1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * GRE over IPv6 protocol decoder.
5 * Authors: Dmitry Kozlov (xeb@mail.ru)
8 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10 #include <linux/capability.h>
11 #include <linux/module.h>
12 #include <linux/types.h>
13 #include <linux/kernel.h>
14 #include <linux/slab.h>
15 #include <linux/uaccess.h>
16 #include <linux/skbuff.h>
17 #include <linux/netdevice.h>
19 #include <linux/tcp.h>
20 #include <linux/udp.h>
21 #include <linux/if_arp.h>
22 #include <linux/init.h>
23 #include <linux/in6.h>
24 #include <linux/inetdevice.h>
25 #include <linux/igmp.h>
26 #include <linux/netfilter_ipv4.h>
27 #include <linux/etherdevice.h>
28 #include <linux/if_ether.h>
29 #include <linux/hash.h>
30 #include <linux/if_tunnel.h>
31 #include <linux/ip6_tunnel.h>
35 #include <net/ip_tunnels.h>
37 #include <net/protocol.h>
38 #include <net/addrconf.h>
40 #include <net/checksum.h>
41 #include <net/dsfield.h>
42 #include <net/inet_ecn.h>
44 #include <net/net_namespace.h>
45 #include <net/netns/generic.h>
46 #include <net/rtnetlink.h>
49 #include <net/ip6_fib.h>
50 #include <net/ip6_route.h>
51 #include <net/ip6_tunnel.h>
53 #include <net/erspan.h>
54 #include <net/dst_metadata.h>
57 static bool log_ecn_error
= true;
58 module_param(log_ecn_error
, bool, 0644);
59 MODULE_PARM_DESC(log_ecn_error
, "Log packets received with corrupted ECN");
61 #define IP6_GRE_HASH_SIZE_SHIFT 5
62 #define IP6_GRE_HASH_SIZE (1 << IP6_GRE_HASH_SIZE_SHIFT)
64 static unsigned int ip6gre_net_id __read_mostly
;
66 struct ip6_tnl __rcu
*tunnels
[4][IP6_GRE_HASH_SIZE
];
68 struct ip6_tnl __rcu
*collect_md_tun
;
69 struct ip6_tnl __rcu
*collect_md_tun_erspan
;
70 struct net_device
*fb_tunnel_dev
;
73 static struct rtnl_link_ops ip6gre_link_ops __read_mostly
;
74 static struct rtnl_link_ops ip6gre_tap_ops __read_mostly
;
75 static struct rtnl_link_ops ip6erspan_tap_ops __read_mostly
;
76 static int ip6gre_tunnel_init(struct net_device
*dev
);
77 static void ip6gre_tunnel_setup(struct net_device
*dev
);
78 static void ip6gre_tunnel_link(struct ip6gre_net
*ign
, struct ip6_tnl
*t
);
79 static void ip6gre_tnl_link_config(struct ip6_tnl
*t
, int set_mtu
);
80 static void ip6erspan_tnl_link_config(struct ip6_tnl
*t
, int set_mtu
);
82 /* Tunnel hash table */
92 We require exact key match i.e. if a key is present in packet
93 it will match only tunnel with the same key; if it is not present,
94 it will match only keyless tunnel.
96 All keysless packets, if not matched configured keyless tunnels
97 will match fallback tunnel.
100 #define HASH_KEY(key) (((__force u32)key^((__force u32)key>>4))&(IP6_GRE_HASH_SIZE - 1))
101 static u32
HASH_ADDR(const struct in6_addr
*addr
)
103 u32 hash
= ipv6_addr_hash(addr
);
105 return hash_32(hash
, IP6_GRE_HASH_SIZE_SHIFT
);
108 #define tunnels_r_l tunnels[3]
109 #define tunnels_r tunnels[2]
110 #define tunnels_l tunnels[1]
111 #define tunnels_wc tunnels[0]
113 /* Given src, dst and key, find appropriate for input tunnel. */
115 static struct ip6_tnl
*ip6gre_tunnel_lookup(struct net_device
*dev
,
116 const struct in6_addr
*remote
, const struct in6_addr
*local
,
117 __be32 key
, __be16 gre_proto
)
119 struct net
*net
= dev_net(dev
);
120 int link
= dev
->ifindex
;
121 unsigned int h0
= HASH_ADDR(remote
);
122 unsigned int h1
= HASH_KEY(key
);
123 struct ip6_tnl
*t
, *cand
= NULL
;
124 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
125 int dev_type
= (gre_proto
== htons(ETH_P_TEB
) ||
126 gre_proto
== htons(ETH_P_ERSPAN
) ||
127 gre_proto
== htons(ETH_P_ERSPAN2
)) ?
128 ARPHRD_ETHER
: ARPHRD_IP6GRE
;
129 int score
, cand_score
= 4;
130 struct net_device
*ndev
;
132 for_each_ip_tunnel_rcu(t
, ign
->tunnels_r_l
[h0
^ h1
]) {
133 if (!ipv6_addr_equal(local
, &t
->parms
.laddr
) ||
134 !ipv6_addr_equal(remote
, &t
->parms
.raddr
) ||
135 key
!= t
->parms
.i_key
||
136 !(t
->dev
->flags
& IFF_UP
))
139 if (t
->dev
->type
!= ARPHRD_IP6GRE
&&
140 t
->dev
->type
!= dev_type
)
144 if (t
->parms
.link
!= link
)
146 if (t
->dev
->type
!= dev_type
)
151 if (score
< cand_score
) {
157 for_each_ip_tunnel_rcu(t
, ign
->tunnels_r
[h0
^ h1
]) {
158 if (!ipv6_addr_equal(remote
, &t
->parms
.raddr
) ||
159 key
!= t
->parms
.i_key
||
160 !(t
->dev
->flags
& IFF_UP
))
163 if (t
->dev
->type
!= ARPHRD_IP6GRE
&&
164 t
->dev
->type
!= dev_type
)
168 if (t
->parms
.link
!= link
)
170 if (t
->dev
->type
!= dev_type
)
175 if (score
< cand_score
) {
181 for_each_ip_tunnel_rcu(t
, ign
->tunnels_l
[h1
]) {
182 if ((!ipv6_addr_equal(local
, &t
->parms
.laddr
) &&
183 (!ipv6_addr_equal(local
, &t
->parms
.raddr
) ||
184 !ipv6_addr_is_multicast(local
))) ||
185 key
!= t
->parms
.i_key
||
186 !(t
->dev
->flags
& IFF_UP
))
189 if (t
->dev
->type
!= ARPHRD_IP6GRE
&&
190 t
->dev
->type
!= dev_type
)
194 if (t
->parms
.link
!= link
)
196 if (t
->dev
->type
!= dev_type
)
201 if (score
< cand_score
) {
207 for_each_ip_tunnel_rcu(t
, ign
->tunnels_wc
[h1
]) {
208 if (t
->parms
.i_key
!= key
||
209 !(t
->dev
->flags
& IFF_UP
))
212 if (t
->dev
->type
!= ARPHRD_IP6GRE
&&
213 t
->dev
->type
!= dev_type
)
217 if (t
->parms
.link
!= link
)
219 if (t
->dev
->type
!= dev_type
)
224 if (score
< cand_score
) {
233 if (gre_proto
== htons(ETH_P_ERSPAN
) ||
234 gre_proto
== htons(ETH_P_ERSPAN2
))
235 t
= rcu_dereference(ign
->collect_md_tun_erspan
);
237 t
= rcu_dereference(ign
->collect_md_tun
);
239 if (t
&& t
->dev
->flags
& IFF_UP
)
242 ndev
= READ_ONCE(ign
->fb_tunnel_dev
);
243 if (ndev
&& ndev
->flags
& IFF_UP
)
244 return netdev_priv(ndev
);
249 static struct ip6_tnl __rcu
**__ip6gre_bucket(struct ip6gre_net
*ign
,
250 const struct __ip6_tnl_parm
*p
)
252 const struct in6_addr
*remote
= &p
->raddr
;
253 const struct in6_addr
*local
= &p
->laddr
;
254 unsigned int h
= HASH_KEY(p
->i_key
);
257 if (!ipv6_addr_any(local
))
259 if (!ipv6_addr_any(remote
) && !ipv6_addr_is_multicast(remote
)) {
261 h
^= HASH_ADDR(remote
);
264 return &ign
->tunnels
[prio
][h
];
267 static void ip6gre_tunnel_link_md(struct ip6gre_net
*ign
, struct ip6_tnl
*t
)
269 if (t
->parms
.collect_md
)
270 rcu_assign_pointer(ign
->collect_md_tun
, t
);
273 static void ip6erspan_tunnel_link_md(struct ip6gre_net
*ign
, struct ip6_tnl
*t
)
275 if (t
->parms
.collect_md
)
276 rcu_assign_pointer(ign
->collect_md_tun_erspan
, t
);
279 static void ip6gre_tunnel_unlink_md(struct ip6gre_net
*ign
, struct ip6_tnl
*t
)
281 if (t
->parms
.collect_md
)
282 rcu_assign_pointer(ign
->collect_md_tun
, NULL
);
285 static void ip6erspan_tunnel_unlink_md(struct ip6gre_net
*ign
,
288 if (t
->parms
.collect_md
)
289 rcu_assign_pointer(ign
->collect_md_tun_erspan
, NULL
);
292 static inline struct ip6_tnl __rcu
**ip6gre_bucket(struct ip6gre_net
*ign
,
293 const struct ip6_tnl
*t
)
295 return __ip6gre_bucket(ign
, &t
->parms
);
298 static void ip6gre_tunnel_link(struct ip6gre_net
*ign
, struct ip6_tnl
*t
)
300 struct ip6_tnl __rcu
**tp
= ip6gre_bucket(ign
, t
);
302 rcu_assign_pointer(t
->next
, rtnl_dereference(*tp
));
303 rcu_assign_pointer(*tp
, t
);
306 static void ip6gre_tunnel_unlink(struct ip6gre_net
*ign
, struct ip6_tnl
*t
)
308 struct ip6_tnl __rcu
**tp
;
309 struct ip6_tnl
*iter
;
311 for (tp
= ip6gre_bucket(ign
, t
);
312 (iter
= rtnl_dereference(*tp
)) != NULL
;
315 rcu_assign_pointer(*tp
, t
->next
);
321 static struct ip6_tnl
*ip6gre_tunnel_find(struct net
*net
,
322 const struct __ip6_tnl_parm
*parms
,
325 const struct in6_addr
*remote
= &parms
->raddr
;
326 const struct in6_addr
*local
= &parms
->laddr
;
327 __be32 key
= parms
->i_key
;
328 int link
= parms
->link
;
330 struct ip6_tnl __rcu
**tp
;
331 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
333 for (tp
= __ip6gre_bucket(ign
, parms
);
334 (t
= rtnl_dereference(*tp
)) != NULL
;
336 if (ipv6_addr_equal(local
, &t
->parms
.laddr
) &&
337 ipv6_addr_equal(remote
, &t
->parms
.raddr
) &&
338 key
== t
->parms
.i_key
&&
339 link
== t
->parms
.link
&&
340 type
== t
->dev
->type
)
346 static struct ip6_tnl
*ip6gre_tunnel_locate(struct net
*net
,
347 const struct __ip6_tnl_parm
*parms
, int create
)
349 struct ip6_tnl
*t
, *nt
;
350 struct net_device
*dev
;
352 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
354 t
= ip6gre_tunnel_find(net
, parms
, ARPHRD_IP6GRE
);
360 if (parms
->name
[0]) {
361 if (!dev_valid_name(parms
->name
))
363 strscpy(name
, parms
->name
, IFNAMSIZ
);
365 strcpy(name
, "ip6gre%d");
367 dev
= alloc_netdev(sizeof(*t
), name
, NET_NAME_UNKNOWN
,
368 ip6gre_tunnel_setup
);
372 dev_net_set(dev
, net
);
374 nt
= netdev_priv(dev
);
376 dev
->rtnl_link_ops
= &ip6gre_link_ops
;
379 nt
->net
= dev_net(dev
);
381 if (register_netdevice(dev
) < 0)
384 ip6gre_tnl_link_config(nt
, 1);
385 ip6gre_tunnel_link(ign
, nt
);
393 static void ip6erspan_tunnel_uninit(struct net_device
*dev
)
395 struct ip6_tnl
*t
= netdev_priv(dev
);
396 struct ip6gre_net
*ign
= net_generic(t
->net
, ip6gre_net_id
);
398 ip6erspan_tunnel_unlink_md(ign
, t
);
399 ip6gre_tunnel_unlink(ign
, t
);
400 dst_cache_reset(&t
->dst_cache
);
401 netdev_put(dev
, &t
->dev_tracker
);
404 static void ip6gre_tunnel_uninit(struct net_device
*dev
)
406 struct ip6_tnl
*t
= netdev_priv(dev
);
407 struct ip6gre_net
*ign
= net_generic(t
->net
, ip6gre_net_id
);
409 ip6gre_tunnel_unlink_md(ign
, t
);
410 ip6gre_tunnel_unlink(ign
, t
);
411 if (ign
->fb_tunnel_dev
== dev
)
412 WRITE_ONCE(ign
->fb_tunnel_dev
, NULL
);
413 dst_cache_reset(&t
->dst_cache
);
414 netdev_put(dev
, &t
->dev_tracker
);
418 static int ip6gre_err(struct sk_buff
*skb
, struct inet6_skb_parm
*opt
,
419 u8 type
, u8 code
, int offset
, __be32 info
)
421 struct net
*net
= dev_net(skb
->dev
);
422 const struct ipv6hdr
*ipv6h
;
423 struct tnl_ptk_info tpi
;
426 if (gre_parse_header(skb
, &tpi
, NULL
, htons(ETH_P_IPV6
),
430 ipv6h
= (const struct ipv6hdr
*)skb
->data
;
431 t
= ip6gre_tunnel_lookup(skb
->dev
, &ipv6h
->daddr
, &ipv6h
->saddr
,
437 case ICMPV6_DEST_UNREACH
:
438 net_dbg_ratelimited("%s: Path to destination invalid or inactive!\n",
440 if (code
!= ICMPV6_PORT_UNREACH
)
443 case ICMPV6_TIME_EXCEED
:
444 if (code
== ICMPV6_EXC_HOPLIMIT
) {
445 net_dbg_ratelimited("%s: Too small hop limit or routing loop in tunnel!\n",
450 case ICMPV6_PARAMPROB
: {
451 struct ipv6_tlv_tnl_enc_lim
*tel
;
455 if (code
== ICMPV6_HDR_FIELD
)
456 teli
= ip6_tnl_parse_tlv_enc_lim(skb
, skb
->data
);
458 if (teli
&& teli
== be32_to_cpu(info
) - 2) {
459 tel
= (struct ipv6_tlv_tnl_enc_lim
*) &skb
->data
[teli
];
460 if (tel
->encap_limit
== 0) {
461 net_dbg_ratelimited("%s: Too small encapsulation limit or routing loop in tunnel!\n",
465 net_dbg_ratelimited("%s: Recipient unable to parse tunneled packet!\n",
470 case ICMPV6_PKT_TOOBIG
:
471 ip6_update_pmtu(skb
, net
, info
, 0, 0, sock_net_uid(net
, NULL
));
474 ip6_redirect(skb
, net
, skb
->dev
->ifindex
, 0,
475 sock_net_uid(net
, NULL
));
479 if (time_before(jiffies
, t
->err_time
+ IP6TUNNEL_ERR_TIMEO
))
483 t
->err_time
= jiffies
;
488 static int ip6gre_rcv(struct sk_buff
*skb
, const struct tnl_ptk_info
*tpi
)
490 const struct ipv6hdr
*ipv6h
;
491 struct ip6_tnl
*tunnel
;
493 ipv6h
= ipv6_hdr(skb
);
494 tunnel
= ip6gre_tunnel_lookup(skb
->dev
,
495 &ipv6h
->saddr
, &ipv6h
->daddr
, tpi
->key
,
498 if (tunnel
->parms
.collect_md
) {
499 IP_TUNNEL_DECLARE_FLAGS(flags
);
500 struct metadata_dst
*tun_dst
;
503 ip_tunnel_flags_copy(flags
, tpi
->flags
);
504 tun_id
= key32_to_tunnel_id(tpi
->key
);
506 tun_dst
= ipv6_tun_rx_dst(skb
, flags
, tun_id
, 0);
508 return PACKET_REJECT
;
510 ip6_tnl_rcv(tunnel
, skb
, tpi
, tun_dst
, log_ecn_error
);
512 ip6_tnl_rcv(tunnel
, skb
, tpi
, NULL
, log_ecn_error
);
518 return PACKET_REJECT
;
521 static int ip6erspan_rcv(struct sk_buff
*skb
,
522 struct tnl_ptk_info
*tpi
,
525 struct erspan_base_hdr
*ershdr
;
526 const struct ipv6hdr
*ipv6h
;
527 struct erspan_md2
*md2
;
528 struct ip6_tnl
*tunnel
;
531 if (unlikely(!pskb_may_pull(skb
, sizeof(*ershdr
))))
532 return PACKET_REJECT
;
534 ipv6h
= ipv6_hdr(skb
);
535 ershdr
= (struct erspan_base_hdr
*)skb
->data
;
538 tunnel
= ip6gre_tunnel_lookup(skb
->dev
,
539 &ipv6h
->saddr
, &ipv6h
->daddr
, tpi
->key
,
542 int len
= erspan_hdr_len(ver
);
544 if (unlikely(!pskb_may_pull(skb
, len
)))
545 return PACKET_REJECT
;
547 if (__iptunnel_pull_header(skb
, len
,
550 return PACKET_REJECT
;
552 if (tunnel
->parms
.collect_md
) {
553 struct erspan_metadata
*pkt_md
, *md
;
554 IP_TUNNEL_DECLARE_FLAGS(flags
);
555 struct metadata_dst
*tun_dst
;
556 struct ip_tunnel_info
*info
;
560 __set_bit(IP_TUNNEL_KEY_BIT
, tpi
->flags
);
561 ip_tunnel_flags_copy(flags
, tpi
->flags
);
562 tun_id
= key32_to_tunnel_id(tpi
->key
);
564 tun_dst
= ipv6_tun_rx_dst(skb
, flags
, tun_id
,
567 return PACKET_REJECT
;
569 /* skb can be uncloned in __iptunnel_pull_header, so
570 * old pkt_md is no longer valid and we need to reset
573 gh
= skb_network_header(skb
) +
574 skb_network_header_len(skb
);
575 pkt_md
= (struct erspan_metadata
*)(gh
+ gre_hdr_len
+
577 info
= &tun_dst
->u
.tun_info
;
578 md
= ip_tunnel_info_opts(info
);
581 memcpy(md2
, pkt_md
, ver
== 1 ? ERSPAN_V1_MDSIZE
:
583 __set_bit(IP_TUNNEL_ERSPAN_OPT_BIT
,
584 info
->key
.tun_flags
);
585 info
->options_len
= sizeof(*md
);
587 ip6_tnl_rcv(tunnel
, skb
, tpi
, tun_dst
, log_ecn_error
);
590 ip6_tnl_rcv(tunnel
, skb
, tpi
, NULL
, log_ecn_error
);
596 return PACKET_REJECT
;
599 static int gre_rcv(struct sk_buff
*skb
)
601 struct tnl_ptk_info tpi
;
602 bool csum_err
= false;
605 hdr_len
= gre_parse_header(skb
, &tpi
, &csum_err
, htons(ETH_P_IPV6
), 0);
609 if (iptunnel_pull_header(skb
, hdr_len
, tpi
.proto
, false))
612 if (unlikely(tpi
.proto
== htons(ETH_P_ERSPAN
) ||
613 tpi
.proto
== htons(ETH_P_ERSPAN2
))) {
614 if (ip6erspan_rcv(skb
, &tpi
, hdr_len
) == PACKET_RCVD
)
619 if (ip6gre_rcv(skb
, &tpi
) == PACKET_RCVD
)
623 icmpv6_send(skb
, ICMPV6_DEST_UNREACH
, ICMPV6_PORT_UNREACH
, 0);
629 static int gre_handle_offloads(struct sk_buff
*skb
, bool csum
)
631 return iptunnel_handle_offloads(skb
,
632 csum
? SKB_GSO_GRE_CSUM
: SKB_GSO_GRE
);
635 static void prepare_ip6gre_xmit_ipv4(struct sk_buff
*skb
,
636 struct net_device
*dev
,
637 struct flowi6
*fl6
, __u8
*dsfield
,
640 const struct iphdr
*iph
= ip_hdr(skb
);
641 struct ip6_tnl
*t
= netdev_priv(dev
);
643 if (!(t
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
))
644 *encap_limit
= t
->parms
.encap_limit
;
646 memcpy(fl6
, &t
->fl
.u
.ip6
, sizeof(*fl6
));
648 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_TCLASS
)
649 *dsfield
= ipv4_get_dsfield(iph
);
651 *dsfield
= ip6_tclass(t
->parms
.flowinfo
);
653 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_FWMARK
)
654 fl6
->flowi6_mark
= skb
->mark
;
656 fl6
->flowi6_mark
= t
->parms
.fwmark
;
658 fl6
->flowi6_uid
= sock_net_uid(dev_net(dev
), NULL
);
661 static int prepare_ip6gre_xmit_ipv6(struct sk_buff
*skb
,
662 struct net_device
*dev
,
663 struct flowi6
*fl6
, __u8
*dsfield
,
666 struct ipv6hdr
*ipv6h
;
667 struct ip6_tnl
*t
= netdev_priv(dev
);
670 offset
= ip6_tnl_parse_tlv_enc_lim(skb
, skb_network_header(skb
));
671 /* ip6_tnl_parse_tlv_enc_lim() might have reallocated skb->head */
672 ipv6h
= ipv6_hdr(skb
);
675 struct ipv6_tlv_tnl_enc_lim
*tel
;
677 tel
= (struct ipv6_tlv_tnl_enc_lim
*)&skb_network_header(skb
)[offset
];
678 if (tel
->encap_limit
== 0) {
679 icmpv6_ndo_send(skb
, ICMPV6_PARAMPROB
,
680 ICMPV6_HDR_FIELD
, offset
+ 2);
683 *encap_limit
= tel
->encap_limit
- 1;
684 } else if (!(t
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
)) {
685 *encap_limit
= t
->parms
.encap_limit
;
688 memcpy(fl6
, &t
->fl
.u
.ip6
, sizeof(*fl6
));
690 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_TCLASS
)
691 *dsfield
= ipv6_get_dsfield(ipv6h
);
693 *dsfield
= ip6_tclass(t
->parms
.flowinfo
);
695 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_FLOWLABEL
)
696 fl6
->flowlabel
|= ip6_flowlabel(ipv6h
);
698 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_FWMARK
)
699 fl6
->flowi6_mark
= skb
->mark
;
701 fl6
->flowi6_mark
= t
->parms
.fwmark
;
703 fl6
->flowi6_uid
= sock_net_uid(dev_net(dev
), NULL
);
708 static int prepare_ip6gre_xmit_other(struct sk_buff
*skb
,
709 struct net_device
*dev
,
710 struct flowi6
*fl6
, __u8
*dsfield
,
713 struct ip6_tnl
*t
= netdev_priv(dev
);
715 if (!(t
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
))
716 *encap_limit
= t
->parms
.encap_limit
;
718 memcpy(fl6
, &t
->fl
.u
.ip6
, sizeof(*fl6
));
720 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_TCLASS
)
723 *dsfield
= ip6_tclass(t
->parms
.flowinfo
);
725 if (t
->parms
.flags
& IP6_TNL_F_USE_ORIG_FWMARK
)
726 fl6
->flowi6_mark
= skb
->mark
;
728 fl6
->flowi6_mark
= t
->parms
.fwmark
;
730 fl6
->flowi6_uid
= sock_net_uid(dev_net(dev
), NULL
);
735 static struct ip_tunnel_info
*skb_tunnel_info_txcheck(struct sk_buff
*skb
)
737 struct ip_tunnel_info
*tun_info
;
739 tun_info
= skb_tunnel_info(skb
);
740 if (unlikely(!tun_info
|| !(tun_info
->mode
& IP_TUNNEL_INFO_TX
)))
741 return ERR_PTR(-EINVAL
);
746 static netdev_tx_t
__gre6_xmit(struct sk_buff
*skb
,
747 struct net_device
*dev
, __u8 dsfield
,
748 struct flowi6
*fl6
, int encap_limit
,
749 __u32
*pmtu
, __be16 proto
)
751 struct ip6_tnl
*tunnel
= netdev_priv(dev
);
752 IP_TUNNEL_DECLARE_FLAGS(flags
);
755 if (dev
->type
== ARPHRD_ETHER
)
756 IPCB(skb
)->flags
= 0;
758 if (dev
->header_ops
&& dev
->type
== ARPHRD_IP6GRE
)
759 fl6
->daddr
= ((struct ipv6hdr
*)skb
->data
)->daddr
;
761 fl6
->daddr
= tunnel
->parms
.raddr
;
763 /* Push GRE header. */
764 protocol
= (dev
->type
== ARPHRD_ETHER
) ? htons(ETH_P_TEB
) : proto
;
766 if (tunnel
->parms
.collect_md
) {
767 struct ip_tunnel_info
*tun_info
;
768 const struct ip_tunnel_key
*key
;
771 tun_info
= skb_tunnel_info_txcheck(skb
);
772 if (IS_ERR(tun_info
) ||
773 unlikely(ip_tunnel_info_af(tun_info
) != AF_INET6
))
776 key
= &tun_info
->key
;
777 memset(fl6
, 0, sizeof(*fl6
));
778 fl6
->flowi6_proto
= IPPROTO_GRE
;
779 fl6
->daddr
= key
->u
.ipv6
.dst
;
780 fl6
->flowlabel
= key
->label
;
781 fl6
->flowi6_uid
= sock_net_uid(dev_net(dev
), NULL
);
782 fl6
->fl6_gre_key
= tunnel_id_to_key32(key
->tun_id
);
785 ip_tunnel_flags_zero(flags
);
786 __set_bit(IP_TUNNEL_CSUM_BIT
, flags
);
787 __set_bit(IP_TUNNEL_KEY_BIT
, flags
);
788 __set_bit(IP_TUNNEL_SEQ_BIT
, flags
);
789 ip_tunnel_flags_and(flags
, flags
, key
->tun_flags
);
790 tun_hlen
= gre_calc_hlen(flags
);
792 if (skb_cow_head(skb
, dev
->needed_headroom
?: tun_hlen
+ tunnel
->encap_hlen
))
795 gre_build_header(skb
, tun_hlen
,
797 tunnel_id_to_key32(tun_info
->key
.tun_id
),
798 test_bit(IP_TUNNEL_SEQ_BIT
, flags
) ?
799 htonl(atomic_fetch_inc(&tunnel
->o_seqno
)) :
803 if (skb_cow_head(skb
, dev
->needed_headroom
?: tunnel
->hlen
))
806 ip_tunnel_flags_copy(flags
, tunnel
->parms
.o_flags
);
808 gre_build_header(skb
, tunnel
->tun_hlen
, flags
,
809 protocol
, tunnel
->parms
.o_key
,
810 test_bit(IP_TUNNEL_SEQ_BIT
, flags
) ?
811 htonl(atomic_fetch_inc(&tunnel
->o_seqno
)) :
815 return ip6_tnl_xmit(skb
, dev
, dsfield
, fl6
, encap_limit
, pmtu
,
819 static inline int ip6gre_xmit_ipv4(struct sk_buff
*skb
, struct net_device
*dev
)
821 struct ip6_tnl
*t
= netdev_priv(dev
);
822 int encap_limit
= -1;
828 memset(&(IPCB(skb
)->opt
), 0, sizeof(IPCB(skb
)->opt
));
830 if (!t
->parms
.collect_md
)
831 prepare_ip6gre_xmit_ipv4(skb
, dev
, &fl6
,
832 &dsfield
, &encap_limit
);
834 err
= gre_handle_offloads(skb
, test_bit(IP_TUNNEL_CSUM_BIT
,
839 err
= __gre6_xmit(skb
, dev
, dsfield
, &fl6
, encap_limit
, &mtu
,
842 /* XXX: send ICMP error even if DF is not set. */
843 if (err
== -EMSGSIZE
)
844 icmp_ndo_send(skb
, ICMP_DEST_UNREACH
, ICMP_FRAG_NEEDED
,
852 static inline int ip6gre_xmit_ipv6(struct sk_buff
*skb
, struct net_device
*dev
)
854 struct ip6_tnl
*t
= netdev_priv(dev
);
855 struct ipv6hdr
*ipv6h
= ipv6_hdr(skb
);
856 int encap_limit
= -1;
862 if (ipv6_addr_equal(&t
->parms
.raddr
, &ipv6h
->saddr
))
865 if (!t
->parms
.collect_md
&&
866 prepare_ip6gre_xmit_ipv6(skb
, dev
, &fl6
, &dsfield
, &encap_limit
))
869 if (gre_handle_offloads(skb
, test_bit(IP_TUNNEL_CSUM_BIT
,
873 err
= __gre6_xmit(skb
, dev
, dsfield
, &fl6
, encap_limit
,
874 &mtu
, skb
->protocol
);
876 if (err
== -EMSGSIZE
)
877 icmpv6_ndo_send(skb
, ICMPV6_PKT_TOOBIG
, 0, mtu
);
884 static int ip6gre_xmit_other(struct sk_buff
*skb
, struct net_device
*dev
)
886 struct ip6_tnl
*t
= netdev_priv(dev
);
887 int encap_limit
= -1;
893 if (!t
->parms
.collect_md
&&
894 prepare_ip6gre_xmit_other(skb
, dev
, &fl6
, &dsfield
, &encap_limit
))
897 err
= gre_handle_offloads(skb
, test_bit(IP_TUNNEL_CSUM_BIT
,
901 err
= __gre6_xmit(skb
, dev
, dsfield
, &fl6
, encap_limit
, &mtu
, skb
->protocol
);
906 static netdev_tx_t
ip6gre_tunnel_xmit(struct sk_buff
*skb
,
907 struct net_device
*dev
)
909 struct ip6_tnl
*t
= netdev_priv(dev
);
910 __be16 payload_protocol
;
913 if (!pskb_inet_may_pull(skb
))
916 if (!ip6_tnl_xmit_ctl(t
, &t
->parms
.laddr
, &t
->parms
.raddr
))
919 payload_protocol
= skb_protocol(skb
, true);
920 switch (payload_protocol
) {
921 case htons(ETH_P_IP
):
922 ret
= ip6gre_xmit_ipv4(skb
, dev
);
924 case htons(ETH_P_IPV6
):
925 ret
= ip6gre_xmit_ipv6(skb
, dev
);
928 ret
= ip6gre_xmit_other(skb
, dev
);
938 if (!t
->parms
.collect_md
|| !IS_ERR(skb_tunnel_info_txcheck(skb
)))
939 DEV_STATS_INC(dev
, tx_errors
);
940 DEV_STATS_INC(dev
, tx_dropped
);
945 static netdev_tx_t
ip6erspan_tunnel_xmit(struct sk_buff
*skb
,
946 struct net_device
*dev
)
948 struct ip_tunnel_info
*tun_info
= NULL
;
949 struct ip6_tnl
*t
= netdev_priv(dev
);
950 struct dst_entry
*dst
= skb_dst(skb
);
951 IP_TUNNEL_DECLARE_FLAGS(flags
) = { };
952 bool truncate
= false;
953 int encap_limit
= -1;
954 __u8 dsfield
= false;
961 if (!pskb_inet_may_pull(skb
))
964 if (!ip6_tnl_xmit_ctl(t
, &t
->parms
.laddr
, &t
->parms
.raddr
))
967 if (gre_handle_offloads(skb
, false))
970 if (skb
->len
> dev
->mtu
+ dev
->hard_header_len
) {
971 if (pskb_trim(skb
, dev
->mtu
+ dev
->hard_header_len
))
976 nhoff
= skb_network_offset(skb
);
977 if (skb
->protocol
== htons(ETH_P_IP
) &&
978 (ntohs(ip_hdr(skb
)->tot_len
) > skb
->len
- nhoff
))
981 if (skb
->protocol
== htons(ETH_P_IPV6
)) {
984 if (skb_transport_header_was_set(skb
))
985 thoff
= skb_transport_offset(skb
);
987 thoff
= nhoff
+ sizeof(struct ipv6hdr
);
988 if (ntohs(ipv6_hdr(skb
)->payload_len
) > skb
->len
- thoff
)
992 if (skb_cow_head(skb
, dev
->needed_headroom
?: t
->hlen
))
995 __clear_bit(IP_TUNNEL_KEY_BIT
, t
->parms
.o_flags
);
996 IPCB(skb
)->flags
= 0;
998 /* For collect_md mode, derive fl6 from the tunnel key,
999 * for native mode, call prepare_ip6gre_xmit_{ipv4,ipv6}.
1001 if (t
->parms
.collect_md
) {
1002 const struct ip_tunnel_key
*key
;
1003 struct erspan_metadata
*md
;
1006 tun_info
= skb_tunnel_info_txcheck(skb
);
1007 if (IS_ERR(tun_info
) ||
1008 unlikely(ip_tunnel_info_af(tun_info
) != AF_INET6
))
1011 key
= &tun_info
->key
;
1012 memset(&fl6
, 0, sizeof(fl6
));
1013 fl6
.flowi6_proto
= IPPROTO_GRE
;
1014 fl6
.daddr
= key
->u
.ipv6
.dst
;
1015 fl6
.flowlabel
= key
->label
;
1016 fl6
.flowi6_uid
= sock_net_uid(dev_net(dev
), NULL
);
1017 fl6
.fl6_gre_key
= tunnel_id_to_key32(key
->tun_id
);
1020 if (!test_bit(IP_TUNNEL_ERSPAN_OPT_BIT
,
1021 tun_info
->key
.tun_flags
))
1023 if (tun_info
->options_len
< sizeof(*md
))
1025 md
= ip_tunnel_info_opts(tun_info
);
1027 tun_id
= tunnel_id_to_key32(key
->tun_id
);
1028 if (md
->version
== 1) {
1029 erspan_build_header(skb
,
1031 ntohl(md
->u
.index
), truncate
,
1033 proto
= htons(ETH_P_ERSPAN
);
1034 } else if (md
->version
== 2) {
1035 erspan_build_header_v2(skb
,
1038 get_hwid(&md
->u
.md2
),
1040 proto
= htons(ETH_P_ERSPAN2
);
1045 switch (skb
->protocol
) {
1046 case htons(ETH_P_IP
):
1047 memset(&(IPCB(skb
)->opt
), 0, sizeof(IPCB(skb
)->opt
));
1048 prepare_ip6gre_xmit_ipv4(skb
, dev
, &fl6
,
1049 &dsfield
, &encap_limit
);
1051 case htons(ETH_P_IPV6
):
1052 if (ipv6_addr_equal(&t
->parms
.raddr
, &ipv6_hdr(skb
)->saddr
))
1054 if (prepare_ip6gre_xmit_ipv6(skb
, dev
, &fl6
,
1055 &dsfield
, &encap_limit
))
1059 memcpy(&fl6
, &t
->fl
.u
.ip6
, sizeof(fl6
));
1063 if (t
->parms
.erspan_ver
== 1) {
1064 erspan_build_header(skb
, ntohl(t
->parms
.o_key
),
1067 proto
= htons(ETH_P_ERSPAN
);
1068 } else if (t
->parms
.erspan_ver
== 2) {
1069 erspan_build_header_v2(skb
, ntohl(t
->parms
.o_key
),
1073 proto
= htons(ETH_P_ERSPAN2
);
1078 fl6
.daddr
= t
->parms
.raddr
;
1081 /* Push GRE header. */
1082 __set_bit(IP_TUNNEL_SEQ_BIT
, flags
);
1083 gre_build_header(skb
, 8, flags
, proto
, 0,
1084 htonl(atomic_fetch_inc(&t
->o_seqno
)));
1086 /* TooBig packet may have updated dst->dev's mtu */
1087 if (!t
->parms
.collect_md
&& dst
&& dst_mtu(dst
) > dst
->dev
->mtu
)
1088 dst
->ops
->update_pmtu(dst
, NULL
, skb
, dst
->dev
->mtu
, false);
1090 err
= ip6_tnl_xmit(skb
, dev
, dsfield
, &fl6
, encap_limit
, &mtu
,
1093 /* XXX: send ICMP error even if DF is not set. */
1094 if (err
== -EMSGSIZE
) {
1095 if (skb
->protocol
== htons(ETH_P_IP
))
1096 icmp_ndo_send(skb
, ICMP_DEST_UNREACH
,
1097 ICMP_FRAG_NEEDED
, htonl(mtu
));
1099 icmpv6_ndo_send(skb
, ICMPV6_PKT_TOOBIG
, 0, mtu
);
1104 return NETDEV_TX_OK
;
1107 if (!IS_ERR(tun_info
))
1108 DEV_STATS_INC(dev
, tx_errors
);
1109 DEV_STATS_INC(dev
, tx_dropped
);
1111 return NETDEV_TX_OK
;
1114 static void ip6gre_tnl_link_config_common(struct ip6_tnl
*t
)
1116 struct net_device
*dev
= t
->dev
;
1117 struct __ip6_tnl_parm
*p
= &t
->parms
;
1118 struct flowi6
*fl6
= &t
->fl
.u
.ip6
;
1120 if (dev
->type
!= ARPHRD_ETHER
) {
1121 __dev_addr_set(dev
, &p
->laddr
, sizeof(struct in6_addr
));
1122 memcpy(dev
->broadcast
, &p
->raddr
, sizeof(struct in6_addr
));
1125 /* Set up flowi template */
1126 fl6
->saddr
= p
->laddr
;
1127 fl6
->daddr
= p
->raddr
;
1128 fl6
->flowi6_oif
= p
->link
;
1130 fl6
->flowi6_proto
= IPPROTO_GRE
;
1131 fl6
->fl6_gre_key
= t
->parms
.o_key
;
1133 if (!(p
->flags
&IP6_TNL_F_USE_ORIG_TCLASS
))
1134 fl6
->flowlabel
|= IPV6_TCLASS_MASK
& p
->flowinfo
;
1135 if (!(p
->flags
&IP6_TNL_F_USE_ORIG_FLOWLABEL
))
1136 fl6
->flowlabel
|= IPV6_FLOWLABEL_MASK
& p
->flowinfo
;
1138 p
->flags
&= ~(IP6_TNL_F_CAP_XMIT
|IP6_TNL_F_CAP_RCV
|IP6_TNL_F_CAP_PER_PACKET
);
1139 p
->flags
|= ip6_tnl_get_cap(t
, &p
->laddr
, &p
->raddr
);
1141 if (p
->flags
&IP6_TNL_F_CAP_XMIT
&&
1142 p
->flags
&IP6_TNL_F_CAP_RCV
&& dev
->type
!= ARPHRD_ETHER
)
1143 dev
->flags
|= IFF_POINTOPOINT
;
1145 dev
->flags
&= ~IFF_POINTOPOINT
;
1148 static void ip6gre_tnl_link_config_route(struct ip6_tnl
*t
, int set_mtu
,
1151 const struct __ip6_tnl_parm
*p
= &t
->parms
;
1152 struct net_device
*dev
= t
->dev
;
1154 if (p
->flags
& IP6_TNL_F_CAP_XMIT
) {
1155 int strict
= (ipv6_addr_type(&p
->raddr
) &
1156 (IPV6_ADDR_MULTICAST
|IPV6_ADDR_LINKLOCAL
));
1158 struct rt6_info
*rt
= rt6_lookup(t
->net
,
1159 &p
->raddr
, &p
->laddr
,
1160 p
->link
, NULL
, strict
);
1166 unsigned short dst_len
= rt
->dst
.dev
->hard_header_len
+
1169 if (t
->dev
->header_ops
)
1170 dev
->hard_header_len
= dst_len
;
1172 dev
->needed_headroom
= dst_len
;
1175 int mtu
= rt
->dst
.dev
->mtu
- t_hlen
;
1177 if (!(t
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
))
1179 if (dev
->type
== ARPHRD_ETHER
)
1182 if (mtu
< IPV6_MIN_MTU
)
1184 WRITE_ONCE(dev
->mtu
, mtu
);
1191 static int ip6gre_calc_hlen(struct ip6_tnl
*tunnel
)
1195 tunnel
->tun_hlen
= gre_calc_hlen(tunnel
->parms
.o_flags
);
1196 tunnel
->hlen
= tunnel
->tun_hlen
+ tunnel
->encap_hlen
;
1198 t_hlen
= tunnel
->hlen
+ sizeof(struct ipv6hdr
);
1200 if (tunnel
->dev
->header_ops
)
1201 tunnel
->dev
->hard_header_len
= LL_MAX_HEADER
+ t_hlen
;
1203 tunnel
->dev
->needed_headroom
= LL_MAX_HEADER
+ t_hlen
;
1208 static void ip6gre_tnl_link_config(struct ip6_tnl
*t
, int set_mtu
)
1210 ip6gre_tnl_link_config_common(t
);
1211 ip6gre_tnl_link_config_route(t
, set_mtu
, ip6gre_calc_hlen(t
));
1214 static void ip6gre_tnl_copy_tnl_parm(struct ip6_tnl
*t
,
1215 const struct __ip6_tnl_parm
*p
)
1217 t
->parms
.laddr
= p
->laddr
;
1218 t
->parms
.raddr
= p
->raddr
;
1219 t
->parms
.flags
= p
->flags
;
1220 t
->parms
.hop_limit
= p
->hop_limit
;
1221 t
->parms
.encap_limit
= p
->encap_limit
;
1222 t
->parms
.flowinfo
= p
->flowinfo
;
1223 t
->parms
.link
= p
->link
;
1224 t
->parms
.proto
= p
->proto
;
1225 t
->parms
.i_key
= p
->i_key
;
1226 t
->parms
.o_key
= p
->o_key
;
1227 ip_tunnel_flags_copy(t
->parms
.i_flags
, p
->i_flags
);
1228 ip_tunnel_flags_copy(t
->parms
.o_flags
, p
->o_flags
);
1229 t
->parms
.fwmark
= p
->fwmark
;
1230 t
->parms
.erspan_ver
= p
->erspan_ver
;
1231 t
->parms
.index
= p
->index
;
1232 t
->parms
.dir
= p
->dir
;
1233 t
->parms
.hwid
= p
->hwid
;
1234 dst_cache_reset(&t
->dst_cache
);
1237 static int ip6gre_tnl_change(struct ip6_tnl
*t
, const struct __ip6_tnl_parm
*p
,
1240 ip6gre_tnl_copy_tnl_parm(t
, p
);
1241 ip6gre_tnl_link_config(t
, set_mtu
);
1245 static void ip6gre_tnl_parm_from_user(struct __ip6_tnl_parm
*p
,
1246 const struct ip6_tnl_parm2
*u
)
1248 p
->laddr
= u
->laddr
;
1249 p
->raddr
= u
->raddr
;
1250 p
->flags
= u
->flags
;
1251 p
->hop_limit
= u
->hop_limit
;
1252 p
->encap_limit
= u
->encap_limit
;
1253 p
->flowinfo
= u
->flowinfo
;
1255 p
->i_key
= u
->i_key
;
1256 p
->o_key
= u
->o_key
;
1257 gre_flags_to_tnl_flags(p
->i_flags
, u
->i_flags
);
1258 gre_flags_to_tnl_flags(p
->o_flags
, u
->o_flags
);
1259 memcpy(p
->name
, u
->name
, sizeof(u
->name
));
1262 static void ip6gre_tnl_parm_to_user(struct ip6_tnl_parm2
*u
,
1263 const struct __ip6_tnl_parm
*p
)
1265 u
->proto
= IPPROTO_GRE
;
1266 u
->laddr
= p
->laddr
;
1267 u
->raddr
= p
->raddr
;
1268 u
->flags
= p
->flags
;
1269 u
->hop_limit
= p
->hop_limit
;
1270 u
->encap_limit
= p
->encap_limit
;
1271 u
->flowinfo
= p
->flowinfo
;
1273 u
->i_key
= p
->i_key
;
1274 u
->o_key
= p
->o_key
;
1275 u
->i_flags
= gre_tnl_flags_to_gre_flags(p
->i_flags
);
1276 u
->o_flags
= gre_tnl_flags_to_gre_flags(p
->o_flags
);
1277 memcpy(u
->name
, p
->name
, sizeof(u
->name
));
1280 static int ip6gre_tunnel_siocdevprivate(struct net_device
*dev
,
1281 struct ifreq
*ifr
, void __user
*data
,
1285 struct ip6_tnl_parm2 p
;
1286 struct __ip6_tnl_parm p1
;
1287 struct ip6_tnl
*t
= netdev_priv(dev
);
1288 struct net
*net
= t
->net
;
1289 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
1291 memset(&p1
, 0, sizeof(p1
));
1295 if (dev
== ign
->fb_tunnel_dev
) {
1296 if (copy_from_user(&p
, data
, sizeof(p
))) {
1300 ip6gre_tnl_parm_from_user(&p1
, &p
);
1301 t
= ip6gre_tunnel_locate(net
, &p1
, 0);
1303 t
= netdev_priv(dev
);
1305 memset(&p
, 0, sizeof(p
));
1306 ip6gre_tnl_parm_to_user(&p
, &t
->parms
);
1307 if (copy_to_user(data
, &p
, sizeof(p
)))
1314 if (!ns_capable(net
->user_ns
, CAP_NET_ADMIN
))
1318 if (copy_from_user(&p
, data
, sizeof(p
)))
1322 if ((p
.i_flags
|p
.o_flags
)&(GRE_VERSION
|GRE_ROUTING
))
1325 if (!(p
.i_flags
&GRE_KEY
))
1327 if (!(p
.o_flags
&GRE_KEY
))
1330 ip6gre_tnl_parm_from_user(&p1
, &p
);
1331 t
= ip6gre_tunnel_locate(net
, &p1
, cmd
== SIOCADDTUNNEL
);
1333 if (dev
!= ign
->fb_tunnel_dev
&& cmd
== SIOCCHGTUNNEL
) {
1335 if (t
->dev
!= dev
) {
1340 t
= netdev_priv(dev
);
1342 ip6gre_tunnel_unlink(ign
, t
);
1344 ip6gre_tnl_change(t
, &p1
, 1);
1345 ip6gre_tunnel_link(ign
, t
);
1346 netdev_state_change(dev
);
1353 memset(&p
, 0, sizeof(p
));
1354 ip6gre_tnl_parm_to_user(&p
, &t
->parms
);
1355 if (copy_to_user(data
, &p
, sizeof(p
)))
1358 err
= (cmd
== SIOCADDTUNNEL
? -ENOBUFS
: -ENOENT
);
1363 if (!ns_capable(net
->user_ns
, CAP_NET_ADMIN
))
1366 if (dev
== ign
->fb_tunnel_dev
) {
1368 if (copy_from_user(&p
, data
, sizeof(p
)))
1371 ip6gre_tnl_parm_from_user(&p1
, &p
);
1372 t
= ip6gre_tunnel_locate(net
, &p1
, 0);
1376 if (t
== netdev_priv(ign
->fb_tunnel_dev
))
1380 unregister_netdevice(dev
);
1392 static int ip6gre_header(struct sk_buff
*skb
, struct net_device
*dev
,
1393 unsigned short type
, const void *daddr
,
1394 const void *saddr
, unsigned int len
)
1396 struct ip6_tnl
*t
= netdev_priv(dev
);
1397 struct ipv6hdr
*ipv6h
;
1400 ipv6h
= skb_push(skb
, t
->hlen
+ sizeof(*ipv6h
));
1401 ip6_flow_hdr(ipv6h
, 0, ip6_make_flowlabel(dev_net(dev
), skb
,
1402 t
->fl
.u
.ip6
.flowlabel
,
1403 true, &t
->fl
.u
.ip6
));
1404 ipv6h
->hop_limit
= t
->parms
.hop_limit
;
1405 ipv6h
->nexthdr
= NEXTHDR_GRE
;
1406 ipv6h
->saddr
= t
->parms
.laddr
;
1407 ipv6h
->daddr
= t
->parms
.raddr
;
1409 p
= (__be16
*)(ipv6h
+ 1);
1410 p
[0] = ip_tunnel_flags_to_be16(t
->parms
.o_flags
);
1414 * Set the source hardware address.
1418 memcpy(&ipv6h
->saddr
, saddr
, sizeof(struct in6_addr
));
1420 memcpy(&ipv6h
->daddr
, daddr
, sizeof(struct in6_addr
));
1421 if (!ipv6_addr_any(&ipv6h
->daddr
))
1427 static const struct header_ops ip6gre_header_ops
= {
1428 .create
= ip6gre_header
,
1431 static const struct net_device_ops ip6gre_netdev_ops
= {
1432 .ndo_init
= ip6gre_tunnel_init
,
1433 .ndo_uninit
= ip6gre_tunnel_uninit
,
1434 .ndo_start_xmit
= ip6gre_tunnel_xmit
,
1435 .ndo_siocdevprivate
= ip6gre_tunnel_siocdevprivate
,
1436 .ndo_change_mtu
= ip6_tnl_change_mtu
,
1437 .ndo_get_iflink
= ip6_tnl_get_iflink
,
1440 static void ip6gre_dev_free(struct net_device
*dev
)
1442 struct ip6_tnl
*t
= netdev_priv(dev
);
1444 gro_cells_destroy(&t
->gro_cells
);
1445 dst_cache_destroy(&t
->dst_cache
);
1448 static void ip6gre_tunnel_setup(struct net_device
*dev
)
1450 dev
->netdev_ops
= &ip6gre_netdev_ops
;
1451 dev
->needs_free_netdev
= true;
1452 dev
->priv_destructor
= ip6gre_dev_free
;
1454 dev
->pcpu_stat_type
= NETDEV_PCPU_STAT_TSTATS
;
1455 dev
->type
= ARPHRD_IP6GRE
;
1457 dev
->flags
|= IFF_NOARP
;
1458 dev
->addr_len
= sizeof(struct in6_addr
);
1459 netif_keep_dst(dev
);
1460 /* This perm addr will be used as interface identifier by IPv6 */
1461 dev
->addr_assign_type
= NET_ADDR_RANDOM
;
1462 eth_random_addr(dev
->perm_addr
);
1465 #define GRE6_FEATURES (NETIF_F_SG | \
1466 NETIF_F_FRAGLIST | \
1470 static void ip6gre_tnl_init_features(struct net_device
*dev
)
1472 struct ip6_tnl
*nt
= netdev_priv(dev
);
1474 dev
->features
|= GRE6_FEATURES
;
1475 dev
->hw_features
|= GRE6_FEATURES
;
1477 /* TCP offload with GRE SEQ is not supported, nor can we support 2
1478 * levels of outer headers requiring an update.
1480 if (test_bit(IP_TUNNEL_SEQ_BIT
, nt
->parms
.o_flags
))
1482 if (test_bit(IP_TUNNEL_CSUM_BIT
, nt
->parms
.o_flags
) &&
1483 nt
->encap
.type
!= TUNNEL_ENCAP_NONE
)
1486 dev
->features
|= NETIF_F_GSO_SOFTWARE
;
1487 dev
->hw_features
|= NETIF_F_GSO_SOFTWARE
;
1492 static int ip6gre_tunnel_init_common(struct net_device
*dev
)
1494 struct ip6_tnl
*tunnel
;
1498 tunnel
= netdev_priv(dev
);
1501 tunnel
->net
= dev_net(dev
);
1502 strcpy(tunnel
->parms
.name
, dev
->name
);
1504 ret
= dst_cache_init(&tunnel
->dst_cache
, GFP_KERNEL
);
1508 ret
= gro_cells_init(&tunnel
->gro_cells
, dev
);
1510 goto cleanup_dst_cache_init
;
1512 t_hlen
= ip6gre_calc_hlen(tunnel
);
1513 dev
->mtu
= ETH_DATA_LEN
- t_hlen
;
1514 if (dev
->type
== ARPHRD_ETHER
)
1515 dev
->mtu
-= ETH_HLEN
;
1516 if (!(tunnel
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
))
1519 if (tunnel
->parms
.collect_md
) {
1520 netif_keep_dst(dev
);
1522 ip6gre_tnl_init_features(dev
);
1524 netdev_hold(dev
, &tunnel
->dev_tracker
, GFP_KERNEL
);
1525 netdev_lockdep_set_classes(dev
);
1528 cleanup_dst_cache_init
:
1529 dst_cache_destroy(&tunnel
->dst_cache
);
1533 static int ip6gre_tunnel_init(struct net_device
*dev
)
1535 struct ip6_tnl
*tunnel
;
1538 ret
= ip6gre_tunnel_init_common(dev
);
1542 tunnel
= netdev_priv(dev
);
1544 if (tunnel
->parms
.collect_md
)
1547 __dev_addr_set(dev
, &tunnel
->parms
.laddr
, sizeof(struct in6_addr
));
1548 memcpy(dev
->broadcast
, &tunnel
->parms
.raddr
, sizeof(struct in6_addr
));
1550 if (ipv6_addr_any(&tunnel
->parms
.raddr
))
1551 dev
->header_ops
= &ip6gre_header_ops
;
1556 static void ip6gre_fb_tunnel_init(struct net_device
*dev
)
1558 struct ip6_tnl
*tunnel
= netdev_priv(dev
);
1561 tunnel
->net
= dev_net(dev
);
1562 strcpy(tunnel
->parms
.name
, dev
->name
);
1564 tunnel
->hlen
= sizeof(struct ipv6hdr
) + 4;
1567 static struct inet6_protocol ip6gre_protocol __read_mostly
= {
1569 .err_handler
= ip6gre_err
,
1570 .flags
= INET6_PROTO_FINAL
,
1573 static void ip6gre_destroy_tunnels(struct net
*net
, struct list_head
*head
)
1575 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
1576 struct net_device
*dev
, *aux
;
1579 for_each_netdev_safe(net
, dev
, aux
)
1580 if (dev
->rtnl_link_ops
== &ip6gre_link_ops
||
1581 dev
->rtnl_link_ops
== &ip6gre_tap_ops
||
1582 dev
->rtnl_link_ops
== &ip6erspan_tap_ops
)
1583 unregister_netdevice_queue(dev
, head
);
1585 for (prio
= 0; prio
< 4; prio
++) {
1587 for (h
= 0; h
< IP6_GRE_HASH_SIZE
; h
++) {
1590 t
= rtnl_dereference(ign
->tunnels
[prio
][h
]);
1593 /* If dev is in the same netns, it has already
1594 * been added to the list by the previous loop.
1596 if (!net_eq(dev_net(t
->dev
), net
))
1597 unregister_netdevice_queue(t
->dev
,
1599 t
= rtnl_dereference(t
->next
);
1605 static int __net_init
ip6gre_init_net(struct net
*net
)
1607 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
1608 struct net_device
*ndev
;
1611 if (!net_has_fallback_tunnels(net
))
1613 ndev
= alloc_netdev(sizeof(struct ip6_tnl
), "ip6gre0",
1614 NET_NAME_UNKNOWN
, ip6gre_tunnel_setup
);
1619 ign
->fb_tunnel_dev
= ndev
;
1620 dev_net_set(ign
->fb_tunnel_dev
, net
);
1621 /* FB netdevice is special: we have one, and only one per netns.
1622 * Allowing to move it to another netns is clearly unsafe.
1624 ign
->fb_tunnel_dev
->netns_local
= true;
1626 ip6gre_fb_tunnel_init(ign
->fb_tunnel_dev
);
1627 ign
->fb_tunnel_dev
->rtnl_link_ops
= &ip6gre_link_ops
;
1629 err
= register_netdev(ign
->fb_tunnel_dev
);
1633 rcu_assign_pointer(ign
->tunnels_wc
[0],
1634 netdev_priv(ign
->fb_tunnel_dev
));
1643 static void __net_exit
ip6gre_exit_batch_rtnl(struct list_head
*net_list
,
1644 struct list_head
*dev_to_kill
)
1649 list_for_each_entry(net
, net_list
, exit_list
)
1650 ip6gre_destroy_tunnels(net
, dev_to_kill
);
1653 static struct pernet_operations ip6gre_net_ops
= {
1654 .init
= ip6gre_init_net
,
1655 .exit_batch_rtnl
= ip6gre_exit_batch_rtnl
,
1656 .id
= &ip6gre_net_id
,
1657 .size
= sizeof(struct ip6gre_net
),
1660 static int ip6gre_tunnel_validate(struct nlattr
*tb
[], struct nlattr
*data
[],
1661 struct netlink_ext_ack
*extack
)
1669 if (data
[IFLA_GRE_IFLAGS
])
1670 flags
|= nla_get_be16(data
[IFLA_GRE_IFLAGS
]);
1671 if (data
[IFLA_GRE_OFLAGS
])
1672 flags
|= nla_get_be16(data
[IFLA_GRE_OFLAGS
]);
1673 if (flags
& (GRE_VERSION
|GRE_ROUTING
))
1679 static int ip6gre_tap_validate(struct nlattr
*tb
[], struct nlattr
*data
[],
1680 struct netlink_ext_ack
*extack
)
1682 struct in6_addr daddr
;
1684 if (tb
[IFLA_ADDRESS
]) {
1685 if (nla_len(tb
[IFLA_ADDRESS
]) != ETH_ALEN
)
1687 if (!is_valid_ether_addr(nla_data(tb
[IFLA_ADDRESS
])))
1688 return -EADDRNOTAVAIL
;
1694 if (data
[IFLA_GRE_REMOTE
]) {
1695 daddr
= nla_get_in6_addr(data
[IFLA_GRE_REMOTE
]);
1696 if (ipv6_addr_any(&daddr
))
1701 return ip6gre_tunnel_validate(tb
, data
, extack
);
1704 static int ip6erspan_tap_validate(struct nlattr
*tb
[], struct nlattr
*data
[],
1705 struct netlink_ext_ack
*extack
)
1713 ret
= ip6gre_tap_validate(tb
, data
, extack
);
1717 /* ERSPAN should only have GRE sequence and key flag */
1718 if (data
[IFLA_GRE_OFLAGS
])
1719 flags
|= nla_get_be16(data
[IFLA_GRE_OFLAGS
]);
1720 if (data
[IFLA_GRE_IFLAGS
])
1721 flags
|= nla_get_be16(data
[IFLA_GRE_IFLAGS
]);
1722 if (!data
[IFLA_GRE_COLLECT_METADATA
] &&
1723 flags
!= (GRE_SEQ
| GRE_KEY
))
1726 /* ERSPAN Session ID only has 10-bit. Since we reuse
1727 * 32-bit key field as ID, check it's range.
1729 if (data
[IFLA_GRE_IKEY
] &&
1730 (ntohl(nla_get_be32(data
[IFLA_GRE_IKEY
])) & ~ID_MASK
))
1733 if (data
[IFLA_GRE_OKEY
] &&
1734 (ntohl(nla_get_be32(data
[IFLA_GRE_OKEY
])) & ~ID_MASK
))
1737 if (data
[IFLA_GRE_ERSPAN_VER
]) {
1738 ver
= nla_get_u8(data
[IFLA_GRE_ERSPAN_VER
]);
1739 if (ver
!= 1 && ver
!= 2)
1744 if (data
[IFLA_GRE_ERSPAN_INDEX
]) {
1745 u32 index
= nla_get_u32(data
[IFLA_GRE_ERSPAN_INDEX
]);
1747 if (index
& ~INDEX_MASK
)
1750 } else if (ver
== 2) {
1751 if (data
[IFLA_GRE_ERSPAN_DIR
]) {
1752 u16 dir
= nla_get_u8(data
[IFLA_GRE_ERSPAN_DIR
]);
1754 if (dir
& ~(DIR_MASK
>> DIR_OFFSET
))
1758 if (data
[IFLA_GRE_ERSPAN_HWID
]) {
1759 u16 hwid
= nla_get_u16(data
[IFLA_GRE_ERSPAN_HWID
]);
1761 if (hwid
& ~(HWID_MASK
>> HWID_OFFSET
))
1769 static void ip6erspan_set_version(struct nlattr
*data
[],
1770 struct __ip6_tnl_parm
*parms
)
1775 parms
->erspan_ver
= 1;
1776 if (data
[IFLA_GRE_ERSPAN_VER
])
1777 parms
->erspan_ver
= nla_get_u8(data
[IFLA_GRE_ERSPAN_VER
]);
1779 if (parms
->erspan_ver
== 1) {
1780 if (data
[IFLA_GRE_ERSPAN_INDEX
])
1781 parms
->index
= nla_get_u32(data
[IFLA_GRE_ERSPAN_INDEX
]);
1782 } else if (parms
->erspan_ver
== 2) {
1783 if (data
[IFLA_GRE_ERSPAN_DIR
])
1784 parms
->dir
= nla_get_u8(data
[IFLA_GRE_ERSPAN_DIR
]);
1785 if (data
[IFLA_GRE_ERSPAN_HWID
])
1786 parms
->hwid
= nla_get_u16(data
[IFLA_GRE_ERSPAN_HWID
]);
1790 static void ip6gre_netlink_parms(struct nlattr
*data
[],
1791 struct __ip6_tnl_parm
*parms
)
1793 memset(parms
, 0, sizeof(*parms
));
1798 if (data
[IFLA_GRE_LINK
])
1799 parms
->link
= nla_get_u32(data
[IFLA_GRE_LINK
]);
1801 if (data
[IFLA_GRE_IFLAGS
])
1802 gre_flags_to_tnl_flags(parms
->i_flags
,
1803 nla_get_be16(data
[IFLA_GRE_IFLAGS
]));
1805 if (data
[IFLA_GRE_OFLAGS
])
1806 gre_flags_to_tnl_flags(parms
->o_flags
,
1807 nla_get_be16(data
[IFLA_GRE_OFLAGS
]));
1809 if (data
[IFLA_GRE_IKEY
])
1810 parms
->i_key
= nla_get_be32(data
[IFLA_GRE_IKEY
]);
1812 if (data
[IFLA_GRE_OKEY
])
1813 parms
->o_key
= nla_get_be32(data
[IFLA_GRE_OKEY
]);
1815 if (data
[IFLA_GRE_LOCAL
])
1816 parms
->laddr
= nla_get_in6_addr(data
[IFLA_GRE_LOCAL
]);
1818 if (data
[IFLA_GRE_REMOTE
])
1819 parms
->raddr
= nla_get_in6_addr(data
[IFLA_GRE_REMOTE
]);
1821 if (data
[IFLA_GRE_TTL
])
1822 parms
->hop_limit
= nla_get_u8(data
[IFLA_GRE_TTL
]);
1824 if (data
[IFLA_GRE_ENCAP_LIMIT
])
1825 parms
->encap_limit
= nla_get_u8(data
[IFLA_GRE_ENCAP_LIMIT
]);
1827 if (data
[IFLA_GRE_FLOWINFO
])
1828 parms
->flowinfo
= nla_get_be32(data
[IFLA_GRE_FLOWINFO
]);
1830 if (data
[IFLA_GRE_FLAGS
])
1831 parms
->flags
= nla_get_u32(data
[IFLA_GRE_FLAGS
]);
1833 if (data
[IFLA_GRE_FWMARK
])
1834 parms
->fwmark
= nla_get_u32(data
[IFLA_GRE_FWMARK
]);
1836 if (data
[IFLA_GRE_COLLECT_METADATA
])
1837 parms
->collect_md
= true;
1840 static int ip6gre_tap_init(struct net_device
*dev
)
1844 ret
= ip6gre_tunnel_init_common(dev
);
1848 dev
->priv_flags
|= IFF_LIVE_ADDR_CHANGE
;
1853 static const struct net_device_ops ip6gre_tap_netdev_ops
= {
1854 .ndo_init
= ip6gre_tap_init
,
1855 .ndo_uninit
= ip6gre_tunnel_uninit
,
1856 .ndo_start_xmit
= ip6gre_tunnel_xmit
,
1857 .ndo_set_mac_address
= eth_mac_addr
,
1858 .ndo_validate_addr
= eth_validate_addr
,
1859 .ndo_change_mtu
= ip6_tnl_change_mtu
,
1860 .ndo_get_iflink
= ip6_tnl_get_iflink
,
1863 static int ip6erspan_calc_hlen(struct ip6_tnl
*tunnel
)
1867 tunnel
->tun_hlen
= 8;
1868 tunnel
->hlen
= tunnel
->tun_hlen
+ tunnel
->encap_hlen
+
1869 erspan_hdr_len(tunnel
->parms
.erspan_ver
);
1871 t_hlen
= tunnel
->hlen
+ sizeof(struct ipv6hdr
);
1872 tunnel
->dev
->needed_headroom
= LL_MAX_HEADER
+ t_hlen
;
1876 static int ip6erspan_tap_init(struct net_device
*dev
)
1878 struct ip6_tnl
*tunnel
;
1882 tunnel
= netdev_priv(dev
);
1885 tunnel
->net
= dev_net(dev
);
1886 strcpy(tunnel
->parms
.name
, dev
->name
);
1888 ret
= dst_cache_init(&tunnel
->dst_cache
, GFP_KERNEL
);
1892 ret
= gro_cells_init(&tunnel
->gro_cells
, dev
);
1894 goto cleanup_dst_cache_init
;
1896 t_hlen
= ip6erspan_calc_hlen(tunnel
);
1897 dev
->mtu
= ETH_DATA_LEN
- t_hlen
;
1898 if (dev
->type
== ARPHRD_ETHER
)
1899 dev
->mtu
-= ETH_HLEN
;
1900 if (!(tunnel
->parms
.flags
& IP6_TNL_F_IGN_ENCAP_LIMIT
))
1903 dev
->priv_flags
|= IFF_LIVE_ADDR_CHANGE
;
1904 ip6erspan_tnl_link_config(tunnel
, 1);
1906 netdev_hold(dev
, &tunnel
->dev_tracker
, GFP_KERNEL
);
1907 netdev_lockdep_set_classes(dev
);
1910 cleanup_dst_cache_init
:
1911 dst_cache_destroy(&tunnel
->dst_cache
);
1915 static const struct net_device_ops ip6erspan_netdev_ops
= {
1916 .ndo_init
= ip6erspan_tap_init
,
1917 .ndo_uninit
= ip6erspan_tunnel_uninit
,
1918 .ndo_start_xmit
= ip6erspan_tunnel_xmit
,
1919 .ndo_set_mac_address
= eth_mac_addr
,
1920 .ndo_validate_addr
= eth_validate_addr
,
1921 .ndo_change_mtu
= ip6_tnl_change_mtu
,
1922 .ndo_get_iflink
= ip6_tnl_get_iflink
,
1925 static void ip6gre_tap_setup(struct net_device
*dev
)
1931 dev
->netdev_ops
= &ip6gre_tap_netdev_ops
;
1932 dev
->needs_free_netdev
= true;
1933 dev
->priv_destructor
= ip6gre_dev_free
;
1935 dev
->pcpu_stat_type
= NETDEV_PCPU_STAT_TSTATS
;
1936 dev
->priv_flags
&= ~IFF_TX_SKB_SHARING
;
1937 dev
->priv_flags
|= IFF_LIVE_ADDR_CHANGE
;
1938 netif_keep_dst(dev
);
1941 static bool ip6gre_netlink_encap_parms(struct nlattr
*data
[],
1942 struct ip_tunnel_encap
*ipencap
)
1946 memset(ipencap
, 0, sizeof(*ipencap
));
1951 if (data
[IFLA_GRE_ENCAP_TYPE
]) {
1953 ipencap
->type
= nla_get_u16(data
[IFLA_GRE_ENCAP_TYPE
]);
1956 if (data
[IFLA_GRE_ENCAP_FLAGS
]) {
1958 ipencap
->flags
= nla_get_u16(data
[IFLA_GRE_ENCAP_FLAGS
]);
1961 if (data
[IFLA_GRE_ENCAP_SPORT
]) {
1963 ipencap
->sport
= nla_get_be16(data
[IFLA_GRE_ENCAP_SPORT
]);
1966 if (data
[IFLA_GRE_ENCAP_DPORT
]) {
1968 ipencap
->dport
= nla_get_be16(data
[IFLA_GRE_ENCAP_DPORT
]);
1974 static int ip6gre_newlink_common(struct net
*src_net
, struct net_device
*dev
,
1975 struct nlattr
*tb
[], struct nlattr
*data
[],
1976 struct netlink_ext_ack
*extack
)
1979 struct ip_tunnel_encap ipencap
;
1982 nt
= netdev_priv(dev
);
1984 if (ip6gre_netlink_encap_parms(data
, &ipencap
)) {
1985 int err
= ip6_tnl_encap_setup(nt
, &ipencap
);
1991 if (dev
->type
== ARPHRD_ETHER
&& !tb
[IFLA_ADDRESS
])
1992 eth_hw_addr_random(dev
);
1995 nt
->net
= dev_net(dev
);
1997 err
= register_netdevice(dev
);
2002 ip6_tnl_change_mtu(dev
, nla_get_u32(tb
[IFLA_MTU
]));
2008 static int ip6gre_newlink(struct net
*src_net
, struct net_device
*dev
,
2009 struct nlattr
*tb
[], struct nlattr
*data
[],
2010 struct netlink_ext_ack
*extack
)
2012 struct ip6_tnl
*nt
= netdev_priv(dev
);
2013 struct net
*net
= dev_net(dev
);
2014 struct ip6gre_net
*ign
;
2017 ip6gre_netlink_parms(data
, &nt
->parms
);
2018 ign
= net_generic(net
, ip6gre_net_id
);
2020 if (nt
->parms
.collect_md
) {
2021 if (rtnl_dereference(ign
->collect_md_tun
))
2024 if (ip6gre_tunnel_find(net
, &nt
->parms
, dev
->type
))
2028 err
= ip6gre_newlink_common(src_net
, dev
, tb
, data
, extack
);
2030 ip6gre_tnl_link_config(nt
, !tb
[IFLA_MTU
]);
2031 ip6gre_tunnel_link_md(ign
, nt
);
2032 ip6gre_tunnel_link(net_generic(net
, ip6gre_net_id
), nt
);
2037 static struct ip6_tnl
*
2038 ip6gre_changelink_common(struct net_device
*dev
, struct nlattr
*tb
[],
2039 struct nlattr
*data
[], struct __ip6_tnl_parm
*p_p
,
2040 struct netlink_ext_ack
*extack
)
2042 struct ip6_tnl
*t
, *nt
= netdev_priv(dev
);
2043 struct net
*net
= nt
->net
;
2044 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
2045 struct ip_tunnel_encap ipencap
;
2047 if (dev
== ign
->fb_tunnel_dev
)
2048 return ERR_PTR(-EINVAL
);
2050 if (ip6gre_netlink_encap_parms(data
, &ipencap
)) {
2051 int err
= ip6_tnl_encap_setup(nt
, &ipencap
);
2054 return ERR_PTR(err
);
2057 ip6gre_netlink_parms(data
, p_p
);
2059 t
= ip6gre_tunnel_locate(net
, p_p
, 0);
2063 return ERR_PTR(-EEXIST
);
2071 static int ip6gre_changelink(struct net_device
*dev
, struct nlattr
*tb
[],
2072 struct nlattr
*data
[],
2073 struct netlink_ext_ack
*extack
)
2075 struct ip6_tnl
*t
= netdev_priv(dev
);
2076 struct ip6gre_net
*ign
= net_generic(t
->net
, ip6gre_net_id
);
2077 struct __ip6_tnl_parm p
;
2079 t
= ip6gre_changelink_common(dev
, tb
, data
, &p
, extack
);
2083 ip6gre_tunnel_unlink_md(ign
, t
);
2084 ip6gre_tunnel_unlink(ign
, t
);
2085 ip6gre_tnl_change(t
, &p
, !tb
[IFLA_MTU
]);
2086 ip6gre_tunnel_link_md(ign
, t
);
2087 ip6gre_tunnel_link(ign
, t
);
2091 static void ip6gre_dellink(struct net_device
*dev
, struct list_head
*head
)
2093 struct net
*net
= dev_net(dev
);
2094 struct ip6gre_net
*ign
= net_generic(net
, ip6gre_net_id
);
2096 if (dev
!= ign
->fb_tunnel_dev
)
2097 unregister_netdevice_queue(dev
, head
);
2100 static size_t ip6gre_get_size(const struct net_device
*dev
)
2105 /* IFLA_GRE_IFLAGS */
2107 /* IFLA_GRE_OFLAGS */
2113 /* IFLA_GRE_LOCAL */
2114 nla_total_size(sizeof(struct in6_addr
)) +
2115 /* IFLA_GRE_REMOTE */
2116 nla_total_size(sizeof(struct in6_addr
)) +
2119 /* IFLA_GRE_ENCAP_LIMIT */
2121 /* IFLA_GRE_FLOWINFO */
2123 /* IFLA_GRE_FLAGS */
2125 /* IFLA_GRE_ENCAP_TYPE */
2127 /* IFLA_GRE_ENCAP_FLAGS */
2129 /* IFLA_GRE_ENCAP_SPORT */
2131 /* IFLA_GRE_ENCAP_DPORT */
2133 /* IFLA_GRE_COLLECT_METADATA */
2135 /* IFLA_GRE_FWMARK */
2137 /* IFLA_GRE_ERSPAN_INDEX */
2142 static int ip6gre_fill_info(struct sk_buff
*skb
, const struct net_device
*dev
)
2144 struct ip6_tnl
*t
= netdev_priv(dev
);
2145 struct __ip6_tnl_parm
*p
= &t
->parms
;
2146 IP_TUNNEL_DECLARE_FLAGS(o_flags
);
2148 ip_tunnel_flags_copy(o_flags
, p
->o_flags
);
2150 if (p
->erspan_ver
== 1 || p
->erspan_ver
== 2) {
2152 __set_bit(IP_TUNNEL_KEY_BIT
, o_flags
);
2154 if (nla_put_u8(skb
, IFLA_GRE_ERSPAN_VER
, p
->erspan_ver
))
2155 goto nla_put_failure
;
2157 if (p
->erspan_ver
== 1) {
2158 if (nla_put_u32(skb
, IFLA_GRE_ERSPAN_INDEX
, p
->index
))
2159 goto nla_put_failure
;
2161 if (nla_put_u8(skb
, IFLA_GRE_ERSPAN_DIR
, p
->dir
))
2162 goto nla_put_failure
;
2163 if (nla_put_u16(skb
, IFLA_GRE_ERSPAN_HWID
, p
->hwid
))
2164 goto nla_put_failure
;
2168 if (nla_put_u32(skb
, IFLA_GRE_LINK
, p
->link
) ||
2169 nla_put_be16(skb
, IFLA_GRE_IFLAGS
,
2170 gre_tnl_flags_to_gre_flags(p
->i_flags
)) ||
2171 nla_put_be16(skb
, IFLA_GRE_OFLAGS
,
2172 gre_tnl_flags_to_gre_flags(o_flags
)) ||
2173 nla_put_be32(skb
, IFLA_GRE_IKEY
, p
->i_key
) ||
2174 nla_put_be32(skb
, IFLA_GRE_OKEY
, p
->o_key
) ||
2175 nla_put_in6_addr(skb
, IFLA_GRE_LOCAL
, &p
->laddr
) ||
2176 nla_put_in6_addr(skb
, IFLA_GRE_REMOTE
, &p
->raddr
) ||
2177 nla_put_u8(skb
, IFLA_GRE_TTL
, p
->hop_limit
) ||
2178 nla_put_u8(skb
, IFLA_GRE_ENCAP_LIMIT
, p
->encap_limit
) ||
2179 nla_put_be32(skb
, IFLA_GRE_FLOWINFO
, p
->flowinfo
) ||
2180 nla_put_u32(skb
, IFLA_GRE_FLAGS
, p
->flags
) ||
2181 nla_put_u32(skb
, IFLA_GRE_FWMARK
, p
->fwmark
))
2182 goto nla_put_failure
;
2184 if (nla_put_u16(skb
, IFLA_GRE_ENCAP_TYPE
,
2186 nla_put_be16(skb
, IFLA_GRE_ENCAP_SPORT
,
2188 nla_put_be16(skb
, IFLA_GRE_ENCAP_DPORT
,
2190 nla_put_u16(skb
, IFLA_GRE_ENCAP_FLAGS
,
2192 goto nla_put_failure
;
2194 if (p
->collect_md
) {
2195 if (nla_put_flag(skb
, IFLA_GRE_COLLECT_METADATA
))
2196 goto nla_put_failure
;
2205 static const struct nla_policy ip6gre_policy
[IFLA_GRE_MAX
+ 1] = {
2206 [IFLA_GRE_LINK
] = { .type
= NLA_U32
},
2207 [IFLA_GRE_IFLAGS
] = { .type
= NLA_U16
},
2208 [IFLA_GRE_OFLAGS
] = { .type
= NLA_U16
},
2209 [IFLA_GRE_IKEY
] = { .type
= NLA_U32
},
2210 [IFLA_GRE_OKEY
] = { .type
= NLA_U32
},
2211 [IFLA_GRE_LOCAL
] = { .len
= sizeof_field(struct ipv6hdr
, saddr
) },
2212 [IFLA_GRE_REMOTE
] = { .len
= sizeof_field(struct ipv6hdr
, daddr
) },
2213 [IFLA_GRE_TTL
] = { .type
= NLA_U8
},
2214 [IFLA_GRE_ENCAP_LIMIT
] = { .type
= NLA_U8
},
2215 [IFLA_GRE_FLOWINFO
] = { .type
= NLA_U32
},
2216 [IFLA_GRE_FLAGS
] = { .type
= NLA_U32
},
2217 [IFLA_GRE_ENCAP_TYPE
] = { .type
= NLA_U16
},
2218 [IFLA_GRE_ENCAP_FLAGS
] = { .type
= NLA_U16
},
2219 [IFLA_GRE_ENCAP_SPORT
] = { .type
= NLA_U16
},
2220 [IFLA_GRE_ENCAP_DPORT
] = { .type
= NLA_U16
},
2221 [IFLA_GRE_COLLECT_METADATA
] = { .type
= NLA_FLAG
},
2222 [IFLA_GRE_FWMARK
] = { .type
= NLA_U32
},
2223 [IFLA_GRE_ERSPAN_INDEX
] = { .type
= NLA_U32
},
2224 [IFLA_GRE_ERSPAN_VER
] = { .type
= NLA_U8
},
2225 [IFLA_GRE_ERSPAN_DIR
] = { .type
= NLA_U8
},
2226 [IFLA_GRE_ERSPAN_HWID
] = { .type
= NLA_U16
},
2229 static void ip6erspan_tap_setup(struct net_device
*dev
)
2234 dev
->netdev_ops
= &ip6erspan_netdev_ops
;
2235 dev
->needs_free_netdev
= true;
2236 dev
->priv_destructor
= ip6gre_dev_free
;
2238 dev
->pcpu_stat_type
= NETDEV_PCPU_STAT_TSTATS
;
2239 dev
->priv_flags
&= ~IFF_TX_SKB_SHARING
;
2240 dev
->priv_flags
|= IFF_LIVE_ADDR_CHANGE
;
2241 netif_keep_dst(dev
);
2244 static int ip6erspan_newlink(struct net
*src_net
, struct net_device
*dev
,
2245 struct nlattr
*tb
[], struct nlattr
*data
[],
2246 struct netlink_ext_ack
*extack
)
2248 struct ip6_tnl
*nt
= netdev_priv(dev
);
2249 struct net
*net
= dev_net(dev
);
2250 struct ip6gre_net
*ign
;
2253 ip6gre_netlink_parms(data
, &nt
->parms
);
2254 ip6erspan_set_version(data
, &nt
->parms
);
2255 ign
= net_generic(net
, ip6gre_net_id
);
2257 if (nt
->parms
.collect_md
) {
2258 if (rtnl_dereference(ign
->collect_md_tun_erspan
))
2261 if (ip6gre_tunnel_find(net
, &nt
->parms
, dev
->type
))
2265 err
= ip6gre_newlink_common(src_net
, dev
, tb
, data
, extack
);
2267 ip6erspan_tnl_link_config(nt
, !tb
[IFLA_MTU
]);
2268 ip6erspan_tunnel_link_md(ign
, nt
);
2269 ip6gre_tunnel_link(net_generic(net
, ip6gre_net_id
), nt
);
2274 static void ip6erspan_tnl_link_config(struct ip6_tnl
*t
, int set_mtu
)
2276 ip6gre_tnl_link_config_common(t
);
2277 ip6gre_tnl_link_config_route(t
, set_mtu
, ip6erspan_calc_hlen(t
));
2280 static int ip6erspan_tnl_change(struct ip6_tnl
*t
,
2281 const struct __ip6_tnl_parm
*p
, int set_mtu
)
2283 ip6gre_tnl_copy_tnl_parm(t
, p
);
2284 ip6erspan_tnl_link_config(t
, set_mtu
);
2288 static int ip6erspan_changelink(struct net_device
*dev
, struct nlattr
*tb
[],
2289 struct nlattr
*data
[],
2290 struct netlink_ext_ack
*extack
)
2292 struct ip6gre_net
*ign
= net_generic(dev_net(dev
), ip6gre_net_id
);
2293 struct __ip6_tnl_parm p
;
2296 t
= ip6gre_changelink_common(dev
, tb
, data
, &p
, extack
);
2300 ip6erspan_set_version(data
, &p
);
2301 ip6gre_tunnel_unlink_md(ign
, t
);
2302 ip6gre_tunnel_unlink(ign
, t
);
2303 ip6erspan_tnl_change(t
, &p
, !tb
[IFLA_MTU
]);
2304 ip6erspan_tunnel_link_md(ign
, t
);
2305 ip6gre_tunnel_link(ign
, t
);
2309 static struct rtnl_link_ops ip6gre_link_ops __read_mostly
= {
2311 .maxtype
= IFLA_GRE_MAX
,
2312 .policy
= ip6gre_policy
,
2313 .priv_size
= sizeof(struct ip6_tnl
),
2314 .setup
= ip6gre_tunnel_setup
,
2315 .validate
= ip6gre_tunnel_validate
,
2316 .newlink
= ip6gre_newlink
,
2317 .changelink
= ip6gre_changelink
,
2318 .dellink
= ip6gre_dellink
,
2319 .get_size
= ip6gre_get_size
,
2320 .fill_info
= ip6gre_fill_info
,
2321 .get_link_net
= ip6_tnl_get_link_net
,
2324 static struct rtnl_link_ops ip6gre_tap_ops __read_mostly
= {
2325 .kind
= "ip6gretap",
2326 .maxtype
= IFLA_GRE_MAX
,
2327 .policy
= ip6gre_policy
,
2328 .priv_size
= sizeof(struct ip6_tnl
),
2329 .setup
= ip6gre_tap_setup
,
2330 .validate
= ip6gre_tap_validate
,
2331 .newlink
= ip6gre_newlink
,
2332 .changelink
= ip6gre_changelink
,
2333 .get_size
= ip6gre_get_size
,
2334 .fill_info
= ip6gre_fill_info
,
2335 .get_link_net
= ip6_tnl_get_link_net
,
2338 static struct rtnl_link_ops ip6erspan_tap_ops __read_mostly
= {
2339 .kind
= "ip6erspan",
2340 .maxtype
= IFLA_GRE_MAX
,
2341 .policy
= ip6gre_policy
,
2342 .priv_size
= sizeof(struct ip6_tnl
),
2343 .setup
= ip6erspan_tap_setup
,
2344 .validate
= ip6erspan_tap_validate
,
2345 .newlink
= ip6erspan_newlink
,
2346 .changelink
= ip6erspan_changelink
,
2347 .get_size
= ip6gre_get_size
,
2348 .fill_info
= ip6gre_fill_info
,
2349 .get_link_net
= ip6_tnl_get_link_net
,
2353 * And now the modules code and kernel interface.
2356 static int __init
ip6gre_init(void)
2360 pr_info("GRE over IPv6 tunneling driver\n");
2362 err
= register_pernet_device(&ip6gre_net_ops
);
2366 err
= inet6_add_protocol(&ip6gre_protocol
, IPPROTO_GRE
);
2368 pr_info("%s: can't add protocol\n", __func__
);
2369 goto add_proto_failed
;
2372 err
= rtnl_link_register(&ip6gre_link_ops
);
2374 goto rtnl_link_failed
;
2376 err
= rtnl_link_register(&ip6gre_tap_ops
);
2378 goto tap_ops_failed
;
2380 err
= rtnl_link_register(&ip6erspan_tap_ops
);
2382 goto erspan_link_failed
;
2388 rtnl_link_unregister(&ip6gre_tap_ops
);
2390 rtnl_link_unregister(&ip6gre_link_ops
);
2392 inet6_del_protocol(&ip6gre_protocol
, IPPROTO_GRE
);
2394 unregister_pernet_device(&ip6gre_net_ops
);
2398 static void __exit
ip6gre_fini(void)
2400 rtnl_link_unregister(&ip6gre_tap_ops
);
2401 rtnl_link_unregister(&ip6gre_link_ops
);
2402 rtnl_link_unregister(&ip6erspan_tap_ops
);
2403 inet6_del_protocol(&ip6gre_protocol
, IPPROTO_GRE
);
2404 unregister_pernet_device(&ip6gre_net_ops
);
2407 module_init(ip6gre_init
);
2408 module_exit(ip6gre_fini
);
2409 MODULE_LICENSE("GPL");
2410 MODULE_AUTHOR("D. Kozlov <xeb@mail.ru>");
2411 MODULE_DESCRIPTION("GRE over IPv6 tunneling device");
2412 MODULE_ALIAS_RTNL_LINK("ip6gre");
2413 MODULE_ALIAS_RTNL_LINK("ip6gretap");
2414 MODULE_ALIAS_RTNL_LINK("ip6erspan");
2415 MODULE_ALIAS_NETDEV("ip6gre0");