Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
1181412c S |
2 | /* |
3 | * Linux NET3: IP/IP protocol decoder modified to support | |
4 | * virtual tunnel interface | |
5 | * | |
6 | * Authors: | |
7 | * Saurabh Mohan (saurabh.mohan@vyatta.com) 05/07/2012 | |
1181412c S |
8 | */ |
9 | ||
10 | /* | |
11 | This version of net/ipv4/ip_vti.c is cloned of net/ipv4/ipip.c | |
12 | ||
13 | For comments look at net/ipv4/ip_gre.c --ANK | |
14 | */ | |
15 | ||
16 | ||
17 | #include <linux/capability.h> | |
18 | #include <linux/module.h> | |
19 | #include <linux/types.h> | |
20 | #include <linux/kernel.h> | |
21 | #include <linux/uaccess.h> | |
22 | #include <linux/skbuff.h> | |
23 | #include <linux/netdevice.h> | |
24 | #include <linux/in.h> | |
25 | #include <linux/tcp.h> | |
26 | #include <linux/udp.h> | |
27 | #include <linux/if_arp.h> | |
1181412c S |
28 | #include <linux/init.h> |
29 | #include <linux/netfilter_ipv4.h> | |
30 | #include <linux/if_ether.h> | |
78a010cc | 31 | #include <linux/icmpv6.h> |
1181412c S |
32 | |
33 | #include <net/sock.h> | |
34 | #include <net/ip.h> | |
35 | #include <net/icmp.h> | |
c5441932 | 36 | #include <net/ip_tunnels.h> |
1181412c S |
37 | #include <net/inet_ecn.h> |
38 | #include <net/xfrm.h> | |
39 | #include <net/net_namespace.h> | |
40 | #include <net/netns/generic.h> | |
41 | ||
1181412c S |
42 | static struct rtnl_link_ops vti_link_ops __read_mostly; |
43 | ||
c7d03a00 | 44 | static unsigned int vti_net_id __read_mostly; |
1181412c | 45 | static int vti_tunnel_init(struct net_device *dev); |
1181412c | 46 | |
df3893c1 | 47 | static int vti_input(struct sk_buff *skb, int nexthdr, __be32 spi, |
f981c57f | 48 | int encap_type, bool update_skb_dev) |
1181412c S |
49 | { |
50 | struct ip_tunnel *tunnel; | |
51 | const struct iphdr *iph = ip_hdr(skb); | |
b9959fd3 AW |
52 | struct net *net = dev_net(skb->dev); |
53 | struct ip_tunnel_net *itn = net_generic(net, vti_net_id); | |
1181412c | 54 | |
b9959fd3 AW |
55 | tunnel = ip_tunnel_lookup(itn, skb->dev->ifindex, TUNNEL_NO_KEY, |
56 | iph->saddr, iph->daddr, 0); | |
00db4124 | 57 | if (tunnel) { |
df3893c1 SK |
58 | if (!xfrm4_policy_check(NULL, XFRM_POLICY_IN, skb)) |
59 | goto drop; | |
60 | ||
61 | XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip4 = tunnel; | |
df3893c1 | 62 | |
f981c57f JS |
63 | if (update_skb_dev) |
64 | skb->dev = tunnel->dev; | |
65 | ||
df3893c1 SK |
66 | return xfrm_input(skb, nexthdr, spi, encap_type); |
67 | } | |
68 | ||
69 | return -EINVAL; | |
70 | drop: | |
71 | kfree_skb(skb); | |
72 | return 0; | |
73 | } | |
74 | ||
f981c57f JS |
75 | static int vti_input_proto(struct sk_buff *skb, int nexthdr, __be32 spi, |
76 | int encap_type) | |
dd9ee344 | 77 | { |
f981c57f | 78 | return vti_input(skb, nexthdr, spi, encap_type, false); |
dd9ee344 SY |
79 | } |
80 | ||
f981c57f | 81 | static int vti_rcv(struct sk_buff *skb, __be32 spi, bool update_skb_dev) |
df3893c1 SK |
82 | { |
83 | XFRM_SPI_SKB_CB(skb)->family = AF_INET; | |
84 | XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct iphdr, daddr); | |
85 | ||
f981c57f | 86 | return vti_input(skb, ip_hdr(skb)->protocol, spi, 0, update_skb_dev); |
df3893c1 SK |
87 | } |
88 | ||
f981c57f | 89 | static int vti_rcv_proto(struct sk_buff *skb) |
dd9ee344 | 90 | { |
f981c57f JS |
91 | return vti_rcv(skb, 0, false); |
92 | } | |
dd9ee344 | 93 | |
df3893c1 SK |
94 | static int vti_rcv_cb(struct sk_buff *skb, int err) |
95 | { | |
96 | unsigned short family; | |
97 | struct net_device *dev; | |
df3893c1 | 98 | struct xfrm_state *x; |
4c145dce | 99 | const struct xfrm_mode *inner_mode; |
df3893c1 | 100 | struct ip_tunnel *tunnel = XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip4; |
d55c670c AD |
101 | u32 orig_mark = skb->mark; |
102 | int ret; | |
df3893c1 SK |
103 | |
104 | if (!tunnel) | |
1181412c | 105 | return 1; |
df3893c1 SK |
106 | |
107 | dev = tunnel->dev; | |
108 | ||
109 | if (err) { | |
110 | dev->stats.rx_errors++; | |
111 | dev->stats.rx_dropped++; | |
112 | ||
113 | return 0; | |
1181412c | 114 | } |
1181412c | 115 | |
df3893c1 | 116 | x = xfrm_input_state(skb); |
1fb81e09 | 117 | |
c9500d7b | 118 | inner_mode = &x->inner_mode; |
1fb81e09 | 119 | |
120 | if (x->sel.family == AF_UNSPEC) { | |
121 | inner_mode = xfrm_ip2inner_mode(x, XFRM_MODE_SKB_CB(skb)->protocol); | |
122 | if (inner_mode == NULL) { | |
123 | XFRM_INC_STATS(dev_net(skb->dev), | |
124 | LINUX_MIB_XFRMINSTATEMODEERROR); | |
125 | return -EINVAL; | |
126 | } | |
127 | } | |
128 | ||
b45714b1 | 129 | family = inner_mode->family; |
df3893c1 | 130 | |
d55c670c AD |
131 | skb->mark = be32_to_cpu(tunnel->parms.i_key); |
132 | ret = xfrm_policy_check(NULL, XFRM_POLICY_IN, skb, family); | |
133 | skb->mark = orig_mark; | |
134 | ||
135 | if (!ret) | |
df3893c1 SK |
136 | return -EPERM; |
137 | ||
138 | skb_scrub_packet(skb, !net_eq(tunnel->net, dev_net(skb->dev))); | |
139 | skb->dev = dev; | |
560b50cf | 140 | dev_sw_netstats_rx_add(dev, skb->len); |
df3893c1 SK |
141 | |
142 | return 0; | |
1181412c S |
143 | } |
144 | ||
6e2de802 SK |
145 | static bool vti_state_check(const struct xfrm_state *x, __be32 dst, __be32 src) |
146 | { | |
147 | xfrm_address_t *daddr = (xfrm_address_t *)&dst; | |
148 | xfrm_address_t *saddr = (xfrm_address_t *)&src; | |
149 | ||
150 | /* if there is no transform then this tunnel is not functional. | |
151 | * Or if the xfrm is not mode tunnel. | |
152 | */ | |
153 | if (!x || x->props.mode != XFRM_MODE_TUNNEL || | |
154 | x->props.family != AF_INET) | |
155 | return false; | |
156 | ||
157 | if (!dst) | |
158 | return xfrm_addr_equal(saddr, &x->props.saddr, AF_INET); | |
159 | ||
160 | if (!xfrm_state_addr_check(x, daddr, saddr, AF_INET)) | |
161 | return false; | |
162 | ||
163 | return true; | |
164 | } | |
165 | ||
78a010cc SK |
166 | static netdev_tx_t vti_xmit(struct sk_buff *skb, struct net_device *dev, |
167 | struct flowi *fl) | |
1181412c S |
168 | { |
169 | struct ip_tunnel *tunnel = netdev_priv(dev); | |
6e2de802 | 170 | struct ip_tunnel_parm *parms = &tunnel->parms; |
a34cd4f3 | 171 | struct dst_entry *dst = skb_dst(skb); |
1181412c | 172 | struct net_device *tdev; /* Device to other host */ |
36f6ee22 | 173 | int pkt_len = skb->len; |
b9959fd3 | 174 | int err; |
d6af1a31 | 175 | int mtu; |
1181412c | 176 | |
a34cd4f3 | 177 | if (!dst) { |
f1ed1026 ND |
178 | switch (skb->protocol) { |
179 | case htons(ETH_P_IP): { | |
180 | struct rtable *rt; | |
181 | ||
182 | fl->u.ip4.flowi4_oif = dev->ifindex; | |
183 | fl->u.ip4.flowi4_flags |= FLOWI_FLAG_ANYSRC; | |
184 | rt = __ip_route_output_key(dev_net(dev), &fl->u.ip4); | |
185 | if (IS_ERR(rt)) { | |
186 | dev->stats.tx_carrier_errors++; | |
187 | goto tx_error_icmp; | |
188 | } | |
189 | dst = &rt->dst; | |
190 | skb_dst_set(skb, dst); | |
191 | break; | |
192 | } | |
193 | #if IS_ENABLED(CONFIG_IPV6) | |
194 | case htons(ETH_P_IPV6): | |
195 | fl->u.ip6.flowi6_oif = dev->ifindex; | |
196 | fl->u.ip6.flowi6_flags |= FLOWI_FLAG_ANYSRC; | |
197 | dst = ip6_route_output(dev_net(dev), NULL, &fl->u.ip6); | |
198 | if (dst->error) { | |
199 | dst_release(dst); | |
200 | dst = NULL; | |
201 | dev->stats.tx_carrier_errors++; | |
202 | goto tx_error_icmp; | |
203 | } | |
204 | skb_dst_set(skb, dst); | |
205 | break; | |
206 | #endif | |
207 | default: | |
95224166 ND |
208 | dev->stats.tx_carrier_errors++; |
209 | goto tx_error_icmp; | |
210 | } | |
df3893c1 | 211 | } |
1181412c | 212 | |
a34cd4f3 | 213 | dst_hold(dst); |
b328ecc4 | 214 | dst = xfrm_lookup_route(tunnel->net, dst, fl, NULL, 0); |
a34cd4f3 | 215 | if (IS_ERR(dst)) { |
1181412c S |
216 | dev->stats.tx_carrier_errors++; |
217 | goto tx_error_icmp; | |
218 | } | |
df3893c1 | 219 | |
b328ecc4 SK |
220 | if (dst->flags & DST_XFRM_QUEUE) |
221 | goto queued; | |
222 | ||
6e2de802 | 223 | if (!vti_state_check(dst->xfrm, parms->iph.daddr, parms->iph.saddr)) { |
1181412c | 224 | dev->stats.tx_carrier_errors++; |
a34cd4f3 | 225 | dst_release(dst); |
1181412c S |
226 | goto tx_error_icmp; |
227 | } | |
6e2de802 | 228 | |
a34cd4f3 | 229 | tdev = dst->dev; |
1181412c S |
230 | |
231 | if (tdev == dev) { | |
a34cd4f3 | 232 | dst_release(dst); |
1181412c S |
233 | dev->stats.collisions++; |
234 | goto tx_error; | |
235 | } | |
236 | ||
d6af1a31 SK |
237 | mtu = dst_mtu(dst); |
238 | if (skb->len > mtu) { | |
8247a79e | 239 | skb_dst_update_pmtu_no_confirm(skb, mtu); |
d6af1a31 | 240 | if (skb->protocol == htons(ETH_P_IP)) { |
4372339e JD |
241 | icmp_ndo_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, |
242 | htonl(mtu)); | |
d6af1a31 SK |
243 | } else { |
244 | if (mtu < IPV6_MIN_MTU) | |
245 | mtu = IPV6_MIN_MTU; | |
246 | ||
4372339e | 247 | icmpv6_ndo_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); |
d6af1a31 SK |
248 | } |
249 | ||
250 | dst_release(dst); | |
251 | goto tx_error; | |
252 | } | |
253 | ||
b328ecc4 | 254 | queued: |
df3893c1 | 255 | skb_scrub_packet(skb, !net_eq(tunnel->net, dev_net(dev))); |
a34cd4f3 | 256 | skb_dst_set(skb, dst); |
1181412c S |
257 | skb->dev = skb_dst(skb)->dev; |
258 | ||
13206b6b | 259 | err = dst_output(tunnel->net, skb->sk, skb); |
b9959fd3 | 260 | if (net_xmit_eval(err) == 0) |
36f6ee22 | 261 | err = pkt_len; |
039f5062 | 262 | iptunnel_xmit_stats(dev, err); |
1181412c S |
263 | return NETDEV_TX_OK; |
264 | ||
265 | tx_error_icmp: | |
266 | dst_link_failure(skb); | |
267 | tx_error: | |
268 | dev->stats.tx_errors++; | |
3acfa1e7 | 269 | kfree_skb(skb); |
1181412c S |
270 | return NETDEV_TX_OK; |
271 | } | |
272 | ||
78a010cc SK |
273 | /* This function assumes it is being called from dev_queue_xmit() |
274 | * and that skb is filled properly by that function. | |
275 | */ | |
276 | static netdev_tx_t vti_tunnel_xmit(struct sk_buff *skb, struct net_device *dev) | |
277 | { | |
278 | struct ip_tunnel *tunnel = netdev_priv(dev); | |
279 | struct flowi fl; | |
280 | ||
cb9f1b78 WB |
281 | if (!pskb_inet_may_pull(skb)) |
282 | goto tx_err; | |
283 | ||
78a010cc SK |
284 | memset(&fl, 0, sizeof(fl)); |
285 | ||
78a010cc SK |
286 | switch (skb->protocol) { |
287 | case htons(ETH_P_IP): | |
288 | xfrm_decode_session(skb, &fl, AF_INET); | |
289 | memset(IPCB(skb), 0, sizeof(*IPCB(skb))); | |
290 | break; | |
291 | case htons(ETH_P_IPV6): | |
292 | xfrm_decode_session(skb, &fl, AF_INET6); | |
293 | memset(IP6CB(skb), 0, sizeof(*IP6CB(skb))); | |
294 | break; | |
295 | default: | |
cb9f1b78 | 296 | goto tx_err; |
78a010cc SK |
297 | } |
298 | ||
cd5279c1 AD |
299 | /* override mark with tunnel output key */ |
300 | fl.flowi_mark = be32_to_cpu(tunnel->parms.o_key); | |
301 | ||
78a010cc | 302 | return vti_xmit(skb, dev, &fl); |
cb9f1b78 WB |
303 | |
304 | tx_err: | |
305 | dev->stats.tx_errors++; | |
306 | kfree_skb(skb); | |
307 | return NETDEV_TX_OK; | |
78a010cc SK |
308 | } |
309 | ||
df3893c1 SK |
310 | static int vti4_err(struct sk_buff *skb, u32 info) |
311 | { | |
312 | __be32 spi; | |
6d004d6c | 313 | __u32 mark; |
df3893c1 SK |
314 | struct xfrm_state *x; |
315 | struct ip_tunnel *tunnel; | |
316 | struct ip_esp_hdr *esph; | |
317 | struct ip_auth_hdr *ah ; | |
318 | struct ip_comp_hdr *ipch; | |
319 | struct net *net = dev_net(skb->dev); | |
320 | const struct iphdr *iph = (const struct iphdr *)skb->data; | |
321 | int protocol = iph->protocol; | |
322 | struct ip_tunnel_net *itn = net_generic(net, vti_net_id); | |
323 | ||
324 | tunnel = ip_tunnel_lookup(itn, skb->dev->ifindex, TUNNEL_NO_KEY, | |
325 | iph->daddr, iph->saddr, 0); | |
326 | if (!tunnel) | |
327 | return -1; | |
328 | ||
6d004d6c SK |
329 | mark = be32_to_cpu(tunnel->parms.o_key); |
330 | ||
df3893c1 SK |
331 | switch (protocol) { |
332 | case IPPROTO_ESP: | |
333 | esph = (struct ip_esp_hdr *)(skb->data+(iph->ihl<<2)); | |
334 | spi = esph->spi; | |
335 | break; | |
336 | case IPPROTO_AH: | |
337 | ah = (struct ip_auth_hdr *)(skb->data+(iph->ihl<<2)); | |
338 | spi = ah->spi; | |
339 | break; | |
340 | case IPPROTO_COMP: | |
341 | ipch = (struct ip_comp_hdr *)(skb->data+(iph->ihl<<2)); | |
342 | spi = htonl(ntohs(ipch->cpi)); | |
343 | break; | |
344 | default: | |
345 | return 0; | |
346 | } | |
347 | ||
348 | switch (icmp_hdr(skb)->type) { | |
349 | case ICMP_DEST_UNREACH: | |
350 | if (icmp_hdr(skb)->code != ICMP_FRAG_NEEDED) | |
351 | return 0; | |
352 | case ICMP_REDIRECT: | |
353 | break; | |
354 | default: | |
355 | return 0; | |
356 | } | |
357 | ||
6d004d6c | 358 | x = xfrm_state_lookup(net, mark, (const xfrm_address_t *)&iph->daddr, |
df3893c1 SK |
359 | spi, protocol, AF_INET); |
360 | if (!x) | |
361 | return 0; | |
362 | ||
363 | if (icmp_hdr(skb)->type == ICMP_DEST_UNREACH) | |
d888f396 | 364 | ipv4_update_pmtu(skb, net, info, 0, protocol); |
df3893c1 | 365 | else |
1042caa7 | 366 | ipv4_redirect(skb, net, 0, protocol); |
df3893c1 SK |
367 | xfrm_state_put(x); |
368 | ||
369 | return 0; | |
370 | } | |
371 | ||
1181412c | 372 | static int |
607259a6 | 373 | vti_tunnel_ctl(struct net_device *dev, struct ip_tunnel_parm *p, int cmd) |
1181412c S |
374 | { |
375 | int err = 0; | |
1181412c | 376 | |
b9959fd3 | 377 | if (cmd == SIOCADDTUNNEL || cmd == SIOCCHGTUNNEL) { |
607259a6 CH |
378 | if (p->iph.version != 4 || p->iph.protocol != IPPROTO_IPIP || |
379 | p->iph.ihl != 5) | |
b9959fd3 AW |
380 | return -EINVAL; |
381 | } | |
1181412c | 382 | |
607259a6 CH |
383 | if (!(p->i_flags & GRE_KEY)) |
384 | p->i_key = 0; | |
385 | if (!(p->o_flags & GRE_KEY)) | |
386 | p->o_key = 0; | |
7c8e6b9c | 387 | |
607259a6 | 388 | p->i_flags = VTI_ISVTI; |
7c8e6b9c | 389 | |
607259a6 | 390 | err = ip_tunnel_ctl(dev, p, cmd); |
b9959fd3 AW |
391 | if (err) |
392 | return err; | |
1181412c | 393 | |
b9959fd3 | 394 | if (cmd != SIOCDELTUNNEL) { |
607259a6 CH |
395 | p->i_flags |= GRE_KEY; |
396 | p->o_flags |= GRE_KEY; | |
1181412c | 397 | } |
1181412c S |
398 | return 0; |
399 | } | |
400 | ||
401 | static const struct net_device_ops vti_netdev_ops = { | |
402 | .ndo_init = vti_tunnel_init, | |
b9959fd3 | 403 | .ndo_uninit = ip_tunnel_uninit, |
1181412c | 404 | .ndo_start_xmit = vti_tunnel_xmit, |
607259a6 | 405 | .ndo_do_ioctl = ip_tunnel_ioctl, |
b9959fd3 | 406 | .ndo_change_mtu = ip_tunnel_change_mtu, |
8f3feb24 | 407 | .ndo_get_stats64 = dev_get_tstats64, |
1e99584b | 408 | .ndo_get_iflink = ip_tunnel_get_iflink, |
607259a6 | 409 | .ndo_tunnel_ctl = vti_tunnel_ctl, |
1181412c S |
410 | }; |
411 | ||
b9959fd3 | 412 | static void vti_tunnel_setup(struct net_device *dev) |
1181412c | 413 | { |
b9959fd3 | 414 | dev->netdev_ops = &vti_netdev_ops; |
ab59d2b6 | 415 | dev->header_ops = &ip_tunnel_header_ops; |
8d89dcdf | 416 | dev->type = ARPHRD_TUNNEL; |
b9959fd3 | 417 | ip_tunnel_setup(dev, vti_net_id); |
1181412c S |
418 | } |
419 | ||
b9959fd3 | 420 | static int vti_tunnel_init(struct net_device *dev) |
1181412c | 421 | { |
b9959fd3 AW |
422 | struct ip_tunnel *tunnel = netdev_priv(dev); |
423 | struct iphdr *iph = &tunnel->parms.iph; | |
424 | ||
425 | memcpy(dev->dev_addr, &iph->saddr, 4); | |
426 | memcpy(dev->broadcast, &iph->daddr, 4); | |
1181412c | 427 | |
1181412c | 428 | dev->flags = IFF_NOARP; |
1181412c | 429 | dev->addr_len = 4; |
1181412c | 430 | dev->features |= NETIF_F_LLTX; |
02875878 | 431 | netif_keep_dst(dev); |
1181412c | 432 | |
b9959fd3 | 433 | return ip_tunnel_init(dev); |
1181412c S |
434 | } |
435 | ||
b9959fd3 | 436 | static void __net_init vti_fb_tunnel_init(struct net_device *dev) |
1181412c S |
437 | { |
438 | struct ip_tunnel *tunnel = netdev_priv(dev); | |
439 | struct iphdr *iph = &tunnel->parms.iph; | |
1181412c | 440 | |
1181412c S |
441 | iph->version = 4; |
442 | iph->protocol = IPPROTO_IPIP; | |
443 | iph->ihl = 5; | |
1181412c S |
444 | } |
445 | ||
df3893c1 | 446 | static struct xfrm4_protocol vti_esp4_protocol __read_mostly = { |
f981c57f JS |
447 | .handler = vti_rcv_proto, |
448 | .input_handler = vti_input_proto, | |
df3893c1 SK |
449 | .cb_handler = vti_rcv_cb, |
450 | .err_handler = vti4_err, | |
451 | .priority = 100, | |
452 | }; | |
453 | ||
454 | static struct xfrm4_protocol vti_ah4_protocol __read_mostly = { | |
f981c57f JS |
455 | .handler = vti_rcv_proto, |
456 | .input_handler = vti_input_proto, | |
df3893c1 SK |
457 | .cb_handler = vti_rcv_cb, |
458 | .err_handler = vti4_err, | |
459 | .priority = 100, | |
460 | }; | |
461 | ||
462 | static struct xfrm4_protocol vti_ipcomp4_protocol __read_mostly = { | |
f981c57f JS |
463 | .handler = vti_rcv_proto, |
464 | .input_handler = vti_input_proto, | |
df3893c1 SK |
465 | .cb_handler = vti_rcv_cb, |
466 | .err_handler = vti4_err, | |
467 | .priority = 100, | |
1181412c S |
468 | }; |
469 | ||
87e66b96 XL |
470 | #if IS_ENABLED(CONFIG_INET_XFRM_TUNNEL) |
471 | static int vti_rcv_tunnel(struct sk_buff *skb) | |
472 | { | |
473 | XFRM_SPI_SKB_CB(skb)->family = AF_INET; | |
474 | XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct iphdr, daddr); | |
475 | ||
476 | return vti_input(skb, IPPROTO_IPIP, ip_hdr(skb)->saddr, 0, false); | |
477 | } | |
478 | ||
479 | static struct xfrm_tunnel vti_ipip_handler __read_mostly = { | |
f981c57f | 480 | .handler = vti_rcv_tunnel, |
87e66b96 | 481 | .cb_handler = vti_rcv_cb, |
dd9ee344 SY |
482 | .err_handler = vti4_err, |
483 | .priority = 0, | |
484 | }; | |
55a48c7e | 485 | |
61ee4137 | 486 | #if IS_ENABLED(CONFIG_IPV6) |
55a48c7e | 487 | static struct xfrm_tunnel vti_ipip6_handler __read_mostly = { |
f981c57f | 488 | .handler = vti_rcv_tunnel, |
55a48c7e | 489 | .cb_handler = vti_rcv_cb, |
dd9ee344 SY |
490 | .err_handler = vti4_err, |
491 | .priority = 0, | |
492 | }; | |
87e66b96 | 493 | #endif |
61ee4137 | 494 | #endif |
dd9ee344 | 495 | |
1181412c S |
496 | static int __net_init vti_init_net(struct net *net) |
497 | { | |
498 | int err; | |
b9959fd3 | 499 | struct ip_tunnel_net *itn; |
1181412c | 500 | |
b9959fd3 | 501 | err = ip_tunnel_init_net(net, vti_net_id, &vti_link_ops, "ip_vti0"); |
1181412c | 502 | if (err) |
b9959fd3 AW |
503 | return err; |
504 | itn = net_generic(net, vti_net_id); | |
cd1aa9c2 HY |
505 | if (itn->fb_tunnel_dev) |
506 | vti_fb_tunnel_init(itn->fb_tunnel_dev); | |
1181412c | 507 | return 0; |
1181412c S |
508 | } |
509 | ||
64bc1781 | 510 | static void __net_exit vti_exit_batch_net(struct list_head *list_net) |
1181412c | 511 | { |
64bc1781 | 512 | ip_tunnel_delete_nets(list_net, vti_net_id, &vti_link_ops); |
1181412c S |
513 | } |
514 | ||
515 | static struct pernet_operations vti_net_ops = { | |
516 | .init = vti_init_net, | |
64bc1781 | 517 | .exit_batch = vti_exit_batch_net, |
1181412c | 518 | .id = &vti_net_id, |
b9959fd3 | 519 | .size = sizeof(struct ip_tunnel_net), |
1181412c S |
520 | }; |
521 | ||
a8b8a889 MS |
522 | static int vti_tunnel_validate(struct nlattr *tb[], struct nlattr *data[], |
523 | struct netlink_ext_ack *extack) | |
1181412c S |
524 | { |
525 | return 0; | |
526 | } | |
527 | ||
528 | static void vti_netlink_parms(struct nlattr *data[], | |
9830ad4c CG |
529 | struct ip_tunnel_parm *parms, |
530 | __u32 *fwmark) | |
1181412c S |
531 | { |
532 | memset(parms, 0, sizeof(*parms)); | |
533 | ||
534 | parms->iph.protocol = IPPROTO_IPIP; | |
535 | ||
536 | if (!data) | |
537 | return; | |
538 | ||
df3893c1 SK |
539 | parms->i_flags = VTI_ISVTI; |
540 | ||
1181412c S |
541 | if (data[IFLA_VTI_LINK]) |
542 | parms->link = nla_get_u32(data[IFLA_VTI_LINK]); | |
543 | ||
544 | if (data[IFLA_VTI_IKEY]) | |
545 | parms->i_key = nla_get_be32(data[IFLA_VTI_IKEY]); | |
546 | ||
547 | if (data[IFLA_VTI_OKEY]) | |
548 | parms->o_key = nla_get_be32(data[IFLA_VTI_OKEY]); | |
549 | ||
550 | if (data[IFLA_VTI_LOCAL]) | |
67b61f6c | 551 | parms->iph.saddr = nla_get_in_addr(data[IFLA_VTI_LOCAL]); |
1181412c S |
552 | |
553 | if (data[IFLA_VTI_REMOTE]) | |
67b61f6c | 554 | parms->iph.daddr = nla_get_in_addr(data[IFLA_VTI_REMOTE]); |
1181412c | 555 | |
9830ad4c CG |
556 | if (data[IFLA_VTI_FWMARK]) |
557 | *fwmark = nla_get_u32(data[IFLA_VTI_FWMARK]); | |
1181412c S |
558 | } |
559 | ||
560 | static int vti_newlink(struct net *src_net, struct net_device *dev, | |
7a3f4a18 MS |
561 | struct nlattr *tb[], struct nlattr *data[], |
562 | struct netlink_ext_ack *extack) | |
1181412c | 563 | { |
b9959fd3 | 564 | struct ip_tunnel_parm parms; |
9830ad4c | 565 | __u32 fwmark = 0; |
1181412c | 566 | |
9830ad4c CG |
567 | vti_netlink_parms(data, &parms, &fwmark); |
568 | return ip_tunnel_newlink(dev, tb, &parms, fwmark); | |
1181412c S |
569 | } |
570 | ||
571 | static int vti_changelink(struct net_device *dev, struct nlattr *tb[], | |
ad744b22 MS |
572 | struct nlattr *data[], |
573 | struct netlink_ext_ack *extack) | |
1181412c | 574 | { |
9830ad4c CG |
575 | struct ip_tunnel *t = netdev_priv(dev); |
576 | __u32 fwmark = t->fwmark; | |
1181412c | 577 | struct ip_tunnel_parm p; |
1181412c | 578 | |
9830ad4c CG |
579 | vti_netlink_parms(data, &p, &fwmark); |
580 | return ip_tunnel_changelink(dev, tb, &p, fwmark); | |
1181412c S |
581 | } |
582 | ||
583 | static size_t vti_get_size(const struct net_device *dev) | |
584 | { | |
585 | return | |
586 | /* IFLA_VTI_LINK */ | |
587 | nla_total_size(4) + | |
588 | /* IFLA_VTI_IKEY */ | |
589 | nla_total_size(4) + | |
590 | /* IFLA_VTI_OKEY */ | |
591 | nla_total_size(4) + | |
592 | /* IFLA_VTI_LOCAL */ | |
593 | nla_total_size(4) + | |
594 | /* IFLA_VTI_REMOTE */ | |
595 | nla_total_size(4) + | |
9830ad4c CG |
596 | /* IFLA_VTI_FWMARK */ |
597 | nla_total_size(4) + | |
1181412c S |
598 | 0; |
599 | } | |
600 | ||
601 | static int vti_fill_info(struct sk_buff *skb, const struct net_device *dev) | |
602 | { | |
603 | struct ip_tunnel *t = netdev_priv(dev); | |
604 | struct ip_tunnel_parm *p = &t->parms; | |
605 | ||
8ed508fd HL |
606 | if (nla_put_u32(skb, IFLA_VTI_LINK, p->link) || |
607 | nla_put_be32(skb, IFLA_VTI_IKEY, p->i_key) || | |
608 | nla_put_be32(skb, IFLA_VTI_OKEY, p->o_key) || | |
609 | nla_put_in_addr(skb, IFLA_VTI_LOCAL, p->iph.saddr) || | |
610 | nla_put_in_addr(skb, IFLA_VTI_REMOTE, p->iph.daddr) || | |
611 | nla_put_u32(skb, IFLA_VTI_FWMARK, t->fwmark)) | |
612 | return -EMSGSIZE; | |
1181412c S |
613 | |
614 | return 0; | |
615 | } | |
616 | ||
617 | static const struct nla_policy vti_policy[IFLA_VTI_MAX + 1] = { | |
618 | [IFLA_VTI_LINK] = { .type = NLA_U32 }, | |
619 | [IFLA_VTI_IKEY] = { .type = NLA_U32 }, | |
620 | [IFLA_VTI_OKEY] = { .type = NLA_U32 }, | |
c593642c PB |
621 | [IFLA_VTI_LOCAL] = { .len = sizeof_field(struct iphdr, saddr) }, |
622 | [IFLA_VTI_REMOTE] = { .len = sizeof_field(struct iphdr, daddr) }, | |
9830ad4c | 623 | [IFLA_VTI_FWMARK] = { .type = NLA_U32 }, |
1181412c S |
624 | }; |
625 | ||
626 | static struct rtnl_link_ops vti_link_ops __read_mostly = { | |
627 | .kind = "vti", | |
628 | .maxtype = IFLA_VTI_MAX, | |
629 | .policy = vti_policy, | |
630 | .priv_size = sizeof(struct ip_tunnel), | |
631 | .setup = vti_tunnel_setup, | |
632 | .validate = vti_tunnel_validate, | |
633 | .newlink = vti_newlink, | |
634 | .changelink = vti_changelink, | |
20ea60ca | 635 | .dellink = ip_tunnel_dellink, |
1181412c S |
636 | .get_size = vti_get_size, |
637 | .fill_info = vti_fill_info, | |
1728d4fa | 638 | .get_link_net = ip_tunnel_get_link_net, |
1181412c S |
639 | }; |
640 | ||
641 | static int __init vti_init(void) | |
642 | { | |
1990e4f8 | 643 | const char *msg; |
1181412c S |
644 | int err; |
645 | ||
1990e4f8 | 646 | pr_info("IPv4 over IPsec tunneling driver\n"); |
1181412c | 647 | |
1990e4f8 | 648 | msg = "tunnel device"; |
1181412c S |
649 | err = register_pernet_device(&vti_net_ops); |
650 | if (err < 0) | |
1990e4f8 | 651 | goto pernet_dev_failed; |
df3893c1 | 652 | |
1990e4f8 MK |
653 | msg = "tunnel protocols"; |
654 | err = xfrm4_protocol_register(&vti_esp4_protocol, IPPROTO_ESP); | |
655 | if (err < 0) | |
656 | goto xfrm_proto_esp_failed; | |
df3893c1 | 657 | err = xfrm4_protocol_register(&vti_ah4_protocol, IPPROTO_AH); |
1990e4f8 MK |
658 | if (err < 0) |
659 | goto xfrm_proto_ah_failed; | |
df3893c1 | 660 | err = xfrm4_protocol_register(&vti_ipcomp4_protocol, IPPROTO_COMP); |
1990e4f8 MK |
661 | if (err < 0) |
662 | goto xfrm_proto_comp_failed; | |
1181412c | 663 | |
87e66b96 | 664 | #if IS_ENABLED(CONFIG_INET_XFRM_TUNNEL) |
dd9ee344 | 665 | msg = "ipip tunnel"; |
87e66b96 | 666 | err = xfrm4_tunnel_register(&vti_ipip_handler, AF_INET); |
01ce31c5 | 667 | if (err < 0) |
e6ce6457 XL |
668 | goto xfrm_tunnel_ipip_failed; |
669 | #if IS_ENABLED(CONFIG_IPV6) | |
55a48c7e | 670 | err = xfrm4_tunnel_register(&vti_ipip6_handler, AF_INET6); |
01ce31c5 | 671 | if (err < 0) |
e6ce6457 XL |
672 | goto xfrm_tunnel_ipip6_failed; |
673 | #endif | |
87e66b96 | 674 | #endif |
dd9ee344 | 675 | |
1990e4f8 | 676 | msg = "netlink interface"; |
1181412c S |
677 | err = rtnl_link_register(&vti_link_ops); |
678 | if (err < 0) | |
679 | goto rtnl_link_failed; | |
680 | ||
681 | return err; | |
682 | ||
683 | rtnl_link_failed: | |
87e66b96 | 684 | #if IS_ENABLED(CONFIG_INET_XFRM_TUNNEL) |
e6ce6457 | 685 | #if IS_ENABLED(CONFIG_IPV6) |
55a48c7e | 686 | xfrm4_tunnel_deregister(&vti_ipip6_handler, AF_INET6); |
e6ce6457 XL |
687 | xfrm_tunnel_ipip6_failed: |
688 | #endif | |
87e66b96 | 689 | xfrm4_tunnel_deregister(&vti_ipip_handler, AF_INET); |
e6ce6457 | 690 | xfrm_tunnel_ipip_failed: |
87e66b96 | 691 | #endif |
5483844c | 692 | xfrm4_protocol_deregister(&vti_ipcomp4_protocol, IPPROTO_COMP); |
1990e4f8 | 693 | xfrm_proto_comp_failed: |
df3893c1 | 694 | xfrm4_protocol_deregister(&vti_ah4_protocol, IPPROTO_AH); |
1990e4f8 | 695 | xfrm_proto_ah_failed: |
df3893c1 | 696 | xfrm4_protocol_deregister(&vti_esp4_protocol, IPPROTO_ESP); |
1990e4f8 | 697 | xfrm_proto_esp_failed: |
1181412c | 698 | unregister_pernet_device(&vti_net_ops); |
1990e4f8 MK |
699 | pernet_dev_failed: |
700 | pr_err("vti init: failed to register %s\n", msg); | |
1181412c S |
701 | return err; |
702 | } | |
703 | ||
704 | static void __exit vti_fini(void) | |
705 | { | |
706 | rtnl_link_unregister(&vti_link_ops); | |
87e66b96 | 707 | #if IS_ENABLED(CONFIG_INET_XFRM_TUNNEL) |
e6ce6457 | 708 | #if IS_ENABLED(CONFIG_IPV6) |
55a48c7e | 709 | xfrm4_tunnel_deregister(&vti_ipip6_handler, AF_INET6); |
e6ce6457 | 710 | #endif |
87e66b96 XL |
711 | xfrm4_tunnel_deregister(&vti_ipip_handler, AF_INET); |
712 | #endif | |
1990e4f8 MK |
713 | xfrm4_protocol_deregister(&vti_ipcomp4_protocol, IPPROTO_COMP); |
714 | xfrm4_protocol_deregister(&vti_ah4_protocol, IPPROTO_AH); | |
715 | xfrm4_protocol_deregister(&vti_esp4_protocol, IPPROTO_ESP); | |
1181412c S |
716 | unregister_pernet_device(&vti_net_ops); |
717 | } | |
718 | ||
719 | module_init(vti_init); | |
720 | module_exit(vti_fini); | |
721 | MODULE_LICENSE("GPL"); | |
722 | MODULE_ALIAS_RTNL_LINK("vti"); | |
723 | MODULE_ALIAS_NETDEV("ip_vti0"); |