]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/ip_gre.c
net: avoid a dev refcount in ip_mc_find_dev()
[net-next-2.6.git] / net / ipv4 / ip_gre.c
CommitLineData
1da177e4 1/*
e905a9ed 2 * Linux NET3: GRE over IP protocol decoder.
1da177e4
LT
3 *
4 * Authors: Alexey Kuznetsov (kuznet@ms2.inr.ac.ru)
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
4fc268d2 13#include <linux/capability.h>
1da177e4
LT
14#include <linux/module.h>
15#include <linux/types.h>
1da177e4 16#include <linux/kernel.h>
5a0e3ad6 17#include <linux/slab.h>
1da177e4
LT
18#include <asm/uaccess.h>
19#include <linux/skbuff.h>
20#include <linux/netdevice.h>
21#include <linux/in.h>
22#include <linux/tcp.h>
23#include <linux/udp.h>
24#include <linux/if_arp.h>
25#include <linux/mroute.h>
26#include <linux/init.h>
27#include <linux/in6.h>
28#include <linux/inetdevice.h>
29#include <linux/igmp.h>
30#include <linux/netfilter_ipv4.h>
e1a80002 31#include <linux/etherdevice.h>
46f25dff 32#include <linux/if_ether.h>
1da177e4
LT
33
34#include <net/sock.h>
35#include <net/ip.h>
36#include <net/icmp.h>
37#include <net/protocol.h>
38#include <net/ipip.h>
39#include <net/arp.h>
40#include <net/checksum.h>
41#include <net/dsfield.h>
42#include <net/inet_ecn.h>
43#include <net/xfrm.h>
59a4c759
PE
44#include <net/net_namespace.h>
45#include <net/netns/generic.h>
c19e654d 46#include <net/rtnetlink.h>
00959ade 47#include <net/gre.h>
1da177e4 48
842c74bf 49#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4
LT
50#include <net/ipv6.h>
51#include <net/ip6_fib.h>
52#include <net/ip6_route.h>
53#endif
54
55/*
56 Problems & solutions
57 --------------------
58
59 1. The most important issue is detecting local dead loops.
60 They would cause complete host lockup in transmit, which
61 would be "resolved" by stack overflow or, if queueing is enabled,
62 with infinite looping in net_bh.
63
64 We cannot track such dead loops during route installation,
65 it is infeasible task. The most general solutions would be
66 to keep skb->encapsulation counter (sort of local ttl),
6d0722a2 67 and silently drop packet when it expires. It is a good
1da177e4
LT
68 solution, but it supposes maintaing new variable in ALL
69 skb, even if no tunneling is used.
70
6d0722a2
ED
71 Current solution: xmit_recursion breaks dead loops. This is a percpu
72 counter, since when we enter the first ndo_xmit(), cpu migration is
73 forbidden. We force an exit if this counter reaches RECURSION_LIMIT
1da177e4
LT
74
75 2. Networking dead loops would not kill routers, but would really
76 kill network. IP hop limit plays role of "t->recursion" in this case,
77 if we copy it from packet being encapsulated to upper header.
78 It is very good solution, but it introduces two problems:
79
80 - Routing protocols, using packets with ttl=1 (OSPF, RIP2),
81 do not work over tunnels.
82 - traceroute does not work. I planned to relay ICMP from tunnel,
83 so that this problem would be solved and traceroute output
84 would even more informative. This idea appeared to be wrong:
85 only Linux complies to rfc1812 now (yes, guys, Linux is the only
86 true router now :-)), all routers (at least, in neighbourhood of mine)
87 return only 8 bytes of payload. It is the end.
88
89 Hence, if we want that OSPF worked or traceroute said something reasonable,
90 we should search for another solution.
91
92 One of them is to parse packet trying to detect inner encapsulation
93 made by our node. It is difficult or even impossible, especially,
94 taking into account fragmentation. TO be short, tt is not solution at all.
95
96 Current solution: The solution was UNEXPECTEDLY SIMPLE.
97 We force DF flag on tunnels with preconfigured hop limit,
98 that is ALL. :-) Well, it does not remove the problem completely,
99 but exponential growth of network traffic is changed to linear
100 (branches, that exceed pmtu are pruned) and tunnel mtu
101 fastly degrades to value <68, where looping stops.
102 Yes, it is not good if there exists a router in the loop,
103 which does not force DF, even when encapsulating packets have DF set.
104 But it is not our problem! Nobody could accuse us, we made
105 all that we could make. Even if it is your gated who injected
106 fatal route to network, even if it were you who configured
107 fatal static route: you are innocent. :-)
108
109
110
111 3. Really, ipv4/ipip.c, ipv4/ip_gre.c and ipv6/sit.c contain
112 practically identical code. It would be good to glue them
113 together, but it is not very evident, how to make them modular.
114 sit is integral part of IPv6, ipip and gre are naturally modular.
115 We could extract common parts (hash table, ioctl etc)
116 to a separate module (ip_tunnel.c).
117
118 Alexey Kuznetsov.
119 */
120
c19e654d 121static struct rtnl_link_ops ipgre_link_ops __read_mostly;
1da177e4
LT
122static int ipgre_tunnel_init(struct net_device *dev);
123static void ipgre_tunnel_setup(struct net_device *dev);
42aa9162 124static int ipgre_tunnel_bind_dev(struct net_device *dev);
1da177e4
LT
125
126/* Fallback tunnel: no source, no destination, no key, no options */
127
eb8ce741
PE
128#define HASH_SIZE 16
129
f99189b1 130static int ipgre_net_id __read_mostly;
59a4c759 131struct ipgre_net {
1507850b 132 struct ip_tunnel __rcu *tunnels[4][HASH_SIZE];
eb8ce741 133
7daa0004 134 struct net_device *fb_tunnel_dev;
59a4c759
PE
135};
136
1da177e4
LT
137/* Tunnel hash table */
138
139/*
140 4 hash tables:
141
142 3: (remote,local)
143 2: (remote,*)
144 1: (*,local)
145 0: (*,*)
146
147 We require exact key match i.e. if a key is present in packet
148 it will match only tunnel with the same key; if it is not present,
149 it will match only keyless tunnel.
150
151 All keysless packets, if not matched configured keyless tunnels
152 will match fallback tunnel.
153 */
154
d5a0a1e3 155#define HASH(addr) (((__force u32)addr^((__force u32)addr>>4))&0xF)
1da177e4 156
eb8ce741
PE
157#define tunnels_r_l tunnels[3]
158#define tunnels_r tunnels[2]
159#define tunnels_l tunnels[1]
160#define tunnels_wc tunnels[0]
8d5b2c08 161/*
1507850b 162 * Locking : hash tables are protected by RCU and RTNL
8d5b2c08 163 */
1da177e4 164
8d5b2c08
ED
165#define for_each_ip_tunnel_rcu(start) \
166 for (t = rcu_dereference(start); t; t = rcu_dereference(t->next))
1da177e4 167
e985aad7
ED
168/* often modified stats are per cpu, other are shared (netdev->stats) */
169struct pcpu_tstats {
170 unsigned long rx_packets;
171 unsigned long rx_bytes;
172 unsigned long tx_packets;
173 unsigned long tx_bytes;
174};
175
176static struct net_device_stats *ipgre_get_stats(struct net_device *dev)
177{
178 struct pcpu_tstats sum = { 0 };
179 int i;
180
181 for_each_possible_cpu(i) {
182 const struct pcpu_tstats *tstats = per_cpu_ptr(dev->tstats, i);
183
184 sum.rx_packets += tstats->rx_packets;
185 sum.rx_bytes += tstats->rx_bytes;
186 sum.tx_packets += tstats->tx_packets;
187 sum.tx_bytes += tstats->tx_bytes;
188 }
189 dev->stats.rx_packets = sum.rx_packets;
190 dev->stats.rx_bytes = sum.rx_bytes;
191 dev->stats.tx_packets = sum.tx_packets;
192 dev->stats.tx_bytes = sum.tx_bytes;
193 return &dev->stats;
194}
195
1da177e4
LT
196/* Given src, dst and key, find appropriate for input tunnel. */
197
749c10f9 198static struct ip_tunnel * ipgre_tunnel_lookup(struct net_device *dev,
e1a80002
HX
199 __be32 remote, __be32 local,
200 __be32 key, __be16 gre_proto)
1da177e4 201{
749c10f9
TT
202 struct net *net = dev_net(dev);
203 int link = dev->ifindex;
1507850b
ED
204 unsigned int h0 = HASH(remote);
205 unsigned int h1 = HASH(key);
afcf1242 206 struct ip_tunnel *t, *cand = NULL;
7daa0004 207 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
e1a80002
HX
208 int dev_type = (gre_proto == htons(ETH_P_TEB)) ?
209 ARPHRD_ETHER : ARPHRD_IPGRE;
afcf1242 210 int score, cand_score = 4;
1da177e4 211
8d5b2c08 212 for_each_ip_tunnel_rcu(ign->tunnels_r_l[h0 ^ h1]) {
749c10f9
TT
213 if (local != t->parms.iph.saddr ||
214 remote != t->parms.iph.daddr ||
215 key != t->parms.i_key ||
216 !(t->dev->flags & IFF_UP))
217 continue;
218
219 if (t->dev->type != ARPHRD_IPGRE &&
220 t->dev->type != dev_type)
221 continue;
222
afcf1242 223 score = 0;
749c10f9 224 if (t->parms.link != link)
afcf1242 225 score |= 1;
749c10f9 226 if (t->dev->type != dev_type)
afcf1242
TT
227 score |= 2;
228 if (score == 0)
749c10f9 229 return t;
afcf1242
TT
230
231 if (score < cand_score) {
232 cand = t;
233 cand_score = score;
234 }
1da177e4 235 }
e1a80002 236
8d5b2c08 237 for_each_ip_tunnel_rcu(ign->tunnels_r[h0 ^ h1]) {
749c10f9
TT
238 if (remote != t->parms.iph.daddr ||
239 key != t->parms.i_key ||
240 !(t->dev->flags & IFF_UP))
241 continue;
242
243 if (t->dev->type != ARPHRD_IPGRE &&
244 t->dev->type != dev_type)
245 continue;
246
afcf1242 247 score = 0;
749c10f9 248 if (t->parms.link != link)
afcf1242 249 score |= 1;
749c10f9 250 if (t->dev->type != dev_type)
afcf1242
TT
251 score |= 2;
252 if (score == 0)
749c10f9 253 return t;
afcf1242
TT
254
255 if (score < cand_score) {
256 cand = t;
257 cand_score = score;
258 }
1da177e4 259 }
e1a80002 260
8d5b2c08 261 for_each_ip_tunnel_rcu(ign->tunnels_l[h1]) {
749c10f9
TT
262 if ((local != t->parms.iph.saddr &&
263 (local != t->parms.iph.daddr ||
264 !ipv4_is_multicast(local))) ||
265 key != t->parms.i_key ||
266 !(t->dev->flags & IFF_UP))
267 continue;
268
269 if (t->dev->type != ARPHRD_IPGRE &&
270 t->dev->type != dev_type)
271 continue;
272
afcf1242 273 score = 0;
749c10f9 274 if (t->parms.link != link)
afcf1242 275 score |= 1;
749c10f9 276 if (t->dev->type != dev_type)
afcf1242
TT
277 score |= 2;
278 if (score == 0)
749c10f9 279 return t;
afcf1242
TT
280
281 if (score < cand_score) {
282 cand = t;
283 cand_score = score;
284 }
1da177e4 285 }
e1a80002 286
8d5b2c08 287 for_each_ip_tunnel_rcu(ign->tunnels_wc[h1]) {
749c10f9
TT
288 if (t->parms.i_key != key ||
289 !(t->dev->flags & IFF_UP))
290 continue;
291
292 if (t->dev->type != ARPHRD_IPGRE &&
293 t->dev->type != dev_type)
294 continue;
295
afcf1242 296 score = 0;
749c10f9 297 if (t->parms.link != link)
afcf1242 298 score |= 1;
749c10f9 299 if (t->dev->type != dev_type)
afcf1242
TT
300 score |= 2;
301 if (score == 0)
749c10f9 302 return t;
afcf1242
TT
303
304 if (score < cand_score) {
305 cand = t;
306 cand_score = score;
307 }
1da177e4
LT
308 }
309
afcf1242
TT
310 if (cand != NULL)
311 return cand;
e1a80002 312
8d5b2c08
ED
313 dev = ign->fb_tunnel_dev;
314 if (dev->flags & IFF_UP)
315 return netdev_priv(dev);
749c10f9 316
1da177e4
LT
317 return NULL;
318}
319
1507850b 320static struct ip_tunnel __rcu **__ipgre_bucket(struct ipgre_net *ign,
f57e7d5a 321 struct ip_tunnel_parm *parms)
1da177e4 322{
5056a1ef
YH
323 __be32 remote = parms->iph.daddr;
324 __be32 local = parms->iph.saddr;
325 __be32 key = parms->i_key;
1507850b 326 unsigned int h = HASH(key);
1da177e4
LT
327 int prio = 0;
328
329 if (local)
330 prio |= 1;
f97c1e0c 331 if (remote && !ipv4_is_multicast(remote)) {
1da177e4
LT
332 prio |= 2;
333 h ^= HASH(remote);
334 }
335
eb8ce741 336 return &ign->tunnels[prio][h];
1da177e4
LT
337}
338
1507850b 339static inline struct ip_tunnel __rcu **ipgre_bucket(struct ipgre_net *ign,
f57e7d5a 340 struct ip_tunnel *t)
5056a1ef 341{
f57e7d5a 342 return __ipgre_bucket(ign, &t->parms);
5056a1ef
YH
343}
344
f57e7d5a 345static void ipgre_tunnel_link(struct ipgre_net *ign, struct ip_tunnel *t)
1da177e4 346{
1507850b 347 struct ip_tunnel __rcu **tp = ipgre_bucket(ign, t);
1da177e4 348
1507850b 349 rcu_assign_pointer(t->next, rtnl_dereference(*tp));
8d5b2c08 350 rcu_assign_pointer(*tp, t);
1da177e4
LT
351}
352
f57e7d5a 353static void ipgre_tunnel_unlink(struct ipgre_net *ign, struct ip_tunnel *t)
1da177e4 354{
1507850b
ED
355 struct ip_tunnel __rcu **tp;
356 struct ip_tunnel *iter;
357
358 for (tp = ipgre_bucket(ign, t);
359 (iter = rtnl_dereference(*tp)) != NULL;
360 tp = &iter->next) {
361 if (t == iter) {
362 rcu_assign_pointer(*tp, t->next);
1da177e4
LT
363 break;
364 }
365 }
366}
367
e1a80002
HX
368static struct ip_tunnel *ipgre_tunnel_find(struct net *net,
369 struct ip_tunnel_parm *parms,
370 int type)
1da177e4 371{
d5a0a1e3
AV
372 __be32 remote = parms->iph.daddr;
373 __be32 local = parms->iph.saddr;
374 __be32 key = parms->i_key;
749c10f9 375 int link = parms->link;
1507850b
ED
376 struct ip_tunnel *t;
377 struct ip_tunnel __rcu **tp;
e1a80002
HX
378 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
379
1507850b
ED
380 for (tp = __ipgre_bucket(ign, parms);
381 (t = rtnl_dereference(*tp)) != NULL;
382 tp = &t->next)
e1a80002
HX
383 if (local == t->parms.iph.saddr &&
384 remote == t->parms.iph.daddr &&
385 key == t->parms.i_key &&
749c10f9 386 link == t->parms.link &&
e1a80002
HX
387 type == t->dev->type)
388 break;
389
390 return t;
391}
392
1507850b 393static struct ip_tunnel *ipgre_tunnel_locate(struct net *net,
e1a80002
HX
394 struct ip_tunnel_parm *parms, int create)
395{
396 struct ip_tunnel *t, *nt;
1da177e4 397 struct net_device *dev;
1da177e4 398 char name[IFNAMSIZ];
f57e7d5a 399 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1da177e4 400
e1a80002
HX
401 t = ipgre_tunnel_find(net, parms, ARPHRD_IPGRE);
402 if (t || !create)
403 return t;
1da177e4
LT
404
405 if (parms->name[0])
406 strlcpy(name, parms->name, IFNAMSIZ);
34cc7ba6
PE
407 else
408 sprintf(name, "gre%%d");
1da177e4
LT
409
410 dev = alloc_netdev(sizeof(*t), name, ipgre_tunnel_setup);
411 if (!dev)
412 return NULL;
413
0b67eceb
PE
414 dev_net_set(dev, net);
415
b37d428b
PE
416 if (strchr(name, '%')) {
417 if (dev_alloc_name(dev, name) < 0)
418 goto failed_free;
419 }
420
2941a486 421 nt = netdev_priv(dev);
1da177e4 422 nt->parms = *parms;
c19e654d 423 dev->rtnl_link_ops = &ipgre_link_ops;
1da177e4 424
42aa9162
HX
425 dev->mtu = ipgre_tunnel_bind_dev(dev);
426
b37d428b
PE
427 if (register_netdevice(dev) < 0)
428 goto failed_free;
1da177e4 429
1da177e4 430 dev_hold(dev);
f57e7d5a 431 ipgre_tunnel_link(ign, nt);
1da177e4
LT
432 return nt;
433
b37d428b
PE
434failed_free:
435 free_netdev(dev);
1da177e4
LT
436 return NULL;
437}
438
439static void ipgre_tunnel_uninit(struct net_device *dev)
440{
f57e7d5a
PE
441 struct net *net = dev_net(dev);
442 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
443
444 ipgre_tunnel_unlink(ign, netdev_priv(dev));
1da177e4
LT
445 dev_put(dev);
446}
447
448
449static void ipgre_err(struct sk_buff *skb, u32 info)
450{
1da177e4 451
071f92d0 452/* All the routers (except for Linux) return only
1da177e4
LT
453 8 bytes of packet payload. It means, that precise relaying of
454 ICMP in the real Internet is absolutely infeasible.
455
456 Moreover, Cisco "wise men" put GRE key to the third word
457 in GRE header. It makes impossible maintaining even soft state for keyed
458 GRE tunnels with enabled checksum. Tell them "thank you".
459
460 Well, I wonder, rfc1812 was written by Cisco employee,
461 what the hell these idiots break standrads established
462 by themself???
463 */
464
6ed2533e 465 struct iphdr *iph = (struct iphdr *)skb->data;
d5a0a1e3 466 __be16 *p = (__be16*)(skb->data+(iph->ihl<<2));
1da177e4 467 int grehlen = (iph->ihl<<2) + 4;
88c7664f
ACM
468 const int type = icmp_hdr(skb)->type;
469 const int code = icmp_hdr(skb)->code;
1da177e4 470 struct ip_tunnel *t;
d5a0a1e3 471 __be16 flags;
1da177e4
LT
472
473 flags = p[0];
474 if (flags&(GRE_CSUM|GRE_KEY|GRE_SEQ|GRE_ROUTING|GRE_VERSION)) {
475 if (flags&(GRE_VERSION|GRE_ROUTING))
476 return;
477 if (flags&GRE_KEY) {
478 grehlen += 4;
479 if (flags&GRE_CSUM)
480 grehlen += 4;
481 }
482 }
483
484 /* If only 8 bytes returned, keyed message will be dropped here */
485 if (skb_headlen(skb) < grehlen)
486 return;
487
488 switch (type) {
489 default:
490 case ICMP_PARAMETERPROB:
491 return;
492
493 case ICMP_DEST_UNREACH:
494 switch (code) {
495 case ICMP_SR_FAILED:
496 case ICMP_PORT_UNREACH:
497 /* Impossible event. */
498 return;
499 case ICMP_FRAG_NEEDED:
500 /* Soft state for pmtu is maintained by IP core. */
501 return;
502 default:
503 /* All others are translated to HOST_UNREACH.
504 rfc2003 contains "deep thoughts" about NET_UNREACH,
505 I believe they are just ether pollution. --ANK
506 */
507 break;
508 }
509 break;
510 case ICMP_TIME_EXCEEDED:
511 if (code != ICMP_EXC_TTL)
512 return;
513 break;
514 }
515
8d5b2c08 516 rcu_read_lock();
749c10f9 517 t = ipgre_tunnel_lookup(skb->dev, iph->daddr, iph->saddr,
e1a80002
HX
518 flags & GRE_KEY ?
519 *(((__be32 *)p) + (grehlen / 4) - 1) : 0,
520 p[1]);
f97c1e0c
JP
521 if (t == NULL || t->parms.iph.daddr == 0 ||
522 ipv4_is_multicast(t->parms.iph.daddr))
1da177e4
LT
523 goto out;
524
525 if (t->parms.iph.ttl == 0 && type == ICMP_TIME_EXCEEDED)
526 goto out;
527
da6185d8 528 if (time_before(jiffies, t->err_time + IPTUNNEL_ERR_TIMEO))
1da177e4
LT
529 t->err_count++;
530 else
531 t->err_count = 1;
532 t->err_time = jiffies;
533out:
8d5b2c08 534 rcu_read_unlock();
1da177e4
LT
535}
536
537static inline void ipgre_ecn_decapsulate(struct iphdr *iph, struct sk_buff *skb)
538{
539 if (INET_ECN_is_ce(iph->tos)) {
540 if (skb->protocol == htons(ETH_P_IP)) {
eddc9ec5 541 IP_ECN_set_ce(ip_hdr(skb));
1da177e4 542 } else if (skb->protocol == htons(ETH_P_IPV6)) {
0660e03f 543 IP6_ECN_set_ce(ipv6_hdr(skb));
1da177e4
LT
544 }
545 }
546}
547
548static inline u8
549ipgre_ecn_encapsulate(u8 tos, struct iphdr *old_iph, struct sk_buff *skb)
550{
551 u8 inner = 0;
552 if (skb->protocol == htons(ETH_P_IP))
553 inner = old_iph->tos;
554 else if (skb->protocol == htons(ETH_P_IPV6))
555 inner = ipv6_get_dsfield((struct ipv6hdr *)old_iph);
556 return INET_ECN_encapsulate(tos, inner);
557}
558
559static int ipgre_rcv(struct sk_buff *skb)
560{
561 struct iphdr *iph;
562 u8 *h;
d5a0a1e3 563 __be16 flags;
d3bc23e7 564 __sum16 csum = 0;
d5a0a1e3 565 __be32 key = 0;
1da177e4
LT
566 u32 seqno = 0;
567 struct ip_tunnel *tunnel;
568 int offset = 4;
e1a80002 569 __be16 gre_proto;
1da177e4
LT
570
571 if (!pskb_may_pull(skb, 16))
572 goto drop_nolock;
573
eddc9ec5 574 iph = ip_hdr(skb);
1da177e4 575 h = skb->data;
d5a0a1e3 576 flags = *(__be16*)h;
1da177e4
LT
577
578 if (flags&(GRE_CSUM|GRE_KEY|GRE_ROUTING|GRE_SEQ|GRE_VERSION)) {
579 /* - Version must be 0.
580 - We do not support routing headers.
581 */
582 if (flags&(GRE_VERSION|GRE_ROUTING))
583 goto drop_nolock;
584
585 if (flags&GRE_CSUM) {
fb286bb2 586 switch (skb->ip_summed) {
84fa7933 587 case CHECKSUM_COMPLETE:
d3bc23e7 588 csum = csum_fold(skb->csum);
fb286bb2
HX
589 if (!csum)
590 break;
591 /* fall through */
592 case CHECKSUM_NONE:
593 skb->csum = 0;
594 csum = __skb_checksum_complete(skb);
84fa7933 595 skb->ip_summed = CHECKSUM_COMPLETE;
1da177e4
LT
596 }
597 offset += 4;
598 }
599 if (flags&GRE_KEY) {
d5a0a1e3 600 key = *(__be32*)(h + offset);
1da177e4
LT
601 offset += 4;
602 }
603 if (flags&GRE_SEQ) {
d5a0a1e3 604 seqno = ntohl(*(__be32*)(h + offset));
1da177e4
LT
605 offset += 4;
606 }
607 }
608
e1a80002
HX
609 gre_proto = *(__be16 *)(h + 2);
610
8d5b2c08 611 rcu_read_lock();
749c10f9 612 if ((tunnel = ipgre_tunnel_lookup(skb->dev,
e1a80002
HX
613 iph->saddr, iph->daddr, key,
614 gre_proto))) {
e985aad7 615 struct pcpu_tstats *tstats;
addd68eb 616
1da177e4
LT
617 secpath_reset(skb);
618
e1a80002 619 skb->protocol = gre_proto;
1da177e4
LT
620 /* WCCP version 1 and 2 protocol decoding.
621 * - Change protocol to IP
622 * - When dealing with WCCPv2, Skip extra 4 bytes in GRE header
623 */
e1a80002 624 if (flags == 0 && gre_proto == htons(ETH_P_WCCP)) {
496c98df 625 skb->protocol = htons(ETH_P_IP);
e905a9ed 626 if ((*(h + offset) & 0xF0) != 0x40)
1da177e4
LT
627 offset += 4;
628 }
629
1d069167 630 skb->mac_header = skb->network_header;
4209fb60 631 __pskb_pull(skb, offset);
9c70220b 632 skb_postpull_rcsum(skb, skb_transport_header(skb), offset);
1da177e4
LT
633 skb->pkt_type = PACKET_HOST;
634#ifdef CONFIG_NET_IPGRE_BROADCAST
f97c1e0c 635 if (ipv4_is_multicast(iph->daddr)) {
1da177e4 636 /* Looped back packet, drop it! */
511c3f92 637 if (skb_rtable(skb)->fl.iif == 0)
1da177e4 638 goto drop;
e985aad7 639 tunnel->dev->stats.multicast++;
1da177e4
LT
640 skb->pkt_type = PACKET_BROADCAST;
641 }
642#endif
643
644 if (((flags&GRE_CSUM) && csum) ||
645 (!(flags&GRE_CSUM) && tunnel->parms.i_flags&GRE_CSUM)) {
e985aad7
ED
646 tunnel->dev->stats.rx_crc_errors++;
647 tunnel->dev->stats.rx_errors++;
1da177e4
LT
648 goto drop;
649 }
650 if (tunnel->parms.i_flags&GRE_SEQ) {
651 if (!(flags&GRE_SEQ) ||
652 (tunnel->i_seqno && (s32)(seqno - tunnel->i_seqno) < 0)) {
e985aad7
ED
653 tunnel->dev->stats.rx_fifo_errors++;
654 tunnel->dev->stats.rx_errors++;
1da177e4
LT
655 goto drop;
656 }
657 tunnel->i_seqno = seqno + 1;
658 }
e1a80002
HX
659
660 /* Warning: All skb pointers will be invalidated! */
661 if (tunnel->dev->type == ARPHRD_ETHER) {
662 if (!pskb_may_pull(skb, ETH_HLEN)) {
e985aad7
ED
663 tunnel->dev->stats.rx_length_errors++;
664 tunnel->dev->stats.rx_errors++;
e1a80002
HX
665 goto drop;
666 }
667
668 iph = ip_hdr(skb);
669 skb->protocol = eth_type_trans(skb, tunnel->dev);
670 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN);
671 }
672
e985aad7
ED
673 tstats = this_cpu_ptr(tunnel->dev->tstats);
674 tstats->rx_packets++;
675 tstats->rx_bytes += skb->len;
676
677 __skb_tunnel_rx(skb, tunnel->dev);
e1a80002
HX
678
679 skb_reset_network_header(skb);
1da177e4 680 ipgre_ecn_decapsulate(iph, skb);
e1a80002 681
caf586e5 682 netif_rx(skb);
8990f468 683
8d5b2c08 684 rcu_read_unlock();
8990f468 685 return 0;
1da177e4 686 }
45af08be 687 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
1da177e4
LT
688
689drop:
8d5b2c08 690 rcu_read_unlock();
1da177e4
LT
691drop_nolock:
692 kfree_skb(skb);
a02cec21 693 return 0;
1da177e4
LT
694}
695
6fef4c0c 696static netdev_tx_t ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
1da177e4 697{
2941a486 698 struct ip_tunnel *tunnel = netdev_priv(dev);
e985aad7 699 struct pcpu_tstats *tstats;
eddc9ec5 700 struct iphdr *old_iph = ip_hdr(skb);
1da177e4
LT
701 struct iphdr *tiph;
702 u8 tos;
d5a0a1e3 703 __be16 df;
1da177e4 704 struct rtable *rt; /* Route to the other host */
1507850b 705 struct net_device *tdev; /* Device to other host */
1da177e4 706 struct iphdr *iph; /* Our new IP header */
c2636b4d 707 unsigned int max_headroom; /* The extra header space needed */
1da177e4 708 int gre_hlen;
d5a0a1e3 709 __be32 dst;
1da177e4
LT
710 int mtu;
711
e1a80002
HX
712 if (dev->type == ARPHRD_ETHER)
713 IPCB(skb)->flags = 0;
714
715 if (dev->header_ops && dev->type == ARPHRD_IPGRE) {
1da177e4 716 gre_hlen = 0;
6ed2533e 717 tiph = (struct iphdr *)skb->data;
1da177e4
LT
718 } else {
719 gre_hlen = tunnel->hlen;
720 tiph = &tunnel->parms.iph;
721 }
722
723 if ((dst = tiph->daddr) == 0) {
724 /* NBMA tunnel */
725
adf30907 726 if (skb_dst(skb) == NULL) {
e985aad7 727 dev->stats.tx_fifo_errors++;
1da177e4
LT
728 goto tx_error;
729 }
730
731 if (skb->protocol == htons(ETH_P_IP)) {
511c3f92 732 rt = skb_rtable(skb);
1da177e4
LT
733 if ((dst = rt->rt_gateway) == 0)
734 goto tx_error_icmp;
735 }
842c74bf 736#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4
LT
737 else if (skb->protocol == htons(ETH_P_IPV6)) {
738 struct in6_addr *addr6;
739 int addr_type;
adf30907 740 struct neighbour *neigh = skb_dst(skb)->neighbour;
1da177e4
LT
741
742 if (neigh == NULL)
743 goto tx_error;
744
6ed2533e 745 addr6 = (struct in6_addr *)&neigh->primary_key;
1da177e4
LT
746 addr_type = ipv6_addr_type(addr6);
747
748 if (addr_type == IPV6_ADDR_ANY) {
0660e03f 749 addr6 = &ipv6_hdr(skb)->daddr;
1da177e4
LT
750 addr_type = ipv6_addr_type(addr6);
751 }
752
753 if ((addr_type & IPV6_ADDR_COMPATv4) == 0)
754 goto tx_error_icmp;
755
756 dst = addr6->s6_addr32[3];
757 }
758#endif
759 else
760 goto tx_error;
761 }
762
763 tos = tiph->tos;
ee686ca9
AJ
764 if (tos == 1) {
765 tos = 0;
1da177e4
LT
766 if (skb->protocol == htons(ETH_P_IP))
767 tos = old_iph->tos;
dd4ba83d
SH
768 else if (skb->protocol == htons(ETH_P_IPV6))
769 tos = ipv6_get_dsfield((struct ipv6hdr *)old_iph);
1da177e4
LT
770 }
771
772 {
e985aad7
ED
773 struct flowi fl = {
774 .oif = tunnel->parms.link,
775 .nl_u = {
776 .ip4_u = {
777 .daddr = dst,
778 .saddr = tiph->saddr,
779 .tos = RT_TOS(tos)
780 }
781 },
782 .proto = IPPROTO_GRE
783 }
784;
96635522 785 if (ip_route_output_key(dev_net(dev), &rt, &fl)) {
e985aad7 786 dev->stats.tx_carrier_errors++;
1da177e4
LT
787 goto tx_error;
788 }
789 }
d8d1f30b 790 tdev = rt->dst.dev;
1da177e4
LT
791
792 if (tdev == dev) {
793 ip_rt_put(rt);
e985aad7 794 dev->stats.collisions++;
1da177e4
LT
795 goto tx_error;
796 }
797
798 df = tiph->frag_off;
799 if (df)
d8d1f30b 800 mtu = dst_mtu(&rt->dst) - dev->hard_header_len - tunnel->hlen;
1da177e4 801 else
adf30907 802 mtu = skb_dst(skb) ? dst_mtu(skb_dst(skb)) : dev->mtu;
1da177e4 803
adf30907
ED
804 if (skb_dst(skb))
805 skb_dst(skb)->ops->update_pmtu(skb_dst(skb), mtu);
1da177e4
LT
806
807 if (skb->protocol == htons(ETH_P_IP)) {
808 df |= (old_iph->frag_off&htons(IP_DF));
809
810 if ((old_iph->frag_off&htons(IP_DF)) &&
811 mtu < ntohs(old_iph->tot_len)) {
812 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, htonl(mtu));
813 ip_rt_put(rt);
814 goto tx_error;
815 }
816 }
842c74bf 817#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4 818 else if (skb->protocol == htons(ETH_P_IPV6)) {
adf30907 819 struct rt6_info *rt6 = (struct rt6_info *)skb_dst(skb);
1da177e4 820
adf30907 821 if (rt6 && mtu < dst_mtu(skb_dst(skb)) && mtu >= IPV6_MIN_MTU) {
f97c1e0c
JP
822 if ((tunnel->parms.iph.daddr &&
823 !ipv4_is_multicast(tunnel->parms.iph.daddr)) ||
1da177e4
LT
824 rt6->rt6i_dst.plen == 128) {
825 rt6->rt6i_flags |= RTF_MODIFIED;
adf30907 826 skb_dst(skb)->metrics[RTAX_MTU-1] = mtu;
1da177e4
LT
827 }
828 }
829
830 if (mtu >= IPV6_MIN_MTU && mtu < skb->len - tunnel->hlen + gre_hlen) {
3ffe533c 831 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
1da177e4
LT
832 ip_rt_put(rt);
833 goto tx_error;
834 }
835 }
836#endif
837
838 if (tunnel->err_count > 0) {
da6185d8
WY
839 if (time_before(jiffies,
840 tunnel->err_time + IPTUNNEL_ERR_TIMEO)) {
1da177e4
LT
841 tunnel->err_count--;
842
843 dst_link_failure(skb);
844 } else
845 tunnel->err_count = 0;
846 }
847
d8d1f30b 848 max_headroom = LL_RESERVED_SPACE(tdev) + gre_hlen + rt->dst.header_len;
1da177e4 849
cfbba49d
PM
850 if (skb_headroom(skb) < max_headroom || skb_shared(skb)||
851 (skb_cloned(skb) && !skb_clone_writable(skb, 0))) {
1da177e4 852 struct sk_buff *new_skb = skb_realloc_headroom(skb, max_headroom);
243aad83
TT
853 if (max_headroom > dev->needed_headroom)
854 dev->needed_headroom = max_headroom;
1da177e4
LT
855 if (!new_skb) {
856 ip_rt_put(rt);
e985aad7 857 dev->stats.tx_dropped++;
1da177e4 858 dev_kfree_skb(skb);
6ed10654 859 return NETDEV_TX_OK;
1da177e4
LT
860 }
861 if (skb->sk)
862 skb_set_owner_w(new_skb, skb->sk);
863 dev_kfree_skb(skb);
864 skb = new_skb;
eddc9ec5 865 old_iph = ip_hdr(skb);
1da177e4
LT
866 }
867
64194c31 868 skb_reset_transport_header(skb);
e2d1bca7
ACM
869 skb_push(skb, gre_hlen);
870 skb_reset_network_header(skb);
1da177e4 871 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
48d5cad8
PM
872 IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
873 IPSKB_REROUTED);
adf30907 874 skb_dst_drop(skb);
d8d1f30b 875 skb_dst_set(skb, &rt->dst);
1da177e4
LT
876
877 /*
878 * Push down and install the IPIP header.
879 */
880
eddc9ec5 881 iph = ip_hdr(skb);
1da177e4
LT
882 iph->version = 4;
883 iph->ihl = sizeof(struct iphdr) >> 2;
884 iph->frag_off = df;
885 iph->protocol = IPPROTO_GRE;
886 iph->tos = ipgre_ecn_encapsulate(tos, old_iph, skb);
887 iph->daddr = rt->rt_dst;
888 iph->saddr = rt->rt_src;
889
890 if ((iph->ttl = tiph->ttl) == 0) {
891 if (skb->protocol == htons(ETH_P_IP))
892 iph->ttl = old_iph->ttl;
842c74bf 893#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1da177e4 894 else if (skb->protocol == htons(ETH_P_IPV6))
6ed2533e 895 iph->ttl = ((struct ipv6hdr *)old_iph)->hop_limit;
1da177e4
LT
896#endif
897 else
d8d1f30b 898 iph->ttl = dst_metric(&rt->dst, RTAX_HOPLIMIT);
1da177e4
LT
899 }
900
e1a80002
HX
901 ((__be16 *)(iph + 1))[0] = tunnel->parms.o_flags;
902 ((__be16 *)(iph + 1))[1] = (dev->type == ARPHRD_ETHER) ?
903 htons(ETH_P_TEB) : skb->protocol;
1da177e4
LT
904
905 if (tunnel->parms.o_flags&(GRE_KEY|GRE_CSUM|GRE_SEQ)) {
d5a0a1e3 906 __be32 *ptr = (__be32*)(((u8*)iph) + tunnel->hlen - 4);
1da177e4
LT
907
908 if (tunnel->parms.o_flags&GRE_SEQ) {
909 ++tunnel->o_seqno;
910 *ptr = htonl(tunnel->o_seqno);
911 ptr--;
912 }
913 if (tunnel->parms.o_flags&GRE_KEY) {
914 *ptr = tunnel->parms.o_key;
915 ptr--;
916 }
917 if (tunnel->parms.o_flags&GRE_CSUM) {
918 *ptr = 0;
5f92a738 919 *(__sum16*)ptr = ip_compute_csum((void*)(iph+1), skb->len - sizeof(struct iphdr));
1da177e4
LT
920 }
921 }
922
923 nf_reset(skb);
e985aad7
ED
924 tstats = this_cpu_ptr(dev->tstats);
925 __IPTUNNEL_XMIT(tstats, &dev->stats);
6ed10654 926 return NETDEV_TX_OK;
1da177e4
LT
927
928tx_error_icmp:
929 dst_link_failure(skb);
930
931tx_error:
e985aad7 932 dev->stats.tx_errors++;
1da177e4 933 dev_kfree_skb(skb);
6ed10654 934 return NETDEV_TX_OK;
1da177e4
LT
935}
936
42aa9162 937static int ipgre_tunnel_bind_dev(struct net_device *dev)
ee34c1eb
MS
938{
939 struct net_device *tdev = NULL;
940 struct ip_tunnel *tunnel;
941 struct iphdr *iph;
942 int hlen = LL_MAX_HEADER;
943 int mtu = ETH_DATA_LEN;
944 int addend = sizeof(struct iphdr) + 4;
945
946 tunnel = netdev_priv(dev);
947 iph = &tunnel->parms.iph;
948
c95b819a 949 /* Guess output device to choose reasonable mtu and needed_headroom */
ee34c1eb
MS
950
951 if (iph->daddr) {
e985aad7
ED
952 struct flowi fl = {
953 .oif = tunnel->parms.link,
954 .nl_u = {
955 .ip4_u = {
956 .daddr = iph->daddr,
957 .saddr = iph->saddr,
958 .tos = RT_TOS(iph->tos)
959 }
960 },
961 .proto = IPPROTO_GRE
962 };
ee34c1eb 963 struct rtable *rt;
e985aad7 964
96635522 965 if (!ip_route_output_key(dev_net(dev), &rt, &fl)) {
d8d1f30b 966 tdev = rt->dst.dev;
ee34c1eb
MS
967 ip_rt_put(rt);
968 }
e1a80002
HX
969
970 if (dev->type != ARPHRD_ETHER)
971 dev->flags |= IFF_POINTOPOINT;
ee34c1eb
MS
972 }
973
974 if (!tdev && tunnel->parms.link)
96635522 975 tdev = __dev_get_by_index(dev_net(dev), tunnel->parms.link);
ee34c1eb
MS
976
977 if (tdev) {
c95b819a 978 hlen = tdev->hard_header_len + tdev->needed_headroom;
ee34c1eb
MS
979 mtu = tdev->mtu;
980 }
981 dev->iflink = tunnel->parms.link;
982
983 /* Precalculate GRE options length */
984 if (tunnel->parms.o_flags&(GRE_CSUM|GRE_KEY|GRE_SEQ)) {
985 if (tunnel->parms.o_flags&GRE_CSUM)
986 addend += 4;
987 if (tunnel->parms.o_flags&GRE_KEY)
988 addend += 4;
989 if (tunnel->parms.o_flags&GRE_SEQ)
990 addend += 4;
991 }
c95b819a 992 dev->needed_headroom = addend + hlen;
8cdb0456 993 mtu -= dev->hard_header_len + addend;
42aa9162
HX
994
995 if (mtu < 68)
996 mtu = 68;
997
ee34c1eb
MS
998 tunnel->hlen = addend;
999
42aa9162 1000 return mtu;
ee34c1eb
MS
1001}
1002
1da177e4
LT
1003static int
1004ipgre_tunnel_ioctl (struct net_device *dev, struct ifreq *ifr, int cmd)
1005{
1006 int err = 0;
1007 struct ip_tunnel_parm p;
1008 struct ip_tunnel *t;
f57e7d5a
PE
1009 struct net *net = dev_net(dev);
1010 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1da177e4
LT
1011
1012 switch (cmd) {
1013 case SIOCGETTUNNEL:
1014 t = NULL;
7daa0004 1015 if (dev == ign->fb_tunnel_dev) {
1da177e4
LT
1016 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) {
1017 err = -EFAULT;
1018 break;
1019 }
f57e7d5a 1020 t = ipgre_tunnel_locate(net, &p, 0);
1da177e4
LT
1021 }
1022 if (t == NULL)
2941a486 1023 t = netdev_priv(dev);
1da177e4
LT
1024 memcpy(&p, &t->parms, sizeof(p));
1025 if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p)))
1026 err = -EFAULT;
1027 break;
1028
1029 case SIOCADDTUNNEL:
1030 case SIOCCHGTUNNEL:
1031 err = -EPERM;
1032 if (!capable(CAP_NET_ADMIN))
1033 goto done;
1034
1035 err = -EFAULT;
1036 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1037 goto done;
1038
1039 err = -EINVAL;
1040 if (p.iph.version != 4 || p.iph.protocol != IPPROTO_GRE ||
1041 p.iph.ihl != 5 || (p.iph.frag_off&htons(~IP_DF)) ||
1042 ((p.i_flags|p.o_flags)&(GRE_VERSION|GRE_ROUTING)))
1043 goto done;
1044 if (p.iph.ttl)
1045 p.iph.frag_off |= htons(IP_DF);
1046
1047 if (!(p.i_flags&GRE_KEY))
1048 p.i_key = 0;
1049 if (!(p.o_flags&GRE_KEY))
1050 p.o_key = 0;
1051
f57e7d5a 1052 t = ipgre_tunnel_locate(net, &p, cmd == SIOCADDTUNNEL);
1da177e4 1053
7daa0004 1054 if (dev != ign->fb_tunnel_dev && cmd == SIOCCHGTUNNEL) {
1da177e4
LT
1055 if (t != NULL) {
1056 if (t->dev != dev) {
1057 err = -EEXIST;
1058 break;
1059 }
1060 } else {
1507850b 1061 unsigned int nflags = 0;
1da177e4 1062
2941a486 1063 t = netdev_priv(dev);
1da177e4 1064
f97c1e0c 1065 if (ipv4_is_multicast(p.iph.daddr))
1da177e4
LT
1066 nflags = IFF_BROADCAST;
1067 else if (p.iph.daddr)
1068 nflags = IFF_POINTOPOINT;
1069
1070 if ((dev->flags^nflags)&(IFF_POINTOPOINT|IFF_BROADCAST)) {
1071 err = -EINVAL;
1072 break;
1073 }
f57e7d5a 1074 ipgre_tunnel_unlink(ign, t);
1da177e4
LT
1075 t->parms.iph.saddr = p.iph.saddr;
1076 t->parms.iph.daddr = p.iph.daddr;
1077 t->parms.i_key = p.i_key;
1078 t->parms.o_key = p.o_key;
1079 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1080 memcpy(dev->broadcast, &p.iph.daddr, 4);
f57e7d5a 1081 ipgre_tunnel_link(ign, t);
1da177e4
LT
1082 netdev_state_change(dev);
1083 }
1084 }
1085
1086 if (t) {
1087 err = 0;
1088 if (cmd == SIOCCHGTUNNEL) {
1089 t->parms.iph.ttl = p.iph.ttl;
1090 t->parms.iph.tos = p.iph.tos;
1091 t->parms.iph.frag_off = p.iph.frag_off;
ee34c1eb
MS
1092 if (t->parms.link != p.link) {
1093 t->parms.link = p.link;
42aa9162 1094 dev->mtu = ipgre_tunnel_bind_dev(dev);
ee34c1eb
MS
1095 netdev_state_change(dev);
1096 }
1da177e4
LT
1097 }
1098 if (copy_to_user(ifr->ifr_ifru.ifru_data, &t->parms, sizeof(p)))
1099 err = -EFAULT;
1100 } else
1101 err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT);
1102 break;
1103
1104 case SIOCDELTUNNEL:
1105 err = -EPERM;
1106 if (!capable(CAP_NET_ADMIN))
1107 goto done;
1108
7daa0004 1109 if (dev == ign->fb_tunnel_dev) {
1da177e4
LT
1110 err = -EFAULT;
1111 if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p)))
1112 goto done;
1113 err = -ENOENT;
f57e7d5a 1114 if ((t = ipgre_tunnel_locate(net, &p, 0)) == NULL)
1da177e4
LT
1115 goto done;
1116 err = -EPERM;
7daa0004 1117 if (t == netdev_priv(ign->fb_tunnel_dev))
1da177e4
LT
1118 goto done;
1119 dev = t->dev;
1120 }
22f8cde5
SH
1121 unregister_netdevice(dev);
1122 err = 0;
1da177e4
LT
1123 break;
1124
1125 default:
1126 err = -EINVAL;
1127 }
1128
1129done:
1130 return err;
1131}
1132
1da177e4
LT
1133static int ipgre_tunnel_change_mtu(struct net_device *dev, int new_mtu)
1134{
2941a486 1135 struct ip_tunnel *tunnel = netdev_priv(dev);
c95b819a
HX
1136 if (new_mtu < 68 ||
1137 new_mtu > 0xFFF8 - dev->hard_header_len - tunnel->hlen)
1da177e4
LT
1138 return -EINVAL;
1139 dev->mtu = new_mtu;
1140 return 0;
1141}
1142
1da177e4
LT
1143/* Nice toy. Unfortunately, useless in real life :-)
1144 It allows to construct virtual multiprotocol broadcast "LAN"
1145 over the Internet, provided multicast routing is tuned.
1146
1147
1148 I have no idea was this bicycle invented before me,
1149 so that I had to set ARPHRD_IPGRE to a random value.
1150 I have an impression, that Cisco could make something similar,
1151 but this feature is apparently missing in IOS<=11.2(8).
e905a9ed 1152
1da177e4
LT
1153 I set up 10.66.66/24 and fec0:6666:6666::0/96 as virtual networks
1154 with broadcast 224.66.66.66. If you have access to mbone, play with me :-)
1155
1156 ping -t 255 224.66.66.66
1157
1158 If nobody answers, mbone does not work.
1159
1160 ip tunnel add Universe mode gre remote 224.66.66.66 local <Your_real_addr> ttl 255
1161 ip addr add 10.66.66.<somewhat>/24 dev Universe
1162 ifconfig Universe up
1163 ifconfig Universe add fe80::<Your_real_addr>/10
1164 ifconfig Universe add fec0:6666:6666::<Your_real_addr>/96
1165 ftp 10.66.66.66
1166 ...
1167 ftp fec0:6666:6666::193.233.7.65
1168 ...
1169
1170 */
1171
3b04ddde
SH
1172static int ipgre_header(struct sk_buff *skb, struct net_device *dev,
1173 unsigned short type,
1507850b 1174 const void *daddr, const void *saddr, unsigned int len)
1da177e4 1175{
2941a486 1176 struct ip_tunnel *t = netdev_priv(dev);
1da177e4 1177 struct iphdr *iph = (struct iphdr *)skb_push(skb, t->hlen);
d5a0a1e3 1178 __be16 *p = (__be16*)(iph+1);
1da177e4
LT
1179
1180 memcpy(iph, &t->parms.iph, sizeof(struct iphdr));
1181 p[0] = t->parms.o_flags;
1182 p[1] = htons(type);
1183
1184 /*
e905a9ed 1185 * Set the source hardware address.
1da177e4 1186 */
e905a9ed 1187
1da177e4
LT
1188 if (saddr)
1189 memcpy(&iph->saddr, saddr, 4);
6d55cb91 1190 if (daddr)
1da177e4 1191 memcpy(&iph->daddr, daddr, 4);
6d55cb91 1192 if (iph->daddr)
1da177e4 1193 return t->hlen;
e905a9ed 1194
1da177e4
LT
1195 return -t->hlen;
1196}
1197
6a5f44d7
TT
1198static int ipgre_header_parse(const struct sk_buff *skb, unsigned char *haddr)
1199{
6ed2533e 1200 struct iphdr *iph = (struct iphdr *) skb_mac_header(skb);
6a5f44d7
TT
1201 memcpy(haddr, &iph->saddr, 4);
1202 return 4;
1203}
1204
3b04ddde
SH
1205static const struct header_ops ipgre_header_ops = {
1206 .create = ipgre_header,
6a5f44d7 1207 .parse = ipgre_header_parse,
3b04ddde
SH
1208};
1209
6a5f44d7 1210#ifdef CONFIG_NET_IPGRE_BROADCAST
1da177e4
LT
1211static int ipgre_open(struct net_device *dev)
1212{
2941a486 1213 struct ip_tunnel *t = netdev_priv(dev);
1da177e4 1214
f97c1e0c 1215 if (ipv4_is_multicast(t->parms.iph.daddr)) {
e985aad7
ED
1216 struct flowi fl = {
1217 .oif = t->parms.link,
1218 .nl_u = {
1219 .ip4_u = {
1220 .daddr = t->parms.iph.daddr,
1221 .saddr = t->parms.iph.saddr,
1222 .tos = RT_TOS(t->parms.iph.tos)
1223 }
1224 },
1225 .proto = IPPROTO_GRE
1226 };
1da177e4 1227 struct rtable *rt;
e985aad7 1228
96635522 1229 if (ip_route_output_key(dev_net(dev), &rt, &fl))
1da177e4 1230 return -EADDRNOTAVAIL;
d8d1f30b 1231 dev = rt->dst.dev;
1da177e4 1232 ip_rt_put(rt);
e5ed6399 1233 if (__in_dev_get_rtnl(dev) == NULL)
1da177e4
LT
1234 return -EADDRNOTAVAIL;
1235 t->mlink = dev->ifindex;
e5ed6399 1236 ip_mc_inc_group(__in_dev_get_rtnl(dev), t->parms.iph.daddr);
1da177e4
LT
1237 }
1238 return 0;
1239}
1240
1241static int ipgre_close(struct net_device *dev)
1242{
2941a486 1243 struct ip_tunnel *t = netdev_priv(dev);
b8c26a33 1244
f97c1e0c 1245 if (ipv4_is_multicast(t->parms.iph.daddr) && t->mlink) {
7fee0ca2 1246 struct in_device *in_dev;
c346dca1 1247 in_dev = inetdev_by_index(dev_net(dev), t->mlink);
1da177e4
LT
1248 if (in_dev) {
1249 ip_mc_dec_group(in_dev, t->parms.iph.daddr);
1250 in_dev_put(in_dev);
1251 }
1252 }
1253 return 0;
1254}
1255
1256#endif
1257
b8c26a33
SH
1258static const struct net_device_ops ipgre_netdev_ops = {
1259 .ndo_init = ipgre_tunnel_init,
1260 .ndo_uninit = ipgre_tunnel_uninit,
1261#ifdef CONFIG_NET_IPGRE_BROADCAST
1262 .ndo_open = ipgre_open,
1263 .ndo_stop = ipgre_close,
1264#endif
1265 .ndo_start_xmit = ipgre_tunnel_xmit,
1266 .ndo_do_ioctl = ipgre_tunnel_ioctl,
1267 .ndo_change_mtu = ipgre_tunnel_change_mtu,
e985aad7 1268 .ndo_get_stats = ipgre_get_stats,
b8c26a33
SH
1269};
1270
e985aad7
ED
1271static void ipgre_dev_free(struct net_device *dev)
1272{
1273 free_percpu(dev->tstats);
1274 free_netdev(dev);
1275}
1276
1da177e4
LT
1277static void ipgre_tunnel_setup(struct net_device *dev)
1278{
b8c26a33 1279 dev->netdev_ops = &ipgre_netdev_ops;
e985aad7 1280 dev->destructor = ipgre_dev_free;
1da177e4
LT
1281
1282 dev->type = ARPHRD_IPGRE;
c95b819a 1283 dev->needed_headroom = LL_MAX_HEADER + sizeof(struct iphdr) + 4;
46f25dff 1284 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 4;
1da177e4
LT
1285 dev->flags = IFF_NOARP;
1286 dev->iflink = 0;
1287 dev->addr_len = 4;
0b67eceb 1288 dev->features |= NETIF_F_NETNS_LOCAL;
108bfa89 1289 dev->priv_flags &= ~IFF_XMIT_DST_RELEASE;
1da177e4
LT
1290}
1291
1292static int ipgre_tunnel_init(struct net_device *dev)
1293{
1da177e4
LT
1294 struct ip_tunnel *tunnel;
1295 struct iphdr *iph;
1da177e4 1296
2941a486 1297 tunnel = netdev_priv(dev);
1da177e4
LT
1298 iph = &tunnel->parms.iph;
1299
1300 tunnel->dev = dev;
1301 strcpy(tunnel->parms.name, dev->name);
1302
1303 memcpy(dev->dev_addr, &tunnel->parms.iph.saddr, 4);
1304 memcpy(dev->broadcast, &tunnel->parms.iph.daddr, 4);
1305
1da177e4 1306 if (iph->daddr) {
1da177e4 1307#ifdef CONFIG_NET_IPGRE_BROADCAST
f97c1e0c 1308 if (ipv4_is_multicast(iph->daddr)) {
1da177e4
LT
1309 if (!iph->saddr)
1310 return -EINVAL;
1311 dev->flags = IFF_BROADCAST;
3b04ddde 1312 dev->header_ops = &ipgre_header_ops;
1da177e4
LT
1313 }
1314#endif
ee34c1eb 1315 } else
6a5f44d7 1316 dev->header_ops = &ipgre_header_ops;
1da177e4 1317
e985aad7
ED
1318 dev->tstats = alloc_percpu(struct pcpu_tstats);
1319 if (!dev->tstats)
1320 return -ENOMEM;
1321
1da177e4
LT
1322 return 0;
1323}
1324
b8c26a33 1325static void ipgre_fb_tunnel_init(struct net_device *dev)
1da177e4 1326{
2941a486 1327 struct ip_tunnel *tunnel = netdev_priv(dev);
1da177e4 1328 struct iphdr *iph = &tunnel->parms.iph;
eb8ce741 1329 struct ipgre_net *ign = net_generic(dev_net(dev), ipgre_net_id);
1da177e4
LT
1330
1331 tunnel->dev = dev;
1332 strcpy(tunnel->parms.name, dev->name);
1333
1334 iph->version = 4;
1335 iph->protocol = IPPROTO_GRE;
1336 iph->ihl = 5;
1337 tunnel->hlen = sizeof(struct iphdr) + 4;
1338
1339 dev_hold(dev);
1507850b 1340 rcu_assign_pointer(ign->tunnels_wc[0], tunnel);
1da177e4
LT
1341}
1342
1343
00959ade
DK
1344static const struct gre_protocol ipgre_protocol = {
1345 .handler = ipgre_rcv,
1346 .err_handler = ipgre_err,
1da177e4
LT
1347};
1348
eef6dd65 1349static void ipgre_destroy_tunnels(struct ipgre_net *ign, struct list_head *head)
eb8ce741
PE
1350{
1351 int prio;
1352
1353 for (prio = 0; prio < 4; prio++) {
1354 int h;
1355 for (h = 0; h < HASH_SIZE; h++) {
1507850b
ED
1356 struct ip_tunnel *t;
1357
1358 t = rtnl_dereference(ign->tunnels[prio][h]);
eef6dd65
ED
1359
1360 while (t != NULL) {
1361 unregister_netdevice_queue(t->dev, head);
1507850b 1362 t = rtnl_dereference(t->next);
eef6dd65 1363 }
eb8ce741
PE
1364 }
1365 }
1366}
1367
2c8c1e72 1368static int __net_init ipgre_init_net(struct net *net)
59a4c759 1369{
cfb8fbf2 1370 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
59a4c759 1371 int err;
59a4c759 1372
7daa0004
PE
1373 ign->fb_tunnel_dev = alloc_netdev(sizeof(struct ip_tunnel), "gre0",
1374 ipgre_tunnel_setup);
1375 if (!ign->fb_tunnel_dev) {
1376 err = -ENOMEM;
1377 goto err_alloc_dev;
1378 }
be77e593 1379 dev_net_set(ign->fb_tunnel_dev, net);
7daa0004 1380
b8c26a33 1381 ipgre_fb_tunnel_init(ign->fb_tunnel_dev);
c19e654d 1382 ign->fb_tunnel_dev->rtnl_link_ops = &ipgre_link_ops;
7daa0004
PE
1383
1384 if ((err = register_netdev(ign->fb_tunnel_dev)))
1385 goto err_reg_dev;
1386
59a4c759
PE
1387 return 0;
1388
7daa0004
PE
1389err_reg_dev:
1390 free_netdev(ign->fb_tunnel_dev);
1391err_alloc_dev:
59a4c759
PE
1392 return err;
1393}
1394
2c8c1e72 1395static void __net_exit ipgre_exit_net(struct net *net)
59a4c759
PE
1396{
1397 struct ipgre_net *ign;
eef6dd65 1398 LIST_HEAD(list);
59a4c759
PE
1399
1400 ign = net_generic(net, ipgre_net_id);
7daa0004 1401 rtnl_lock();
eef6dd65
ED
1402 ipgre_destroy_tunnels(ign, &list);
1403 unregister_netdevice_many(&list);
7daa0004 1404 rtnl_unlock();
59a4c759
PE
1405}
1406
1407static struct pernet_operations ipgre_net_ops = {
1408 .init = ipgre_init_net,
1409 .exit = ipgre_exit_net,
cfb8fbf2
EB
1410 .id = &ipgre_net_id,
1411 .size = sizeof(struct ipgre_net),
59a4c759 1412};
1da177e4 1413
c19e654d
HX
1414static int ipgre_tunnel_validate(struct nlattr *tb[], struct nlattr *data[])
1415{
1416 __be16 flags;
1417
1418 if (!data)
1419 return 0;
1420
1421 flags = 0;
1422 if (data[IFLA_GRE_IFLAGS])
1423 flags |= nla_get_be16(data[IFLA_GRE_IFLAGS]);
1424 if (data[IFLA_GRE_OFLAGS])
1425 flags |= nla_get_be16(data[IFLA_GRE_OFLAGS]);
1426 if (flags & (GRE_VERSION|GRE_ROUTING))
1427 return -EINVAL;
1428
1429 return 0;
1430}
1431
e1a80002
HX
1432static int ipgre_tap_validate(struct nlattr *tb[], struct nlattr *data[])
1433{
1434 __be32 daddr;
1435
1436 if (tb[IFLA_ADDRESS]) {
1437 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1438 return -EINVAL;
1439 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1440 return -EADDRNOTAVAIL;
1441 }
1442
1443 if (!data)
1444 goto out;
1445
1446 if (data[IFLA_GRE_REMOTE]) {
1447 memcpy(&daddr, nla_data(data[IFLA_GRE_REMOTE]), 4);
1448 if (!daddr)
1449 return -EINVAL;
1450 }
1451
1452out:
1453 return ipgre_tunnel_validate(tb, data);
1454}
1455
c19e654d
HX
1456static void ipgre_netlink_parms(struct nlattr *data[],
1457 struct ip_tunnel_parm *parms)
1458{
7bb82d92 1459 memset(parms, 0, sizeof(*parms));
c19e654d
HX
1460
1461 parms->iph.protocol = IPPROTO_GRE;
1462
1463 if (!data)
1464 return;
1465
1466 if (data[IFLA_GRE_LINK])
1467 parms->link = nla_get_u32(data[IFLA_GRE_LINK]);
1468
1469 if (data[IFLA_GRE_IFLAGS])
1470 parms->i_flags = nla_get_be16(data[IFLA_GRE_IFLAGS]);
1471
1472 if (data[IFLA_GRE_OFLAGS])
1473 parms->o_flags = nla_get_be16(data[IFLA_GRE_OFLAGS]);
1474
1475 if (data[IFLA_GRE_IKEY])
1476 parms->i_key = nla_get_be32(data[IFLA_GRE_IKEY]);
1477
1478 if (data[IFLA_GRE_OKEY])
1479 parms->o_key = nla_get_be32(data[IFLA_GRE_OKEY]);
1480
1481 if (data[IFLA_GRE_LOCAL])
4d74f8ba 1482 parms->iph.saddr = nla_get_be32(data[IFLA_GRE_LOCAL]);
c19e654d
HX
1483
1484 if (data[IFLA_GRE_REMOTE])
4d74f8ba 1485 parms->iph.daddr = nla_get_be32(data[IFLA_GRE_REMOTE]);
c19e654d
HX
1486
1487 if (data[IFLA_GRE_TTL])
1488 parms->iph.ttl = nla_get_u8(data[IFLA_GRE_TTL]);
1489
1490 if (data[IFLA_GRE_TOS])
1491 parms->iph.tos = nla_get_u8(data[IFLA_GRE_TOS]);
1492
1493 if (!data[IFLA_GRE_PMTUDISC] || nla_get_u8(data[IFLA_GRE_PMTUDISC]))
1494 parms->iph.frag_off = htons(IP_DF);
1495}
1496
e1a80002
HX
1497static int ipgre_tap_init(struct net_device *dev)
1498{
1499 struct ip_tunnel *tunnel;
1500
1501 tunnel = netdev_priv(dev);
1502
1503 tunnel->dev = dev;
1504 strcpy(tunnel->parms.name, dev->name);
1505
1506 ipgre_tunnel_bind_dev(dev);
1507
e985aad7
ED
1508 dev->tstats = alloc_percpu(struct pcpu_tstats);
1509 if (!dev->tstats)
1510 return -ENOMEM;
1511
e1a80002
HX
1512 return 0;
1513}
1514
b8c26a33
SH
1515static const struct net_device_ops ipgre_tap_netdev_ops = {
1516 .ndo_init = ipgre_tap_init,
1517 .ndo_uninit = ipgre_tunnel_uninit,
1518 .ndo_start_xmit = ipgre_tunnel_xmit,
1519 .ndo_set_mac_address = eth_mac_addr,
1520 .ndo_validate_addr = eth_validate_addr,
1521 .ndo_change_mtu = ipgre_tunnel_change_mtu,
e985aad7 1522 .ndo_get_stats = ipgre_get_stats,
b8c26a33
SH
1523};
1524
e1a80002
HX
1525static void ipgre_tap_setup(struct net_device *dev)
1526{
1527
1528 ether_setup(dev);
1529
2e9526b3 1530 dev->netdev_ops = &ipgre_tap_netdev_ops;
e985aad7 1531 dev->destructor = ipgre_dev_free;
e1a80002
HX
1532
1533 dev->iflink = 0;
1534 dev->features |= NETIF_F_NETNS_LOCAL;
1535}
1536
81adee47 1537static int ipgre_newlink(struct net *src_net, struct net_device *dev, struct nlattr *tb[],
c19e654d
HX
1538 struct nlattr *data[])
1539{
1540 struct ip_tunnel *nt;
1541 struct net *net = dev_net(dev);
1542 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1543 int mtu;
1544 int err;
1545
1546 nt = netdev_priv(dev);
1547 ipgre_netlink_parms(data, &nt->parms);
1548
e1a80002 1549 if (ipgre_tunnel_find(net, &nt->parms, dev->type))
c19e654d
HX
1550 return -EEXIST;
1551
e1a80002
HX
1552 if (dev->type == ARPHRD_ETHER && !tb[IFLA_ADDRESS])
1553 random_ether_addr(dev->dev_addr);
1554
c19e654d
HX
1555 mtu = ipgre_tunnel_bind_dev(dev);
1556 if (!tb[IFLA_MTU])
1557 dev->mtu = mtu;
1558
b790e01a
ED
1559 /* Can use a lockless transmit, unless we generate output sequences */
1560 if (!(nt->parms.o_flags & GRE_SEQ))
1561 dev->features |= NETIF_F_LLTX;
1562
c19e654d
HX
1563 err = register_netdevice(dev);
1564 if (err)
1565 goto out;
1566
1567 dev_hold(dev);
1568 ipgre_tunnel_link(ign, nt);
1569
1570out:
1571 return err;
1572}
1573
1574static int ipgre_changelink(struct net_device *dev, struct nlattr *tb[],
1575 struct nlattr *data[])
1576{
1577 struct ip_tunnel *t, *nt;
1578 struct net *net = dev_net(dev);
1579 struct ipgre_net *ign = net_generic(net, ipgre_net_id);
1580 struct ip_tunnel_parm p;
1581 int mtu;
1582
1583 if (dev == ign->fb_tunnel_dev)
1584 return -EINVAL;
1585
1586 nt = netdev_priv(dev);
1587 ipgre_netlink_parms(data, &p);
1588
1589 t = ipgre_tunnel_locate(net, &p, 0);
1590
1591 if (t) {
1592 if (t->dev != dev)
1593 return -EEXIST;
1594 } else {
c19e654d
HX
1595 t = nt;
1596
2e9526b3 1597 if (dev->type != ARPHRD_ETHER) {
1507850b 1598 unsigned int nflags = 0;
c19e654d 1599
2e9526b3
HX
1600 if (ipv4_is_multicast(p.iph.daddr))
1601 nflags = IFF_BROADCAST;
1602 else if (p.iph.daddr)
1603 nflags = IFF_POINTOPOINT;
1604
1605 if ((dev->flags ^ nflags) &
1606 (IFF_POINTOPOINT | IFF_BROADCAST))
1607 return -EINVAL;
1608 }
c19e654d
HX
1609
1610 ipgre_tunnel_unlink(ign, t);
1611 t->parms.iph.saddr = p.iph.saddr;
1612 t->parms.iph.daddr = p.iph.daddr;
1613 t->parms.i_key = p.i_key;
2e9526b3
HX
1614 if (dev->type != ARPHRD_ETHER) {
1615 memcpy(dev->dev_addr, &p.iph.saddr, 4);
1616 memcpy(dev->broadcast, &p.iph.daddr, 4);
1617 }
c19e654d
HX
1618 ipgre_tunnel_link(ign, t);
1619 netdev_state_change(dev);
1620 }
1621
1622 t->parms.o_key = p.o_key;
1623 t->parms.iph.ttl = p.iph.ttl;
1624 t->parms.iph.tos = p.iph.tos;
1625 t->parms.iph.frag_off = p.iph.frag_off;
1626
1627 if (t->parms.link != p.link) {
1628 t->parms.link = p.link;
1629 mtu = ipgre_tunnel_bind_dev(dev);
1630 if (!tb[IFLA_MTU])
1631 dev->mtu = mtu;
1632 netdev_state_change(dev);
1633 }
1634
1635 return 0;
1636}
1637
1638static size_t ipgre_get_size(const struct net_device *dev)
1639{
1640 return
1641 /* IFLA_GRE_LINK */
1642 nla_total_size(4) +
1643 /* IFLA_GRE_IFLAGS */
1644 nla_total_size(2) +
1645 /* IFLA_GRE_OFLAGS */
1646 nla_total_size(2) +
1647 /* IFLA_GRE_IKEY */
1648 nla_total_size(4) +
1649 /* IFLA_GRE_OKEY */
1650 nla_total_size(4) +
1651 /* IFLA_GRE_LOCAL */
1652 nla_total_size(4) +
1653 /* IFLA_GRE_REMOTE */
1654 nla_total_size(4) +
1655 /* IFLA_GRE_TTL */
1656 nla_total_size(1) +
1657 /* IFLA_GRE_TOS */
1658 nla_total_size(1) +
1659 /* IFLA_GRE_PMTUDISC */
1660 nla_total_size(1) +
1661 0;
1662}
1663
1664static int ipgre_fill_info(struct sk_buff *skb, const struct net_device *dev)
1665{
1666 struct ip_tunnel *t = netdev_priv(dev);
1667 struct ip_tunnel_parm *p = &t->parms;
1668
1669 NLA_PUT_U32(skb, IFLA_GRE_LINK, p->link);
1670 NLA_PUT_BE16(skb, IFLA_GRE_IFLAGS, p->i_flags);
1671 NLA_PUT_BE16(skb, IFLA_GRE_OFLAGS, p->o_flags);
ba9e64b1
PM
1672 NLA_PUT_BE32(skb, IFLA_GRE_IKEY, p->i_key);
1673 NLA_PUT_BE32(skb, IFLA_GRE_OKEY, p->o_key);
4d74f8ba
PM
1674 NLA_PUT_BE32(skb, IFLA_GRE_LOCAL, p->iph.saddr);
1675 NLA_PUT_BE32(skb, IFLA_GRE_REMOTE, p->iph.daddr);
c19e654d
HX
1676 NLA_PUT_U8(skb, IFLA_GRE_TTL, p->iph.ttl);
1677 NLA_PUT_U8(skb, IFLA_GRE_TOS, p->iph.tos);
1678 NLA_PUT_U8(skb, IFLA_GRE_PMTUDISC, !!(p->iph.frag_off & htons(IP_DF)));
1679
1680 return 0;
1681
1682nla_put_failure:
1683 return -EMSGSIZE;
1684}
1685
1686static const struct nla_policy ipgre_policy[IFLA_GRE_MAX + 1] = {
1687 [IFLA_GRE_LINK] = { .type = NLA_U32 },
1688 [IFLA_GRE_IFLAGS] = { .type = NLA_U16 },
1689 [IFLA_GRE_OFLAGS] = { .type = NLA_U16 },
1690 [IFLA_GRE_IKEY] = { .type = NLA_U32 },
1691 [IFLA_GRE_OKEY] = { .type = NLA_U32 },
4d74f8ba
PM
1692 [IFLA_GRE_LOCAL] = { .len = FIELD_SIZEOF(struct iphdr, saddr) },
1693 [IFLA_GRE_REMOTE] = { .len = FIELD_SIZEOF(struct iphdr, daddr) },
c19e654d
HX
1694 [IFLA_GRE_TTL] = { .type = NLA_U8 },
1695 [IFLA_GRE_TOS] = { .type = NLA_U8 },
1696 [IFLA_GRE_PMTUDISC] = { .type = NLA_U8 },
1697};
1698
1699static struct rtnl_link_ops ipgre_link_ops __read_mostly = {
1700 .kind = "gre",
1701 .maxtype = IFLA_GRE_MAX,
1702 .policy = ipgre_policy,
1703 .priv_size = sizeof(struct ip_tunnel),
1704 .setup = ipgre_tunnel_setup,
1705 .validate = ipgre_tunnel_validate,
1706 .newlink = ipgre_newlink,
1707 .changelink = ipgre_changelink,
1708 .get_size = ipgre_get_size,
1709 .fill_info = ipgre_fill_info,
1710};
1711
e1a80002
HX
1712static struct rtnl_link_ops ipgre_tap_ops __read_mostly = {
1713 .kind = "gretap",
1714 .maxtype = IFLA_GRE_MAX,
1715 .policy = ipgre_policy,
1716 .priv_size = sizeof(struct ip_tunnel),
1717 .setup = ipgre_tap_setup,
1718 .validate = ipgre_tap_validate,
1719 .newlink = ipgre_newlink,
1720 .changelink = ipgre_changelink,
1721 .get_size = ipgre_get_size,
1722 .fill_info = ipgre_fill_info,
1723};
1724
1da177e4
LT
1725/*
1726 * And now the modules code and kernel interface.
1727 */
1728
1729static int __init ipgre_init(void)
1730{
1731 int err;
1732
1733 printk(KERN_INFO "GRE over IPv4 tunneling driver\n");
1734
cfb8fbf2 1735 err = register_pernet_device(&ipgre_net_ops);
59a4c759 1736 if (err < 0)
c2892f02
AD
1737 return err;
1738
00959ade 1739 err = gre_add_protocol(&ipgre_protocol, GREPROTO_CISCO);
c2892f02
AD
1740 if (err < 0) {
1741 printk(KERN_INFO "ipgre init: can't add protocol\n");
1742 goto add_proto_failed;
1743 }
7daa0004 1744
c19e654d
HX
1745 err = rtnl_link_register(&ipgre_link_ops);
1746 if (err < 0)
1747 goto rtnl_link_failed;
1748
e1a80002
HX
1749 err = rtnl_link_register(&ipgre_tap_ops);
1750 if (err < 0)
1751 goto tap_ops_failed;
1752
c19e654d 1753out:
1da177e4 1754 return err;
c19e654d 1755
e1a80002
HX
1756tap_ops_failed:
1757 rtnl_link_unregister(&ipgre_link_ops);
c19e654d 1758rtnl_link_failed:
00959ade 1759 gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO);
c2892f02
AD
1760add_proto_failed:
1761 unregister_pernet_device(&ipgre_net_ops);
c19e654d 1762 goto out;
1da177e4
LT
1763}
1764
db44575f 1765static void __exit ipgre_fini(void)
1da177e4 1766{
e1a80002 1767 rtnl_link_unregister(&ipgre_tap_ops);
c19e654d 1768 rtnl_link_unregister(&ipgre_link_ops);
00959ade 1769 if (gre_del_protocol(&ipgre_protocol, GREPROTO_CISCO) < 0)
1da177e4 1770 printk(KERN_INFO "ipgre close: can't remove protocol\n");
c2892f02 1771 unregister_pernet_device(&ipgre_net_ops);
1da177e4
LT
1772}
1773
1774module_init(ipgre_init);
1775module_exit(ipgre_fini);
1776MODULE_LICENSE("GPL");
4d74f8ba
PM
1777MODULE_ALIAS_RTNL_LINK("gre");
1778MODULE_ALIAS_RTNL_LINK("gretap");