ip6_tunnel: allow redirecting ip6gre and ipxip6 packets to eth devices
[linux-block.git] / drivers / net / gtp.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
459aa660
PN
2/* GTP according to GSM TS 09.60 / 3GPP TS 29.060
3 *
4 * (C) 2012-2014 by sysmocom - s.f.m.c. GmbH
5 * (C) 2016 by Pablo Neira Ayuso <pablo@netfilter.org>
6 *
7 * Author: Harald Welte <hwelte@sysmocom.de>
8 * Pablo Neira Ayuso <pablo@netfilter.org>
9 * Andreas Schultz <aschultz@travelping.com>
459aa660
PN
10 */
11
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
14#include <linux/module.h>
459aa660
PN
15#include <linux/skbuff.h>
16#include <linux/udp.h>
17#include <linux/rculist.h>
18#include <linux/jhash.h>
19#include <linux/if_tunnel.h>
20#include <linux/net.h>
21#include <linux/file.h>
22#include <linux/gtp.h>
23
24#include <net/net_namespace.h>
25#include <net/protocol.h>
26#include <net/ip.h>
27#include <net/udp.h>
28#include <net/udp_tunnel.h>
29#include <net/icmp.h>
30#include <net/xfrm.h>
31#include <net/genetlink.h>
32#include <net/netns/generic.h>
33#include <net/gtp.h>
34
35/* An active session for the subscriber. */
36struct pdp_ctx {
37 struct hlist_node hlist_tid;
38 struct hlist_node hlist_addr;
39
40 union {
459aa660
PN
41 struct {
42 u64 tid;
43 u16 flow;
44 } v0;
45 struct {
46 u32 i_tei;
47 u32 o_tei;
48 } v1;
49 } u;
50 u8 gtp_version;
51 u16 af;
52
53 struct in_addr ms_addr_ip4;
ae6336b5 54 struct in_addr peer_addr_ip4;
459aa660 55
101cfbc1 56 struct sock *sk;
5b171f9c
AS
57 struct net_device *dev;
58
459aa660
PN
59 atomic_t tx_seq;
60 struct rcu_head rcu_head;
61};
62
63/* One instance of the GTP device. */
64struct gtp_dev {
65 struct list_head list;
66
17886c47
AS
67 struct sock *sk0;
68 struct sock *sk1u;
459aa660 69
459aa660
PN
70 struct net_device *dev;
71
91ed81f9 72 unsigned int role;
459aa660
PN
73 unsigned int hash_size;
74 struct hlist_head *tid_hash;
75 struct hlist_head *addr_hash;
76};
77
c7d03a00 78static unsigned int gtp_net_id __read_mostly;
459aa660
PN
79
80struct gtp_net {
81 struct list_head gtp_dev_list;
82};
83
84static u32 gtp_h_initval;
85
6b5e2e74
AS
86static void pdp_context_delete(struct pdp_ctx *pctx);
87
459aa660
PN
88static inline u32 gtp0_hashfn(u64 tid)
89{
90 u32 *tid32 = (u32 *) &tid;
91 return jhash_2words(tid32[0], tid32[1], gtp_h_initval);
92}
93
94static inline u32 gtp1u_hashfn(u32 tid)
95{
96 return jhash_1word(tid, gtp_h_initval);
97}
98
99static inline u32 ipv4_hashfn(__be32 ip)
100{
101 return jhash_1word((__force u32)ip, gtp_h_initval);
102}
103
104/* Resolve a PDP context structure based on the 64bit TID. */
105static struct pdp_ctx *gtp0_pdp_find(struct gtp_dev *gtp, u64 tid)
106{
107 struct hlist_head *head;
108 struct pdp_ctx *pdp;
109
110 head = &gtp->tid_hash[gtp0_hashfn(tid) % gtp->hash_size];
111
112 hlist_for_each_entry_rcu(pdp, head, hlist_tid) {
113 if (pdp->gtp_version == GTP_V0 &&
114 pdp->u.v0.tid == tid)
115 return pdp;
116 }
117 return NULL;
118}
119
120/* Resolve a PDP context structure based on the 32bit TEI. */
121static struct pdp_ctx *gtp1_pdp_find(struct gtp_dev *gtp, u32 tid)
122{
123 struct hlist_head *head;
124 struct pdp_ctx *pdp;
125
126 head = &gtp->tid_hash[gtp1u_hashfn(tid) % gtp->hash_size];
127
128 hlist_for_each_entry_rcu(pdp, head, hlist_tid) {
129 if (pdp->gtp_version == GTP_V1 &&
130 pdp->u.v1.i_tei == tid)
131 return pdp;
132 }
133 return NULL;
134}
135
136/* Resolve a PDP context based on IPv4 address of MS. */
137static struct pdp_ctx *ipv4_pdp_find(struct gtp_dev *gtp, __be32 ms_addr)
138{
139 struct hlist_head *head;
140 struct pdp_ctx *pdp;
141
142 head = &gtp->addr_hash[ipv4_hashfn(ms_addr) % gtp->hash_size];
143
144 hlist_for_each_entry_rcu(pdp, head, hlist_addr) {
145 if (pdp->af == AF_INET &&
146 pdp->ms_addr_ip4.s_addr == ms_addr)
147 return pdp;
148 }
149
150 return NULL;
151}
152
91ed81f9
JB
153static bool gtp_check_ms_ipv4(struct sk_buff *skb, struct pdp_ctx *pctx,
154 unsigned int hdrlen, unsigned int role)
459aa660
PN
155{
156 struct iphdr *iph;
157
158 if (!pskb_may_pull(skb, hdrlen + sizeof(struct iphdr)))
159 return false;
160
88edf103 161 iph = (struct iphdr *)(skb->data + hdrlen);
459aa660 162
91ed81f9
JB
163 if (role == GTP_ROLE_SGSN)
164 return iph->daddr == pctx->ms_addr_ip4.s_addr;
165 else
166 return iph->saddr == pctx->ms_addr_ip4.s_addr;
459aa660
PN
167}
168
91ed81f9 169/* Check if the inner IP address in this packet is assigned to any
459aa660
PN
170 * existing mobile subscriber.
171 */
91ed81f9
JB
172static bool gtp_check_ms(struct sk_buff *skb, struct pdp_ctx *pctx,
173 unsigned int hdrlen, unsigned int role)
459aa660
PN
174{
175 switch (ntohs(skb->protocol)) {
176 case ETH_P_IP:
91ed81f9 177 return gtp_check_ms_ipv4(skb, pctx, hdrlen, role);
459aa660
PN
178 }
179 return false;
180}
181
49ecc587
JB
182static int gtp_rx(struct pdp_ctx *pctx, struct sk_buff *skb,
183 unsigned int hdrlen, unsigned int role)
5b171f9c 184{
49ecc587
JB
185 if (!gtp_check_ms(skb, pctx, hdrlen, role)) {
186 netdev_dbg(pctx->dev, "No PDP ctx for this MS\n");
187 return 1;
5b171f9c
AS
188 }
189
190 /* Get rid of the GTP + UDP headers. */
101cfbc1 191 if (iptunnel_pull_header(skb, hdrlen, skb->protocol,
9716178a
JB
192 !net_eq(sock_net(pctx->sk), dev_net(pctx->dev)))) {
193 pctx->dev->stats.rx_length_errors++;
194 goto err;
195 }
9ab7e76a 196
49ecc587 197 netdev_dbg(pctx->dev, "forwarding packet from GGSN to uplink\n");
5b171f9c
AS
198
199 /* Now that the UDP and the GTP header have been removed, set up the
200 * new network header. This is required by the upper layer to
201 * calculate the transport header.
202 */
203 skb_reset_network_header(skb);
204
49ecc587
JB
205 skb->dev = pctx->dev;
206
207 dev_sw_netstats_rx_add(pctx->dev, skb->len);
208
5b171f9c
AS
209 netif_rx(skb);
210 return 0;
9716178a
JB
211
212err:
213 pctx->dev->stats.rx_dropped++;
214 return -1;
5b171f9c
AS
215}
216
459aa660 217/* 1 means pass up to the stack, -1 means drop and 0 means decapsulated. */
101cfbc1 218static int gtp0_udp_encap_recv(struct gtp_dev *gtp, struct sk_buff *skb)
459aa660
PN
219{
220 unsigned int hdrlen = sizeof(struct udphdr) +
221 sizeof(struct gtp0_header);
222 struct gtp0_header *gtp0;
49ecc587 223 struct pdp_ctx *pctx;
459aa660
PN
224
225 if (!pskb_may_pull(skb, hdrlen))
226 return -1;
227
228 gtp0 = (struct gtp0_header *)(skb->data + sizeof(struct udphdr));
229
230 if ((gtp0->flags >> 5) != GTP_V0)
231 return 1;
232
49ecc587
JB
233 if (gtp0->type != GTP_TPDU)
234 return 1;
235
236 pctx = gtp0_pdp_find(gtp, be64_to_cpu(gtp0->tid));
237 if (!pctx) {
238 netdev_dbg(gtp->dev, "No PDP ctx to decap skb=%p\n", skb);
239 return 1;
240 }
241
242 return gtp_rx(pctx, skb, hdrlen, gtp->role);
459aa660
PN
243}
244
101cfbc1 245static int gtp1u_udp_encap_recv(struct gtp_dev *gtp, struct sk_buff *skb)
459aa660
PN
246{
247 unsigned int hdrlen = sizeof(struct udphdr) +
248 sizeof(struct gtp1_header);
249 struct gtp1_header *gtp1;
49ecc587 250 struct pdp_ctx *pctx;
459aa660
PN
251
252 if (!pskb_may_pull(skb, hdrlen))
253 return -1;
254
255 gtp1 = (struct gtp1_header *)(skb->data + sizeof(struct udphdr));
256
257 if ((gtp1->flags >> 5) != GTP_V1)
258 return 1;
259
49ecc587
JB
260 if (gtp1->type != GTP_TPDU)
261 return 1;
262
459aa660
PN
263 /* From 29.060: "This field shall be present if and only if any one or
264 * more of the S, PN and E flags are set.".
265 *
266 * If any of the bit is set, then the remaining ones also have to be
267 * set.
268 */
49ecc587
JB
269 if (gtp1->flags & GTP1_F_MASK)
270 hdrlen += 4;
271
459aa660
PN
272 /* Make sure the header is larger enough, including extensions. */
273 if (!pskb_may_pull(skb, hdrlen))
274 return -1;
275
93edb8c7
PN
276 gtp1 = (struct gtp1_header *)(skb->data + sizeof(struct udphdr));
277
49ecc587
JB
278 pctx = gtp1_pdp_find(gtp, ntohl(gtp1->tid));
279 if (!pctx) {
280 netdev_dbg(gtp->dev, "No PDP ctx to decap skb=%p\n", skb);
281 return 1;
282 }
283
284 return gtp_rx(pctx, skb, hdrlen, gtp->role);
459aa660
PN
285}
286
1788b856 287static void __gtp_encap_destroy(struct sock *sk)
459aa660 288{
1e3a3abd 289 struct gtp_dev *gtp;
459aa660 290
e198987e
TY
291 lock_sock(sk);
292 gtp = sk->sk_user_data;
1e3a3abd 293 if (gtp) {
1788b856
TY
294 if (gtp->sk0 == sk)
295 gtp->sk0 = NULL;
296 else
297 gtp->sk1u = NULL;
1e3a3abd
AS
298 udp_sk(sk)->encap_type = 0;
299 rcu_assign_sk_user_data(sk, NULL);
300 sock_put(sk);
301 }
e198987e 302 release_sock(sk);
459aa660
PN
303}
304
1788b856
TY
305static void gtp_encap_destroy(struct sock *sk)
306{
307 rtnl_lock();
308 __gtp_encap_destroy(sk);
309 rtnl_unlock();
310}
311
1e3a3abd 312static void gtp_encap_disable_sock(struct sock *sk)
459aa660 313{
1e3a3abd
AS
314 if (!sk)
315 return;
459aa660 316
1788b856 317 __gtp_encap_destroy(sk);
1e3a3abd
AS
318}
319
320static void gtp_encap_disable(struct gtp_dev *gtp)
321{
322 gtp_encap_disable_sock(gtp->sk0);
323 gtp_encap_disable_sock(gtp->sk1u);
459aa660
PN
324}
325
326/* UDP encapsulation receive handler. See net/ipv4/udp.c.
327 * Return codes: 0: success, <0: error, >0: pass up to userspace UDP socket.
328 */
329static int gtp_encap_recv(struct sock *sk, struct sk_buff *skb)
330{
459aa660 331 struct gtp_dev *gtp;
5b171f9c 332 int ret = 0;
459aa660
PN
333
334 gtp = rcu_dereference_sk_user_data(sk);
335 if (!gtp)
336 return 1;
337
49ecc587 338 netdev_dbg(gtp->dev, "encap_recv sk=%p\n", sk);
459aa660 339
459aa660
PN
340 switch (udp_sk(sk)->encap_type) {
341 case UDP_ENCAP_GTP0:
342 netdev_dbg(gtp->dev, "received GTP0 packet\n");
101cfbc1 343 ret = gtp0_udp_encap_recv(gtp, skb);
459aa660
PN
344 break;
345 case UDP_ENCAP_GTP1U:
346 netdev_dbg(gtp->dev, "received GTP1U packet\n");
101cfbc1 347 ret = gtp1u_udp_encap_recv(gtp, skb);
459aa660
PN
348 break;
349 default:
350 ret = -1; /* Shouldn't happen. */
351 }
352
353 switch (ret) {
354 case 1:
355 netdev_dbg(gtp->dev, "pass up to the process\n");
5b171f9c 356 break;
459aa660 357 case 0:
459aa660
PN
358 break;
359 case -1:
360 netdev_dbg(gtp->dev, "GTP packet has been dropped\n");
361 kfree_skb(skb);
5b171f9c
AS
362 ret = 0;
363 break;
459aa660
PN
364 }
365
5b171f9c 366 return ret;
459aa660
PN
367}
368
369static int gtp_dev_init(struct net_device *dev)
370{
371 struct gtp_dev *gtp = netdev_priv(dev);
372
373 gtp->dev = dev;
374
790cb2eb 375 dev->tstats = netdev_alloc_pcpu_stats(struct pcpu_sw_netstats);
459aa660
PN
376 if (!dev->tstats)
377 return -ENOMEM;
378
379 return 0;
380}
381
382static void gtp_dev_uninit(struct net_device *dev)
383{
384 struct gtp_dev *gtp = netdev_priv(dev);
385
386 gtp_encap_disable(gtp);
387 free_percpu(dev->tstats);
388}
389
101cfbc1
AS
390static struct rtable *ip4_route_output_gtp(struct flowi4 *fl4,
391 const struct sock *sk,
49ecc587 392 __be32 daddr)
459aa660
PN
393{
394 memset(fl4, 0, sizeof(*fl4));
395 fl4->flowi4_oif = sk->sk_bound_dev_if;
396 fl4->daddr = daddr;
49ecc587 397 fl4->saddr = inet_sk(sk)->inet_saddr;
459aa660
PN
398 fl4->flowi4_tos = RT_CONN_FLAGS(sk);
399 fl4->flowi4_proto = sk->sk_protocol;
400
101cfbc1 401 return ip_route_output_key(sock_net(sk), fl4);
459aa660
PN
402}
403
404static inline void gtp0_push_header(struct sk_buff *skb, struct pdp_ctx *pctx)
405{
406 int payload_len = skb->len;
407 struct gtp0_header *gtp0;
408
d58ff351 409 gtp0 = skb_push(skb, sizeof(*gtp0));
459aa660
PN
410
411 gtp0->flags = 0x1e; /* v0, GTP-non-prime. */
412 gtp0->type = GTP_TPDU;
413 gtp0->length = htons(payload_len);
414 gtp0->seq = htons((atomic_inc_return(&pctx->tx_seq) - 1) % 0xffff);
415 gtp0->flow = htons(pctx->u.v0.flow);
416 gtp0->number = 0xff;
417 gtp0->spare[0] = gtp0->spare[1] = gtp0->spare[2] = 0xff;
418 gtp0->tid = cpu_to_be64(pctx->u.v0.tid);
419}
420
49ecc587 421static inline void gtp1_push_header(struct sk_buff *skb, struct pdp_ctx *pctx)
459aa660
PN
422{
423 int payload_len = skb->len;
424 struct gtp1_header *gtp1;
425
d58ff351 426 gtp1 = skb_push(skb, sizeof(*gtp1));
459aa660
PN
427
428 /* Bits 8 7 6 5 4 3 2 1
429 * +--+--+--+--+--+--+--+--+
d928be81 430 * |version |PT| 0| E| S|PN|
459aa660
PN
431 * +--+--+--+--+--+--+--+--+
432 * 0 0 1 1 1 0 0 0
433 */
d928be81 434 gtp1->flags = 0x30; /* v1, GTP-non-prime. */
459aa660
PN
435 gtp1->type = GTP_TPDU;
436 gtp1->length = htons(payload_len);
49ecc587 437 gtp1->tid = htonl(pctx->u.v1.o_tei);
459aa660 438
ec674565 439 /* TODO: Support for extension header, sequence number and N-PDU.
459aa660
PN
440 * Update the length field if any of them is available.
441 */
442}
443
49ecc587
JB
444struct gtp_pktinfo {
445 struct sock *sk;
446 struct iphdr *iph;
447 struct flowi4 fl4;
448 struct rtable *rt;
449 struct pdp_ctx *pctx;
450 struct net_device *dev;
451 __be16 gtph_port;
452};
9ab7e76a 453
49ecc587
JB
454static void gtp_push_header(struct sk_buff *skb, struct gtp_pktinfo *pktinfo)
455{
456 switch (pktinfo->pctx->gtp_version) {
457 case GTP_V0:
458 pktinfo->gtph_port = htons(GTP0_PORT);
459 gtp0_push_header(skb, pktinfo->pctx);
460 break;
461 case GTP_V1:
462 pktinfo->gtph_port = htons(GTP1U_PORT);
463 gtp1_push_header(skb, pktinfo->pctx);
464 break;
459aa660
PN
465 }
466}
467
468static inline void gtp_set_pktinfo_ipv4(struct gtp_pktinfo *pktinfo,
49ecc587
JB
469 struct sock *sk, struct iphdr *iph,
470 struct pdp_ctx *pctx, struct rtable *rt,
459aa660
PN
471 struct flowi4 *fl4,
472 struct net_device *dev)
473{
474 pktinfo->sk = sk;
49ecc587
JB
475 pktinfo->iph = iph;
476 pktinfo->pctx = pctx;
459aa660
PN
477 pktinfo->rt = rt;
478 pktinfo->fl4 = *fl4;
479 pktinfo->dev = dev;
480}
481
482static int gtp_build_skb_ip4(struct sk_buff *skb, struct net_device *dev,
483 struct gtp_pktinfo *pktinfo)
484{
485 struct gtp_dev *gtp = netdev_priv(dev);
486 struct pdp_ctx *pctx;
487 struct rtable *rt;
488 struct flowi4 fl4;
49ecc587
JB
489 struct iphdr *iph;
490 __be16 df;
459aa660
PN
491 int mtu;
492
49ecc587
JB
493 /* Read the IP destination address and resolve the PDP context.
494 * Prepend PDP header with TEI/TID from PDP ctx.
495 */
496 iph = ip_hdr(skb);
497 if (gtp->role == GTP_ROLE_SGSN)
498 pctx = ipv4_pdp_find(gtp, iph->saddr);
499 else
500 pctx = ipv4_pdp_find(gtp, iph->daddr);
9ab7e76a 501
49ecc587
JB
502 if (!pctx) {
503 netdev_dbg(dev, "no PDP ctx found for %pI4, skip\n",
504 &iph->daddr);
505 return -ENOENT;
459aa660 506 }
49ecc587 507 netdev_dbg(dev, "found PDP context %p\n", pctx);
459aa660 508
49ecc587 509 rt = ip4_route_output_gtp(&fl4, pctx->sk, pctx->peer_addr_ip4.s_addr);
459aa660 510 if (IS_ERR(rt)) {
49ecc587
JB
511 netdev_dbg(dev, "no route to SSGN %pI4\n",
512 &pctx->peer_addr_ip4.s_addr);
459aa660
PN
513 dev->stats.tx_carrier_errors++;
514 goto err;
515 }
516
517 if (rt->dst.dev == dev) {
49ecc587
JB
518 netdev_dbg(dev, "circular route to SSGN %pI4\n",
519 &pctx->peer_addr_ip4.s_addr);
459aa660
PN
520 dev->stats.collisions++;
521 goto err_rt;
522 }
523
459aa660 524 /* This is similar to tnl_update_pmtu(). */
49ecc587 525 df = iph->frag_off;
459aa660
PN
526 if (df) {
527 mtu = dst_mtu(&rt->dst) - dev->hard_header_len -
528 sizeof(struct iphdr) - sizeof(struct udphdr);
49ecc587 529 switch (pctx->gtp_version) {
459aa660
PN
530 case GTP_V0:
531 mtu -= sizeof(struct gtp0_header);
532 break;
533 case GTP_V1:
534 mtu -= sizeof(struct gtp1_header);
535 break;
536 }
537 } else {
538 mtu = dst_mtu(&rt->dst);
539 }
540
6e9105c7 541 rt->dst.ops->update_pmtu(&rt->dst, NULL, skb, mtu, false);
459aa660 542
49ecc587
JB
543 if (!skb_is_gso(skb) && (iph->frag_off & htons(IP_DF)) &&
544 mtu < ntohs(iph->tot_len)) {
545 netdev_dbg(dev, "packet too big, fragmentation needed\n");
e0fce6f9
JD
546 icmp_ndo_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED,
547 htonl(mtu));
459aa660
PN
548 goto err_rt;
549 }
550
49ecc587
JB
551 gtp_set_pktinfo_ipv4(pktinfo, pctx->sk, iph, pctx, rt, &fl4, dev);
552 gtp_push_header(skb, pktinfo);
459aa660
PN
553
554 return 0;
555err_rt:
556 ip_rt_put(rt);
557err:
558 return -EBADMSG;
559}
560
561static netdev_tx_t gtp_dev_xmit(struct sk_buff *skb, struct net_device *dev)
562{
49ecc587 563 unsigned int proto = ntohs(skb->protocol);
459aa660
PN
564 struct gtp_pktinfo pktinfo;
565 int err;
566
567 /* Ensure there is sufficient headroom. */
568 if (skb_cow_head(skb, dev->needed_headroom))
569 goto tx_err;
570
571 skb_reset_inner_headers(skb);
572
573 /* PDP context lookups in gtp_build_skb_*() need rcu read-side lock. */
574 rcu_read_lock();
49ecc587
JB
575 switch (proto) {
576 case ETH_P_IP:
577 err = gtp_build_skb_ip4(skb, dev, &pktinfo);
578 break;
579 default:
580 err = -EOPNOTSUPP;
581 break;
582 }
459aa660
PN
583 rcu_read_unlock();
584
585 if (err < 0)
586 goto tx_err;
587
49ecc587
JB
588 switch (proto) {
589 case ETH_P_IP:
590 netdev_dbg(pktinfo.dev, "gtp -> IP src: %pI4 dst: %pI4\n",
591 &pktinfo.iph->saddr, &pktinfo.iph->daddr);
592 udp_tunnel_xmit_skb(pktinfo.rt, pktinfo.sk, skb,
593 pktinfo.fl4.saddr, pktinfo.fl4.daddr,
594 pktinfo.iph->tos,
595 ip4_dst_hoplimit(&pktinfo.rt->dst),
596 0,
597 pktinfo.gtph_port, pktinfo.gtph_port,
a9c0df76
JB
598 !net_eq(sock_net(pktinfo.pctx->sk),
599 dev_net(dev)),
600 false);
49ecc587
JB
601 break;
602 }
459aa660
PN
603
604 return NETDEV_TX_OK;
605tx_err:
606 dev->stats.tx_errors++;
607 dev_kfree_skb(skb);
608 return NETDEV_TX_OK;
609}
610
611static const struct net_device_ops gtp_netdev_ops = {
612 .ndo_init = gtp_dev_init,
613 .ndo_uninit = gtp_dev_uninit,
614 .ndo_start_xmit = gtp_dev_xmit,
250f19c7 615 .ndo_get_stats64 = dev_get_tstats64,
459aa660
PN
616};
617
29f53b5c
JB
618static const struct device_type gtp_type = {
619 .name = "gtp",
620};
621
459aa660
PN
622static void gtp_link_setup(struct net_device *dev)
623{
e21eb3a0
JB
624 unsigned int max_gtp_header_len = sizeof(struct iphdr) +
625 sizeof(struct udphdr) +
626 sizeof(struct gtp0_header);
627
459aa660 628 dev->netdev_ops = &gtp_netdev_ops;
cf124db5 629 dev->needs_free_netdev = true;
29f53b5c 630 SET_NETDEV_DEVTYPE(dev, &gtp_type);
459aa660
PN
631
632 dev->hard_header_len = 0;
633 dev->addr_len = 0;
e21eb3a0 634 dev->mtu = ETH_DATA_LEN - max_gtp_header_len;
459aa660
PN
635
636 /* Zero header length. */
637 dev->type = ARPHRD_NONE;
638 dev->flags = IFF_POINTOPOINT | IFF_NOARP | IFF_MULTICAST;
639
640 dev->priv_flags |= IFF_NO_QUEUE;
641 dev->features |= NETIF_F_LLTX;
642 netif_keep_dst(dev);
643
e21eb3a0 644 dev->needed_headroom = LL_MAX_HEADER + max_gtp_header_len;
459aa660
PN
645}
646
647static int gtp_hashtable_new(struct gtp_dev *gtp, int hsize);
49ecc587 648static int gtp_encap_enable(struct gtp_dev *gtp, struct nlattr *data[]);
459aa660 649
94dc550a
TY
650static void gtp_destructor(struct net_device *dev)
651{
652 struct gtp_dev *gtp = netdev_priv(dev);
653
654 kfree(gtp->addr_hash);
655 kfree(gtp->tid_hash);
656}
657
459aa660 658static int gtp_newlink(struct net *src_net, struct net_device *dev,
7a3f4a18
MS
659 struct nlattr *tb[], struct nlattr *data[],
660 struct netlink_ext_ack *extack)
459aa660 661{
459aa660
PN
662 struct gtp_dev *gtp;
663 struct gtp_net *gn;
1e3a3abd 664 int hashsize, err;
459aa660 665
49ecc587 666 if (!data[IFLA_GTP_FD0] && !data[IFLA_GTP_FD1])
459aa660
PN
667 return -EINVAL;
668
669 gtp = netdev_priv(dev);
670
6a902c0f 671 if (!data[IFLA_GTP_PDP_HASHSIZE]) {
459aa660 672 hashsize = 1024;
6a902c0f 673 } else {
459aa660 674 hashsize = nla_get_u32(data[IFLA_GTP_PDP_HASHSIZE]);
6a902c0f
TY
675 if (!hashsize)
676 hashsize = 1024;
677 }
459aa660
PN
678
679 err = gtp_hashtable_new(gtp, hashsize);
680 if (err < 0)
51467431
MF
681 return err;
682
49ecc587 683 err = gtp_encap_enable(gtp, data);
51467431
MF
684 if (err < 0)
685 goto out_hashtable;
459aa660
PN
686
687 err = register_netdevice(dev);
688 if (err < 0) {
689 netdev_dbg(dev, "failed to register new netdev %d\n", err);
51467431 690 goto out_encap;
459aa660
PN
691 }
692
693 gn = net_generic(dev_net(dev), gtp_net_id);
694 list_add_rcu(&gtp->list, &gn->gtp_dev_list);
94dc550a 695 dev->priv_destructor = gtp_destructor;
459aa660 696
49ecc587 697 netdev_dbg(dev, "registered new GTP interface\n");
459aa660
PN
698
699 return 0;
700
51467431
MF
701out_encap:
702 gtp_encap_disable(gtp);
459aa660 703out_hashtable:
94dc550a
TY
704 kfree(gtp->addr_hash);
705 kfree(gtp->tid_hash);
459aa660
PN
706 return err;
707}
708
709static void gtp_dellink(struct net_device *dev, struct list_head *head)
710{
711 struct gtp_dev *gtp = netdev_priv(dev);
94dc550a
TY
712 struct pdp_ctx *pctx;
713 int i;
714
715 for (i = 0; i < gtp->hash_size; i++)
716 hlist_for_each_entry_rcu(pctx, &gtp->tid_hash[i], hlist_tid)
717 pdp_context_delete(pctx);
459aa660 718
459aa660
PN
719 list_del_rcu(&gtp->list);
720 unregister_netdevice_queue(dev, head);
721}
722
723static const struct nla_policy gtp_policy[IFLA_GTP_MAX + 1] = {
724 [IFLA_GTP_FD0] = { .type = NLA_U32 },
725 [IFLA_GTP_FD1] = { .type = NLA_U32 },
726 [IFLA_GTP_PDP_HASHSIZE] = { .type = NLA_U32 },
91ed81f9 727 [IFLA_GTP_ROLE] = { .type = NLA_U32 },
459aa660
PN
728};
729
a8b8a889
MS
730static int gtp_validate(struct nlattr *tb[], struct nlattr *data[],
731 struct netlink_ext_ack *extack)
459aa660
PN
732{
733 if (!data)
734 return -EINVAL;
735
736 return 0;
737}
738
739static size_t gtp_get_size(const struct net_device *dev)
740{
e1b2914e
JB
741 return nla_total_size(sizeof(__u32)) + /* IFLA_GTP_PDP_HASHSIZE */
742 nla_total_size(sizeof(__u32)); /* IFLA_GTP_ROLE */
459aa660
PN
743}
744
745static int gtp_fill_info(struct sk_buff *skb, const struct net_device *dev)
746{
747 struct gtp_dev *gtp = netdev_priv(dev);
748
749 if (nla_put_u32(skb, IFLA_GTP_PDP_HASHSIZE, gtp->hash_size))
750 goto nla_put_failure;
e1b2914e
JB
751 if (nla_put_u32(skb, IFLA_GTP_ROLE, gtp->role))
752 goto nla_put_failure;
459aa660
PN
753
754 return 0;
755
756nla_put_failure:
757 return -EMSGSIZE;
758}
759
760static struct rtnl_link_ops gtp_link_ops __read_mostly = {
761 .kind = "gtp",
762 .maxtype = IFLA_GTP_MAX,
763 .policy = gtp_policy,
764 .priv_size = sizeof(struct gtp_dev),
765 .setup = gtp_link_setup,
766 .validate = gtp_validate,
767 .newlink = gtp_newlink,
768 .dellink = gtp_dellink,
769 .get_size = gtp_get_size,
770 .fill_info = gtp_fill_info,
771};
772
459aa660
PN
773static int gtp_hashtable_new(struct gtp_dev *gtp, int hsize)
774{
775 int i;
776
6da2ec56 777 gtp->addr_hash = kmalloc_array(hsize, sizeof(struct hlist_head),
bd5cd35b 778 GFP_KERNEL | __GFP_NOWARN);
459aa660
PN
779 if (gtp->addr_hash == NULL)
780 return -ENOMEM;
781
6da2ec56 782 gtp->tid_hash = kmalloc_array(hsize, sizeof(struct hlist_head),
bd5cd35b 783 GFP_KERNEL | __GFP_NOWARN);
459aa660
PN
784 if (gtp->tid_hash == NULL)
785 goto err1;
786
787 gtp->hash_size = hsize;
788
789 for (i = 0; i < hsize; i++) {
790 INIT_HLIST_HEAD(&gtp->addr_hash[i]);
791 INIT_HLIST_HEAD(&gtp->tid_hash[i]);
792 }
793 return 0;
794err1:
795 kfree(gtp->addr_hash);
796 return -ENOMEM;
797}
798
49ecc587
JB
799static struct sock *gtp_encap_enable_socket(int fd, int type,
800 struct gtp_dev *gtp)
459aa660
PN
801{
802 struct udp_tunnel_sock_cfg tuncfg = {NULL};
49ecc587 803 struct socket *sock;
1e3a3abd 804 struct sock *sk;
49ecc587
JB
805 int err;
806
807 pr_debug("enable gtp on %d, %d\n", fd, type);
808
809 sock = sockfd_lookup(fd, &err);
810 if (!sock) {
811 pr_debug("gtp socket fd=%d not found\n", fd);
812 return NULL;
813 }
459aa660 814
940ba149
ED
815 sk = sock->sk;
816 if (sk->sk_protocol != IPPROTO_UDP ||
817 sk->sk_type != SOCK_DGRAM ||
818 (sk->sk_family != AF_INET && sk->sk_family != AF_INET6)) {
49ecc587
JB
819 pr_debug("socket fd=%d not UDP\n", fd);
820 sk = ERR_PTR(-EINVAL);
821 goto out_sock;
459aa660
PN
822 }
823
940ba149
ED
824 lock_sock(sk);
825 if (sk->sk_user_data) {
49ecc587
JB
826 sk = ERR_PTR(-EBUSY);
827 goto out_rel_sock;
459aa660
PN
828 }
829
1e3a3abd 830 sock_hold(sk);
459aa660
PN
831
832 tuncfg.sk_user_data = gtp;
1e3a3abd 833 tuncfg.encap_type = type;
459aa660
PN
834 tuncfg.encap_rcv = gtp_encap_recv;
835 tuncfg.encap_destroy = gtp_encap_destroy;
836
1e3a3abd 837 setup_udp_tunnel_sock(sock_net(sock->sk), sock, &tuncfg);
9ab7e76a 838
49ecc587
JB
839out_rel_sock:
840 release_sock(sock->sk);
841out_sock:
1e3a3abd 842 sockfd_put(sock);
49ecc587 843 return sk;
1e3a3abd 844}
459aa660 845
49ecc587 846static int gtp_encap_enable(struct gtp_dev *gtp, struct nlattr *data[])
1e3a3abd
AS
847{
848 struct sock *sk1u = NULL;
849 struct sock *sk0 = NULL;
91ed81f9 850 unsigned int role = GTP_ROLE_GGSN;
1e3a3abd
AS
851
852 if (data[IFLA_GTP_FD0]) {
853 u32 fd0 = nla_get_u32(data[IFLA_GTP_FD0]);
854
855 sk0 = gtp_encap_enable_socket(fd0, UDP_ENCAP_GTP0, gtp);
856 if (IS_ERR(sk0))
857 return PTR_ERR(sk0);
858 }
859
860 if (data[IFLA_GTP_FD1]) {
861 u32 fd1 = nla_get_u32(data[IFLA_GTP_FD1]);
862
863 sk1u = gtp_encap_enable_socket(fd1, UDP_ENCAP_GTP1U, gtp);
864 if (IS_ERR(sk1u)) {
b289ba5e 865 gtp_encap_disable_sock(sk0);
1e3a3abd
AS
866 return PTR_ERR(sk1u);
867 }
868 }
869
91ed81f9
JB
870 if (data[IFLA_GTP_ROLE]) {
871 role = nla_get_u32(data[IFLA_GTP_ROLE]);
e30155fd 872 if (role > GTP_ROLE_SGSN) {
49ecc587
JB
873 gtp_encap_disable_sock(sk0);
874 gtp_encap_disable_sock(sk1u);
91ed81f9 875 return -EINVAL;
e30155fd 876 }
91ed81f9
JB
877 }
878
1e3a3abd
AS
879 gtp->sk0 = sk0;
880 gtp->sk1u = sk1u;
91ed81f9 881 gtp->role = role;
1e3a3abd
AS
882
883 return 0;
459aa660
PN
884}
885
3fb94617 886static struct gtp_dev *gtp_find_dev(struct net *src_net, struct nlattr *nla[])
459aa660 887{
3fb94617
AS
888 struct gtp_dev *gtp = NULL;
889 struct net_device *dev;
890 struct net *net;
459aa660 891
3fb94617
AS
892 /* Examine the link attributes and figure out which network namespace
893 * we are talking about.
894 */
895 if (nla[GTPA_NET_NS_FD])
896 net = get_net_ns_by_fd(nla_get_u32(nla[GTPA_NET_NS_FD]));
897 else
898 net = get_net(src_net);
899
900 if (IS_ERR(net))
901 return NULL;
902
903 /* Check if there's an existing gtpX device to configure */
904 dev = dev_get_by_index_rcu(net, nla_get_u32(nla[GTPA_LINK]));
65d786c2 905 if (dev && dev->netdev_ops == &gtp_netdev_ops)
3fb94617
AS
906 gtp = netdev_priv(dev);
907
908 put_net(net);
909 return gtp;
459aa660
PN
910}
911
912static void ipv4_pdp_fill(struct pdp_ctx *pctx, struct genl_info *info)
913{
914 pctx->gtp_version = nla_get_u32(info->attrs[GTPA_VERSION]);
915 pctx->af = AF_INET;
ae6336b5
JB
916 pctx->peer_addr_ip4.s_addr =
917 nla_get_be32(info->attrs[GTPA_PEER_ADDRESS]);
459aa660
PN
918 pctx->ms_addr_ip4.s_addr =
919 nla_get_be32(info->attrs[GTPA_MS_ADDRESS]);
920
921 switch (pctx->gtp_version) {
922 case GTP_V0:
923 /* According to TS 09.60, sections 7.5.1 and 7.5.2, the flow
924 * label needs to be the same for uplink and downlink packets,
925 * so let's annotate this.
926 */
927 pctx->u.v0.tid = nla_get_u64(info->attrs[GTPA_TID]);
928 pctx->u.v0.flow = nla_get_u16(info->attrs[GTPA_FLOW]);
929 break;
930 case GTP_V1:
931 pctx->u.v1.i_tei = nla_get_u32(info->attrs[GTPA_I_TEI]);
932 pctx->u.v1.o_tei = nla_get_u32(info->attrs[GTPA_O_TEI]);
933 break;
934 default:
935 break;
936 }
937}
938
50aba46c
ND
939static struct pdp_ctx *gtp_pdp_add(struct gtp_dev *gtp, struct sock *sk,
940 struct genl_info *info)
459aa660 941{
6b01b1d9 942 struct pdp_ctx *pctx, *pctx_tid = NULL;
3fb94617 943 struct net_device *dev = gtp->dev;
459aa660 944 u32 hash_ms, hash_tid = 0;
6b01b1d9 945 unsigned int version;
459aa660
PN
946 bool found = false;
947 __be32 ms_addr;
948
949 ms_addr = nla_get_be32(info->attrs[GTPA_MS_ADDRESS]);
950 hash_ms = ipv4_hashfn(ms_addr) % gtp->hash_size;
6b01b1d9 951 version = nla_get_u32(info->attrs[GTPA_VERSION]);
459aa660 952
6b01b1d9
TY
953 pctx = ipv4_pdp_find(gtp, ms_addr);
954 if (pctx)
955 found = true;
956 if (version == GTP_V0)
957 pctx_tid = gtp0_pdp_find(gtp,
958 nla_get_u64(info->attrs[GTPA_TID]));
959 else if (version == GTP_V1)
960 pctx_tid = gtp1_pdp_find(gtp,
961 nla_get_u32(info->attrs[GTPA_I_TEI]));
962 if (pctx_tid)
963 found = true;
459aa660
PN
964
965 if (found) {
966 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL)
50aba46c 967 return ERR_PTR(-EEXIST);
459aa660 968 if (info->nlhdr->nlmsg_flags & NLM_F_REPLACE)
50aba46c 969 return ERR_PTR(-EOPNOTSUPP);
459aa660 970
6b01b1d9 971 if (pctx && pctx_tid)
50aba46c 972 return ERR_PTR(-EEXIST);
6b01b1d9
TY
973 if (!pctx)
974 pctx = pctx_tid;
975
459aa660
PN
976 ipv4_pdp_fill(pctx, info);
977
978 if (pctx->gtp_version == GTP_V0)
979 netdev_dbg(dev, "GTPv0-U: update tunnel id = %llx (pdp %p)\n",
980 pctx->u.v0.tid, pctx);
981 else if (pctx->gtp_version == GTP_V1)
982 netdev_dbg(dev, "GTPv1-U: update tunnel id = %x/%x (pdp %p)\n",
983 pctx->u.v1.i_tei, pctx->u.v1.o_tei, pctx);
984
50aba46c 985 return pctx;
459aa660
PN
986
987 }
988
3f167e19 989 pctx = kmalloc(sizeof(*pctx), GFP_ATOMIC);
459aa660 990 if (pctx == NULL)
50aba46c 991 return ERR_PTR(-ENOMEM);
459aa660 992
101cfbc1
AS
993 sock_hold(sk);
994 pctx->sk = sk;
5b171f9c 995 pctx->dev = gtp->dev;
459aa660
PN
996 ipv4_pdp_fill(pctx, info);
997 atomic_set(&pctx->tx_seq, 0);
998
999 switch (pctx->gtp_version) {
1000 case GTP_V0:
1001 /* TS 09.60: "The flow label identifies unambiguously a GTP
1002 * flow.". We use the tid for this instead, I cannot find a
1003 * situation in which this doesn't unambiguosly identify the
1004 * PDP context.
1005 */
1006 hash_tid = gtp0_hashfn(pctx->u.v0.tid) % gtp->hash_size;
1007 break;
1008 case GTP_V1:
1009 hash_tid = gtp1u_hashfn(pctx->u.v1.i_tei) % gtp->hash_size;
1010 break;
1011 }
1012
1013 hlist_add_head_rcu(&pctx->hlist_addr, &gtp->addr_hash[hash_ms]);
1014 hlist_add_head_rcu(&pctx->hlist_tid, &gtp->tid_hash[hash_tid]);
1015
1016 switch (pctx->gtp_version) {
1017 case GTP_V0:
1018 netdev_dbg(dev, "GTPv0-U: new PDP ctx id=%llx ssgn=%pI4 ms=%pI4 (pdp=%p)\n",
ae6336b5 1019 pctx->u.v0.tid, &pctx->peer_addr_ip4,
459aa660
PN
1020 &pctx->ms_addr_ip4, pctx);
1021 break;
1022 case GTP_V1:
1023 netdev_dbg(dev, "GTPv1-U: new PDP ctx id=%x/%x ssgn=%pI4 ms=%pI4 (pdp=%p)\n",
1024 pctx->u.v1.i_tei, pctx->u.v1.o_tei,
ae6336b5 1025 &pctx->peer_addr_ip4, &pctx->ms_addr_ip4, pctx);
459aa660
PN
1026 break;
1027 }
1028
50aba46c 1029 return pctx;
459aa660
PN
1030}
1031
101cfbc1
AS
1032static void pdp_context_free(struct rcu_head *head)
1033{
1034 struct pdp_ctx *pctx = container_of(head, struct pdp_ctx, rcu_head);
1035
1036 sock_put(pctx->sk);
1037 kfree(pctx);
1038}
1039
6b5e2e74
AS
1040static void pdp_context_delete(struct pdp_ctx *pctx)
1041{
1042 hlist_del_rcu(&pctx->hlist_tid);
1043 hlist_del_rcu(&pctx->hlist_addr);
101cfbc1 1044 call_rcu(&pctx->rcu_head, pdp_context_free);
6b5e2e74
AS
1045}
1046
151ea46f 1047static int gtp_tunnel_notify(struct pdp_ctx *pctx, u8 cmd, gfp_t allocation);
50aba46c 1048
459aa660
PN
1049static int gtp_genl_new_pdp(struct sk_buff *skb, struct genl_info *info)
1050{
101cfbc1 1051 unsigned int version;
50aba46c 1052 struct pdp_ctx *pctx;
3fb94617 1053 struct gtp_dev *gtp;
101cfbc1 1054 struct sock *sk;
3fb94617 1055 int err;
459aa660
PN
1056
1057 if (!info->attrs[GTPA_VERSION] ||
1058 !info->attrs[GTPA_LINK] ||
ae6336b5 1059 !info->attrs[GTPA_PEER_ADDRESS] ||
459aa660
PN
1060 !info->attrs[GTPA_MS_ADDRESS])
1061 return -EINVAL;
1062
101cfbc1
AS
1063 version = nla_get_u32(info->attrs[GTPA_VERSION]);
1064
1065 switch (version) {
459aa660
PN
1066 case GTP_V0:
1067 if (!info->attrs[GTPA_TID] ||
1068 !info->attrs[GTPA_FLOW])
1069 return -EINVAL;
1070 break;
1071 case GTP_V1:
1072 if (!info->attrs[GTPA_I_TEI] ||
1073 !info->attrs[GTPA_O_TEI])
1074 return -EINVAL;
1075 break;
1076
1077 default:
1078 return -EINVAL;
1079 }
1080
1788b856 1081 rtnl_lock();
459aa660 1082
3fb94617
AS
1083 gtp = gtp_find_dev(sock_net(skb->sk), info->attrs);
1084 if (!gtp) {
1085 err = -ENODEV;
1086 goto out_unlock;
27ee441a 1087 }
459aa660 1088
101cfbc1
AS
1089 if (version == GTP_V0)
1090 sk = gtp->sk0;
1091 else if (version == GTP_V1)
1092 sk = gtp->sk1u;
1093 else
1094 sk = NULL;
1095
1096 if (!sk) {
1097 err = -ENODEV;
1098 goto out_unlock;
1099 }
1100
50aba46c
ND
1101 pctx = gtp_pdp_add(gtp, sk, info);
1102 if (IS_ERR(pctx)) {
1103 err = PTR_ERR(pctx);
1104 } else {
151ea46f 1105 gtp_tunnel_notify(pctx, GTP_CMD_NEWPDP, GFP_KERNEL);
50aba46c
ND
1106 err = 0;
1107 }
3fb94617
AS
1108
1109out_unlock:
1788b856 1110 rtnl_unlock();
3fb94617 1111 return err;
459aa660
PN
1112}
1113
d9e2dd12
AS
1114static struct pdp_ctx *gtp_find_pdp_by_link(struct net *net,
1115 struct nlattr *nla[])
459aa660 1116{
459aa660 1117 struct gtp_dev *gtp;
459aa660 1118
d9e2dd12
AS
1119 gtp = gtp_find_dev(net, nla);
1120 if (!gtp)
1121 return ERR_PTR(-ENODEV);
459aa660 1122
d9e2dd12
AS
1123 if (nla[GTPA_MS_ADDRESS]) {
1124 __be32 ip = nla_get_be32(nla[GTPA_MS_ADDRESS]);
459aa660 1125
d9e2dd12
AS
1126 return ipv4_pdp_find(gtp, ip);
1127 } else if (nla[GTPA_VERSION]) {
1128 u32 gtp_version = nla_get_u32(nla[GTPA_VERSION]);
1129
1130 if (gtp_version == GTP_V0 && nla[GTPA_TID])
1131 return gtp0_pdp_find(gtp, nla_get_u64(nla[GTPA_TID]));
1132 else if (gtp_version == GTP_V1 && nla[GTPA_I_TEI])
1133 return gtp1_pdp_find(gtp, nla_get_u32(nla[GTPA_I_TEI]));
27ee441a 1134 }
459aa660 1135
d9e2dd12
AS
1136 return ERR_PTR(-EINVAL);
1137}
459aa660 1138
d9e2dd12
AS
1139static struct pdp_ctx *gtp_find_pdp(struct net *net, struct nlattr *nla[])
1140{
1141 struct pdp_ctx *pctx;
459aa660 1142
d9e2dd12
AS
1143 if (nla[GTPA_LINK])
1144 pctx = gtp_find_pdp_by_link(net, nla);
1145 else
1146 pctx = ERR_PTR(-EINVAL);
1147
1148 if (!pctx)
1149 pctx = ERR_PTR(-ENOENT);
1150
1151 return pctx;
1152}
1153
1154static int gtp_genl_del_pdp(struct sk_buff *skb, struct genl_info *info)
1155{
1156 struct pdp_ctx *pctx;
1157 int err = 0;
1158
1159 if (!info->attrs[GTPA_VERSION])
1160 return -EINVAL;
1161
1162 rcu_read_lock();
1163
1164 pctx = gtp_find_pdp(sock_net(skb->sk), info->attrs);
1165 if (IS_ERR(pctx)) {
1166 err = PTR_ERR(pctx);
3fb94617
AS
1167 goto out_unlock;
1168 }
459aa660
PN
1169
1170 if (pctx->gtp_version == GTP_V0)
d9e2dd12 1171 netdev_dbg(pctx->dev, "GTPv0-U: deleting tunnel id = %llx (pdp %p)\n",
459aa660
PN
1172 pctx->u.v0.tid, pctx);
1173 else if (pctx->gtp_version == GTP_V1)
d9e2dd12 1174 netdev_dbg(pctx->dev, "GTPv1-U: deleting tunnel id = %x/%x (pdp %p)\n",
459aa660
PN
1175 pctx->u.v1.i_tei, pctx->u.v1.o_tei, pctx);
1176
151ea46f 1177 gtp_tunnel_notify(pctx, GTP_CMD_DELPDP, GFP_ATOMIC);
6b5e2e74 1178 pdp_context_delete(pctx);
459aa660 1179
3fb94617
AS
1180out_unlock:
1181 rcu_read_unlock();
1182 return err;
459aa660
PN
1183}
1184
489111e5 1185static struct genl_family gtp_genl_family;
459aa660 1186
50aba46c
ND
1187enum gtp_multicast_groups {
1188 GTP_GENL_MCGRP,
1189};
1190
1191static const struct genl_multicast_group gtp_genl_mcgrps[] = {
1192 [GTP_GENL_MCGRP] = { .name = GTP_GENL_MCGRP_NAME },
1193};
1194
459aa660 1195static int gtp_genl_fill_info(struct sk_buff *skb, u32 snd_portid, u32 snd_seq,
846c68f7 1196 int flags, u32 type, struct pdp_ctx *pctx)
459aa660
PN
1197{
1198 void *genlh;
1199
846c68f7 1200 genlh = genlmsg_put(skb, snd_portid, snd_seq, &gtp_genl_family, flags,
459aa660
PN
1201 type);
1202 if (genlh == NULL)
1203 goto nlmsg_failure;
1204
1205 if (nla_put_u32(skb, GTPA_VERSION, pctx->gtp_version) ||
b274e47d 1206 nla_put_u32(skb, GTPA_LINK, pctx->dev->ifindex) ||
ae6336b5 1207 nla_put_be32(skb, GTPA_PEER_ADDRESS, pctx->peer_addr_ip4.s_addr) ||
459aa660
PN
1208 nla_put_be32(skb, GTPA_MS_ADDRESS, pctx->ms_addr_ip4.s_addr))
1209 goto nla_put_failure;
1210
1211 switch (pctx->gtp_version) {
1212 case GTP_V0:
1213 if (nla_put_u64_64bit(skb, GTPA_TID, pctx->u.v0.tid, GTPA_PAD) ||
1214 nla_put_u16(skb, GTPA_FLOW, pctx->u.v0.flow))
1215 goto nla_put_failure;
1216 break;
1217 case GTP_V1:
1218 if (nla_put_u32(skb, GTPA_I_TEI, pctx->u.v1.i_tei) ||
1219 nla_put_u32(skb, GTPA_O_TEI, pctx->u.v1.o_tei))
1220 goto nla_put_failure;
1221 break;
1222 }
1223 genlmsg_end(skb, genlh);
1224 return 0;
1225
1226nlmsg_failure:
1227nla_put_failure:
1228 genlmsg_cancel(skb, genlh);
1229 return -EMSGSIZE;
1230}
1231
151ea46f 1232static int gtp_tunnel_notify(struct pdp_ctx *pctx, u8 cmd, gfp_t allocation)
50aba46c
ND
1233{
1234 struct sk_buff *msg;
1235 int ret;
1236
151ea46f 1237 msg = nlmsg_new(NLMSG_DEFAULT_SIZE, allocation);
50aba46c
ND
1238 if (!msg)
1239 return -ENOMEM;
1240
1241 ret = gtp_genl_fill_info(msg, 0, 0, 0, cmd, pctx);
1242 if (ret < 0) {
1243 nlmsg_free(msg);
1244 return ret;
1245 }
1246
1247 ret = genlmsg_multicast_netns(&gtp_genl_family, dev_net(pctx->dev), msg,
1248 0, GTP_GENL_MCGRP, GFP_ATOMIC);
1249 return ret;
1250}
1251
459aa660
PN
1252static int gtp_genl_get_pdp(struct sk_buff *skb, struct genl_info *info)
1253{
1254 struct pdp_ctx *pctx = NULL;
459aa660 1255 struct sk_buff *skb2;
459aa660
PN
1256 int err;
1257
d9e2dd12 1258 if (!info->attrs[GTPA_VERSION])
459aa660 1259 return -EINVAL;
459aa660 1260
3fb94617 1261 rcu_read_lock();
459aa660 1262
d9e2dd12
AS
1263 pctx = gtp_find_pdp(sock_net(skb->sk), info->attrs);
1264 if (IS_ERR(pctx)) {
1265 err = PTR_ERR(pctx);
459aa660
PN
1266 goto err_unlock;
1267 }
1268
1269 skb2 = genlmsg_new(NLMSG_GOODSIZE, GFP_ATOMIC);
1270 if (skb2 == NULL) {
1271 err = -ENOMEM;
1272 goto err_unlock;
1273 }
1274
846c68f7
YK
1275 err = gtp_genl_fill_info(skb2, NETLINK_CB(skb).portid, info->snd_seq,
1276 0, info->nlhdr->nlmsg_type, pctx);
459aa660
PN
1277 if (err < 0)
1278 goto err_unlock_free;
1279
1280 rcu_read_unlock();
1281 return genlmsg_unicast(genl_info_net(info), skb2, info->snd_portid);
1282
1283err_unlock_free:
1284 kfree_skb(skb2);
1285err_unlock:
1286 rcu_read_unlock();
1287 return err;
1288}
1289
1290static int gtp_genl_dump_pdp(struct sk_buff *skb,
1291 struct netlink_callback *cb)
1292{
1293 struct gtp_dev *last_gtp = (struct gtp_dev *)cb->args[2], *gtp;
94a6d9fb 1294 int i, j, bucket = cb->args[0], skip = cb->args[1];
459aa660 1295 struct net *net = sock_net(skb->sk);
459aa660 1296 struct pdp_ctx *pctx;
94a6d9fb
TY
1297 struct gtp_net *gn;
1298
1299 gn = net_generic(net, gtp_net_id);
459aa660
PN
1300
1301 if (cb->args[4])
1302 return 0;
1303
94a6d9fb 1304 rcu_read_lock();
459aa660
PN
1305 list_for_each_entry_rcu(gtp, &gn->gtp_dev_list, list) {
1306 if (last_gtp && last_gtp != gtp)
1307 continue;
1308 else
1309 last_gtp = NULL;
1310
94a6d9fb
TY
1311 for (i = bucket; i < gtp->hash_size; i++) {
1312 j = 0;
1313 hlist_for_each_entry_rcu(pctx, &gtp->tid_hash[i],
1314 hlist_tid) {
1315 if (j >= skip &&
1316 gtp_genl_fill_info(skb,
1317 NETLINK_CB(cb->skb).portid,
1318 cb->nlh->nlmsg_seq,
846c68f7 1319 NLM_F_MULTI,
94a6d9fb 1320 cb->nlh->nlmsg_type, pctx)) {
459aa660 1321 cb->args[0] = i;
94a6d9fb 1322 cb->args[1] = j;
459aa660
PN
1323 cb->args[2] = (unsigned long)gtp;
1324 goto out;
1325 }
94a6d9fb 1326 j++;
459aa660 1327 }
94a6d9fb 1328 skip = 0;
459aa660 1329 }
94a6d9fb 1330 bucket = 0;
459aa660
PN
1331 }
1332 cb->args[4] = 1;
1333out:
94a6d9fb 1334 rcu_read_unlock();
459aa660
PN
1335 return skb->len;
1336}
1337
5761917a 1338static const struct nla_policy gtp_genl_policy[GTPA_MAX + 1] = {
459aa660
PN
1339 [GTPA_LINK] = { .type = NLA_U32, },
1340 [GTPA_VERSION] = { .type = NLA_U32, },
1341 [GTPA_TID] = { .type = NLA_U64, },
ae6336b5 1342 [GTPA_PEER_ADDRESS] = { .type = NLA_U32, },
459aa660
PN
1343 [GTPA_MS_ADDRESS] = { .type = NLA_U32, },
1344 [GTPA_FLOW] = { .type = NLA_U16, },
1345 [GTPA_NET_NS_FD] = { .type = NLA_U32, },
1346 [GTPA_I_TEI] = { .type = NLA_U32, },
1347 [GTPA_O_TEI] = { .type = NLA_U32, },
1348};
1349
66a9b928 1350static const struct genl_small_ops gtp_genl_ops[] = {
459aa660
PN
1351 {
1352 .cmd = GTP_CMD_NEWPDP,
ef6243ac 1353 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
459aa660 1354 .doit = gtp_genl_new_pdp,
459aa660
PN
1355 .flags = GENL_ADMIN_PERM,
1356 },
1357 {
1358 .cmd = GTP_CMD_DELPDP,
ef6243ac 1359 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
459aa660 1360 .doit = gtp_genl_del_pdp,
459aa660
PN
1361 .flags = GENL_ADMIN_PERM,
1362 },
1363 {
1364 .cmd = GTP_CMD_GETPDP,
ef6243ac 1365 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
459aa660
PN
1366 .doit = gtp_genl_get_pdp,
1367 .dumpit = gtp_genl_dump_pdp,
459aa660
PN
1368 .flags = GENL_ADMIN_PERM,
1369 },
1370};
1371
56989f6d 1372static struct genl_family gtp_genl_family __ro_after_init = {
489111e5
JB
1373 .name = "gtp",
1374 .version = 0,
1375 .hdrsize = 0,
1376 .maxattr = GTPA_MAX,
3b0f31f2 1377 .policy = gtp_genl_policy,
489111e5
JB
1378 .netnsok = true,
1379 .module = THIS_MODULE,
66a9b928
JK
1380 .small_ops = gtp_genl_ops,
1381 .n_small_ops = ARRAY_SIZE(gtp_genl_ops),
50aba46c
ND
1382 .mcgrps = gtp_genl_mcgrps,
1383 .n_mcgrps = ARRAY_SIZE(gtp_genl_mcgrps),
489111e5
JB
1384};
1385
459aa660
PN
1386static int __net_init gtp_net_init(struct net *net)
1387{
1388 struct gtp_net *gn = net_generic(net, gtp_net_id);
1389
1390 INIT_LIST_HEAD(&gn->gtp_dev_list);
1391 return 0;
1392}
1393
1394static void __net_exit gtp_net_exit(struct net *net)
1395{
1396 struct gtp_net *gn = net_generic(net, gtp_net_id);
1397 struct gtp_dev *gtp;
1398 LIST_HEAD(list);
1399
1400 rtnl_lock();
1401 list_for_each_entry(gtp, &gn->gtp_dev_list, list)
1402 gtp_dellink(gtp->dev, &list);
1403
1404 unregister_netdevice_many(&list);
1405 rtnl_unlock();
1406}
1407
1408static struct pernet_operations gtp_net_ops = {
1409 .init = gtp_net_init,
1410 .exit = gtp_net_exit,
1411 .id = &gtp_net_id,
1412 .size = sizeof(struct gtp_net),
1413};
1414
1415static int __init gtp_init(void)
1416{
1417 int err;
1418
1419 get_random_bytes(&gtp_h_initval, sizeof(gtp_h_initval));
1420
1421 err = rtnl_link_register(&gtp_link_ops);
1422 if (err < 0)
1423 goto error_out;
1424
489111e5 1425 err = genl_register_family(&gtp_genl_family);
459aa660
PN
1426 if (err < 0)
1427 goto unreg_rtnl_link;
1428
1429 err = register_pernet_subsys(&gtp_net_ops);
1430 if (err < 0)
1431 goto unreg_genl_family;
1432
49ecc587 1433 pr_info("GTP module loaded (pdp ctx size %zd bytes)\n",
459aa660
PN
1434 sizeof(struct pdp_ctx));
1435 return 0;
1436
1437unreg_genl_family:
1438 genl_unregister_family(&gtp_genl_family);
1439unreg_rtnl_link:
1440 rtnl_link_unregister(&gtp_link_ops);
1441error_out:
1442 pr_err("error loading GTP module loaded\n");
1443 return err;
1444}
1445late_initcall(gtp_init);
1446
1447static void __exit gtp_fini(void)
1448{
459aa660
PN
1449 genl_unregister_family(&gtp_genl_family);
1450 rtnl_link_unregister(&gtp_link_ops);
a2bed907 1451 unregister_pernet_subsys(&gtp_net_ops);
459aa660
PN
1452
1453 pr_info("GTP module unloaded\n");
1454}
1455module_exit(gtp_fini);
1456
1457MODULE_LICENSE("GPL");
1458MODULE_AUTHOR("Harald Welte <hwelte@sysmocom.de>");
1459MODULE_DESCRIPTION("Interface driver for GTP encapsulated traffic");
1460MODULE_ALIAS_RTNL_LINK("gtp");
ab729823 1461MODULE_ALIAS_GENL_FAMILY("gtp");