;
178
179 case ICMP_TIME_EXCEEDED:
180 if (code != ICMP_EXC_TTL)
181 return 0;
182 data_len = icmp_hdr(skb)->un.reserved[1] * 4;
183 break;
184
185 case ICMP_REDIRECT:
186 break;
187 }
188
189 #if IS_ENABLED(CONFIG_IPV6)
190 if (tpi->proto == htons(ETH_P_IPV6) &&
191 !ip6_err_gen_icmpv6_unreach(skb, iph->ihl * 4 + tpi->hdr_len,
192 type, data_len))
193 return 0;
194 #endif
195
196 if (t->parms.iph.daddr == 0 ||
197 ipv4_is_multicast(t->parms.iph.daddr))
198 return 0;
199
200 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
201 return 0;
202
203 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
204 t->err_count++;
205 else
206 t->err_count = 1;
207 t->err_time = jiffies;
208
209 return 0;
210 }
211
212 static void gre_err(struct sk_buff *skb, u32 info)
213 {
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228 const struct iphdr *iph = (struct iphdr *)skb->data;
229 const int type = icmp_hdr(skb)->type;
230 const int code = icmp_hdr(skb)->code;
231 struct tnl_ptk_info tpi;
232
233 if (gre_parse_header(skb, &tpi, NULL, htons(ETH_P_IP),
234 iph->ihl * 4) < 0)
235 return;
236
237 if (type == ICMP_DEST_UNREACH && code == ICMP_FRAG_NEEDED) {
238 ipv4_update_pmtu(skb, dev_net(skb->dev), info,
239 skb->dev->ifindex, IPPROTO_GRE);
240 return;
241 }
242 if (type == ICMP_REDIRECT) {
243 ipv4_redirect(skb, dev_net(skb->dev), skb->dev->ifindex,
244 IPPROTO_GRE);
245 return;
246 }
247
248 ipgre_err(skb, info, &tpi);
249 }
250
251 static int erspan_rcv(struct sk_buff *skb, struct tnl_ptk_info *tpi,
252 int gre_hdr_len)
253 {
254 struct net *net = dev_net(skb->dev);
255 struct metadata_dst *tun_dst = NULL;
256 struct erspan_base_hdr *ershdr;
257 struct ip_tunnel_net *itn;
258 struct ip_tunnel *tunnel;
259 const struct iphdr *iph;
260 struct erspan_md2 *md2;
261 int ver;
262 int len;
263
264 itn = net_generic(net, erspan_net_id);
265
266 iph = ip_hdr(skb);
267 ershdr = (struct erspan_base_hdr *)(skb->data + gre_hdr_len);
268 ver = ershdr->ver;
269
270 tunnel = ip_tunnel_lookup(itn, skb->dev->ifindex,
271 tpi->flags | TUNNEL_KEY,
272 iph->saddr, iph->daddr, tpi->key);
273
274 if (tunnel) {
275 len = gre_hdr_len + erspan_hdr_len(ver);
276 if (unlikely(!pskb_may_pull(skb, len)))
277 return PACKET_REJECT;
278
279 if (__iptunnel_pull_header(skb,
280 len,
281 htons(ETH_P_TEB),
282 false, false) < 0)
283 goto drop;
284
285 if (tunnel->collect_md) {
286 struct erspan_metadata *pkt_md, *md;
287 struct ip_tunnel_info *info;
288 unsigned char *gh;
289 __be64 tun_id;
290 __be16 flags;
291
292 tpi->flags |= TUNNEL_KEY;
293 flags = tpi->flags;
294 tun_id = key32_to_tunnel_id(tpi->key);
295
296 tun_dst = ip_tun_rx_dst(skb, flags,
297 tun_id, sizeof(*md));
298 if (!tun_dst)
299 return PACKET_REJECT;
300
301
302
303
304
305 gh = skb_network_header(skb) +
306 skb_network_header_len(skb);
307 pkt_md = (struct erspan_metadata *)(gh + gre_hdr_len +
308 sizeof(*ershdr));
309 md = ip_tunnel_info_opts(&tun_dst->u.tun_info);
310 md->version = ver;
311 md2 = &md->u.md2;
312 memcpy(md2, pkt_md, ver == 1 ? ERSPAN_V1_MDSIZE :
313 ERSPAN_V2_MDSIZE);
314
315 info = &tun_dst->u.tun_info;
316 info->key.tun_flags |= TUNNEL_ERSPAN_OPT;
317 info->options_len = sizeof(*md);
318 }
319
320 skb_reset_mac_header(skb);
321 ip_tunnel_rcv(tunnel, skb, tpi, tun_dst, log_ecn_error);
322 return PACKET_RCVD;
323 }
324 return PACKET_REJECT;
325
326 drop:
327 kfree_skb(skb);
328 return PACKET_RCVD;
329 }
330
331 static int __ipgre_rcv(struct sk_buff *skb, const struct tnl_ptk_info *tpi,
332 struct ip_tunnel_net *itn, int hdr_len, bool raw_proto)
333 {
334 struct metadata_dst *tun_dst = NULL;
335 const struct iphdr *iph;
336 struct ip_tunnel *tunnel;
337
338 iph = ip_hdr(skb);
339 tunnel = ip_tunnel_lookup(itn, skb->dev->ifindex, tpi->flags,
340 iph->saddr, iph->daddr, tpi->key);
341
342 if (tunnel) {
343 if (__iptunnel_pull_header(skb, hdr_len, tpi->proto,
344 raw_proto, false) < 0)
345 goto drop;
346
347 if (tunnel->dev->type != ARPHRD_NONE)
348 skb_pop_mac_header(skb);
349 else
350 skb_reset_mac_header(skb);
351 if (tunnel->collect_md) {
352 __be16 flags;
353 __be64 tun_id;
354
355 flags = tpi->flags & (TUNNEL_CSUM | TUNNEL_KEY);
356 tun_id = key32_to_tunnel_id(tpi->key);
357 tun_dst = ip_tun_rx_dst(skb, flags, tun_id, 0);
358 if (!tun_dst)
359 return PACKET_REJECT;
360 }
361
362 ip_tunnel_rcv(tunnel, skb, tpi, tun_dst, log_ecn_error);
363 return PACKET_RCVD;
364 }
365 return PACKET_NEXT;
366
367 drop:
368 kfree_skb(skb);
369 return PACKET_RCVD;
370 }
371
372 static int ipgre_rcv(struct sk_buff *skb, const struct tnl_ptk_info *tpi,
373 int hdr_len)
374 {
375 struct net *net = dev_net(skb->dev);
376 struct ip_tunnel_net *itn;
377 int res;
378
379 if (tpi->proto == htons(ETH_P_TEB))
380 itn = net_generic(net, gre_tap_net_id);
381 else
382 itn = net_generic(net, ipgre_net_id);
383
384 res = __ipgre_rcv(skb, tpi, itn, hdr_len, false);
385 if (res == PACKET_NEXT && tpi->proto == htons(ETH_P_TEB)) {
386
387
388
389 itn = net_generic(net, ipgre_net_id);
390 res = __ipgre_rcv(skb, tpi, itn, hdr_len, true);
391 }
392 return res;
393 }
394
395 static int gre_rcv(struct sk_buff *skb)
396 {
397 struct tnl_ptk_info tpi;
398 bool csum_err = false;
399 int hdr_len;
400
401 #ifdef CONFIG_NET_IPGRE_BROADCAST
402 if (ipv4_is_multicast(ip_hdr(skb)->daddr)) {
403
404 if (rt_is_output_route(skb_rtable(skb)))
405 goto drop;
406 }
407 #endif
408
409 hdr_len = gre_parse_header(skb, &tpi, &csum_err, htons(ETH_P_IP), 0);
410 if (hdr_len < 0)
411 goto drop;
412
413 if (unlikely(tpi.proto == htons(ETH_P_ERSPAN) ||
414 tpi.proto == htons(ETH_P_ERSPAN2))) {
415 if (erspan_rcv(skb, &tpi, hdr_len) == PACKET_RCVD)
416 return 0;
417 goto out;
418 }
419
420 if (ipgre_rcv(skb, &tpi, hdr_len) == PACKET_RCVD)
421 return 0;
422
423 out:
424 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
425 drop:
426 kfree_skb(skb);
427 return 0;
428 }
429
430 static void __gre_xmit(struct sk_buff *skb, struct net_device *dev,
431 const struct iphdr *tnl_params,
432 __be16 proto)
433 {
434 struct ip_tunnel *tunnel = netdev_priv(dev);
435
436 if (tunnel->parms.o_flags & TUNNEL_SEQ)
437 tunnel->o_seqno++;
438
439
440 gre_build_header(skb, tunnel->tun_hlen,
441 tunnel->parms.o_flags, proto, tunnel->parms.o_key,
442 htonl(tunnel->o_seqno));
443
444 ip_tunnel_xmit(skb, dev, tnl_params, tnl_params->protocol);
445 }
446
447 static int gre_handle_offloads(struct sk_buff *skb, bool csum)
448 {
449 return iptunnel_handle_offloads(skb, csum ? SKB_GSO_GRE_CSUM : SKB_GSO_GRE);
450 }
451
452 static void gre_fb_xmit(struct sk_buff *skb, struct net_device *dev,
453 __be16 proto)
454 {
455 struct ip_tunnel *tunnel = netdev_priv(dev);
456 struct ip_tunnel_info *tun_info;
457 const struct ip_tunnel_key *key;
458 int tunnel_hlen;
459 __be16 flags;
460
461 tun_info = skb_tunnel_info(skb);
462 if (unlikely(!tun_info || !(tun_info->mode & IP_TUNNEL_INFO_TX) ||
463 ip_tunnel_info_af(tun_info) != AF_INET))
464 goto err_free_skb;
465
466 key = &tun_info->key;
467 tunnel_hlen = gre_calc_hlen(key->tun_flags);
468
469 if (skb_cow_head(skb, dev->needed_headroom))
470 goto err_free_skb;
471
472
473 if (gre_handle_offloads(skb, !!(tun_info->key.tun_flags & TUNNEL_CSUM)))
474 goto err_free_skb;
475
476 flags = tun_info->key.tun_flags &
477 (TUNNEL_CSUM | TUNNEL_KEY | TUNNEL_SEQ);
478 gre_build_header(skb, tunnel_hlen, flags, proto,
479 tunnel_id_to_key32(tun_info->key.tun_id),
480 (flags & TUNNEL_SEQ) ? htonl(tunnel->o_seqno++) : 0);
481
482 ip_md_tunnel_xmit(skb, dev, IPPROTO_GRE, tunnel_hlen);
483
484 return;
485
486 err_free_skb:
487 kfree_skb(skb);
488 dev->stats.tx_dropped++;
489 }
490
491 static void erspan_fb_xmit(struct sk_buff *skb, struct net_device *dev)
492 {
493 struct ip_tunnel *tunnel = netdev_priv(dev);
494 struct ip_tunnel_info *tun_info;
495 const struct ip_tunnel_key *key;
496 struct erspan_metadata *md;
497 bool truncate = false;
498 __be16 proto;
499 int tunnel_hlen;
500 int version;
501 int nhoff;
502 int thoff;
503
504 tun_info = skb_tunnel_info(skb);
505 if (unlikely(!tun_info || !(tun_info->mode & IP_TUNNEL_INFO_TX) ||
506 ip_tunnel_info_af(tun_info) != AF_INET))
507 goto err_free_skb;
508
509 key = &tun_info->key;
510 if (!(tun_info->key.tun_flags & TUNNEL_ERSPAN_OPT))
511 goto err_free_skb;
512 if (tun_info->options_len < sizeof(*md))
513 goto err_free_skb;
514 md = ip_tunnel_info_opts(tun_info);
515
516
517 version = md->version;
518 tunnel_hlen = 8 + erspan_hdr_len(version);
519
520 if (skb_cow_head(skb, dev->needed_headroom))
521 goto err_free_skb;
522
523 if (gre_handle_offloads(skb, false))
524 goto err_free_skb;
525
526 if (skb->len > dev->mtu + dev->hard_header_len) {
527 pskb_trim(skb, dev->mtu + dev->hard_header_len);
528 truncate = true;
529 }
530
531 nhoff = skb_network_header(skb) - skb_mac_header(skb);
532 if (skb->protocol == htons(ETH_P_IP) &&
533 (ntohs(ip_hdr(skb)->tot_len) > skb->len - nhoff))
534 truncate = true;
535
536 thoff = skb_transport_header(skb) - skb_mac_header(skb);
537 if (skb->protocol == htons(ETH_P_IPV6) &&
538 (ntohs(ipv6_hdr(skb)->payload_len) > skb->len - thoff))
539 truncate = true;
540
541 if (version == 1) {
542 erspan_build_header(skb, ntohl(tunnel_id_to_key32(key->tun_id)),
543 ntohl(md->u.index), truncate, true);
544 proto = htons(ETH_P_ERSPAN);
545 } else if (version == 2) {
546 erspan_build_header_v2(skb,
547 ntohl(tunnel_id_to_key32(key->tun_id)),
548 md->u.md2.dir,
549 get_hwid(&md->u.md2),
550 truncate, true);
551 proto = htons(ETH_P_ERSPAN2);
552 } else {
553 goto err_free_skb;
554 }
555
556 gre_build_header(skb, 8, TUNNEL_SEQ,
557 proto, 0, htonl(tunnel->o_seqno++));
558
559 ip_md_tunnel_xmit(skb, dev, IPPROTO_GRE, tunnel_hlen);
560
561 return;
562
563 err_free_skb:
564 kfree_skb(skb);
565 dev->stats.tx_dropped++;
566 }
567
568 static int gre_fill_metadata_dst(struct net_device *dev, struct sk_buff *skb)
569 {
570 struct ip_tunnel_info *info = skb_tunnel_info(skb);
571 const struct ip_tunnel_key *key;
572 struct rtable *rt;
573 struct flowi4 fl4;
574
575 if (ip_tunnel_info_af(info) != AF_INET)
576 return -EINVAL;
577
578 key = &info->key;
579 ip_tunnel_init_flow(&fl4, IPPROTO_GRE, key->u.ipv4.dst, key->u.ipv4.src,
580 tunnel_id_to_key32(key->tun_id), key->tos, 0,
581 skb->mark, skb_get_hash(skb));
582 rt = ip_route_output_key(dev_net(dev), &fl4);
583 if (IS_ERR(rt))
584 return PTR_ERR(rt);
585
586 ip_rt_put(rt);
587 info->key.u.ipv4.src = fl4.saddr;
588 return 0;
589 }
590
591 static netdev_tx_t ipgre_xmit(struct sk_buff *skb,
592 struct net_device *dev)
593 {
594 struct ip_tunnel *tunnel = netdev_priv(dev);
595 const struct iphdr *tnl_params;
596
597 if (!pskb_inet_may_pull(skb))
598 goto free_skb;
599
600 if (tunnel->collect_md) {
601 gre_fb_xmit(skb, dev, skb->protocol);
602 return NETDEV_TX_OK;
603 }
604
605 if (dev->header_ops) {
606
607 if (skb_cow_head(skb, dev->needed_headroom -
608 (tunnel->hlen + sizeof(struct iphdr))))
609 goto free_skb;
610
611 tnl_params = (const struct iphdr *)skb->data;
612
613
614
615
616 skb_pull(skb, tunnel->hlen + sizeof(struct iphdr));
617 skb_reset_mac_header(skb);
618 } else {
619 if (skb_cow_head(skb, dev->needed_headroom))
620 goto free_skb;
621
622 tnl_params = &tunnel->parms.iph;
623 }
624
625 if (gre_handle_offloads(skb, !!(tunnel->parms.o_flags & TUNNEL_CSUM)))
626 goto free_skb;
627
628 __gre_xmit(skb, dev, tnl_params, skb->protocol);
629 return NETDEV_TX_OK;
630
631 free_skb:
632 kfree_skb(skb);
633 dev->stats.tx_dropped++;
634 return NETDEV_TX_OK;
635 }
636
637 static netdev_tx_t erspan_xmit(struct sk_buff *skb,
638 struct net_device *dev)
639 {
640 struct ip_tunnel *tunnel = netdev_priv(dev);
641 bool truncate = false;
642 __be16 proto;
643
644 if (!pskb_inet_may_pull(skb))
645 goto free_skb;
646
647 if (tunnel->collect_md) {
648 erspan_fb_xmit(skb, dev);
649 return NETDEV_TX_OK;
650 }
651
652 if (gre_handle_offloads(skb, false))
653 goto free_skb;
654
655 if (skb_cow_head(skb, dev->needed_headroom))
656 goto free_skb;
657
658 if (skb->len > dev->mtu + dev->hard_header_len) {
659 pskb_trim(skb, dev->mtu + dev->hard_header_len);
660 truncate = true;
661 }
662
663
664 if (tunnel->erspan_ver == 1) {
665 erspan_build_header(skb, ntohl(tunnel->parms.o_key),
666 tunnel->index,
667 truncate, true);
668 proto = htons(ETH_P_ERSPAN);
669 } else if (tunnel->erspan_ver == 2) {
670 erspan_build_header_v2(skb, ntohl(tunnel->parms.o_key),
671 tunnel->dir, tunnel->hwid,
672 truncate, true);
673 proto = htons(ETH_P_ERSPAN2);
674 } else {
675 goto free_skb;
676 }
677
678 tunnel->parms.o_flags &= ~TUNNEL_KEY;
679 __gre_xmit(skb, dev, &tunnel->parms.iph, proto);
680 return NETDEV_TX_OK;
681
682 free_skb:
683 kfree_skb(skb);
684 dev->stats.tx_dropped++;
685 return NETDEV_TX_OK;
686 }
687
688 static netdev_tx_t gre_tap_xmit(struct sk_buff *skb,
689 struct net_device *dev)
690 {
691 struct ip_tunnel *tunnel = netdev_priv(dev);
692
693 if (!pskb_inet_may_pull(skb))
694 goto free_skb;
695
696 if (tunnel->collect_md) {
697 gre_fb_xmit(skb, dev, htons(ETH_P_TEB));
698 return NETDEV_TX_OK;
699 }
700
701 if (gre_handle_offloads(skb, !!(tunnel->parms.o_flags & TUNNEL_CSUM)))
702 goto free_skb;
703
704 if (skb_cow_head(skb, dev->needed_headroom))
705 goto free_skb;
706
707 __gre_xmit(skb, dev, &tunnel->parms.iph, htons(ETH_P_TEB));
708 return NETDEV_TX_OK;
709
710 free_skb:
711 kfree_skb(skb);
712 dev->stats.tx_dropped++;
713 return NETDEV_TX_OK;
714 }
715
716 static void ipgre_link_update(struct net_device *dev, bool set_mtu)
717 {
718 struct ip_tunnel *tunnel = netdev_priv(dev);
719 int len;
720
721 len = tunnel->tun_hlen;
722 tunnel->tun_hlen = gre_calc_hlen(tunnel->parms.o_flags);
723 len = tunnel->tun_hlen - len;
724 tunnel->hlen = tunnel->hlen + len;
725
726 dev->needed_headroom = dev->needed_headroom + len;
727 if (set_mtu)
728 dev->mtu = max_t(int, dev->mtu - len, 68);
729
730 if (!(tunnel->parms.o_flags & TUNNEL_SEQ)) {
731 if (!(tunnel->parms.o_flags & TUNNEL_CSUM) ||
732 tunnel->encap.type == TUNNEL_ENCAP_NONE) {
733 dev->features |= NETIF_F_GSO_SOFTWARE;
734 dev->hw_features |= NETIF_F_GSO_SOFTWARE;
735 } else {
736 dev->features &= ~NETIF_F_GSO_SOFTWARE;
737 dev->hw_features &= ~NETIF_F_GSO_SOFTWARE;
738 }
739 dev->features |= NETIF_F_LLTX;
740 } else {
741 dev->hw_features &= ~NETIF_F_GSO_SOFTWARE;
742 dev->features &= ~(NETIF_F_LLTX | NETIF_F_GSO_SOFTWARE);
743 }
744 }
745
746 static int ipgre_tunnel_ioctl(struct net_device *dev,
747 struct ifreq *ifr, int cmd)
748 {
749 struct ip_tunnel_parm p;
750 int err;
751
752 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
753 return -EFAULT;
754
755 if (cmd == SIOCADDTUNNEL || cmd == SIOCCHGTUNNEL) {
756 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
757 p.iph.ihl != 5 || (p.iph.frag_off & htons(~IP_DF)) ||
758 ((p.i_flags | p.o_flags) & (GRE_VERSION | GRE_ROUTING)))
759 return -EINVAL;
760 }
761
762 p.i_flags = gre_flags_to_tnl_flags(p.i_flags);
763 p.o_flags = gre_flags_to_tnl_flags(p.o_flags);
764
765 err = ip_tunnel_ioctl(dev, &p, cmd);
766 if (err)
767 return err;
768
769 if (cmd == SIOCCHGTUNNEL) {
770 struct ip_tunnel *t = netdev_priv(dev);
771
772 t->parms.i_flags = p.i_flags;
773 t->parms.o_flags = p.o_flags;
774
775 if (strcmp(dev->rtnl_link_ops->kind, "erspan"))
776 ipgre_link_update(dev, true);
777 }
778
779 p.i_flags = gre_tnl_flags_to_gre_flags(p.i_flags);
780 p.o_flags = gre_tnl_flags_to_gre_flags(p.o_flags);
781
782 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
783 return -EFAULT;
784
785 return 0;
786 }
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815 static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
816 unsigned short type,
817 const void *daddr, const void *saddr, unsigned int len)
818 {
819 struct ip_tunnel *t = netdev_priv(dev);
820 struct iphdr *iph;
821 struct gre_base_hdr *greh;
822
823 iph = skb_push(skb, t->hlen + sizeof(*iph));
824 greh = (struct gre_base_hdr *)(iph+1);
825 greh->flags = gre_tnl_flags_to_gre_flags(t->parms.o_flags);
826 greh->protocol = htons(type);
827
828 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
829
830
831 if (saddr)
832 memcpy(&iph->saddr, saddr, 4);
833 if (daddr)
834 memcpy(&iph->daddr, daddr, 4);
835 if (iph->daddr)
836 return t->hlen + sizeof(*iph);
837
838 return -(t->hlen + sizeof(*iph));
839 }
840
841 static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
842 {
843 const struct iphdr *iph = (const struct iphdr *) skb_mac_header(skb);
844 memcpy(haddr, &iph->saddr, 4);
845 return 4;
846 }
847
848 static const struct header_ops ipgre_header_ops = {
849 .create = ipgre_header,
850 .parse = ipgre_header_parse,
851 };
852
853 #ifdef CONFIG_NET_IPGRE_BROADCAST
854 static int ipgre_open(struct net_device *dev)
855 {
856 struct ip_tunnel *t = netdev_priv(dev);
857
858 if (ipv4_is_multicast(t->parms.iph.daddr)) {
859 struct flowi4 fl4;
860 struct rtable *rt;
861
862 rt = ip_route_output_gre(t->net, &fl4,
863 t->parms.iph.daddr,
864 t->parms.iph.saddr,
865 t->parms.o_key,
866 RT_TOS(t->parms.iph.tos),
867 t->parms.link);
868 if (IS_ERR(rt))
869 return -EADDRNOTAVAIL;
870 dev = rt->dst.dev;
871 ip_rt_put(rt);
872 if (!__in_dev_get_rtnl(dev))
873 return -EADDRNOTAVAIL;
874 t->mlink = dev->ifindex;
875 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
876 }
877 return 0;
878 }
879
880 static int ipgre_close(struct net_device *dev)
881 {
882 struct ip_tunnel *t = netdev_priv(dev);
883
884 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
885 struct in_device *in_dev;
886 in_dev = inetdev_by_index(t->net, t->mlink);
887 if (in_dev)
888 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
889 }
890 return 0;
891 }
892 #endif
893
894 static const struct net_device_ops ipgre_netdev_ops = {
895 .ndo_init = ipgre_tunnel_init,
896 .ndo_uninit = ip_tunnel_uninit,
897 #ifdef CONFIG_NET_IPGRE_BROADCAST
898 .ndo_open = ipgre_open,
899 .ndo_stop = ipgre_close,
900 #endif
901 .ndo_start_xmit = ipgre_xmit,
902 .ndo_do_ioctl = ipgre_tunnel_ioctl,
903 .ndo_change_mtu = ip_tunnel_change_mtu,
904 .ndo_get_stats64 = ip_tunnel_get_stats64,
905 .ndo_get_iflink = ip_tunnel_get_iflink,
906 };
907
908 #define GRE_FEATURES (NETIF_F_SG | \
909 NETIF_F_FRAGLIST | \
910 NETIF_F_HIGHDMA | \
911 NETIF_F_HW_CSUM)
912
913 static void ipgre_tunnel_setup(struct net_device *dev)
914 {
915 dev->netdev_ops = &ipgre_netdev_ops;
916 dev->type = ARPHRD_IPGRE;
917 ip_tunnel_setup(dev, ipgre_net_id);
918 }
919
920 static void __gre_tunnel_init(struct net_device *dev)
921 {
922 struct ip_tunnel *tunnel;
923
924 tunnel = netdev_priv(dev);
925 tunnel->tun_hlen = gre_calc_hlen(tunnel->parms.o_flags);
926 tunnel->parms.iph.protocol = IPPROTO_GRE;
927
928 tunnel->hlen = tunnel->tun_hlen + tunnel->encap_hlen;
929
930 dev->features |= GRE_FEATURES;
931 dev->hw_features |= GRE_FEATURES;
932
933 if (!(tunnel->parms.o_flags & TUNNEL_SEQ)) {
934
935
936
937
938 if (!(tunnel->parms.o_flags & TUNNEL_CSUM) ||
939 (tunnel->encap.type == TUNNEL_ENCAP_NONE)) {
940 dev->features |= NETIF_F_GSO_SOFTWARE;
941 dev->hw_features |= NETIF_F_GSO_SOFTWARE;
942 }
943
944
945
946
947 dev->features |= NETIF_F_LLTX;
948 }
949 }
950
951 static int ipgre_tunnel_init(struct net_device *dev)
952 {
953 struct ip_tunnel *tunnel = netdev_priv(dev);
954 struct iphdr *iph = &tunnel->parms.iph;
955
956 __gre_tunnel_init(dev);
957
958 memcpy(dev->dev_addr, &iph->saddr, 4);
959 memcpy(dev->broadcast, &iph->daddr, 4);
960
961 dev->flags = IFF_NOARP;
962 netif_keep_dst(dev);
963 dev->addr_len = 4;
964
965 if (iph->daddr && !tunnel->collect_md) {
966 #ifdef CONFIG_NET_IPGRE_BROADCAST
967 if (ipv4_is_multicast(iph->daddr)) {
968 if (!iph->saddr)
969 return -EINVAL;
970 dev->flags = IFF_BROADCAST;
971 dev->header_ops = &ipgre_header_ops;
972 }
973 #endif
974 } else if (!tunnel->collect_md) {
975 dev->header_ops = &ipgre_header_ops;
976 }
977
978 return ip_tunnel_init(dev);
979 }
980
981 static const struct gre_protocol ipgre_protocol = {
982 .handler = gre_rcv,
983 .err_handler = gre_err,
984 };
985
986 static int __net_init ipgre_init_net(struct net *net)
987 {
988 return ip_tunnel_init_net(net, ipgre_net_id, &ipgre_link_ops, NULL);
989 }
990
991 static void __net_exit ipgre_exit_batch_net(struct list_head *list_net)
992 {
993 ip_tunnel_delete_nets(list_net, ipgre_net_id, &ipgre_link_ops);
994 }
995
996 static struct pernet_operations ipgre_net_ops = {
997 .init = ipgre_init_net,
998 .exit_batch = ipgre_exit_batch_net,
999 .id = &ipgre_net_id,
1000 .size = sizeof(struct ip_tunnel_net),
1001 };
1002
1003 static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[],
1004 struct netlink_ext_ack *extack)
1005 {
1006 __be16 flags;
1007
1008 if (!data)
1009 return 0;
1010
1011 flags = 0;
1012 if (data[IFLA_GRE_IFLAGS])
1013 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1014 if (data[IFLA_GRE_OFLAGS])
1015 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1016 if (flags & (GRE_VERSION|GRE_ROUTING))
1017 return -EINVAL;
1018
1019 if (data[IFLA_GRE_COLLECT_METADATA] &&
1020 data[IFLA_GRE_ENCAP_TYPE] &&
1021 nla_get_u16(data[IFLA_GRE_ENCAP_TYPE]) != TUNNEL_ENCAP_NONE)
1022 return -EINVAL;
1023
1024 return 0;
1025 }
1026
1027 static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[],
1028 struct netlink_ext_ack *extack)
1029 {
1030 __be32 daddr;
1031
1032 if (tb[IFLA_ADDRESS]) {
1033 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1034 return -EINVAL;
1035 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1036 return -EADDRNOTAVAIL;
1037 }
1038
1039 if (!data)
1040 goto out;
1041
1042 if (data[IFLA_GRE_REMOTE]) {
1043 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1044 if (!daddr)
1045 return -EINVAL;
1046 }
1047
1048 out:
1049 return ipgre_tunnel_validate(tb, data, extack);
1050 }
1051
1052 static int erspan_validate(struct nlattr *tb[], struct nlattr *data[],
1053 struct netlink_ext_ack *extack)
1054 {
1055 __be16 flags = 0;
1056 int ret;
1057
1058 if (!data)
1059 return 0;
1060
1061 ret = ipgre_tap_validate(tb, data, extack);
1062 if (ret)
1063 return ret;
1064
1065
1066 if (data[IFLA_GRE_OFLAGS])
1067 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1068 if (data[IFLA_GRE_IFLAGS])
1069 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1070 if (!data[IFLA_GRE_COLLECT_METADATA] &&
1071 flags != (GRE_SEQ | GRE_KEY))
1072 return -EINVAL;
1073
1074
1075
1076
1077 if (data[IFLA_GRE_IKEY] &&
1078 (ntohl(nla_get_be32(data[IFLA_GRE_IKEY])) & ~ID_MASK))
1079 return -EINVAL;
1080
1081 if (data[IFLA_GRE_OKEY] &&
1082 (ntohl(nla_get_be32(data[IFLA_GRE_OKEY])) & ~ID_MASK))
1083 return -EINVAL;
1084
1085 return 0;
1086 }
1087
1088 static int ipgre_netlink_parms(struct net_device *dev,
1089 struct nlattr *data[],
1090 struct nlattr *tb[],
1091 struct ip_tunnel_parm *parms,
1092 __u32 *fwmark)
1093 {
1094 struct ip_tunnel *t = netdev_priv(dev);
1095
1096 memset(parms, 0, sizeof(*parms));
1097
1098 parms->iph.protocol = IPPROTO_GRE;
1099
1100 if (!data)
1101 return 0;
1102
1103 if (data[IFLA_GRE_LINK])
1104 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1105
1106 if (data[IFLA_GRE_IFLAGS])
1107 parms->i_flags = gre_flags_to_tnl_flags(nla_get_be16(data[IFLA_GRE_IFLAGS]));
1108
1109 if (data[IFLA_GRE_OFLAGS])
1110 parms->o_flags = gre_flags_to_tnl_flags(nla_get_be16(data[IFLA_GRE_OFLAGS]));
1111
1112 if (data[IFLA_GRE_IKEY])
1113 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1114
1115 if (data[IFLA_GRE_OKEY])
1116 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1117
1118 if (data[IFLA_GRE_LOCAL])
1119 parms->iph.saddr = nla_get_in_addr(data[IFLA_GRE_LOCAL]);
1120
1121 if (data[IFLA_GRE_REMOTE])
1122 parms->iph.daddr = nla_get_in_addr(data[IFLA_GRE_REMOTE]);
1123
1124 if (data[IFLA_GRE_TTL])
1125 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1126
1127 if (data[IFLA_GRE_TOS])
1128 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1129
1130 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC])) {
1131 if (t->ignore_df)
1132 return -EINVAL;
1133 parms->iph.frag_off = htons(IP_DF);
1134 }
1135
1136 if (data[IFLA_GRE_COLLECT_METADATA]) {
1137 t->collect_md = true;
1138 if (dev->type == ARPHRD_IPGRE)
1139 dev->type = ARPHRD_NONE;
1140 }
1141
1142 if (data[IFLA_GRE_IGNORE_DF]) {
1143 if (nla_get_u8(data[IFLA_GRE_IGNORE_DF])
1144 && (parms->iph.frag_off & htons(IP_DF)))
1145 return -EINVAL;
1146 t->ignore_df = !!nla_get_u8(data[IFLA_GRE_IGNORE_DF]);
1147 }
1148
1149 if (data[IFLA_GRE_FWMARK])
1150 *fwmark = nla_get_u32(data[IFLA_GRE_FWMARK]);
1151
1152 return 0;
1153 }
1154
1155 static int erspan_netlink_parms(struct net_device *dev,
1156 struct nlattr *data[],
1157 struct nlattr *tb[],
1158 struct ip_tunnel_parm *parms,
1159 __u32 *fwmark)
1160 {
1161 struct ip_tunnel *t = netdev_priv(dev);
1162 int err;
1163
1164 err = ipgre_netlink_parms(dev, data, tb, parms, fwmark);
1165 if (err)
1166 return err;
1167 if (!data)
1168 return 0;
1169
1170 if (data[IFLA_GRE_ERSPAN_VER]) {
1171 t->erspan_ver = nla_get_u8(data[IFLA_GRE_ERSPAN_VER]);
1172
1173 if (t->erspan_ver != 1 && t->erspan_ver != 2)
1174 return -EINVAL;
1175 }
1176
1177 if (t->erspan_ver == 1) {
1178 if (data[IFLA_GRE_ERSPAN_INDEX]) {
1179 t->index = nla_get_u32(data[IFLA_GRE_ERSPAN_INDEX]);
1180 if (t->index & ~INDEX_MASK)
1181 return -EINVAL;
1182 }
1183 } else if (t->erspan_ver == 2) {
1184 if (data[IFLA_GRE_ERSPAN_DIR]) {
1185 t->dir = nla_get_u8(data[IFLA_GRE_ERSPAN_DIR]);
1186 if (t->dir & ~(DIR_MASK >> DIR_OFFSET))
1187 return -EINVAL;
1188 }
1189 if (data[IFLA_GRE_ERSPAN_HWID]) {
1190 t->hwid = nla_get_u16(data[IFLA_GRE_ERSPAN_HWID]);
1191 if (t->hwid & ~(HWID_MASK >> HWID_OFFSET))
1192 return -EINVAL;
1193 }
1194 }
1195
1196 return 0;
1197 }
1198
1199
1200 static bool ipgre_netlink_encap_parms(struct nlattr *data[],
1201 struct ip_tunnel_encap *ipencap)
1202 {
1203 bool ret = false;
1204
1205 memset(ipencap, 0, sizeof(*ipencap));
1206
1207 if (!data)
1208 return ret;
1209
1210 if (data[IFLA_GRE_ENCAP_TYPE]) {
1211 ret = true;
1212 ipencap->type = nla_get_u16(data[IFLA_GRE_ENCAP_TYPE]);
1213 }
1214
1215 if (data[IFLA_GRE_ENCAP_FLAGS]) {
1216 ret = true;
1217 ipencap->flags = nla_get_u16(data[IFLA_GRE_ENCAP_FLAGS]);
1218 }
1219
1220 if (data[IFLA_GRE_ENCAP_SPORT]) {
1221 ret = true;
1222 ipencap->sport = nla_get_be16(data[IFLA_GRE_ENCAP_SPORT]);
1223 }
1224
1225 if (data[IFLA_GRE_ENCAP_DPORT]) {
1226 ret = true;
1227 ipencap->dport = nla_get_be16(data[IFLA_GRE_ENCAP_DPORT]);
1228 }
1229
1230 return ret;
1231 }
1232
1233 static int gre_tap_init(struct net_device *dev)
1234 {
1235 __gre_tunnel_init(dev);
1236 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
1237 netif_keep_dst(dev);
1238
1239 return ip_tunnel_init(dev);
1240 }
1241
1242 static const struct net_device_ops gre_tap_netdev_ops = {
1243 .ndo_init = gre_tap_init,
1244 .ndo_uninit = ip_tunnel_uninit,
1245 .ndo_start_xmit = gre_tap_xmit,
1246 .ndo_set_mac_address = eth_mac_addr,
1247 .ndo_validate_addr = eth_validate_addr,
1248 .ndo_change_mtu = ip_tunnel_change_mtu,
1249 .ndo_get_stats64 = ip_tunnel_get_stats64,
1250 .ndo_get_iflink = ip_tunnel_get_iflink,
1251 .ndo_fill_metadata_dst = gre_fill_metadata_dst,
1252 };
1253
1254 static int erspan_tunnel_init(struct net_device *dev)
1255 {
1256 struct ip_tunnel *tunnel = netdev_priv(dev);
1257
1258 tunnel->tun_hlen = 8;
1259 tunnel->parms.iph.protocol = IPPROTO_GRE;
1260 tunnel->hlen = tunnel->tun_hlen + tunnel->encap_hlen +
1261 erspan_hdr_len(tunnel->erspan_ver);
1262
1263 dev->features |= GRE_FEATURES;
1264 dev->hw_features |= GRE_FEATURES;
1265 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
1266 netif_keep_dst(dev);
1267
1268 return ip_tunnel_init(dev);
1269 }
1270
1271 static const struct net_device_ops erspan_netdev_ops = {
1272 .ndo_init = erspan_tunnel_init,
1273 .ndo_uninit = ip_tunnel_uninit,
1274 .ndo_start_xmit = erspan_xmit,
1275 .ndo_set_mac_address = eth_mac_addr,
1276 .ndo_validate_addr = eth_validate_addr,
1277 .ndo_change_mtu = ip_tunnel_change_mtu,
1278 .ndo_get_stats64 = ip_tunnel_get_stats64,
1279 .ndo_get_iflink = ip_tunnel_get_iflink,
1280 .ndo_fill_metadata_dst = gre_fill_metadata_dst,
1281 };
1282
1283 static void ipgre_tap_setup(struct net_device *dev)
1284 {
1285 ether_setup(dev);
1286 dev->max_mtu = 0;
1287 dev->netdev_ops = &gre_tap_netdev_ops;
1288 dev->priv_flags &= ~IFF_TX_SKB_SHARING;
1289 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
1290 ip_tunnel_setup(dev, gre_tap_net_id);
1291 }
1292
1293 static int
1294 ipgre_newlink_encap_setup(struct net_device *dev, struct nlattr *data[])
1295 {
1296 struct ip_tunnel_encap ipencap;
1297
1298 if (ipgre_netlink_encap_parms(data, &ipencap)) {
1299 struct ip_tunnel *t = netdev_priv(dev);
1300 int err = ip_tunnel_encap_setup(t, &ipencap);
1301
1302 if (err < 0)
1303 return err;
1304 }
1305
1306 return 0;
1307 }
1308
1309 static int ipgre_newlink(struct net *src_net, struct net_device *dev,
1310 struct nlattr *tb[], struct nlattr *data[],
1311 struct netlink_ext_ack *extack)
1312 {
1313 struct ip_tunnel_parm p;
1314 __u32 fwmark = 0;
1315 int err;
1316
1317 err = ipgre_newlink_encap_setup(dev, data);
1318 if (err)
1319 return err;
1320
1321 err = ipgre_netlink_parms(dev, data, tb, &p, &fwmark);
1322 if (err < 0)
1323 return err;
1324 return ip_tunnel_newlink(dev, tb, &p, fwmark);
1325 }
1326
1327 static int erspan_newlink(struct net *src_net, struct net_device *dev,
1328 struct nlattr *tb[], struct nlattr *data[],
1329 struct netlink_ext_ack *extack)
1330 {
1331 struct ip_tunnel_parm p;
1332 __u32 fwmark = 0;
1333 int err;
1334
1335 err = ipgre_newlink_encap_setup(dev, data);
1336 if (err)
1337 return err;
1338
1339 err = erspan_netlink_parms(dev, data, tb, &p, &fwmark);
1340 if (err)
1341 return err;
1342 return ip_tunnel_newlink(dev, tb, &p, fwmark);
1343 }
1344
1345 static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1346 struct nlattr *data[],
1347 struct netlink_ext_ack *extack)
1348 {
1349 struct ip_tunnel *t = netdev_priv(dev);
1350 __u32 fwmark = t->fwmark;
1351 struct ip_tunnel_parm p;
1352 int err;
1353
1354 err = ipgre_newlink_encap_setup(dev, data);
1355 if (err)
1356 return err;
1357
1358 err = ipgre_netlink_parms(dev, data, tb, &p, &fwmark);
1359 if (err < 0)
1360 return err;
1361
1362 err = ip_tunnel_changelink(dev, tb, &p, fwmark);
1363 if (err < 0)
1364 return err;
1365
1366 t->parms.i_flags = p.i_flags;
1367 t->parms.o_flags = p.o_flags;
1368
1369 ipgre_link_update(dev, !tb[IFLA_MTU]);
1370
1371 return 0;
1372 }
1373
1374 static int erspan_changelink(struct net_device *dev, struct nlattr *tb[],
1375 struct nlattr *data[],
1376 struct netlink_ext_ack *extack)
1377 {
1378 struct ip_tunnel *t = netdev_priv(dev);
1379 __u32 fwmark = t->fwmark;
1380 struct ip_tunnel_parm p;
1381 int err;
1382
1383 err = ipgre_newlink_encap_setup(dev, data);
1384 if (err)
1385 return err;
1386
1387 err = erspan_netlink_parms(dev, data, tb, &p, &fwmark);
1388 if (err < 0)
1389 return err;
1390
1391 err = ip_tunnel_changelink(dev, tb, &p, fwmark);
1392 if (err < 0)
1393 return err;
1394
1395 t->parms.i_flags = p.i_flags;
1396 t->parms.o_flags = p.o_flags;
1397
1398 return 0;
1399 }
1400
1401 static size_t ipgre_get_size(const struct net_device *dev)
1402 {
1403 return
1404
1405 nla_total_size(4) +
1406
1407 nla_total_size(2) +
1408
1409 nla_total_size(2) +
1410
1411 nla_total_size(4) +
1412
1413 nla_total_size(4) +
1414
1415 nla_total_size(4) +
1416
1417 nla_total_size(4) +
1418
1419 nla_total_size(1) +
1420
1421 nla_total_size(1) +
1422
1423 nla_total_size(1) +
1424
1425 nla_total_size(2) +
1426
1427 nla_total_size(2) +
1428
1429 nla_total_size(2) +
1430
1431 nla_total_size(2) +
1432
1433 nla_total_size(0) +
1434
1435 nla_total_size(1) +
1436
1437 nla_total_size(4) +
1438
1439 nla_total_size(4) +
1440
1441 nla_total_size(1) +
1442
1443 nla_total_size(1) +
1444
1445 nla_total_size(2) +
1446 0;
1447 }
1448
1449 static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1450 {
1451 struct ip_tunnel *t = netdev_priv(dev);
1452 struct ip_tunnel_parm *p = &t->parms;
1453 __be16 o_flags = p->o_flags;
1454
1455 if (t->erspan_ver == 1 || t->erspan_ver == 2) {
1456 if (!t->collect_md)
1457 o_flags |= TUNNEL_KEY;
1458
1459 if (nla_put_u8(skb, IFLA_GRE_ERSPAN_VER, t->erspan_ver))
1460 goto nla_put_failure;
1461
1462 if (t->erspan_ver == 1) {
1463 if (nla_put_u32(skb, IFLA_GRE_ERSPAN_INDEX, t->index))
1464 goto nla_put_failure;
1465 } else {
1466 if (nla_put_u8(skb, IFLA_GRE_ERSPAN_DIR, t->dir))
1467 goto nla_put_failure;
1468 if (nla_put_u16(skb, IFLA_GRE_ERSPAN_HWID, t->hwid))
1469 goto nla_put_failure;
1470 }
1471 }
1472
1473 if (nla_put_u32(skb, IFLA_GRE_LINK, p->link) ||
1474 nla_put_be16(skb, IFLA_GRE_IFLAGS,
1475 gre_tnl_flags_to_gre_flags(p->i_flags)) ||
1476 nla_put_be16(skb, IFLA_GRE_OFLAGS,
1477 gre_tnl_flags_to_gre_flags(o_flags)) ||
1478 nla_put_be32(skb, IFLA_GRE_IKEY, p->i_key) ||
1479 nla_put_be32(skb, IFLA_GRE_OKEY, p->o_key) ||
1480 nla_put_in_addr(skb, IFLA_GRE_LOCAL, p->iph.saddr) ||
1481 nla_put_in_addr(skb, IFLA_GRE_REMOTE, p->iph.daddr) ||
1482 nla_put_u8(skb, IFLA_GRE_TTL, p->iph.ttl) ||
1483 nla_put_u8(skb, IFLA_GRE_TOS, p->iph.tos) ||
1484 nla_put_u8(skb, IFLA_GRE_PMTUDISC,
1485 !!(p->iph.frag_off & htons(IP_DF))) ||
1486 nla_put_u32(skb, IFLA_GRE_FWMARK, t->fwmark))
1487 goto nla_put_failure;
1488
1489 if (nla_put_u16(skb, IFLA_GRE_ENCAP_TYPE,
1490 t->encap.type) ||
1491 nla_put_be16(skb, IFLA_GRE_ENCAP_SPORT,
1492 t->encap.sport) ||
1493 nla_put_be16(skb, IFLA_GRE_ENCAP_DPORT,
1494 t->encap.dport) ||
1495 nla_put_u16(skb, IFLA_GRE_ENCAP_FLAGS,
1496 t->encap.flags))
1497 goto nla_put_failure;
1498
1499 if (nla_put_u8(skb, IFLA_GRE_IGNORE_DF, t->ignore_df))
1500 goto nla_put_failure;
1501
1502 if (t->collect_md) {
1503 if (nla_put_flag(skb, IFLA_GRE_COLLECT_METADATA))
1504 goto nla_put_failure;
1505 }
1506
1507 return 0;
1508
1509 nla_put_failure:
1510 return -EMSGSIZE;
1511 }
1512
1513 static void erspan_setup(struct net_device *dev)
1514 {
1515 struct ip_tunnel *t = netdev_priv(dev);
1516
1517 ether_setup(dev);
1518 dev->max_mtu = 0;
1519 dev->netdev_ops = &erspan_netdev_ops;
1520 dev->priv_flags &= ~IFF_TX_SKB_SHARING;
1521 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
1522 ip_tunnel_setup(dev, erspan_net_id);
1523 t->erspan_ver = 1;
1524 }
1525
1526 static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1527 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1528 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1529 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1530 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1531 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
1532 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1533 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
1534 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1535 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1536 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1537 [IFLA_GRE_ENCAP_TYPE] = { .type = NLA_U16 },
1538 [IFLA_GRE_ENCAP_FLAGS] = { .type = NLA_U16 },
1539 [IFLA_GRE_ENCAP_SPORT] = { .type = NLA_U16 },
1540 [IFLA_GRE_ENCAP_DPORT] = { .type = NLA_U16 },
1541 [IFLA_GRE_COLLECT_METADATA] = { .type = NLA_FLAG },
1542 [IFLA_GRE_IGNORE_DF] = { .type = NLA_U8 },
1543 [IFLA_GRE_FWMARK] = { .type = NLA_U32 },
1544 [IFLA_GRE_ERSPAN_INDEX] = { .type = NLA_U32 },
1545 [IFLA_GRE_ERSPAN_VER] = { .type = NLA_U8 },
1546 [IFLA_GRE_ERSPAN_DIR] = { .type = NLA_U8 },
1547 [IFLA_GRE_ERSPAN_HWID] = { .type = NLA_U16 },
1548 };
1549
1550 static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1551 .kind = "gre",
1552 .maxtype = IFLA_GRE_MAX,
1553 .policy = ipgre_policy,
1554 .priv_size = sizeof(struct ip_tunnel),
1555 .setup = ipgre_tunnel_setup,
1556 .validate = ipgre_tunnel_validate,
1557 .newlink = ipgre_newlink,
1558 .changelink = ipgre_changelink,
1559 .dellink = ip_tunnel_dellink,
1560 .get_size = ipgre_get_size,
1561 .fill_info = ipgre_fill_info,
1562 .get_link_net = ip_tunnel_get_link_net,
1563 };
1564
1565 static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1566 .kind = "gretap",
1567 .maxtype = IFLA_GRE_MAX,
1568 .policy = ipgre_policy,
1569 .priv_size = sizeof(struct ip_tunnel),
1570 .setup = ipgre_tap_setup,
1571 .validate = ipgre_tap_validate,
1572 .newlink = ipgre_newlink,
1573 .changelink = ipgre_changelink,
1574 .dellink = ip_tunnel_dellink,
1575 .get_size = ipgre_get_size,
1576 .fill_info = ipgre_fill_info,
1577 .get_link_net = ip_tunnel_get_link_net,
1578 };
1579
1580 static struct rtnl_link_ops erspan_link_ops __read_mostly = {
1581 .kind = "erspan",
1582 .maxtype = IFLA_GRE_MAX,
1583 .policy = ipgre_policy,
1584 .priv_size = sizeof(struct ip_tunnel),
1585 .setup = erspan_setup,
1586 .validate = erspan_validate,
1587 .newlink = erspan_newlink,
1588 .changelink = erspan_changelink,
1589 .dellink = ip_tunnel_dellink,
1590 .get_size = ipgre_get_size,
1591 .fill_info = ipgre_fill_info,
1592 .get_link_net = ip_tunnel_get_link_net,
1593 };
1594
1595 struct net_device *gretap_fb_dev_create(struct net *net, const char *name,
1596 u8 name_assign_type)
1597 {
1598 struct nlattr *tb[IFLA_MAX + 1];
1599 struct net_device *dev;
1600 LIST_HEAD(list_kill);
1601 struct ip_tunnel *t;
1602 int err;
1603
1604 memset(&tb, 0, sizeof(tb));
1605
1606 dev = rtnl_create_link(net, name, name_assign_type,
1607 &ipgre_tap_ops, tb, NULL);
1608 if (IS_ERR(dev))
1609 return dev;
1610
1611
1612 t = netdev_priv(dev);
1613 t->collect_md = true;
1614
1615 err = ipgre_newlink(net, dev, tb, NULL, NULL);
1616 if (err < 0) {
1617 free_netdev(dev);
1618 return ERR_PTR(err);
1619 }
1620
1621
1622
1623
1624 err = __ip_tunnel_change_mtu(dev, IP_MAX_MTU, false);
1625 if (err)
1626 goto out;
1627
1628 err = rtnl_configure_link(dev, NULL);
1629 if (err < 0)
1630 goto out;
1631
1632 return dev;
1633 out:
1634 ip_tunnel_dellink(dev, &list_kill);
1635 unregister_netdevice_many(&list_kill);
1636 return ERR_PTR(err);
1637 }
1638 EXPORT_SYMBOL_GPL(gretap_fb_dev_create);
1639
1640 static int __net_init ipgre_tap_init_net(struct net *net)
1641 {
1642 return ip_tunnel_init_net(net, gre_tap_net_id, &ipgre_tap_ops, "gretap0");
1643 }
1644
1645 static void __net_exit ipgre_tap_exit_batch_net(struct list_head *list_net)
1646 {
1647 ip_tunnel_delete_nets(list_net, gre_tap_net_id, &ipgre_tap_ops);
1648 }
1649
1650 static struct pernet_operations ipgre_tap_net_ops = {
1651 .init = ipgre_tap_init_net,
1652 .exit_batch = ipgre_tap_exit_batch_net,
1653 .id = &gre_tap_net_id,
1654 .size = sizeof(struct ip_tunnel_net),
1655 };
1656
1657 static int __net_init erspan_init_net(struct net *net)
1658 {
1659 return ip_tunnel_init_net(net, erspan_net_id,
1660 &erspan_link_ops, "erspan0");
1661 }
1662
1663 static void __net_exit erspan_exit_batch_net(struct list_head *net_list)
1664 {
1665 ip_tunnel_delete_nets(net_list, erspan_net_id, &erspan_link_ops);
1666 }
1667
1668 static struct pernet_operations erspan_net_ops = {
1669 .init = erspan_init_net,
1670 .exit_batch = erspan_exit_batch_net,
1671 .id = &erspan_net_id,
1672 .size = sizeof(struct ip_tunnel_net),
1673 };
1674
1675 static int __init ipgre_init(void)
1676 {
1677 int err;
1678
1679 pr_info("GRE over IPv4 tunneling driver\n");
1680
1681 err = register_pernet_device(&ipgre_net_ops);
1682 if (err < 0)
1683 return err;
1684
1685 err = register_pernet_device(&ipgre_tap_net_ops);
1686 if (err < 0)
1687 goto pnet_tap_failed;
1688
1689 err = register_pernet_device(&erspan_net_ops);
1690 if (err < 0)
1691 goto pnet_erspan_failed;
1692
1693 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
1694 if (err < 0) {
1695 pr_info("%s: can't add protocol\n", __func__);
1696 goto add_proto_failed;
1697 }
1698
1699 err = rtnl_link_register(&ipgre_link_ops);
1700 if (err < 0)
1701 goto rtnl_link_failed;
1702
1703 err = rtnl_link_register(&ipgre_tap_ops);
1704 if (err < 0)
1705 goto tap_ops_failed;
1706
1707 err = rtnl_link_register(&erspan_link_ops);
1708 if (err < 0)
1709 goto erspan_link_failed;
1710
1711 return 0;
1712
1713 erspan_link_failed:
1714 rtnl_link_unregister(&ipgre_tap_ops);
1715 tap_ops_failed:
1716 rtnl_link_unregister(&ipgre_link_ops);
1717 rtnl_link_failed:
1718 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
1719 add_proto_failed:
1720 unregister_pernet_device(&erspan_net_ops);
1721 pnet_erspan_failed:
1722 unregister_pernet_device(&ipgre_tap_net_ops);
1723 pnet_tap_failed:
1724 unregister_pernet_device(&ipgre_net_ops);
1725 return err;
1726 }
1727
1728 static void __exit ipgre_fini(void)
1729 {
1730 rtnl_link_unregister(&ipgre_tap_ops);
1731 rtnl_link_unregister(&ipgre_link_ops);
1732 rtnl_link_unregister(&erspan_link_ops);
1733 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
1734 unregister_pernet_device(&ipgre_tap_net_ops);
1735 unregister_pernet_device(&ipgre_net_ops);
1736 unregister_pernet_device(&erspan_net_ops);
1737 }
1738
1739 module_init(ipgre_init);
1740 module_exit(ipgre_fini);
1741 MODULE_LICENSE("GPL");
1742 MODULE_ALIAS_RTNL_LINK("gre");
1743 MODULE_ALIAS_RTNL_LINK("gretap");
1744 MODULE_ALIAS_RTNL_LINK("erspan");
1745 MODULE_ALIAS_NETDEV("gre0");
1746 MODULE_ALIAS_NETDEV("gretap0");
1747 MODULE_ALIAS_NETDEV("erspan0");