bnx2x: function descriptions format fixed
[deliverable/linux.git] / net / ipv4 / ip_gre.c
CommitLineData
1da177e4 1/*
e905a9ed 2 * Linux NET3: GRE over IP protocol decoder.
1da177e4
LT
3 *
4 * Authors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
4fc268d2 13#include <linux/capability.h>
1da177e4
LT
14#include <linux/module.h>
15#include <linux/types.h>
1da177e4 16#include <linux/kernel.h>
5a0e3ad6 17#include <linux/slab.h>
1da177e4
LT
18#include <asm/uaccess.h>
19#include <linux/skbuff.h>
20#include <linux/netdevice.h>
21#include <linux/in.h>
22#include <linux/tcp.h>
23#include <linux/udp.h>
24#include <linux/if_arp.h>
25#include <linux/mroute.h>
26#include <linux/init.h>
27#include <linux/in6.h>
28#include <linux/inetdevice.h>
29#include <linux/igmp.h>
30#include <linux/netfilter_ipv4.h>
e1a80002 31#include <linux/etherdevice.h>
46f25dff 32#include <linux/if_ether.h>
1da177e4
LT
33
34#include <net/sock.h>
35#include <net/ip.h>
36#include <net/icmp.h>
37#include <net/protocol.h>
38#include <net/ipip.h>
39#include <net/arp.h>
40#include <net/checksum.h>
41#include <net/dsfield.h>
42#include <net/inet_ecn.h>
43#include <net/xfrm.h>
59a4c759
PE
44#include <net/net_namespace.h>
45#include <net/netns/generic.h>
c19e654d 46#include <net/rtnetlink.h>
00959ade 47#include <net/gre.h>
1da177e4 48
842c74bf 49#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4
LT
50#include <net/ipv6.h>
51#include <net/ip6_fib.h>
52#include <net/ip6_route.h>
53#endif
54
55/*
56 Problems & solutions
57 --------------------
58
59 1. The most important issue is detecting local dead loops.
60 They would cause complete host lockup in transmit, which
61 would be "resolved" by stack overflow or, if queueing is enabled,
62 with infinite looping in net_bh.
63
64 We cannot track such dead loops during route installation,
65 it is infeasible task. The most general solutions would be
66 to keep skb->encapsulation counter (sort of local ttl),
6d0722a2 67 and silently drop packet when it expires. It is a good
1da177e4
LT
68 solution, but it supposes maintaing new variable in ALL
69 skb, even if no tunneling is used.
70
6d0722a2
ED
71 Current solution: xmit_recursion breaks dead loops. This is a percpu
72 counter, since when we enter the first ndo_xmit(), cpu migration is
73 forbidden. We force an exit if this counter reaches RECURSION_LIMIT
1da177e4
LT
74
75 2. Networking dead loops would not kill routers, but would really
76 kill network. IP hop limit plays role of "t->recursion" in this case,
77 if we copy it from packet being encapsulated to upper header.
78 It is very good solution, but it introduces two problems:
79
80 - Routing protocols, using packets with ttl=1 (OSPF, RIP2),
81 do not work over tunnels.
82 - traceroute does not work. I planned to relay ICMP from tunnel,
83 so that this problem would be solved and traceroute output
84 would even more informative. This idea appeared to be wrong:
85 only Linux complies to rfc1812 now (yes, guys, Linux is the only
86 true router now :-)), all routers (at least, in neighbourhood of mine)
87 return only 8 bytes of payload. It is the end.
88
89 Hence, if we want that OSPF worked or traceroute said something reasonable,
90 we should search for another solution.
91
92 One of them is to parse packet trying to detect inner encapsulation
93 made by our node. It is difficult or even impossible, especially,
94 taking into account fragmentation. TO be short, tt is not solution at all.
95
96 Current solution: The solution was UNEXPECTEDLY SIMPLE.
97 We force DF flag on tunnels with preconfigured hop limit,
98 that is ALL. :-) Well, it does not remove the problem completely,
99 but exponential growth of network traffic is changed to linear
100 (branches, that exceed pmtu are pruned) and tunnel mtu
101 fastly degrades to value <68, where looping stops.
102 Yes, it is not good if there exists a router in the loop,
103 which does not force DF, even when encapsulating packets have DF set.
104 But it is not our problem! Nobody could accuse us, we made
105 all that we could make. Even if it is your gated who injected
106 fatal route to network, even if it were you who configured
107 fatal static route: you are innocent. :-)
108
109
110
111 3. Really, ipv4/ipip.c, ipv4/ip_gre.c and ipv6/sit.c contain
112 practically identical code. It would be good to glue them
113 together, but it is not very evident, how to make them modular.
114 sit is integral part of IPv6, ipip and gre are naturally modular.
115 We could extract common parts (hash table, ioctl etc)
116 to a separate module (ip_tunnel.c).
117
118 Alexey Kuznetsov.
119 */
120
c19e654d 121static struct rtnl_link_ops ipgre_link_ops __read_mostly;
1da177e4
LT
122static int ipgre_tunnel_init(struct net_device *dev);
123static void ipgre_tunnel_setup(struct net_device *dev);
42aa9162 124static int ipgre_tunnel_bind_dev(struct net_device *dev);
1da177e4
LT
125
126/* Fallback tunnel: no source, no destination, no key, no options */
127
eb8ce741
PE
128#define HASH_SIZE 16
129
f99189b1 130static int ipgre_net_id __read_mostly;
59a4c759 131struct ipgre_net {
1507850b 132 struct ip_tunnel __rcu *tunnels[4][HASH_SIZE];
eb8ce741 133
7daa0004 134 struct net_device *fb_tunnel_dev;
59a4c759
PE
135};
136
1da177e4
LT
137/* Tunnel hash table */
138
139/*
140 4 hash tables:
141
142 3: (remote,local)
143 2: (remote,*)
144 1: (*,local)
145 0: (*,*)
146
147 We require exact key match i.e. if a key is present in packet
148 it will match only tunnel with the same key; if it is not present,
149 it will match only keyless tunnel.
150
151 All keysless packets, if not matched configured keyless tunnels
152 will match fallback tunnel.
153 */
154
d5a0a1e3 155#define HASH(addr) (((__force u32)addr^((__force u32)addr>>4))&0xF)
1da177e4 156
eb8ce741
PE
157#define tunnels_r_l tunnels[3]
158#define tunnels_r tunnels[2]
159#define tunnels_l tunnels[1]
160#define tunnels_wc tunnels[0]
8d5b2c08 161/*
1507850b 162 * Locking : hash tables are protected by RCU and RTNL
8d5b2c08 163 */
1da177e4 164
8d5b2c08
ED
165#define for_each_ip_tunnel_rcu(start) \
166 for (t = rcu_dereference(start); t; t = rcu_dereference(t->next))
1da177e4 167
e985aad7
ED
168/* often modified stats are per cpu, other are shared (netdev->stats) */
169struct pcpu_tstats {
170 unsigned long rx_packets;
171 unsigned long rx_bytes;
172 unsigned long tx_packets;
173 unsigned long tx_bytes;
174};
175
176static struct net_device_stats *ipgre_get_stats(struct net_device *dev)
177{
178 struct pcpu_tstats sum = { 0 };
179 int i;
180
181 for_each_possible_cpu(i) {
182 const struct pcpu_tstats *tstats = per_cpu_ptr(dev->tstats, i);
183
184 sum.rx_packets += tstats->rx_packets;
185 sum.rx_bytes += tstats->rx_bytes;
186 sum.tx_packets += tstats->tx_packets;
187 sum.tx_bytes += tstats->tx_bytes;
188 }
189 dev->stats.rx_packets = sum.rx_packets;
190 dev->stats.rx_bytes = sum.rx_bytes;
191 dev->stats.tx_packets = sum.tx_packets;
192 dev->stats.tx_bytes = sum.tx_bytes;
193 return &dev->stats;
194}
195
1da177e4
LT
196/* Given src, dst and key, find appropriate for input tunnel. */
197
749c10f9 198static struct ip_tunnel * ipgre_tunnel_lookup(struct net_device *dev,
e1a80002
HX
199 __be32 remote, __be32 local,
200 __be32 key, __be16 gre_proto)
1da177e4 201{
749c10f9
TT
202 struct net *net = dev_net(dev);
203 int link = dev->ifindex;
1507850b
ED
204 unsigned int h0 = HASH(remote);
205 unsigned int h1 = HASH(key);
afcf1242 206 struct ip_tunnel *t, *cand = NULL;
7daa0004 207 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
e1a80002
HX
208 int dev_type = (gre_proto == htons(ETH_P_TEB)) ?
209 ARPHRD_ETHER : ARPHRD_IPGRE;
afcf1242 210 int score, cand_score = 4;
1da177e4 211
8d5b2c08 212 for_each_ip_tunnel_rcu(ign->tunnels_r_l[h0 ^ h1]) {
749c10f9
TT
213 if (local != t->parms.iph.saddr ||
214 remote != t->parms.iph.daddr ||
215 key != t->parms.i_key ||
216 !(t->dev->flags & IFF_UP))
217 continue;
218
219 if (t->dev->type != ARPHRD_IPGRE &&
220 t->dev->type != dev_type)
221 continue;
222
afcf1242 223 score = 0;
749c10f9 224 if (t->parms.link != link)
afcf1242 225 score |= 1;
749c10f9 226 if (t->dev->type != dev_type)
afcf1242
TT
227 score |= 2;
228 if (score == 0)
749c10f9 229 return t;
afcf1242
TT
230
231 if (score < cand_score) {
232 cand = t;
233 cand_score = score;
234 }
1da177e4 235 }
e1a80002 236
8d5b2c08 237 for_each_ip_tunnel_rcu(ign->tunnels_r[h0 ^ h1]) {
749c10f9
TT
238 if (remote != t->parms.iph.daddr ||
239 key != t->parms.i_key ||
240 !(t->dev->flags & IFF_UP))
241 continue;
242
243 if (t->dev->type != ARPHRD_IPGRE &&
244 t->dev->type != dev_type)
245 continue;
246
afcf1242 247 score = 0;
749c10f9 248 if (t->parms.link != link)
afcf1242 249 score |= 1;
749c10f9 250 if (t->dev->type != dev_type)
afcf1242
TT
251 score |= 2;
252 if (score == 0)
749c10f9 253 return t;
afcf1242
TT
254
255 if (score < cand_score) {
256 cand = t;
257 cand_score = score;
258 }
1da177e4 259 }
e1a80002 260
8d5b2c08 261 for_each_ip_tunnel_rcu(ign->tunnels_l[h1]) {
749c10f9
TT
262 if ((local != t->parms.iph.saddr &&
263 (local != t->parms.iph.daddr ||
264 !ipv4_is_multicast(local))) ||
265 key != t->parms.i_key ||
266 !(t->dev->flags & IFF_UP))
267 continue;
268
269 if (t->dev->type != ARPHRD_IPGRE &&
270 t->dev->type != dev_type)
271 continue;
272
afcf1242 273 score = 0;
749c10f9 274 if (t->parms.link != link)
afcf1242 275 score |= 1;
749c10f9 276 if (t->dev->type != dev_type)
afcf1242
TT
277 score |= 2;
278 if (score == 0)
749c10f9 279 return t;
afcf1242
TT
280
281 if (score < cand_score) {
282 cand = t;
283 cand_score = score;
284 }
1da177e4 285 }
e1a80002 286
8d5b2c08 287 for_each_ip_tunnel_rcu(ign->tunnels_wc[h1]) {
749c10f9
TT
288 if (t->parms.i_key != key ||
289 !(t->dev->flags & IFF_UP))
290 continue;
291
292 if (t->dev->type != ARPHRD_IPGRE &&
293 t->dev->type != dev_type)
294 continue;
295
afcf1242 296 score = 0;
749c10f9 297 if (t->parms.link != link)
afcf1242 298 score |= 1;
749c10f9 299 if (t->dev->type != dev_type)
afcf1242
TT
300 score |= 2;
301 if (score == 0)
749c10f9 302 return t;
afcf1242
TT
303
304 if (score < cand_score) {
305 cand = t;
306 cand_score = score;
307 }
1da177e4
LT
308 }
309
afcf1242
TT
310 if (cand != NULL)
311 return cand;
e1a80002 312
8d5b2c08
ED
313 dev = ign->fb_tunnel_dev;
314 if (dev->flags & IFF_UP)
315 return netdev_priv(dev);
749c10f9 316
1da177e4
LT
317 return NULL;
318}
319
1507850b 320static struct ip_tunnel __rcu **__ipgre_bucket(struct ipgre_net *ign,
f57e7d5a 321 struct ip_tunnel_parm *parms)
1da177e4 322{
5056a1ef
YH
323 __be32 remote = parms->iph.daddr;
324 __be32 local = parms->iph.saddr;
325 __be32 key = parms->i_key;
1507850b 326 unsigned int h = HASH(key);
1da177e4
LT
327 int prio = 0;
328
329 if (local)
330 prio |= 1;
f97c1e0c 331 if (remote && !ipv4_is_multicast(remote)) {
1da177e4
LT
332 prio |= 2;
333 h ^= HASH(remote);
334 }
335
eb8ce741 336 return &ign->tunnels[prio][h];
1da177e4
LT
337}
338
1507850b 339static inline struct ip_tunnel __rcu **ipgre_bucket(struct ipgre_net *ign,
f57e7d5a 340 struct ip_tunnel *t)
5056a1ef 341{
f57e7d5a 342 return __ipgre_bucket(ign, &t->parms);
5056a1ef
YH
343}
344
f57e7d5a 345static void ipgre_tunnel_link(struct ipgre_net *ign, struct ip_tunnel *t)
1da177e4 346{
1507850b 347 struct ip_tunnel __rcu **tp = ipgre_bucket(ign, t);
1da177e4 348
1507850b 349 rcu_assign_pointer(t->next, rtnl_dereference(*tp));
8d5b2c08 350 rcu_assign_pointer(*tp, t);
1da177e4
LT
351}
352
f57e7d5a 353static void ipgre_tunnel_unlink(struct ipgre_net *ign, struct ip_tunnel *t)
1da177e4 354{
1507850b
ED
355 struct ip_tunnel __rcu **tp;
356 struct ip_tunnel *iter;
357
358 for (tp = ipgre_bucket(ign, t);
359 (iter = rtnl_dereference(*tp)) != NULL;
360 tp = &iter->next) {
361 if (t == iter) {
362 rcu_assign_pointer(*tp, t->next);
1da177e4
LT
363 break;
364 }
365 }
366}
367
e1a80002
HX
368static struct ip_tunnel *ipgre_tunnel_find(struct net *net,
369 struct ip_tunnel_parm *parms,
370 int type)
1da177e4 371{
d5a0a1e3
AV
372 __be32 remote = parms->iph.daddr;
373 __be32 local = parms->iph.saddr;
374 __be32 key = parms->i_key;
749c10f9 375 int link = parms->link;
1507850b
ED
376 struct ip_tunnel *t;
377 struct ip_tunnel __rcu **tp;
e1a80002
HX
378 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
379
1507850b
ED
380 for (tp = __ipgre_bucket(ign, parms);
381 (t = rtnl_dereference(*tp)) != NULL;
382 tp = &t->next)
e1a80002
HX
383 if (local == t->parms.iph.saddr &&
384 remote == t->parms.iph.daddr &&
385 key == t->parms.i_key &&
749c10f9 386 link == t->parms.link &&
e1a80002
HX
387 type == t->dev->type)
388 break;
389
390 return t;
391}
392
1507850b 393static struct ip_tunnel *ipgre_tunnel_locate(struct net *net,
e1a80002
HX
394 struct ip_tunnel_parm *parms, int create)
395{
396 struct ip_tunnel *t, *nt;
1da177e4 397 struct net_device *dev;
1da177e4 398 char name[IFNAMSIZ];
f57e7d5a 399 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1da177e4 400
e1a80002
HX
401 t = ipgre_tunnel_find(net, parms, ARPHRD_IPGRE);
402 if (t || !create)
403 return t;
1da177e4
LT
404
405 if (parms->name[0])
406 strlcpy(name, parms->name, IFNAMSIZ);
34cc7ba6 407 else
407d6fcb 408 strcpy(name, "gre%d");
1da177e4
LT
409
410 dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup);
411 if (!dev)
407d6fcb 412 return NULL;
1da177e4 413
0b67eceb
PE
414 dev_net_set(dev, net);
415
b37d428b
PE
416 if (strchr(name, '%')) {
417 if (dev_alloc_name(dev, name) < 0)
418 goto failed_free;
419 }
420
2941a486 421 nt = netdev_priv(dev);
1da177e4 422 nt->parms = *parms;
c19e654d 423 dev->rtnl_link_ops = &ipgre_link_ops;
1da177e4 424
42aa9162
HX
425 dev->mtu = ipgre_tunnel_bind_dev(dev);
426
b37d428b
PE
427 if (register_netdevice(dev) < 0)
428 goto failed_free;
1da177e4 429
1da177e4 430 dev_hold(dev);
f57e7d5a 431 ipgre_tunnel_link(ign, nt);
1da177e4
LT
432 return nt;
433
b37d428b
PE
434failed_free:
435 free_netdev(dev);
1da177e4
LT
436 return NULL;
437}
438
439static void ipgre_tunnel_uninit(struct net_device *dev)
440{
f57e7d5a
PE
441 struct net *net = dev_net(dev);
442 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
443
444 ipgre_tunnel_unlink(ign, netdev_priv(dev));
1da177e4
LT
445 dev_put(dev);
446}
447
448
449static void ipgre_err(struct sk_buff *skb, u32 info)
450{
1da177e4 451
071f92d0 452/* All the routers (except for Linux) return only
1da177e4
LT
453 8 bytes of packet payload. It means, that precise relaying of
454 ICMP in the real Internet is absolutely infeasible.
455
456 Moreover, Cisco "wise men" put GRE key to the third word
457 in GRE header. It makes impossible maintaining even soft state for keyed
458 GRE tunnels with enabled checksum. Tell them "thank you".
459
460 Well, I wonder, rfc1812 was written by Cisco employee,
461 what the hell these idiots break standrads established
462 by themself???
463 */
464
b71d1d42 465 const struct iphdr *iph = (const struct iphdr *)skb->data;
d5a0a1e3 466 __be16 *p = (__be16*)(skb->data+(iph->ihl<<2));
1da177e4 467 int grehlen = (iph->ihl<<2) + 4;
88c7664f
ACM
468 const int type = icmp_hdr(skb)->type;
469 const int code = icmp_hdr(skb)->code;
1da177e4 470 struct ip_tunnel *t;
d5a0a1e3 471 __be16 flags;
1da177e4
LT
472
473 flags = p[0];
474 if (flags&(GRE_CSUM|GRE_KEY|GRE_SEQ|GRE_ROUTING|GRE_VERSION)) {
475 if (flags&(GRE_VERSION|GRE_ROUTING))
476 return;
477 if (flags&GRE_KEY) {
478 grehlen += 4;
479 if (flags&GRE_CSUM)
480 grehlen += 4;
481 }
482 }
483
484 /* If only 8 bytes returned, keyed message will be dropped here */
485 if (skb_headlen(skb) < grehlen)
486 return;
487
488 switch (type) {
489 default:
490 case ICMP_PARAMETERPROB:
491 return;
492
493 case ICMP_DEST_UNREACH:
494 switch (code) {
495 case ICMP_SR_FAILED:
496 case ICMP_PORT_UNREACH:
497 /* Impossible event. */
498 return;
499 case ICMP_FRAG_NEEDED:
500 /* Soft state for pmtu is maintained by IP core. */
501 return;
502 default:
503 /* All others are translated to HOST_UNREACH.
504 rfc2003 contains "deep thoughts" about NET_UNREACH,
505 I believe they are just ether pollution. --ANK
506 */
507 break;
508 }
509 break;
510 case ICMP_TIME_EXCEEDED:
511 if (code != ICMP_EXC_TTL)
512 return;
513 break;
514 }
515
8d5b2c08 516 rcu_read_lock();
749c10f9 517 t = ipgre_tunnel_lookup(skb->dev, iph->daddr, iph->saddr,
e1a80002
HX
518 flags & GRE_KEY ?
519 *(((__be32 *)p) + (grehlen / 4) - 1) : 0,
520 p[1]);
f97c1e0c
JP
521 if (t == NULL || t->parms.iph.daddr == 0 ||
522 ipv4_is_multicast(t->parms.iph.daddr))
1da177e4
LT
523 goto out;
524
525 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
526 goto out;
527
da6185d8 528 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
1da177e4
LT
529 t->err_count++;
530 else
531 t->err_count = 1;
532 t->err_time = jiffies;
533out:
8d5b2c08 534 rcu_read_unlock();
1da177e4
LT
535}
536
b71d1d42 537static inline void ipgre_ecn_decapsulate(const struct iphdr *iph, struct sk_buff *skb)
1da177e4
LT
538{
539 if (INET_ECN_is_ce(iph->tos)) {
540 if (skb->protocol == htons(ETH_P_IP)) {
eddc9ec5 541 IP_ECN_set_ce(ip_hdr(skb));
1da177e4 542 } else if (skb->protocol == htons(ETH_P_IPV6)) {
0660e03f 543 IP6_ECN_set_ce(ipv6_hdr(skb));
1da177e4
LT
544 }
545 }
546}
547
548static inline u8
b71d1d42 549ipgre_ecn_encapsulate(u8 tos, const struct iphdr *old_iph, struct sk_buff *skb)
1da177e4
LT
550{
551 u8 inner = 0;
552 if (skb->protocol == htons(ETH_P_IP))
553 inner = old_iph->tos;
554 else if (skb->protocol == htons(ETH_P_IPV6))
b71d1d42 555 inner = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
1da177e4
LT
556 return INET_ECN_encapsulate(tos, inner);
557}
558
559static int ipgre_rcv(struct sk_buff *skb)
560{
b71d1d42 561 const struct iphdr *iph;
1da177e4 562 u8 *h;
d5a0a1e3 563 __be16 flags;
d3bc23e7 564 __sum16 csum = 0;
d5a0a1e3 565 __be32 key = 0;
1da177e4
LT
566 u32 seqno = 0;
567 struct ip_tunnel *tunnel;
568 int offset = 4;
e1a80002 569 __be16 gre_proto;
1da177e4
LT
570
571 if (!pskb_may_pull(skb, 16))
572 goto drop_nolock;
573
eddc9ec5 574 iph = ip_hdr(skb);
1da177e4 575 h = skb->data;
d5a0a1e3 576 flags = *(__be16*)h;
1da177e4
LT
577
578 if (flags&(GRE_CSUM|GRE_KEY|GRE_ROUTING|GRE_SEQ|GRE_VERSION)) {
579 /* - Version must be 0.
580 - We do not support routing headers.
581 */
582 if (flags&(GRE_VERSION|GRE_ROUTING))
583 goto drop_nolock;
584
585 if (flags&GRE_CSUM) {
fb286bb2 586 switch (skb->ip_summed) {
84fa7933 587 case CHECKSUM_COMPLETE:
d3bc23e7 588 csum = csum_fold(skb->csum);
fb286bb2
HX
589 if (!csum)
590 break;
591 /* fall through */
592 case CHECKSUM_NONE:
593 skb->csum = 0;
594 csum = __skb_checksum_complete(skb);
84fa7933 595 skb->ip_summed = CHECKSUM_COMPLETE;
1da177e4
LT
596 }
597 offset += 4;
598 }
599 if (flags&GRE_KEY) {
d5a0a1e3 600 key = *(__be32*)(h + offset);
1da177e4
LT
601 offset += 4;
602 }
603 if (flags&GRE_SEQ) {
d5a0a1e3 604 seqno = ntohl(*(__be32*)(h + offset));
1da177e4
LT
605 offset += 4;
606 }
607 }
608
e1a80002
HX
609 gre_proto = *(__be16 *)(h + 2);
610
8d5b2c08 611 rcu_read_lock();
749c10f9 612 if ((tunnel = ipgre_tunnel_lookup(skb->dev,
e1a80002
HX
613 iph->saddr, iph->daddr, key,
614 gre_proto))) {
e985aad7 615 struct pcpu_tstats *tstats;
addd68eb 616
1da177e4
LT
617 secpath_reset(skb);
618
e1a80002 619 skb->protocol = gre_proto;
1da177e4
LT
620 /* WCCP version 1 and 2 protocol decoding.
621 * - Change protocol to IP
622 * - When dealing with WCCPv2, Skip extra 4 bytes in GRE header
623 */
e1a80002 624 if (flags == 0 && gre_proto == htons(ETH_P_WCCP)) {
496c98df 625 skb->protocol = htons(ETH_P_IP);
e905a9ed 626 if ((*(h + offset) & 0xF0) != 0x40)
1da177e4
LT
627 offset += 4;
628 }
629
1d069167 630 skb->mac_header = skb->network_header;
4209fb60 631 __pskb_pull(skb, offset);
9c70220b 632 skb_postpull_rcsum(skb, skb_transport_header(skb), offset);
1da177e4
LT
633 skb->pkt_type = PACKET_HOST;
634#ifdef CONFIG_NET_IPGRE_BROADCAST
f97c1e0c 635 if (ipv4_is_multicast(iph->daddr)) {
1da177e4 636 /* Looped back packet, drop it! */
c7537967 637 if (rt_is_output_route(skb_rtable(skb)))
1da177e4 638 goto drop;
e985aad7 639 tunnel->dev->stats.multicast++;
1da177e4
LT
640 skb->pkt_type = PACKET_BROADCAST;
641 }
642#endif
643
644 if (((flags&GRE_CSUM) && csum) ||
645 (!(flags&GRE_CSUM) && tunnel->parms.i_flags&GRE_CSUM)) {
e985aad7
ED
646 tunnel->dev->stats.rx_crc_errors++;
647 tunnel->dev->stats.rx_errors++;
1da177e4
LT
648 goto drop;
649 }
650 if (tunnel->parms.i_flags&GRE_SEQ) {
651 if (!(flags&GRE_SEQ) ||
652 (tunnel->i_seqno && (s32)(seqno - tunnel->i_seqno) < 0)) {
e985aad7
ED
653 tunnel->dev->stats.rx_fifo_errors++;
654 tunnel->dev->stats.rx_errors++;
1da177e4
LT
655 goto drop;
656 }
657 tunnel->i_seqno = seqno + 1;
658 }
e1a80002
HX
659
660 /* Warning: All skb pointers will be invalidated! */
661 if (tunnel->dev->type == ARPHRD_ETHER) {
662 if (!pskb_may_pull(skb, ETH_HLEN)) {
e985aad7
ED
663 tunnel->dev->stats.rx_length_errors++;
664 tunnel->dev->stats.rx_errors++;
e1a80002
HX
665 goto drop;
666 }
667
668 iph = ip_hdr(skb);
669 skb->protocol = eth_type_trans(skb, tunnel->dev);
670 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
671 }
672
e985aad7
ED
673 tstats = this_cpu_ptr(tunnel->dev->tstats);
674 tstats->rx_packets++;
675 tstats->rx_bytes += skb->len;
676
677 __skb_tunnel_rx(skb, tunnel->dev);
e1a80002
HX
678
679 skb_reset_network_header(skb);
1da177e4 680 ipgre_ecn_decapsulate(iph, skb);
e1a80002 681
caf586e5 682 netif_rx(skb);
8990f468 683
8d5b2c08 684 rcu_read_unlock();
8990f468 685 return 0;
1da177e4 686 }
45af08be 687 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
1da177e4
LT
688
689drop:
8d5b2c08 690 rcu_read_unlock();
1da177e4
LT
691drop_nolock:
692 kfree_skb(skb);
a02cec21 693 return 0;
1da177e4
LT
694}
695
6fef4c0c 696static netdev_tx_t ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
1da177e4 697{
2941a486 698 struct ip_tunnel *tunnel = netdev_priv(dev);
e985aad7 699 struct pcpu_tstats *tstats;
b71d1d42
ED
700 const struct iphdr *old_iph = ip_hdr(skb);
701 const struct iphdr *tiph;
cbb1e85f 702 struct flowi4 fl4;
1da177e4 703 u8 tos;
d5a0a1e3 704 __be16 df;
1da177e4 705 struct rtable *rt; /* Route to the other host */
1507850b 706 struct net_device *tdev; /* Device to other host */
1da177e4 707 struct iphdr *iph; /* Our new IP header */
c2636b4d 708 unsigned int max_headroom; /* The extra header space needed */
1da177e4 709 int gre_hlen;
d5a0a1e3 710 __be32 dst;
1da177e4
LT
711 int mtu;
712
e1a80002
HX
713 if (dev->type == ARPHRD_ETHER)
714 IPCB(skb)->flags = 0;
715
716 if (dev->header_ops && dev->type == ARPHRD_IPGRE) {
1da177e4 717 gre_hlen = 0;
b71d1d42 718 tiph = (const struct iphdr *)skb->data;
1da177e4
LT
719 } else {
720 gre_hlen = tunnel->hlen;
721 tiph = &tunnel->parms.iph;
722 }
723
724 if ((dst = tiph->daddr) == 0) {
725 /* NBMA tunnel */
726
adf30907 727 if (skb_dst(skb) == NULL) {
e985aad7 728 dev->stats.tx_fifo_errors++;
1da177e4
LT
729 goto tx_error;
730 }
731
732 if (skb->protocol == htons(ETH_P_IP)) {
511c3f92 733 rt = skb_rtable(skb);
1da177e4
LT
734 if ((dst = rt->rt_gateway) == 0)
735 goto tx_error_icmp;
736 }
842c74bf 737#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4 738 else if (skb->protocol == htons(ETH_P_IPV6)) {
b71d1d42 739 const struct in6_addr *addr6;
1da177e4 740 int addr_type;
adf30907 741 struct neighbour *neigh = skb_dst(skb)->neighbour;
1da177e4
LT
742
743 if (neigh == NULL)
744 goto tx_error;
745
b71d1d42 746 addr6 = (const struct in6_addr *)&neigh->primary_key;
1da177e4
LT
747 addr_type = ipv6_addr_type(addr6);
748
749 if (addr_type == IPV6_ADDR_ANY) {
0660e03f 750 addr6 = &ipv6_hdr(skb)->daddr;
1da177e4
LT
751 addr_type = ipv6_addr_type(addr6);
752 }
753
754 if ((addr_type & IPV6_ADDR_COMPATv4) == 0)
755 goto tx_error_icmp;
756
757 dst = addr6->s6_addr32[3];
758 }
759#endif
760 else
761 goto tx_error;
762 }
763
764 tos = tiph->tos;
ee686ca9
AJ
765 if (tos == 1) {
766 tos = 0;
1da177e4
LT
767 if (skb->protocol == htons(ETH_P_IP))
768 tos = old_iph->tos;
dd4ba83d 769 else if (skb->protocol == htons(ETH_P_IPV6))
b71d1d42 770 tos = ipv6_get_dsfield((const struct ipv6hdr *)old_iph);
1da177e4
LT
771 }
772
cbb1e85f 773 rt = ip_route_output_gre(dev_net(dev), &fl4, dst, tiph->saddr,
78fbfd8a
DM
774 tunnel->parms.o_key, RT_TOS(tos),
775 tunnel->parms.link);
776 if (IS_ERR(rt)) {
777 dev->stats.tx_carrier_errors++;
778 goto tx_error;
1da177e4 779 }
d8d1f30b 780 tdev = rt->dst.dev;
1da177e4
LT
781
782 if (tdev == dev) {
783 ip_rt_put(rt);
e985aad7 784 dev->stats.collisions++;
1da177e4
LT
785 goto tx_error;
786 }
787
788 df = tiph->frag_off;
789 if (df)
d8d1f30b 790 mtu = dst_mtu(&rt->dst) - dev->hard_header_len - tunnel->hlen;
1da177e4 791 else
adf30907 792 mtu = skb_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu;
1da177e4 793
adf30907
ED
794 if (skb_dst(skb))
795 skb_dst(skb)->ops->update_pmtu(skb_dst(skb), mtu);
1da177e4
LT
796
797 if (skb->protocol == htons(ETH_P_IP)) {
798 df |= (old_iph->frag_off&htons(IP_DF));
799
800 if ((old_iph->frag_off&htons(IP_DF)) &&
801 mtu < ntohs(old_iph->tot_len)) {
802 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, htonl(mtu));
803 ip_rt_put(rt);
804 goto tx_error;
805 }
806 }
842c74bf 807#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4 808 else if (skb->protocol == htons(ETH_P_IPV6)) {
adf30907 809 struct rt6_info *rt6 = (struct rt6_info *)skb_dst(skb);
1da177e4 810
adf30907 811 if (rt6 && mtu < dst_mtu(skb_dst(skb)) && mtu >= IPV6_MIN_MTU) {
f97c1e0c
JP
812 if ((tunnel->parms.iph.daddr &&
813 !ipv4_is_multicast(tunnel->parms.iph.daddr)) ||
1da177e4
LT
814 rt6->rt6i_dst.plen == 128) {
815 rt6->rt6i_flags |= RTF_MODIFIED;
defb3519 816 dst_metric_set(skb_dst(skb), RTAX_MTU, mtu);
1da177e4
LT
817 }
818 }
819
820 if (mtu >= IPV6_MIN_MTU && mtu < skb->len - tunnel->hlen + gre_hlen) {
3ffe533c 821 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
1da177e4
LT
822 ip_rt_put(rt);
823 goto tx_error;
824 }
825 }
826#endif
827
828 if (tunnel->err_count > 0) {
da6185d8
WY
829 if (time_before(jiffies,
830 tunnel->err_time + IPTUNNEL_ERR_TIMEO)) {
1da177e4
LT
831 tunnel->err_count--;
832
833 dst_link_failure(skb);
834 } else
835 tunnel->err_count = 0;
836 }
837
d8d1f30b 838 max_headroom = LL_RESERVED_SPACE(tdev) + gre_hlen + rt->dst.header_len;
1da177e4 839
cfbba49d
PM
840 if (skb_headroom(skb) < max_headroom || skb_shared(skb)||
841 (skb_cloned(skb) && !skb_clone_writable(skb, 0))) {
1da177e4 842 struct sk_buff *new_skb = skb_realloc_headroom(skb, max_headroom);
243aad83
TT
843 if (max_headroom > dev->needed_headroom)
844 dev->needed_headroom = max_headroom;
1da177e4
LT
845 if (!new_skb) {
846 ip_rt_put(rt);
e985aad7 847 dev->stats.tx_dropped++;
1da177e4 848 dev_kfree_skb(skb);
6ed10654 849 return NETDEV_TX_OK;
1da177e4
LT
850 }
851 if (skb->sk)
852 skb_set_owner_w(new_skb, skb->sk);
853 dev_kfree_skb(skb);
854 skb = new_skb;
eddc9ec5 855 old_iph = ip_hdr(skb);
1da177e4
LT
856 }
857
64194c31 858 skb_reset_transport_header(skb);
e2d1bca7
ACM
859 skb_push(skb, gre_hlen);
860 skb_reset_network_header(skb);
1da177e4 861 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
48d5cad8
PM
862 IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
863 IPSKB_REROUTED);
adf30907 864 skb_dst_drop(skb);
d8d1f30b 865 skb_dst_set(skb, &rt->dst);
1da177e4
LT
866
867 /*
868 * Push down and install the IPIP header.
869 */
870
eddc9ec5 871 iph = ip_hdr(skb);
1da177e4
LT
872 iph->version = 4;
873 iph->ihl = sizeof(struct iphdr) >> 2;
874 iph->frag_off = df;
875 iph->protocol = IPPROTO_GRE;
876 iph->tos = ipgre_ecn_encapsulate(tos, old_iph, skb);
cbb1e85f
DM
877 iph->daddr = fl4.daddr;
878 iph->saddr = fl4.saddr;
1da177e4
LT
879
880 if ((iph->ttl = tiph->ttl) == 0) {
881 if (skb->protocol == htons(ETH_P_IP))
882 iph->ttl = old_iph->ttl;
842c74bf 883#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4 884 else if (skb->protocol == htons(ETH_P_IPV6))
b71d1d42 885 iph->ttl = ((const struct ipv6hdr *)old_iph)->hop_limit;
1da177e4
LT
886#endif
887 else
323e126f 888 iph->ttl = ip4_dst_hoplimit(&rt->dst);
1da177e4
LT
889 }
890
e1a80002
HX
891 ((__be16 *)(iph + 1))[0] = tunnel->parms.o_flags;
892 ((__be16 *)(iph + 1))[1] = (dev->type == ARPHRD_ETHER) ?
893 htons(ETH_P_TEB) : skb->protocol;
1da177e4
LT
894
895 if (tunnel->parms.o_flags&(GRE_KEY|GRE_CSUM|GRE_SEQ)) {
d5a0a1e3 896 __be32 *ptr = (__be32*)(((u8*)iph) + tunnel->hlen - 4);
1da177e4
LT
897
898 if (tunnel->parms.o_flags&GRE_SEQ) {
899 ++tunnel->o_seqno;
900 *ptr = htonl(tunnel->o_seqno);
901 ptr--;
902 }
903 if (tunnel->parms.o_flags&GRE_KEY) {
904 *ptr = tunnel->parms.o_key;
905 ptr--;
906 }
907 if (tunnel->parms.o_flags&GRE_CSUM) {
908 *ptr = 0;
5f92a738 909 *(__sum16*)ptr = ip_compute_csum((void*)(iph+1), skb->len - sizeof(struct iphdr));
1da177e4
LT
910 }
911 }
912
913 nf_reset(skb);
e985aad7
ED
914 tstats = this_cpu_ptr(dev->tstats);
915 __IPTUNNEL_XMIT(tstats, &dev->stats);
6ed10654 916 return NETDEV_TX_OK;
1da177e4
LT
917
918tx_error_icmp:
919 dst_link_failure(skb);
920
921tx_error:
e985aad7 922 dev->stats.tx_errors++;
1da177e4 923 dev_kfree_skb(skb);
6ed10654 924 return NETDEV_TX_OK;
1da177e4
LT
925}
926
42aa9162 927static int ipgre_tunnel_bind_dev(struct net_device *dev)
ee34c1eb
MS
928{
929 struct net_device *tdev = NULL;
930 struct ip_tunnel *tunnel;
b71d1d42 931 const struct iphdr *iph;
ee34c1eb
MS
932 int hlen = LL_MAX_HEADER;
933 int mtu = ETH_DATA_LEN;
934 int addend = sizeof(struct iphdr) + 4;
935
936 tunnel = netdev_priv(dev);
937 iph = &tunnel->parms.iph;
938
c95b819a 939 /* Guess output device to choose reasonable mtu and needed_headroom */
ee34c1eb
MS
940
941 if (iph->daddr) {
cbb1e85f
DM
942 struct flowi4 fl4;
943 struct rtable *rt;
944
945 rt = ip_route_output_gre(dev_net(dev), &fl4,
946 iph->daddr, iph->saddr,
947 tunnel->parms.o_key,
948 RT_TOS(iph->tos),
949 tunnel->parms.link);
b23dd4fe 950 if (!IS_ERR(rt)) {
d8d1f30b 951 tdev = rt->dst.dev;
ee34c1eb
MS
952 ip_rt_put(rt);
953 }
e1a80002
HX
954
955 if (dev->type != ARPHRD_ETHER)
956 dev->flags |= IFF_POINTOPOINT;
ee34c1eb
MS
957 }
958
959 if (!tdev && tunnel->parms.link)
96635522 960 tdev = __dev_get_by_index(dev_net(dev), tunnel->parms.link);
ee34c1eb
MS
961
962 if (tdev) {
c95b819a 963 hlen = tdev->hard_header_len + tdev->needed_headroom;
ee34c1eb
MS
964 mtu = tdev->mtu;
965 }
966 dev->iflink = tunnel->parms.link;
967
968 /* Precalculate GRE options length */
969 if (tunnel->parms.o_flags&(GRE_CSUM|GRE_KEY|GRE_SEQ)) {
970 if (tunnel->parms.o_flags&GRE_CSUM)
971 addend += 4;
972 if (tunnel->parms.o_flags&GRE_KEY)
973 addend += 4;
974 if (tunnel->parms.o_flags&GRE_SEQ)
975 addend += 4;
976 }
c95b819a 977 dev->needed_headroom = addend + hlen;
8cdb0456 978 mtu -= dev->hard_header_len + addend;
42aa9162
HX
979
980 if (mtu < 68)
981 mtu = 68;
982
ee34c1eb
MS
983 tunnel->hlen = addend;
984
42aa9162 985 return mtu;
ee34c1eb
MS
986}
987
1da177e4
LT
988static int
989ipgre_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
990{
991 int err = 0;
992 struct ip_tunnel_parm p;
993 struct ip_tunnel *t;
f57e7d5a
PE
994 struct net *net = dev_net(dev);
995 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1da177e4
LT
996
997 switch (cmd) {
998 case SIOCGETTUNNEL:
999 t = NULL;
7daa0004 1000 if (dev == ign->fb_tunnel_dev) {
1da177e4
LT
1001 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) {
1002 err = -EFAULT;
1003 break;
1004 }
f57e7d5a 1005 t = ipgre_tunnel_locate(net, &p, 0);
1da177e4
LT
1006 }
1007 if (t == NULL)
2941a486 1008 t = netdev_priv(dev);
1da177e4
LT
1009 memcpy(&p, &t->parms, sizeof(p));
1010 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
1011 err = -EFAULT;
1012 break;
1013
1014 case SIOCADDTUNNEL:
1015 case SIOCCHGTUNNEL:
1016 err = -EPERM;
1017 if (!capable(CAP_NET_ADMIN))
1018 goto done;
1019
1020 err = -EFAULT;
1021 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1022 goto done;
1023
1024 err = -EINVAL;
1025 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
1026 p.iph.ihl != 5 || (p.iph.frag_off&htons(~IP_DF)) ||
1027 ((p.i_flags|p.o_flags)&(GRE_VERSION|GRE_ROUTING)))
1028 goto done;
1029 if (p.iph.ttl)
1030 p.iph.frag_off |= htons(IP_DF);
1031
1032 if (!(p.i_flags&GRE_KEY))
1033 p.i_key = 0;
1034 if (!(p.o_flags&GRE_KEY))
1035 p.o_key = 0;
1036
f57e7d5a 1037 t = ipgre_tunnel_locate(net, &p, cmd == SIOCADDTUNNEL);
1da177e4 1038
7daa0004 1039 if (dev != ign->fb_tunnel_dev && cmd == SIOCCHGTUNNEL) {
1da177e4
LT
1040 if (t != NULL) {
1041 if (t->dev != dev) {
1042 err = -EEXIST;
1043 break;
1044 }
1045 } else {
1507850b 1046 unsigned int nflags = 0;
1da177e4 1047
2941a486 1048 t = netdev_priv(dev);
1da177e4 1049
f97c1e0c 1050 if (ipv4_is_multicast(p.iph.daddr))
1da177e4
LT
1051 nflags = IFF_BROADCAST;
1052 else if (p.iph.daddr)
1053 nflags = IFF_POINTOPOINT;
1054
1055 if ((dev->flags^nflags)&(IFF_POINTOPOINT|IFF_BROADCAST)) {
1056 err = -EINVAL;
1057 break;
1058 }
f57e7d5a 1059 ipgre_tunnel_unlink(ign, t);
74b0b85b 1060 synchronize_net();
1da177e4
LT
1061 t->parms.iph.saddr = p.iph.saddr;
1062 t->parms.iph.daddr = p.iph.daddr;
1063 t->parms.i_key = p.i_key;
1064 t->parms.o_key = p.o_key;
1065 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1066 memcpy(dev->broadcast, &p.iph.daddr, 4);
f57e7d5a 1067 ipgre_tunnel_link(ign, t);
1da177e4
LT
1068 netdev_state_change(dev);
1069 }
1070 }
1071
1072 if (t) {
1073 err = 0;
1074 if (cmd == SIOCCHGTUNNEL) {
1075 t->parms.iph.ttl = p.iph.ttl;
1076 t->parms.iph.tos = p.iph.tos;
1077 t->parms.iph.frag_off = p.iph.frag_off;
ee34c1eb
MS
1078 if (t->parms.link != p.link) {
1079 t->parms.link = p.link;
42aa9162 1080 dev->mtu = ipgre_tunnel_bind_dev(dev);
ee34c1eb
MS
1081 netdev_state_change(dev);
1082 }
1da177e4
LT
1083 }
1084 if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
1085 err = -EFAULT;
1086 } else
1087 err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT);
1088 break;
1089
1090 case SIOCDELTUNNEL:
1091 err = -EPERM;
1092 if (!capable(CAP_NET_ADMIN))
1093 goto done;
1094
7daa0004 1095 if (dev == ign->fb_tunnel_dev) {
1da177e4
LT
1096 err = -EFAULT;
1097 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1098 goto done;
1099 err = -ENOENT;
f57e7d5a 1100 if ((t = ipgre_tunnel_locate(net, &p, 0)) == NULL)
1da177e4
LT
1101 goto done;
1102 err = -EPERM;
7daa0004 1103 if (t == netdev_priv(ign->fb_tunnel_dev))
1da177e4
LT
1104 goto done;
1105 dev = t->dev;
1106 }
22f8cde5
SH
1107 unregister_netdevice(dev);
1108 err = 0;
1da177e4
LT
1109 break;
1110
1111 default:
1112 err = -EINVAL;
1113 }
1114
1115done:
1116 return err;
1117}
1118
1da177e4
LT
1119static int ipgre_tunnel_change_mtu(struct net_device *dev, int new_mtu)
1120{
2941a486 1121 struct ip_tunnel *tunnel = netdev_priv(dev);
c95b819a
HX
1122 if (new_mtu < 68 ||
1123 new_mtu > 0xFFF8 - dev->hard_header_len - tunnel->hlen)
1da177e4
LT
1124 return -EINVAL;
1125 dev->mtu = new_mtu;
1126 return 0;
1127}
1128
1da177e4
LT
1129/* Nice toy. Unfortunately, useless in real life :-)
1130 It allows to construct virtual multiprotocol broadcast "LAN"
1131 over the Internet, provided multicast routing is tuned.
1132
1133
1134 I have no idea was this bicycle invented before me,
1135 so that I had to set ARPHRD_IPGRE to a random value.
1136 I have an impression, that Cisco could make something similar,
1137 but this feature is apparently missing in IOS<=11.2(8).
e905a9ed 1138
1da177e4
LT
1139 I set up 10.66.66/24 and fec0:6666:6666::0/96 as virtual networks
1140 with broadcast 224.66.66.66. If you have access to mbone, play with me :-)
1141
1142 ping -t 255 224.66.66.66
1143
1144 If nobody answers, mbone does not work.
1145
1146 ip tunnel add Universe mode gre remote 224.66.66.66 local <Your_real_addr> ttl 255
1147 ip addr add 10.66.66.<somewhat>/24 dev Universe
1148 ifconfig Universe up
1149 ifconfig Universe add fe80::<Your_real_addr>/10
1150 ifconfig Universe add fec0:6666:6666::<Your_real_addr>/96
1151 ftp 10.66.66.66
1152 ...
1153 ftp fec0:6666:6666::193.233.7.65
1154 ...
1155
1156 */
1157
3b04ddde
SH
1158static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
1159 unsigned short type,
1507850b 1160 const void *daddr, const void *saddr, unsigned int len)
1da177e4 1161{
2941a486 1162 struct ip_tunnel *t = netdev_priv(dev);
1da177e4 1163 struct iphdr *iph = (struct iphdr *)skb_push(skb, t->hlen);
d5a0a1e3 1164 __be16 *p = (__be16*)(iph+1);
1da177e4
LT
1165
1166 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
1167 p[0] = t->parms.o_flags;
1168 p[1] = htons(type);
1169
1170 /*
e905a9ed 1171 * Set the source hardware address.
1da177e4 1172 */
e905a9ed 1173
1da177e4
LT
1174 if (saddr)
1175 memcpy(&iph->saddr, saddr, 4);
6d55cb91 1176 if (daddr)
1da177e4 1177 memcpy(&iph->daddr, daddr, 4);
6d55cb91 1178 if (iph->daddr)
1da177e4 1179 return t->hlen;
e905a9ed 1180
1da177e4
LT
1181 return -t->hlen;
1182}
1183
6a5f44d7
TT
1184static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
1185{
b71d1d42 1186 const struct iphdr *iph = (const struct iphdr *) skb_mac_header(skb);
6a5f44d7
TT
1187 memcpy(haddr, &iph->saddr, 4);
1188 return 4;
1189}
1190
3b04ddde
SH
1191static const struct header_ops ipgre_header_ops = {
1192 .create = ipgre_header,
6a5f44d7 1193 .parse = ipgre_header_parse,
3b04ddde
SH
1194};
1195
6a5f44d7 1196#ifdef CONFIG_NET_IPGRE_BROADCAST
1da177e4
LT
1197static int ipgre_open(struct net_device *dev)
1198{
2941a486 1199 struct ip_tunnel *t = netdev_priv(dev);
1da177e4 1200
f97c1e0c 1201 if (ipv4_is_multicast(t->parms.iph.daddr)) {
cbb1e85f
DM
1202 struct flowi4 fl4;
1203 struct rtable *rt;
1204
1205 rt = ip_route_output_gre(dev_net(dev), &fl4,
1206 t->parms.iph.daddr,
1207 t->parms.iph.saddr,
1208 t->parms.o_key,
1209 RT_TOS(t->parms.iph.tos),
1210 t->parms.link);
b23dd4fe 1211 if (IS_ERR(rt))
1da177e4 1212 return -EADDRNOTAVAIL;
d8d1f30b 1213 dev = rt->dst.dev;
1da177e4 1214 ip_rt_put(rt);
e5ed6399 1215 if (__in_dev_get_rtnl(dev) == NULL)
1da177e4
LT
1216 return -EADDRNOTAVAIL;
1217 t->mlink = dev->ifindex;
e5ed6399 1218 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
1da177e4
LT
1219 }
1220 return 0;
1221}
1222
1223static int ipgre_close(struct net_device *dev)
1224{
2941a486 1225 struct ip_tunnel *t = netdev_priv(dev);
b8c26a33 1226
f97c1e0c 1227 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
7fee0ca2 1228 struct in_device *in_dev;
c346dca1 1229 in_dev = inetdev_by_index(dev_net(dev), t->mlink);
8723e1b4 1230 if (in_dev)
1da177e4 1231 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
1da177e4
LT
1232 }
1233 return 0;
1234}
1235
1236#endif
1237
b8c26a33
SH
1238static const struct net_device_ops ipgre_netdev_ops = {
1239 .ndo_init = ipgre_tunnel_init,
1240 .ndo_uninit = ipgre_tunnel_uninit,
1241#ifdef CONFIG_NET_IPGRE_BROADCAST
1242 .ndo_open = ipgre_open,
1243 .ndo_stop = ipgre_close,
1244#endif
1245 .ndo_start_xmit = ipgre_tunnel_xmit,
1246 .ndo_do_ioctl = ipgre_tunnel_ioctl,
1247 .ndo_change_mtu = ipgre_tunnel_change_mtu,
e985aad7 1248 .ndo_get_stats = ipgre_get_stats,
b8c26a33
SH
1249};
1250
e985aad7
ED
1251static void ipgre_dev_free(struct net_device *dev)
1252{
1253 free_percpu(dev->tstats);
1254 free_netdev(dev);
1255}
1256
1da177e4
LT
1257static void ipgre_tunnel_setup(struct net_device *dev)
1258{
b8c26a33 1259 dev->netdev_ops = &ipgre_netdev_ops;
e985aad7 1260 dev->destructor = ipgre_dev_free;
1da177e4
LT
1261
1262 dev->type = ARPHRD_IPGRE;
c95b819a 1263 dev->needed_headroom = LL_MAX_HEADER + sizeof(struct iphdr) + 4;
46f25dff 1264 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 4;
1da177e4
LT
1265 dev->flags = IFF_NOARP;
1266 dev->iflink = 0;
1267 dev->addr_len = 4;
0b67eceb 1268 dev->features |= NETIF_F_NETNS_LOCAL;
108bfa89 1269 dev->priv_flags &= ~IFF_XMIT_DST_RELEASE;
1da177e4
LT
1270}
1271
1272static int ipgre_tunnel_init(struct net_device *dev)
1273{
1da177e4
LT
1274 struct ip_tunnel *tunnel;
1275 struct iphdr *iph;
1da177e4 1276
2941a486 1277 tunnel = netdev_priv(dev);
1da177e4
LT
1278 iph = &tunnel->parms.iph;
1279
1280 tunnel->dev = dev;
1281 strcpy(tunnel->parms.name, dev->name);
1282
1283 memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
1284 memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
1285
1da177e4 1286 if (iph->daddr) {
1da177e4 1287#ifdef CONFIG_NET_IPGRE_BROADCAST
f97c1e0c 1288 if (ipv4_is_multicast(iph->daddr)) {
1da177e4
LT
1289 if (!iph->saddr)
1290 return -EINVAL;
1291 dev->flags = IFF_BROADCAST;
3b04ddde 1292 dev->header_ops = &ipgre_header_ops;
1da177e4
LT
1293 }
1294#endif
ee34c1eb 1295 } else
6a5f44d7 1296 dev->header_ops = &ipgre_header_ops;
1da177e4 1297
e985aad7
ED
1298 dev->tstats = alloc_percpu(struct pcpu_tstats);
1299 if (!dev->tstats)
1300 return -ENOMEM;
1301
1da177e4
LT
1302 return 0;
1303}
1304
b8c26a33 1305static void ipgre_fb_tunnel_init(struct net_device *dev)
1da177e4 1306{
2941a486 1307 struct ip_tunnel *tunnel = netdev_priv(dev);
1da177e4
LT
1308 struct iphdr *iph = &tunnel->parms.iph;
1309
1310 tunnel->dev = dev;
1311 strcpy(tunnel->parms.name, dev->name);
1312
1313 iph->version = 4;
1314 iph->protocol = IPPROTO_GRE;
1315 iph->ihl = 5;
1316 tunnel->hlen = sizeof(struct iphdr) + 4;
1317
1318 dev_hold(dev);
1da177e4
LT
1319}
1320
1321
00959ade
DK
1322static const struct gre_protocol ipgre_protocol = {
1323 .handler = ipgre_rcv,
1324 .err_handler = ipgre_err,
1da177e4
LT
1325};
1326
eef6dd65 1327static void ipgre_destroy_tunnels(struct ipgre_net *ign, struct list_head *head)
eb8ce741
PE
1328{
1329 int prio;
1330
1331 for (prio = 0; prio < 4; prio++) {
1332 int h;
1333 for (h = 0; h < HASH_SIZE; h++) {
1507850b
ED
1334 struct ip_tunnel *t;
1335
1336 t = rtnl_dereference(ign->tunnels[prio][h]);
eef6dd65
ED
1337
1338 while (t != NULL) {
1339 unregister_netdevice_queue(t->dev, head);
1507850b 1340 t = rtnl_dereference(t->next);
eef6dd65 1341 }
eb8ce741
PE
1342 }
1343 }
1344}
1345
2c8c1e72 1346static int __net_init ipgre_init_net(struct net *net)
59a4c759 1347{
cfb8fbf2 1348 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
59a4c759 1349 int err;
59a4c759 1350
7daa0004
PE
1351 ign->fb_tunnel_dev = alloc_netdev(sizeof(struct ip_tunnel), "gre0",
1352 ipgre_tunnel_setup);
1353 if (!ign->fb_tunnel_dev) {
1354 err = -ENOMEM;
1355 goto err_alloc_dev;
1356 }
be77e593 1357 dev_net_set(ign->fb_tunnel_dev, net);
7daa0004 1358
b8c26a33 1359 ipgre_fb_tunnel_init(ign->fb_tunnel_dev);
c19e654d 1360 ign->fb_tunnel_dev->rtnl_link_ops = &ipgre_link_ops;
7daa0004
PE
1361
1362 if ((err = register_netdev(ign->fb_tunnel_dev)))
1363 goto err_reg_dev;
1364
3285ee3b
ED
1365 rcu_assign_pointer(ign->tunnels_wc[0],
1366 netdev_priv(ign->fb_tunnel_dev));
59a4c759
PE
1367 return 0;
1368
7daa0004 1369err_reg_dev:
3285ee3b 1370 ipgre_dev_free(ign->fb_tunnel_dev);
7daa0004 1371err_alloc_dev:
59a4c759
PE
1372 return err;
1373}
1374
2c8c1e72 1375static void __net_exit ipgre_exit_net(struct net *net)
59a4c759
PE
1376{
1377 struct ipgre_net *ign;
eef6dd65 1378 LIST_HEAD(list);
59a4c759
PE
1379
1380 ign = net_generic(net, ipgre_net_id);
7daa0004 1381 rtnl_lock();
eef6dd65
ED
1382 ipgre_destroy_tunnels(ign, &list);
1383 unregister_netdevice_many(&list);
7daa0004 1384 rtnl_unlock();
59a4c759
PE
1385}
1386
1387static struct pernet_operations ipgre_net_ops = {
1388 .init = ipgre_init_net,
1389 .exit = ipgre_exit_net,
cfb8fbf2
EB
1390 .id = &ipgre_net_id,
1391 .size = sizeof(struct ipgre_net),
59a4c759 1392};
1da177e4 1393
c19e654d
HX
1394static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[])
1395{
1396 __be16 flags;
1397
1398 if (!data)
1399 return 0;
1400
1401 flags = 0;
1402 if (data[IFLA_GRE_IFLAGS])
1403 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1404 if (data[IFLA_GRE_OFLAGS])
1405 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1406 if (flags & (GRE_VERSION|GRE_ROUTING))
1407 return -EINVAL;
1408
1409 return 0;
1410}
1411
e1a80002
HX
1412static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[])
1413{
1414 __be32 daddr;
1415
1416 if (tb[IFLA_ADDRESS]) {
1417 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1418 return -EINVAL;
1419 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1420 return -EADDRNOTAVAIL;
1421 }
1422
1423 if (!data)
1424 goto out;
1425
1426 if (data[IFLA_GRE_REMOTE]) {
1427 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1428 if (!daddr)
1429 return -EINVAL;
1430 }
1431
1432out:
1433 return ipgre_tunnel_validate(tb, data);
1434}
1435
c19e654d
HX
1436static void ipgre_netlink_parms(struct nlattr *data[],
1437 struct ip_tunnel_parm *parms)
1438{
7bb82d92 1439 memset(parms, 0, sizeof(*parms));
c19e654d
HX
1440
1441 parms->iph.protocol = IPPROTO_GRE;
1442
1443 if (!data)
1444 return;
1445
1446 if (data[IFLA_GRE_LINK])
1447 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1448
1449 if (data[IFLA_GRE_IFLAGS])
1450 parms->i_flags = nla_get_be16(data[IFLA_GRE_IFLAGS]);
1451
1452 if (data[IFLA_GRE_OFLAGS])
1453 parms->o_flags = nla_get_be16(data[IFLA_GRE_OFLAGS]);
1454
1455 if (data[IFLA_GRE_IKEY])
1456 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1457
1458 if (data[IFLA_GRE_OKEY])
1459 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1460
1461 if (data[IFLA_GRE_LOCAL])
4d74f8ba 1462 parms->iph.saddr = nla_get_be32(data[IFLA_GRE_LOCAL]);
c19e654d
HX
1463
1464 if (data[IFLA_GRE_REMOTE])
4d74f8ba 1465 parms->iph.daddr = nla_get_be32(data[IFLA_GRE_REMOTE]);
c19e654d
HX
1466
1467 if (data[IFLA_GRE_TTL])
1468 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1469
1470 if (data[IFLA_GRE_TOS])
1471 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1472
1473 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC]))
1474 parms->iph.frag_off = htons(IP_DF);
1475}
1476
e1a80002
HX
1477static int ipgre_tap_init(struct net_device *dev)
1478{
1479 struct ip_tunnel *tunnel;
1480
1481 tunnel = netdev_priv(dev);
1482
1483 tunnel->dev = dev;
1484 strcpy(tunnel->parms.name, dev->name);
1485
1486 ipgre_tunnel_bind_dev(dev);
1487
e985aad7
ED
1488 dev->tstats = alloc_percpu(struct pcpu_tstats);
1489 if (!dev->tstats)
1490 return -ENOMEM;
1491
e1a80002
HX
1492 return 0;
1493}
1494
b8c26a33
SH
1495static const struct net_device_ops ipgre_tap_netdev_ops = {
1496 .ndo_init = ipgre_tap_init,
1497 .ndo_uninit = ipgre_tunnel_uninit,
1498 .ndo_start_xmit = ipgre_tunnel_xmit,
1499 .ndo_set_mac_address = eth_mac_addr,
1500 .ndo_validate_addr = eth_validate_addr,
1501 .ndo_change_mtu = ipgre_tunnel_change_mtu,
e985aad7 1502 .ndo_get_stats = ipgre_get_stats,
b8c26a33
SH
1503};
1504
e1a80002
HX
1505static void ipgre_tap_setup(struct net_device *dev)
1506{
1507
1508 ether_setup(dev);
1509
2e9526b3 1510 dev->netdev_ops = &ipgre_tap_netdev_ops;
e985aad7 1511 dev->destructor = ipgre_dev_free;
e1a80002
HX
1512
1513 dev->iflink = 0;
1514 dev->features |= NETIF_F_NETNS_LOCAL;
1515}
1516
81adee47 1517static int ipgre_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[],
c19e654d
HX
1518 struct nlattr *data[])
1519{
1520 struct ip_tunnel *nt;
1521 struct net *net = dev_net(dev);
1522 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1523 int mtu;
1524 int err;
1525
1526 nt = netdev_priv(dev);
1527 ipgre_netlink_parms(data, &nt->parms);
1528
e1a80002 1529 if (ipgre_tunnel_find(net, &nt->parms, dev->type))
c19e654d
HX
1530 return -EEXIST;
1531
e1a80002
HX
1532 if (dev->type == ARPHRD_ETHER && !tb[IFLA_ADDRESS])
1533 random_ether_addr(dev->dev_addr);
1534
c19e654d
HX
1535 mtu = ipgre_tunnel_bind_dev(dev);
1536 if (!tb[IFLA_MTU])
1537 dev->mtu = mtu;
1538
b790e01a
ED
1539 /* Can use a lockless transmit, unless we generate output sequences */
1540 if (!(nt->parms.o_flags & GRE_SEQ))
1541 dev->features |= NETIF_F_LLTX;
1542
c19e654d
HX
1543 err = register_netdevice(dev);
1544 if (err)
1545 goto out;
1546
1547 dev_hold(dev);
1548 ipgre_tunnel_link(ign, nt);
1549
1550out:
1551 return err;
1552}
1553
1554static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1555 struct nlattr *data[])
1556{
1557 struct ip_tunnel *t, *nt;
1558 struct net *net = dev_net(dev);
1559 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1560 struct ip_tunnel_parm p;
1561 int mtu;
1562
1563 if (dev == ign->fb_tunnel_dev)
1564 return -EINVAL;
1565
1566 nt = netdev_priv(dev);
1567 ipgre_netlink_parms(data, &p);
1568
1569 t = ipgre_tunnel_locate(net, &p, 0);
1570
1571 if (t) {
1572 if (t->dev != dev)
1573 return -EEXIST;
1574 } else {
c19e654d
HX
1575 t = nt;
1576
2e9526b3 1577 if (dev->type != ARPHRD_ETHER) {
1507850b 1578 unsigned int nflags = 0;
c19e654d 1579
2e9526b3
HX
1580 if (ipv4_is_multicast(p.iph.daddr))
1581 nflags = IFF_BROADCAST;
1582 else if (p.iph.daddr)
1583 nflags = IFF_POINTOPOINT;
1584
1585 if ((dev->flags ^ nflags) &
1586 (IFF_POINTOPOINT | IFF_BROADCAST))
1587 return -EINVAL;
1588 }
c19e654d
HX
1589
1590 ipgre_tunnel_unlink(ign, t);
1591 t->parms.iph.saddr = p.iph.saddr;
1592 t->parms.iph.daddr = p.iph.daddr;
1593 t->parms.i_key = p.i_key;
2e9526b3
HX
1594 if (dev->type != ARPHRD_ETHER) {
1595 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1596 memcpy(dev->broadcast, &p.iph.daddr, 4);
1597 }
c19e654d
HX
1598 ipgre_tunnel_link(ign, t);
1599 netdev_state_change(dev);
1600 }
1601
1602 t->parms.o_key = p.o_key;
1603 t->parms.iph.ttl = p.iph.ttl;
1604 t->parms.iph.tos = p.iph.tos;
1605 t->parms.iph.frag_off = p.iph.frag_off;
1606
1607 if (t->parms.link != p.link) {
1608 t->parms.link = p.link;
1609 mtu = ipgre_tunnel_bind_dev(dev);
1610 if (!tb[IFLA_MTU])
1611 dev->mtu = mtu;
1612 netdev_state_change(dev);
1613 }
1614
1615 return 0;
1616}
1617
1618static size_t ipgre_get_size(const struct net_device *dev)
1619{
1620 return
1621 /* IFLA_GRE_LINK */
1622 nla_total_size(4) +
1623 /* IFLA_GRE_IFLAGS */
1624 nla_total_size(2) +
1625 /* IFLA_GRE_OFLAGS */
1626 nla_total_size(2) +
1627 /* IFLA_GRE_IKEY */
1628 nla_total_size(4) +
1629 /* IFLA_GRE_OKEY */
1630 nla_total_size(4) +
1631 /* IFLA_GRE_LOCAL */
1632 nla_total_size(4) +
1633 /* IFLA_GRE_REMOTE */
1634 nla_total_size(4) +
1635 /* IFLA_GRE_TTL */
1636 nla_total_size(1) +
1637 /* IFLA_GRE_TOS */
1638 nla_total_size(1) +
1639 /* IFLA_GRE_PMTUDISC */
1640 nla_total_size(1) +
1641 0;
1642}
1643
1644static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1645{
1646 struct ip_tunnel *t = netdev_priv(dev);
1647 struct ip_tunnel_parm *p = &t->parms;
1648
1649 NLA_PUT_U32(skb, IFLA_GRE_LINK, p->link);
1650 NLA_PUT_BE16(skb, IFLA_GRE_IFLAGS, p->i_flags);
1651 NLA_PUT_BE16(skb, IFLA_GRE_OFLAGS, p->o_flags);
ba9e64b1
PM
1652 NLA_PUT_BE32(skb, IFLA_GRE_IKEY, p->i_key);
1653 NLA_PUT_BE32(skb, IFLA_GRE_OKEY, p->o_key);
4d74f8ba
PM
1654 NLA_PUT_BE32(skb, IFLA_GRE_LOCAL, p->iph.saddr);
1655 NLA_PUT_BE32(skb, IFLA_GRE_REMOTE, p->iph.daddr);
c19e654d
HX
1656 NLA_PUT_U8(skb, IFLA_GRE_TTL, p->iph.ttl);
1657 NLA_PUT_U8(skb, IFLA_GRE_TOS, p->iph.tos);
1658 NLA_PUT_U8(skb, IFLA_GRE_PMTUDISC, !!(p->iph.frag_off & htons(IP_DF)));
1659
1660 return 0;
1661
1662nla_put_failure:
1663 return -EMSGSIZE;
1664}
1665
1666static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1667 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1668 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1669 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1670 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1671 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
4d74f8ba
PM
1672 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1673 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
c19e654d
HX
1674 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1675 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1676 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1677};
1678
1679static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1680 .kind = "gre",
1681 .maxtype = IFLA_GRE_MAX,
1682 .policy = ipgre_policy,
1683 .priv_size = sizeof(struct ip_tunnel),
1684 .setup = ipgre_tunnel_setup,
1685 .validate = ipgre_tunnel_validate,
1686 .newlink = ipgre_newlink,
1687 .changelink = ipgre_changelink,
1688 .get_size = ipgre_get_size,
1689 .fill_info = ipgre_fill_info,
1690};
1691
e1a80002
HX
1692static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1693 .kind = "gretap",
1694 .maxtype = IFLA_GRE_MAX,
1695 .policy = ipgre_policy,
1696 .priv_size = sizeof(struct ip_tunnel),
1697 .setup = ipgre_tap_setup,
1698 .validate = ipgre_tap_validate,
1699 .newlink = ipgre_newlink,
1700 .changelink = ipgre_changelink,
1701 .get_size = ipgre_get_size,
1702 .fill_info = ipgre_fill_info,
1703};
1704
1da177e4
LT
1705/*
1706 * And now the modules code and kernel interface.
1707 */
1708
1709static int __init ipgre_init(void)
1710{
1711 int err;
1712
1713 printk(KERN_INFO "GRE over IPv4 tunneling driver\n");
1714
cfb8fbf2 1715 err = register_pernet_device(&ipgre_net_ops);
59a4c759 1716 if (err < 0)
c2892f02
AD
1717 return err;
1718
00959ade 1719 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
c2892f02
AD
1720 if (err < 0) {
1721 printk(KERN_INFO "ipgre init: can't add protocol\n");
1722 goto add_proto_failed;
1723 }
7daa0004 1724
c19e654d
HX
1725 err = rtnl_link_register(&ipgre_link_ops);
1726 if (err < 0)
1727 goto rtnl_link_failed;
1728
e1a80002
HX
1729 err = rtnl_link_register(&ipgre_tap_ops);
1730 if (err < 0)
1731 goto tap_ops_failed;
1732
c19e654d 1733out:
1da177e4 1734 return err;
c19e654d 1735
e1a80002
HX
1736tap_ops_failed:
1737 rtnl_link_unregister(&ipgre_link_ops);
c19e654d 1738rtnl_link_failed:
00959ade 1739 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
c2892f02
AD
1740add_proto_failed:
1741 unregister_pernet_device(&ipgre_net_ops);
c19e654d 1742 goto out;
1da177e4
LT
1743}
1744
db44575f 1745static void __exit ipgre_fini(void)
1da177e4 1746{
e1a80002 1747 rtnl_link_unregister(&ipgre_tap_ops);
c19e654d 1748 rtnl_link_unregister(&ipgre_link_ops);
00959ade 1749 if (gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO) < 0)
1da177e4 1750 printk(KERN_INFO "ipgre close: can't remove protocol\n");
c2892f02 1751 unregister_pernet_device(&ipgre_net_ops);
1da177e4
LT
1752}
1753
1754module_init(ipgre_init);
1755module_exit(ipgre_fini);
1756MODULE_LICENSE("GPL");
4d74f8ba
PM
1757MODULE_ALIAS_RTNL_LINK("gre");
1758MODULE_ALIAS_RTNL_LINK("gretap");
8909c9ad 1759MODULE_ALIAS_NETDEV("gre0");
This page took 0.681677 seconds and 5 git commands to generate.